cyber threats

cyber threats news search results

Developer news items we found relating to cyber threats

35 results
Airline-data-breach-hits-WestJet-exposing-over-1M-passengers

Airline data breach hits WestJet exposing over 1M passengers


Thursday, October 30, 2025 by

Canada’s second-largest airline, WestJet, disclosed that a data breach earlier this year compromised the personal information of approximately 1.2 million passengers. The airline reported the incident in a filing with Maine’s attorney general, confirming that 240 residents in the state were affected. Details of the information compromised The informati...


Russian-airport-hacked-as-St.-Petersburg-website-reports-cyberattack

Russian airport hacked as St. Petersburg website reports cyberattack


Monday, October 6, 2025 by

Pulkovo airport, the primary international gateway for St. Petersburg, reported that its official website had been compromised in a cyberattack. The airport serves millions of passengers annually, making secure digital operations essential for timely flight information and passenger services. Officials confirmed that the attack temporarily disrupted access to the websit...


Push-for-FTC-to-Investigate-Microsoft

Push for FTC to Investigate Microsoft


Monday, September 22, 2025 by

U.S. Senator Ron Wyden has formally requested the Federal Trade Commission to examine Microsoft for what he describes as significant cybersecurity shortcomings. The request cites repeated security incidents and raises questions about the company’s role in safeguarding critical infrastructure. Senator highlights cybersecurity risks In a letter addressed to FT...


Salesforce-data-breach-linked-to-Tenable-via-Salesloft-Drift

Salesforce data breach linked to Tenable via Salesloft Drift


Friday, September 12, 2025 by

A recent Salesforce data breach involving the Salesloft Drift integration has affected multiple organizations, including cybersecurity company Tenable. The company confirmed that limited customer contact and support case data were exposed but emphasized that no core product data was compromised. Scope of exposed information Tenable reported that information access...


Hackers-steal-cryptocurrency-using-fake-job-offers-report-reveals

Hackers steal cryptocurrency using fake job offers report reveals


Tuesday, September 9, 2025 by

A recent investigation reveals that North Korean hacking groups are using elaborate fake job offers to steal cryptocurrency from blockchain professionals and investors. The scams, identified in a joint report by cybersecurity firms SentinelOne and Validin, include posing as recruiters for major crypto companies and directing applicants to download malicious software or ...


GitHub-Copilot-surpasses-20M-users

GitHub Copilot surpasses 20M users


Monday, August 18, 2025 by

Microsoft Corporation wrapped up its fiscal year 2025 on an exceptionally strong note, delivering robust growth across cloud, AI, productivity, and consumer services. The tech giant reported a 24% year-over-year jump in net income for the fourth quarter, amounting to $27.2 billion, while revenue for the same period reached $76.4 billion, an 18% increase. These results u...


Microsoft-at-Black-Hat-USA-2025

Microsoft at Black Hat USA 2025


Monday, August 11, 2025 by

Microsoft will participate in Black Hat USA 2025, scheduled for August 5-7 in Las Vegas, offering attendees a practitioner-driven experience centered on real-world threat intelligence, incident response, and applied AI expertise. The company emphasizes that cybersecurity is most effective when intelligence, tools, and domain expertise are tightly integrated. To that end...


Microsoft-SharePoint-hit-by-widespread-zero-day-attacks

Microsoft SharePoint hit by widespread zero-day attacks


Wednesday, July 30, 2025 by

The Cybersecurity and Infrastructure Security Agency (CISA) has reported active exploitation of a newly identified remote code execution (RCE) vulnerability affecting on-premise Microsoft SharePoint servers. The vulnerability, cataloged as CVE-2025-53770, is a variant of the previously known CVE-2025-49706 and presents significant risks to organizations by enabling unau...


Security-trade-offs-and-Xs-vulnerabilities

Security trade-offs and Xs vulnerabilities


Friday, March 21, 2025 by

The latest cyberattack on X raises an important question: Was this an external attack or a result of internal instability? While hacktivist group Dark Storm has claimed responsibility for the distributed denial-of-service (DDoS) attack, it is just as crucial to examine X’s own security posture, particularly in light of the drastic staffing cuts that followed Elon ...


