Security News > 2025 > April

Product Walkthrough: A Look Inside Wing Security's Layered SaaS Identity Defense
2025-04-16 10:30

Intro: Why hack in when you can log in? SaaS applications are the backbone of modern organizations, powering productivity and operational efficiency. But every new app introduces critical security...

Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users
2025-04-16 07:34

Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp and Telegram that contain cryptocurrency clipper...

Guess what happens when ransomware fiends find 'insurance' 'policy' in your files
2025-04-16 06:25

It involves a number close to three or six depending on the fiend Ransomware operators jack up their ransom demands by a factor of 2.8x if they detect a victim has cyber-insurance, a study...

MITRE warns that funding for critical CVE program expires today
2025-04-16 06:16

MITRE Vice President Yosry Barsoum has warned that U.S. government funding for the Common Vulnerabilities and Exposures (CVE) and Common Weakness Enumeration (CWE) programs expires today, which...

When companies merge, so do their cyber threats
2025-04-16 06:00

For CISOs, mergers and acquisitions (M&A) bring both potential and risk. These deals can drive growth, but they also open the door to serious cybersecurity threats that may derail the transaction....

Strategic AI readiness for cybersecurity: From hype to reality
2025-04-16 05:30

AI readiness in cybersecurity involves more than just possessing the latest tools and technologies; it is a strategic necessity. Many companies could encounter serious repercussions, such as...

U.S. Govt. Funding for MITRE's CVE Ends April 16, Cybersecurity Community on Alert
2025-04-16 05:06

The U.S. government funding for non-profit research giant MITRE to operate and maintain its Common Vulnerabilities and Exposures (CVE) program will expire Wednesday, an unprecedented development...

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques
2025-04-16 05:00

MITRE’s Attack Flow project aims to translate complex cyber operations into a structured language. By describing how adversaries sequence and combine offensive techniques to reach their...

The future of authentication: Why passwordless is the way forward
2025-04-16 04:30

By now, most CISOs agree: passwords are the weakest link in the authentication chain. They’re easy to guess, hard to manage, and constantly reused. Even the most complex password policies don’t...

Browser extensions make nearly every employee a potential attack vector
2025-04-16 04:00

Despite being present on virtually every employee’s browser, extensions are rarely monitored by security teams or controlled by IT, according to LayerX. Most extensions have access to sensitive...