Internet — Security Issues — November 23rd, 2025
Best Free VPN for 2025: Privacy Without Paying
While free VPNs can pose risks, using one of the best options can protect your privacy without costing anything.
November 23, 2025 — Source
Best password managers: 6 trustworthy options
If you're still using your dog's name to log in to your bank, you're courting disaster.
November 23, 2025 — Source
Homeland Security Is Reportedly Probing Bitcoin Mining Giant Bitmain for National Security Reasons
And there's an additional Trump family connection.
November 23, 2025 — Source
Iberia discloses customer data leak after vendor security breach
Spanish flag carrier Iberia has begun notifying customers of a data security incident stemming from a compromise at one of its suppliers.
November 23, 2025 — Source
Week in review: Stealth-patched FortiWeb vulnerability under active exploitation, Logitech data breach
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:
November 23, 2025 — Source
Internet — Security Issues — November 22nd, 2025
Best antivirus software 2025: These 8 apps keep your PC safe
You need more than just prayer and luck—choose from our top antivirus software picks to stay safe.
November 22, 2025 — Source
Best VPN for Travel: Stay Private on Public Wi-Fi and Unblock Regional Streaming Content on the Go
A VPN makes a great travel companion for fundamental privacy or streaming, and best of all, it won't take up any room in your checked bag or carry-on.
November 22, 2025 — Source
Chinese APT24 Deploys Custom Malware, New Stealthy Tactics
3-Year Espionage Campaign Targeted Taiwanese Firms
November 21, 2025 — Source or Source or Source
Cox Enterprises discloses Oracle E-Business Suite data breach
Cox Enterprises is notifying impacted individuals of a data breach that exposed their personal data to hackers who breached the company network after exploiting a zero-day flaw in Oracle E-Business Suite.
November 22, 2025 — Source
Piecing Together the Puzzle: A Qilin Ransomware Investigation
A big part of a security analyst's everyday role is figuring out what actually happened during an incident. We can do that by piecing together breadcrumbs--whether that's through logs, antivirus detections, and other clues--that help us understand how the attacker achieved initial access and what they did after.
November 22, 2025 — Source
Security Bite: Why I stopped using camera covers and you should too
Plastic webcam covers—especially of the sliding kind—boomed in popularity sometime in the 2010s as a low-tech way to keep hackers from eavesdropping on compromised machines. The concern felt justified at the time. But by 2020, Apple was beginning to issue warnings that those covers aren't actually needed and can even damage a MacBook's display.
November 21, 2025 — Source
This hacker conference installed a literal antivirus monitoring system
Organizers had a way for attendees to track CO2 levels throughout the venue—even before they arrived.
November 22, 2025 — Source
Internet — Security Issues — November 21st, 2025
AI Governance Risks Rise as Enterprises Scale Agents
Rubrik's Dev Rishi on Mounting Pressure to Adopt AI Amid Operational Risks
November 21, 2025 — Source or Source or Source or Source
Avast Makes AI-Driven Scam Defense Available for Free Worldwide
Driven by a commitment to make cutting-edge scam protection available to everyone, Avast, a leader in digital security and privacy and part of Gen, has unveiled Scam Guardian, a new AI-powered offering integrated into its award-winning Avast Free Antivirus.
November 21, 2025 — Source
Best Free Antivirus Software for Device Protection in 2025
Want to keep your devices safe? These tried-and-true free antivirus tools can protect your computer, phone and other devices -- without breaking the bank.
November 21, 2025 — Source
Chinese Cyberspies Deploy 'BadAudio' Malware via Supply Chain Attacks
APT24 has been relying on various techniques to drop the BadAudio downloader and then deploy additional payloads.
November 21, 2025 — Source
Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day
CVE-2025-61757 is an unauthenticated remote code execution vulnerability affecting Oracle Identity Manager.
November 21, 2025 — Source
CrowdStrike catches insider feeding information to hackers
American cybersecurity firm CrowdStrike has confirmed that an insider shared screenshots taken on internal systems with hackers after they were leaked on Telegram by the Scattered Lapsus$ Hunters threat actors.
November 21, 2025 — Source
CrowdStrike fires 'suspicious insider' who passed information to hackers
Cybersecurity giant CrowdStrike has confirmed firing a "suspicious insider" last month who allegedly fed information about the company to a notorious hacking group.
November 21, 2025 — Source
Cutting Through the Hype: A Guide to Decoding Exaggerated VPN Marketing Lingo
VPN ads often promise security and freedom from Big Brother, but marketing can be misleading.
November 21, 2025 — Source
Despite Chinese hacks, Trump's FCC votes to scrap cybersecurity rules for phone and internet companies
The Federal Communications Commission voted 2-1 along party lines on Thursday to scrap rules that required U.S. phone and internet giants to meet certain minimum cybersecurity requirements.
November 21, 2025 — Source
FCC rolls back cybersecurity rules for telcos, despite state-hacking risks
The Federal Communications Commission (FCC) has rolled back a previous ruling that required U.S. telecom carriers to implement stricter cybersecurity measures following the massive hack from the Chinese threat group known as Salt Typhoon.
November 21, 2025 — Source
Google says hackers stole data from 200 companies following Gainsight breach
Google has confirmed that hackers have stolen the Salesforce-stored data of more than 200 companies in a large-scale supply chain hack.
November 21, 2025 — Source
Grafana warns of max severity admin spoofing vulnerability
Grafana Labs is warning of a maximum severity vulnerability (CVE-2025-41115) in its Enterprise product that can be exploited to treat new users as administrators or for privilege escalation.
November 21, 2025 — Source
Hacker Is Selling Samsung Info — But It Isn't What You Think
A hacker is reportedly selling internal data from Samsung Medison, a medical equipment subsidiary, on a cybercrime forum. This breach does not affect Samsung Electronics or consumer products, so user data for phones and other devices remains safe.
November 21, 2025 — Source
Hardware Hackers Urge Vendor Engagement for Security Success
Experts Detail Upsides of Bug Bounties and Getting Devices Into Researchers' Hands
November 21, 2025 — Source or Source or Source or Source or Source
How Microsoft's new security agents help businesses stay a step ahead of AI-enabled hackersx
Copilot customers will find the agents embedded in their relevant security and management dashboards.
November 21, 2025 — Source
Impersonators are (still) targeting companies with fake TechCrunch outreach
A growing number of scammers are impersonating TechCrunch reporters and event leads and reaching out to companies, pretending to be our staff when they absolutely are not. These bad actors are using our name and reputation to try to dupe unsuspecting businesses. It drives us crazy and infuriates us on your behalf. It ebbs and flows. Judging by the increased number of emails we're receiving, asking, "Does this person really work for you?" it appears to be happening more actively at the moment.
November 21, 2025 — Source
In Other News: ATM Jackpotting, WhatsApp-NSO Lawsuit Continues, CISA Hiring
Other noteworthy stories that might have slipped under the radar: surge in Palo Alto Networks scanning, WEL Companies data breach impacts 120,000 people, AI second-order prompt injection attack.
November 21, 2025 — Source
Is That Medical Device Secure? Get It Right in the Contract
HSCC 'Model Contract' Calls for Shared Cyber Risks for Providers and Device Makers
November 21, 2025 — Source or Source or Source or Source
ISMG Editors: Inside the Staffing Crisis Crippling CISA
Also: Akira Ransomware Targets Healthcare, AI's Sycophancy Becomes a Security Risk
November 21, 2025 — Source or Source or Source or Source or Source
New Onapsis platform updates enhance visibility and protection across SAP landscapes
Onapsis introduced a series of new updates to its Onapsis Control product line, advancing security capabilities across SAP and cloud ERP application development environments. These enhancements include integration with SAP Continuous Integration and Delivery (CI/CD), expanded Git repository support to secure more code at rest, and strengthened workflow integration with SAP Transport Management System (TMS).
November 21, 2025 — Source
Salesforce Confirms New Breach Linked to Gainsight Apps
Salesforce is probing unusual activity in Gainsight apps that may have exposed customer data, while ShinyHunters claims a new OAuth-based attack.
November 21, 2025 — Source
'Scattered Spider' teens plead not guilty to UK transport hack
Two British teenagers have denied charges related to an investigation into the breach of Transport for London (TfL) in August 2024, which caused millions of pounds in damage and exposed customer data.
November 21, 2025 — Source
SEC Ends SolarWinds Suit After Major Legal Setbacks
Federal securities regulators abandoned their remaining charges against SolarWinds and its chief information security officer, ending a high-profile lawsuit that accused the company of masking cybersecurity weaknesses ahead of a far-reaching Russian cyberattack.
November 21, 2025 — Source or Source or Source or Source
WhatsApp API Could Bulk Leak User Telephone Numbers
Researchers Were Able to Query 3.5 Billion Accounts
November 21, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — November 20th, 2025
$5M Settlement in Geisinger Health, Nuance Insider Breach
Class Action Litigation and Criminal Case Focus on Actions of an Ex-Tech Worker
November 20, 2025 — Source or Source or Source or Source or Source
AI is providing emotional support for employees, but is it a valuable tool or privacy threat?
As artificial intelligence tools like ChatGPT become an increasingly popular avenue for people seeking personal therapy and emotional support, the dangers that this can present—especially for young people—have made plenty of headlines. What hasn't received as much attention is employers using generative AI to assess workers' psychological well-being and provide emotional support in the workplace.
November 20, 2025 — Source
Critics Say White House's Draft AI Order Is a Power Grab
Leaked Executive Order Would Strip States of Power to Regulate AI Tech Firms
November 20, 2025 — Source or Source or Source or Source or Source
Crypto mixer founders sent to prison for laundering over $237 million
The founders of the Samourai Wallet (Samourai) cryptocurrency mixing service have been sent to prison for helping criminals launder over $237 million.
November 20, 2025 — Source
D-Link warns of new RCE flaws in end-of-life DIR-878 routers
D-Link is warning of three remotely exploitable command execution vulnerabilities that affect all models and hardware revisions of its DIR-878 router, which has reached end-of-service but is still available in several markets.
November 20, 2025 — Source
Defending AI, Securing OT: Fortinet's Strategy for Modern Cyber Risk
Fortinet's Rashish Pandey on Security Leadership, Regulation and IT-OT Convergence
November 20, 2025 — Source or Source
Do You Really Need a VPN for Public Wi-Fi? Does It Make Me Truly Anonymous?
A virtual private network hides your internet traffic, but not your tracks entirely.
November 20, 2025 — Doppel Raises $70 Million at $600 Million Valuation
The AI-native social engineering defense (SED) platform will accelerate product innovation and expand its offerings.
November 20, 2025 — Source
Doordash data breach exposes names, addresses, phone numbers, and more
A Doordash data breach has exposed the personal data of an unspecified number of customers, including name, phone number, email address, and physical address.
November 20, 2025 — Source
Doppel Raises $70 Million at $600 Million Valuation
The AI-native social engineering defense (SED) platform will accelerate product innovation and expand its offerings.
November 20, 2025 — Source
Education boards left gates wide open for PowerSchool mega-breach, say watchdogs
Privacy cops say attack wasn't just bad luck but a result of sloppy homework
November 20, 2025 — Source
ENISA Is Now a CVE Program Root
European Cybersecurity Agency Can Assign CVE IDs and Publish CVE Records
November 20, 2025 — Source or Source or Source or Source or Source
Evasive Sturnus Malware Can Take Full Control Of Infected Android Devices
Security researchers at Threat Fabric have discovered new malware targeting Android devices, which is still "in a development or limited testing phase." However, even in its current form it's still incredibly potent, enabling attackers to take complete control of a victim's device including obtaining access to encrypted messages.
November 20, 2025 — Source
Fired techie admits sabotaging ex-employer, causing $862K in damage
PowerShell script locked thousands of workers out of their accounts
November 20, 2025 — Source
Free VoIP Speed Testing: How to Evaluate Call Quality on Your Network
Learn different ways to conduct a VoIP speed test at no cost, plus our best tips for making the most of your results.
November 20, 2025 — Source
Google exposes BadAudio malware used in APT24 espionage campaigns
China-linked APT24 hackers have been using a previously undocumented malware called BadAudio in a three-year espionage campaign that recently switched to more sophisticated attack methods.
November 20, 2025 — Source
Half of security teams struggling to cope with volume of vulnerabilities
As the number of CVEs continues to rise, a new study finds 46 percent of respondents say that the volume of vulnerabilities has placed additional strain on their security teams' resources impacting not only organizational security but also staff well being.
November 20, 2025 — Source
ID-Pal upgrades ID-Detect, delivering protection against deepfakes and synthetic IDs
ID-Pal has announced a major enhancement to its document-fraud detection feature, ID-Detect, delivering even more powerful defences against AI-generated digital manipulation—one of the fastest-growing threats facing financially regulated enterprises and payments providers.
November 20, 2025 — Source
Internet Providers Can Monitor Their Own Cybersecurity Standards, Says Trump's FCC
In what the Electronic Frontier Foundation calls a "terrible idea," the Federal Communications Commission has rescinded the requirement for telecom companies to issue yearly cybersecurity reports.
November 20, 2025 — Source
MacOS DigitStealer malware poses as DynamicLake, targets Apple Silicon M2/M3 devices
A new infostealer is targeting macOS users by masquerading as the legitimate DynamicLake UI enhancement and productivity utility and possibly Google's Drive for desktop app.
November 20, 2025 — Source
Minimus debuts Image Creator for building secure, hardened container images
Minimus announced the general availability of Image Creator, a new feature that empowers customers to build their own hardened container images, fully powered and secured by Minimus' container security software and software supply chain security technology.
November 20, 2025 — Source
Multi-threat Android malware Sturnus steals Signal, WhatsApp messages
A new Android banking trojan named Sturnus can capture communication from end-to-end encrypted messaging platforms like Signal, WhatsApp, and Telegram, as well as take complete control of the device.
November 20, 2025 — Source
New SonicWall SonicOS flaw allows hackers to crash firewalls
American cybersecurity company SonicWall urged customers today to patch a high-severity SonicOS SSLVPN security flaw that can allow attackers to crash vulnerable firewalls.
November 20, 2025 — Source
Oligo delivers runtime-native security for models and agents
Oligo Security announced new capabilities to protect the broadest spectrum of AI deployments, including AI applications, LLMs, and agentic AI. The new platform modules address the largest blind spot in AI security by securing production AI technologies that remain largely ungoverned, unmonitored, and operating in real time.
November 20, 2025 — Source
Over 50,000 Asus Routers Hacked in 'Operation WrtHug'
A Chinese threat actor is exploiting known vulnerabilities in discontinued Asus devices in an Operational Relay Box (ORB) facilitation campaign.
November 20, 2025 — Source
Palo Alto kit sees massive surge in malicious activity amid mystery traffic flood
GlobalProtect login endpoints targeted, sparking concern that something bigger may be brewing
November 20, 2025 — Source
Recent 7-Zip Vulnerability Exploited in Attacks
A proof-of-concept (PoC) exploit targeting the high-severity remote code execution (RCE) bug exists.
November 20, 2025 — Source
Russian Hacking Suspect Wanted by the FBI Arrested on Thai Resort Island
Thailand's Cyber Crime Investigation Bureau said an FBI tip that the "world-class hacker" was traveling to Thailand led to his arrest in Phuket.
November 20, 2025 — Source
Salesforce investigates customer data theft via Gainsight breach
Salesforce says it revoked refresh tokens linked to Gainsight-published applications while investigating a new wave of data theft attacks targeting customers.
November 20, 2025 — Source or Source
Security gap in Perplexity's Comet browser exposed users to system-level attacks
There is a serious security problem inside Comet, the AI-powered agentic browser made by Perplexity, SquareX researchers say: Comet's MCP API allows the browser's built-in (but hidden from the user) extensions to issue commands directly to a user's device, and the capability can be leveraged by attackers.
November 20, 2025 — Source
ShinyHunters Hack Salesforce Instances Via Gainsight Apps
Salesforce Revoked Gainsight Authentication Tokens
November 20, 2025 — Source or Source or Source or Source or Source
Turn your Windows 11 migration into a security opportunity
Not all versions of Windows were created equal, at least not according to Windows users. Windows XP was a legendary operating system that Microsoft found hard to replace. It didn't help that XP's successor, Windows Vista, was basically an Edsel-level bust.
November 20, 2025 — Source
Two-factor security? Nah, let's do 30-factor instead
Now wink a lot.
November 20, 2025 — Source
US and Allies Sanction Russian Bulletproof Hosting Service Providers
Media Land, Hypercore, and their leadership and employees are allegedly connected to various cybercriminal activities.
November 20, 2025 — Source
Vulnerability Allowed Scraping of 3.5 Billion WhatsApp Accounts
Researchers demonstrated a now-patched vulnerability that could have been used to enumerate all WhatsApp accounts.
November 20, 2025 — Source
Watch out for this clever and dangerous new 'Apple Support' hoax
Phishing attack uses authentic Apple alerts and messages in order to seem legitimate.
November 20, 2025 — Source
WhatsApp flaw let researchers scrape 3.5 billion phone numbers, photos, and statuses
Researchers called out inadequate protections; Meta insists no messages were compromised
November 20, 2025 — Source
Why a 'health-based approach' to cybersecurity makes sense
With a holistic and adaptive cyber resilience plan, Renown Health aligns information security and technology innovations to the organization's strategic pillars, its CISO says.
November 20, 2025 — Source
X wants to call you out for using a VPN (and maybe catch a few trolls, too)
A weapon against trolls, or a privacy disaster?
November 20, 2025 — Source
Internet — Security Issues — November 14th, 2025
A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
A suspected (but currently unidentified) zero-day vulnerability in Fortinet FortiWeb is being exploited by unauthenticated attackers to create new admin accounts on vulnerable, internet-facing devices.
November 14, 2025 — Source
Akira Ransomware Group Made $244 Million in Ransom Proceeds
Akira was seen exploiting SonicWall vulnerabilities and encrypting Nutanix Acropolis Hypervisor (AHV) VM disk files this year.
November 14, 2025 — Source
Checkout.com snubs hackers after data breach, to donate ransom instead
UK financial technology company Checkout announced that the ShinyHunters threat group has breached one of its legacy cloud storage systems and is now extorting the company for a ransom.
November 14, 2025 — Source
CISA flags imminent threat as Akira ransomware starts hitting Nutanix AHV
Advisory updated as leading cybercrime crew opens up its target pool
November 14, 2025 — Source
Don't commit to a VPN that lacks these 6 important features
Unpacking what makes a good VPN!
November 14, 2025 — Source
DoorDash Says Relax, Data Breach Only Exposed Names, Phones, Emails & Addresses
Food delivery giant DoorDash has once again come under negative limelight, this time with a massive data breach stemming from a sophisticated social engineering attack that targeted one of its employees in October. The incident allowed an unauthorized third party to gain access to and exfiltrate key contact information belonging to a mix of consumers, delivery drivers ("Dashers"), and merchants across its operating regions, including the U.S., Canada, Australia, and New Zealand.
November 14, 2025 — Source
FBI flags scam targeting Chinese speakers with bogus surgery bills
Crooks spoof US insurers, threaten bogus extradition to pry loose personal data and cash
November 14, 2025 — Source
Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks
Fortinet has confirmed that it has silently patched a critical zero-day vulnerability in its FortiWeb web application firewall, which is now "massively exploited in the wild."
November 14, 2025 — Source
German court rules Google must pay €572M for violating antitrust rules in price comparison sector
A German court has found that Google has abused its dominant market position in the price comparison sector and ruled that the company must pay a total of €572 million ($665.6 million) in damages to two German price comparison companies, according to a report by Reuters.
November 14, 2025 — Source
Meta must rein in scammers — or face consequences
If the company won't remove obvious scam ads, regulators need to step in.
November 14, 2025 — Source
Report blasts UK Ministry of Defence over Afghan data-handling failures
Public Accounts Committee tears into department responsible for the most dangerous breach in British history
November 14, 2025 — Source
The best password managers: Make remembering your password a breeze with vaults that do it for you
Are you tired of remembering all of your online credentials? The right password manager takes on this task for you. We've tested and ranked the best password manager apps of 2025.
November 14, 2025 — Source
The best VPN for Windows: Tighten up your online security without sacrificing speed
These Windows VPNs will help mask your online activities and enhance your personal security. These are my favorite VPN picks for the Windows operating system this year.
November 14, 2025 — Source
The Scariest Online Threats in 2025, and How to Protect Your Privacy
Internet crooks have smarter tools now, but common sense still beats artificial intelligence.
November 14, 2025 — Source
US announces new strike force targeting Chinese crypto scammers
U.S. federal authorities have established a new task force to disrupt Chinese cryptocurrency scam networks that defraud Americans of nearly $10 billion annually.
November 14, 2025 — Source
You may be owed up to $7,500 from the AT&T data breach settlement
Submit a claim before December 18
November 14, 2025 — Source
Internet — Security Issues — November 13th, 2025
1Password Simplifies Access With New Unlock Setting
1Password today announced a redesigned unlock system for Mac and Windows that allows the app to open automatically when a user unlocks their devic
November 13, 2025 — Source
1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium
An individual believed to have been involved in the operation of VenomRAT was arrested recently in Greece.
November 13, 2025 — Source
2B email addresses and 1.3B passwords compromised in multiple data breaches
Some 2 billion email addresses and 1.3 billion passwords have been compromised in a series of data breaches highlighted by a cybersecurity company.
November 13, 2025 — Source
ChatGPT Vulnerability Exposed Underlying Cloud Infrastructure
A researcher found a way to exploit an SSRF vulnerability related to custom GPTs to obtain an Azure access token.
November 13, 2025 — Source
CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks
Federal agencies have reported as 'patched' ASA or FTD devices running software versions vulnerable to attacks.
November 13, 2025 — Source
CISA warns feds to fully patch actively exploited Cisco flaws
CISA warned U.S. federal agencies to fully patch two actively exploited vulnerabilities in Cisco Adaptive Security Appliances (ASA) and Firepower devices.
November 13, 2025 — Source
CISA warns of WatchGuard firewall flaw exploited in attacks
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has warned government agencies to patch an actively exploited vulnerability impacting WatchGuard Firebox firewalls.
November 13, 2025 — Source
CISA, FBI and Partners Unveil Critical Guidance to Protect Against Akira Ransomware Threat
Provides: New Insights to Combat Ransomware Threats across Multiple Business Sectors and Critical Infrastructure
November 13, 2025 — Source
Critical WatchGuard Firebox Vulnerability Exploited in Attacks
Tracked as CVE-2025-9242 (CVSS score of 9.3), the flaw leads to unauthenticated, remote code execution on vulnerable firewalls.
November 13, 2025 — Source
Extra, extra, read all about it: Washington Post clobbered in Clop caper
Nearly 10,000 staff and contractors warned after attackers raided newspaper's Oracle EBS setup
November 13, 2025 — Source
Google Sues China-Based 'Lighthouse' Phishing Service After $1B+ Scams Target Millions
Google Sues China-Based 'Lighthouse' Phishing Service After $1B+ Scams Target Millions
November 13, 2025 — Source
Google to pay millions to South African news outlets: Watchdog
Google will pay more than $40 million to support South African news media, many of them floundering in a digital age, the country's competition authority said Thursday.
November 13, 2025 — Source
Kerberoasting in 2025: How to protect your service accounts
Kerberoasting attacks remain an enduring headache for IT professionals, allowing hackers to escalate privileges and reach the highest levels of your Active Directory (AD) environment. But by enforcing robust passwords, encryption, and cybersecurity policies, you can disrupt the criminals before they even begin.
November 13, 2025 — Source
NHS supplier ends probe into ransomware attack that contributed to patient death
Synnovis's 18-month forensic review of Qilin intrusion completed, now affected patients to be notified
November 13, 2025 — Source
Nokod Security launches Adaptive Agent Security to protect AI agents across the entire ADLC
Nokod Security announced the launch of Adaptive Agent Security, a solution that delivers real-time visibility, governance, and protection from threats across the Agent Development Lifecycle (ADLC).
November 13, 2025 — Source
"Patched" but still exposed: US federal agencies must remediate Cisco flaws (again)
CISA has ordered US federal agencies to fully address two actively exploited vulnerabilities (CVE-2025-20333, CVE-2025-20362) in Cisco Adaptive Security Appliances (ASA) and Firepower firewalls.
November 13, 2025 — Source
Popular Android-based photo frames download malware on boot
Uhale Android-based digital picture frames come with multiple critical security vulnerabilities and some of them download and execute malware at boot time.
November 13, 2025 — Source
Rhadamanthys infostealer operation disrupted by law enforcement
The rumors were true: Operation Endgame, a joint effort between law enforcement and judicial authorities of several European countries, Australia, Canada, the UK and the US, has disrupted the infrastructure supporting the operation of the Rhadamanthys infostealer.
November 13, 2025 — Source
Rhadamanthys malware admin rattled as cops seize a thousand-plus servers
International cops have pulled apart the Rhadamanthys infostealer operation, seizing 1,025 servers tied to the malware in coordinated raids between November 10-13.
November 13, 2025 — Source
Synnovis Confirms Patient Information Stolen in Disruptive Ransomware Attack
The ransomware attack on the pathology services provider disrupted operations at several London hospitals.
November 13, 2025 — Source
Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm
The spam campaign is likely orchestrated by an Indonesian threat actor, based on code comments and the packages' random names.
November 13, 2025 — Source
TrojAI Defend for MCP brings real-time security, visibility, and policy enforcement to agentic AI
TrojAI has launched its new AI runtime defense solution for agentic AI workflows, TrojAI Defend for MCP. Model Context Protocol (MCP) is an open protocol that allows AI agents to connect with external data, tools, and services in a standardized way enabling AI innovation at a rapid pace. TrojAI Defend for MCP was built to monitor traffic to and from MCP servers, providing unified visibility, policy analysis, and runtime enforcement across agents and MCP gateways.
November 13, 2025 — Source
UK Cyber Defense Laws Aim to Bolster NHS and Energy Infrastructure
Cyber Security and Resilience Bill represents a fundamental shift in how it defends its digital backbone against attacks now costing the nation nearly £15 billion annually.
November 13, 2025 — Source
Washington Post data breach impacts nearly 10K employees, contractors
The Washington Post is notifying nearly 10,000 employees and contractors that some of their personal and financial data has been exposed in the Oracle data theft attack.
November 13, 2025 — Source
Internet — Security Issues — November 9th, 2025
Best VPN for Windows PCs 2025: Browse the Web, Torrent, Stream and Game Privately
The best VPNs for Windows PCs let you browse the web, stream videos from services like Netflix, game and download torrents in private.
November 9, 2025 — Source
Dangerous runC flaws could allow hackers to escape Docker containers
Three newly disclosed vulnerabilities in the runC container runtime used in Docker and Kubernetes could be exploited to bypass isolation restrictions and get access to the host system.
November 9, 2025 — Source
Laid-off Intel employee allegedly steals 'Top Secret' files, then disappears — ex-engineer downloaded 18,000 files before vanishing
The ex-employee took a treasure trove of data with him after Intel let him go.
November 9, 2025 — Source
NAKIVO Introduces v11.1 with Upgraded Disaster Recovery and MSP Features
NAKIVO, a global leader in backup, ransomware protection and disaster recovery across virtual, physical, cloud, NAS and SaaS environments, has officially introduced NAKIVO Backup & Replication v11.1.
November 9, 2025 — Source
Internet — Security Issues — November 8th, 2025
Redis Critical Remote Code Execution Vulnerability Discovered after 13 Years
Redis recently released a security advisory regarding CVE-2025-49844. This critical (CVSS 10.0) use-after-free (UAF) vulnerability in Lua scripting could allow authenticated attackers to execute remote code on older versions of Redis and Valkey with Lua scripting enabled. Developers are urged to upgrade to patched releases as soon as possible.
November 8, 2025 — Source
Who's watching the watchers? This Mozilla fellow, and her Surveillance Watch map
Esra'a Al Shafei spoke with The Reg about the spy tech 'global trade'
November 8, 2025 — Source
Internet — Security Issues — November 7th, 2025
5 reasons why your internet is running slow
How to diagnose a slow connection!
November 7, 2025 — Source
7 CIS Experts' 2026 Cybersecurity Predictions
Elimination of federal funding for the Multi-State Information Sharing and Analysis Center® (MS-ISAC®) ... cyber threat actors (CTAs') ongoing use of artificial intelligence (AI) ... the AWS outage in October
November 7, 2025 — Source
18 Arrested in Crackdown on Credit Card Fraud Rings
Between 2016 and 2021, the suspects defrauded 4.3 million cardholders in 193 countries of €300 million (~$346 million).
November 7, 2025 — Source
A New Type of AI Malware Threatens Smart Homes, But These Security Habits Can Help
The rise of promptware means cybercriminals have new ways to hack smart homes. New security methods are required to fight back.
November 7, 2025 — Source
Attackers upgrade ClickFix with tricks used by online stores
Attackers have taken the ClickFix technique further, with pages borrowing tricks from online sellers to pressure victims into performing the steps that will lead to a malware infection.
November 7, 2025 — Source
Bank of England says JLR's cyberattack contributed to UK's unexpectedly slower GDP growth
This kind of material economic impact from online crooks thought to be a UK-first
November 7, 2025 — Source
Beware the 'Hi, how are you?' text. It's a scam - here's how it works
Americans lost $3.5 billion to investment scams in early 2025. Here's how to avoid becoming the next victim.
November 7, 2025 — Source
Bill Seeks HIPAA-Like Protections for Consumer Health Data
Proposed legislation by U.S. Sen. Bill Cassidy, R-La., a physician and chair of the high-profile Senate health committee, aims to create parallel HIPAA-like privacy protections to many more types of health information - such as data collected by consumer wearable devices and health apps - that are not currently covered under HIPAA and the HITECH Act.
November 7, 2025 — Source or Source or Source or Source
CBO Hit by Suspected Nation-State Cyberattack
Nation-State Actor Suspected in Breach of Congressional Budget Office
November 7, 2025 — Source
Chrome 142 Update Patches High-Severity Flaws
An out-of-bounds write flaw in WebGPU tracked as CVE-2025-12725 could be exploited for remote code execution.
November 7, 2025 — Source
Cisco: Actively exploited firewall flaws now abused for DoS attacks
Cisco warned this week that two vulnerabilities, which have been used in zero-day attacks, are now being exploited to force ASA and FTD firewalls into reboot loops.
November 7, 2025 — Source
ClickFix Attacks Against macOS Users Evolving
ClickFix prompts typically contain instructions for Windows users, but now they are tailored for macOS and they are getting increasingly convincing.
November 7, 2025 — Source
Commercial spyware "Landfall" ran rampant on Samsung phones for almost a year
Targeted attack could steal all of a phone's data and activate camera or mic.
November 7, 2025 — Source
Congressional Budget Office confirms it was hacked
Caitlin Emma, a spokesperson for CBO, told TechCrunch on Friday that the agency is investigating the breach and "has identified the security incident, has taken immediate action to contain it, and has implemented additional monitoring and new security controls to further protect the agency's systems going forward."
November 7, 2025 — Source
Crowdstrike: AI Accelerating Ransomware Attacks Across Europe
CrowdStrike's 2025 report reveals how AI is accelerating ransomware attacks and reshaping Europe's cyber threat landscape.
November 7, 2025 — Source
Data Exposure Vulnerability Found in Deep Learning Tool Keras
The vulnerability is tracked as CVE-2025-12058 and it can be exploited for arbitrary file loading and conducting SSRF attacks.
November 7, 2025 — Source
Destructive Russian Cyberattacks on Ukraine Expand to Grain Sector
Multiple state-sponsored Russian groups are targeting Ukrainian entities and European countries linked to Ukraine.
November 7, 2025 — Source
For OT Cyber Defenders, Lack of Data Is the Biggest Threat
OT Security 'a Generation Behind Traditional IT'
November 7, 2025 — Source or Source or Source or Source
Former OnlyFans CEO's next app is coming — and it allows topless pics
The future of social media is 18+, Ami Gan said.
November 7, 2025 — Source
Free tool fixes Windows 10 ESU registration issues and restores Microsoft security updates
Microsoft officially ended support for Windows 10 last month, leaving most systems without regular updates. For users in the European Union, the European Economic Area, and Switzerland, the software giant offers free Windows 10 ESU (Extended Security Updates) patches to keep PCs protected. Unfortunately, for many who qualify, the ESU registration option doesn't appear in Windows Update.
November 7, 2025 — Source
How to trade your $214,000 cybersecurity job for a jail cell
Ransomware doesn't pay what it used to.
November 7, 2025 — Source
ID verification laws are fueling the next wave of breaches
The cybersecurity community has long lived by a simple principle: Don't collect more data than you can protect. But ID laws and other legal mandates now force many organizations to store massive amounts of sensitive data, putting them in the precarious situation of dealing with information they don't necessarily want but have to safeguard.
November 7, 2025 — Source
In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests
Other noteworthy stories that might have slipped under the radar: rogue ransomware negotiators charged, F5 hack prompts OT security guidance, Germany targets Huawei tech.
November 7, 2025 — Source
Incogni review: The set-it-and-forget-it online privacy solution
Your secret weapon in the fight against data brokers.
November 7, 2025 — Source
Infostealers are making this old security practice new again
Like with carpenter jeans, I'm surprised this practice is relevant again.
November 7, 2025 — Source
ISMG Editors: Lawsuits Follow Year's Top Health Data Breach
Conduent Gets Sued; US Government's Cyber Shutdown Woes; Hacktivist Hits Rise
November 7, 2025 — Source
It's nearly 2026 and most people still use '123456' as a password
Check out the top 100 horrors
November 7, 2025 — Source
Landfall Android Spyware Targeted Samsung Phones via Zero-Day
Threat actors exploited CVE-2025-21042 to deliver malware via specially crafted images to users in the Middle East.
November 7, 2025 — Source or Source
Microsoft shares Windows 10 extended security updates requirements and activation IDs
Last month Windows 10 support ended as Microsoft released the final Patch Tuesday update under KB5066791. Alongside that, the company also published information on how users can proceed if they want to keep using their system in a supported state, ie, continue receiving regular OS security updates outside of the Defender updates.
November 7, 2025 — Source
Millions Of Online Accounts Are At Risk: This Study Names The Worst Passwords Of 2025
There's still about seven and a half weeks remaining in 2025, but a new study already has a beat on the worst passwords of the year, with the most awful of the bunch appearing more than 7.6 million times in various data breaches. Suffice to say, if you're using any of the passwords on the extensive list, you should change it immediately.
November 7, 2025 — Source
Moonlock review: We put MacPaw's new antivirus suite to work
MacPaw brings an antiviral/anti-malware utility into its own, even if the UI could use a bit of polish.
November 7, 2025 — Source
New LandFall spyware exploited Samsung zero-day via WhatsApp messages
A threat actor exploited a zero-day vulnerability in Samsung's Android image processing library to deploy a previously unknown spyware called 'LandFall' using malicious images sent over WhatsApp.
November 7, 2025 — Source
Online Job Scams Creating News Risks for Corporate Networks
It's Time for Enterprises to Manage Risks Posed by Compromised Personal Devices
November 7, 2025 — Source or Source or Source or Source
Ping Identity Boosts Frontline Staff Access With Keyless Buy
Keyless's Biometric Tech to Improve Privacy, Account Recovery and User Experience
November 7, 2025 — Source or Source or Source or Source
Radical Empowerment From Your Leadership: Understood by Few, Essential for All
When leaders redefine power as trust instead of control, teams unlock their potential — and organizations find their edge.
November 7, 2025 — Source
Samsung Zero-Day Flaw Exploited by 'Landfall' Spyware
Spyware Targets Samsung Galaxy Devices, Says Unit 42
November 7, 2025 — Source or Source or Source or Source
Scam centers in southeast Asia are on the rise despite crackdowns to root out the illegal industry
It often starts with a text message asking if you are available on weekends, looking for a part-time job or you get a simple "hello" from an unknown number. Halfway across the world, a laborer is usually pulling in 12-16 hour days, sending non-stop messages, hoping someone will take the bait.
November 7, 2025 — Source
Seattle security startup Oleria lands $19M in latest funding round
Oleria, a Seattle-based cybersecurity startup that manages employee access to applications and data, raised $19 million in a new round of funding.
November 7, 2025 — Source
The Congressional Budget Office Was Hacked. It Says It Has Implemented New Security Measures
The Congressional Budget Office confirmed it had been hacked, potentially disclosing important government data to malicious actors.
November 7, 2025 — Source
The FBI Is Trying to Unmask the Registrar Behind Archive.Today
The popular archiving website is being targeted for investigation.
November 7, 2025 — Source
US Authorities Consider Ban on DJI Drones Over Security Risks
The US FCC has gained the power to ban the sale and import of goods previously allowed in the region. The ban can only be carried out if the brand or manufacturer is designated as a national security risk. Thankfully, the existing owners of the products are not at risk of having their devices confiscated.
November 7, 2025 — Source
Warning! Don't open these WhatsApp images, else you'll get hacked
WhatsApp scammers are using malicious images to trick users. Don't fall for it and don't open any messages that fit this scam!
November 7, 2025 — Source
Washington Post confirms data breach linked to Oracle hacks
The Washington Post has said that it was one of the victims of a hacking campaign tied to Oracle's suite of corporate software apps.
November 7, 2025 — Source
Workload Identities: Bridging Infrastructure and Application Security
Replace static secrets with verifiable workload identities to close security gaps and build a stronger zero-trust foundation.
November 7, 2025 — Source
Internet — Security Issues — November 6th, 2025
AI-Slop ransomware test sneaks on to VS Code marketplace
A malicious extension with basic ransomware capabilities seemingly created with the help of AI, has been published on Microsoft's official VS Code marketplace.
November 6, 2025 — Source
Aptori Code-Q delivers verified, explainable fixes that integrate into development workflows
Aptori announced Code-Q (Code Quick Fix), a new agent in its AI-powered security platform that automatically generates, validates and applies code-level remediations for confirmed vulnerabilities.
November 6, 2025 — Source
Automotive IT Firm Hyundai AutoEver Discloses Data Breach
Hyundai AutoEver America was hacked in February and the attackers managed to steal SSNs and other personal data.
November 6, 2025 — Source
Best free password managers 2025: Online security doesn't have to cost a thing
Shore up your defenses, stat.
