- Artificial Intelligence
- Cybersecurity
- Threats & Breaches
- Privacy & Policy
- Tools
- Trends & Research
- MSP MSSP
- Blogs & Insights
Subscribe to Updates
Get the latest creative news from FooBar about art, design and business.
Author: Contributor
The landscape of cyber risk is evolving as malicious actors leverage new technologies, geopolitical tensions rise, and regulatory enforcement intensifies. Key cyber threats and trends anticipated for 2025 and beyond include: Emergence of covert, AI-driven attacks Growth in proactive threat hunting Increased clarity regarding cyber and privacy regulations Tighter measures against technology-enabled espionage, foreign interference, and sabotage. 1. Covert, AI-Powered Attacks Cybercriminals are becoming increasingly innovative, developing sophisticated methods to execute cyber attacks that are more challenging to detect and prevent. The rise of AI technology has enhanced their capability to launch advanced attacks, often integrating it with traditional methods…
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has announced sanctions against a Chinese cybersecurity firm and a cyber actor based in Shanghai due to their alleged connections with the Salt Typhoon group and a recent breach of federal systems. The Treasury stated that malicious cyber activities linked to the People’s Republic of China (PRC) persistently target U.S. government networks, including recent intrusions into Treasury’s IT systems and critical infrastructure. The sanctions specifically name Yin Kecheng, identified as a cyber actor with over a decade of affiliation with China’s Ministry of State Security (MSS). Kecheng is believed to…
Matt Emma | Contributor Hackers represent a significant threat to contemporary society. While companies may incur substantial costs on cybersecurity personnel to avoid hacks and cybercrime, the financial implications of a serious data breach can be far more severe. Cybersecurity professional Jeevan Jutla has been engaged in the fight against advanced cyber threats since his teenage years by adopting a hacker’s mindset, preemptively identifying vulnerabilities, and utilizing artificial intelligence. Jutla’s journey into cybersecurity began in a unique manner; he joined the UK Intelligence Service as a teenager. He later co-founded Gecko Security, an AI-driven cybersecurity solution aimed at enhancing software…
Industry 5.0 signifies more than just a technological evolution; it embodies a fundamental shift in the manufacturing mindset. It calls for automakers to harmonize innovation with empathy, efficiency with sustainability, and precision with creativity. Similar to other sectors, the automotive industry is now beginning to adopt the tenets of Industry 5.0. While Industry 4.0 transformed vehicle manufacturing through automation, IoT, and data analytics, Industry 5.0 emphasizes reintegrating the human element, promoting collaboration between humans and machines, sustainable practices, and resilience in production methods. This new paradigm prioritizes a human-centric approach over merely enhancing factory intelligence. It combines the creativity of…
Jan 20, 2025Ravie LakshmananAndroid / Malware New Android Malware Linked to DoNot Team The hacking group known as the DoNot Team has been associated with a new strain of malware targeting Android devices, contributing to highly focused cyber assaults. Malware Overview Two pieces of malware, identified as Tanzeem (which translates to “organization” in Urdu) and Tanzeem Update, were discovered by the cybersecurity firm Cyfirma in October and December of 2024. Both apps exhibit similar functionalities, with minor variations in their user interfaces. Malfunctioning Chat Application According to Cyfirma’s analysis, although the application is designed to function as a chat service,…
Executive Summary Unit 42 continuously observes the cyberthreat landscape, focusing on extortion and ransomware trends. Ransomware attackers are adapting their methods to enhance their attack efficiency and increase the likelihood of organizations complying with ransom demands. Our 2025 Unit 42 Global Incident Response Report indicated that 86% of incidents resulted in business interruptions, which included operational downtime and reputational harm. This analysis highlights qualitative insights based on incident response cases and general threat landscape observations, such as: Threat actors making unverified breach claims. Collaboration between nation-state actors and ransomware groups. Utilization of tools to disable endpoint security mechanisms. Expanded attack…
Jan 23, 2025Ravie LakshmananCybersecurity / National Security The Trump administration has announced the termination of all memberships on advisory committees associated with the Department of Homeland Security (DHS). In a memo dated January 20, 2025, Acting Secretary Benjamine C. Huffman emphasized the DHS’s commitment to resource management and prioritizing national security. The memo states, “Effective immediately, all current memberships on advisory committees within DHS will be terminated.” Future endeavors, according to Huffman, will strictly focus on advancing DHS’s core mission of homeland protection and strategic priorities. This decision impacts members of the Cybersecurity and Infrastructure Security Agency’s (CISA) Cyber Safety…
Opinions expressed by Entrepreneur contributors are their own. You’re reading Entrepreneur India, an international franchise of Entrepreneur Media. India’s Evolving Digital Transformation As India embarks on the next phase of its digital evolution, the emphasis is shifting from building infrastructure to implementing intelligent transformations. This new focus involves utilizing AI, cloud sovereignty, and cybersecurity as foundational elements for nation-building efforts. Advancing Digital Public Infrastructure India’s digital public framework, which includes Aadhaar, UPI, DigiLocker, and over 4,000 online services, has facilitated widespread access to critical government services. The current aim is to enhance this system with AI-powered, multilingual, and real-time service…
AWS has introduced the Well-Architected Generative AI Lens, designed to offer best practices for creating and managing generative AI workloads. This resource targets business leaders, data scientists, architects, and engineers tasked with delivering effective and economical generative AI solutions. The document includes cloud-agnostic best practices, guidance for implementation, and links to further resources. The Generative AI Lens takes into account the principles of responsible AI, emphasizing the unique challenges posed by new AI capabilities. It outlines several considerations for customers to examine and address, particularly the importance of ensuring the accuracy and robustness of outputs, even in response to unexpected…
Intensified Cyberattacks and Ransomware Trends According to Unit 42’s 2025 Global Incident Response Report, ransomware attacks are becoming increasingly aggressive, with 86% of cases leading to major disruptions in business operations, including downtime and damage to reputation. Cybercriminals are enhancing their tactics, employing more sophisticated and misleading strategies to escalate the impact of their attacks and compel organizations to pay substantial ransoms. Deceptive Data Breach Claims A concerning trend involves threat actors who falsely assert data breaches, often relying on outdated information or fabricating details to pressure victims into compliance. For example, in March 2025, scammers posing as the BianLian…