Archive for June, 2025

A report finds hospitals spend more than $18 billion per year due to violence in the workplace and the community.

…read more

Source:: Security magazin

By Eduard Kovacs

Siemens is working with Microsoft to address a Defender Antivirus problem that can lead to no malware alerts or plant disruptions.

The post Siemens Notifies Customers of Microsoft Defender Antivirus Issue appeared first on SecurityWeek.

…read more

Source:: securityweek

Aflac discovered suspicious activity on its United States network.

…read more

Source:: Security magazin

By Torsten George

The future of secure digital engagement depends on continuous identity verification and proofing that can scale with risk.

The post Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives appeared first on SecurityWeek.

…read more

Source:: securityweek

By Ionut Arghire

Palo Alto Networks has observed a spike in Prometei activity since March 2025, pointing to a resurgence of the botnet.

The post Prometei Botnet Activity Spikes appeared first on SecurityWeek.

…read more

Source:: securityweek

By Ionut Arghire

A Chinese APT has been infecting SOHO routers with the ShortLeash backdoor to build stealthy espionage infrastructure.

The post Chinese APT Hacking Routers to Build Espionage Infrastructure appeared first on SecurityWeek.

…read more

Source:: securityweek

By Ionut Arghire

Newly discovered spyware has sneaked into Apple’s App Store and Google Play to steal images from users’ mobile devices.

The post Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play appeared first on SecurityWeek.

…read more

Source:: securityweek

By Eduard Kovacs

Tech support scammers are using sponsored ads and search parameter injection to trick users into calling them.

The post Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams appeared first on SecurityWeek.

…read more

Source:: securityweek

Hackers are no longer just targeting financial systems or customer databases. They’re going straight for the heart of brand reputation.

…read more

Source:: Security magazin

By Ionut Arghire

North Korean hackers employ social engineering to trick Zoom Meeting participants into executing system-takeover commands.

The post North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting appeared first on SecurityWeek.

…read more

Source:: securityweek