November 6, 2025 — Source
Breach Roundup: UPenn Hit by Email Breach
Also, Australian Police Arrest 55 in New Round of Anom App Sting
November 6, 2025 — Source or Source or Source or Source
Cisco Patches Critical Vulnerabilities in Contact Center Appliance
The flaws allow attackers to execute arbitrary code remotely and elevate their privileges to root on an affected system.
November 6, 2025 — Source
CISO budgets increase with identity and data protection top priorities
A new study from RSAC finds most CISOs' budgets increased between 2024 and 2025 and their top areas of investment for 2025-2026 are identity and data protection.
November 6, 2025 — Source
ClickFix malware attacks evolve with multi-OS support, video tutorials
ClickFix attacks have evolved to feature videos that guide victims through the self-infection process, a timer to pressure targets into taking risky actions, and automatic detection of the operating system to provide the correct commands.
November 6, 2025 — Source
Continuous Purple Teaming: Turning Red-Blue Rivalry into Real Defense
In many organizations, red and blue teams still work in silos, usually pitted against each other, with the offense priding itself on breaking in and the defense doing what they can to hold the line.
November 6, 2025 — Source
Cryptohack Roundup: Europol Busts 600M Euro Fraud Network
Also: SBF Appeals Conviction, PHP Exploits Fuel Cryptomining
November 6, 2025 — Source or Source or Source or Source
CybercrimeDeFi Protocol Balancer Starts Recovering Funds Stolen in $128 Million Heist
Hackers drained more cryptocurrency from Balancer by exploiting a rounding function and performing batch swaps.
November 6, 2025 — Source
EFF Teams Up With AV Comparatives to Test Android Stalkerware Detection by Major Antivirus Apps
EFF partnered with AV Comparatives to test Android antivirus apps' detection of stalkerware in 2025, finding mixed results with Malwarebytes showing 100% detection.
November 6, 2025 — Source
FBI Accuses Fired White Hat Hacking Pros Of Carrying Out Illegal Cyberattacks On US Companies
It's like something out of a contemporary spy novel: Two cybersecurity professionals that worked to help businesses fend off hackers have now been accused of being cybercriminals themselves. The FBI and federal prosecutors allege that two cybersecurity firms' former employees took part in a yearlong conspiracy to hack and extort multiple U.S. companies for millions of dollars in total.
November 6, 2025 — Source
European Police Dismantle €600M Crypto Fraud Network
European authorities have arrested nine suspects accused of laundering through fake crypto investment platforms.
November 6, 2025 — Source
Federally Qualified Health Center Reports Ransomware Breach
Central Jersey Medical Center Runs Health Centers for Schools in Newark
November 6, 2025 — Source or Source or Source or Source
Follow Pragmatic Interventions to Keep Agentic AI in Check
Agentic AI speeds operations, but requires clear goals, least privilege, auditability, red‑teaming, and human oversight to manage opacity, misalignment, and misuse.
November 6, 2025 — Source
Google Flags AI Malware Surge As Hackers Use LLMs To Mutate Code On-The-Fly
The industry-wide effort to AI all the things isn't without its seedy side. Namely, we're quickly entering an era of more sophisticated malware strains evading common antivirus protections, with threat actors taking advantage of powerful large language models (LLMs) that pose evolving threats, Google Threat Intelligence Group (GTIG) warns in a new security report.
November 6, 2025 — Source or Source
Google flags new wave of online scams fueled by AI fakes and holiday hustles
Scammers are getting smarter, and Google's new report shows how they're doing it.
November 6, 2025 — Source
Gootloader malware back for the attack, serves up ransomware
Move fast - miscreants compromised a domain controller in 17 hours
November 6, 2025 — Source
How a ransomware gang encrypted Nevada government's systems
The State of Nevada has published an after-action report detailing how hackers breached its systems to deploy ransomware in August, and the actions taken to recover from the attack.
November 6, 2025 — Source
Hypori Secure Workspace Ecosystem helps IT teams protect enterprise data
Hypori announced the expansion of its platform with the launch of the Hypori Secure Workspace Ecosystem, a suite of next-generation products designed to give organizations flexibility, scalability, and control over secure mobile access.
November 6, 2025 — Source
Italian political consultant says he was targeted with Paragon spyware
Francesco Nicodemo, a consultant who works with left-wing politicians in Italy, has gone public as the latest person targeted with Paragon spyware in the country.
November 6, 2025 — Source
Longer Conversations Can Break AI Safety Filters
Adversarial Success Rates Jump Tenfold in Longer AI Chats, Finds Cisco
November 6, 2025 — Source or Source or Source or Source or Source
Louvre heist reveals museum used 'LOUVRE' as password for its video surveillance, still has workstations with Windows 2000 - glaring security weaknesses revealed in previous report
It's like using your name as your password.
November 6, 2025 — Source
MajorKey IDProof+ combats AI-driven fraud
MajorKey Technologies announced IDProof+, a high-assurance identity verification solution leveraging biometric technology. Developed in collaboration with identity verification innovator authID, IDProof+ is designed to help enterprises combat AI-driven fraud and streamline remote workforce onboarding.
November 6, 2025 — Source
Malware-pwned laptop gifts cybercriminals Nikkei's Slack
Stolen creds let miscreants waltz into 17K employees' chats, spilling info on staff and partners
November 6, 2025 — Source
Meta earns about $7 billion a year on scam ads, report says
Yikes. That's a lot of ads for counterfeit Sildenafil and online casinos.
November 6, 2025 — Source
Nevada Ransomware Attack Started Months Before It Was Discovered, Per Report
The ransomware attack discovered in August occurred as early as May when a state employee mistakenly downloaded malicious software.
November 6, 2025 — Source
Over 1 billion passwords and emails leaked: How to see if you're affected
Have I Been Pwned just acquired a huge collection of unique email addresses and passwords that have been leaked and/or stolen.
November 6, 2025 — Source
Ping Identity offers protection against adversarial AI threats
As organizations embrace agentic AI to boost productivity and commerce, Ping Identity is redefining how enterprises enable this new class of autonomous digital identities, delivering visibility, access control, governance, and privilege oversight to build trust into every interaction. Identity for AI will help enterprises engage the agentic commerce channel, secure the autonomous workforce, and protect against adversarial AI threats.
November 6, 2025 — Source
Prowler embeds AI directly into security workflows
Prowler launched Prowler Lighthouse AI, an intelligent security assistant and MCP Server, that brings autonomous AI directly into DevSecOps workflows.
November 6, 2025 — Source
Report: Nevada State Hackers Evaded Detection for Months
Statewide Breach Hit 60 Agencies Before Ransomware Was Deployed
November 6, 2025 — Source or Source or Source or Source or Source or Source or Source
Russia-linked hackers intensify attacks as global APT activity shifts
State-aligned hacking groups have spent the past six months ramping up espionage, sabotage, and cybercrime campaigns across multiple regions, according to ESET's APT Activity Report covering April through September 2025. The research highlights how operations linked to Russia, China, Iran, and North Korea have evolved in scope and technique, showing that nation-state activity remains a constant source of disruption.
November 6, 2025 — Source
Russia's Destructive Wiper Attacks on Ukraine Rise Again
Nation-State Teams Tied to Grain Sector Targeting, Plus More Joined-Up Operations
November 6, 2025 — Source
Sandworm hackers use data wipers to disrupt Ukraine's grain sector
Russian state-backed hacker group Sandworm has deployed multiple data-wiping malware families in attacks targeting Ukraine's education, government, and the grain sector, the country's main revenue source.
November 6, 2025 — Source
SonicWall fingers state-backed cyber crew for September firewall breach
Spies, not crooks, were behind digital heist -- damage stopped at the backups, says US cybersec biz
November 6, 2025 — Source or Source
State-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack
The threat actor stole the firewall configuration files of all SonicWall customers who used the cloud backup service.
November 6, 2025 — Source
Team Cymru RADAR investigates external infrastructure in real time
Team Cymru announced RADAR, a new real-time discovery module designed to give threat analysts visibility into all internet-facing infrastructure, whether known or unknown, without waiting on asset inventories, third-party scans, or compliance-oriented tools.
November 6, 2025 — Source
Truffle Security Raises $25 Million for Secret Scanning Engine
The investment will fuel the development of Truffle's enterprise-grade secrets detection, verification, and remediation platform.
November 6, 2025 — Source
Why Microsegmentation Is Just a Dream for Many IT Teams
Audit Issues, Policy Debt and Limited Project Scope Are Hampering Adoption
November 6, 2025 — Source
Wipers from Russia's most cut-throat hackers rain destruction on Ukraine
Sandworm and other Russian-state hackers unleash data-destroying payloads on their neighbors.
November 6, 2025 — Source
You'll never guess what the most common passwords are. Oh, wait, yes you will
Most of you still can't do better than 123456?
November 6, 2025 — Source
Internet — Security Issues — November 5th, 2025
2 Ex-Cyber Specialists Indicted for Alleged BlackCat Attacks
DOJ: Suspects Hit 5 Firms, Including 3 in Healthcare, Netted $1.3M in Ransom Money
November 5, 2025 — Source or Source or Source or Source or Source
18 arrested in €300 million global credit card fraud scheme
A coordinated international operation has led to 18 arrests in a massive credit card fraud case worth at least €300 million. The effort, led by Eurojust, targeted a network of suspects accused of running fake online subscription services for dating, pornography, and streaming sites. Among those detained were five executives from four German payment service providers.
November 5, 2025 — Source
81 percent of security teams lack visibility into AI coding
While AI adoption is now nearly universal, governance and visibility have failed to keep pace, according to a new report from Cycode.
November 5, 2025 — Source
82 percent of finserv organizations suffered a data breach in the last year
A new report, based on a global survey of 250 decision makers at large financial services organizations of over 5,000 employees, shows that 82 percent have suffered a data breach via cyberattack, or a data leak, an unintentional exposure of sensitive data, in the past year.
November 5, 2025 — Source
AI makes holiday shopping scams harder to spot
As we approach the busiest time of the year for online shopping, scammers and phisherfolk are also preparing for a seasonal bonanza. 1Password has surveyed 2,000 American adults to learn how people are protecting themselves -- or not -- from phishing scams.
November 5, 2025 — Source
AI SOC Agents Slash Alert Response Time, Study Shows
Cloud Security Alliance's Troy Leach on How AI Helps SOC Analysts Move 61% Faster
November 5, 2025 — Source or Source or Source or Source or Source
AMD red-faced over random-number bug that kills cryptographic security
Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way
November 5, 2025 — Source
Anna's Archive now accounts for 5% of all URLs reported to Google for takedown
The piracy website, Anna's Archive, has achieved a pretty interesting goal. It only came onto the scene three years ago, but because of its success in the book piracy scene, publishers have been sending an enormous amount of takedown requests to Google to make it harder to find books on the website.
November 5, 2025 — Source
Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation
Armis recently surpassed $300 million in annual recurring revenue as it prepares for an IPO.
November 5, 2025 — Source
Australia adds Reddit and Kick to social media platforms banning children under 16
Australia has added message board Reddit and livestreaming service Kick to its list of social media platforms that must ban children younger than 16 from holding accounts.
November 5, 2025 — Source
Barracuda Assistant accelerates security operations
Barracuda Networks launched Barracuda Assistant, powered by Barracuda AI. Integrated into the BarracudaONE cybersecurity platform, Barracuda Assistant accelerates security operations to help organizations strengthen cyber resilience and drive productivity and ROI.
November 5, 2025 — Source
CISA warns of critical CentOS Web Panel bug exploited in attacks
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is warning that threat actors are exploiting a critical remote command execution flaw in CentOS Web Panel (CWP).
November 5, 2025 — Source
CleanStart SBOM Analyzer strengthens software supply chain security
CleanStart has released its SBOM Analyzer, an add-on tool that generates complete, CISA-compliant Software Bills of Materials (SBOMs) for container images. The tool deepens visibility into software components and dependencies, helping organizations secure their supply chains before deployment.
November 5, 2025 — Source
ConductorOne Raises $79 Million in Series B Funding
Leveraging AI, ConductorOne's platform secures and manages millions of human, non-human, and AI identities.
November 5, 2025 — Source
Cops Cuff 18 Suspects Over $345M Credit Card Fraud Scheme
German Payment Processor Insiders Accused of Laundering Fake Subscription Proceeds
November 5, 2025 — Source or Source or Source
Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
On Tuesday, CISA added two vulnerabilities to its Known Exploited Vulnerabilities catalog: CVE-2025-11371, which affects Gladinet's CentreStack and Triofox file-sharing and remote access platforms, and CVE-2025-48703, a vulnerability in Control Web Panel (CWP), a web hosting control panel designed for managing servers running CentOS or CentOS-based distributions.
November 5, 2025 — Source
Cyber theory versus practice: Are you navigating with faulty instruments?
Picture this: you're at the helm of a sophisticated avionics suite, trusting every gauge and blinking light. Your flight plan is impeccable, air traffic control is on call, and your co‑pilot follows every procedure.
November 5, 2025 — Source
Daylight Raises $33 Million for AI-Powered MDR Platform
The funding will fuel the development of Daylight's security operations platform and the launch of new protection modules.
November 5, 2025 — Source
Deepwatch NEXA platform transforms MDR collaboration with agentic AI
Deepwatch has released Deepwatch NEXA, a collaborative agentic AI ecosystem that delivers outcome-focused agents to transform how MDR providers and customers work together. NEXA combines natural language interaction with agentic AI to provide real-time visibility, context, and actionable insights across the entire security lifecycle. This enables MDR providers and customers to detect, investigate, and respond to threats faster while shifting from reactive defense to proactive, business-aligned protection.
November 5, 2025 — Source
Did your logins just get leaked? How to check online for free (and what to do next)
Have I Been Pwned adds biggest trove of breaches, and no, Gmail wasn't hacked
November 5, 2025 — Source
Experts warn AI tools are fueling a rise in scams targeting older adults
Experts are warning that the rapid development and growing availability of artificial intelligence tools is leading to an alarming rise in cybercrimes targeting older adults. Since technology alone cannot stop social engineering, specialists suggest that seniors learn to recognize the recurring scam patterns that criminals have used for decades to steal money and personal data.
November 5, 2025 — Source
Exploited 'Post SMTP' Plugin Flaw Exposes WordPress Sites to Takeover
The critical vulnerability allows attackers to read arbitrary emails, including password reset messages.
November 5, 2025 — Source
Flare Raises $30 Million for Threat Exposure Management Platform
The company plans to advance its identity exposure management capabilities and pursue M&A opportunities.
November 5, 2025 — Source
Fortinet launches Secure AI Data Center to protect AI infrastructures end-to-end
Fortinet announced the Secure AI Data Center solution, an end-to-end framework purpose-built to protect AI infrastructures. Designed to secure the entire AI stack, from data center infrastructure to applications and LLMs, the solution delivers advanced AI threat defense with ultra-low latency and reduces power consumption on average by 69% compared to traditional approaches.
November 5, 2025 — Source
Google uncovers malware using LLMs to operate and evade detection
PromptLock, the AI-powered proof-of-concept ransomware developed by researchers at NYU Tandon and initially mistaken for an active threat by ESET, is no longer an isolated example: Google's latest report shows attackers are now creating and deploying other malware that leverages LLMs to operate and evade security systems.
November 5, 2025 — Source
Google warns of new AI-powered malware families deployed in the wild
Google's Threat Intelligence Group (GTIG) has identified a major shift this year, with adversaries leveraging artificial intelligence to deploy new malware families that integrate large language models (LLMs) during execution.
November 5, 2025 — Source
Have I Been Pwned adds biggest trove of breaches, and no, Gmail wasn't hacked
Have I Been Pwned, the website that lets you know if your data was involved in any breaches, has processed and indexed the largest corpus of breached data in its history. The batch is known as the Synthient Credential Stuffing Threat Data. It features almost two billion email addresses and 1.3 billion passwords, 625 million of which have never been seen by HIBP before.
November 5, 2025 — Source
Here's what the redesigned Google Photos and Maps icons look like
The company's bringing similar changes made to its AI and the "G" logo to more apps.
November 5, 2025 — Source
Hyundai AutoEver America data breach exposes SSNs, drivers licenses
Hyundai AutoEver America is notifying individuals that hackers breached the company's IT environment and gained access to personal information.
November 5, 2025 — Source
Immigration Database Pressed by DHS Into Voter Verification
DHS Plans to Expand SAVE Database Use to Raise Privacy, Accuracy, Security Concerns
November 5, 2025 — Source or Source or Source or Source
Implementing runtime security for the cloud [Q&A]
Cloud-native platforms are built for speed with ephemeral workloads, rapid deployments, and plenty of third-party app dependencies.
October 31, 2025 — Source
In Other News: WhatsApp Passkey-Encrypted Backups, Russia Targets Meduza Malware, New Mastercard Solution
Other noteworthy stories that might have slipped under the radar: several interesting Android malware families, UN cybercrime treaty, criminal complaint against Clearview AI in Europe.
October 31, 2025 — Source
Jamf to Go Private Following $2.2 Billion Acquisition by Francisco Partners
The private equity firm will purchase the outstanding shares of Jamf common stock for $13 per share in an all-cash transaction.
October 31, 2025 — Source
Japan Issues OT Security Guidance for Semiconductor Factories
The 130-page document covers several important aspects and it's available in both Japanese and English.
October 31, 2025 — Source
Keeping Revenue Forecasts From Becoming Legal Liabilities
Why the Fortinet Earnings Case Is a Cautionary Tale for the Cybersecurity Sector
October 31, 2025 — Source or Source or Source or Source or Source
Layered Defences are Key to Combating AI-Driven Cyber Threats, CNCF Report Finds
The Cloud Native Computing Foundation has published an analysis of modern cybersecurity practices, finding that attacks using Artificial Intelligence are now a significant threat. The report highlights the criticality for organisations to adopt multi-layered defence strategies as artificial intelligence transforms both the threat landscape and the protective measures available to businesses.
October 31, 2025 — Source
New Threads Tools Let You Approve and Filter Replies
Threads gets a new Reply Approval tool, which allows you to choose which replies appear publicly on your posts before anyone else can see them. This will allow you to keep the discussion on topic. Then there's also an option to filter replies from people you follow, or those that include mentions.
October 31, 2025 — Source
Open VSX Downplays Impact From GlassWorm Campaign
Open VSX fully contained the GlassWorm attacks and says it was not a self-replicating worm in the traditional sense.
October 31, 2025 — Source
Pornhub records big drop in UK traffic thanks to Online Safety Act
Earlier this year, the UK put into effect the Online Safety Act to protect children from online harms, including pornographic content. Now, Pornhub claims that its site's traffic is down 77% compared to July when the OSA was brought in. According to data from Ofcom, visits to porn sites in general in the UK have fallen by almost a third in the three months since the law came into effect.
October 31, 2025 — Source
Proton VPN Promises Major Improvements in Its Fall and Winter Updates
The popular VPN service says it's adding new free server locations and a fresh VPN architecture.
October 31, 2025 — Source
Ransomware gang runs ads for Microsoft Teams to pwn victims
You click and think you're getting a download page, but get malware instead
October 31, 2025 — Source
Searchlight Cyber Buys Intangic to Help Quantify Cyber Risk
European Startup Acquisition Aims to Unify Technical and Financial Cyber Insights
October 31, 2025 — Source or Source or Source or Source or Source
Surfshark versus Proton VPN: Two of the Best VPNs Compared
Both VPNs are well-rounded, but offer different privacy selling points. Your choice will depend on whether you want critical privacy protections or innovative features.
October 31, 2025 — Source
Ukrainian extradited from Ireland on Conti ransomware charges
A Ukrainian national believed to be a member of the Conti ransomware operation has been extradited to the United States and faces charges that could get him 25 years in prison.
October 31, 2025 — Source
Ukrainian Man Extradited From Ireland to US Over Conti Ransomware Charges
Oleksii Oleksiyovych Lytvynenko is now in the US after being held in custody in Ireland since 2023.
October 31, 2025 — Source
Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
A Windows vulnerability (CVE-2025-9491, aka ZDI-CAN-25373) that state-sponsored threat actors and cybercrime groups have been quietly leveraging since at least 2017 continues to be exploited for attacks.
October 31, 2025 — Source
'We got hacked' emails threaten to leak University of Pennsylvania data
The University of Pennsylvania suffered a cybersecurity incident on Friday, where students and alumni received a series of offensive emails from various University email addresses, claiming that data was stolen in a breach.
October 31, 2025 — Source
Windows zero-day actively exploited to spy on European diplomats
A China-linked hacking group is exploiting a Windows zero-day in attacks targeting European diplomats in Hungary, Belgium, and other European nations.
October 31, 2025 — Source
Why password controls still matter in cybersecurity
In January 2024, Russian hackers broke into Microsoft's systems by slipping past what many believed was an ironclad security setup. The attack proved that even with multiple layers of protection, passwords often remain the weakest link in network security.
October 31, 2025 — Source
WordPress Anti-Malware Plugin Flaw Exposes 100K Sites To An Alarming Security Threat
A new threat in is the wild affecting sites that run WordPress, a popular content management system. Wordfence, a company that focuses on security research in the WordPress ecosystem, is reporting that a vulnerability is affecting the Anti-Malware Security and Brute-Force Firewall plugin that's currently deployed on over 100,000 websites.
October 31, 2025 — Source
IT Failure Starts With Silence, Not Systems
Former DoE CIO Ann Dunkin on the Lack of Communication, Engagement in IT Projects
November 5, 2025 — Source
Komodor's self-healing capabilities remediate issues with or without a human in the loop
Komodor released autonomous self-healing and cost optimization capabilities that simplify operations for SRE, DevOps, and Platform teams managing large-scale Kubernetes environments.
November 5, 2025 — Source
M&S pegs cyberattack cleanup costs at £136M as profits slump
Retailer's tech systems aren't down anymore, but the same can't be said for its rocky financials
November 5, 2025 — Source
Malanta Emerges From Stealth With $10 Million Seed Funding
Why people don't demand data privacy, even as governments and corporations collect more personal information
November 5, 2025 — Source
Malware Developers Test AI for Adaptive Code Generation
Google Details How Attackers Could Use LLMs to Mutate Scripts
November 5, 2025 — Source or Source or Source or Source or Source
Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns
Google has released a report describing the novel ways in which malware has been using AI to adapt and evade detection.
November 5, 2025 — Source
New ExtraHop capabilities target malicious PowerShell use across enterprise environments
ExtraHop has announced new capabilities to detect the malicious use of PowerShell. These enhancements provide the visibility needed to disrupt the attack kill chain and deliver insight to stop lateral movement in its tracks.
November 5, 2025 — Source
Nikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack
The Japanese media giant says compromised Slack credentials were used to steal employee and business partner information.
November 5, 2025 — Source
Over 42 Million Malicious Android Apps Downloaded from Google Play — Here's What You Need to Know
Google spokesperson reached out with a statement regarding this report. Here's what the company has to say: "User protection against these identified malware versions was already in place through Google Play Protect prior to this report. Based on our current detection, no apps containing these versions of this malware are found on Google Play. We're constantly enhancing our protections to help keep users safe from bad actors."
November 5, 2025 — Source
Police busts credit card fraud rings with 4.3 million victims
International authorities have dismantled three massive credit card fraud and money laundering networks, linked to losses exceeding €300 million ($344 million) and affecting over 4.3 million cardholders across 193 countries.
November 5, 2025 — Source
Portal26 Raises $9 Million for Gen-AI Adoption Platform
The gen-AI adoption management platform will invest the funds in accelerating growth and product innovations.
November 5, 2025 — Source
r/Im14andthisisbanned: Australia Adds Reddit to No-Go List for Kids
The country will also prevent under-16s from using Kick.
November 5, 2025 — Source
SonicWall says state-sponsored hackers behind September security breach
SonicWall's investigation into the September security breach that exposed customers' firewall configuration backup files concludes that state-sponsored hackers were behind the attack.
November 5, 2025 — Source
Starting Over in Cybersecurity: Advice I Wish I'd Had
Learn the Business, Be Intentional, Find a Mentor and Build Non-Technical Skills
November 5, 2025 — Source or Source or Source or Source
University of Pennsylvania confirms data stolen in cyberattack
The University of Pennsylvania has confirmed that a hacker breached numerous internal systems related to the university's development and alumni activities and stole data in a cyberattack.
November 5, 2025 — Source
University of Pennsylvania confirms hacker stole data during cyberattack
The University of Pennsylvania confirmed on Tuesday that a hacker stole university data as part of last week's data breach, during which alumni and other affiliates received suspicious emails from official university email addresses.
November 5, 2025 — Source
Unpatched Windows Flaw a Boon for Nation-State Hackers
Chinese Hackers Target European Diplomats With LNK File Flaw
November 5, 2025 — Source or Source
US sanctions North Korean bankers linked to cybercrime, IT worker fraud
The U.S. Treasury Department imposed sanctions on two North Korean financial institutions and eight individuals involved in laundering cryptocurrency stolen in cybercrime and fraudulent IT worker schemes.
November 5, 2025 — Source
What factors determine the severity and outcomes of cyberwarfare between countries?
https://techxplore.com/news/2025-11-factors-severity-outcomes-cyberwarfare-countries.html#:~:text=Cyberwarfare%20between%20nation%20states%20has%20become%20increasingly%20common%20in%20recent%20years.%20To%20address%20several%20important%20questions%20that%20this%20phenomenon%20raises%2C%20scientists%20developed%20a%20game%20theoretical%20model%20of%20cyberwarfare%20between%20nations.
November 5, 2025 — Source
Why people don't demand data privacy, even as governments and corporations collect more personal information
Despite widespread concern about data privacy, most individuals feel powerless to influence how their information is used, leading to passive acceptance of data collection by governments and corporations. This sense of helplessness, termed data disaffection, is reinforced by inadequate regulations, convoluted consent processes, and cultural narratives that portray data misuse as inevitable.
November 5, 2025 — Source
Internet — Security Issues — October 31st, 2025
AI blew open software security, now OpenAI wants to fix it with an agent called Aardvark
AI promises to find bugs and gaps in your apps
October 31, 2025 — Source
Alleged Meduza Stealer malware admins arrested after hacking Russian org
The Russian authorities have arrested three individuals in Moscow who are believed to be the creators and operators of the Meduza Stealer information-stealing malware.
October 31, 2025 — Source
Attackers dig up $11M in Garden Finance crypto exploit
Bitcoin bridge biz offers 10 percent reward to attackers if they play nice
October 31, 2025 — Source
Australia warns of BadCandy infections on unpatched Cisco devices
The Australian government is warning about ongoing cyberattacks against unpatched Cisco IOS XE devices in the country to infect routers with the BadCandy webshell.
October 31, 2025 — Source
Building Cyber Resilience Across Canada's Skies
NAV Canada CISO Tom Bornais on Keeping IT and OT Systems Running
October 31, 2025 — Source or Source or Source or Source or Source
Canada Warns of Cyberattacks Targeting Industrial Control Systems
Hackers breached Canadian water, energy, and farm systems, prompting national warnings to secure industrial control networks.
October 31, 2025 — Source
Chainguard Banks $280M for Global Open-Source Security Play
Non-Dilutive Funding From General Catalyst Supports Global Go-to-Market Push
October 31, 2025 — Source or Source or Source or Source or Source
Chinese APT Exploits Unpatched Windows Flaw in Recent Attacks
The Windows shortcut vulnerability has been seen in attacks conducted by Mustang Panda to drop the PlugX malware.
October 31, 2025 — Source
CISA Adds Exploited XWiki, VMware Flaws to KEV Catalog
Broadcom has updated its advisory on CVE-2025-41244 to mention the vulnerability's in-the-wild exploitation.
October 31, 2025 — Source
CISA and partners take action as Microsoft Exchange security risks mount
In partnership with international cybersecurity agencies, the US Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) outlined security best practices for organizations that use on-premises versions of Microsoft Exchange Server.
October 31, 2025 — Source
CISA: High-severity Linux flaw now exploited by ransomware gangs
CISA confirmed on Thursday that a high-severity privilege escalation flaw in the Linux kernel is now being exploited in ransomware attacks.
October 31, 2025 — Source
CISA: High-severity Linux flaw now exploited by ransomware gangs
CISA confirmed on Thursday that a high-severity privilege escalation flaw in the Linux kernel is now being exploited in ransomware attacks.
October 31, 2025 — Source
Court Finalizes HCA Data Breach Class Action Settlement
Multimillion Dollar Deal Resolves 27 Lawsuits After 2023 Email Storage Hack
October 31, 2025 — Source or Source or Source or Source or Source
Denmark Withdraws Chat Control Proposal Amid Controversy
Denmark Concedes Domestic and International Opposition Against Client Scanning
October 31, 2025 — Source or Source or Source or Source
ExpressVPN review: A premium service worth every penny
Top-of-the-line features and renowned privacy makes it one of the best.
October 31, 2025 — Source
FCC to rescind ruling that said ISPs are required to secure their networks
FCC chair to rely on ISPs' voluntary commitments instead of Biden-era ruling.
October 31, 2025 — Source
Government hackers breached telecom giant Ribbon for months before getting caught
U.S. telecommunications giant Ribbon has confirmed that government-backed hackers had access to its network for almost a year before getting caught, according to a public filing.
October 31, 2025 — Source
Hackers threaten to leak data after breaching University of Pennsylvania to send mass emails
On Friday morning, University of Pennsylvania alumni, students, staff, and community affiliates received several emails from hackers purporting to represent the university's Graduate School of Education (GSE).
October 31, 2025 — Source or Source
How to Fix Decades of Technical Debt
Global Tech Debt Impedes Growth as AI, Cloud and Legacy Systems Collide
October 31, 2025 — Source or Source or Source or Source or Source
ImmuniWeb Continuous now enables always-on, AI-powered security testing
ImmuniWeb has unveiled an upgraded version of ImmuniWeb Continuous, designed for continuous penetration testing and 24/7 automated vulnerability scanning of web applications, APIs, and microservices.
October 31, 2025 — Source
Internet — Security Issues — October 30th, 2025
3+ billion PCs and phones are defenseless against new browser security flaw
Whether you're on Windows, Linux, macOS, Android, or iOS, you're vulnerable if you use Chrome or any Chromium-based browser.
October 30, 2025 — Source
10 Million Impacted by Conduent Data Breach
The hackers stole names, addresses, dates of birth, Social Security numbers, and health and insurance information.
October 30, 2025 — Source
136 NPM Packages Delivering Infostealers Downloaded 100,000 Times
The packages deployed malicious code harvesting system information, credentials, tokens, API keys, and other sensitive information.
October 30, 2025 — Source
Akeyless introduces AI Agent Identity Security for safer AI operations
Akeyless has released a new AI Agent Identity Security solution designed to secure the rise of autonomous AI systems.
October 30, 2025 — Source
Attackers exploiting WSUS vulnerability drop Skuld infostealer (CVE-2025-59287)
Attackers have been spotted exploiting the recently patched WSUS vulnerability (CVE-2025-59287) to deploy infostealer malware on unpatched Windows servers.
October 30, 2025 — Source
Best Antivirus Software We've Tested in 2025: This Security Service Just Dethroned a Top Competitor
We researched and tested top antivirus software like Bitdefender and McAfee to help you select the best cybersecurity suite for your digital safety needs.
October 30, 2025 — Source
Best password managers: 6 trustworthy options
If you're still using your dog's name to log in to your bank, you're courting disaster.
October 30, 2025 — Source
Breach Roundup: Hackers Probe Canada's Critical Infrastructure
Also: F5 Revenue Dips, Swedish Utility Operator Breached
October 30, 2025 — Source or Source or Source
Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm
The Canadian Centre for Cyber Security has warned CISOs that hacktivists are increasingly targeting internet-exposed ICS.
October 30, 2025 — Source
ClickFix Infrastructure Surprises Inform Better Blocking
Big Crossover Found Between ClickFix and Adversary-in-the-Middle Infrastructure
October 30, 2025 — Source
ConductorOne Hauls in $79M to Modernize Identity Security
Surge in AI and Non-Human Identities Drives Demand for More Powerful Access Control
October 30, 2025 — Source
CISA and NSA share tips on securing Microsoft Exchange servers
The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have released guidance to help IT administrators harden Microsoft Exchange servers on their networks against attacks.
October 30, 2025 — Source
CISA Issues Guidance to Curb Microsoft Exchange Exploits
US Cyber Defense Agency Releases Best Practices to Harden Exchange Environments
October 30, 2025 — Source or Source or Source
CISA orders feds to patch VMware Tools flaw exploited by Chinese hackers
On Thursday, CISA warned U.S. government agencies to secure their systems against attacks exploiting a high-severity vulnerability in Broadcom's VMware Aria Operations and VMware Tools software.
October 30, 2025 — Source
CISA, NSA and Global Partners Unveil Security Blueprint for Hardening Microsoft Exchange Servers
New Advanced Guidance to Fortify On-Premises Exchange Servers Against Persistent Cyber Threats
October 30, 2025 — Source
Copilot AI's latest trick? A secure sandbox for its agentic activity
Microsoft 365 users can now test "Researcher with Computer Use," an autonomous agent that can access files that it couldn't before.
October 30, 2025 — Source
Cyberpunks mess with Canada's water, energy, and farm systems
Infosec agency warns hacktivists broke into critical infrastructure systems to tamper with controls
October 30, 2025 — Source
Defending against adversary-in-the-middle threats with phishing-resistant multi-factor authentication (ITSM.30.031)
In the ever-evolving landscape of cyber security , the rise of adversary-in-the-middle (AitM) phishing poses a significant threat to organizations. AitM phishing has become increasingly popular among threat actors as organizations move to the cloud, shifting the frontline from defending traditional network perimeters to prioritizing identity protection.
October 30, 2025 — Source
Docker Compose vulnerability opens door to host-level writes -- patch pronto
Docker Compose users are being strongly urged to upgrade their versions of the orchestration tool after a researcher uncovered a flaw that could allow attackers to stage path traversal attacks.
October 30, 2025 — Source
Ex-L3Harris exec guilty of selling cyber exploits to Russian broker
Peter Williams, an Australian national and a former general manager at U.S. defense contractor L3Harris Trenchant, has pleaded guilty in U.S. District Court to stealing and selling confidential cybersecurity information to a Russian vulnerability exploit broker.
October 30, 2025 — Source
Former US Defense Contractor Executive Admits to Selling Exploits to Russia
Peter Williams stole trade secrets from his US employer and sold them to a Russian cybersecurity tools broker.
October 30, 2025 — Source
Google says your Gmail wasn't hacked — but maybe check anyway, as the internet's not buying it after 183M accounts were allegedly breached
It's not a Gmail breach, it's just a remix of every other one — according to Google, which denies reports, but 16 million fresh credentials still surfaced.
October 30, 2025 — Source
How neighbors could spy on smart homes
Even with strong wireless encryption, privacy in connected homes may be thinner than expected. A new study from Leipzig University shows that someone in an adjacent apartment could learn personal details about a household without breaking any encryption. By monitoring the wireless traffic of nearby smart devices, the "nosy neighbor" can infer what people are doing, when they are home, and even which room they are in.
October 30, 2025 — Source
How to Block North Korean IT Worker Scams in Remote Hiring
Attorney Jonathan Armstrong on Vetting Job Applicants, Red Flags and Compliance
October 30, 2025 — Source or Source or Source
Joint guidance on Microsoft Exchange Server security best practices
The Canadian Centre for Cyber Security (Cyber Centre) has joined the United States' National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) as well as the Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC) in releasing guidance on Microsoft Exchange Server security best practices.
October 30, 2025 — Source
LinkedIn phishing targets finance execs with fake board invites
Hackers are abusing LinkedIn to target finance executives with direct-message phishing attacks that impersonate executive board invitations, aiming to steal their Microsoft credentials.
October 30, 2025 — Source
Major US Telecom Backbone Firm Hacked by Nation-State Actors
Ribbon Communications provides technology for communications networks and its customers include the US government and major telecom firms.
October 30, 2025 — Source or Source
Massive surge of NFC relay malware steals Europeans' credit cards
Near-Field Communication (NFC) relay malware has grown massively popular in Eastern Europe, with researchers discovering over 760 malicious Android apps using the technique to steal people's payment card information in the past few months.
October 30, 2025 — Source
New OpenText capabilities enhance enterprise defense with AI across identity, data, and apps
OpenText announced new cybersecurity capabilities designed to help enterprises embed AI into everyday security operations and enforce governance and compliance at scale.
October 30, 2025 — Source
OpenAI unveils 'Aardvark,' a GPT-5-powered agent for autonomous cybersecurity research
OpenAI said the new cybersecurity agent can identify, explain, and help fix vulnerabilities. Here's how it works.
October 30, 2025 — Source
Opt Out October: Daily Tips to Protect Your Privacy and Security
Trying to take control of your online privacy can feel like a full-time job. But if you break it up into small tasks and take on one project at a time it makes the process of protecting your privacy much easier. This month we're going to do just that. For the month of October, we'll update this post with new tips every weekday that show various ways you can opt yourself out of the ways tech giants surveil you.
October 30, 2025 — Source
Organizations struggle to manage AI and SaaS use safely
The study from 1Password, based on data from 5,200 desk-based knowledge workers across the US, Canada, the UK, Germany, France, and Singapore, also finds 52 percent of employees have downloaded apps without IT approval.
October 30, 2025 — Source
Postcode Lottery's lucky dip turns into data slip as players draw each other's info
Biz says 'technical error' caused short-lived leak affecting small number of users
October 30, 2025 — Source
Proton Data Breach Observatory reports as soon as your personal data hits the dark web
Security-conscious readers probably already use the data breach alert site Have I Been Pwned, but a new Proton website is aiming to alert you at an earlier stage with what the company says will be near real-time reporting.
October 30, 2025 — Source
Proton's new Data Breach Observatory shines a light into the dark web
Date breaches affecting businesses and online services are ever more frequent and can affect anyone who is unfortunate enough to be a customer or supplier.
October 30, 2025 — Source
Reflectiz Raises $22 Million for Website Security Solution
The company will expand its product offering, establish global headquarters in Boston, and fuel growth and go-to-market efforts.
October 30, 2025 — Source
Rethinking identity security in the age of autonomous AI agents
The rise of autonomous AI agents is challenging the very foundation of enterprise security. These systems don't just follow static workflows or code. They make independent decisions, take actions across systems, and in many cases, do so without human oversight.
October 30, 2025 — Source
Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience
Spektrum Labs has raised $10 million in seed funding for its cyber resilience platform.