Cybersecurity-in-2025

Cybersecurity in 2025


Tuesday, February 4, 2025 by

Timothy Hollebeek shares his insights on the key cybersecurity trends shaping 2025, focusing on the evolving landscape of digital trust and identity. As quantum computing and AI continue to advance, they bring both groundbreaking innovations and new cybersecurity risks. The introduction of Google’s Willow chip signals a new era of quantum technology, accelerating ...


Cybersecurity-supply-chain-risk-management-predictions-for-2025

Cybersecurity supply chain risk management predictions for 2025


Thursday, January 16, 2025 by

DTS CEO and President Edward Tuorinsky shares his cybersecurity prediction for shaping the 2025 business landscape. Cybersecurity in 2025 is like that party game where you whisper a phrase to the person next to you. One mistake is passed along to others, with funny outcomes. The stakes are higher, and the results are less amusing when data breaches or hacks travel al...


Emerging-features-to-consider-for-mobile-app-development

Emerging features to consider for mobile app development


Wednesday, November 13, 2024 by

In an era where mobile applications are ubiquitous, with a staggering 8.93 million apps vying for attention across various app stores, distinguishing your app from the competition is paramount. While aesthetics undoubtedly play a role in user attraction, it is the functionality and features of an app that truly captivate and retain users. Whether you are embarking on yo...


Developers-threatened-by-DOJ-proposals-says-Google

Developers threatened by DOJ proposals says Google


Monday, October 21, 2024 by

The U.S. Department of Justice (DOJ) has shared a broad outline of radical changes it may demand as part of its lawsuit regarding search distribution. This marks the beginning of a lengthy process, and Google plans to respond in detail to the DOJ's ultimate proposals as it prepares its case in court next year. However, concerns have arisen that the DOJ is signaling ...


Google-AdSense-updates-revealed-for-new-US-state-privacy-laws

Google AdSense updates revealed for new US state privacy laws


Friday, October 18, 2024 by

Google AdSense has released an important update addressing upcoming privacy laws in five US states. With new privacy regulations taking effect in Iowa, Delaware, New Jersey, Nebraska, and New Hampshire in early 2025, AdSense users and publishers will see key changes designed to ensure compliance and transparency. Google AdSense updates announced for the new US state ...


Increasing-cyber-threats-from-artificial-intelligence

Increasing cyber threats from artificial intelligence


Wednesday, October 9, 2024 by

The UK Cybersecurity M&A market has grown significantly over the past decade, with the deal volume trend line increasing, and the sector continuing to attract significant investment from Private Equity, alongside larger corporates consolidating emerging technologies to counter increasingly sophisticated threats. The UK National Cyber Security Centre has...


Vulnerabilities-in-Apple-products-alert

Vulnerabilities in Apple products alert


Monday, September 30, 2024 by

CERT-In has recently issued Advisory CIAD-2024-0046, highlighting multiple high-severity vulnerabilities in Apple products. The vulnerabilities affect a wide range of Apple software, including iOS versions prior to 18, iPadOS versions prior to 18, macOS Sonoma versions prior to 14.7, macOS Ventura versions prior to 13.7, and the upcoming macOS Sequoia versions prior to ...


AWS-introduces-Mithra-advanced-threat-intelligence-neural-network

AWS introduces Mithra advanced threat intelligence neural network


Thursday, August 15, 2024 by

In a recent blog post from AWS, Amazon Chief Information Security Officer CJ Moses detailed the robust threat intelligence capabilities that safeguard AWS customers. Through tools like Mithra and MadPot, AWS collects and analyzes vast data, identifying and neutralizing threats with unparalleled accuracy and speed. AWS's proactive approach to sharing high-fidelity th...


Rise-in-cyberattacks-is-alarming-folks

Rise in cyberattacks is alarming folks


Friday, June 28, 2024 by

A recent study has uncovered a startling rise in cyberattacks from 2022 to 2023. Throughout 2023, the United States experienced an alarming 3,205 data breaches, marking a dramatic 78% surge from the 1,801 incidents reported in 2022.  The study conducted by data collection experts SOAX utilized data from the Identity Theft Resource Center on the number of data vi...


