CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// Industry News & Leadership
Intel Feed

cyberintel.kalymoon.com  ·  5171 articles  ·  updated every 4 hours · grows forever

5171Total
5070Full Text
May 24, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◇ Industry News & Leadership
Smashing Security podcast #457: How a cybersecurity boss framed his own employee

When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the person put in charge of the investigation was the actual leaker... who promptly sent an inno…

Graham Cluley Read →
◇ Industry News & Leadership
They seized $4.8m in crypto… then gave the master key to the internet

South Korea's National Tax Service (NTS) has found itself in the middle of a deeply embarrassing - and costly - blunder after accidentally handing thieves the master key to a seized cryptocurrency wal…

Graham Cluley Read →
◇ Industry News & Leadership
Your staff are your biggest security risk: AI is making it worse

A new report claims that the cost of insider security incidents has surged 20% in two years, reaching an average of US $19.5 million per organization annually, with no sign that the alarming figure is…

Graham Cluley Read →
◇ Industry News & Leadership
Notorious ransomware gang allegedly blackmailed by fake FSB officer

There is a certain poetic justice in a cybersecurity-related story that has emerged from Moscow this week: A man has been accused of trying to extort money... from a notorious Russian ransomware gang.…

Graham Cluley Read →
◇ Industry News & Leadership
Smashing Security podcast #456: How to lose friends and DDoS people

When the mysterious operator of an internet archiving-service decided to silence a curious Finnish blogger, they didn’t just send a stroppy email - they allegedly weaponised their own CAPTCHA page to …

Graham Cluley Read →
◇ Industry News & Leadership
$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon

Amid a privacy backlash, a US $10,000 reward has been offered for anyone who can find a way to run Ring doorbell cameras locally, cutting off the flow of video data to Amazon's servers. Read more in m…

Graham Cluley Read →
◇ Industry News & Leadership
Spanish police say they have arrested hacker who booked luxury hotel rooms for just one cent

Spain's police force has announced that it has arrested a 20-year-old man who they claim managed to book luxury hotel rooms worth up to €1,000 a night for just one euro cent. Read more in my article o…

Graham Cluley Read →
◇ Industry News & Leadership
Smashing Security podcast #455: Face off: Meta’s Glasses and America’s internet kill switch

Could America turn off Europe's internet? That’s one of the questions that Graham and special guest James Ball will be exploring as they discuss tech sovereignty. Could Gmail, cloud services, and crit…

Graham Cluley Read →
◇ Industry News & Leadership
Dutch police arrest man for “hacking” after accidentally sending him confidential files

Police in The Netherlands say they have arrested a 40-year-old man on suspicion of hacking... after police officers accidentally sent him a link granting him access to their own confidential documents…

Graham Cluley Read →
◇ Industry News & Leadership
Urgent warnings from UK and US cyber agencies after Polish energy grid attack

A coordinated cyberattack that targeted Poland's energy infrastructure in late December 2025 has prompted cybersecurity agencies to issue urgent warnings to critical national infrastructure operators …

Graham Cluley Read →
◇ Industry News & Leadership
Polish hacker charged seven years after massive Morele.net data breach

A 29-year-old Polish man has been charged in connection with a data breach that exposed the personal details of around 2.5 million customers of the popular Polish e-commerce website Morele.net. Read m…

Graham Cluley Read →
◇ Industry News & Leadership
Smashing Security podcast #454: AI was not plotting humanity’s demise. Humans were

AI bots are having existential crises, inventing religions, and allegedly plotting against humanity... or so the internet would have you believe. We dig into Moltbook, the “AI-only” social network tha…

Graham Cluley Read →
◇ Industry News & Leadership
Fake Dubai Crown Prince tracked to Nigerian mansion after $2.5M romance scam

When a Romanian businesswoman fell for a fake Dubai Crown Prince in a $2.5 million romance scam, investigators tracked the fraudster to his Nigerian mansion - only to discover he was masquerading as a…

Graham Cluley Read →
◇ Industry News & Leadership
Incognito Market admin sentenced to 30 years for running $105 million dark web drug empire

He promised "the best security there is" to hundreds of thousands of drug buyers, while quietly making the kind of mistake that guaranteed a 30-year sentence. And maybe training police on cryptocurren…

Graham Cluley Read →
◇ Industry News & Leadership
Smashing Security podcast #453: The Epstein Files didn’t hide this hacker very well

Supposedly redacted Jeffrey Epstein files can still reveal exactly who they’re talking about - especially when AI, LinkedIn, and a few biographical breadcrumbs do the heavy lifting. Sloppy redaction l…

Graham Cluley Read →
◇ Industry News & Leadership
FBI takes notorious RAMP ransomware forum offline

The FBI has seized control of RAMP, a notorious cybercrime online forum that bragged to be the only place that allowed ransomware, and boasted over 14,000 active users. Now some of those users' detail…

Graham Cluley Read →
◇ Industry News & Leadership
NY Sets 'First-of-Nation' Cyber Mandates for Water Sector

Program Offers Up to $100K for Security Upgrades and $50K for Assessments New York is rolling out new cybersecurity regulations for water and wastewater utilities, requiring operators to conduct risk …

Data Breach Today Read →
◇ Industry News & Leadership
Beyond CVSS: OT Security Looks for Its Risk Methodology

Individual Vulnerability Severity Not Always a Good Measure of Risk Exposure A mainstay of IT security programs across the world, the Common Vulnerability Scoring System, may have terminal flaws when …

Data Breach Today Read →
◇ Industry News & Leadership
Health Sector Braces for Stryker Hack Supply Chain Shock

Medical Device Manufacturer Hack Was Likely Opportunistic An Iranian cyberattack on medical device maker Stryker's internal IT environment does not appear to affect connected products used by the comp…

Data Breach Today Read →
◇ Industry News & Leadership
OpenClaw Exposes Hidden Risks in Agentic AI

Attorney Jonathan Armstrong on Governance, Due Diligence and Shadow AI Risk The OpenClaw incident highlights how experimental agentic AI tools can create hidden security and compliance risks. Attorney…

Data Breach Today Read →
◇ Industry News & Leadership
Annual Report to Congress on Breaches of Unsecured Protected Health Information

The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Ne…

Data Breach Today Read →
◇ Industry News & Leadership
FFIEC Final Authentication Guidance

The Final FFIEC Guidance has been issued and its main intent is to reinforce the 2005 Guidance's risk management framework and update the Agencies' expectations regarding customer authentication, laye…

Data Breach Today Read →
◇ Industry News & Leadership
Accounting of Disclosures Under the HITECH Act

A notice of proposed rulemaking from the HHS Office for Civil Rights that would modify the HIPAA Privacy Rule standard for accounting of disclosures of protected health information and add new require…

Data Breach Today Read →
◇ Industry News & Leadership
ENISA: Software vulnerability prevention initiatives

The European Network and Information Security Agency, ENISA, has compiled a list of existing initiatives focused on finding and preventing software vulnerabilities.

Data Breach Today Read →
← Prev 204 / 216 Next →