October 30, 2025 — Source
Sublime Secures $150M to Advance Agentic Email Protection
Series C Funding Fuels Autonomous Agents That Detect and Block Attacks in Real Time
October 30, 2025 — Source or Source or Source or Source or Source
Suspected Chinese snoops weaponize unpatched Windows flaw to spy on European diplomats
Expired security cert, real Brussels agenda, plus PlugX malware finish the job
October 30, 2025 — Source
Tata Motors Breach Exposed 70TB of Sensitive Data Before Fix
Security researcher Eaton Zveare discovered that two sets of Amazon Web Services keys were left exposed across Tata Motors' online platforms.
October 30, 2025 — Source
Upwind unveils AI-powered Exposure Validation Engine to redefine dynamic CSPM
Upwind has launched its Exposure Validation Engine, a capability that introduces dynamic, real-time validation into the Cloud Security Posture Management (CSPM) layer. This innovation enables security, engineering, and compliance teams to validate live cloud exposures with precision under real-world conditions.
October 30, 2025 — Source
US, Japan, and Korea Unite to Lead AI Chips Race
During his visit to Asia, President Trump signed a new agreement with South Korea and Japan. As per the agreement, the countries will help each other work on advanced technologies and provide a safer environment for them.
October 30, 2025 — Source
WhatsApp adds passkey protection to end-to-end encrypted backups
WhatsApp is adding a new way to access your encrypted backups with passkey support. This means if you lose your device, you can use methods like fingerprint, face, or the screen lock code of your previous device to access WhatsApp's backup.
October 30, 2025 — Source or Source
Internet — Security Issues — October 26th, 2025
Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoors
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
October 26, 2025 — Source
Internet — Security Issues — October 25th, 2025
183 million email accounts just got breached. Check if you’re affected
The data breach tracking service known as Have I Been Pwned just added an immense collection of leaked user data.
October 25, 2025 — Source
New CoPhish attack steals OAuth tokens via Copilot Studio agents
A new phishing technique dubbed 'CoPhish' weaponizes Microsoft Copilot Studio agents to deliver fraudulent OAuth consent requests via legitimate and trusted Microsoft domains.
October 25, 2025 — Source
Internet — Security Issues — October 24th, 2025
Apple pulls 'Tea' and 'TeaOnHer' apps from its App Store
This summer, the Tea app — a platform where women anonymously rated and discussed men, ostensibly to help each other date safely —suffered data breaches that exposed users' personal information. In response, men launched a counterpart app called TeaOnHer, while Tea faced a class-action lawsuit from users furious over their private data being vulnerable to hackers. Now, Apple has removed both from the App Store.
October 24, 2025 — Source
AWS Outage Exposes Cloud Dependency, Concentration Risks
Forrester's Brent Ellis and Dario Maisto on Lessons Learned for Large Enterprises
October 24, 2025 — Source or Source or Source
Best VPN routers 2025: Protect your entire household with a VPN-ready router and easy installation
My favorite VPN routers give you blanket home protection and security without the need for advanced technical knowledge. These are my top picks.
October 24, 2025 — Source
Civilian Airport OT: the US Military's Soft Underbelly
Airport Baggage Carousels Are Weapons, in the Right Hands
October 24, 2025 — Source or Source or Source or Source or Source
Confidence in ransomware recovery is high but actual success rates remain low
A new OpenText study reveals high confidence in ransomware recovery, yet only 15% fully recover data after an attack, highlighting preparation gaps.
October 24, 2025 — Source
Critical Windows Server WSUS Vulnerability Exploited in the Wild
CVE-2025-59287 allows a remote, unauthenticated attacker to execute arbitrary code and a PoC exploit is available.
October 24, 2025 — Source
Fake LastPass death claims used to breach password vaults
LastPass is warning customers of a phishing campaign sending emails with an access request to the password vault as part of a legacy inheritance process.
October 24, 2025 — Source
Fortinet Accused of Securities Fraud Over Firewall Forecasts
Pension Funds Say Fortinet Leaders Misled Market With Overly Rosy Refresh Outlook
October 24, 2025 — Source
Hackers launch mass attacks exploiting outdated WordPress plugins
A widespread exploitation campaign is targeting WordPress websites with GutenKit and Hunk Companion plugins vulnerable to critical-severity, old security issues that can be used to achieve remote code execution (RCE).
October 24, 2025 — Source
Hackers Target Perplexity Comet Browser Users
Shortly after the browser was launched, numerous fraudulent domains and fake applications were discovered.
October 24, 2025 — Source
How to reduce costs with self-service password resets
We all need to reset our passwords occasionally, whether it's due to a simple memory lapse or wider security concerns. However, the process can rack up surprising expenses for organizations. This means self-service password resets (SSPR) aren't just a 'nice to have', they are essential.
October 24, 2025 — Source
In Other News: iOS 26 Deletes Spyware Evidence, Shadow Escape Attack, Cyber Exec Sold Secrets to Russia
Other noteworthy stories that might have slipped under the radar: Everest group takes credit for Collins Aerospace hack, Maryland launches VDP, gamers targeted with red teaming tool and RAT.
October 24, 2025 — Source
Infostealers Run Wild
Malware Captures Billions of Credentials
October 24, 2025 — Source or Source or Source or Source
Microsoft blocks risky file previews in Windows File Explorer
Along with fixing many code-based vulnerabilities, the October 2025 Windows updates also change how File Explorer handles files downloaded from the internet.
October 24, 2025 — Source
Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks
In files downloaded from the internet, HTML tags referencing external paths could be used to leak NTLM hashes during file previews.
October 24, 2025 — Source
Microsoft Outlook is getting an AI overhaul under new leaders
Outlook won't simply bolt on AI but rebuild around it.
October 24, 2025 — Source
Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
Microsoft has released an out-of-band security update that "comprehensively" addresses CVE-2025-59287, a remote code execution vulnerability in the Windows Server Update Services (WSUS) that is reportedly being exploited in the wild.
October 24, 2025 — Source
Microsoft removing support for Windows 10 could increase e-waste, cybersecurity threats
Ending support for Windows 10 will leave about 40% of Windows users with limited upgrade options, potentially resulting in up to 240 million devices becoming e-waste and increasing greenhouse gas emissions. Users unable to upgrade face heightened cybersecurity risks as vulnerabilities go unpatched. Alternatives like Linux Mint and right-to-repair initiatives may help mitigate these impacts.
October 24, 2025 — Source
North Korean Hackers Aim at European Drone Companies
Lazarus has used fake job offers in attacks targeting companies developing UAV technology, for information theft.
October 24, 2025 — Source
Pwn2Own WhatsApp Hacker Says Exploit Privately Disclosed to Meta
Questions have been raised over the technical viability of the purported WhatsApp exploit, but the researcher says he wants to keep his identity private.
October 24, 2025 — Source
Seduction is the new spyware: US tech startups are now the target of "sex warfare"
The spy who shagged me?
October 24, 2025 — Source
Surfshark introduces web content blocker for home users
Cybersecurity and privacy firm Surfshark has launched a new web content blocker aimed at home users who want to filter online material without the tracking aspect often found in parental control software.
October 24, 2025 — Source
This popular 'privacy browser' is actually tracking users and stealing data
One browser used to evade online gambling laws in China has been found to be a serious security risk—with possible ties to criminal rings.
October 24, 2025 — Source
Toys 'R' Us Canada Customer Information Leaked Online
The customer information published on the dark web includes names, addresses, phone numbers, and email addresses.
October 24, 2025 — Source
Windows Server emergency patches fix WSUS bug with PoC exploit
Microsoft has released out-of-band (OOB) security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability with publicly available proof-of-concept exploit code.
October 24, 2025 — Source
Yale New Haven Health Will Pay $18M to Settle Hack Lawsuit
March Breach Affected Nearly 5.6 Million; NextGen Proposed Settlement Also Reached
October 24, 2025 — Source or Source or Source or Source
Internet — Security Issues — October 20th, 2025
A New Bill Aims to Ban Both Adult Content Online and VPN Use. Could It Work?
Michigan representatives just proposed a bill to ban many types of internet content, as well as VPNs that could be used to circumvent it. Here's what we know.
October 20, 2025 — Source
A simple AI prompt saved a developer from this job interview scam
Plus: Ransomware posing as Teams installer, Cisco 0-day exploit to drop rootkit, and European cops bust SIM-box service
October 20, 2025 — Source
American Airlines Subsidiary Envoy Air Hit by Oracle Hack
Envoy Air, which operates the American Eagle brand, has confirmed that business information was stolen by hackers.
October 20, 2025 — Source
China blames US for cyber break-in, claims America is world's biggest bit burglar
'US is ... the greatest source of chaos in cyberspace'
October 20, 2025 — Source
China says it has foiled a series U.S. cyberattacks on its critical infrastructure — Ministry of State Security says it has 'irrefutable evidence' NSA tried to cause 'international time chaos'
The accusation comes after the US NSA was reportedly caught infiltrating the organization that runs high-precision timing services in Beijing.
October 20, 2025 — Source
China-linked Salt Typhoon hackers attempt to infiltrate European telco
Salt Typhoon, the China-linked APT group that has a penchant for targeting telecommunications companies, has been spotted trying to sneak into yet another one.
October 20, 2025 — Source
CISA: High-severity Windows SMB flaw now exploited in attacks
CISA says threat actors are now actively exploiting a high-severity Windows SMB privilege escalation vulnerability that can let them gain SYSTEM privileges on unpatched systems.
October 20, 2025 — Source
ConnectWise Patches Critical Flaw in Automate RMM Tool
Attackers could exploit vulnerable deployments to intercept and tamper with communications in certain configurations.
October 20, 2025 — Source
Cyberattack Disrupts Services at 2 Massachusetts Hospitals
IT Systems, Radiology Services Taken Offline; Ambulance Patients Diverted
October 20, 2025 — Source or Source or Source
Find hidden malicious OAuth apps in Microsoft 365 using Cazadora
If you manage even one Microsoft 365 tenant, it's time to audit your OAuth apps. Statistically speaking, there's a strong chance a malicious app is lurking in your environment.
October 20, 2025 — Source
Google is retiring Privacy Sandbox
Privacy Sandbox was Google's vision for replacing third-party cookies, but now the company is giving up and moving on from the idea. First launched six years ago, Privacy Sandbox suffered with low-adoption, and Google has gradually snuffed out various technologies relating to the system. Now it has taken things further.
October 20, 2025 — Source
Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)
Moxa has fixed 5 vulnerabilities in its industrial network security appliances and routers, including a remotely exploitable flaw (CVE-2025-6950) that may result in complete system compromise.
October 20, 2025 — Source
How AI is driving email phishing and how to beat the threat [Q&A]
Among all of the various forms of cyberattack phishing attempts delivered by email are still one of the most common.
October 20, 2025 — Source
How Unified Exposure Management Cuts Risk, Boosts Efficiency
Tenable's Nate Dyer on Moving Beyond Traditional Vulnerability Management
October 20, 2025 — Source
Is AI really behind layoffs, or just a convenient excuse for companies?
Are companies using the technology as a scapegoat?
October 20, 2025 — Source
ISMG Editors: Inside the Scattered Lapsus$ Hunters Takedown
In this week's panel, four ISMG editors discussed the FBI's disruption of Scattered Lapsus$ Hunters, turmoil inside CISA amid the U.S. federal government shutdown and how LevelBlue's acquisition of Cybereason signals big shifts in the XDR and MDR markets.
October 20, 2025 — Source or Source
Jamf adds AI forensics to help organizations detect and respond to mobile threats
Jamf announced the beta release of AI Analysis for Jamf Executive Threat Protection, a new AI-powered capability designed to accelerate and simplify mobile forensic analysis.
October 20, 2025 — Source
Lumma Stealer Activity Drops After Doxxing
The identities of alleged core members of the Lumma Stealer group were exposed in an underground doxxing campaign.
October 20, 2025 — Source
Massive AWS outage takes down dozens of services, including Alexa, Reddit, and Fortnite
Not a cyberattac
October 20, 2025 — Source
Meta Adds New Parental Controls to Limit Teen Chats with AI on Instagram and Facebook
Meta has announced new supervision tools for parents to get insights and more control on their teens activity on platforms like Instagram and Facebook. It includes their kids interaction with AI characters alongside Meta AI assistant as well. Parents will be able to either cut off their teens one-on-one chat with AI characters entirely or opt for blocking specific AI characters.
October 20, 2025 — Source
NPM Ecosystem Suffers Two AI-Enabled Credential Stealing Supply Chain Attacks
The Node Package Manager (npm) ecosystem has suffered from two major supply chain attacks in recent months, affecting hundreds of packages and exposing developers to credential theft and data exfiltration. The attack vector of these incidents shows an AI-enabled evolution of how open-source software dependencies can be compromised.
October 20, 2025 — Source
NSO Ordered to Stop Hacking WhatsApp, but Damages Cut to $4 Million
The judge ruled that punitive damages of $167 million awarded by a jury were excessive.
October 20, 2025 — Source
Philippine state health insurer to beef up cybersecurity with AI
PhilHealth recently introduced digital verification two years after getting hit by a ransomware attack.
October 20, 2025 — Source
Retail giant Muji halts online sales after ransomware attack on supplier
Japanese retail company Muji has taken offline its store due to a logistics outage caused by a ransomware attack at its delivery partner, Askul.
October 20, 2025 — Source
Salt Typhoon Targets European Telecom
Attack Began With Citrix NetScaler Gateway Compromise, Darktrace Said
October 20, 2025 — Source or Source or Source or Source
SIM Farm Dismantled in Europe, Seven Arrested
The individuals ran a highly sophisticated cybercrime-as-a-service (CaaS) platform that caused roughly €5 million (~$5.8 million) in losses.
October 20, 2025 — Source
UK Ministry of Defense Probes Military Contractor Data Leak
Ransomware Group Lynx Reportedly Stole 4TB of Data
October 20, 2025 — Source or Source or Source or Source
US Court Blocks Spyware Maker NSO Over WhatsApp Hack
NSO Group Blocked From WhatsApp and Must Destroy Code Used to Hack 1,400 Devices
October 20, 2025 — Source or Source or Source
US Scrambles to Patch F5 Amid China-Linked Breach
Concerns Grow Over F5 Hacking Amid Stalled Government Shutdown
October 20, 2025 — Source or Source or Source
Vulnerability in Dolby Decoder Can Allow Zero-Click Attacks
On Android, the out-of-bounds write issue can be triggered during the processing of media files without user interaction.
October 20, 2025 — Source
WatchGuard VPN Flaw Gives Hackers Full Firewall Control
A severe vulnerability in Fireware allows remote attackers to run arbitrary code without authentication, effectively transforming a trusted security device into a potential entry point for exploitation.
October 20, 2025 — Source
WhatsApp is working on a new way to cut down on spam
Like email, SMS, and just about every other method of communication, WhatsApp suffers from spam. There are certainly things that can be done by users to stem the flow of spam that makes its way to their inboxes, but WhatsApp is also trying to help.
October 20, 2025 — Source
Xubuntu downloads section injection threatens users with crypto infection
Attempted exploit was a feeble effort to target Windows users
October 20, 2025 — Source
Your IP address reveals more than you think. VPNs are the answer
Are you doing enough to protect your online privacy?
October 20, 2025 — Source
Internet — Security Issues — October 17th, 2025
3 Must Have AI Cybersecurity Tools: AI Is Fighting Back Against Sophisticated Cyberattacks
Imagine receiving an email that looks identical to one from your bank, complete with logos, professional language, and even a personalized greeting. You click a link, enter your credentials, and within minutes, your account is compromised. This isn't a hypothetical scenario, it's the reality of modern cybercrime, where AI-powered attacks are becoming more sophisticated and harder to detect. With over 166 million people affected by cyberattacks in 2023, the stakes have never been higher. But here's the twist: the same technology fueling these threats also holds the key to defending against them. Enter AI agents, your digital allies in the fight for cybersecurity.
October 17, 2025 — Source
2025 Nobel Prize Hit By Suspected Cyber Crime According To Norwegian Officials
Norwegian officials are looking into a potential cyber crime after they noticed a massive surge in betting activity on this year's Nobel Peace Prize winner, several hours before the official announcement was made. The convenient timing, coupled with the sheer amount of money wagered, means the Norwegian Nobel Institute is treating it as a possible case of espionage.
October 17, 2025 — Source
AI Agents Transform Enterprise Application Development
Why DevOps, Infrastructure Must Evolve to Manage AI-Accelerated Development
October 17, 2025 — Source or Source or Source or Source or Source
AI-Powered Cybersecurity: Inside Google's Gemini and Microsoft's Security Copilot
AI is reshaping cybersecurity. Here's how Google Gemini shields consumers on-device, while Microsoft Security Copilot automates enterprise detection and response.
October 17, 2025 — Source
Avoid 'GetSupport.Apple.com' Text Scam: How to Spot a Phishing Attack
If you've recently received a text or email claiming to be from Apple about an "unknown Apple Pay request" or a "pending charge" under your Apple ID, stop and take a breath. It's not from Apple. This latest phishing scam is making the rounds, tricking users with fake "GetSupport.Apple.com" messages that look almost legitimate.
October 17, 2025 — Source
Best Free Antivirus Software for Mac in 2025
While macOS is built with strong security features, it's not immune to modern threats like malware, ransomware, and phishing attacks. Whether you're using a new MacBook or an older iMac, adding antivirus protection is a smart move (and you don't have to pay for it). Several free antivirus tools offer reliable defense, minimal system impact, and user-friendly interfaces, making them ideal for everyday Mac users.
October 17, 2025 — Source
Censys ICS/OT solution closes visibility gaps and secures exposed industrial systems
Censys announced the release of a new ICS/OT Internet intelligence offering designed to close the visibility gap defenders face when securing exposed industrial assets.
October 17, 2025 — Source
Cross-Border Phishing Attacks Spreads Across Asia
Attacks Move From China to Malaysia Using Phishing PDFs
October 17, 2025 — Source or Source or Source or Source or Source
Gladinet Patches Exploited CentreStack Vulnerability
The unauthenticated local file inclusion bug allows attackers to retrieve the machine key and execute code remotely via a ViewState deserialization issue.
October 17, 2025 — Source
Hackers Steal Sensitive Data From Auction House Sotheby's
Sotheby's has disclosed a data breach impacting personal information, including SSNs.
October 17, 2025 — Source
Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
Threat actors have leveraged a recently patched IOS/IOS XE vulnerability (CVE-2025-20352) to deploy Linux rootkits on vulnerable Cisco network devices.
October 17, 2025 — Source
Have I Been Pwned logs 17.6M victims in Prosper breach
P2P lending platform says it could not verify the claims at present
October 17, 2025 — Source
'Highest Ever' Severity Score Assigned by Microsoft to ASP.NET Core Vulnerability
CVE-2025-55315 is an HTTP request smuggling bug leading to information leaks, file content tampering, and server crashes.
October 17, 2025 — Source
"I saw numerous records marked as confidential" — 40 billion unencrypted records exposed by marketing firm, raising serious security concerns
Another day, another data leak. This time it's 13TB and 40 billion records — courtesy of Netcore.
October 17, 2025 — Source
In Other News: CrowdStrike Vulnerabilities, CISA Layoffs, Mango Data Breach
Other noteworthy stories that might have slipped under the radar: Capita fined £14 million, ICTBroadcast vulnerability exploited, Spyware maker NSO acquired.
October 17, 2025 — Source
ISMG Editors: Inside the Scattered Lapsus$ Hunters Takedown
Also: Continued Turmoil at CISA, MSSP Level Blue's Acquisition of Cybereason
October 17, 2025 — Source or Source or Source
Madman Theory Spurs Crazy Scattered Lapsus$ Hunters Playbook
Chaos Theory and Ransomware's Love Child Serves Up Nonstop Unpredictability
October 17, 2025 — Source or Source or Source or Source or Source
Microsoft fixes highest-severity ASP.NET Core flaw ever
Earlier this week, Microsoft patched a vulnerability that was flagged with the "highest ever" severity rating received by an ASP.NET Core security flaw.
October 17, 2025 — Source
Microsoft revokes 200 certs used to sign malicious Teams installers
By revoking 200 software-signing certificates, Microsoft has hampered the activities of Vanilla Tempest, a ransomware-wielding threat actor that has been targeting organizations with malware posing as Microsoft Teams.
October 17, 2025 — Source
Microsoft Warns Rising ClickFix Attacks Are Fooling Users Into Running Malware
Microsoft has reported a sharp increase in ClickFix-based attacks in its Digital Defense Report 2025. It uses a rare trick to force users to unknowingly infect themselves. The tech giant has also shared some precautionary measures to stay safe from these kinds of attacks.
October 17, 2025 — Source
Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US
The U.S. is the top target for cyberattacks, with criminals and foreign adversaries targeting companies, governments and organizations.
October 17, 2025 — Source
Notorious hacker group doxxes ICE and FBI officials in new leak, report says
Hundreds of ICE, FBI, and DOJ officials have allegedly been unmasked.
October 17, 2025 — Source
Opt Out October: Daily Tips to Protect Your Privacy and Security
Trying to take control of your online privacy can feel like a full-time job. But if you break it up into small tasks and take on one project at a time it makes the process of protecting your privacy much easier. This month we're going to do just that. For the month of October, we'll update this post with new tips every weekday that show various ways you can opt yourself out of the ways tech giants surveil you.
October 17, 2025 — Source
Over 266,000 F5 BIG-IP instances exposed to remote attacks
Internet security nonprofit Shadowserver Foundation has found more than 266,000 F5 BIG-IP instances exposed online after the security breach disclosed by cybersecurity company F5 this week.
October 17, 2025 — Source
Over $3 Million in Prizes Offered at Pwn2Own Automotive 2026
The unauthenticated local file inclusion bug allows attackers to retrieve the machine key and execute code remotely via a ViewState deserialization issue.
October 17, 2025 — Source
Prosper Market Data Breach Affects 17.6M Individuals
Breach Notification Service Details Peer-to-Peer Lending Marketplace Victim Count
October 17, 2025 — Source or Source or Watch Video or Source or Source
Q3 Ransomware Attacks Increase 36% YoY, BlackFog Report Reveals
"From grounded aircraft and stranded passengers to manufacturers forced to halt production, the disruption has been significant."
October 17, 2025 — Source
Ring lets police ask for security videos. Here's how to opt out
A feature in Ring's Neighbors app allows law enforcement to request footage from your Ring cameras. You don't have to play ball.
October 17, 2025 — Source
This new cyberattack tricks you into hacking yourself. Here's how to spot it
Traditional anti-phishing methods won't protect you.
October 17, 2025 — Source
US Scrambles to Patch F5 Amid China-Linked Breach
Concerns Grow Over F5 Hacking Amid Stalled Government Shutdown
October 17, 2025 — Source or Source
Internet — Security Issues — October 15th, 2025
'A Call to Arms' as UK Faces 50% Surge in Major Cyberattacks
In its Annual Review, published on Tuesday, the security agency states that the UK has experienced a 50% increase in "highly significant" cyberattacks over the past year. Officials attributed the surge to the UK's increasing dependence on digital systems and a sharp increase in ransomware activity targeting organisations for financial gain.
October 15, 2025 — Source
Aura enhancements simplify opt-outs and strengthen online privacy
Aura new tools to help consumers reclaim control over their personal information online. The new capabilities automate some of the most time-consuming privacy tasks, including removing personal details from Google search results, opting out of data broker sites, and identifying forgotten or active accounts that may be leaking sensitive data.
October 15, 2025 — Source
Banking Scams Up 65% Globally in Past Year
Prices go up. Population goes up. And to complete this unhappy trinity, banking scams go up.
October 15, 2025 — Source
BarracudaONE adds AI-powered tools to help MSPs simplify security
Barracuda Networks unveiled enhancements to its AI-powered BarracudaONE platform. New capabilities, including bulk remediation for email threats, PSA integrations for automated billing and invoicing, and streamlined account management, are purpose-built for managed service providers (MSPs), helping them accelerate security across multi-tenant environments, simplify operations, and drive scalable growth.
October 15, 2025 — Source
Beyond Secrets Manager: Designing Zero-Retention Secrets in AWS With Ephemeral Access Patterns
Ephemeral access patterns in AWS eliminate credential sprawl. This architecture uses IAM, STS, and brokers to enable zero-retention secrets at scale.
October 15, 2025 — Source
BigID introduces MCP Server to unlock AI-native access to enterprise data
BigID announced the launch of its Model Context Protocol (MCP) server, designed to unlock AI-native access to enterprise data context across the broadest range of data sources — structured, unstructured, on-prem, cloud, business applications, and AI frameworks.
October 15, 2025 — Source
Capita fined £14M after 58-hour delay exposed 6.6M records
ICO makes example of outsourcing giant over sluggish cyber response
October 15, 2025 — Source
Chinese Actor Targets Russian IT Provider
Symantec Says It Spotted Likely Supply Chain Hack
October 15, 2025 — Source or Source
CISA Issues Emergency Directive to Address Critical Vulnerabilities in F5 Devices
Nation-State Cyber Threat Actor Poses Immediate Risk to Federal Networks
October 15, 2025 — Source
CISA: F5 Hack Exposes Fed Networks to Full Compromise
Federal Agencies Ordered to Patch or Decommission F5 Devices Amid Imminent Risk
October 15, 2025 — Source or Source
Clothing giant MANGO discloses data breach exposing customer info
Spanish fashion retailer MANGO is sending notices of a data breach to its customers, warning that its marketing vendor suffered a compromise exposing personal data.
October 15, 2025 — Source
Customer Service Firm 5CA Denies Responsibility for Discord Data Breach
After being named by Discord as the third-party responsible for the breach, 5CA said none of its systems were involved.
October 15, 2025 — Source
Cyber giant F5 Networks says government hackers had 'long-term' access to its systems, stole code and customer data
Cybersecurity firm F5 Networks says government-backed hackers had "long-term, persistent access" to its network, which allowed them to steal the company's source code and customer information.
October 15, 2025 — Source
Discord Data Breach Plot Thickens As Third-Party Firm Denies It Was Hacked
A Discord data breach involving government IDs has taken a turn, as the third-party firm 5CA denies being hacked and blames "human error."
October 15, 2025 — Source
Discord's data breach drama is now turning into a blame game
Discord blamed 5CA, 5CA says it's not its fault. Nevertheless, thousands of people's sensitive data was leaked.
October 15, 2025 — Source
F5 data breach: "Nation-state attackers" stole BIG-IP source code, vulnerability info
US tech company F5 has suffered a breach, and the attackers made off with source code of and vulnerability information related to its BIG-IP family of networking and security products, the company confirmed today.
October 15, 2025 — Source
F5 discloses major security breach linked to nation-state hackers
F5 disclosed a security breach where nation-state hackers infiltrated its systems, stealing source code and vulnerability details. Customers are being notified and updates have been released.
October 15, 2025 — Source
F5 releases BIG-IP patches for stolen security vulnerabilities
Cybersecurity company F5 has released security updates to address BIG-IP vulnerabilities stolen in a breach detected on August 9, 2025.
October 15, 2025 — Source
F5 says hackers stole undisclosed BIG-IP flaws, source code
U.S. cybersecurity company F5 disclosed that nation-state hackers breached its systems and stole undisclosed BIG-IP security vulnerabilities and source code.
October 15, 2025 — Source
F5 Says Nation-State Hackers Stole Source Code and Vulnerability Data
F5 shared few details on the threat actor, but the attack profile seems to point to China.
October 15, 2025 — Source
Federated learning AI developed for hospitals and banks without personal information sharing
Federated learning was devised to solve the problem of difficulty in aggregating personal data, such as patient medical records or financial data, in one place. However, during the process where each institution optimizes the collaboratively trained AI to suit its own environment, a limitation arose: The AI became overly adapted to the specific institution's data, making it vulnerable to new data.
October 15, 2025 — Source
Fresh Phishing Kit Innovation: Automated ClickFix Attacks
Latest Toolkits Target Microsoft 365 Credentials, Offer Easy-to-Deploy Lures
October 15, 2025 — Source or Source
Gen Z targeted by AI-driven extortion scams
New research looking at high pressure extortion scams reveals that Gen Z is being particularly impacted by AI-powered threats. All mobile users are at risk, however, with one in three having been targeted by an extortion scam, often threatening to expose pictures or browsing history, and nearly one in five falling victim.
October 15, 2025 — Source
Google introduces new tools to help users fight against evolving phishing scams effectively
Keeping you a step ahead of phishing attempts.
October 15, 2025 — Source
Google now lets you add friends as contacts for account recovery
Google is announcing new privacy and recovery tools to combat spam across multiple products related to Android, including suspicious link detection in messages, sign-in with phone number, and recovery contacts.
October 15, 2025 — Source
Google steps up the fight against scams with new tools and more education
Scams and fraud are an ever present threat on the internet and the rise of AI means that they're getting harder to spot with the old giveaways of bad grammar and dodgy attachments largely eliminated.
October 15, 2025 — Source
Harmonic Security targets AI data risks with Model Context Protocol Gatewa
Harmonic Security announced Model Context Protocol (MCP) Gateway, a developer-friendly, locally installed gateway that gives security teams complete visibility and control over their organization's agentic AI ecosystem.
October 15, 2025 — Source
High-Severity Vulnerabilities Patched by Fortinet and Ivanti
High-Severity Vulnerabilities Patched by Fortinet and Ivanti
October 15, 2025 — Source
'Highly sophisticated' government goons hacked F5, stole source code and undisclosed bug details
Security shop F5 today said "highly sophisticated nation-state" hackers broke into its network and stole BIG-IP source code, undisclosed vulnerability details, and customer configuration data belonging to a "small percentage" of its users.
October 15, 2025 — Source
How to spot dark web threats on your network using NDR
Cybersecurity professionals recognize that enterprise networks are prime targets for dark web risks such as ransomware, unauthorized insider activity, and data exfiltration. What's less obvious is that evidence of this activity often hides in plain sight, buried within everyday network traffic.
October 15, 2025 — Source
Human Risk Report Reveals Overconfidence in Phishing Defenses
A new report reveals that despite continued confidence in cybersecurity defenses, everyday employee behaviors — from phishing errors to risky AI practices — remain a leading cause of data breaches.
October 15, 2025 — Source
ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact
Over 20 advisories have been published by industrial giants this Patch Tuesday.
October 15, 2025 — Source
Imprivata Buys Verosint for Real-Time Identity Risk Spotting
Risk Scoring to Enable Real-Time Action by Imprivata on Suspicious Access Attempts
October 15, 2025 — Source or Source
Microsoft patches three zero-days actively exploited by attackers
On October 2025 Patch Tuesday, Microsoft released fixes for 175+ vulnerabilities, including three zero-days under active attack: CVE-2025-24990, CVE-2025-59230, and CVE-2025-47827.
October 15, 2025 — Source
Microsoft Tightens Edge's IE Mode After Hackers Exploit Zero-Day Flaws
According to Microsoft's investigation, the attack chain started when users were tricked into visiting exploitative websites.
October 15, 2025 — Source or Source
My brain finally grasps 2FA security after watching this adorable parrot
Pets can be both fun and educational to watch!
October 15, 2025 — Source
New Cranium AI features enhance compliance, security, and agentic AI scalability
Cranium AI released several new agentic AI capabilities and featured releases to its AI Governance and Security Platform. These new products and capabilities are designed to enable enterprises to scale faster with AI agents, streamline compliance and fortify AI systems against real-world vulnerabilities.
October 15, 2025 — Source
New York Hospitals Are Facing Tougher Cyber Rules Than HIPAA
Matthew Bernstein of Bernstein Data on Broadening Data Privacy Hurdles
October 15, 2025 — Source or Source or Source or Source or Source
Open source malware up 140 percent
The latest OS Malware Index from Sonatype shows a 140 percent surge in open source malware as attackers target data and trusted dependencies.
October 15, 2025 — Source
PowerSchool hacker gets sentenced to four years in prison
19-year-old college student Matthew D. Lane, from Worcester, Massachusetts, was sentenced to 4 years in prison for orchestrating a cyberattack on PowerSchool in December 2024 that resulted in a massive data breach.
October 15, 2025 — Source
Preparing for the Post-Quantum Cryptography Shift
Point Wild's Zulfikar Ramzan Says Cryptography Is Crucial Against Quantum Risks
October 15, 2025 — Source or Source
Recovering and rebuilding trust after a cyberattack [Q&A]
However good your defenses, cyberattacks can still happen. However, in many cases, the aftermath can be worse than the attack itself, as enterprises struggle to calm nerves and reassure staff, customers, and shareholders.
October 15, 2025 — Source
Red Hat AI 3 helps enterprises scale AI workloads across hybrid environments
Red Hat released Red Hat AI 3, an evolution of its enterprise AI platform. Bringing together the latest innovations from Red Hat AI Inference Server, Red Hat Enterprise Linux AI (RHEL AI), and Red Hat OpenShift AI, the platform simplifies the complexities of high-performance AI inference at scale, enabling organizations to move workloads more easily from proof of concept to production and enhance collaboration on AI-enabled applications.
October 15, 2025 — Source
RGS IC Cloud Support enables Kubernetes management in restricted cloud environments
Rancher Government Solutions (RGS) announced the launch and general availability of IC Cloud Support, a new capability purpose-built for government and military teams operating in classified cloud environments.
October 15, 2025 — Source
Thousands of customers imperiled after nation-state ransacks F5's network
Risks to BIG-IP users include supply-chain attacks, credential loss, and vulnerability exploits.
October 15, 2025 — Source
Training the grid to spot cyberattacks without seeing your data
SUTD researchers test a privacy-preserving approach that blends federated learning with cloud coordination for smart grids in future 6G environments.
October 15, 2025 — Source
UK ICO Fines Capita 14M Pounds Over 2023 Hack
British outsourcing giant Capita must pay 14 million pounds to British data regulators for privacy violations tied to a 2023 hack that impacted more than 6 million individuals.
October 15, 2025 — Source or Source or Source or Source or Source
Visa Puts Autonomous Commerce at the Core of Payments
The Payments Giant Is Creating Digital Rails for Secure, AI-Driven Commerce
October 15, 2025 — Source or Source or Source or Source or Source
When 'Secure Boot' Doesn't Mean 'Secure'
Roughly 200,000 laptops and desktops made by modular sensation Framework contain a firmware vulnerability allowing attackers to disable Secure Boot and run unsigned code, say security researchers.
October 15, 2025 — Source or Source or Source
Internet — Security Issues — October 13th, 2025
Android 'Pixnapping' attack can capture app data like 2FA codes
GPU-based timing attack inspired by decade-old iframe technique
October 13, 2025 — Source
Chinese Owners Locked Out of Dutch Chip Maker Nexperia
Dutch Ministry Invokes National Security Law to Impose Domestic Control
October 13, 2025 — Source
Cybercriminals are not the lone wolves of 20 years ago, says expert
City University London spoke to Professor Rajarajan about his mission to protect us all from the threat of international cyber criminality. Professor Raj Rajarajan is an academic at City St George's, University of London whose research focuses on cybersecurity and security engineering.
October 13, 2025 — Source
Dutch government puts Nexperia on a short leash over chip security fears
Minister invokes powers to stop firm shifting knowledge to China, citing governance shortcomings
October 13, 2025 — Source or Source or Source or Source or Source
Harvard investigating breach linked to Oracle zero-day exploit
Harvard University is investigating a data breach after the Clop ransomware gang listed the school on its data leak site, saying the alleged breach was likely caused by a recently disclosed zero-day vulnerability in Oracle's E-Business Suite servers.
October 13, 2025 — Source
Is that virus warning real? How to spot false alarms
When an antivirus program sounds the alarm, it always triggers a moment of shock in the user. But the warning is not always justified. Because even a virus scanner can make mistakes.
October 13, 2025 — Source
Malicious Code on Unity Website Skims Information From Hundreds of Customers
The video game software development company says the incident impacted users of its SpeedTree website.
October 13, 2025 — Source
Meet Varonis Interceptor: AI-Native Email Security
Today, we are excited to announce Varonis Interceptor, AI-native email security.
October 13, 2025 — Source
Microsoft 'illegally' tracked students via 365 Education, says data watchdog
Redmond argued schools, education authorities are responsible for GDPR
October 13, 2025 — Source
NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms
Threat actors used automation to create over 175 malicious NPM packages targeting more than 135 organizations.
October 13, 2025 — Source
Oracle releases emergency patch for new E-Business Suite flaw
Oracle has issued an emergency security update over the weekend to patch another E-Business Suite (EBS) vulnerability that can be exploited remotely by unauthenticated attackers.
October 13, 2025 — Source or Source
Pro-Russia TwoNet Hacktivists Target Water Utility Honeypot
Today's Hapless Hackers Are Tomorrow's Threat, Warns Forescout
October 13, 2025 — Source or Source or Source or Source or Source
Salesforce announces Agentforce 360 as enterprise AI competition heats up
Salesforce announced Monday the latest version of its AI agent platform as the company looks to lure enterprises to its AI software in an increasingly crowded market.
October 13, 2025 — Source
Senators try to save cyber threat sharing law, sans government funding
A bipartisan Senate duo has introduced a bill to revive and extend America's cyber threat-sharing law for another ten years after its authorization lapsed during the government shutdown.
October 13, 2025 — Source
SonicWall SSL VPN Accounts in Attacker Crosshairs
Threat actors have rapidly compromised more than 100 SonicWall SSL VPN accounts pertaining to over a dozen entities.
October 13, 2025 — Source or Source
Spanish Authorities Dismantle 'GXC Team' Crime-as-a-Service Operation
The authorities arrested GoogleXcoder, the alleged administrator of GXC Team, which offered phishing kits and Android malware.
October 13, 2025 — Source
UK fines 4Chan over online safety compliance
Ofcom says that 4Chan will face ongoing daily penalties for ignoring 'legally-binding information requests.'
October 13, 2025 — Source or Source
Vulnerability in confidential cloud environments uncovered
Some data is so sensitive that it is processed only in specially protected cloud areas. These are designed to ensure that not even a cloud provider can access the data. ETH Zurich researchers have now found a vulnerability that could allow hackers to breach these confidential environments.
October 13, 2025 — Source
Internet — Security Issues — October 10th, 2025
77% of Employees Share Company Secrets on ChatGPT, Report Warns
New report reveals 77% of employees share sensitive company data through ChatGPT and AI tools, creating major security and compliance risks.
October 10, 2025 — Source
Accenture helps organizations advance agentic AI with Gemini Enterprise
Accenture and Google Cloud announced that their strategic alliance is driving client reinvention with Gemini Enterprise agentic AI solutions, building on the successful adoption of Google Cloud technologies for organizations across industries.