Cybersecurity-AI-trends-in-2024-according-to-Edgio

Cybersecurity AI trends in 2024 according to Edgio


Thursday, December 21, 2023 by

Looking ahead to 2024 and beyond, it is clear that the cybersecurity skills gap will only continue to widen. However, by leveraging AI tools and investing in the development of skilled cybersecurity professionals who can work effectively with these tools, organizations can better protect their networks and data from cyber threats and ensure they remain resilient in an i...


App-server-market-size-expected-to-reach-52B-by-2030

App server market size expected to reach 52B by 2030


Wednesday, November 1, 2023 by

The platform called an application server is typically used for cloud-based apps for mobile devices like tablets and smartphones. While allowing the right to access and the functionality of the corporate application, the application server serves as the host for the user's business logic. The banking, financial services, and insurance (BFSI) industry are always d...


NFT-marketplace-and-gallery-to-launch-from-Trend-Innovations

NFT marketplace and gallery to launch from Trend Innovations


Wednesday, April 26, 2023 by

Trend Innovations Holding Inc. has recently announced that they will combine two recent acquisitions to upgrade and launch a more robust version of the company's newly acquired InstantFAME platform. InstantFAME is a mobile and web application, which operates in the multi-billion-dollar digital artwork marketplace for artists to securely publish and sell their d...


NET-MAUI-and-the-end-of-IE

NET MAUI and the end of IE


Thursday, August 4, 2022 by

Earlier this year, Microsoft announced the general availability of .NET MAUI, enabling developers to build cross-platform applications from a single codebase, saving costs, and eliminating the need to maintain multiple codebases. According to Microsoft, the primary goal of .NET MAUI is to enable developers "to deliver the best app experience as designed speciall...


PKI-Spotlight-security-solution-launches

PKI Spotlight security solution launches


Wednesday, April 6, 2022 by

PKI Solutions announced the introduction of PKI Spotlight, an industry solution that provides real-time monitoring and alerting of the availability, configuration, and security of all organizations' PKI environments, all consolidated into one easy-to-use dashboard. PKI is a foundational technology for almost every identity and data encryption solution...


HackNotice-announces-threat-intelligence-platform

HackNotice announces threat intelligence platform


Friday, September 18, 2020 by

HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...


To-encrypt-or-not-encrypt-legacy-devices-no-longer-a-choice

To encrypt or not encrypt legacy devices no longer a choice


Thursday, March 19, 2020 by

Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...


Experience-Center-worldwide-launches-from-Microsoft

Experience Center worldwide launches from Microsoft


Monday, November 18, 2019 by

Microsoft has also reimagined the future of work by creating a blueprint for productivity, efficiency, accessibility, flexibility, and collaboration for organizations in the region. In a world where we can expect more than 40 billion devices generating nearly 80 zettabytes (ZB) of data by 2025, organizations and industries will need to quickly adopt new tec...


Warnings-for-aircraft-cybersecurity

Warnings for aircraft cybersecurity


Thursday, August 1, 2019 by

The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft. Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.&nbs...


The-most-popular-gaming-platform,-and-why-cloud-gaming-sucks

The most popular gaming platform, and why cloud gaming sucks


Friday, March 22, 2019 by

Gamers spend an average of 7 hours, 7 mins each week playing (up 19% from last year), and cloud is the next frontier for video games it seems, with major tech players like Microsoft and Google teasing their cloud gaming launches at GDC 19. But getting gamers on board with these new services will require developers to create interactive games that don’t frustr...


Code-security-gamification-company-nabs-$3.5M-in-funding

Code security gamification company nabs $3.5M in funding


Friday, September 14, 2018 by

Secure application development platform provider Secure Code Warrior announced that it has gained US $3.5 million in funding from two strategic venture capital firms. The financing was led by Washington DC-based Paladin Capital Group, with participation from Sydney-based AirTree Ventures. The initial funding round will allow the company to further expand its rapidly gro...


