Cybersecurity

Sponsored
by

Cybersecurity / Most Viewed

Kadnap Malware Infects 14,000 Routers Worldwide, Designed to Resist Takedowns Experts Warn

Security researchers have uncovered Kadnap malware infecting more than 14,000 routers worldwide, forming a resilient peer-to-peer botnet that exploits outdated edge devices and could enable covert communications, proxy traffic, and future cyber attacks. more

Moscow Calls US Accusations of Russian DNC Hack “Unprecedented Anti-Russian Hysteria”

The Foreign Ministry in Moscow says U.S. accusations that Russia was responsible for cyber attacks against Democratic Party organizations lack any proof and are an attempt by Washington to fan "unprecedented anti-Russian hysteria". more

The AI Effect: Why Brand Impersonation Is Becoming Industrialised

Generative AI has turned brand impersonation from a nuisance into an industrial-scale threat, eroding trust. As ICANN's 2026 round approaches, DotBrand domains promise a structural fix to spoofing that strategies failed to deliver in 2012. more

US Ramping Up to Defeat Terrorism Online

Obama administration is ramping up its efforts to fight terrorism -- "How the US is working to defeat ISIS online" Kristina Wong reprots today in the Hill: "Driving the effort is the recently set up Global Engagement Center, housed at the State Department but led by retired Navy SEAL Cmdr. Michael Lumpkin, a former top Pentagon official." more

UK Raises Cybersecurity Spending to $2.3 Billion

Britain's finance minister on Tuesday announced government's new five year National Cyber Security Strategy, almost doubling the funding from its 2011 plan to 1.9 billion-pound ($2.3 billion). more

Reprot Suggests China Hacked High-Level Officials at Federal Deposit Insurance Corporation

The former chairman, chief of staff and general counsel of the agency were all infiltrated. more

Is Zoom’s Server Security Just as Vulnerable as the Client Side?

Zoom programmers made elementary security errors when coding, and did not use protective measures that compiler toolchains make available. It's not a great stretch to assume that similar flaws afflict their server implementations. While Mudge noted that Zoom's Windows and Mac clients are (possibly accidentally) somewhat safer than the Linux client, I suspect that their servers run on Linux.Were they written with similar lack of attention to security? more

British Banks Not Fully Reporting Cyber Attacks, Fear Punishment, Bad Publicity

"Britain's banks are not reporting the full extent of cyber attacks to regulators for fear of punishment or bad publicity, bank executives and providers of security systems say," reports Lawrence White in Reuters today. more

Africa’s AI Governance Crisis Is Not a Regulatory Gap, It Is a Sovereignty Emergency

Africa's looming AI rules expose a deeper problem: foreign-controlled infrastructure, weak enforcement capacity and externally governed data flows are eroding digital sovereignty, leaving states unable to regulate, protect citizens or meet global obligations. more

How Bad Actors Are Leveraging DNS: Looking at the Latest Trends

Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence. more

Five Things the UN Permanent Mechanism on Cybersecurity Must Actually Deliver

The UN's new permanent cybersecurity mechanism promises continuity after decades of fleeting forums, yet risks irrelevance unless states enforce existing law, bridge cybercrime divides, address AI threats, build practical capacity, and include non-state expertise meaningfully. more

US Senators in Letter to Yahoo Say Late Hack Disclosure “Unacceptable”

"A group of Democratic U.S. senators on Tuesday demanded Yahoo Inc (YHOO.O) to explain why hackers' theft of user information for half a billion accounts two years ago only came to light last week and lambasted its handling of the breach as "unacceptable," reports Dustin Volz from Washington in Reuters. more

Domain Security Report: Unicorns Show Strong Adoption in Key Domain Security Measures

Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today. more

Securing Africa’s Digital Future: Why Cybersecurity Must Lead Digital Transformation

Africa's rapid digital expansion, from fintech to e-government, is outpacing its cybersecurity capacity, leaving critical systems exposed and trust at risk unless governments embed security as a core pillar of development across the continent today. more

Trusted Notifier Network (TNN) Core Concept 1: Unfair Cost Transfer and Reversal of Commercial Best

A flawed abuse-response system shifts costs from perpetrators to intermediaries, overwhelming enforcement. The Trusted Notifier Network seeks to realign incentives, curb low-quality reporting, and restore efficiency by embedding trust, accountability, and cost redistribution. more