October 10, 2025 — Source
ALN, Octapharma Plasma Agree to Settle Breach Lawsuits
2 Firms Hit by Separate 2024 Attacks to Pay Total of $6.5M in Class Action Claims
October 10, 2025 — Source or Source or Source or Source or Source
Apple Bug Bounty Update: Top Payout $2 Million, $35 Million Paid to Date
Apple has announced significant updates to its bug bounty program, including new categories and target flags.
October 10, 2025 — Source
Apple offers $2 million for zero-click exploit chains
Apple bug bounty program's categories are expanding and rewards are rising, and zero-click exploit chains may now earn researchers up to $2 million.
October 10, 2025 — Source
Australia Levies First-Ever Privacy Act Fine Over Lab Breach
Australian Clinical Labs Ordered to Pay $3.8 Million Over Pathology Unit Data Theft
October 10, 2025 — Source or Source
Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
CVE-2025-11371, an unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and Triofox file-sharing and remote access platforms, is being exploited by attackers in the wild.
October 10, 2025 — Source
Blackpoint Cyber versus Arctic Wolf: Which MDR Solution is Right for You?
Want to improve your security? Compare Blackpoint Cyber and Arctic Wolf to find the best MDR solution.
October 10, 2025 — Source
Can't FB ATM, BB -- the social media acronyms that have us scratching our heads
The tech industry has always been fond of acronyms for various technologies, and the rise of social media has brought many more into everyday use. But how many of these have you shrugging your shoulders and saying IDK* what that means?
October 10, 2025 — Source
CISA in Disarray Amid Shutdown and Growing Political Threats
US Cyber Defense Agency Slammed by Shutdown, Personnel Cuts and Resource Crisis
October 10, 2025 — Source or Source or Source or Source
comforte AG debuts TAMUNIO, its all-in-one shield for data security
comforte AG launched TAMUNIO, an all-in-one data security platform integrating tokenization, encryption, and confidential computing to address growing cyber threats and regulatory scrutiny.
October 10, 2025 — Source
Cops nuke BreachForums (again) amid cybercrime supergroup extortion blitz
US and French fuzz pull the plug on Scattered Lapsus$ Hunters' latest leak shop targeting Salesforce
October 10, 2025 — Source
Creepy Israeli Spyware Vendor NSO Group Reportedly Sells to U.S. Company at the Worst Possible Time
Journalists beware.
October 10, 2025 — Source
FBI takes down BreachForums portal used for Salesforce extortion
The FBI seized a BreachForums domain used by the ShinyHunters group as a data leak extortion site for the widespread Salesforce attacks, with the threat actor stating that law enforcement also stole database backups for the notorious hacking forum.
October 10, 2025 — Source
Google Brings Open Third-Party Extensions to Gemini CLI
Unlike ChatGPT's tightly managed system, developers can integrate their own apps into Gemini's command-line tool.
October 10, 2025 — Source
Google's Gemini Enterprise Signals the Next Phase of Workplace AI
Google unveils Gemini Enterprise, an all-in-one AI platform designed to unify workplace tools, automate workflows, and simplify how teams get work done.
October 10, 2025 — Source
Hackers Exploit LFI Flaw in File-Sharing Platforms
Attackers Read Server Files and Steal Credentials in Gladinet CentreStack, Triofox
October 10, 2025 — Source
Hackers exploiting zero-day in Gladinet file sharing software
Threat actors are exploiting a zero-day vulnerability (CVE-2025-11371) in Gladinet CentreStack and Triofox products, which allows a local attacker to access system files without authentication.
October 10, 2025 — Source
Homeland Security reassigns 'hundreds' of CISA cyber staffers to support Trump's deportation crackdown
The U.S. Department of Homeland Security is reassigning hundreds of employees across several of its agencies to assist in the Trump administration's broad immigration crackdown and will dismiss staffers who refuse to comply, according to news reports.
October 10, 2025 — Source
How bad is the Discord hack? What you need to know.
The government-issued IDs of 70,000 users have been exposed.
October 10, 2025 — Source
In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware
Other noteworthy stories that might have slipped under the radar: US universities targeted by payroll pirates, Zimbra vulnerability exploited, Mic-E-Mouse attack.
October 10, 2025 — Source
Investor group led by Hollywood producer to acquire iPhone spyware company NSO
NSO, the Israeli company behind iPhone spyware Pegasus, is being acquired by a group of investors led by Hollywood producer Robert Simonds. Here are the details.
October 10, 2025 — Source
ISMG Editors: How the US Federal Shutdown Exposes Cyber Gaps
Also: Shutdown's Ripple Effects on Healthcare, Mounting Threats to Aging OT Systems
October 10, 2025 — Source or Source or Source or Source
Juniper Networks Patches Critical Junos Space Vulnerabilities
Patches were rolled out for more than 200 vulnerabilities in Junos Space and Junos Space Security Director, including nine critical-severity flaws.
October 10, 2025 — Source
Microsoft Warns US Universities Of Alarming Payroll Pirate Attack Security Threat
A financially-motivated hacking group, tracked by Microsoft as Storm-2657, has so far successfully compromised employee accounts at three U.S. universities to steal their salaries in what campaign experts are deeming "payroll pirate" attacks. The sophisticated scheme targets human resource (HR) platforms, such as Workday, to redirect direct deposit payments to accounts controlled by the attackers.
October 10, 2025 — Source or Source
Mobilicom rolls out a secured autonomy system powering next-gen AI drones
Mobilicom launched the Secured Autonomy (SA) Compute PRO-AT, which combines Mobilicom's OS3 (Operational Security, Safety, and Standards compliance) cybersecurity software with Aitech's rugged, NVIDIA-based AI Supercomputers, including the A230 Vortex AI GPGPU (general-purpose computing on graphics processing units) supercomputer.
October 10, 2025 — Source
New malware waits until you watch porn, then secretly films via webcam
The so-called Stealerium malware can detect porn activity and take compromising material for use in blackmail and sextortion attacks.
October 10, 2025 — Source
New York City sues social media giants over youth mental health crisis
Lawsuit says algorithms keep kids hooked and anxious
October 10, 2025 — Source
OpenVPN redefines secure connectivity with Access Server 3.0
OpenVPN released Access Server 3.0, a major update to its self-hosted business VPN solution that delivers foundational improvements to performance, flexibility, and system integration.
October 10, 2025 — Source
Pentera Acquires DevOcean to Streamline Vulnerability Fixes
Pentera-DevOcean Platform to Deliver Unified Attack Simulation and Remediation
October 10, 2025 — Source or Watch Video or Source
Pro-Russia hacktivist group dies of cringe after falling into researchers' trap
Forescout's phony water plant fooled TwoNet into claiming a fake cyber victory -- then it quietly shut up shop
October 10, 2025 — Source
Proof launches Certify, the cryptographic answer to AI-generated fraud
Generative AI is enabling the proliferation of fake documents, images, videos, and data at an unprecedented scale, to the point where it's indistinguishable from reality. While fake media and misinformation have garnered the most attention, the real danger in AI lies in its ability to forge signatures, falsify records, impersonate one's voice on the phone or fake a person's likeness on video.
October 10, 2025 — Source
Ransomware crims that exploited SharePoint 0-days add Velociraptor to their arsenal
And they're likely still abusing the same SharePoint flaws for initial access
October 10, 2025 — Source
RondoDox Botnet Takes 'Exploit Shotgun' Approach
The botnet packs over 50 exploits targeting unpatched routers, DVRs, NVRs, CCTV systems, servers, and other network devices.
October 10, 2025 — Source
Securing HTTPS From the Inside Out: Preventing Client-Side Interception Attacks
How to use Instagram anonymously without an account
October 10, 2025 — Source
SonicWall Warns Cloud Backup Users of Security Risk
Akira Ransomware Hackers Targeting SonicWall Devices
October 10, 2025 — Source or Source or Source or Source or Source or Source
Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks
Google researchers believe exploitation may have started as early as July 10 and the campaign hit dozens of organizations.
October 10, 2025 — Source
Spyware maker NSO Group confirms acquisition by US investors
NSO spokesperson Oded Hershowitz told TechCrunch on Friday that "an American investment group has invested tens of millions of dollars in the company and has acquired controlling ownership."
October 10, 2025 — Source
Take Back Control: 16 Self-Hosted Projects You Need to Try Today
What if you could take back control of your digital life, your data, your tools, your choices, without sacrificing functionality or innovation? In an era where cloud-based services dominate, the trade-off often feels inevitable: convenience at the cost of privacy. But what if it didn't have to be that way? Enter the world of self-hosted projects, where open source ingenuity meets personal empowerment.
October 10, 2025 — Source
The spy who came in from the Wi-Fi: Beware of radio network surveillance
If you pass by a cafe that operates a Wi-Fi network, you can be identified—even if you do not carry a smartphone with you. Researchers at Karlsruhe Institute of Technology (KIT) have found out that it is possible to identify people solely through Wi-Fi signals. They point out that this constitutes a significant risk to privacy.
October 10, 2025 — Source
UK slaps 'strategic market status' on Google, unlocking power to pry open search
Competition watchdog can now meddle in how the tech giant runs the biggest wing of its organization
October 10, 2025 — Source
UK techies' union warns members after breach exposes sensitive personal details
Prospect apologizes for cyber gaffe affecting up to 160K members
October 10, 2025 — Source
ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities
The unpatched vulnerabilities allow attackers to execute arbitrary code remotely and escalate their privileges.
October 10, 2025 — Source
Internet — Security Issues — October 8th, 2025
8 red flags of a phishing scam: I insta-delete any email with these tip-offs
Dare to resist phishing scams with these tips.
October 8, 2025 — Source
AI Security Goes Mainstream as Vendors Spend Heavily on M&A
Platform Vendors Target Runtime Defense, Prompt Flow, Agent Identity and Output
October 8, 2025 — Source or Source or Source
Arrests Underscore Fears of Teen Cyberespionage Recruitmen
Telegram Used to Lure Teen Recon Recruits
October 8, 2025 — Source or Source or Source or Source or Watch Video or Source
As real life banks close, network operator starts a Scam School to stop Granny getting mugged online
Broadband biz teams up with Good Things Foundation to teach the digitally doddery how to dodge fraud
October 8, 2025 — Source
AT&T to Pay Millions After Data Breaches — Here's How to Claim Up to $7,500
AT&T is facing major backlash as millions of customers affected by two data breaches are now eligible for compensation of up to $7,500 under a $177 million class action settlement. While AT&T denies wrongdoing, it agreed to settle to avoid prolonged litigation. A final approval hearing is set for December 3, 2025, and affected customers have until November 18, 2025, to file claims.
October 8, 2025 — Source
Cyber defense innovation could significantly boost 5G network security
A new framework, FedLLMGuard, integrates large language models and federated learning to enhance 5G network security. It enables real-time, accurate detection of cyber threats while preserving data privacy. Testing shows FedLLMGuard achieves 98.64% threat recognition accuracy in 0.0113 s, outperforming existing models and offering a scalable, efficient solution for 5G cybersecurity.
October 8, 2025 — Source
Cyber skills gap leads to escalating security risks
A Fortinet report reveals a growing cyber skills gap, leading to escalating security risks and rising breach rates. Organizations are adopting AI, but lack expertise hinders effective implementation.
October 8, 2025 — Source
CyberArk unveils new capabilities to reduce risk across human and machine identities
CyberArk announced new discovery and context capabilities across its Machine Identity Security portfolio. The enhancements enable security teams to find, understand and secure machine identities, spanning certificates, keys, secrets, workloads and more, reducing risk and simplifying compliance at scale.
October 8, 2025 — Source
DraftKings Warns Users of Credential Stuffing Attacks
Hackers accessed user accounts and compromised names, addresses, phone numbers, email addresses, and other information.
October 8, 2025 — Source
EU Unveils AI Tech Sovereignty Plans
AI Strategies Seeks to Bolster Its Position in the Global AI Race
October 8, 2025 — Source or Source or Source or Source or Source
Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
Hundreds of internet-exposed Oracle E-Business Suite instances may still be vulnerable to attacks.
October 8, 2025 — Source
Fake itch.io game pages are secretly stealing gamer accounts and planting malware
Malwarebytes has outlined a scam affecting the gaming platform Itch.io that exploits the trust between players and indie developers by impersonating popular games, such as Archimoulin. The scammers begin an attack by sending a direct message from a compromised account on a trusted platform like Discord, which increases the chance that victims will click the link.
October 8, 2025 — Source
Federal shutdown deals blow to already hobbled cybersecurity agency
A federal shutdown and expired cybersecurity law are crippling the Cybersecurity and Infrastructure Security Agency (CISA), reducing staff and hindering information sharing. This occurs amid increasing cyber threats.
October 8, 2025 — Source
Free Healthcare 'Toolkit' Ranks and Maps Third-Party Risk
Guide Helps Teams Prioritize, Recognizing Not All Vendors Pose Same Level of Risk
October 8, 2025 — Source or Source or Source or Source or Source
Germany Under Pressure to Oppose EU Chat Control Proposal
Signal and Rights Groups Urge Berlin to Reject CSAM Proposal Ahead of Key EU Vote
October 8, 2025 — Source or Source or Source or Source or Source
GitHub Adds Post-Quantum Secure SSH Key Exchange to Protect Git Data in Transit
GitHub is introducing a hybrid post-quantum secure SSH key exchange algorithm, sntrup761x25519-sha512, to protect Git data in transit from future quantum computer threats.
October 8, 2025 — Source
Google DeepMind's New AI Agent Finds and Fixes Vulnerabilities
The new product is called CodeMender and it can rewrite vulnerable code to prevent future exploits.
October 8, 2025 — Source
Google Offers Up to $20,000 in New AI Bug Bounty Program
The company has updated the program's scope and has combined the rewards for abuse and security issues into a single table.
October 8, 2025 — Source
Hackers exploit auth bypass in Service Finder WordPress theme
Threat actors are actively exploiting a critical vulnerability in the Service Finder WordPress theme that allows them to bypass authentication and log in as administrators.
October 8, 2025 — Source
Hospital Insider Breach Lasted 10 Years, Led to FBI Inquiry
Texas-Based Harris Health Says FBI Just Gave Green Light to Notify 5,000 Patients
October 8, 2025 — Source or Source or Source or Source or Source
Kaseya Buys Inky to Expand Email Threat Detection for MSPs
Email Security Acquisition Aims to Bring Cross-Platform Data to Phishing Defense
October 8, 2025 — Source or Source or Source or Source or Source
London police arrests suspects linked to nursery breach, child doxing
The UK Metropolitan Police has arrested two suspects following an investigation into the doxing of children online after a ransomware attack on a chain of London-based nurseries.
October 8, 2025 — Source
Netskope UZTNA adds policy control by device posture, risk, and role
Netskope has enhanced its Universal Zero Trust Network Access (UZTNA) solution. Comprised of Netskope One Private Access and Netskope Device Intelligence, Netskope's UZTNA solution extends beyond the core use case of delivering fast, consistent, secure access to remote and local users and devices to deliver deeper threat inspection of their diverse device ecosystems and private application traffic.
October 8, 2025 — Source
North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025
The hackers are believed to have stolen over $6 billion for the Pyongyang regime, financing its military programs.
October 8, 2025 — Source or Source
Radiflow Unveils New OT Security Platform
Radiflow360 provides enhanced visibility, risk management, and incident response capabilities for mid-sized industrial enterprises.
October 8, 2025 — Source or Source
Ransomware Group Claims Attack on Beer Giant Asahi
The hackers claim the theft of 27 gigabytes of data, including contracts, employee information, and financial documents.
October 8, 2025 — Source
Reading the Fine Print When Managing Vendor Risk
Risk and Compliance Review Professionals Can Save Millions and Help Avoid Breaches
October 8, 2025 — Source or Source or Source or Source or Source
Researchers Out Front Companies for Chinese Intelligence
Beijing-Based Institute Researches Steganography, Forensics, Network Penetration
October 8, 2025 — Source or Source or Source or Source or Source
Researchers uncover ClickFix-themed phishing kit
Palo Alto Networks researchers have discovered and analyzed "IUAM ClickFix Generator", a phishing kit that allows less skilled attackers to infect unsuspecting users with malware by using the increasingly popular ClickFix social engineering technique.
October 8, 2025 — Source
Telecoms wholesaler ICUK restores services after two-day DDoS pelting
No idea who's behind it, just happy it's over
October 8, 2025 — Source
The world's most sensitive computer code is vulnerable to attack. A new encryption method can help
Nowadays data breaches aren't rare shocks—they're a weekly drumbeat. From leaked customer records to stolen source code, our digital lives keep spilling into the open.
October 8, 2025 — Source
Varonis Interceptor stops AI-evasive email attacks
Varonis Systems announced the availability of Varonis Interceptor, a new approach to email security that uses multi-layered AI to detect and block social engineering attacks, even when they originate from trusted or compromised sources.
October 8, 2025 — Source
Virtual Event Today: Zero Trust & Identity Strategies Summit
Join the virtual event we dive into the world of digital identity management and the role of zero-trust principles and associated technologies.
October 8, 2025 — Source
Why CISOs Must Prioritize OT Penetration Testing
Penetration testing has been a well-established practice in IT security for decades, enabling organizations to identify weaknesses before threat actors can exploit them. In operational technology (OT) environments, the stakes are even higher. An attack on OT systems could have potentially disastrous consequences, putting lives and safety at risk. That's why OT penetration testing is rapidly becoming a priority.
October 8, 2025 — Source or Source
Why Enterprises Continue to Stick With Traditional AI
Explainability, Cost, Compliance Drive AI Choices in Enterprises
October 8, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — October 3rd, 2025
A new guide to tackle tech abuse of older people
A new guide addresses the increasing use of digital technology, such as smartphones and smart home devices, to perpetrate abuse against people over 60. Evidence indicates a significant proportion of older victims experience technology-enabled threats, stalking, and financial exploitation. The guide offers practical prevention strategies and aims to support frontline staff in identifying and responding to digital abuse.
October 3, 2025 — Source
Chrome 141 and Firefox 143 Patches Fix High-Severity Vulnerabilities
High-severity flaws were patched in Chrome's WebGPU and Video components, and in Firefox's Graphics and JavaScript Engine components.
October 3, 2025 — Source
Cyberattack halts shipments from Japan's biggest brewer
A cyberattack on Asahi Group has halted beverage shipments, including Asahi Super Dry, due to a system failure, though production itself is not directly affected. The disruption has not yet caused major shortages in stores, but concerns remain. Asahi's shares have dropped nearly 7% since the incident, and recovery timing is uncertain.
October 3, 2025 — Source
ESET releases free resources for Cybersecurity Awareness Month
ESET released a free Cybersecurity Awareness Kit for October, including updated training, a threat report, and a business security trial.
October 3, 2025 — Source
Hacking group claims theft of 1 billion records from Salesforce customer databases
A notorious predominantly English-speaking hacking group has launched a website to extort its victims, threatening to release about a billion records stolen from companies who store their customers' data in cloud databases hosted by Salesforce.
October 3, 2025 — Source
In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach
Other noteworthy stories that might have slipped under the radar: cybercriminals offer money to BBC journalist, LinkedIn user data will train AI, Tile tracker vulnerabilities.
October 3, 2025 — Source
Japanese beer giant Asahi confirms ransomware attack
Asahi, a major Japanese beer producer, confirmed a ransomware attack impacting its factories, leading to IT disruptions and potential data theft.
October 3, 2025 — Source
MokN Raises $3 Million for Phish-Back Solution
French cybersecurity startup MokN raised €2.6 million (~$3 million) for its deception-based identity protection solution, which uses honeypots to alert security teams.
October 3, 2025 — Source
Oneleet Raises $33 Million for Security Compliance Platform
Cybersecurity startup Oneleet raised $33 million to expand its security compliance platform, combining attack surface management with code scanning and other security tools.
October 3, 2025 — Source
Oracle links Clop extortion attacks to July 2025 vulnerabilities
Oracle has linked ongoing Clop ransomware extortion attacks to vulnerabilities patched in July 2025, urging customers to update their software.
October 3, 2025 — Source
Oracle Says Known Vulnerabilities Possibly Exploited in Recent Extortion Attacks
Oracle confirmed recent extortion emails targeting customers may stem from exploitation of vulnerabilities patched in July 2025 within their E-Business Suite.
October 3, 2025 — Source
Oracle Sees No Zero-Day Exploits Tied to Customer Extortion
Oracle acknowledges customers are being targeted by data-stealing extortionists, likely linked to Clop, who exploit previously identified vulnerabilities from the July 2025 patch update.
October 3, 2025 — Source or Source or Source or Source
Oracle tells Clop-targeted EBS users to apply July patch, problem solved
Researchers suggest internet-facing portals are exposing 'thousands' of orgs
October 3, 2025 — Source
Organizations Warned of Exploited Meteobridge Vulnerability
SecurityWeek reports a recently exploited vulnerability (CVE-2025-4008) in Meteobridge weather station devices allows remote command execution. CISA has added it to their Known Exploited Vulnerabilities catalog.
October 3, 2025 — Source
Presenting AI to the Board as a CISO? Here's a Template.
As organizations accelerate the adoption of generative AI, boards of directors and AI committees are asking new questions: Where is AI being used? What risks does it create? And how are we governing it?
October 3, 2025 — Source
Red Hat fesses up to GitLab breach after attackers brag of data theft
Red Hat confirmed attackers accessed and copied data from a dedicated consulting GitLab instance, claiming the incident was limited and notifying authorities.
October 3, 2025 — Source or Source
Renault and Dacia UK warn of data breach impacting customers
Renault and Dacia UK have warned customers of a data breach impacting personal information, including names, addresses, and vehicle details, due to a third-party cyberattack.
October 3, 2025 — Source
ShinyHunters launches Salesforce data leak site to extort 39 victims
ShinyHunters, linked to Scattered Lapsus$ Hunters, launched a data leak site extorting 39 companies after Salesforce breaches, threatening to release stolen data.
October 3, 2025 — Source
Trusted enclaves from Intel and AMD shown vulnerable to physical attacks
Academic teams bypass chip-level enclave protections with low-cost hardware
October 3, 2025 — Source
Unauthenticated RCE Flaw Patched in DrayTek Routers
The security defect can be exploited remotely via crafted HTTP/S requests to a vulnerable device's web user interface.
October 3, 2025 — Source
When loading a model means loading an attacker
You probably think twice before downloading a random app or opening an unfamiliar email attachment. But how often do you stop to consider what happens when your team downloads and loads a machine learning model?
October 3, 2025 — Source
Windows 10 Security Updates Stop Tomorrow, but This Free Program Can Keep Your PC Secure
If you can't upgrade your PC to Windows 11, you should sign up for the Extended Security Updates program ASAP.
October 3, 2025 — Source
Internet — Security Issues — September 29th, 2025
6 Best Enterprise Antivirus Software Choices
We reviewed the leading enterprise antivirus and EDR tools and found SentinelOne Singularity to be the best overall, followed closely by Microsoft Defender and CrowdStrike Falcon.
September 29, 2025 — Source
8 Best Enterprise Password Managers
After reviewing the top enterprise password managers in the market, I found Keeper to be the best overall, particularly for its ease of use, and management-focused feature set.
September 29, 2025 — Source
Akira ransomware: From SonicWall VPN login to encryption in under four hours
Four hours or less: that's how long it takes for Akira affiliates to break into organizations and deploy the ransomware on their systems, Arctic Wolf researchers have warned.
September 29, 2025 — Source or Source
Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention
The government has announced a support package, but a cybersecurity expert has raised some concerns.
September 29, 2025 — Source
DHS and CISA Announce Cybersecurity Awareness Month 2025
Secretary Noem has tasked CISA with leading the charge to secure America's cyberspace
September 29, 2025 — Source
Dutch Teens Arrested for Allegedly Helping Russian Hackers
One of the two 17-year-old boys allegedly walked by law enforcement and embassy offices carrying a Wi-Fi sniffer.
September 29, 2025 — Source
Forget numbers—your PIN could consist of a shimmy and a shake
In the near future, you may not need to touch a keypad to select a tip or pay for large purchases. All it may take is a swipe, tap or other quick gesture.
September 29, 2025 — Source
Harrods blames its supplier after crims steal 430k customers' data in fresh attack
Attackers make contact but negotiations fall on deaf ears
September 29, 2025 — Source
Harrods suffers new data breach exposing 430,000 customer records
UK retail giant Harrods has disclosed a new cybersecurity incident after hackers compromised a third-party supplier and stole 430,000 records with sensitive e-commerce customer information.
September 29, 2025 — Source
How EU's data protection regulation affected news and media websites
Following the implementation of the GDPR, EU news and media websites reduced online tracking and adopted more consent mechanisms compared to U.S. sites. Despite these changes, there was no statistically significant impact on EU websites' ability to provide content or maintain visitor engagement, indicating that content providers adapted without major negative effects on content availability or user interaction.
September 29, 2025 — Source
How to set up a passkey for your Microsoft account
Not to be confused with how to set up a passkey in Windows.
September 29, 2025 — Source
Jaguar Land Rover to partly resume output after cyberattack
Jaguar Land Rover will partially restart production after a damaging cyberattack, with the UK government providing a £1.5 billion loan guarantee to support the firm.
September 29, 2025 — Source
Japan's largest brewer suspends operations due to cyberattack
Asahi Group Holdings, Ltd (Asahi), the brewer of Japan's top-selling beer, has disclosed a cyberattack that disrupted several of its operations.
September 29, 2025 — Source
LockBit ransomware returns with a vengeance, affecting multiple OSes
No system is safe anymore. The newest variant of LockBit ransomware targets Windows, Linux, and VMware ESXi systems simultaneously.
September 29, 2025 — Source
Joint guidance on creating and maintaining a definitive view of your operational technology architecture
The Canadian Centre for Cyber Security (Cyber Centre) has joined the United Kingdom's National Cyber Security Centre (NCSC-UK) and the following international partners in releasing guidance on creating and maintaining a definitive view of operational technology (OT) architecture:
September 29, 2025 — Source
Lyin' and Cheatin', AI Models Playing a Game
OpenAI, Apollo Research Find Models Hide Misalignment; Training Cuts Deception
September 29, 2025 — Source or Source or Source or Source or Source
North Korea Fake Job Recruiters Up Their Backdoor Game
Eset: Lazarus Group Shares Backdoor With Newer Pyongyang Threat Actor
September 29, 2025 — Source or Source or Source or Source or Source
NowSecure Privacy helps organizations protect mobile apps from data leaks
NowSecure announced the release of NowSecure Privacy, a privacy solution for mobile applications. With this launch, developers, security teams, and privacy professionals gain the capabilities needed to identify and fix systemic blind spots that compromise mobile application privacy.
September 29, 2025 — Source
OneBlood Agrees to Pay $1M Settlement in Ransomware Hack
2024 Cyberattack Was One of Several on Other Blood Suppliers in US, UK
September 29, 2025 — Source or Source or Source or Source or Source
Phishing training doesn't stop your employees from clicking scam links - here's why
A UC San Diego study found phishing training programs are basically useless, with employees just as likely to click scam emails whether or not they took training.
September 29, 2025 — Source
Popular Neon app that pays users to share call recordings remains down for now - here's why
The service has been taken down, but the developer promises a relaunch in another one to two weeks.
September 29, 2025 — Source
Ransomware gang sought BBC reporter's help in hacking media giant
Threat actors claiming to represent the Medusa ransomware gang tempted a BBC correspondent to become an insider threat by offering a significant amount of money.
September 29, 2025 — Source
Senate Bill Seeks Privacy Protection for Brain Wave Data
MIND Act Asks FTC to Study Exploitation Risks for Neural Data Collected by Devices
September 29, 2025 — Source or Source or Source or Source or Source
Shutdown Threat Puts Federal Cyber on Edge
Cybersecurity Programs, Workforce Face Disruption If Congress Fails to Act
September 29, 2025 — Source or Source or Source or Source or Source
Tile exploit could let stalkers follow you with your own tracker — Bluetooth broadcasting flaw is relatively simple to exploit, researchers discover
Long in the Bluetooth.
September 29, 2025 — Source
UK Government Backs Jaguar Land Rover With 1.5B Pound Loan
The British government will guarantee a 1.5 billion pound loan to Jaguar Land Rover as the embattled carmaker grapples with the fallout of a September cyberattack that froze production and sales across the globe.
September 29, 2025 — Source or Source
Unpatched Cognex Cameras Expose Industrial Systems
Nearly a dozen serious vulnerabilities in a Cognex industrial smart camera will go without a patch because the company says the model is "too old to merit a fix."
September 29, 2025 — Source or Source
Who's Minding the Machines? The Identity Crisis Nobody Owns
Machine Identities Outpace Human Ones, But Accountability Lags Behind
September 29, 2025 — Source or Source or Source
You're likely not as immune to scams as you think—here's why
Recent data shows Australians lost over A$2 billion to scams in 2024, enabled by technology and exploiting human psychology—anyone can be vulnerable.
September 29, 2025 — Source
Internet — Security Issues — September 26th, 2025
8×8 Omni Shield blocks SMS fraud threats
8×8 has launched 8×8 Omni Shield Self-Service, a no-code SMS fraud protection tool that helps businesses to detect, monitor, and block threats like Artificially Inflated Traffic (AIT) in real time.
September 26, 2025 — Source
150,000 Records of Home Health Care Firm Exposed on Web
Researcher Finds Database of Sensitive Patient Info With No Password Protection
September 26, 2025 — Source or Source or Source or Source or Source
Attackers exploited critical Fortra GoAnywhere flaw in zero-day attacks (CVE-2025-10035)
CVE-2025-10035, a perfect CVSS 10.0 vulnerability in the Fortra GoAnywhere managed file transfer solution, has apparently been exploited in zero-day attacks before the patch was released on September 15, 2025.
September 26, 2025 — Source
Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks
Leading to remote code execution and privilege escalation, the flaws were exploited on Cisco ASA 5500-X series devices that lack secure boot.
September 26, 2025 — Source
Feds Isolate Cisco Firewalls to Defend Against 'Arcane Door'
CISA Issues Emergency Directive After Cisco Exploits Persist After Reboot
September 26, 2025 — Source or Source or Source or Source
How the EU Data Act Shifts Control Back to Users
Newly Implemented Rule to Boost Cloud Competition and AI Development
September 26, 2025 — Source or Source or Source or Source
In Other News: LockBit 5.0, Department of War Cybersecurity Framework, OnePlus Vulnerability
Other noteworthy stories that might have slipped under the radar: Co-op lost £206 million due to cyberattack, South Korean credit card company hacked, Maryland Transit Administration ransomware attack.
September 26, 2025 — Source
Interpol Says 260 Suspects in Online Romance Scams Have Been Arrested in Africa
The operation took place in July and August and focused on scams in which perpetrators build online romantic relationships to extract money from targets or blackmail them with explicit images, Interpol said.
September 26, 2025 — Source
New Chinese Espionage Hacking Group Uncovered
'RedNovember' Has Hacked Organizations in the US, Asia and Europe
September 26, 2025 — Source or Source or Source or Source or Source
New XCSSET macOS Malware Variant Hijacks Cryptocurrency Transactions
The malware now uses a four-stage infection chain, has an additional persistence mechanism, and also targets Firefox browser data.
September 26, 2025 — Source
No Patches for Vulnerabilities Allowing Cognex Industrial Camera Hacking
Cognex is advising customers to transition to newer versions of its machine vision products.
September 26, 2025 — Source
North Korea's Fake Recruiters Feed Stolen Data to IT Workers
North Korean threat actors pose as recruiters to steal developers' identities and supply them to fraudulent IT workers.
September 26, 2025 — Source
Recent Fortra GoAnywhere MFT Vulnerability Exploited as Zero-Day
Eight days before patches, a threat actor exploited CVE-2025-10035 as a zero-day to create a backdoor admin account.
September 26, 2025 — Source
Trackforce upgrades TrackTik with AI-powered incident reporting capabilities
Trackforce has launched ReportPro AI within its TrackTik platform, an enhancement to incident reporting designed for guards, supervisors, and compliance teams.
September 26, 2025 — Source
Internet — Security Issues — September 25th, 2025
As many as 2 million Cisco devices affected by actively exploited 0-day
Search shows 2 million vulnerable Cisco SNMP interfaces exposed to the Internet.
September 25, 2025 — Source
Battered by cyberattacks, Salesforce faces a trust problem - and a potential class action lawsuit
It's been a brutal year for Salesforce customers. ZDNET research reveals the CRM giant could be doing more to secure the parts of its platform exploited in recent attacks.
September 25, 2025 — Source
Chainguard Libraries for JavaScript provides developers with malware-free dependencies
Chainguard released Chainguard Libraries for JavaScript, a collection of trusted builds of thousands of common JavaScript dependencies that are malware-resistant and built from source on SLSA L2 infrastructure.
September 25, 2025 — Source
Chinese Cyberspies Hacked US Defense Contractors
RedNovember has been targeting government, defense and aerospace, and legal services organizations worldwide.
September 25, 2025 — Source
Chinese Hackers Lurked Nearly 400 Days in Networks With Stealthy BrickStorm Malware
Google's Threat Intelligence Group and Mandiant link the BrickStorm campaign to UNC5221, warning that hackers are analyzing stolen code to weaponize zero-day vulnerabilities.
September 25, 2025 — Source
CISA Issues Emergency Directive Requiring Federal Agencies to Identify and Mitigate Cisco Zero-Day Vulnerabilities
Agency Urges All Affected Organizations to Take Immediate Action to Protect their Devices
September 25, 2025 — Source
Cisco fixes IOS/IOS XE zero-day exploited by attackers (CVE-2025-20352)
Cisco has fixed 14 vulnerabilities in IOS and IOS XE software, among them CVE-2025-20352, a high-severity vulnerability that has been exploited in zero-day attacks.
September 25, 2025 — Source
Cisco Patches Zero-Day Flaw Affecting Routers and Switches
The security defect allows remote attackers with administrative privileges to execute arbitrary code as the root user.
September 25, 2025 — Source
CSA Unveils SaaS Security Controls Framework to Ease Complexity
New framework from the Cloud Security Alliance helps SaaS customers navigate the shared responsibility model with confidence.
September 25, 2025 — Source
DDoS attack volumes surge 41 percent as threats rapidly evolve
The latest Radar report from Gcore finds DDoS attacks have reached unprecedented scale and disruption in 2025, and businesses need to act fast to protect themselves from this evolving threat.
September 25, 2025 — Source
Did gambling operator Boyd Gaming pay ransom in cyberattack?
Boyd Gaming Corp. isn't saying whether it paid a ransom to cybercriminals who broke into its internal information technology systems.
September 25, 2025 — Source
Digital Experience Monitoring and Endpoint Posture Checks Usage in SASE
Learn how digital experience monitoring and endpoint posture checks integrate with SASE to enforce zero trust and ensure secure, reliable performance.
September 25, 2025 — Source
DOGE might be storing every American's SSN on an insecure cloud server
A report from Senate Democrats says DOGE moved sensitive information to a cloud server despite the risk of "catastrophic" impacts.
September 25, 2025 — Source
Empty shelves, empty coffers: Co-op pegs cyber hit at £80m
Supermarket says the hack that shut down systems and emptied shelves has turned profits into losses
September 25, 2025 — Source
How the fraud protection system is wrongly brandishing thousands of innocent banking customers
Hundreds of thousands of unsuspecting banking customers could be unknowingly slapped with a fraud marker without even knowing about it.
September 25, 2025 — Source
How to get free Windows 10 security updates through October 2026
Don't want to fork over $30 to keep getting Windows 10 security updates? Microsoft is offering a couple of ways to avoid the fee, but customers in Europe get the best deal.
September 25, 2025 — Source
How to remove yourself from Whitepages in 5 quick steps - and why you should
Is your name, address, and phone number on this popular website? Here's how to request removal and protect your privacy.
September 25, 2025 — Source
Malicious Rust packages on Crates.io steal crypto wallet keys
Two malicious packages with nearly 8,500 downloads in Rust's official crate repository scanned developers' systems to steal cryptocurrency private keys and other secrets.
September 25, 2025 — Source
Microsoft spots LLM-obfuscated phishing attack
Cybercriminals are increasingly using AI-powered tools and (malicious) large language models to create convincing, error-free emails, deepfakes, online personas, lookalike/fake websites, and malware.
September 25, 2025 — Source
Microsoft will offer free Windows 10 extended security updates in Europe
In a follow-up statement after the article was published, Microsoft told BleepingComputer that EEA customers will only be able to get free Windows 10 extended security updates if they log in to Windows and enroll using a Microsoft account.
September 25, 2025 — Source
New study shows 'massive spike' in fraudulent apps powered by AI
A new study says there has been a dramatic rise in the number of fraudulent mobile apps on both iOS and Android. Many of these appear to have been either generated with, or powered by, AI tools.
September 25, 2025 — Source
North Korean IT workers use fake profiles to steal crypto
ESET Research has published new findings on DeceptiveDevelopment, also called Contagious Interview. This North Korea-aligned group has become more active in recent years and focuses on stealing cryptocurrency. It targets freelance developers working on Windows, Linux, and macOS systems.
September 25, 2025 — Source
Onapsis enhances SAP security with latest platform updates
Onapsis announced updates to its Onapsis Platform, including the launch of three new capabilities: the SAP Notes Command Center, Rapid Controls for Dangerous Exploits, and Alert on Anything for SAP Business Technology Platform (BTP). Together, these enhancements provide organizations with insights, visibility, and automation to strengthen their SAP application security posture.
September 25, 2025 — Source
Perspective: Why Politics in the Workplace is a Cybersecurity Risk
Bringing politics into professional spaces undermines decision-making, collaboration, and ultimately weakens security teams.
September 25, 2025 — Source
PyPI Warns Users of Fresh Phishing Campaign
Threat actors impersonating PyPI ask users to verify their email for security purposes, directing them to fake websites.
September 25, 2025 — Source
RTX Confirms Airport Services Hit by Ransomware
The aerospace and defense giant has disclosed the cyberattack in a filing with the SEC.
September 25, 2025 — Source
Salesforce AI Hack Enabled CRM Data Theft
Prompt injection has been leveraged alongside an expired domain to steal Salesforce data in an attack named ForcedLeak.
September 25, 2025 — Source
SlimeMoldCrypt relies on gloopy living organism's ever-changing network of tendrils for its dynamic, biological, encryption engine — inventor claims concept is resistant to decryption 'even by quantum machines'
But treat your physarum polycephalum well, or it could die.