How-the-reddit-security-breach-reminds-us-to-be-careful

How the reddit security breach reminds us to be careful


Monday, August 6, 2018 by

reddit recently disclosed in their announcements feed of a security breach into their system which the hacker "managed to access some user data, including some current email addresses and a 2007 database backup containing old salted and hashed passwords." Include in the disclosed information was some reddit source code and some log files. They went on to sa...


Autonomous-vehicles-and-data-collection-talks-coming--August-78

Autonomous vehicles and data collection talks coming August 78


Wednesday, August 1, 2018 by

Three no-cost discussion sessions will explore the growing importance of data capture, use and safe/reliable storage in vehicles and the autonomous transportation at the Flash Memory Summit August 7-8 at the Santa Clara Convention Center. During the free sessions; engineers, executives, urban planners, government officials and transportation researchers will explore ...


Avoid-mobile-cybersecurity-threats-by-checking-the-source

Avoid mobile cybersecurity threats by checking the source


Thursday, July 5, 2018 by

Earlier this month IT news organizations around the globe reported that Epic Games’ popular Fortnite game was being counterfeited and malicious actors were, in fact, lacing the imposter apps with malware. We’re only human, and people unwittingly let their guard down in anticipation of something they're passionate about, or when they think they might b...


Questioning-the-future-of-privacy-and-the-safety-of-personal-identity

Questioning the future of privacy and the safety of personal identity


Thursday, June 28, 2018 by

While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR. These findings and more are outlin...


This-API-api-security-solution-to-use-AI

This API api security solution to use AI


Thursday, February 1, 2018 by

To protect global organizations against ever-increasing security threats, Axway has announced a global partnership with Elastic Beam. Together, the two companies will help organizations achieve optimal security and ecosystem engagement by leveraging an AI engine, integrated with Axway API Gateway, that automatically detects and blocks new attacks on APIs. The Elastic Be...


The-future-of-cybersecurity-in-machine-learning

The future of cybersecurity in machine learning


Sunday, July 30, 2017 by

McAfee, a cybersecurity company, has announced several new innovations that expand machine learning and automation capabilities to strengthen human-machine teams. Plus, McAfee announces support of OpenDXL.com, a new, independent collaboration portal that offers forums and free apps, giving OpenDXL users easy access to ideas and resources available for application integr...


Featured Stories


APAC 5G expansion to fuel 347B mobile market by 2030
APAC 5G expansion to fuel 347B mobile market by 2030 Tuesday, April 21, 2026


Jentic launch gives AI agents api access
Jentic launch gives AI agents api access Wednesday, April 15, 2026


Ludo.ai Unveils API and MCP Beta to Power AI Game Asset Pipelines
Ludo.ai Unveils API and MCP Beta to Power AI Game Asset Pipelines Tuesday, April 14, 2026




Stop Using Business Jargon: 5 Ways Buzzwords Damage Job Performance
Stop Using Business Jargon: 5 Ways Buzzwords Damage Job Performance Tuesday, April 14, 2026


IT spending rises as banks balance legacy and innovation
IT spending rises as banks balance legacy and innovation Monday, April 13, 2026


FCC prohibits new foreign router models citing critical infrastructure risks
FCC prohibits new foreign router models citing critical infrastructure risks Thursday, April 9, 2026


Enviromates tech startup launches global participation platform
Enviromates tech startup launches global participation platform Friday, March 27, 2026


Private Repository Secures the AI-driven Development Boom
Private Repository Secures the AI-driven Development Boom Friday, March 27, 2026


UK Fintech Platform Enviromates Connects Projects Brands and Consumers
UK Fintech Platform Enviromates Connects Projects Brands and Consumers Thursday, March 26, 2026


How Industrial AI Is Transforming Operations in 2026
How Industrial AI Is Transforming Operations in 2026 Wednesday, March 25, 2026


Stay Updated

Sign up for our newsletter for the headlines delivered to you

SuccessFull SignUp

Get More App News



/sites/themes/prod/assets/js/less.js"> ' ' %>