‘MostereRAT’ Malware Blends In, Blocks Security Tools
A threat actor is using a sophisticated EDR-killing malware tool in a campaign to maintain long-term, persistent access on Windows […]
A threat actor is using a sophisticated EDR-killing malware tool in a campaign to maintain long-term, persistent access on Windows […]
The breach kickstarted a massive supply chain attack that led to the compromise of hundreds of Salesforce instances through stolen
The Digital Battlefield: How AI is Reshaping Cybersecurity and Fraud Prevention Crocodiles aren’t the only predators lurking in the shadows
Summary Welcome to another monthly round-up of monthly cyber attack and data breach news. At least 30 publicly disclosed incidents came to light in August 2025 across the finance, healthcare, telecoms, government, retail, education and technology sectors. Based on disclosures with usable figures, more than 17.3 million records were confirmed to have been breached this month. The actual figure is likely to be higher, given that several incidents did not release exact numbers but involved large datasets. Top three sources of breached data Top 5 incidents by number of records affected Bouygues Telecom (France) Salesforce supply-chain campaign (multiple victims) DaVita Inc.
The post Global Data Breaches and Cyber Attacks in August 2025: over 17.3 million records exposed appeared first on IT Governance Blog.
Summary Total number of incidents disclosed: 30 Total number of known breached records: over 17,300,000 Welcome to another monthly round-up of monthly cyber
Salesloft has revealed that the data breach linked to its Drift application started with the compromise of its GitHub account.
In this post, I will be talking about protecting business data when teams work from different locations. The transition to
Cybersecurity researchers have detailed a new sophisticated malware campaign that leverages paid ads on search engines like Google to deliver
Quantum computing is coming. When? No one knows for sure. Some experts say 10 years, others say 15 to 20
Organizations are seeking assistance to fix critical vulnerabilities. Solutions that orchestrate and automate network device protection put us on the