September 25, 2025 — Source
Steam beta helps players prep for games requiring Secure Boot or TPM
Steam Hardware Survey will also start collecting Secure Boot and TPM data
September 25, 2025 — Source or Source
Teen suspected of Vegas casino cyberattacks released to parents
A 17-year-old hacker who surrendered to face charges over cyberattacks targeting Vegas casinos in 2023 has been released into the custody of his parents, a family court judge ruled.
September 25, 2025 — Source
The Shai-Hulud Threat: Protecting Against Malicious npm Packages
The recent discovery of malicious JavaScript packages on npm, collectively known as "Shai-Hulud," highlights a critical issue in the open source community that affects not just developers but the broader ecosystem of applications and services relying on npm code.
September 25, 2025 — Source
Valve adds Secure Boot and TPM checks to Steam on Windows
In 2021, with the initial release of Windows 11, the average PC user got to learn two new terms: Trusted Platform Module, or TPM, and Secure Boot. These features became mandatory for those who want to run Windows 11 officially, but for everyone else, TPM and Secure Boot remained irrelevant.
September 25, 2025 — Source
Volvo Group Employee Data Stolen in Ransomware Attack
The Miljödata data breach has impacted numerous organizations, education institutions, and Swedish municipalities.
September 25, 2025 — Source
Zero-day deja vu as another Cisco IOS bug comes under attack
The latest in a run of serious networking bugs gives attackers root if they have SNMP access
September 25, 2025 — Source
Internet — Security Issues — September 22nd, 2025
Amazon account hacked? Here's what to do
Getting locked out of your Amazon account or seeing strange orders can be scary. Here's how to take back control and keep it safe.
September 22, 2025 — Source
AT&T And T-Mobile Employees Fooled By 20-Year Old Hacker Noah Urban, Compromising Customer Data Without Coding Skills
07.13.2013
September 22, 2025 — Source
Banks that identify fraudsters increase loyalty, retain more defrauded customers than others who never were compromised
Financial institutions are constantly fighting off fraudsters who steal money from customer accounts. Banks spend millions each year to figure out who was responsible and keep customers from leaving; however, in most cases it's nearly impossible to figure out who committed the fraud.
September 22, 2025 — Source
Best VPN services: 8 top picks for every VPN need
There are a lot of VPN options out there; we'll help you cut through the clutter.
September 22, 2025 — Source
Car giant Stellantis says customer data nicked after partner vendor pwned
Automaker insists only names and emails exposed, no financials
September 22, 2025 — Source
Data privacy push sparks tech surge in US banks
A new study led by Dr. Sarah Zhang from Alliance Manchester Business School has uncovered how small banks in the United States are reacting to growing concerns about data privacy.
September 22, 2025 — Source
EU's cyber agency blames ransomware as Euro airport check-in chaos continues
Airport staff revert to manual ops as travellers urged to use self-service check-in where possible
September 22, 2025 — Source
European Airport Disruptions Caused by Ransomware Attack
Collins Aerospace is reportedly having difficulties recovering from the ransomware attack.
September 22, 2025 — Source
FOMO? Brit banking biz rolls out AI tools, talks up security
Lloyds Data and AI lead doesn't want devs downloading models from the likes of Hugging Face -- too risky
September 22, 2025 — Source
HoundBytes Launches Automated Security Analyst
The Romania-based company has launched WorkHorse and is preparing for a funding round to accelerate growth.
September 22, 2025 — Source
LastPass: Fake password managers infect Mac users with malware
LastPass is warning users of a campaign that targets macOS users with malicious software impersonating popular products delivered through fraudulent GitHub repositories.
September 22, 2025 — Source
Microsoft patches terrifyingly serious Entra ID privilege elevation vulnerability
Details have emerged about a now-patched flaw in Microsoft Entra ID which could have been exploited to gain access to any tenant of any company in the world.
September 22, 2025 — Source
Mycroft Raises $3.5 Million for AI-Powered Security and Compliance Platform
The Canada-based company has emerged from stealth with autonomous AI agents designed to manage and operate the security and IT stack.
September 22, 2025 — Source
Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud
L1TF Reloaded is a vulnerability combining the old L1TF and half-Spectre hardware flaws to bypass deployed software mitigations.
September 22, 2025 — Source
Robots are prone to privacy leaks despite encryption
A new study from the University of Waterloo has unveiled major privacy weaknesses in collaborative robots—calling for stronger defenses.
September 22, 2025 — Source
Stellar Cyber 6.1 equips SecOps teams with multi-layer AI
Stellar Cyber announced Stellar Cyber 6.1, designed to help customers and partners advance toward a human-augmented autonomous SOC.
September 22, 2025 — Source
Sumo Logic brings agentic AI to the enterprise security stack
Enterprises face a growing volume and complexity of cyber threats which means security teams struggle with alert fatigue and managing a spread of tools.
September 22, 2025 — Source
Teenage Scattered Spider Suspect Arrested in Las Vegas
Juvenile Male Tied to Hack Attacks Against MGM Resorts and Caesars Entertainment
September 22, 2025 — Source or Source or Source or Source
Twitch streamer raising money for cancer treatment has funds stolen by malware-ridden Steam game — BlockBlasters title stole $150,000 from hundreds of players
Valve has since pulled "BlockBlasters" from its marketplace.
September 22, 2025 — Source
Why attackers are moving beyond email-based phishing attacks
Attackers are increasingly sending phishing links over non-email delivery channels like social media, instant messaging apps, and malicious search engine ads. In this article, we'll explore why phishing attacks are moving away from exclusively email-based delivery, and what this means for security teams.
September 22, 2025 — Source
Why the cybersecurity industry needs to be more accessible [Q&A]
The proliferation of different cybersecurity tools has created an operational crisis for organizations, with companies struggling to manage an increasing array of defensive technologies.
September 22, 2025 — Source
Widespread Infostealer Campaign Targeting macOS Users
Threat actors rely on malicious GitHub repositories to infect LastPass's macOS users with the Atomic infostealer.
September 22, 2025 — Source
Internet — Security Issues — September 19th, 2025
5 ways to spot software supply chain attacks and stop worms - before it's too late
A Dune-inspired worm recently hit CrowdStrike and npm, infecting hundreds of packages. Here's what happened - and how to protect your code.
September 19, 2025 — Source
$115 million ransomware hacker arrested over extortion attacks — Scattered Spider alumnus allegedly involved in over 120 computer network intrusions targeting 47 U.S. entities
The British national is accused of hacking over 120 computer networks and attacking close to 50 different U.S. entities.
September 19, 2025 — Source
Agentic AI and its impact on the healthcare sector [Q&A]
Agentic AI is changing healthcare workflows by moving from passive data analysis to active orchestration of decisions.
September 19, 2025 — Source
Alleged Scattered Spider teen cuffed after extortion Bitcoin used to buy games, meals
Feds say gift card splurges tied suspect to multimillion-dollar ransomware crew
September 19, 2025 — Source
Astra API Security Platform secures undocumented and vulnerable APIs
Astra Security has launched its API Security Platform, designed to identify undocumented, zombie, and shadow APIs that threaten infrastructure and expose sensitive PII. Instead of relying on reactive, siloed detection tools, Astra's platform delivers proactive, automated protection against attackers exploiting APIs to compromise systems.
September 19, 2025 — Source
ChatGPT Tricked Into Solving CAPTCHAs
The AI agent was able to solve different types of CAPTCHAs and adjusted its cursor movements to better mimic human behavior.
September 19, 2025 — Source or Source
CISA Analyzes Malware From Ivanti EPMM Intrusions
Hackers chained two Ivanti EPMM vulnerabilities to collect system information, dump credentials, and execute malware.
September 19, 2025 — Source
CISA exposes malware kits deployed in Ivanti EPMM attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published an analysis of the malware deployed in attacks exploiting vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM).
September 19, 2025 — Source
CNET Survey: 47% of Americans Use VPNs for Privacy. That Number Could Rise as State Internet Bans Increase
As more bans on internet content appear in the US, we reached out to users to see why and how they're adopting VPNs for a privacy fix.
September 19, 2025 — Source
Ding ding: Fortra rings the perfect-10 bell over latest GoAnywhere MFT bug
Outside experts say the vulnerability has probably already been exploited
September 19, 2025 — Source
ExpressVPN launches EventVPN, a free VPN service uilt for privacy
Apple users can now enjoy a reliable free VPN without worrying about data privacy.
September 19, 2025 — Source
Computer scientists are boosting US cybersecurity
As cyber threats grow more sophisticated by the day, UC Riverside researchers are making computing safer thanks to research that targets some of the internet's most pressing security challenges.
September 19, 2025 — Source
FBI Pushes Back Against Scrutiny Over Cyber Cuts, Vacancies
FBI Director Claims 'Supremely Qualified' Unnamed Leaders Replaced Cyber Officials
September 19, 2025 — Source or Source or Source or Source
FBI warns of cybercriminals using fake FBI crime reporting portals
The FBI warned today that cybercriminals are impersonating its Internet Crime Complaint Center (IC3) website in what the law enforcement agency described as "possible malicious activity."
September 19, 2025 — Source
Fortra warns of max severity flaw in GoAnywhere MFT's License Servlet
Fortra has released security updates to patch a maximum severity vulnerability in GoAnywhere MFT's License Servlet that can be exploited in command injection attacks.
September 19, 2025 — Source
Hackers Steal SonicWall Firewall Configurations
Hackers Accessed Backup Firewall Preference Files
September 19, 2025 — Source or Source or Source or Source or Source
ImmuniWeb offers free tool to test quantum resilience of TLS stacks
The tool analyzes SSL/TLS configurations and verifies their compliance with the latest quantum-resilient encryption standards from NIST. It also checks for adherence to PCI DSS, HIPAA, and other NIST cryptographic requirements. Available via both web interface and API, the tool is aimed at organizations looking to assess their preparedness for quantum-era threats. The tool is designed to simplify PQC readiness checks for organizations of all sizes, integrating into CI/CD pipelines via API for automated scanning.
September 19, 2025 — Source
In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek's Coding Bias
Noteworthy stories that might have slipped under the radar: Eve Security seed funding, Claroty report, patches from WatchGuard and Nokia.
September 19, 2025 — Source
Internal chaos after a cyberattack causes more damage than the attack itself
A new survey from cybersecurity incident response management (CIRM) specialist Cytactic finds 70 percent of cybersecurity leaders say internal misalignment following a cyberattack caused them more chaos than the threat actor itself, leaving many organizations paralyzed by breakdowns in authority, coordination, and clarity.
September 19, 2025 — Source
Irregular Secures $80M Series A to Combat AI Model Exploits
Startup Simulates Offensive and Defensive AI to Test and Thwart AI-Based Threats
September 19, 2025 — Source or Source or Source or Source
ISMG Editors: Security Acquisitions Face Cultural Challenges
In this week's update, three ISMG editors discussed Mitsubishi Electric's $883 million purchase plans for Nozomi Networks, the new Sandbox AI bill in Congress that aims to cut perceived red tape limiting AI innovation and takeaways from last week's annual Cybersecurity Summit: London Financial Services.
September 19, 2025 — Source or Source or Source or Source or Source
Ivanti EPMM holes let miscreants plant shady listeners, CISA says
Unnamed org compromised with two malware sets
September 19, 2025 — Source
James Bond Wannabes: The UK's Spy Office Says Learn to Use a VPN
A new dark web portal hopes to recruit spies for the UK, and Russians are especially wanted.
September 19, 2025 — Source
Known. Emerging. Unstoppable? Ransomware Attacks Still Evade Defenses
No, it's not new or particularly exotic, but after years of attacks, ransomware continues to rank among the most destructive threats facing global organizations today.
September 19, 2025 — Source
Michigan anti-porn law would also block VPNs
The workaround won't work.
September 19, 2025 — Source
Microsoft Disrupts RaccoonO365 Phishing Platform in Major Domain Takedown
Microsoft reports that it has seized 338 domains tied to RaccoonO365, a phishing-as-a-service operation it described as one of the fastest-growing criminal platforms targeting its users.
September 19, 2025 — Source
Netskope Raises Over $908 Million in IPO
Netskope has debuted on Nasdaq and its shares soared more than 18%, bringing the company's value to $8.6 billion.
September 19, 2025 — Source
New Texas Law Targets AI, Health Record Storage
Attorney Rachel Rose on Latest State Regulatory Health Data Considerations
September 19, 2025 — Source or Source or Source or Source or Source
New Tigera solution protects AI workloads from data ingestion to deployment
Tigera announced a new solution to secure AI workloads running in Kubernetes clusters. Due to the resource-intensive and bursty nature of AI workloads, Kubernetes has become the de facto orchestrator for deploying them. However AI workloads introduce security challenges, throughout the data ingestion and preparation, model training, and deployment stages.
September 19, 2025 — Source
One token to pwn them all: Entra ID bug could have granted access to every tenant
Until Microsoft lobbed it into a virtual volcano
September 19, 2025 — Source
Russian Nation-State Hackers Join Forces to Target Ukraine
First-Ever Malware Tie-Up Spotted Between FSB's Turla and Gamaredon Hacking Groups
September 19, 2025 — Source or Source or Source or Source or Source
Scattered Spider Hackers Charged in Connection Wibth Transport for London Attack
Scattered Spider Hackers Charged in Connection With Transport for London Attack
September 19, 2025 — Source
Turla and Gamaredon Working Together in Fresh Ukrainian Intrusions
Turla malware was deployed in February on select systems that Gamaredon had compromised in January.
September 19, 2025 — Source
Two of the Kremlin's most active hack groups are collaborating, ESET says
Turla is getting a helping hand from Gamaredon. Both are units of Russia's FSB.
September 19, 2025 — Source
Two Scattered Spider Suspects Arrested in UK; One Charged in US
Thalha Jubair and Owen Flowers were charged in the UK and the US with hacking critical infrastructure organizations.
September 19, 2025 — Source
Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking
Novakon HMIs are affected by remote code execution and information exposure vulnerabilities.
September 19, 2025 — Source
Vega Secures $65M to Scale SecOps, Take On Traditional SIEMs
Funding Supports Threat Hunting, Natural Language to Replace Legacy Detection
September 19, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — September 16th, 2025
ChatGPT's Calendar Integration Can Be Exploited to Steal Emails
Researchers show how a crafted calendar invite can trigger ChatGPT to exfiltrate sensitive emails.
September 16, 2025 — Source or Watch Video
China slaps 1-hour deadline on reporting serious cyber incidents
Cyberspace watchdog tightens reporting regime, leaving little time to hide incidents
September 16, 2025 — Source
Credit bureaus keep getting hacked. Protect yourself with 4 steps
Pass this advice on to friends and family, too.
September 16, 2025 — Source
Digital.ai brings expert-level cryptography to any developer team
Digital.ai released its App Sec White-box Cryptography Agent to simplify application security for developers and help customers ensure that every application requiring protection is secured.
September 16, 2025 — Source
Endpoint Security Firm Remedio Raises $65 Million in First Funding Round
The bootstrapped company will invest in an AI-powered unified enterprise platform combining configuration, compliance, patching, and vulnerability management.
September 16, 2025 — Source
ExpressVPN versus NordVPN: Two VPN Titans Battle It Out in a Contest That Goes Down to the Wire
I compared CNET's top two VPNs. Here's how they stack up.
September 16, 2025 — Source
FileFix attacks use fake Facebook security alerts to trick victims into running infostealers
Tech evolved from PoC to global campaign in under two months
September 16, 2025 — Source
Fraud Prevention Company SEON Raises $80 Million in Series C Funding
The company will invest in its AI and real-time detection platform, in global expansion, and in strategic partnerships.
September 16, 2025 — Source
GitHub adds post-quantum protection for SSH access
GitHub is adding post-quantum cryptography to secure SSH connections, a move that signals the company's preparation for a time when current encryption may no longer be safe.
September 16, 2025 — Source
Jaguar Land Rover extends shutdown after cyberattack by another week
Jaguar Land Rover (JLR) announced today that it will extend the production shutdown for another week, following a devastating cyberattack that impacted its systems at the end of August.
September 16, 2025 — Source
JLR stuck in neutral as losses skyrocket amid cyberattack cleanup
Latest extension to factory closures takes incident response into fourth week
September 16, 2025 — Source
Endpoint SecurityRowhammer Attack Demonstrated Against DDR5
Researchers devise Phoenix, a new Rowhammer attack that achieves root on DDR5 systems in less than two minutes.
September 16, 2025 — Source
N-able strengthens backup threat protection
N-able has enhanced the capabilities of Cove Data Protection with the launch of Anomaly Detection as a Service (ADaaS). Strengthening Cove's defense against cyberthreats, this service is built into Cove's architecture with no additional management overhead or cost impact.
September 16, 2025 — Source
Neon Cyber exits stealth with Workforce Cybersecurity Platform
Neon Cyber announced its emergence from stealth and unveiled its Workforce Cybersecurity Platform (WCP), delivering protection across browsers, SaaS applications, and enterprise systems in every department.
September 16, 2025 — Source or Source
New FileFix attack uses steganography to drop StealC malware
A newly discovered FileFix social engineering attack impersonates Meta account suspension warnings to trick users into unknowingly installing the StealC infostealer malware.
September 16, 2025 — Source
Pixel's Monthly Security Bulletins to List Only High-Risk Security Flaws
Google smartphones previously received an exhaustive bulletin on the first Monday of every month.
September 16, 2025 — Source
Private Internet Access review: A low-price, high-value VPN
This jack-of-all-trades VPN proves it's still one of the best.
September 16, 2025 — Source
Protecting Non-Human Identities: Why Workload MFA and Dynamic Identity Matter Now
Secrets can't secure non-human identities at scale. Modern workloads require verifiable identity and contextual trust to operate safely.
September 16, 2025 — Source
Ransomware attackers used incorrectly stored recovery codes to disable EDR agents
All target organizations are different, but ransomware attackers are highly adaptive and appreciate -- and will exploit -- any mistake you make.
September 16, 2025 — Source
Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection
Tel Aviv, Israel-based Ray Security emerged from stealth with $11 million seed funding and a desire to change the way corporate data is protected. The funding was co-led by Venture Guides and Ibex Investors.
September 16, 2025 — Source
Salesforce launches 'Missionforce,' a national security-focused business unit
Salesforce is increasing its focus on national security.
September 16, 2025 — Source
Security Analytics Firm Vega Emerges From Stealth With $65M in Funding
Vega provides security analytics and operations solutions designed to help organizations detect and respond to threats.
September 16, 2025 — Source
Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims
The notorious cybercrime groups claim they are going dark, but experts believe they will continue their activities.
September 16, 2025 — Source
Self-propagating worm fuels latest npm supply chain compromise
Intrusions bear the same hallmarks as recent Nx mess
September 16, 2025 — Source
Sentra enables organizations to leverage Copilot without compromising security
Sentra launched its solution for securing Microsoft 365 Copilot, enabling organizations to adopt Copilot with confidence while remaining compliant and protecting sensitive enterprise data.
September 16, 2025 — Source
Team-Wide VMware Certification: Your Secret Weapon for Security
But when your entire team is certified? That's a force multiplier for innovation, retention, and your security posture.
September 16, 2025 — Source or Source
US-Based Investors Ramp Up Spyware Investments
The international affairs think tank Atlantic Council added 20 US-based investors to its global list.
September 16, 2025 — Source
Internet — Security Issues — September 9th, 2025
160,000 Impacted by Wayne Memorial Hospital Data Breach
In May 2024, hackers stole names, Social Security numbers, financial information, and protected health information from the hospital's systems.
September 9, 2025 — Source< or Source
Another Plex data breach sees company urge users to change their password
A Plex data breach in 2022 exposed usernames, email addresses, and encrypted passwords. The company required all users to change their passwords as a precaution, and now history seems to be repeating itself.
September 9, 2025 — Source
Anti-spam service blocks links in Exchange Online and Teams
Since Friday, September 5, 2025, users of Exchange Online and Microsoft Teams have noticed that links can no longer be opened. The cause is Microsoft's anti-spam service, which blocks these links for individual users and even moves emails into quarantine. Microsoft is currently working to resolve this issue.
September 9, 2025 — Source or German
Best free antivirus 2025: Keep your PC safe without spending a dime
Many of the big names in antivirus offer a free version of their security suites. Here are our top choices for free antivirus.
September 9, 2025 — Source
Cisco puts agentic AI at the core of Splunk Enterprise Security
Cisco introduced Splunk Enterprise Security Essentials Edition and Splunk Enterprise Security Premier Edition, providing customers two agentic AI-powered SecOps options that unify security workflows across threat detection, investigation, and response (TDIR).
September 9, 2025 — Source
Defense Dept didn't protect social media accounts, left stream keys out in public
'The practice... has since been fixed,' Pentagon official tells The Reg
September 9, 2025 — Source
Download: Cyber defense guide for the financial sector
Data breaches cost more for financial organizations than they do for those in many other industries. In attempting to strengthen your financial organization’s cybersecurity, you must contend with evolving regulatory obligations, outdated IT infrastructure, and other challenges.
September 9, 2025 — Source
Ex-WhatsApp Employee Sues Meta Over Vulnerabilities, Retaliation
Attaullah Baig has filed a lawsuit against Meta and its executives, accusing them of retaliation over critical cybersecurity failures.
September 9, 2025 — Source
Exposed Docker APIs Likely Exploited to Build Botnet
Hackers mount the host’s file system into fresh containers, fetch malicious scripts over the Tor network, and block access to the Docker API.
September 9, 2025 — Source
Fake npm 2FA reset email led to compromise of popular code packages
Malicious versions of at least 18 widely used npm packages were uploaded to the npm Registry on Monday, following the compromise of their maintainer’s account.
September 9, 2025 — Source
Firmware is the weak link in your PC's security. Here's how to stay safe
Since firmware runs your PC and is deeply integrated into your hardware, it's the perfect vector for cyberattacks.
September 9, 2025 — Source
Gigamon harnesses agentic AI to deliver guidance for security and IT teams
As cyber adversaries increasingly use AI to move faster and exploit blind spots, security, network, and application teams face mounting challenges, not helped by a global shortage of skilled professionals.
September 9, 2025 — Source
Hackers Compromise 18 NPM Packages in Supply Chain Attack
Attacker Socially Engineered Developer With Phishing Email
September 9, 2025 — Source or Source or Source or Source or Source
Hackers hide behind Tor in exposed Docker API breaches
A threat actor targeting exposed Docker APIs has updated its malicious tooling with more dangerous functionality that could lay the foundation for a complex botnet.
September 9, 2025 — Source
Hand-Tool Maker Says Hack Compromised Medical Info
Breach Affecting 104,000 Underscores Health Data Risks for Non-Healthcare Firms
September 9, 2025 — Source or Source or Source or Source or Source
Here's What Blocks In-Progress Ransomware Attacks the Best
Tops: Rapidly Acting on Security Software Alerts and Calling in Incident Responders
September 9, 2025 — Source or Source or Source or Source or Source
Hummingbird’s compliance and risk platform helps financial institutions manage risk
Hummingbird announced its unified platform for risk and compliance operations. The expanded platform brings together the full risk and compliance lifecycle with the launch of new solutions for both Transaction & Risk Monitoring and Customer Screening.
September 9, 2025 — Source
I'm a PC security expert. These are the 5 dumbest mistakes I've made
I've learned a lot about PC security, but I've also made some cringeworthy mistakes. Here are some of the biggest!
September 9, 2025 — Source
Kosovo hacker pleads guilty to running BlackDB cybercrime marketplace
Kosovo national Liridon Masurica has pleaded guilty to running BlackDB.cc, a cybercrime marketplace that has been active since 2018.
September 9, 2025 — Source
Microsoft Patches 86 Vulnerabilities
Microsoft has released patches for dozens of flaws in Windows and other products, including ones with ‘exploitation more likely’ rating.
September 9, 2025 — Source or Source
Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion
he industrial cybersecurity firm will become a wholly owned subsidiary of Mitsubishi Electric.
September 9, 2025 — Source or Source or Source or Source or Source or Source
More packages poisoned in npm attack, but would-be crypto thieves left pocket change
Miscreants cost victims time rather than money
September 9, 2025 — Source
Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal
Nearly 500 scientists and researchers have signed an open letter warning that the latest version of the EU’s Chat Control Proposal would weaken digital security while failing to deliver meaningful protection for children.
September 9, 2025 — Source
NetApp StorageGRID 12.0 powers AI and data-intensive workloads
NetApp has released NetApp StorageGRID 12.0, a scalable, software-defined object storage solution designed for unstructured data. This latest version of StorageGRID introduces new capabilities designed to enhance AI initiatives, improve data security, and modernize organizations’ data infrastructure.
September 9, 2025 — Source
New cybersecurity rules land for Defense Department contractors
Now if only someone would remember to apply those rules inside the DoD
September 9, 2025 — Source
Ransomware costs jump 17 percent though insurance claims fall
A new report from risk solutions company Resilience shows in the first half of 2025, the average cost of an individual ransomware attack rose by 17 percent, while the volume of incurred claims across Resilience's portfolio dropped by 53 percent, highlighting the persistent and destructive threat of financially motivated cybercrime.
September 9, 2025 — Source
Ransomware Losses Climb as AI Pushes Phishing to New Heights
Based on real-world insurance claims, Resilience’s midyear report shows vendor risk is declining but costly, ransomware is evolving with triple extortion, and social engineering attacks are accelerating through AI.
September 9, 2025 — Source
Relyance AI Data Defense Engineer secures AI-driven data
Relyance AI has released Data Defense Engineer, an AI-native feature that works 24/7 to understand, monitor, and protect thousands of data journeys, learns from every interaction, and autonomously enforces policies at machine speed.
September 9, 2025 — Source
SAP fixes maximum severity NetWeaver command execution flaw
SAP has addressed 21 new vulnerabilities affecting its products, including three critical severity issues impacting the NetWeaver software solution.
September 9, 2025 — Source or Source or Source
SentinelOne to Acquire Observo AI in $225 Million Deal
SentinelOne is buying Observo AI for a combination of cash and stock to boost its SIEM and data offerings.
September 9, 2025 — Source
Silobreaker Requirements enables teams to improve threat intelligence
Silobreaker has launched Requirements, a new way for threat intelligence (TI) teams to define, operationalize and measure Priority Intelligence Requirements (PIRs).
September 9, 2025 — Source
Signal adds secure backup option for chat history
Losing a phone can mean losing years of conversations. Signal is rolling out a new secure backup feature to help users keep their messages safe without giving up privacy.
September 9, 2025 — Source
SOC Agents: The New AI Gamble
In the Rush for AI-Run SOCs, Security Experts Warn of Trust and Governance Issues
September 9, 2025 — Source or Source or Source or Source or Source
Taking a holistic approach to human risk management
We tend to think of cybersecurity as being a technology problem, but in fact it's often about humans. Attackers exploit our weaknesses with social engineering, phishing and other attacks designed to trick us into giving up valuable information.
September 9, 2025 — Source
These 18 Popular VPNs Share Parent Companies and Privacy Risks
A new study found several popular VPNs are secretly connected through shared ownership, highlighting the importance of understanding who is behind your chosen VPN.
September 9, 2025 — Source
This 2FA phishing scam pwned a developer - and endangered billions of npm downloads
'Stay vigilant.' Other maintainers have been targeted, too.
September 9, 2025 — Source
Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations
The attacker deployed multiple malware families, including two backdoors and a proxy tunneller, and various reconnaissance tools.
September 9, 2025 — Source
U.S. sanctions cyber scammers who stole billions from Americans
The U.S. Department of the Treasury has sanctioned several large networks of cyber scam operations in Southeast Asia, which stole over $10 billion from Americans last year.
September 9, 2025 — Source
US Feds Indict LockerGoga and MegaCortex Ransomware Hacker
State Department Offers Up to $10M for Tips on Volodymyr Tymoshchuk
September 9, 2025 — Source or Source or Source or Source
Vanta embeds agentic AI into policy and evidence workflows
Vanta has unveiled a new set of capabilities that integrates AI across core compliance and risk workflows. These features unify policy management with the Vanta AI Agent, expand first-party risk oversight and continuous monitoring for vendors, and deepen integrations, providing security leaders with a single system of record to act on risk before it escalates.
September 9, 2025 — Source
What the Plex? Streaming service suffers yet another password spill
For the third time in a decade
September 9, 2025 — Source
Zero Trust's Next Phase: Agility, Identity, AI Risks
Why CISOs Must Rethink Access, Behavioral Analytics and AI Governance at Scale
September 9, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — September 5th, 2025
Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool
Called A2, the framework mimics human analysis to identify vulnerabilities in Android applications and then validates them.
September 5, 2025 — Source
Another Risk From Agentic AI Payments - First-Party Fraud
ACI Worldwide's Cleber Martins on Why Banks Need to Lead on AI Identity Governance
September 5, 2025 — Source or Source or Source or Source or Source
Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
A critical vulnerability (CVE-2025-42957) in SAP S/4HANA enterprise resource planning software is being exploited by attackers "to a limited extent", the Dutch National Cyber Security Center (NCSC NL) has warned on Friday.
September 5, 2025 — Source
Best practices for migrating users to passkeys with Credential Manager
In a world where digital security is becoming increasingly critical, passwords have become a notorious weak link -- they're cumbersome, often insecure, and a source of frustration for users and developers. But there's good news: passkeys are gaining popularity as the most user-friendly, phishing-resistant, and secure authentication mechanism available.
September 5, 2025 — Source
Breach Roundup: Scattered Lapsus$ Hunters Behind Jaguar Hack
Also, Disney Pays $10M to Settle Child Privacy Case, Spain Scraps Huawei Deal
September 5, 2025 — Source or Source or Source or Source or Source
FireCompass Raises $20 Million for Offensive Security Platform
The AI-powered automated penetration testing firm will invest the new funds in R&D, team expansion, and global scale.
September 5, 2025 — Source
HHS Says It's 'Cracking Down' on Health Information Blocking
Feds Ramp Up Enforcement of 21st Cures Act Regs Including Fines up to $1 Million
September 5, 2025 — Source or Source or Source or Source
Hirsch Velocity 3.9 turns security into business value
Hirsch released Velocity 3.9, the latest advancement in its security management platform. Purpose-built for organizations that demand trust, compliance, and operational efficiency, Velocity 3.9 helps leaders safeguard people, assets, and data while simplifying operations at scale.
September 5, 2025 — Source
How to Close the AI Governance Gap in Software Development
Widespread adoption of AI coding tools accelerates development—but also introduces critical vulnerabilities that demand stronger governance and oversight.
September 5, 2025 — Source
In Other News: Scammers Abuse Grok, US Manufacturing Attacks, Gmail Security Claims Debunked
Noteworthy stories that might have slipped under the radar: Google fined €325 million, City of Baltimore sent $1.5 million to scammer, Bridgestone targeted in cyberattack.
September 5, 2025 — Source
Recent SAP S/4HANA Vulnerability Exploited in Attacks
A critical SAP S/4HANA code injection flaw tracked as CVE-2025-42957 and allowing full system takeover has been exploited in the wild.
September 5, 2025 — Source
Shift5 Gets $75M for Cyber Push in Defense and Transit
Startup to Expand Dual-Use Tech, Tackle GPS Jamming Threats With Series C Funding
September 5, 2025 — Source or Source or Source or Source or Source
Stealthy attack serves poisoned web pages only to AI agents
AI agents can be tricked into covertly performing malicious actions by websites that are hidden from regular users' view, JFrog AI architect Shaked Zychlinski has found.
September 5, 2025 — Source
The Best VPNs for PC
If you're feeling overwhelmed by the many VPNs for PCs that are now available, you're not alone. At times, it can be hard to separate the marketing hype from reality. For example, many VPNs claim to provide the fastest speeds, but it's not fair or entirely realistic for you to try every single one of them out to find out. This is where our many hours of hands-on testing comes in useful.
September 5, 2025 — Source
Threat detection for SharePoint vulnerabilities
The Canadian Centre for Cyber Security (Cyber Centre) is actively tracking multiple campaigns exploiting recently disclosed critical vulnerabilities in on-premises Microsoft SharePoint servers, including CVE-2025-49704, CVE-2025-49706, CVE-2025-53770 and CVE-2025-53771. These widespread campaigns leverage an exploit chain known as ToolShell.
September 5, 2025 — Source
Internet — Security Issues — September 4th, 2025
AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
An AI supply chain issue named Model Namespace Reuse can allow attackers to deploy malicious models and achieve code execution.
September 4, 2025 — Source
Bridging Cybersecurity and Biosecurity With Threat Modeling
Structured Approach to Mitigate Vulnerabilities and Risks in Synthetic Biology Labs
September 4, 2025 — Source or Source
Cyber security hygiene best practices for your organization - ITSAP.10.102
Cyber security hygiene refers to the best practices your organization can take to maintain the overall health and security of your IT environment. Your cyber security hygiene helps you better defend your networks, systems and data from threat actors.
September 4, 2025 — Source
CyberFlex: Flexible Pen testing as a Service with EASM
CyberFlex is an Outpost24 solution that combines the strengths of its Pen-testing-as-a-Service (PTaaS) and External Attack Surface Management (EASM) solutions. Customers benefit from continuous coverage of their entire attack application attack surface, while enjoying a flexible consumption model. Outpost24's expert pen testers deliver deep, actionable insights on critical apps, with ongoing management as an extension of your security team.
September 4, 2025 — Source
Dutch Lab Cancer Screening Hack Balloons to 941,000 Victims
Ransomware Gang Nova Poised to Leak Patient Data, Lab Stays Mum on Negotiations
September 4, 2025 — Source or Source or Source or Source or Source
EU Court Preserves EU-US Data Privacy Framework
The EU General Court Gives Victory to Backers of Trans-Atlantic Data Flows
September 4, 2025 — Source or Source or Source or Source
Hackers Exploit Sitecore Zero-Day for Malware Delivery
Google has observed ViewState deserialization attacks leveraging a sample machine key exposed in older deployment guides.
September 4, 2025 — Source
Here's How ICE Will Use Israeli Spyware
The Immigrations and Customs Enforcement agency has been in the midst of a particularly large crackdown on immigrants.
September 4, 2025 — Source
Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
Google has provided fixes for over 100 Android vulnerabilities, including CVE-2025-48543 and CVE-2025-38352, which "may be under limited, targeted exploitation."
September 4, 2025 — Source
I haven't gotten PC malware in a decade. Here are my 7 simple secrets
Tips to keep your PC free of malware!
September 4, 2025 — Source
Incogni versus DeleteMe: I compared the two best data removal services, and there's a clear winner
Incogni and DeleteMe are data removal services that can help you lock down your data, but they specialize in different areas. Read on to discover which service will suit you best.
September 4, 2025 — Source
Insider breaches hit 61 percent of enterprises
A new study sponsored by OPSWAT, a specialist in critical infrastructure protection, reveals that organizations face escalating risks from insider activity, legacy tools, and the growing complexity of artificial intelligence (AI).
September 4, 2025 — Source
LinkedIn expands company verification, mandates workplace checks for certain roles
LinkedIn is rolling out new verification rules to make it easier to confirm that people and companies are who they claim to be. The company will now require workplace verification when someone adds or updates a leadership or recruiter role on their profile. The goal is to cut down on fake accounts and scams while helping businesses, recruiters, and professionals build credibility.
September 4, 2025 — Source
LinkedIn is cracking down on fake recruiters and executive impersonators - here's how
New verification options are rolling out to protect you from scams.
September 4, 2025 — Source
macOS Security in 2025: Where Apple Excels—and Where You Still Need Layers
or years, Apple marketed the Mac as "more secure," and the idea stuck because the machines often fit the bill: with a smaller share of targets, attackers turned their attention elsewhere. Since then, the landscape has evolved considerably. From coffee shops and airport lounges, to co-working spaces, Macs can be rather ubiquitous these days. Unfortunately, this means that it's drawing even more attention from a variety of people, including bad actors, criminals and researchers alike.
September 4, 2025 — Source
macOS vulnerability allowed Keychain and iOS app decryption without a password
Today at Nullcon Berlin, a researcher disclosed a macOS vulnerability (CVE-2025-24204) that allowed attackers to read the memory of any process, even with System Integrity Protection (SIP) enabled.
September 4, 2025 — Source
Microsoft Backs Sola's $35M Push Into Autonomous AI Security
Series A Fuels Deeper AI, Expanded Integrations and Product-Led Growth Adoption
September 4, 2025 — Source or Source or Source or Source or Source
New enterprise browser aimed at securing BYOD and third-party devices
Check Point is launching a new Enterprise Browser, extending zero trust security to unmanaged devices like BYOD, contractors, and third-party partners.
September 4, 2025 — Source
New threat group uses custom tools to hijack search results
ESET Research has identified a new threat group called GhostRedirector. In June 2025, this group broke into at least 65 Windows servers, mostly in Brazil, Thailand, Vietnam, and the United States.
September 4, 2025 — Source
ODNI Cuts to Threat Sharing Raise Fears of Weakened Defenses
A Trump administration plan to dismantle a cyberthreat intelligence hub could undercut efforts to prevent the next major cyberattack on U.S. critical infrastructure, warn analysts.
September 4, 2025 — Source or Source or Source or Source
OT Security: When Shutting Down Is Not an Option
Elevate OT Cyber Skills Through Training, Collaboration and Practice
September 4, 2025 — Source or Source or Source or Source or Source
Researcher Unearths Thousands of Leaked Secrets in GitHub's "Oops Commits"
Security researcher Sharon Brizinov, in collaboration with Truffle Security, has conducted a sweeping investigation of GitHub's "oops commits", force-pushed or deleted commits that remain archived, and uncovered thousands of secrets left behind, including high-value tokens and admin-level credentials. The team also released an open-source tool to help others scan their own repositories for such hidden leakages.
September 4, 2025 — Source
Researchers discover a GPU vulnerability that could threaten AI models
A team of computer scientists at the University of Toronto recently discovered that a certain type of hardware attack is effective against graphics processing units (GPUs), the core computing engines that power today's artificial intelligence models and cloud-based machine learning services.
September 4, 2025 — Source
Sitecore zero-day vulnerability exploited by attackers (CVE-2025-53690)
A threat actor is leveraging a zero-day vulnerability (CVE-2025-53690) and an exposed sample ASP.NET machine key to breach internet-facing, on-premises deployments of several Sitecore solutions, Mandiant has revealed.
