That prison sentence also covered Salmon’s years of grooming young girls on the internet. A summary of facts provided to NZME described a “modus operandi” of his previous offending where he would obtain intimate images and videos of the girls and then use them to continue sexualised conversations. After being released from prison in January...
Read More
When it comes to cyber crime, the numbers are stark: It currently costs the world $9.2 trillion On average, it takes a threat actor 72 minutes to gain access to user data, and that number is going down About 20% of data breaches today are as a result of insiders As the world’s largest security...
Read More
PHOENIX – Arizona lawmakers met today at the State Capitol to figure out how to improve group home regulations when it comes to missing Indigenous kids.  The conversation was centered around 14-year-old Emily Pike.  This was the start of a conversation to find out how exactly we got to this situation.  What they’re saying: The...
Read More
‘We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,” hackers from DragonForce wrote to M&S executives. Are they really from China? Or could they be Russian? Or even Malaysian? Researchers and police are trying to understand more about this aggressive...
Read More
Cynthia Kaiser, a former FBI executive, has been selected as the senior vice president of the Ransomware Research Center at Halcyon. Leading the Fight Against Ransomware The anti-ransomware platform provider said Tuesday that Kaiser will lead collaboration efforts with the federal and state government sectors. The former FBI cybersecurity leader will also be tasked with building relationships...
Read More
A critical heap-based buffer overflow vulnerability, tracked as CVE-2025-24993, has been discovered in the Windows New Technology File System (NTFS), posing a significant threat to millions of Windows users globally. The flaw, patched during Microsoft’s March 2025 Patch Tuesday, was actively exploited as a zero-day in the wild, prompting urgent advisories from both Microsoft and...
Read More
1. AI-Driven Attacks and Defenses Cybercriminals are leveraging generative AI to launch hyper-personalized phishing, bypass MFA, and automate lateral movement within networks. Meanwhile, defenders are deploying AI-powered monitoring and behavior-based anomaly detection to catch threats in real time. SecureFLO Insight: We help businesses implement AI-assisted threat detection and harden access governance before the breach window...
Read More
Artificial intelligence (AI) and small business tools are being abused as smokescreens to hit unsuspecting victims with ransomware. In the masquerade campaigns discovered by Cisco Talos, cybercriminals hid malware behind software and install packages that mimicked the websites or names of the lead monetization service Nova Leads, the enormously popular Chat GPT, and an AI-empowered...
Read More
Healthcare giant Kettering Health, which manages 14 medical centers in Ohio, confirmed that the Interlock ransomware group breached its network and stole data in a May cyberattack. Kettering Health operates over 120 outpatient facilities and employs over 15,000 people, including over 1,800 physicians. The healthcare network noted in a Thursday statement that its network devices...
Read More
The cybercrime police in Coimbatore have arrested a man hailing from Madhya Pradesh for cheating a woman from the city of ₹13 lakh in a courier scam. The arrested has been identified as Sandev Tiwari, 34, son of Santhosh Tiwari from Purana Bazar in Sagar District, Madhya Pradesh. He has been booked for offences under...
Read More
1 2 3 4 5
National Cyber Security

FREE
VIEW