
Cybersecurity

Software supply chain security AI agents take action | TechTarget
Software supply chain security tools from multiple vendors moved from software vulnerability detection to proactive vulnerability fixes with new AI agents released this week. AI agents are autonomous software entities backed by large language models that can act on natural language prompts or event triggers within an environment, such as software pull requests. As…

How to Clear iPhone Storage
If your iPhone feels cramped and storage alerts show up like it’s on a schedule, it’s probably time for a cleanup. Below, we’ll go over easy ways to quickly free up space on iPhone – and talk a bit about storage management in general. These aren’t gimmicks; they’re time-tested methods and tricks that work for…

Sophos Annual Threat Report appendix: Most frequently encountered malware and abused software
This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and midsized businesses (SMBs). For a broader look at the threat landscape facing SMBs, see our main report. Appendix Contents: Most frequently-encountered malware types Small and midsized businesses face a vast set…

Attacks on the education sector are surging: How can cyber-defenders respond?
Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What’s the right antidote to cyber-risk? 14 Apr 2025 • , 5 min. read We all want the best possible education for our children. But even the best-laid plans can come unstuck when confronted with an agile, persistent and devious…

5 Major Concerns With Employees Using The Browser
As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However, unlike endpoints, browsers remain mostly unmonitored, despite being responsible for more than 70% of modern malware attacks. Keep Aware’s recent State of Browser Security report highlights major concerns security leaders face with employees using the web browser…

DOGE Siphoned NLRB Case Data – Krebs on Security
A security architect with the National Labor Relations Board (NLRB) alleges that employees from Elon Musk‘s Department of Government Efficiency (DOGE) transferred gigabytes of sensitive data from agency case files in early March, using short-lived accounts configured to leave few traces of network activity. The NLRB whistleblower said the unusual large data outflows coincided with…

Addressing the gaps in modern cloud protection: Using CNAPP to unify cloud security
As cloud-native architectures continue to evolve, so have the complexities of securing them. Traditional security approaches, often built around static infrastructure and perimeter defenses, struggle to keep pace with the speed and scale of modern cloud deployments. Enter cloud-native application protection platforms (CNAPPs), a term coined by Gartner® to describe an integrated security approach that…

How Do Hackers Steal Credit Card Information? | TechTarget
Cybersecurity has never been more critical given the exponential growth of e-commerce and online transactions. Hackers may attempt to invade our privacy in several ways, but one area they find particularly enticing is credit card information. Stolen credit cards can negatively affect not just your finances but your personal identity and privacy, too. Protecting them…

2025’s Top OSINT Tools: A Fresh Take on Open-Source Intel
Check out the top OSINT tools of 2025, an updated list featuring the best free and paid open-source intelligence tools for cybersecurity and investigations. At HackRead.com, we have a long-standing tradition of publishing comprehensive lists of the best OSINT tools to help cybersecurity professionals and enthusiasts stay ahead in the game. Every year, we research…

The UK’s phone theft crisis is a wake-up call for digital security – Help Net Security
Phone theft is now commonplace in London. The Met Police recently revealed that it seizes 1,000 stolen phones weekly as it cracks down on organized criminal networks driving the £50 million trade. Nationally, cases have doubled to 83,900 annually. The real issue, though, isn’t the losing of a phone – it’s what happens next. Thieves…