September 4, 2025 — Source
Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams
The Israeli startup's AI-powered no-code platform helps security teams design and deploy custom apps in minutes—tackling tool sprawl without heavy engineering.
September 4, 2025 — Source
Stealerium Malware's Creepy New Trick Is To Snap Webcam Pics Of Victims Watching Adult Content
We have reported several malware campaigns where hackers buy expensive malware programs from various sources across the web. Recently, a cybersecurity firm, Proofpoint, has revealed that hackers are now using a free, open-source malware dubbed Stealerium to launch sophisticated attacks that help them steal data and even snap photos of victims in the act of watching adult content.
September 4, 2025 — Source
Tire giant Bridgestone confirms cyberattack impacts manufacturing
Car tire giant Bridgestone confirms it is investigating a cyberattack that impacts the operation of some manufacturing facilities in North America.
September 4, 2025 — Source
Two Exploited Vulnerabilities Patched in Android
Elevation of privilege flaws in Android Runtime (CVE-2025-48543) and Linux kernel (CVE-2025-38352) have been exploited in targeted attacks.
September 4, 2025 — Source
US Offers $10 Million for Three Russian Energy Firm Hackers
Marat Tyukov, Mikhail Gavrilov, and Pavel Akulov targeted US critical infrastructure and over 500 energy companies in 135 countries.
September 4, 2025 — Source
US, Allies Push for SBOMs to Bolster Cybersecurity
SBOM adoption will drive software supply chain security, decreasing risks and costs, and improving transparency.
September 4, 2025 — Source
Why Most AI Pilots Never Take Flight
95% of Enterprise AI Stuck in Pilot Purgatory: How Do the Rest Succeed?
September 4, 2025 — Source or Source
Wytec Expects Significant Financial Loss Following Website Hack
Wytec's website was defaced twice by unknown threat actors more than a week ago and it has yet to be brought back online.
September 4, 2025 — Source
Internet — Security Issues — September 1st, 2025
A new attack reshapes the rules of Bitcoin mining
A new study by an SUTD researcher and his collaborators introduces a pooled mining attack that overturns a long-standing assumption about Bitcoin's security economics.
September 1, 2025 — Source
Amazon disrupts Russian APT29 hackers targeting Microsoft 365
Researchers have disrupted an operation attributed to the Russian state-sponsored threat group Midnight Blizzard, which sought access to Microsoft 365 accounts and data.
September 1, 2025 — Source
Build Job-Ready IT and Cybersecurity Skills with Hands-On Labs
Tech careers aren't built on theory alone — employers want candidates with real tools, practical skills, and the ability to solve problems in live environments. The 2025 Complete Defensive Cyber Security Bundle delivers exactly that, giving you 12 structured courses designed to be followed at your own pace, all taught by seasoned professionals.
September 1, 2025 — Source
DDoS is the neglected cybercrime that's getting bigger. Let's kill it off
Don't worry, there's a twist at the end
September 1, 2025 — Source
Law Enforcement Operation Seizes Fake ID Platform VerifTools
FBI Seizes Domains; Dutch Police Analyzing Seized Data to Identify Admin and Users
September 1, 2025 — Source or Source or Source or Source or Source
Over 16,000 compromised servers uncovered using Secure Shell key probing method
An international research team from the Max Planck Institute (MPI) for Informatics in Saarbrücken, Germany, and the Delft University of Technology in the Netherlands has developed a method to detect compromised hosts at an internet scale by probing servers with public SSH keys previously observed in attacker operations.
September 1, 2025 — Source
Palo Alto, Fortinet, Check Point Control Firewall Gartner MQ
Cisco Visionary, HPE Juniper Challenger in Inaugural Hybrid Mesh Firewall Ranking
September 1, 2025 — Source or Source or Source or Source or Source
Pentagon Probes Microsoft's Use of Chinese Coders
The U.S. Department of Defense is reviewing Microsoft's use of Chinese nationals to write code for military cloud infrastructure following reports that the tech firm used inexperienced U.S. citizens to putatively oversee foreign coders.
September 1, 2025 — Source or Source or Source or Source
Report on social media age assurance trial says there is not a one-size-fits-all solution
Australia's government trial has found age-assurance for its under-16 social media ban can be done effectively and protect privacy, but there is not a one-size-fits-all model.
September 1, 2025 — Source
Sneaky New Android Malware Steals PIN Codes And Keystrokes, What To Look Out For
Android users are currently at risk of a scarily advanced malware that reportedly uses Meta's advertising platforms (like Facebook and Instagram) to hunt for users' PINs, messages, and other sensitive data. The malware which has been active since at least July 22, especially targets crypto assets.
September 1, 2025 — Source
Why one-time security assessments are no longer sufficient [Q&A]
With cyber threats becoming more numerous and ever more sophisticated, it's becoming more critical than ever for organizations to prioritize targeted threats, optimize their existing defensive capabilities and proactively reduce their exposure.
September 1, 2025 — Source
Zscaler data breach exposes customer info after Salesloft Drift compromise
Cybersecurity company Zscaler warns it suffered a data breach after threat actors gained access to its Salesforce instance and stole customer information, including the contents of support cases.
September 1, 2025 — Source
Internet — Security Issues — August 29th, 2025
A growing number of states are restricting corporate use of facial recognition
Federal inaction has left biometric data unregulated
August 29, 2025 — Source
Age checks spread across the US as critics warn of privacy and free speech risks
Technology and legal challenges are complicating how online ages are verified
August 29, 2025 — Source
Attackers use "Contact Us" forms and fake NDAs to phish industrial manufacturing firms
A recently uncovered phishing campaign -- carefully designed to bypass security defenses and avoid detection by its intended victims -- is targeting firms in industrial manufacturing and other companies critical to various supply chains, Check Point researchers have warned.
August 29, 2025 — Source
Austrian regulator sides with noyb in data access case against YouTube
Back in January 2019, Austrian privacy group, None of Your Business (Noyb) filed eight strategic complaints against a bunch of streaming services. The list included Netflix, Spotify, and YouTube, which were all accused of failing to comply with the "right to access" guaranteed under Article 15 of the GDPR.
August 29, 2025 — Source or Source
AWS catches Russia's Cozy Bear clawing at Microsoft credentials
Amazon today said it disrupted an intel-gathering attempt by Russia's APT29 to trick Microsoft users into unwittingly granting the Kremlin-backed cyberspies access to their accounts and data.
August 29, 2025 — Source
Bridging the IT-OT Security Divide in Manufacturing
CISO Tammy Klotz Discusses the Value of Peer Support in Advance of ManuSec 2025
August 29, 2025 — Source or Source or Source or Source
Enterprise password management outfit Passwordstate patches Emergency Access bug
Up to 29,000 organizations and potentially 370,000 security and IT pros affected
August 29, 2025 — Source
Google Confirms Workspace Accounts Also Hit in Salesforce--Salesloft Drift Data Theft Campaign
Google says the same OAuth token compromise that enabled Salesforce data theft also let hackers access a small number of Workspace accounts via the Salesloft Drift integration.
August 29, 2025 — Source
Hackers chained Apple and WhatsApp flaws in 'advanced spyware campaign'
A few days ago, Apple fixed a vulnerability on iOS and macOS that "may have been exploited in an extremely sophisticated attack against specific targeted individuals." Now, new details have emerged, and it appears that the hacking campaign also leveraged a now-fixed WhatsApp flaw to target its victims.
August 29, 2025 — Source
Halo Security platform updates give teams better control over exposure data
Halo Security announced platform enhancements designed to give security teams flexibility and control within the platform.
August 29, 2025 — Source
In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks
SecurityWeek's cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar.
August 29, 2025 — Source
ISMG Editors: Whistleblower's Social Security Data Bombshell
In this week's update, four ISMG editors discussed explosive whistleblower claims about alleged mishandling of Americans' sensitive U.S. Social Security data, Netskope's push for an initial public offering and the global fight over the geopolitical sovereignty of artificial intelligence platforms.
August 29, 2025 — Source or Source or Source or Source or Source
Massive TransUnion breach leaks personal data of 4.4 million customers - what to do now
Swiped data includes social security numbers. Even if you're not one of the unlucky 4.4 million, you might want to take these defensive measures anyway.
August 29, 2025 — Source
Microsoft to enforce MFA for Azure resource management in October
Starting in October, Microsoft will enforce multi-factor authentication (MFA) for all Azure resource management actions to protect Azure clients from unauthorized access attempts.
August 29, 2025 — Source
Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions
State officials confirm ransomware forced office closures, disrupted services, and led to data theft, as Nevada works with CISA and law enforcement to restore critical systems.
August 29, 2025 — Source
Nevada Dental Practice Notifying 1.2M of Hack
Absolute Dental Says Breach Involved Third-Party Managed Services Firm
August 29, 2025 — Source or Source or Source or Source or Source
New 'sophisticated' malware threat may already be hiding on your Mac
JSCoreRunner is malware that spreads through what appears to be a free PDF converter app distributed on thew web.
August 29, 2025 — Source
OpenAI, Anthropic Swap Safety Reviews
OpenAI and Anthropic swapped artificial intelligence models evaluations over the summer, testing the other company's models for behaviors that could indicate misalignment risks. The companies released their findings simultaneously, finding that no model was severely problematic, but that all demonstrated troubling behaviors in artificial testing scenarios.
August 29, 2025 — Source or Source or Source or Source or Source
Pentagon Probes Microsoft's Use of Chinese Coders
The U.S. Department of Defense is reviewing Microsoft's use of Chinese nationals to write code for military cloud infrastructure following reports that the tech firm used inexperienced U.S. citizens to putatively oversee foreign coders.
August 29, 2025 — Source or Source
Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks
Storm-0501 has been leveraging cloud-native capabilities for data exfiltration and deletion, without deploying file-encrypting malware.
August 29, 2025 — Source
Researcher who found McDonald's free-food hack turns her attention to Chinese restaurant robots
The controls were left wide open on Pudu's robots
August 29, 2025 — Source or Watch Video
Safeguarding Healthcare With Secure and Smart Hospitals
Oslo University Hospital CSO Torkel Thune on Nordic Threat Landscape
August 29, 2025 — Source or Source or Source or Source or Source
The passwords most likely to get you hacked
Even as we shift to other forms of authentication, passwords aren't going away anytime soon. New research from Peec AI has analyzed over 100 million leaked passwords to uncover the most common words and phrases used, which also of course are the ones most likely to get your account compromised.
August 29, 2025 — Source
TransUnion Data Breach Impacts 4.4 Million
The credit reporting firm did not name the third-party application involved in the incident, only noting that it was used for its US consumer support operations.
August 29, 2025 — Source or Source
UK government dragged for incomplete security reforms after Afghan leak fallout
Senior officials summoned to science and tech committee to explain further
August 29, 2025 — Source
US Sanctions Russian National, Chinese Firm Aiding North Korean IT Workers
US Treasury sanctions Russian and Chinese entities tied to North Korea's use of fake IT workers, who exploited stolen identities, AI, and malware to funnel millions back to Pyongyang.
August 29, 2025 — Source
VerifTools Fake ID Operation Dismantled by Law Enforcement
Authorities say VerifTools sold fake driver's licenses and passports worldwide, enabling fraudsters to bypass KYC checks and access online accounts.
August 29, 2025 — Source
Internet — Security Issues — August 25th, 2025
A free VPN allegedly takes screenshots of Chrome users
A free VPN extension with over 100,000 downloads appears to be recording tons of sensitive user information, including taking screenshots of every visited page.
August 25, 2025 — Source
A new security flaw in TheTruthSpy phone spyware is putting victims at risk
A stalkerware maker with a history of multiple data leaks and breaches now has a critical security vulnerability that allows anyone to take over any user account and steal their victim's sensitive personal data, TechCrunch has confirmed.
August 25, 2025 — Source
Agentic AI Browser an Easy Mark for Online Scammers
One Prompt Was Enough for AI Agent to Buy, Click and Expose Sensitive Data
August 25, 2025 — Source or Source or Source or Source or Source
AI Data Security: Core Concepts, Risks, and Proven Practices
AI boosts threat detection and response, but brings risks like data poisoning, model leaks, and insider threats. Learn how to protect your systems.
August 25, 2025 — Source
Anatsa Android Banking Trojan Now Targeting 830 Financial Apps
The Anatsa Android banking trojan has expanded its target list to new countries and more cryptocurrency applications.
August 25, 2025 — Source
Arch Linux Project Responding to Week-Long DDoS Attack
The Arch Linux Project has been targeted in a DDoS attack that disrupted its website, repository, and forums.
August 25, 2025 — Source
Aspire Rural Health System Data Breach Impacts Nearly 140,000
Aspire Rural Health System was targeted last year by the BianLian ransomware group, which claimed to have stolen sensitive data.
August 25, 2025 — Source
Auchan retailer data breach impacts hundreds of thousands of customers
French retailer Auchan is informing that some sensitive data associated with loyalty accounts of several hundred thousand of its customers was exposed in a cyberattack.
August 25, 2025 — Source
Australian Bank Backtracks on AI-Led Job Cuts
A plan by one of Australia's largest employers to cut call center employees and shuffle the work to chatbots backfired after the large language models failed to reduce the volume of calls.
August 25, 2025 — Source or Source or Source
Chip Programming Firm Data I/O Hit by Ransomware
Data I/O has disclosed a ransomware attack that disrupted the company's operations, including communications, shipping and production.
August 25, 2025 — Source
CIO made a dangerous mistake and ordered his security team to implement it
Firewall pro enjoyed European travel to fix the fallout
August 25, 2025 — Source
CISA Requests Public Feedback on Updated SBOM Guidance
CISA has updated the Minimum Elements for a Software Bill of Materials (SBOM) guidance and is seeking public comment.
August 25, 2025 — Source
ClickFix is Compromising Thousands of Devices Daily -- Red Flags to Watch
Clever hackers are using ClickFix, a new social engineering technique, to deliver malicious payloads to unsuspecting users and devices around the globe.
August 25, 2025 — Source
Cloudflare secures sensitive data without fully restricting AI usage
With these new features, Cloudflare is giving customers the ability to automatically understand, analyze and set controls on how generative AI is used throughout their organization, enhancing the productivity and innovation of their teams without sacrificing security or privacy standards.
August 25, 2025 — Source
Critical Docker Desktop flaw lets attackers hijack Windows hosts
A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active.
August 25, 2025 — Source or Source
Defending against malware persistence techniques with Wazuh
Malware persistence techniques enable attackers to maintain access to compromised endpoints despite system reboots, credential changes, or other disruptions. Common methods include altering configurations, injecting startup code, and hijacking legitimate processes.
August 25, 2025 — Source
Fake macOS help sites push Shamos infostealer via ClickFix technique
Criminals are taking advantage of macOS users' need to resolve technical issues to get them to infect their machines with the Shamos infostealer, Crowdstrike researchers have warned.
August 25, 2025 — Source
Farmers Insurance data breach impacts 1.1M people after Salesforce attack
U.S. insurance giant Farmers Insurance has disclosed a data breach impacting 1.1 million customers, with BleepingComputer learning that the data was stolen in the widespread Salesforce attacks.
August 25, 2025 — Source or Source or Source or Source or Source
Google Cloud Unveils New Data Security Posture Management Offering in Preview
Google Cloud recently announced a new Data Security Posture Management (DSPM) offering, now available in preview, that provides users with end-to-end governance for data security, privacy, and compliance.
August 25, 2025 — Source
Login system helps spot online hacks without sacrificing privacy
A new system developed by Cornell Tech researchers helps users detect when their online accounts have been compromised—without exposing their personal devices to invasive tracking by web services.
August 25, 2025 — Source
Malicious Android apps with 19M installs removed from Google Play
Seventy-seven malicious Android apps with more than 19 million installs were delivering multiple malware families to Google Play users.
August 25, 2025 — Source
Microsoft Details ClickFix Malware Scam That Dupes Victims With Fake CAPTCHAs
As was shown in a recent report about a vicious cyber attack that targeted kidney failure patients, cyber criminals show no mercy. Now a new report from Microsoft has revealed a growing deployment of ClickFix social engineering tactics by threat actors worldwide, which dupe victims through fake CAPTCHAs
August 25, 2025 — Source
Nevada State Offices Halt Services After Cyber Incident
Nevada Grappling With Statewide IT Disruption, Forcing Suspension of Services
August 25, 2025 — Source or Source or Source or Source or Source
New AI attack hides data-theft prompts in downscaled images
Researchers have developed a novel attack that steals user data by injecting malicious prompts in images processed by AI systems before delivering them to a large language model.
August 25, 2025 — Source
OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
Researchers unveil OneFlip, a Rowhammer-based attack that flips a single bit in neural network weights to stealthily backdoor AI systems without degrading performance.
August 25, 2025 — Source
Ontic Secures $230M to Scale Connected Security Platform
Physical Security Firm Eyes Insider Risk, Federal Growth and AI-Powered Automation
August 25, 2025 — Source or Source
Pakistani Hackers Back at Targeting Indian Government Entities
Pakistani state-sponsored hacking group APT36 is targeting Linux systems in a fresh campaign aimed at Indian government entities.
August 25, 2025 — Source
SASE Company Netskope Files for IPO
Netskope has an annual recurring revenue of more than $707 million, but it's still not profitable, reporting a net loss of $170 million in H1.
August 25, 2025 — Source
ScreenConnect admins targeted with spoofed login alerts
ScreenConnect cloud administrators across all region and industries are being targeted with fake email alerts warning about a potentially suspicious login event.
August 25, 2025 — Source
Senator castigates federal judiciary for ignoring "basic cybersecurity"
Breaches in 2020 and 2025, reportedly by foreign adversaries, exposed confidential files.
August 25, 2025 — Source
Senior scams topped $4.8 billion in 2024: What to watch out for
Americans aged 60 and older lost $4.8 billion in 2024 to scammers, according to a report released by the FBI. These figures represent real people, real families, and life-changing financial devastation.
August 25, 2025 — Source
This 'Lethal Trifecta' Can Trick AI Browsers Into Stealing Your Data
AI browsers have a critical flaw: They can't tell safe commands from malicious text. Patches help, but guardrails are essential to keeping your data safe.
August 25, 2025 — Source
Up to 2.5 Billion Users Impacted by Google Database Hack
Google insists the compromised database contained 'basic and mostly publicly available business information,' like business names and contact information.
August 25, 2025 — Source
Internet — Security Issues — August 22nd, 2025
AI Models Resize Photos and Open Door to Hacking
Researchers Show How AI Image Downscaling Can be an Attack Vector
August 22, 2025 — Source or Source or Source or Source or Source
AWS Trusted Advisor Tricked Into Showing Unprotected S3 Buckets as Secure
AWS has addressed a vulnerability that could have been leveraged to bypass Trusted Advisor's S3 bucket permissions check.
August 22, 2025 — Source
Boards should bear ultimate responsibility for cybersecurity
A new State of the Security Profession survey from The Chartered Institute of Information Security (CIISec) shows that 91 percent of the profession believe ultimate responsibility for cybersecurity lies with the board and not security managers or CISOs (just 31 percent).
August 22, 2025 — Source
China-linked Murky Panda targets and moves laterally through cloud services
In its recently released 2025 Threat Hunting Report, Crowdstrike pointed out an interesting trend: a 136% surge in cloud intrusions. A good chunk of this surge is due to "China-nexus adversaries", Murky Panda (aka Silk Typhoon) among them.
August 22, 2025 — Source
Chinese Silk Typhoon Hackers Targeting Multiple Industries in North America
Silk Typhoon was seen exploiting n-day and zero-day vulnerabilities for initial access to victim systems.
August 22, 2025 — Source
CISA Issues Draft Software Bill of Materials Guide for Public Comment
Guide Provides Minimum Elements on How Software Components are Documented and Shared
August 22, 2025 — Source
CISA Seeks Input on SBOM Update to Tackle Real-World Gaps
US Cyber Defense Agency Pushes for Automation and Machine-Readable Data in SBOMs
August 22, 2025 — Source or Source or Source or Source
Criminal background checker APCS faces data breach
The attack first affected an upstream provider of bespoke software
August 22, 2025 — Source
DaVita says ransomware gang stole data of nearly 2.7 million people
Kidney dialysis firm DaVita has confirmed that a ransomware gang that breached its network stole the personal and health information of nearly 2.7 million individuals.
August 22, 2025 — Source
Developer Who Hacked Former Employer's Systems Sentenced to Prison
Davis Lu was sentenced to four years in prison for installing malicious code on employer's systems and for deleting encrypted data.
August 22, 2025 — Source
Dialysis Chain Tells Feds Hack Affects Nearly 2.7 Million
Stolen DaVita Data Leaked on Dark Web by Ransomware Gang Interlock
August 22, 2025 — Source or Source or Source or Source or Source
Fake CAPTCHA tests trick users into running malware
Microsoft's security team has published an in-depth report into ClickFix, the social engineering attack which tricks users into executing malicious commands in the guise of proving their humanity.
August 22, 2025 — Source
Fort Firewall 3.19.3 released
Nodir Temirkhodjaev has announced the release of Fort Firewall 3.19.3, which enables users to incorporate a "Connections" tab, provides alerts regarding save failures, and rectifies statistics by establishing the default current tab.
August 22, 2025 — Source
Google-Verified Chrome VPN Extension Exposed as Spyware
A popular Chrome VPN extension, FreeVPN, is accused of being spyware. It was reportedly capturing screenshots of every single that that the user would visit. It was then sending those screen grabs to an external source.
August 22, 2025 — Source
Here's Why Your Google Password Manager Is Not Autofilling
According to a survey by NordPass in 2024, the average person uses over 200 passwords between their personal and business-related accounts. Just imagine having to memorize all those complex combinations of numbers and letters off the top of your head. It's easy to forget them if you don't have a system in place. Thankfully, password managers now exist, and one of the most popular ones out there is operated by Google.
August 22, 2025 — Source
In Other News: McDonald's Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M
Noteworthy stories that might have slipped under the radar: cryptojacker sentenced to prison, ECC.fail Rowhammer attack, and Microsoft limits China's access to MAPP.
August 22, 2025 — Source
Interpol operation seizes $97 million in African cybercrime sweep
Authorities in Africa have arrested 1,209 people in an Interpol-led crackdown on cybercrime that targeted nearly 88,000 victims.
August 22, 2025 — Source or Source
Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
Dubbed Operation Serengeti 2.0, the operation took place between June and August.
August 22, 2025 — Source
Massive anti-cybercrime operation leads to over 1,200 arrests in Africa
Law enforcement authorities in Africa have arrested over 1,200 suspects as part of 'Operation Serengeti 2.0,' an INTERPOL-led international crackdown targeting cross-border cybercriminal gangs.
August 22, 2025 — Source
MITRE Updates List of Most Common Hardware Weaknesses
MITRE has updated the list of Most Important Hardware Weaknesses to align it with evolving hardware security challenges.
August 22, 2025 — Source
Murky Panda hackers exploit cloud trust to hack downstream customers
A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud environments to gain initial access to the networks and data of downstream customers.
August 22, 2025 — Source
Netskope's IPO Filing Reveals Surging Sales, Improved Losses
Second Cyber IPO Filing of 2025, Netskope Shows Huge Reliance on Channel Partners
August 22, 2025 — Source or Source or Source or Source
Rural Health System in Michigan Notifying 140,000 of Hack
Threat Actors Accessed, Stole Data for About 2 Months; BianLian Claims Credit
August 22, 2025 — Source or Source
Short circuit: Electronics supplier to tech giants suffers ransomware shutdown
Amazon, Apple, Google, and Microsoft among major customers
August 22, 2025 — Source
Internet — Security Issues — August 21st, 2025
AI crawlers and fetchers are blowing up websites, with Meta and OpenAI the worst offenders
One fetcher bot seen smacking a website with 39,000 requests per minute
August 21, 2025 — Source
Aikido Security Buys AI Code Startup Trag to Outpace Rivals
Trag's Developer-Centric Tools Help Aikido Slash Time to Market by 12 Months
August 21, 2025 — Source or Source or Source or Source or Source
Anthropic Tests Safeguard for AI 'Model Welfare'
Claude Models May Shut Down Harmful Chats in Some Edge Cases
August 21, 2025 — Source or Source or Source or Source or Source
Apple Patches Zero-Day Exploited in Targeted Attacks
Apple has rolled out iOS and macOS updates that resolve a zero-day vulnerability exploited in highly targeted attacks.
August 21, 2025 — Source
AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged
AWS's Trusted Advisor tool, which is supposed to warn customers if their (cloud) S3 storage buckets are publicly exposed, could be "tricked" into reporting them as not exposed when they actually are, Fog Security researchers have found.
August 21, 2025 — Source
Best password generators 2025: Easily create strong, complex passwords with my favorites
While it's easy to default to common, easy-to-guess passwords, a password generator can help you create complex, secure credentials. We'll help you choose the best password generator to keep your online accounts safe.
August 21, 2025 — Source
Breach Roundup: Scattered Spider Hacker Gets 10 Years
Also: New 'Quishing' Tactics, Pro-Houthi Hacker Sentenced to 20 Months
August 21, 2025 — Source or Source or Source or Source or Source
China's Great Firewall blocked all traffic to a common HTTPS port for over an hour, severing connection to the outside world — with no hint as to its intention
The cause of the incident could be intentional or accidental
August 21, 2025 — Source
Colt changes tune, admits data theft as Warlock gang begins auction
Worried about your data? No probs, says firm, we'll check the dark web crims' list for you! Yes really
August 21, 2025 — Source or Source
Congressman proposes bringing back letters of marque for cyber privateers
Bill would let US President commission white hat hackers to go after foreign threats, seize assets on the online seas
August 21, 2025 — Source
Copilot Kept Access Logs Unless You Told It Not To
Copilot Falls for Prompt Injection Yet Again
August 21, 2025 — Source or Source
Cryptohack Roundup: New York Man, Firm to Pay $228M in Ponzi Scheme
Also: Coinbase's Misconfigured Smart Contract, GMX Repayment Plans
August 21, 2025 — Source
Doppel Simulation combats social engineering attacks
Doppel announced Doppel Simulation, a new product and expansion to the Doppel Vision Platform that enables organizations to redefine security awareness training and social engineering penetration testing by mirroring today's multi-channel and dynamic attacker behaviors.
August 21, 2025 — Source
Don't fall for McAfee's tricky antivirus warnings on your laptop
No, you don't need to pay McAfee to secure your new Windows PC.
August 21, 2025 — Source
Drug R&D Firm's IT, Data Encrypted in Alleged Qilin Attack
Inotiv, a drug research and development firm, told federal regulators that it's been dealing with a cyberattack since Aug. 8 that has encrypted some IT systems and data, and is disrupting certain business operations. Ransomware gang Qilin has listed the company as a victim on its dark website.
August 21, 2025 — Source
Employee distraction is a bigger risk than attack sophistication
Cybersecurity professionals are sounding the alarm, not about increasingly sophisticated cyber threats, but about something far more human -- distraction.
August 21, 2025 — Source
Europol confirms $50,000 Qilin ransomware reward is fake
Europol has confirmed that a Telegram channel impersonating the agency and offering a $50,000 reward for information on two Qilin ransomware administrators is fake. The impostor later admitted it was created to troll researchers and journalists.
August 21, 2025 — Source
Fairness tool catches AI bias early
Machine learning software helps agencies make important decisions, such as who gets a bank loan or what areas police should patrol. But if these systems have biases, even small ones, they can cause real harm. A specific group of people could be underrepresented in a training dataset, for example, and as the machine learning (ML) model learns that bias can multiply and lead to unfair outcomes, such as loan denials or higher risk scores in prescription management systems.
August 21, 2025 — Source
FBI warns of Russian hackers exploiting 7-year-old Cisco flaw
The Federal Bureau of Investigation (FBI) has warned that hackers linked to Russia's Federal Security Service (FSB) are targeting critical infrastructure organizations in attacks exploiting a 7-year-old vulnerability in Cisco devices.
August 21, 2025 — Source or Source
From Ladders to Lattices: Redesigning Career Growth
Workers Reject Traditional Advancement for Flexible, Purpose-Driven Career Paths
August 21, 2025 — Source or Source or Source or Source
Hackers have figured out a new way to steal Microsoft logins
Be careful out there!
August 21, 2025 — Source
Hackers who exposed North Korean government hacker explain why they did it
Earlier this year, two hackers broke into a computer and soon realized the significance of what this machine was. As it turned out, they had landed on the computer of a hacker who allegedly works for the North Korean government.
August 21, 2025 — Source
Menlo-Votiro Deal Integrates File Protection With Browsers
CEO Amir Ben-Efraim: Acquisition Adds AI-Powered File Sanitization to Browser Tools
August 21, 2025 — Source or Source or Source or Source
Microsoft's cybersecurity crackdown is here — A response to Beijing-linked breaches
After zero-day exploits linked to Chinese actors, Microsoft quietly restricts access to its vulnerability-sharing program.
August 21, 2025 — Source
Nuance Agrees to Pay $8.5M to Settle MOVEit Hack Litigation
Settlement Is Latest Among Scores of Other MOVEit Lawsuits Still Pending
August 21, 2025 — Source or Source or Source or Source or Source
Orange Belgium discloses data breach impacting 850,000 customers
Orange Belgium, a subsidiary of telecommunications giant Orange Group, disclosed on Wednesday that attackers who breached its systems in July have stolen the data of approximately 850,000 customers.
August 21, 2025 — Source
Password Managers Vulnerable to Data Theft via Clickjacking
A researcher has tested nearly a dozen password managers and found that they were all vulnerable to clickjacking attacks that could lead to the theft of highly sensitive data.
August 21, 2025 — Source
Researchers uncover hidden risks of passkeys in abusive relationships
A new study reveals that passkeys—widely promoted as a safer login method compared with passwords—may unintentionally expose users to serious risks in situations involving interpersonal abuse. The research introduces the first framework for analyzing how digital authentication tools can be exploited in contexts such as intimate partner violence, elder abuse and human trafficking.
August 21, 2025 — Source
Russian APT Exploiting 7-Year-Old Cisco Vulnerability: FBI
Russian state-sponsored hackers tracked as Static Tundra continue to target Cisco devices affected by CVE-2018-0171.
August 21, 2025 — Source
Russian Hackers Accused in Wave of Water Sector Cyberattacks
Successful Breaches Renew Fears of Operational Vulnerabilities Across Water Sector
August 21, 2025 — Source or Source or Source or Source or Source
Russian Hackers Hitting Critical Infrastructure, FBI Warns
State-Sponsored Espionage Group Tied to Exploits of No-Longer-Supported Cisco Gear
August 21, 2025 — Source or Source or Source or Source or Source
Russian threat actors using old Cisco bug to target critical infrastructure orgs
A threat group linked to the Russian Federal Security Service's (FSB) Center 16 unit has been compromising unpatched and end-of-life Cisco networking devices via an old vulnerability (CVE-2018-0171), the FBI and Cisco warned on Wednesday.
August 21, 2025 — Source
SailPoint Accelerated Application Management simplifies app governance
SailPoint unveiled SailPoint Accelerated Application Management, a solution that redefines how enterprises discover, govern, and secure applications at scale.
August 21, 2025 — Source
Scattered Spider hacker gets sentenced to 10 years in prison
Noah Michael Urban, a key member of the Scattered Spider cybercrime collective, was sentenced to 10 years in prison on Wednesday after pleading guilty to charges of wire fraud and conspiracy in April.
August 21, 2025 — Source or Source
Telecom Firm Colt Confirms Data Breach as Ransomware Group Auctions Files
Colt Technology Services is working on restoring systems disrupted by a ransomware attack that involved data theft.
August 21, 2025 — Source
This low-tech 'fix' for digital hacking is out of date. Stop using it
You should now do the opposite.
August 21, 2025 — Source
US cops wrap up RapperBot, one of world's biggest DDoS-for-hire rackets
Feds say Mirai-spawned botnet blasted 370K attacks before AWS and pals helped yank its servers
August 21, 2025 — Source
Your Chats With AI Chatbot Grok May Be Visible to Everyone
Hundreds of thousands of chats are live on the website of Elon Musk's rival to ChatGPT, including photos and other uploaded documents.
August 21, 2025 — Source
Internet — Security Issues — August 19th, 2025
5 Hidden Microsoft Entra Features to Easily Boost Your Businesses Cybersecurity
Have you ever wondered if your organization's security measures are truly airtight? In an era where cyber threats evolve faster than ever, relying solely on well-known defenses might leave critical gaps in your protection. Microsoft Entra, a cornerstone of modern security frameworks, is packed with features designed to safeguard your digital infrastructure. But here's the catch: some of its most powerful tools often fly under the radar. These lesser-known capabilities can be the difference between a close call and a full-blown breach, offering organizations a chance to outsmart attackers in ways they might not expect.
August 19, 2025 — Source
96 percent of organizations worry about the impact of shorter certificate life
The radical shortening of SSL/TLS certificate lifespans from 398 days to 47 days by 2029 is shaking up the cybersecurity world. New research shows 96 percent of organizations are concerned about the impact of shorter SSL/TLS certificate lifespans on their business.
August 19, 2025 — Source
1.1 Million Unique Records Identified in Allianz Life Data Leak
Have I Been Pwned has analyzed the information made public by the hackers who recently targeted Allianz Life.
August 19, 2025 — Source
Accounting Firm Pays Feds $175K for HIPAA Ransomware Breach
Settlement Includes Corrective Action Plan Focused on Improving Risk Analysis
August 19, 2025 — Source or Source or Source or Source or Source
AI Under Siege: How Hackers Are Exploiting Vulnerable AI Systems
What if the AI systems we trust to power our lives, our cars, our healthcare, even our financial systems, could be hijacked with just a few cleverly crafted lines of code? It's not just a dystopian fantasy; it's a growing reality. Recent tests on advanced AI models like Gemini 2.0 and Grok 4 reveal unsettling vulnerabilities, exposing how easily these systems can be manipulated or exploited. Despite their sophistication, these models falter when faced with innovative attack methods, raising urgent questions about the safety of AI in critical applications.
August 19, 2025 — Source
Australia's TPG Telecom Investigating iiNet Hack
TPG Telecom has disclosed a cybersecurity incident after discovering unauthorized access to an iiNet order management system.
August 19, 2025 — Source
Casino tech outfit Bragg cops to intrusion but says data jackpot untouched
Toronto company says weekend cyber raid hit internal IT, not punters' wallets
August 19, 2025 — Source
Cisco Patches Maximum-Severity Firewall Flaw
Cisco Secure Firewall Management Centers Connected to RADIUS Left Vulnerable
August 19, 2025 — Source or Source or Source or Source or Source
Cofense Vision 3.0 identifies user engagement with phishing emails
Cofense launched Vision 3.0, the latest advancement to its Phishing Threat Detection and Response (PDR) platform. Vision 3.0 delivers faster, smarter incident response by giving security teams visibility into exactly how users interacted with phishing emails that slipped past perimeter defenses.
August 19, 2025 — Source
Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data
Britain abandoned its demand that Apple provide backdoor access to any encrypted user data stored in the cloud.
August 19, 2025 — Source
Gambling Tech Firm Bragg Discloses Cyberattack
Bragg Gaming Group says hackers accessed its internal systems over the weekend, but did not affect its operations.
August 19, 2025 — Source
Google unveils new AI and cloud security capabilities at Security Summit
Google used its Cloud Security Summit 2025 today to introduce a wide range of updates aimed at securing AI innovation and strengthening enterprise defenses. The announcements span protections for AI agents, new tools for security operations centers, enhancements in cloud security, and extended safeguards for enterprise browsing.
August 19, 2025 — Source
Hacktivist Sentenced to 20 Months of Prison in UK
Al-Tahery Al-Mashriky of the Yemen Cyber Army has been accused of hacking into and defacing many websites as part of hacktivist campaigns.
August 19, 2025 — Source
Massive Allianz Life data breach impacts 1.1 million people
Hackers have stolen the personal information of 1.1 million individuals in a Salesforce data theft attack, which impacted U.S. insurance giant Allianz Life in July.
August 19, 2025 — Source or Source
Microsoft Dissects PipeMagic Modular Backdoor
PipeMagic, which poses as a ChatGPT application, is a modular malware framework that provides persistent access and flexibility.
August 19, 2025 — Source
More customers asking for Google's Data Boundary, says Cloud Experience boss
Developer demand for sovereign cloud from tech giant is on the rise, says exec
August 19, 2025 — Source
Nearly half of Americans still reuse passwords despite phishing risks
Nearly half of Americans admit to reusing passwords across accounts, even as phishing attacks continue to rise. A new survey by Yubico and Talker Research shows that while many people feel confident in their ability to stay secure online, their actual habits reveal a different story.
August 19, 2025 — Source
New Exploit Poses Threat to SAP NetWeaver Instances
A new public exploit chains two critical flaws in SAP NetWeaver, exposing unpatched instances to code execution attacks.
August 19, 2025 — Source
New Research Links VPN Apps, Highlights Security Deficiencies
Citizen Lab has identified links between multiple VPN providers, and multiple security weaknesses in their mobile applications.
August 19, 2025 — Source
New scam uses Google AI search results to trick travelers with fake customer service numbers
"I'm pretty technologically advanced, and I fell for this"
August 19, 2025 — Source
NY Business Council discloses data breach affecting 47,000 people
As the state's largest statewide employer association, BCNYS represents over 3,000 member organizations, including chambers of commerce, professional and trade associations, and other local and regional business organizations, as well as some of the largest corporations worldwide, which employ more than 1.2 million New Yorkers.
August 19, 2025 — Source
NY State Fines Dental Plan Firm $2M in Phishing Breach
Healthplex, Part of UnitedHealth Group, Lacked MFA on Compromised Email Account
August 19, 2025 — Source or Source or Source or Source
OpenAI CEO Sam Altman says that export controls alone won't hold back China's AI ambitions — "My instinct is that doesn't work"
"I'm worried about China." — Sam Altman | Altman is the second major tech company CEO to question the effectiveness of export controls.
August 19, 2025 — Source
Pharma firm Inotiv says ransomware attack impacted operations
American pharmaceutical company Inotiv has disclosed that some of its systems and data have been encrypted in a ransomware attack, impacting the company's business operations.
August 19, 2025 — Source
Researcher downloaded the data of all 270,000 Intel employees from an internal business card website — massive data breach dubbed 'Intel Outside' didn't qualify for bug bounty
Eaton Z made sure Intel had closed up all the unearthed security gaps before divulging this research.
