top of page
Topics
Search


Google Unveils Private AI Compute: Cloud Power Meets On-Device Privacy
Google launches Private AI Compute, a new cloud platform that combines the power of Gemini AI models with on-device level privacy assurances, utilizing advanced hardware and security measures.


WhatsApp Malware 'Maverick' Hijacks Sessions to Target Brazil's Banks
Discover how the 'Maverick' malware is spreading via WhatsApp in Brazil, hijacking browser sessions and targeting major banks with sophisticated tactics.


BetterWorld Technology at Day 1 of the ISSA North America Show 2025
The first day of the ISSA North America Show 2025 delivered an engaging mix of practical insight, collaboration, and innovation. The event opened with a standout cybersecurity training session led by vCISO Brian Scott , designed to help small, medium, and large businesses strengthen their digital defenses against modern threats. Practical Cybersecurity for Every Organization The session focused on giving attendees the tools and frameworks needed to manage risk in real-world c


North Korean Hackers Exploit Google's Find Hub for Data Wiping Attacks on South Koreans
North Korean Konni hackers are exploiting Google's Find Hub and KakaoTalk to conduct data-wiping attacks and spread malware targeting South Koreans.


Android Malware 'Fantasy Hub' Exploits Telegram for Cybercrime
Learn about the Android Trojan 'Fantasy Hub' malware service that leverages Telegram as a central hub for hackers to conduct espionage and steal sensitive data.


BetterWorld Technology’s James Gorman Named a Top Global CISO for 2025
Reston, Virginia – November 10, 2025 – BetterWorld Technology proudly congratulates James Gorman , Chief Information Security Officer, on being named one of Cyber Defense Magazine’s Top Global CISOs for 2025 . The honor was presented during CyberDefenseCon 2025 , the premier gathering of global cybersecurity leaders and innovators. Each year, the award recognizes CISOs who set new standards in resilience, strategy, and leadership. Honorees are chosen for their ability to pro


Sophisticated ClickFix Phishing Campaign Exploits Hotel Systems, Targets Booking.com Users with PureRAT Malware
Discover how a sophisticated ClickFix phishing campaign is targeting hotel systems with PureRAT malware, impacting Booking.com users and leading to secondary attacks on guests.


Samsung Phones Compromised by LANDFALL Spyware Exploiting Zero-Day Flaw
Samsung Galaxy devices were targeted by LANDFALL spyware exploiting a zero-day vulnerability (CVE-2025-21042), enabling extensive data theft and surveillance in the Middle East.


BetterWorld Technology’s Christopher Jordan Named to CRN’s 2025 Next-Gen Solution Provider Leaders List
Chicago, IL – November 7, 2025 – BetterWorld Technology is proud to announce that Christopher Jordan, Regional Director , has been named one of CRN’s 2025 Next-Gen Solution Provider Leaders , an annual list that recognizes standout executives, managers, and directors under 40 who are already making a lasting impact on the IT channel. Now in its sixth year, the Next-Gen Solution Provider Leaders list highlights professionals who demonstrate strong leadership, innovation, and


Cyber Espionage Evolves: Hackers Weaponize Windows Hyper-V for Stealthy Malware Operations
Discover how the 'Curly COMrades' hacking group is weaponizing Windows Hyper-V to hide Linux VMs and custom malware, evading EDR detection and advancing cyber espionage tactics.


AI-Powered Malware 'PROMPTFLUX' Rewrites Its Code Hourly to Evade Detection
Google discovers PROMPTFLUX, a new malware that uses Gemini AI to rewrite its code hourly for enhanced evasion and persistence, signaling a new era of adaptive cyber threats.


Global Crackdown: €600 Million Crypto Fraud Ring Dismantled by European Authorities
European authorities have dismantled a €600 million crypto fraud network, arresting nine individuals and seizing significant assets in a coordinated global sweep.


US Cracks Down: 10 North Korean Entities Sanctioned for Crypto Laundering and IT Fraud
The U.S. Treasury Department has imposed sanctions on 10 North Korean entities and individuals for laundering over $12.7 million through cryptocurrency and IT fraud, funds believed to finance the regime's weapons programs.


BetterWorld Technology Named One of America’s Most Reliable Companies 2026 by Newsweek and Statista
Ranked #62 nationwide, BetterWorld Technology joins global leaders in trust, consistency, and customer satisfaction. Chicago, IL – November 5, 2025 – BetterWorld Technology, a national Managed Service Provider (MSP) delivering secure and dependable IT solutions, today announced its inclusion in Newsweek and Statista’s “America’s Most Reliable Companies 2026” list, ranking #62 nationwide among top U.S. organizations recognized for exceptional reliability, trust, and consis


Microsoft Teams Vulnerabilities Exposed: Impersonation and Message Tampering Risks Revealed
Discover how critical Microsoft Teams vulnerabilities allowed attackers to impersonate colleagues and edit messages unnoticed, undermining digital trust and enabling social engineering attacks.


Google's AI 'Big Sleep' Uncovers Five Critical Flaws in Apple's Safari WebKit
Google's AI 'Big Sleep' discovers five critical vulnerabilities in Apple's Safari WebKit, leading to prompt security patches from Apple across multiple operating systems and devices.


Android's AI Defenses Block 10 Billion Scams Monthly, Outpacing iPhone
Google's Android platform blocks over 10 billion scam messages and calls monthly, leveraging AI defenses that independent research suggests outperform iPhone's protection. Learn about the evolving scam tactics and how Android safeguards users.


Urgent Security Alert: CISA and NSA Issue Critical Guidance for WSUS and Microsoft Exchange Servers
CISA and NSA issue urgent guidance to secure on-premises Microsoft Exchange Servers and WSUS against active exploitation, detailing key security measures and recommendations.


AI Cloaking Attack Deceives AI Crawlers, Spreading Misinformation as Fact
Discover how a new AI cloaking attack tricks AI crawlers into citing fake information as verified facts, posing a significant threat to AI-driven content and misinformation.


PhantomRaven Malware Unleashed: 126 npm Packages Compromised, Stealing Developer Secrets
Discover how the PhantomRaven malware infected 126 npm packages, stealing GitHub tokens and developer secrets through advanced evasion techniques and AI exploitation.


Malicious npm Packages Caught Stealing Developer Credentials Across Multiple Operating Systems
Ten malicious npm packages have been discovered stealing developer credentials from Windows, Linux, and macOS systems by targeting system keyrings and browsers. Learn how the attack works and how to protect yourself.


Stealthy Russian Hackers Employ 'Living Off the Land' Tactics Against Ukrainian Organizations
Russian hackers are employing stealthy 'living off the land' tactics against Ukrainian organizations, using legitimate tools to steal data and maintain access.


Staying Audit-Ready: How Enterprise IT Teams Simplify Compliance with NIST & ISO
Enterprise IT teams are navigating an increasingly tangled web of regulatory standards and cybersecurity expectations. Maintaining compliance with NIST and ISO isn't just about passing audits. It's about building resilient, transparent systems that can withstand both regulatory scrutiny and real-world cyber threats. But how can organizations move from reactive compliance to a proactive, streamlined approach that reduces risk and improves visibility across the board? This arti


GhostCall and GhostHire: North Korea's BlueNoroff Targets C-Suite with New Malware Chains
Researchers expose BlueNoroff's new malware chains, GhostCall and GhostHire, which target C-suite executives and Web3 developers in the venture capital sector through advanced social engineering and multi-stage malware.
bottom of page






