Researcher claims 184 million Facebook, Google, and Microsoft passwords leaked online

Summary A recent report reveals that an unencrypted database containing over 184 million passwords has been leaked online. This massive breach affects user credentials for popular platforms such as Facebook, Google, and Microsoft, among others. The database was discovered by cybersecurity researcher Jeremiah Fowler and is linked to various services, including social media and banking. […]

Read More →

Firms Eye Vendor Vulnerabilities as Enterprise Cybersecurity Risks Surge

Summary As enterprise cybersecurity risks continue to rise, firms are becoming increasingly aware of vulnerabilities associated with third-party vendors. Data breaches involving these vendors have doubled recently, posing a significant threat to organisations. Traditional security measures are no longer adequate, prompting a shift towards continuous cyber risk monitoring using AI and machine learning to detect […]

Read More →

Papua New Guinea Streisands Sketchy ‘Involuntary Resettlement’ Efforts By Threatening DDoSecrets

Papua New Guinea’s National Cyber Security Centre, led by Hamilton Vagi, attempted to intimidate DDoSecrets following the publication of a million emails from the government’s Mineral Resources Authority. Vagi’s threats highlighted the confidentiality of the documents, which deal with sensitive information about involuntary resettlement policies related to the mining industry. However, DDoSecrets’ legal response not […]

Read More →

We’re moving from prototype to production when it comes to agents, says Okta CEO Todd McKinnon

Okta’s CEO Todd McKinnon shares important insights regarding the company’s transition from prototypes to full-scale production of their agents. In an appearance on ‘Mad Money’ with Jim Cramer, McKinnon highlights the company’s quarterly results, its role in the cybersecurity sector, and the integration of AI technology into their offerings. This shift signifies a major step […]

Read More →

Navigating international conflicts and regulatory landscapes

Summary In the latest tech news, a significant controversy has erupted around TuSimple, a US self-driving truck startup, as it faces backlash for allegedly transferring sensitive data to a Chinese firm after promising not to. Meanwhile, the European Commission is investigating several pornographic websites to assess compliance with new regulations aimed at protecting minors. Additionally, […]

Read More →

Hottest cybersecurity open-source tools of the month: May 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Key Points Vuls: An open-source agentless vulnerability scanner designed to help identify and manage security vulnerabilities effectively. LlamaFirewall: A modular security framework aimed at detecting and mitigating AI-centric security risks, particularly those posed by large language models. […]

Read More →

Is your bank’s board TQ ready?

As technology continues to accelerate its impact on the banking sector, the composition and capabilities of bank boards are under scrutiny. The focus is on whether these boards have the technology experience necessary to effectively navigate the digital transformation landscape, as well as associated risks. Technology is reshaping bank boardroom agendas The role of technology […]

Read More →

Adidas hit in yet another UK retail data breach

Adidas has confirmed a recent cyber attack that compromised customer data from its UK help desk. The breach was disclosed on 23rd May and involved unauthorised access to a third-party customer service provider, revealing customer contact information. Luckily, the exposed data did not include sensitive financial information like passwords or credit card details. The company […]

Read More →

Adidas is hit by a CYBERATTACK: Devastating hack sees customers’ personal information stolen – just weeks after Marks & Spencer and Co-op were targeted by cybercriminals

Summary Adidas has recently fallen victim to a cyberattack, during which cybercriminals accessed ‘certain consumer data’ via a third-party customer service provider. Fortunately, the stolen data does not include passwords or financial information, primarily consisting of contact details from customers who had previously interacted with Adidas’ support team. Adidas stated they acted swiftly to contain […]

Read More →

Cybercriminals are using fake versions of the Ledger Live app to steal cryptocurrency from Mac users

Cybercriminals are getting sneaky with their tactics, creating fake versions of the Ledger Live app to rip off unsuspecting Mac users. This growing trend has taken a dark turn, leading to cunning phishing schemes that lure victims into giving up their sensitive seed phrases, ultimately allowing thieves to drain their crypto wallets. According to research […]

Read More →