August 19, 2025 — Source
Security researcher driven by free nuggets unearths McDonald's security flaw — changing 'login' to 'register' in URL prompted site to issue plain text password for a new account
"Would you like to access sensitive information?" might be the new "Would you like fries with that?" A security researcher called "BobDaHacker" has just revealed how he went from scoring free McNuggets via the fast food chain's mobile app to repeatedly gaining access to a McDonald's platform meant only for employees and franchisees.
August 19, 2025 — Source
Simulating wolf pack attacks to strengthen AI collaboration and resilience
In the rapidly advancing fields of drone swarms and cooperative robotics, AI agents embedded in individual drones and robots must collaborate seamlessly—such as drones flying in formation to encircle an enemy or multiple robots working together in smart factories. However, these multi-agent systems are vulnerable to disruptions caused by adverse conditions or malicious attacks, which can compromise their cooperation and operational integrity.
August 19, 2025 — Source
Supply Chain Security: Provenance Tools Becoming Standard in Developer Platforms
Software provenance is gaining new importance as organizations look for ways to secure their supply chains against tampering and comply with emerging standards like SLSA. In a recent blog post, HashiCorp highlighted how its HCP Packer service captures build metadata and SBOMs to support Supply-chain Levels for Software Artifacts (SLSA) Level 1 compliance.
August 19, 2025 — Source
UK Has Dropped Apple Backdoor Request, US Spy Chief Says
The UK has withdrawn its demand for Apple to create a backdoor into its Advanced Data Protection (ADP) encryption system. US Director of National Intelligence Tulsi Gabbard confirmed the news on X, saying it came after months of collaboration between the two governments.
August 19, 2025 — Source or Source or Source
Workday Hit by Social Engineering Attack, Third-Party Data Exposed
Workday's recent data breach might be tied to ShinyHunters, a group accused of exploiting Salesforce CRM at firms like Google, Adidas, Qantas, and Louis Vuitton.
August 19, 2025 — Source
Why the US Needs New Policies to Fight Scams
Fraud Expert Trace Fooshee on Regulatory Steps Needed to Curb Payment Scams
August 19, 2025 — Source or Source or Source or Source or Source
Why using a VPN is becoming more important than ever
There's been some controversy around the use of VPNs recently, mostly centering on the UK's Online Safety Act. But despite this August 19th is International VPN Day and NordVPN has issued a timely reminder of the importance of using one.
August 19, 2025 — Source
Internet — Security Issues — August 17th, 2025
Ransomware Allegations Surface as Colt Outages Continue
Support Portals Offline as Ransomware Gang Claims It Stole Data
August 17, 2025 — Source or Source or Source or Source or Source
U.S. seizes $2.8 million in crypto from Zeppelin ransomware operator
The U.S. Department of Justice (DoJ) announced the seizure of more than $2.8 million in cryptocurrency from suspected ransomware operator Ianis Aleksandrovich Antropenko.
August 17, 2025 — Source
Week in review: 2 threat actors exploiting WinRAR 0-day, Microsoft fixes "BadSuccessor" Kerberos flaw
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
August 17, 2025 — Source
Internet — Security Issues — August 16th, 2025
AI Worker Digital Twins Pose New Insider Threats
Researchers Say AI Bots Blur Lines Between Identity, Consent and Cyber Defense
August 16, 2025 — Source or Source
Watch Now: CodeSecCon -- Where Software Security's Next Chapter Unfolds (Virtual Event)
CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
August 16, 2025 — Source
Internet — Security Issues — August 11th, 2025
At least 73% of US adults have experienced online scams—here's how you can avoid the latest con
Online scammers continue to dupe the majority of American adults as they infiltrate virtual calendars and security systems meant to defend users against the poaching of personal information.
August 11, 2025 — Source
Best antivirus software 2025: These 8 apps keep your PC safe
You need more than just prayer and luck—choose from our top antivirus software picks to stay safe.
August 11, 2025 — Source
'Chairmen' of $100 million scam operation extradited to US
The U.S. Department of Justice charged four Ghanaian nationals for their roles in a massive fraud ring linked to the theft of over $100 million in romance scams and business email compromise attacks.
August 11, 2025 — Source
Chrome Sandbox Escape Earns Researcher $250,000
A researcher has been given the highest reward in Google's Chrome bug bounty program for a sandbox escape with remote code execution.
August 11, 2025 — Source
Columbia University data breach affected 870,000 students, applicants
The recent cyberattack at Columbia University affected close to 870,000 students, applicants and employees, compromising their Social Security numbers, health information and other sensitive data, according to school officials.
August 11, 2025 — Source
Connex Credit Union data breach impacts 172,000 members
Connex, one of Connecticut's largest credit unions, warned tens of thousands of members that unknown attackers had stolen their personal and financial information after breaching its systems in early June.
August 11, 2025 — Source or Source
Conversations remotely detected from cell phone vibrations, researchers report
An emerging form of surveillance, wireless tapping, explores the possibility of remotely deciphering conversations from the tiny vibrations produced by a cell phone's earpiece. With the goal of protecting users' privacy from potential bad actors, a team of computer science researchers at Penn State demonstrated that transcriptions of phone calls can be generated from radar measurements taken up to 3 meters, or about 10 feet, from a phone. While accuracy remains limited—around 60% for a vocabulary of up to 10,000—the findings raise important questions about future privacy risks.
August 11, 2025 — Source
Details emerge on WinRAR zero-day attacks that infected PCs with malware
Researchers have released a report detailing how a recent WinRAR path traversal vulnerability tracked as CVE-2025-8088 was exploited in zero-day attacks by the Russian 'RomCom' hacking group to drop different malware payloads.
August 11, 2025 — Source
Dutch Investigators Blame Hacks on Multiple Threat Actors
NCSC-NL Says Hack of Citrix NetScaler Flaw Also Targeted Critical Infrastructure
August 11, 2025 — Source or Source or Source or Source or Source
Flaws in Major Automaker's Dealership Systems Allowed Car Hacking, Personal Data Theft
A researcher has demonstrated how a platform used by over 1,000 dealerships in the US could have been used to hack cars.
August 11, 2025 — Source
Fort Firewall 3.18.11 released
The new Fort Firewall 3.18.11 release resolves issues related to closed processes handling regression and introduces the capability to adjust row height in UI programs.
August 11, 2025 — Source
From medieval stronghold to cyber fortress: Shielding Europe's digital future
Czech and Estonian researchers are joining forces to build a cross-border cybersecurity hub that will strengthen Europe's digital defenses in the face of growing cyber threats.
August 11, 2025 — Source
GPT-5 Launch Meets With Praise, User Pushback and Price Wars
CEO Altman Promises Fixes to 'Way Dumber' Performance, Transparency Amid Glitches
August 11, 2025 — Source or Source or Source or Source
How agile is your crypto? Interview study explores opportunities and challenges of cryptographic update processes
If you think of software as a building, you might say it's made up of code blocks. Many of these building blocks are custom-built for a specific application. Others are standard components and used in many buildings—cryptographic algorithms and functions are a prime example of this.
August 11, 2025 — Source
How Insurers Use Threat Intelligence to Reduce Losses
Tokio Marine HCC Targets Vulnerabilities Before They're Exploited
August 11, 2025 — Source or Source or Source or Source or Source
How ShinyHunters Hacking Group Stole Customer Data from Salesforce
Hackers posed as Salesforce IT staff, using vishing to trick employees into installing malicious software for data theft and extortion.
August 11, 2025 — Source
Manage Logins, Data Sharing, and Device Syncs from One Secure Vault
FastestPass takes the hassle out of managing logins, so you can stay focused on your work — not your passwords.
August 11, 2025 — Source
Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike
New physics-based research suggests large language models could predict when their own answers are about to go wrong — a potential game changer for trust, risk, and security in AI-driven systems.
August 11, 2025 — Source
Microsoft tests cloud-based Windows 365 disaster recovery PCs
Microsoft has announced the limited public preview of Windows 365 Reserve, a service that provides temporary desktop access to pre-configured cloud PCs for employees whose computers have become unavailable due to cyberattacks, hardware issues, or software problems.
August 11, 2025 — Source
MuddyWater's DarkBit ransomware cracked for free data recovery
Cybersecurity firm Profero cracked the encryption of the DarkBit ransomware gang's encryptors, allowing them to recover a victim's files for free without paying a ransom.
August 11, 2025 — Source
North Korean Kimsuky hackers exposed in alleged data breach
The North Korean state-sponsored hacking group known as Kimsuky has reportedly suffered a data breach after two hackers, who describe themselves as the opposite of Kimsuky's values, stole the group's data and leaked it publicly online.
August 11, 2025 — Source
Over 29,000 Exchange servers unpatched against high-severity flaw
Over 29,000 Exchange servers exposed online remain unpatched against a high-severity vulnerability that can let attackers move laterally in Microsoft cloud environments, potentially leading to complete domain compromise.
August 11, 2025 — Source
OysterVPN review: The new kid on the VPN block
Newcomer OysterVPN stands its ground against some heavy competition.
August 11, 2025 — Source
Pediatric Practice, IT Vendor Settle $5.15M Breach Suit
At Least 918K Affected in 2024 BianLian Data Theft Attack
August 11, 2025 — Source or Source or Source or Source or Source
Ransomware attacks up by 41 percent globally
New data from Check Point Research reveals a sharp rise in cyberattacks globally, with business services, healthcare, and manufacturing among the hardest hit sectors.
August 11, 2025 — Source
Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada
WinRAR has patched CVE-2025-8088, a zero-day exploited by Russia's RomCom in attacks on financial, defense, manufacturing and logistics companies.
August 11, 2025 — Source or Source
Scattered Spider and ShinyHunters' Next Move: Leaking Data
Extortionists Detail Fresh Victims, Although Sensitivity of Stolen Data Unclear
August 11, 2025 — Source or Source or Source
SonicWall VPN Cyberattack Linked to Known Access Control Vulnerability
SonicWall identified under 40 security incidents and determined the access control problem was related to a vulnerability published last year.
August 11, 2025 — Source
Threat actors move to smaller more persistent attacks
Threat actors are favoring smaller, persistent attacks under 100,000 requests per second according to a new report. This shift signals a growing dependence on automated, generative AI-enhanced attack tools, reflecting the democratization of DDoS capabilities among loosely coordinated threat actors and new actors entering the scene.
August 11, 2025 — Source
UK retail giant M&S restores Click & Collect months after cyber attack, some services still down
Many core offerings now back in action, says retailer
August 11, 2025 — Source
US government seized $1M from Russian ransomware gang
The U.S. Department of Justice announced on Monday it has seized the servers and $1 million in bitcoin from the prolific Russian ransomware gang behind the BlackSuit and Royal malware.
August 11, 2025 — Source
What Manufacturing Leaders Are Learning About Cloud Security - from Google's Frontline
Vinod D'Souza, Director of Manufacturing and Industry, and Nick Godfrey. Senior Director, both from the Office of the CISO, Google Cloud, discuss the findings of a recent survey of cybersecurity professionals about Securing Manufacturing's Transition to the Cloud
August 11, 2025 — Source or Source
What the Matter 1.4.2 update means for smart home security
Matter is built on the idea that smart home devices should be secure, reliable, and easy to use. It is based on Internet Protocol (IP), which allows devices, mobile apps, and cloud services to communicate. Matter also defines a set of IP-based networking technologies for device certification.
August 11, 2025 — Source or Source
Why AI Security Needs Continuous Red Teaming
NIST's Apostol Vassilev Explains Need for Dynamic Response, Not Static Testing
August 11, 2025 — Source or Source or Source or Source or Source
Why effective exposure management is key to cybersecurity [Q&A]
Thanks to the rise of hybrid working and SaaS the traditional concept of 'attack surface' -- limited to hardware, software, and network infrastructure -- is dangerously outdated and no longer sufficient to ensure cybersecurity.
August 11, 2025 — Source
Wikimedia Foundation loses first court battle to swerve Online Safety Act regulation
But it can contest if it lands up in 'Category 1,' and the move hurts operations, says judge
August 11, 2025 — Source
Win-DDoS: Attackers can turn public domain controllers into DDoS agents
SafeBreach researchers have released details on several vulnerabilities that could be exploited by attackers to crash Windows Active Directory domain controllers (DCs), one one of which (CVE-2025-32724) can also be leveraged to force public DCs to participate in distributed denial-of-service (DDoS) attacks.
August 11, 2025 — Source
Internet — Security Issues — August 10th, 2025
After researchers unmasked a prolific SMS scammer, a new operation has emerged in its wake
If you, like practically anyone else with a cell phone in the U.S. and beyond, have received a scam text message about an unpaid toll or undelivered mail item, there's a good chance you have been targeted by a prolific scamming operation.
August 10, 2025 — Source
Salesforce attack exposed Google Ads customer data
Google has revealed more details about an attack on one of its corporate Salesforce instances. The company now says that the attack exposed user data of Google Ads customers.
August 10, 2025 — Source
Week in review: SonicWall firewalls targeted in ransomware attacks, Black Hat USA 2025
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
August 10, 2025 — Source
Internet — Security Issues — August 9th, 2025
Encryption made for police and military radios may be easily cracked
An encryption algorithm can have weaknesses that could allow an attacker to listen in.
August 9, 2025 — Source
Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking
Researchers showed how flaws in a bus' onboard and remote systems can be exploited by hackers for tracking, control and spying.
August 9, 2025 — Source
Update your WinRAR because hackers are using this flaw to sneak malware onto your PC
Last week, WinRAR 7.13 dropped with a fix for a directory traversal vulnerability tracked as CVE-2025-8088. We now have more details on the exploit, thanks to work by researchers from ESET who discovered that attackers were actively abusing the flaw.
August 9, 2025 — Source
Internet — Security Issues — August 8th, 2025
Adult sites are stashing exploit code inside racy .svg files
Running JavaScript from inside an image? What could possibly go wrong?
August 8, 2025 — Source
Australian Privacy Regulator Sues Optus Over 2022 Hack
Telecom May Face Up to $2.22 Million Per Violation in Fines
August 8, 2025 — Source or Source or Source
Black Hat USA 2025 -- Summary of Vendor Announcements (Part 4)
Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas.
August 8, 2025 — Source
CodeSecCon 2025: Where Software Security's Next Chapter Unfolds
Taking place August 12-13, CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
August 8, 2025 — Source
Columbia University Data Breach Impacts 860,000
Columbia University has been targeted in a cyberattack where hackers stole the personal information of students, applicants, and employees.
August 8, 2025 — Source or Source
Do neurotechnologies threaten our mental privacy?
Consumer devices may soon be able to directly access and interfere with the human brain—but this raises unprecedented ethical and legal questions. How can we leverage the benefits of this technology for therapeutic purposes while preventing its misuse?
August 8, 2025 — Source
EU Cyber Index Reveals Strengths and Setbacks
ENISA's Laura Heuvinck Shares Index Findings, Implications for EU Cybersecurity
August 8, 2025 — Source or Source or Source or Source
Ex-White House cyber, counter-terrorism guru: Microsoft considers security an annoyance, not a necessity
Tells The Reg China's ability to p0wn Redmond's wares 'gives me a political aneurysm'
August 8, 2025 — Source
French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers
Bouygues has been targeted in a cyberattack that resulted in the personal information of millions of customers getting compromised.
August 8, 2025 — Source
Google suffers a serious data breach at the hands of a ransomware group
The bad actors are using voice phishing to pull off their malicious attacks.
August 8, 2025 — Source
Hackers found a way around Microsoft Defender to install ransomware on PCs, report says
Hey, no fair.
August 8, 2025 — Source
Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector
As attackers target help desks and identity systems, traditional security perimeters are proving insufficient against agile, socially-engineered threats.
August 8, 2025 — Source
In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment
Noteworthy stories that might have slipped under the radar: federal court filing system hack, Chanel data breach, emergency CISA directive.
August 8, 2025 — Source
Infosec hounds spot prompt injection vuln in Google Gemini apps
Not a very smart home: crims could hijack smart-home boiler, open and close powered windows and more. Now fixed
August 8, 2025 — Source
Insider threats are getting costlier and harder to detect
A recent study from IBM revealed that insider threats were the costliest data breaches of 2024, averaging $4.99 million per incident.
August 8, 2025 — Source
Insurance Firm Notifies 156K Victims - 1 Year After the Hack
What Makes Timely and Accurate Breach Reporting So Difficult for Some Organizations?
August 8, 2025 — Source or Source or Source or Source
ISMG Editors: Voice Phishing Attacks Breach Google and Cisco
Also: US Cyber Grants Are Dwindling; Hybrid Threats Renew Focus on OT Resilience
August 8, 2025 — Source
McAfee Total Protection review: Top security undermined by a major feature
McAfee Total Protection review: Top security undermined by a major feature
August 8, 2025 — Source
OpenAI Pitches GPT-5 as Faster, Smarter, More Accurate
Firm Says Latest Model Hallucinates Less, Scores Better on Benchmarks
August 8, 2025 — Source or Source or Source or Source or Source
Otorio Buy Fuels Armis' OT Security and AI-Driven Growth
CEO Yevgeny Dibrov Says Otorio Acquisition Positions Armis for Strong Growth
August 8, 2025 — Source
Red Teams Jailbreak GPT-5 With Ease, Warn It's 'Nearly Unusable' for Enterprise
Researchers demonstrate how multi-turn "storytelling" attacks bypass prompt-level filters, exposing systemic weaknesses in GPT-5's defenses.
August 8, 2025 — Source
Researchers Use Hidden Calendar Invites to Hijack AI, Control Smart Home Devices
Researchers Use Hidden Calendar Invites to Hijack AI, Control Smart Home Devices
August 8, 2025 — Source
Royal and BlackSuit ransomware gangs hit over 450 US companies
The U.S. Department of Homeland Security (DHS) says the cybercrime gang behind the Royal and BlackSuit ransomware operations had breached hundreds of U.S. companies before being taken down last month.
August 8, 2025 — Source
This PC security guru fell for a scam. Here are 3 lessons from his mistake
It happens to the best of us.
August 8, 2025 — Source
UK proxy traffic surges as users consider VPN alternatives amid Online Safety Act
Amid the furor around surging VPN usage in the UK, many users are eyeing proxies as a potential alternative to the technology.
August 8, 2025 — Source
WinRAR zero-day exploited to plant malware on archive extraction
A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the RomCom malware.
August 8, 2025 — Source
Internet — Security Issues — August 4th, 2025
AI Guardrails Under Fire: Cisco's Jailbreak Demo Exposes AI Weak Points
Cisco's latest jailbreak method reveals just how easily sensitive data can be extracted from chatbots trained on proprietary or copyrighted content.
August 4, 2025 — Source
AVG Internet Security review: Reliable, budget-friendly antivirus software
AVG Internet Security rounds out the company's solid antivirus software with additional online protections, while not costing too much.
August 4, 2025 — Source
Cybersecurity M&A Roundup: 44 Deals Announced in July 2025
Forty-four cybersecurity merger and acquisition (M&A) deals were announced in July 2025.
August 4, 2025 — Source
Cyera launches AI Guardian to secure all types of AI systems
Cyera launched AI Guardian, a solution built to secure any type of AI. It expands Cyera's platform to meet the needs of enterprises adopting AI at scale, anchored by two core products: AI-SPM, providing inventory on all AI assets at a granular level, and AI Runtime Protection, monitoring and responding to AI data risks in real-time.
August 4, 2025 — Source
Do We Really Need IT-OT Integration?
Security Experts Call for Coordinated Autonomy Over Complete Integration
August 4, 2025 — Source or Source or Source or Source
Flashpoint͏͏ Half-Year͏͏ Security͏͏ Report:͏͏ Credential͏͏ Theft͏͏ and͏͏ Breaches͏͏ Surge
Based͏͏ on͏͏ monitoring͏͏ of͏͏ more͏͏ than͏͏ 3.6͏͏ petabytes͏͏ of͏͏ original-source͏͏ data,͏͏ security͏͏ firm͏͏ observed͏͏ growth͏͏ in͏͏ credential͏͏ theft,͏͏ vulnerability͏͏ disclosures͏͏ and͏͏ exploit͏͏ availability,͏͏ as͏͏ well͏͏ as͏͏ a͏͏ rise͏͏ in͏͏ ransomware͏͏ attacks͏͏ and͏͏ large-scale͏͏ data͏͏ breaches.
August 4, 2025 — Source
Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities
Illumina will pay $9.8 million to settle accusations that products provided to the US government were affected by cybersecurity flaws.
August 4, 2025 — Source
German phone repair biz collapses following 2023 ransomware attack
The founder of a German mobile phone repair and insurance biz has begun insolvency proceedings for some operations in his company after struggling financially following a costly ransomware attack in 2023.
August 4, 2025 — Source
Hackers are using link wrapping to steal your Microsoft 365 login
Cybercriminals are using clever tricks like link wrapping to steal Microsoft 365 login info, even bypassing protected email systems.
August 4, 2025 — Source
Jury Holds Meta Accountable in 'Landmark' Privacy Decision
A federal jury found that Meta violated California privacy laws by eavesdropping and recording confidential communications without the consent of millions of consumers who used Flo Health's fertility app embedded with Meta' software development tools and tracking pixels.
August 4, 2025 — Source or Source or Source or Source or Source
LastPass unveils SaaS Protect to clamp down on shadow IT, AI risks
Building on the company's existing SaaS Monitoring capabilities, LastPass SaaS Protect introduces a set of policy enforcements that enable organizations to move from passive visibility into proactive access control.
August 4, 2025 — Source or Source
Malwarebytes vs Norton (2025): Which Antivirus Solution Is Better?
Read this guide to find out which one is better in terms of features, performance, and protection against malware.
August 4, 2025 — Source
Microsoft's new database migration tool has a temporary security cost
Microsoft has announced that Azure Database Migration Service (DMS) now includes a generally available schema migration feature that simplifies moving data by automatically including schemas, tables, indexes, views and other database objects. With this feature, Microsoft hopes to reduce manual effort and ensure consistency between source and target databases.
August 4, 2025 — Source
Millions of age checks performed as UK Online Safey Act gets rolling
But it's OK, claims Brit government, no personal data stored 'unless absolutely necessary'
August 4, 2025 — Source
North Korean spies posing as remote worker4s have infiltrated hundreds of companies, says CrowdStrike
Researchers at security giant CrowdStrike say they have seen hundreds of cases where North Koreans posing as remote IT workers have infiltrated companies to generate money for the regime, marking a sharp increase over previous years.
August 4, 2025 — Source
Northwest Radiologists Data Breach Impacts 350,000 Washingtonians
Northwest Radiologists says the personal information of 350,000 Washington State residents was stolen in a January 2025 data breach.
August 4, 2025 — Source
Nvidia Triton Vulnerabilities Pose Big Risk to AI Models
Nvidia has patched over a dozen vulnerabilities in Triton Inference Server, including another set of vulnerabilities that threaten AI systems.
August 4, 2025 — Source
Perplexity accused of scraping websites that explicitly blocked AI scraping
AI startup Perplexity is crawling and scraping content from websites that have explicitly indicated they don't want to be scraped, according to internet infrastructure provider Cloudflare.
August 4, 2025 — Source
Python-powered malware snags hundreds of credit cards, 200K passwords, and 4M cookies
PXA Stealer pilfers data from nearly 40 browsers, including Chrome
August 4, 2025 — Source
Ransomware gangs join attacks targeting Microsoft SharePoint servers
Ransomware gangs have recently joined ongoing attacks targeting a Microsoft SharePoint vulnerability chain, part of a broader exploitation campaign that has already led to the breach of at least 148 organizations worldwide.
August 4, 2025 — Source
Risks and Rewards for Scaling Up the UK Cybersecurity Market
Orange Cyberdefense's Dominic Trott on Investor Hesitancy, Geopolitical Obstacles
August 4, 2025 — Source or Source or Source
Russia Uses ISPs to Spy on Diplomats, Warns Microsoft
Russian Intelligence Tied to SSL Stripping Attacks Designed for Eavesdropping
August 4, 2025 — Source
Sean Cairncross Confirmed by Senate as National Cyber Director
The US Senate voted to confirm Sean Cairncross as the National Cyber Director, five months after nominalization.
August 4, 2025 — Source
Self-Managed Keycloak for App Connect Dashboard and Designer Authoring
This tutorial explains how to use your Keycloak instance to manage authentication and authorization for App Connect Dashboard and Designer Authoring.
August 4, 2025 — Source
Senate Confirms Trump's National Cyber Director Nominee
Sean Cairncross Confirmed in 59-35 Senate Vote Despite Lacking Technical Experience
August 4, 2025 — Source or Source or Source or Source or Source
Several Vulnerabilities Patched in AI Code Editor Cursor
Attackers could silently modify sensitive MCP files to trigger the execution of arbitrary code without requiring user approval.
August 4, 2025 — Source
SonicWall firewalls targeted in ransomware attacks, possibly via zero-day
Attackers wielding the Akira ransomware and possibly a zero-day exploit have been spotted targeting SonicWall firewalls since July 15, 2025.
August 4, 2025 — Source
SonicWall investigates 'cyber incidents,' including ransomware targeting suspected 0-day
Bypassing MFA and deploying ransomware...sounds like something that rhymes with 'schmero-day'
August 4, 2025 — Source
US Announces $100 Million for State, Local and Tribal Cybersecurity
CISA and FEMA announced two grants of more than $100 million for state, local, and tribal governments looking to improve cybersecurity.
August 4, 2025 — Source
What Is A 'Laptop Farm' & What Is One Used For?
What Is A 'Laptop Farm' & What Is One Used For?
August 4, 2025 — Source
Internet — Security Issues — August 3rd, 2025
Mystery packages with QR codes spark new wave of scams
73% of Americans scan QR codes without checking their source
August 3, 2025 — Source
Silent Push CEO on cybercrime takedowns: 'It's an ongoing cat-and-mouse game'
Plus: why takedowns aren't in threat-intel analysts' best interest
August 3, 2025 — Source
Internet — Security Issues — August 2nd, 2025
CISA roasts unnamed critical national infrastructure body for shoddy security hygiene
Plaintext passwords, shared admin accounts, and insufficient logging rampant at mystery org
August 2, 2025 — Source
Genomics Gear Firm Pays $9.8M to Settle False Cyber Claims
US Alleged Illumina 'Knowingly' Sold Feds Systems Containing Vulnerabilities
August 2, 2025 — Source or Source
Hacking and Decoding Hidden Wireless Signals with a Raspberry Pi and SDR Tools
What if you could decode the invisible chatter of wireless networks, uncovering the secrets of off-grid communication systems, all with tools you can build at home? The intersection of software-defined radio (SDR), Raspberry Pi, and GNU Radio offers a gateway into this fascinating world, where signals once reserved for experts can now be analyzed by anyone with curiosity and patience. Imagine tracking airplanes in real-time, optimizing wireless traffic, or even hacking into the mechanics of Meshtastic—a long-range, off-grid messaging system powered by the LoRa protocol.
August 2, 2025 — Source
Noma Raised $100M to Expand Agentic AI Security Platform
Red-Hot Startup Noma Security to Deepen Protection for AI Models and Agents
August 2, 2025 — Source or Source or Source
Safe Raises $70M Series C to Scale Cyber Risk Management
New Funding, Platform Expansion Aim for Predictive, Autonomous Threat Defense
August 2, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — August 1st, 2025
9 things you shouldn't use AI for at work
AI can boost productivity, but it can also derail your entire operation. From fake legal advice to customer service nightmares, here are nine places AI doesn't belong at work.
August 1, 2025 — Source
$1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025
Meta is sponsoring ZDI's Pwn2Own hacking competition, where participants can earn big prizes for smartphone, WhatsApp and wearable device exploits.
August 1, 2025 — Source
AI Agents Can Hack Smart Contracts on Autopilot
AI Tools Can Steal Crypto Autonomously, Even From Audited Code
August 1, 2025 — Source or Source
AI model enhances diagnosis accuracy of high-risk thyroid nodules
A research team led by Prof. Li Hai from the Hefei Institutes of Physical Science of the Chinese Academy of Sciences has developed a multimodal deep-learning model for predicting the malignancy of TI-RADS 4 thyroid nodules with high-risk characteristics.
August 1, 2025 — Source
AI Still Writing Vulnerable Code
Artificial intelligence may be writing more of today's code, but it's also writing in vulnerabilities. Large language models introduce vulnerabilities in nearly half of test cases when asked to complete secure code tasks, say researchers.
August 1, 2025 — Source or Source or Source or Source or Source
AI-powered Cursor IDE vulnerable to prompt-injection attacks
A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges.
August 1, 2025 — Source
Authorities seize BlackSuit ransomware gang's servers
German prosecutors say a joint U.S.-European operation has seized infrastructure belonging to the BlackSuit ransomware gang, a notorious hacking group blamed for several major cyberattacks in recent years.
August 1, 2025 — Source
Bill Aims to Create National Strategy for Quantum Cybersecurity Migration
Two US senators introduced a bipartisan bill to help prepare federal government agencies for quantum computing threats.
August 1, 2025 — Source
Cyber Risk Management Firm Safe Raises $70 Million
Safe has raised $70 million in Series C funding to advance cyber risk management through specialized AI agents.
August 1, 2025 — Source
Cybercrooks attached Raspberry Pi to bank network and drained ATM cash
Criminals used undocumented techniques and well-placed insiders to remotely withdraw money
August 1, 2025 — Source
Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images
Echo received funding for creating thousands of container images that are not affected by any CVE, for enterprise-grade software infrastructure.
August 1, 2025 — Source
Florida prison email blunder exposes visitor contact info to inmates
Victims fear leak at Everglades Correctional Institution could lead to violent extortion
August 1, 2025 — Source
Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
Should Gen Z to be treated as a separate attack surface within your company?
August 1, 2025 — Source
Genomics Gear Firm Pays $9.8M to Settle False Cyber Claims
US Alleged Illumina 'Knowingly' Sold Feds Systems Containing Vulnerabilities
August 1, 2025 — Source or Source
Hackers use hidden Raspberry Pi and custom malware to attack bank ATMs
The heist was stopped before the criminals could do any significant damage
August 1, 2025 — Source
ISMG Editors: ToolShell Exploit Blurs Crime and Espionage
Also: Rethinking IT-OT Integration; Previewing Black Hat 2025
August 1, 2025 — Source or Source or Source or Source or Source
Microsoft Boosts .NET Bounty Program Rewards to $40,000
Valid, complete reports detailing remote code execution or elevation of privilege bugs in .NET qualify for the maximum rewards.
August 1, 2025 — Source
Noma Raised $100M to Expand Agentic AI Security Platform
Red-Hot Startup Noma Security to Deepen Protection for AI Models and Agents
August 1, 2025 — Source
Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft
Russian state-sponsored APT Secret Blizzard has used ISP-level AitM attacks to infect diplomatic devices with malware.
August 1, 2025 — Source
Sex toy maker Lovense threatens legal action after fixing security flaws that exposed users' data
Lovense, a maker of internet-connected sex toys, has confirmed it has fixed a pair of security vulnerabilities that exposed users' private email addresses and allowed attackers to remotely take over any user's account.
August 1, 2025 — Source
SonicWall firewall devices hit in surge of Akira ransomware attacks
SonicWall firewall devices have been increasingly targeted since late July in a surge of Akira ransomware attacks, potentially exploiting a previously unknown security vulnerability, according to cybersecurity company Arctic Wolf.
August 1, 2025 — Source
View to a Patch: Google Tweaks Its Vulnerability Disclosure
Security Experts Laud Project Zero's Push for Greater Transparency, Faster Patches
August 1, 2025 — Source or Source or Source or Source
Wallarm Secures $55M to Safeguard API-Driven Business Logic
Series C Funding Supports Evolution to Protecting API-Powered Business Revenue
August 1, 2025 — Source
What Makes an AI Startup Fundable - From a VC Who Knows
Investor Umesh Padval on Platform Power, Scaling Fast and Global AI Plays
August 1, 2025 — Source or Source or Source or Source or Source
Why Legal Woes Continue to Mount Over Health Data Trackers
Regulatory Attorney Elizabeth Hodge of Akerman on Ongoing Privacy Worries
August 1, 2025 — Source or Source or Source or Source or Source
Yes, You Can Bundle Other Cybersecurity Services With Some VPNs. But Is It a Good Idea?
You need more than just a VPN to boost your digital privacy and security. Bundling additional tools with your VPN can be convenient, but be aware of the pitfalls.
August 1, 2025 — Source
Internet — Security Issues — July 29th, 2025
Allianz Life Breach Tied to CRM Compromise
Attackers Stole US Customer Data Using Social Engineering
July 29, 2025 — Source or Source or Source or Source or Source
Booz Allen Hamilton launches Vellox Reverser to accelerate AI-powered malware analysis
Booz Allen Hamilton announced Vellox Reverser, an AI-enabled cloud product that protects organizations from malware as cyberattacks grow increasingly insidious. The service uses a network of peer-to-peer nodes that collaboratively deconstruct complex malware binaries and produce actionable defensive recommendations in minutes instead of days or weeks.
July 29, 2025 — Source
Corelight Uses Gen AI to Power Smarter Threat Detection
SaaS Enhancements Aim to Boost Network Detection, Response for Small Security Teams
July 29, 2025 — Source or Source
Coyote Trojan Turns Accessibility Into Attack Surface
Brazil-Targeting Malware Exploits Windows UIA to Evade Detection
July 29, 2025 — Source or Source or Source or Source or Source
Cyware expands Intelligence Suite to streamline CTI program deployment and operations
Cyware expanded its Cyware Intelligence Suite, an enhanced threat intelligence program-in-a-box that consolidates threat management capabilities into a streamlined, logical workflow. The expansion enables security teams to operationalize threat intelligence more easily and improve security posture faster.
July 29, 2025 — Source
Darwinium launches AI tools to detect and disrupt adversarial threats
Just ahead of Black Hat USA 2025, Darwinium has announced the launch of Beagle and Copilot, two new agentic AI features that simulate adversarial attacks, surface hidden vulnerabilities, and dynamically optimize fraud defenses. As fraudsters increasingly deploy AI agents to evade detection and manipulate digital systems, Darwinium gives defenders their own autonomous AI capabilities, built natively into its behavioral intelligence platform.
July 29, 2025 — Source or Source
Dropzone AI Raises $37 Million for Autonomous SOC Analyst
Dropzone AI has announced a Series B funding round led by Theory Ventures to boost its AI SOC solution.
July 29, 2025 — Source
Fable Security launches with $31m to tackle human risk in cybersecurity
Fable Security, a new human risk management platform, has launched with $31 million in funding from Greylock Partners and Redpoint Ventures. It is already working with enterprises across finance, healthcare, logistics, and technology, helping security teams reduce employee-driven risk with targeted, real-time interventions.
July 29, 2025 — Source or Source
FBI: Watch out for these signs Scattered Spider is spinning its web around your org
The FBI and a host of international cyber and law enforcement agencies on Tuesday warned that Scattered Spider extortionists have changed their tactics and are now breaking into victims' networks using savvier social engineering techniques, searching for organizations' Snowflake database credentials, and deploying a handful of new ransomware variants, most recently DragonForce.
July 29, 2025 — Source
From Ex Machina to Exfiltration: When AI Gets Too Curious
From prompt injection to emergent behavior, today's curious AI models are quietly breaching trust boundaries.
July 29, 2025 — Source
Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware
Hackers were spotted exploiting a critical SAP NetWeaver vulnerability tracked as CVE-2025-31324 to deploy the Auto-Color Linux malware in a cyberattack on a U.S.-based chemicals company.
July 29, 2025 — Source
Health System Settles Web Tracker Lawsuit for up to $9.25M
Lawsuit Claims BJC Health Shared Patient Info From MyChart Portal Without Consent
July 29, 2025 — Source or Source or Source
How attackers are still phishing "phishing-resistant" authentication
As awareness grows around many MFA methods being "phishable" (i.e. not phishing resistant), passwordless, FIDO2-based authentication methods (aka. passkeys) like YubiKeys, Okta FastPass, and Windows Hello are being increasingly advocated.
July 29, 2025 — Source
How FinServ Firms Can Navigate Secure Open Finance in 2025 and Beyond
Banks Must Secure APIs, Vet Partners and Prepare for Open Finance Threats in 2025
July 29, 2025 — Source or Source or Source or Source or Source
Joint cyber security advisory on Scattered Spider
The Canadian Centre for Cyber Security (Cyber Centre) has joined the United States' Federal Bureau of Investigation (FBI) and the following domestic and international partners in issuing a joint advisory on Scattered Spider:
July 29, 2025 — Source
Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment
Vulnerabilities discovered by Binarly in Lenovo devices allow privilege escalation, code execution, and security bypass.
July 29, 2025 — Source
Microsoft Authenticator is ending password autofill soon. How to set up a passkey before Aug. 1
If you're a Microsoft Authenticator user, like me, you've probably received at least one notice that the app's password management features are no longer usable and that your stored passwords will be inaccessible starting Aug. 1 unless you have the Edge browser.
July 29, 2025 — Source
Minnesota activates National Guard after St. Paul cyberattack
Minnesota Governor Tim Walz has activated the National Guard in response to a crippling cyberattack that struck the City of Saint Paul, the state's capital, on Friday.
July 29, 2025 — Source
Oracle/Cerner EHR Hack: Breach Reports Still Trickling In
At Least 410,000 Patients Reported Affected, But Likely Even More Victims
July 29, 2025 — Source or Source or Source or Source or Source
Order Out of Chaos -- Using Chaos Theory Encryption to Protect OT and IoT
The need for secure encryption in IoT and IIoT devices is obvious, and potentially critical for OT and, by extension, much of the critical infrastructure.
July 29, 2025 — Source or Source
Organizations Warned of Exploited PaperCut Flaw
Threat actors are exploiting a two-year-old vulnerability in PaperCut that allows them to execute arbitrary code remotely.
July 29, 2025 — Source
PCI DSS 4.0.1 Pushes E-Commerce to Secure Apps Fast
New PCI DSS Rules Raise the Bar, Make App Security a Mandate
July 29, 2025 — Source or Source or Source or Source
Promptfoo Raises $18.4 Million for AI Security Platform
Promptfoo has raised $18.4 million in Series A funding to help organizations secure LLMs and generative AI applications.
