Cybersecurity is big business, especially since most businesses and governmental agencies rely on the internet for everything from record storage to operations. But as the internet grows, so do cyber threats that can destroy computers and digital devices like tablets and smartphones. They can trick people into giving away login information that impacts financing, work, email, and more. They can invade a company and steal confidential data or disrupt operations, which can lead to lost profits and legal jeopardy for both the business and its customers.
Cyber attacks continue to grow in complexity, including advanced techniques like stealth exfiltration and multi-stage campaigns. Staying aware of the latest cyber security news enables professionals to implement proactive solutions, like behavioral analytics and zero trust segmentation, that close security gaps before adversaries can exploit them.
As personal computers became more popular and widespread in the 1970s and 1980s, they caught the attention of hackers with not-so-great intentions. These black hat hackers were able to use their hacking skills to destroy records, access financial accounts, and extort businesses for massive sums of money. In response, white hat hackers sprang up, taking on the role of cybersecurity specialists to fight back against the nefarious activities of black hat hackers.
Windows command-line utility PsExec can be abused by threat actors to bypass detection and execute arbitrary commands, Cisco Talos reports. The flaw is tracked as CVE-2025-6264. It’s believed the vulnerability was leveraged in an attack targeting the City of Baltimore, which lost $1.5 million in fraudulent vendor payments.