Information

This month in security with Tony Anscombe – April 2025 edition

From the near-demise of MITRE’s CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity 29 Apr 2025 The past month has seen no shortage of impactful and disconcerting cybersecurity news, including an eleventh-hour turnaround that averted the shutdown of MITRE’s CVE program to a report showing that AI outperforms red team experts in spearphishing. In this edition of the monthly roundup, ESET…

Read More

How safe and secure is your iPhone really?

Mobile Security Your iPhone isn’t necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors. Phil Muncaster 28 Apr 2025  •  , 6 min. read Chances are high that many people think, “it’s an iPhone, so I’m safe”. Apple’s control over its device and app ecosystem has indeed historically been tight, with its walled-garden approach providing fewer…

Read More

Deepfake ‘doctors’ take to TikTok to peddle bogus cures

Social Media Look out for AI-generated ‘TikDocs’ who exploit the public’s trust in the medical profession to drive sales of sketchy supplements 25 Apr 2025  •  , 3 min. read Once confined to research labs, generative AI is now available to anyone – including those with ill intentions, who use AI tools not to spark creativity, but to fuel deception instead. Deepfake technology, which can craft remarkably lifelike videos, images and audio, is increasingly becoming…

Read More

How fraudsters abuse Google Forms to spread scams

The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe. Phil Muncaster 23 Apr 2025  •  , 5 min. read When Google enters a particular market, it often means bad news for the incumbents. So it was with Google Forms, the tech giant’s form and quiz-building tool that launched in 2008. According to one estimate, it now has a market share of nearly 50%. However, with…

Read More

DOGE Worker’s Code Supports NLRB Whistleblower

A whistleblower at the National Labor Relations Board (NLRB) alleged last week that denizens of Elon Musk’s Department of Government Efficiency (DOGE) siphoned gigabytes of data from the agency’s sensitive case files in early March. The whistleblower said accounts created for DOGE at the NLRB downloaded three code repositories from GitHub. Further investigation into one of those code bundles shows it is remarkably similar to a program published in January 2025 by Marko Elez, a…

Read More

Will super-smart AI be attacking us anytime soon?

Digital Security What practical AI attacks exist today? “More than zero” is the answer – and they’re getting better. Cameron Camp 22 Apr 2025  •  , 3 min. read It was bound to happen – LLM tech gone rogue was bound to be brought to bear on innocent targets, after loitering along a grey area between good and evil, embodying the technological paradox where good, solid technology can be re-purposed for the nefarious. Here’s how…

Read More

Whistleblower: DOGE Siphoned NLRB Case Data

A security architect with the National Labor Relations Board (NLRB) alleges that employees from Elon Musk‘s Department of Government Efficiency (DOGE) transferred gigabytes of sensitive data from agency case files in early March, using short-lived accounts configured to leave few traces of network activity. The NLRB whistleblower said the unusual large data outflows coincided with multiple blocked login attempts from an Internet address in Russia that tried to use valid credentials for a newly-created DOGE…

Read More

This month in security with Tony Anscombe – February 2025 edition

Ransomware payments trending down, the cyber-resilience gap facing SMBs, and APT groups embracing generative AI – it’s a wrap on another month filled with impactful security news 26 Feb 2025 It’s no easy task to keep up with the constant stream of threats, scams, data breaches and other news impacting the threat landscape. Which is why we’ve done the heavy lifting again and rounded up some of the key cybersecurity stories that made the headlines…

Read More

Laurie Anderson: Building an ARK | Starmus highlights

WeLiveScience The pioneering multi-media artist reveals the creative process behind her stage show called ARK, which challenges audiences to reflect on some of the most pressing issues of our times Tomáš Foltýn 24 Feb 2025 The renowned performance artist Laurie Anderson reveals the creative process behind her piece of art called ARK. Inspired by the biblical tale of Noah’s Ark, the stage show fuses music, storytelling and visual art and challenges audiences to reflect on…

Read More

CapCut copycats are on the prowl

Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to attempt to steal their data or hijack their devices instead 17 Apr 2025  •  , 3 min. read The craze around generative AI tools isn’t just reshaping industries – it also provides fertile ground for cybercriminals, who are always quick to piggyback on the allure of the latest big thing in tech. So what if, instead of downloading an AI‑generated video from CapCut…

Read More