
Threats

What are the top 10 spyware threats? | Definition from TechTarget
The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes. What is spyware? Spyware refers to malicious software purposely designed to access a computer and record its activity. Spyware can track and record a user’s…

OT/ICS cyber threats escalate as geopolitical conflicts intensify – Help Net Security
Ransomware attacks against industrial organizations surged by 87% over the past year, while new malware families designed specifically for OT environments emerged. These findings highlight a troubling trend: OT systems are increasingly becoming mainstream targets, and even sophisticated threat actors use relatively unsophisticated tactics to infiltrate and disrupt industrial operations. State-sponsored groups embed themselves in…

AI-Powered Social Engineering: Reinvented Threats
The foundations for social engineering attacks – manipulating humans – might not have changed much over the years. It’s the vectors – how these techniques are deployed – that are evolving. And like most industries these days, AI is accelerating its evolution. This article explores how these changes are impacting business, and how cybersecurity leaders…

Wultra Secures €3M to Protect Financial Institutions from Quantum Threats
Prague, Czech republic, January 15th, 2025, CyberNewsWire Quantum computing is set to revolutionize technology, but it also presents a significant security risk for financial institutions. Czech cybersecurity startup Wultra has raised €3 million from Tensor Ventures, Elevator Ventures, and J&T Ventures to accelerate the development of its post-quantum authentication technology, safeguarding banks and fintech against…

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe
Digital Security As detections of cryptostealers surge across Windows, Android and macOS, it’s time for a refresher on how to keep your bitcoin or other crypto safe 09 Jan 2025 • , 5 min. read Bitcoin is on a tear. For the first time in its history, the digital currency surpassed $100,000 in early December,…
![⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January] ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]](https://i3.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-GVBzJbXbnB628INcZeeGpxnFqxVpcaOaQnUH-g2FpiUGHCsUnPnPNYeuEKDvxOqHzeiB2fZWoNTOO81_P4b77zyyyuaSpWTBjahKirJJMtMXCEIvVUiqsIojlnyGL9pPkB8Dv5-wviS5poLJ_CIYdbkSxjPE4Psyh6mppkjg0M4rWF22fNSR9IgRUqwh/s728-rw-e365/recap.png?w=600&resize=600,400&ssl=1)
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]
Jan 13, 2025Ravie Lakshmanan The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad guys. From sneaky software bugs to advanced hacking tricks, the risks are real, but so are the ways to protect yourself. In this recap, we’ll break down what’s happening, why it matters, and what you…
![⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan] ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]](https://i2.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKokWQpcRQ55ARtaBLhn4X9RCRcf5u5YW7JaJaQrIrcU6A96dBP2IS5th1jhuZX0cQMO04KAMOZDxqEIcPdkAqGmkXMpHzV7L_CECca3FJ_ppgWQh9J0y8D02mSQbw-nzuf-FzDIN412s_F2AO-MGpfr95e-yMTzPjQqkl-WKo8jY1o6XMVvnF7bEmngEk/s728-rw-e365/recap.png?w=600&resize=600,400&ssl=1)
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
Jan 06, 2025Ravie Lakshmanan Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for attackers. The line between convenience and vulnerability has never been thinner….

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips
Dec 30, 2025Ravie LakshmananCybersecurity / Hacking News Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while defenders work hard to keep our data safe. Whether it’s a hidden flaw in popular software or a clever new attack method, staying informed is key to protecting…

Cybercrime Threats: Top 10 Countries Targeted In 2024
Overview Cyberattacks on a country’s critical infrastructure have become a growing malicious trend globally. The surge in cybercrime threats and its growing impact on national security, businesses, and individuals has led experts to closely examine which regions face the most cyberattacks. A recent study from the World Cybercrime Index (WCI) compiled by an international team…

Emerging Threats, Vulns to Prepare for in 2025
In 2024, we at Dark Reading covered a variety of attacks, exploits, and, of course, vulnerabilities across the board. Here, we recount 10 emerging threats organizations should be prepared for — as detailed by Dr. Jason Clark in “10 Emerging Vulnerabilities Every Enterprise Should Know,” a Dark Reading webinar — as they continuously rise and…