July 29, 2025 — Source
Ransomware Hits Healthcare Through Applications
Healthcare Faces Rising App-Based Ransomware Threats and Urgent Compliance Demands
July 29, 2025 — Source
Rise of Chaos Ransomware Tied to BlackSuit Group's Exit
Operation Checkmate Disrupts One of the Large Russian-Speaking Ransomware Groups
July 29, 2025 — Source or Source or Source or Source
Russian airline Aeroflot grounds dozens of flights after cyberattack
Aeroflot, Russia's flag carrier, has suffered a cyberattack that resulted in the cancellation of more than 60 flights and severe delays on additional flights.
July 29, 2025 — Source
Scammers Are Using Fake Lawyers and Court Dates to Steal Immigrants' Money. Here's What to Look Out For
Criminals will prey on immigration fears to trick people out of their money.
July 29, 2025 — Source
Seal Security Raises $13 Million to Secure Software Supply Chain
The open source security firm will use the investment to enhance go-to-market efforts and accelerate platform expansion.
July 29, 2025 — Source
Sex toy maker Lovense caught leaking users' email addresses and exposing accounts to takeovers
A security researcher says sex toy maker Lovense has failed to fully fix two security flaws that expose the private email addresses of its users and allow the takeover of any user's account.
July 29, 2025 — Source
SharePoint Zero-Days Exploited to Unleash Warlock Ransomware
145 Organizations Compromised by China-Linked Ransomware Hackers and Others
July 29, 2025 — Source or Source or Source or Source or Source
Sploitlight: macOS Vulnerability Leaks Sensitive Information
The TCC bypass could expose information cached by Apple Intelligence, including geolocation and biometric data.
July 29, 2025 — Source
Study reveals how mobile apps track users through WiFi and Bluetooth
Researchers from IMDEA Networks, in collaboration with Universidad Carlos III de Madrid, IMDEA Software Institute, and the University of Calgary, have conducted the first large-scale study—"Your Signal, Their Data: An Empirical Privacy Analysis of Wireless-scanning SDKs in Android"—on how certain Android mobile applications use a device's WiFi and Bluetooth connections to track users' movements in their daily lives, thereby violating their privacy.
July 29, 2025 — Source
Tea app security breaches reveal private chats and photo ID, as it tops App Store
Two major security vulnerabilities in the Tea app -- which claims to make dating safer for women -- have exposed the private chats and personal data of at least tens of thousands of users.
July 29, 2025 — Source
Tea app takes messaging system offline after second security issue reported
Tea, a dating discussion app that recently suffered a high-profile cybersecurity breach, announced late Monday that some direct messages were also accessed in the incident.
July 29, 2025 — Source
Telecom giant Orange warns of disruption amid ongoing cyberattack
Orange, a French telecommunications giant and one of the largest phone providers in the world, announced on Monday that it was the victim of an unspecified cyberattack.
July 29, 2025 — Source
Ukraine strikes back at Russia — launches cyberattack on forces in Crimea as independent hackers target airline Aeroflot, grounding dozens of planes
The first was a sustained distributed denial-of-service attack on Crimean forces; the second was reportedly destructive.
July 29, 2025 — Source
Varonis unveils Next-Gen Database Activity Monitoring for agentless database security and compliance
Varonis released Next-Gen Database Activity Monitoring (DAM), a new approach to database security that deploys quickly and overcomes the challenges legacy vendors face in preventing data breaches and ensuring regulatory compliance.
July 29, 2025 — Source
War Games: MoD asks soldiers with 1337 skillz to compete in esports
Troopers to swap radios for Turtle Beaches in preparation for '21st century challenges'
July 29, 2025 — Source
Why Palo Alto Networks Is Eyeing a $20B+ Buy of CyberArk
Palo Alto Has Always Shied Away From Identity and Expensive M&A. What Changed?
July 29, 2025 — Source or Source or Source or Source
Why your computer will thank you for choosing Webroot Essentials
Let's be honest -- nobody wants antivirus software that slows down their computer. You know the feeling: you install security software to protect yourself, but suddenly your laptop takes forever to start up, programs freeze, and you're constantly waiting for things to load.
July 29, 2025 — Source
Your body can be fingerprinted and tracked by Wi-Fi signals
A new system developed by researchers in Rome can identify specific people and their locations with 95% accuracy.
July 29, 2025 — Source
Internet — Security Issues — July 27th, 2025
Allianz Life confirms data breach affecting majority of 1.4M US customers
Hackers gained access to personal data on the majority of the 1.4 million customers of Allianz Life Insurance Company of North America, the company confirmed Saturday.
July 27, 2025 — Source
IT provider sued after it simply 'handed the credentials' to hackers — Clorox claims Cognizant gaffe enabled a $380m ransomware attack
Your network security is only as strong as its weakest link.
July 27, 2025 — Source
Scattered Spider is running a VMware ESXi hacking spree
Scattered Spider hackers have been aggressively targeting virtualized environments by attacking VMware ESXi hypervisors at U.S. companies in the retail, airline, transportation, and insurance sectors.
July 27, 2025 — Source
Week in review: Microsoft SharePoint servers under attack, landing your first cybersecurity job
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
July 27, 2025 — Source
Internet — Security Issues — July 26th, 2025
Allianz Life says 'majority' of customers' personal data stolen in cyberattack
U.S. insurance giant Allianz Life has confirmed to TechCrunch that hackers stole the personal information of the "majority" of its customers, financial professionals, and employees during a mid-July data breach.
July 26, 2025 — Source
Blame a leak for Microsoft SharePoint attacks, researcher insists
A week after Microsoft told the world that its July software updates didn't fully fix a couple of bugs, which allowed miscreants to take over on-premises SharePoint servers and remotely execute code, researchers have assembled much of the puzzle — with one big missing piece.
July 26, 2025 — Source
How Torq Is Rewiring SOCs With Autonomous Cyber Agents
CEO Ofer Smadari: AI Agents Now Resolving Threat Cases at Scale with Accuracy
July 26, 2025 — Source or Source or Source
Patients Still Struggle With Full Access to Health Info
Tech Standards, Regulatory Levers Have Removed Barriers. What's Still in the Way?
July 26, 2025 — Source or Source or Source or Source or Source
The Tea app was intended to help women date safely. Then it got hacked
Tea, a provocative dating app designed to let women anonymously ask or warn each other about men they'd encountered, rocketed to the top spot on the U.S. Apple App Store this week. On Friday, the company behind the app confirmed it had been hacked: Thousands of images, including selfies, were leaked online.
July 26, 2025 — Source
Internet — Security Issues — July 25th, 2025
Advisor to Brit tech contractors Qdos confirms client data leak
Policy management not affected, but some personal data may have been snaffled
July 25, 2025 — Source
AI emerges as a cybersecurity teammate
On its own artificial intelligence isn't a solution to cybersecurity issues, but new data from Hack The Box, a platform for building attack-ready teams and organizations, reveals that cybersecurity teams are increasingly beginning to adopt AI as a copilot for solving security challenges.
July 25, 2025 — Source
Amazon AI coding agent hacked to inject data wiping commands
A hacker planted data wiping code in a version of Amazon's generative AI-powered assistant, the Q Developer Extension for Visual Studio Code.
July 25, 2025 — Source
Chinese Spies Target Networking and Virtualization Flaws to Breach Isolated Environments
Chinese cyberespionage group Fire Ant is targeting virtualization and networking infrastructure to access isolated environments.
July 25, 2025 — Source
Critical Infrastructure Leaders: Threat Level Remains High
OT Experts Advocate for Collaboration and "Adversary-Hostile" National Defenses
July 25, 2025 — Source or Source or Source or Source
Did You Get A Suspicious Text About An Amazon Return? Here's What's Happening
A new scam targeting Amazon users is making the rounds in the form of suspicious text messages, but those who know what to look out for can avoid being taken advantage of. The texts in question were spotted by scam prevention service Guardio, which passed the information along to Forbes. According to the firm, these particular text attacks have spiked by 5,000% in recent weeks.
July 25, 2025 — Source
Do Website Cookies Pose Legal, Security Risks to Your Firm?
Lawyer Jonathan Armstrong on Legal, Security Trouble Lurking in Cookie Missteps
July 25, 2025 — Source or Source or Source
Freelance dev shop Toptal caught serving malware after GitHub account break-in
Malicious code lurking in over 5,000 downloads, says Socket researcher
July 25, 2025 — Source
Hacker Sneaks Data-Deleting Prompt Into Amazon's AI Coding Tool
Thankfully, Amazon reports that no user data has actually been compromised.
July 25, 2025 — Source
How Torq Is Rewiring SOCs With Autonomous Cyber Agents
CEO Ofer Smadari: AI Agents Now Resolving Threat Cases at Scale with Accuracy
July 25, 2025 — Source or Source
In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth
Noteworthy stories that might have slipped under the radar: Google Cloud Build vulnerability earns researcher big bounty, more countries hit by Louis Vuitton data breach, organizations' attack surface is increasing.
July 25, 2025 — Source
Mitel Patches Critical Flaw in Enterprise Communication Platform
An authentication bypass vulnerability in Mitel MiVoice MX-ONE could allow attackers to access user or admin accounts on the system.
July 25, 2025 — Source
New York Unveils 'Nation-Leading' Water Sector Cyber Rules
State Seeks Public Input on New Reporting Rules and Regulations for Water Sector
July 25, 2025 — Source or Source or Source or Source or Source
No Patch for Flaw Exposing Hundreds of LG Cameras to Remote Hacking
LG Innotek LNV5110R security cameras are affected by a vulnerability that can be exploited for unauthenticated remote code execution.
July 25, 2025 — Source
Risk highlighted as Chinese hackers hit Microsoft
Software giant Microsoft is at the center of cybersecurity storm after China-linked hackers exploited flaws in SharePoint servers to target hundreds of organizations.
July 25, 2025 — Source
Scattered Spider Exploiting VMware vSphere
The loosely connected band of adolescent cybercriminals tracked as Scattered Spider has joined the VMware hypervisor hacking bandwagon, pivoting into virtual servers through corporate instances of Active Directory.
July 25, 2025 — Source or Source or Source or Source or Source
Sophisticated Koske Linux Malware Developed With AI Aid
The Koske Linux malware shows how cybercriminals can use AI for payload development, persistence, and adaptivity.
July 25, 2025 — Source
Supply-chain attacks on open source software are getting out of hand
Attacks affected packages, including one with ~2.8 million weekly downloads.
July 25, 2025 — Source
Swiss-Based Healthcare Network AMEOS Responding to Attack
Systems for 100 Facilities Taken Offline, Patients Warned of Potential Data Breach
July 25, 2025 — Source or Source or Source or Source or Source
The role of the cybersecurity PM in incident-driven development
Gone are the days when cybersecurity meant stopping annoying viruses like the Love Bug. Today, it's about battling a massive, financially motivated cybercrime industry. Attacks are smarter, faster, and more damaging—and that changes everything for product teams.
July 25, 2025 — Source
UK Student Sentenced to Prison for Selling Phishing Kits
Ollie Holman was sentenced to prison for selling over 1,000 phishing kits that caused estimated losses of over $134 million.
July 25, 2025 — Source
US sanctions North Korean firm, nationals behind IT worker schemes
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has sanctioned three North Korean nationals and a company for supporting fraudulent IT worker schemes that generated illicit revenue for the Democratic People's Republic of Korea (DPRK) government.
July 25, 2025 — Source or Source
Your Microsoft Passwords Will Vanish in a Few Hours. What to Do Right Now
Microsoft's go-to password manager won't be the same after Aug. 1.
July 25, 2025 — Source
Internet — Security Issues — July 22nd, 2025
83 percent of IT and engineering professionals bypass security controls
A new survey of 1,000 IT, security, and engineering professionals across North America uncovers a fractured landscape of legacy VPNs, slow manual processes, and overlapping tools -- with 99 percent of respondents saying they'd like to redesign their company's access and networking setup from the ground up.
July 22, 2025 — Source
158-year-old company forced to close after ransomware attack precipitated by a single guessed password — 700 jobs lost after hackers demand unpayable sum
An employee's weak password was the company's Achilles' heel.
July 22, 2025 — Source or Source
AI moves from optional to essential in cybersecurity, according to new findings
A new report from Abnormal AI shows cybersecurity leaders and frontline analysts agree that artificial intelligence is now central to the future of the security operations center (SOC).
July 22, 2025 — Source
Apple Alerted Dozens of Iranians Targeted by Sophisticated Spyware Attacks
Apple has quietly been sending threat notifications to users it believes are being targeted by advanced cyberattacks. In the first half of 2025, more than a dozen Iranians received these alerts, including government officials, tech workers, and dissidents, according to new research. These individuals were reportedly targeted with highly sophisticated spyware just months before the Iran-Israel war began.
July 22, 2025 — Source or Source
BitRaser secures data erasure on macOS devices
BitRaser launched its Integrated Mac Eraser and Diagnostics Tool, a software designed to streamline IT asset disposition (ITAD) processes.
July 22, 2025 — Source
Chinese Hackers' Evolution From Vandals to Strategists
Early Hacktivists Laid the Blueprint for Chinese Hacking
July 22, 2025 — Source or Source or Source or Source
Chinese state hackers targeting Microsoft customers
Chinese state-sponsored hackers are actively exploiting critical security vulnerabilities in users of Microsoft's popular SharePoint servers to steal sensitive data and deploy malicious code, the US tech giant warned Tuesday.
July 22, 2025 — Source
CISA and FBI warn of escalating Interlock ransomware attacks
CISA and the FBI warned on Tuesday of increased Interlock ransomware activity targeting businesses and critical infrastructure organizations in double extortion attacks.
July 22, 2025 — Source
Cisco: Maximum-severity ISE RCE flaws now exploited in attacks
Cisco is warning that three recently patched critical remote code execution vulnerabilities in Cisco Identity Services Engine (ISE) are now being actively exploited in attacks.
July 22, 2025 — Source
Coyote malware abuses Windows accessibility framework for data theft
A new variant of the banking trojan 'Coyote' has begun abusing a Windows accessibility feature, Microsoft's UI Automation framework, to identify which banking and cryptocurrency exchange sites are accessed on the device for potential credential theft.
July 22, 2025 — Source
CrushFTP Zero-Day Exploit Leaves Thousands Of Servers Vulnerable To Hijacking
CrushFTP, a service that provides users with secure file server software, has recently been targeted by hackers. Unfortunately, it seems as if some customers have been compromised, with thousands of servers still vulnerable to being attacked, according to the non-profit Shadowserver Foundation. Although the company says it has remedied the issue with its latest version release.
July 22, 2025 — Source
CYE AI delivers insights into an organization's cyber risk
CYE launched its new AI Agent, CYE AI. The addition of this conversational AI assistant enables organizations to understand, prioritize, and act on their unique cyber risk from day one.
July 22, 2025 — Source
Darktrace Buys Network Traffic Visibility Firm Mira Security
Startup Mira Security Will Offer Insights on Encrypted Network Traffic, Decryption
July 22, 2025 — Source or Source
Dell Confirms Security Breach by Extortion Group, Calls Stolen Data 'Fake'
Cyber extortion group World Leaks released more than 1.3TB of internal Dell data, including scripts and backups. Dell insists no sensitive customer information was exposed.
July 22, 2025 — Source
Dell Says Data Leaked by Hackers Is Fake
Dell confirms the compromise of a demo environment containing synthetic data after hackers leak allegedly stolen information.
July 22, 2025 — Source
Dior Says Personal Information Stolen in Cyberattack
Dior says hackers accessed personal information in a January 2025 intrusion. No payment information was compromised.
July 22, 2025 — Source
DNS embedded malware technique used to create a hacker-inspired version of the popular Mad Libs word game — built on networking infrastructure to provide distributed version
Why use DNS to host malware when you can use it to host Wu-Tang-themed mad-libs instead?
July 22, 2025 — Source
File Transfer Flaw Blamed in Health Breach Affecting 233,000
Cierant Corp. Says Cleo MFT Zero-Day Exploit Compromised Health Plan Client Data
July 22, 2025 — Source
Free tool uncovers API vulnerabilities
According to Verizon's 2025 Data Breach Investigations Report, API-related breaches have increased nearly 40 percent year-on-year, with broken authorization cited as one of the most exploited flaws.
July 22, 2025 — Source
How to Create a Secure Username
Discover how to create a unique and secure username for your online accounts, and find out why it's just as important as having a strong password.
July 22, 2025 — Source
Humans can be tracked with unique 'fingerprint' based on how their bodies block Wi-Fi signals
Wi-Fi spy with my little eye that same guy I saw at another hotspot
July 22, 2025 — Source
Identity Threats Target Small Businesses in MFA Workarounds
Huntress's Kyle Hanslovan Warns of MFA Bypass, Rogue Apps, Fake Device Enrollments
July 22, 2025 — Source or Source or Source or Source
Lumma infostealer malware returns after law enforcement disruption
The Lumma infostealer malware operation is gradually resuming activities following a massive law enforcement operation in May, which resulted in the seizure of 2,300 domains and parts of its infrastructure.
July 22, 2025 — Source
Malwarebytes introduces security module designed to combat email-based threats
ThreatDown Email Security, powered by IRONSCALES' adaptive AI technology, extends protection beyond the endpoint—enabling users to manage both endpoint and email security from a single, unified console. The new module is available immediately to all customers and will be rolled out to Managed Service Providers (MSPs) in early August.
July 22, 2025 — Source
Microsoft Accuses Chinese Hackers Of Exploiting Critical SharePoint Zero-Day Vulnerability In Massive Global Cyberattack Targeting Government Agencies, Businesses, And Sensitive Infrastructure
Cyberattacks are becoming alarmingly frequent, particularly those targeting big firms and exploiting their security flaws. Such has been the case recently, as Microsoft now accuses Chinese state-sponsored attackers of finding gaps and exfiltrating SharePoint document management software in a global cyberattack campaign. The tech giant further went on to state that the target of this espionage campaign is mainly businesses and government agencies, as well as their sensitive infrastructure.
July 22, 2025 — Source
Microsoft grapples with another security breach: The latest on the SharePoint attacks
Microsoft is once again in the cybersecurity spotlight, acknowledging Tuesday morning that hackers linked to China are among those exploiting vulnerabilities in on-premises SharePoint software, the latest in a string of security problems that have plagued the tech giant.
July 22, 2025 — Source
Microsoft patches critical SharePoint 2016 zero-days amid active exploits
Admins urged to rotate machine keys, restart IIS after emergency fix
July 22, 2025 — Source
Microsoft pins on-prem SharePoint attacks on Chinese threat actors
Most intriguingly, Check Point Research says that they observed the first exploitation attempts on July 7th, with the target being a major Western government.
July 22, 2025 — Source or Source
Microsoft says Chinese hacking groups are behind SharePoint attacks
At least 54 organizations have been breached in the attacks.
July 22, 2025 — Source
Microsoft Traces On-Premises SharePoint Exploits to China
But Hacking Groups of All Stripes Now Have Access to Exploit Code, Researchers Warn
July 22, 2025 — Source or Source or Source
MSPs put aside dedicated funds for ransomware payments
According to a new report 45 percent of MSPs admit to having a dedicated pool of money set aside for ransomware payments. This is despite increasing pressure from insurers and global governments to avoid paying ransoms to stop fueling criminal enterprises and encourage proactive resilience.
July 22, 2025 — Source
National security meets next-gen tech at TechCrunch Disrupt 2025's AI Defense panel
TechCrunch Disrupt 2025 is where breakthrough ideas meet the real-world challenges that define the future — and with over 10,000 startup and VC leaders converging, there's no better place to have the hard conversations. One of the most urgent? How artificial intelligence is reshaping national defense, security, and critical infrastructure in real time.
July 22, 2025 — Source
New AI-driven features set to help security remediation efforts
Security teams today are overwhelmed by fragmented data, inconsistent tagging, and the manual burden of translating findings into fixes.
July 22, 2025 — Source
Open source's superior security is a matter of eyeballs: Be kind to the brains behind them
The modern art form that redeemed a Windows utility has lessons for all
July 22, 2025 — Source
Reclaiming Control: How Enterprises Can Fix Broken Security Operations
Once a manageable function, security operations has become a battlefield of complexity.
July 22, 2025 — Source
Silicon Valley engineer admits theft of US missile tech secrets
Used stolen info to pitch for Chinese tech talent program
July 22, 2025 — Source
The MFA Illusion: Rethinking Identity for Non-Human Agents
As Agentic AI Takes Over Workflows, Traditional Authentication Practices Fall Short
July 22, 2025 — Source
ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets
More details emerged on the ToolShell zero-day attacks targeting SharePoint servers, but confusion remains over the vulnerabilities.
July 22, 2025 — Source
UK government wants ransomware victims to report breaches so it can carry out 'targeted disruptions' against hackers
The U.K. government wants to require victims of ransomware to report if they were breached with the goal of providing law enforcement with information that could help target the cybercriminals responsible.
July 22, 2025 — Source
UK Sanctions Russian Hackers Tied to Assassination Attempts
The UK government has sanctioned three Russian APTs and 18 individuals for their involvement in cyber operations against Ukraine, NATO allies, and EU.
July 22, 2025 — Source
UK to ban public sector orgs from paying ransomware gangs
The United Kingdom's government is planning to ban public sector and critical infrastructure organizations from paying ransoms after ransomware attacks.
July 22, 2025 — Source or Source
Vulnerabilities Expose Helmholz Industrial Routers to Hacking
Eight vulnerabilities, including ones allowing full control over a device, have been discovered and patched in Helmholz REX 100 industrial routers.
July 22, 2025 — Source
Internet — Security Issues — July 20th, 2025
HPE warns of hardcoded passwords in Aruba access points
Hewlett-Packard Enterprise (HPE) is warning of hardcoded credentials in Aruba Instant On Access Points that allow attackers to bypass normal device authentication and access the web interface.
July 20, 2025 — Source
Microsoft SharePoint zero-day exploited in RCE attacks, no patch available
Critical zero-day vulnerabilities in Microsoft SharePoint, tracked as CVE-2025-53770 and CVE-2025-53771, have been actively exploited since at least July 18th, with no patch available and at least 85 servers already compromised worldwide.
July 20, 2025 — Source
SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild -- No Patch Available
Enterprises running SharePoint servers should not wait for a fix for CVE-2025-53770 and should commence threat hunting to search for compromise immediately.
July 20, 2025 — Source
Singapore military helps battle cyberattack: minister
Units in Singapore's military have been called in to help combat a cyberattack against critical infrastructure, the country's defense minister said Saturday—a hack attempt attributed to an espionage group experts have linked to China.
July 20, 2025 — Source
UK uncovers novel Microsoft snooping malware, blames and sanctions GRU cyberspies
Fancy Bear can't keep its claws out of Outlook inboxes
July 20, 2025 — Source
Internet — Security Issues — July 19th, 2025
For privacy and security, think twice before granting AI access to your personal data
AI is being forced on us in pretty much every facet of life, from phones and apps to search engines and even drive-throughs, for some reason. The fact that we're now getting web browsers with baked-in AI assistants and chatbots shows that the way some people are using the internet to seek out and consume information today is very different from even a few years ago.
July 19, 2025 — Source
Singapore facing 'serious' cyberattack, says minister
Singapore announced it was battling a "serious" cyberattack against its critical infrastructure, attributing the hack to an espionage group that experts have linked to China.
July 19, 2025 — Source
These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more
In the last 30 years or so, cybersecurity has gone from being a niche specialty within the larger field of computer science, to an industry estimated to be worth more than $170 billion made of a globe-spanning community of hackers. In turn, the industry's growth and high-profile hacks such as the 2015 Sony breach, the 2016 U.S. election hack and leak operations, the Colonial Pipeline ransomware attack, and a seemingly endless list of Chinese government hacks have made cybersecurity and hacking go mainstream.
July 19, 2025 — Source
Why A VPN Works Better When You Use A Server Closer To Your Location
Virtual private networks (VPNs) are a key way of staying safe online, as they boost privacy and security while you browse the web. They're also convenient tools for a variety of other online activities, as they let you pretend you're browsing from a different location than where you really are. If you're trying to access content that's restricted in your region, then this can be helpful. However, using a VPN server that's far away can cause some connection problems.
July 19, 2025 — Source
Internet — Security Issues — July 18th, 2025
1.4 Million Affected by Data Breach at Virginia Radiology Practice
Radiology Associates of Richmond has disclosed a data breach impacting protected health and personal information.
July 18, 2025 — Source
Anne Arundel Dermatology Data Breach Impacts 1.9 Million People
Anne Arundel Dermatology said hackers had access to its systems for three months and may have stolen personal and health information.
July 18, 2025 — Source
Best VPN for Mac 2025: Trustworthy Mac VPNs tested by experts
Find out what is the best VPN for Mac with our complete guide in which we review and rank the top VPNs for Mac.
July 18, 2025 — Source
Best VPN services 2025: I've tested the best VPNs to find the fastest, most secure services
After testing dozens of VPNs, I've ranked my favorite VPNs on the market based on security, speed, and safety.
July 18, 2025 — Source
Botnet Abuses GitHub Repositories to Spread Malware
Hackers Using Amadey Bot to Drops Payloads From Fake GitHub Accounts
July 18, 2025 — Source
ChatGPT Agent Is Here – And It’s Like Having a Digital Intern on Call
OpenAI has introduced ChatGPT Agent, a powerful new tool that takes the AI beyond simple answers and into full personal assistant territory, capable of handling tasks like booking, planning, and research across the web. This marks a shift toward agentic AI, where tools like ChatGPT don’t just respond—they proactively act on your behalf while still giving you full control.
July 18, 2025 — Source
ChatGPT: Everything you need to know about the AI-powered chatbot
ChatGPT, OpenAI’s text-generating AI chatbot, has taken the world by storm since its launch in November 2022. What started as a tool to supercharge productivity through writing essays and code with short text prompts has evolved into a behemoth with 300 million weekly active users.
July 18, 2025 — Source
China-Backed Hackers Intensify Attacks on Taiwan Chipmakers
3 State-Sponsored Groups Spear-Phish Semiconductor Ecosystem
July 18, 2025 — Source or Source or Source
Chinese state-sponsored cyberattacks target Taiwan semiconductor industry — security firm says motivation of three separate campaigns 'most likely espionage'
The chip wars intensify.
July 18, 2025 — Source
CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable
The CitrixBleed 2 vulnerability in NetScaler may expose organizations to compromise even if patches have been applied.
July 18, 2025 — Source
Cybersecurity insurance market set to be worth $32.19 billion by 2030 as businesses respond to growing cyber threats
The global cybersecurity insurance market is expected to grow to $32.19 billion by 2030, up from $16.54 billion in 2025, according to a MarketsandMarkets report.
July 18, 2025 — Source
Coro's New CEO Prioritizes Channel-Driven Global Expansion
Joe Sykora Set to Scale Coro's SMB Cybersecurity Platform Globally Via MSP Partners
July 18, 2025 — Source or Source
Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking
Wiz researchers discovered NVIDIAScape, an Nvidia Container Toolkit flaw that can be exploited for full control of the host machine.
July 18, 2025 — Source
Crypto ATM Crackdown: British Cops Bust Suspected Operators
As Crypto ATMs Facilitate Scams and Money Laundering, More Governments Take Aim
July 18, 2025 — Source or Source
Dermatology, Imaging Hacks Expose 3.3 Million Patients' PHI
Incidents Rank Among the Top Five Health Data Breaches in 2025 - So Far
July 18, 2025 — Source
Email Protection Startup StrongestLayer Emerges From Stealth Mode
AI-native email security firm StrongestLayer has emerged from stealth mode with $5.2 million in seed funding.
July 18, 2025 — Source
Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication
Dozens of FortiWeb instances have been hacked after PoC targeting a recent critical vulnerability was shared publicly.
July 18, 2025 — Source
Fraud: A Growth Industry Powered by Gen-AI
With generative AI enabling fraud-as-a-service at scale, legacy defenses are crumbling. The next wave of cybercrime is faster, smarter, and terrifyingly synthetic.
July 18, 2025 — Source
Golden dMSA Flaw Exposes Firms to Major Credential Theft
Semperis Warns of Flaw in Windows Server 2025 Delegated Managed Service Accounts
July 18, 2025 — Source or Source
Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet
Google has filed a lawsuit against the Badbox 2.0 botnet operators, after identifying over 10 million infected Android devices.
July 18, 2025 — Source
Hackers scanning for TeleMessage Signal clone flaw exposing passwords
Researchers are seeing exploitation attempts for the CVE-2025-48927 vulnerability in the TeleMessage SGNL app, which allows retrieving usernames, passwords, and other sensitive data.
July 18, 2025 — Source
In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass
Noteworthy stories that might have slipped under the radar: powerful US law firm hacked by China, Symantec product flaw, $10,000 Meta AI hack, cryptocurrency thieves attempting to bypass FIDO keys.
July 18, 2025 — Source
Microsoft announces Extended Security Update programs for Exchange and Skype for Business
Support has ended, or is coming to an end, for a lot of Microsoft products at the moment. Perhaps the most notable or well-publicized is Windows 10, but this is far from being the end of the story.
July 18, 2025 — Source
NordPass vs. Bitwarden: Which password manager is best?
NordPass offers an excellent user experience, while Bitwarden's pricing can't be beat. Here's how to decide between the two.
July 18, 2025 — Source
Russian alcohol retailer WineLab closes stores after ransomware attack
WineLab, the retail store of the largest alcohol company in Russia, has closed its stores following a cyberattack that is impacting its operations and causing purchase problems to its customers.
July 18, 2025 — Source
Securing The New Identity: AI Agents In The Enterprise
Steve Toole discusses AI agent challenges and why current controls are not enough
July 18, 2025 — Source
Security, AI Oversight Are Flashpoints in Draft Defense Bill
House, Senate Versions of 2026 NDAA Offer Competing Approaches to Cyber
July 18, 2025 — Source or Source or Source
Startup radar: Seattle founders tackle big problems, from childcare to cybersecurity
Our latest startup radar spotlight features a fascinating mix of first-time and repeat founders building off their experience at companies such as Amazon and Box as they pursue ideas in childcare, video metadata, social work, cybersecurity, and local business support.
July 18, 2025 — Source
Stop The Spread: How To Contain Machine Identity Sprawl
Jeff Bounds discusses how machine identities became today’s biggest blind spots
July 18, 2025 — Source
Texas Drug, Alcohol Testing Firm Hack Affects Nearly 750,000
Cybercrime Group Bian Lian Claimed Responsibility for Attack Last Year
July 18, 2025 — Source or Source or Source
The best travel VPNs: These tested VPNs are all you need for your next trip abroad
VPNs shield you from spying and can resolve online blocks you may find in other countries. My favorite travel VPNs offer fast speeds, massive server networks, unlimited connections, and more.
July 18, 2025 — Source
The rise of the machine identity and what it means for cybersecurity [Q&A]
A report earlier this year highlighted the fact that machine identities now vastly outnumber humans.
July 18, 2025 — Source
Top 10 Malware Q2 2025
By: The Center for Internet Security® (CIS®) Cyber Threat Intelligence (CTI) team
July 18, 2025 — Source
UK Creative Community, Big Tech Resume AI Copyright Talks
New Working Group Launched After Two Failed Attempts to Resolve AI Training Impasse
July 18, 2025 — Source or Source
UK ties GRU to stealthy Microsoft 365 credential-stealing malware
The UK National Cyber Security Centre (NCSC) has formally attributed ‘Authentic Antics’ espionage malware attacks to APT28 (Fancy Bear), a threat actor already linked to Russia’s military intelligence service (GRU).
July 18, 2025 — Source
Internet — Security Issues — July 17th, 2025
11 Best Practices for Developing Secure Web Applications
Follow these 11 best practices to build secure web applications, including input validation, encryption, secure authentication, and regular security updates.
July 17, 2025 — Source
Application layer comes under threat
A new report from Contrast Security exposes a growing crisis at the application layer as adversaries use AI to easily launch previously sophisticated attacks at scale.
July 17, 2025 — Source
Armenian Man Extradited to US Over Ryuk Ransomware Attacks
Karen Serobovich Vardanyan pleaded not guilty to charges related to his alleged role in the Ryuk ransomware operation.
July 17, 2025 — Source
Breach Roundup: Fashion House Louis Vuitton Confirms Breach
Also: CISA Warns of Unpatched Train Brake Vulnerability
July 17, 2025 — Source or Source or Source or Source
Chinese hackers breached National Guard to steal network configurations
The Chinese state-sponsored hacking group known as Salt Typhoon breached and remained undetected in a U.S. Army National Guard network for nine months in 2024, stealing network configuration files and administrator credentials that could be used to compromise other government networks.
July 17, 2025 — Source
Cisco Patches Another Critical ISE Vulnerability
Cisco has released patches for multiple vulnerabilities, including a critical flaw in Cisco ISE that leads to remote code execution (RCE).
July 17, 2025 — Source
Cloaking-as-a-service set to reshape the phishing landscape
Imagine if hackers could give their scam websites a cloak of invisibility, showing one web page to regular people and a harmless page to security scans. Sneaky, huh?
July 17, 2025 — Source
Cryptohack Roundup: Abacus Market's Suspected Exit Scam
Also: Scammer Gets 12-Year Sentence for Dodging Restitution
July 17, 2025 — Source
Cybersecurity FundingEmpirical Security Raises $12 Million for AI-Driven Vulnerability Management
Cybersecurity startup Empirical Security has raised $12 million in seed funding for its vulnerability management platform.
July 17, 2025 — Source
Dermatology, Imaging Hacks Expose 3.3 Million Patients' PHI
Incidents Rank Among the Top Five Health Data Breaches in 2025 - So Far
July 17, 2025 — Source or Source
Ex-Army Soldier Pleads Guilty To AT&T Cloud Hack, Massive Call Data Breach, And $500K Extortion Threat Targeting High-Level Government Officials
Cyberattackers exploiting system vulnerabilities and extracting sensitive information are becoming more common, especially for telecommunication providers in the United States. Big carriers have fallen prey to these attacks, which have resulted in compromised data and shaken users' trust. This has been the case with AT&T and Verizon, which had a mastermind access their internal systems, got his hands on many users' personal data, and even threatened to leak all the data if his demands were not met.
July 17, 2025 — Source
Extradited Armenian Tied to Ryuk Ransomware Faces US Trial
FBI Accuses Man of Identifying Exploitable Flaws in Victims' Networks for Group
July 17, 2025 — Source
Golden dMSA Flaw Exposes Firms to Major Credential Theft
Semperis Warns of Flaw in Windows Server 2025 Delegated Managed Service Accounts
July 17, 2025 — Source or Source
Hacker steals $27 million in BigONE exchange crypto breach
Cryptocurrency exchange BigONE disclosed that hackers stole various digital assets valued at $27 million in an attack yesterday.
July 17, 2025 — Source
Hackers are now hiding malware in DNS, and using AI to reassemble it
Exploiting the DNS service to turn malware into a truly invisible threat
July 17, 2025 — Source
Hackers are trying to steal passwords and sensitive data from users of Signal clone
Hackers are targeting a previously reported bug in the Signal clone app TeleMessage in an effort to steal users' private data, according to security researchers and a U.S. government agency.
July 17, 2025 — Source
Hackers Can Hide Malicious Code in Gemini's Email Summaries
A recently discovered prompt-injection flaw in Google's Gemini makes it possible for hackers to target unsuspecting users in sophisticated phishing attacks.
July 17, 2025 — Source
It's Time to Include Geopolitical Risk in Defense Planning
CyXcel's Megha Kumar on Aligning Enterprise Strategy With Geopolitical Realities
July 17, 2025 — Source or Source or Source or Source or Source
Learn the Next Thing, Not Everything
How Focused Skill Building Solves Real Problems in Cyber Roles
July 17, 2025 — Source or Source
Legit Security delivers automated security reviews for AppSec and development teams
Legit Security announced enhanced capabilities for significant code change and workflow orchestration within its platform.
July 17, 2025 — Source
Louis Vuitton Is The Latest Luxury Brand To Suffer A Data Breach
Luxury fashion brand Louis Vuitton is grappling with the fallout from its third cyberattack in as many months, with recent breaches affecting customer data in the UK, South Korea, and Turkey. All of the attacks are so far believed to be linked to a single, pervasive security incident, and have raised alarms across the LVMH Moët Hennessy Louis Vuitton conglomerate, pointing to a potentially coordinated and persistent threat targeting high-end brands
July 17, 2025 — Source
Matanbuchus 3.0 is a serious malware threat spread via Microsoft Teams
The Matanbuchus malware loader is not new -- it has been around for at least 4 years -- but it has evolved into something incredibly dangerous.
July 17, 2025 — Source
Max severity Cisco ISE bug allows pre-auth command execution, patch now
A critical vulnerability (CVE-2025-20337) in Cisco's Identity Services Engine (ISE) could be exploited to let an unauthenticated attacker store malicious files, execute arbitrary code, or gain root privileges on vulnerable devices.
July 17, 2025 — Source
Mobile Forensics Tool Used by Chinese Law Enforcement Dissected
Deployed on mobile devices confiscated by Chinese law enforcement, Massistant can collect user information, files, and location.
July 17, 2025 — Source
North Korea Floods NPM Registry with Malware
67 Malicious Packages, XORIndex Loader Target JavaScript Code-Sharing Platform
July 17, 2025 — Source or Source or Source or Source or Source
North Korean hackers blamed for record spike in crypto thefts in 2025
Hackers have stolen more than $2 billion in crypto during the first half of 2025, according to new data from crypto analysis firm Chainalysis, marking the worst year-to-date on record for crypto thefts.
July 17, 2025 — Source
Oracle Patches 200 Vulnerabilities With July 2025 CPU
Oracle's July 2025 Critical Patch Update contains 309 security patches that address approximately 200 unique CVEs.
July 17, 2025 — Source
Outdated printer firmware can leave organizations open to attack
In the past the printer has tended to be a pretty dumb device, but as they've gained more features and extra connectivity printers have become a target for attacks and potentially a way of gaining access to networks.
July 17, 2025 — Source
Overcoming the Myths About 5G and OT Security
5G OT Security Summit Speakers on Delicate Balance Between Innovation, Cyber Risk
July 17, 2025 — Source or Source
Quantum code breaking? You'd get further with an 8-bit computer, an abacus, and a dog
Computer scientist Peter Gutmann tells The Reg why it's 'bollocks'
July 17, 2025 — Source
Review: Passwork 7.0, self-hosted password manager for business
Over the years, the number of services we use has exploded, and so has the need to protect our credentials. Back in what I like to call "the age of innocence," we scribbled passwords on paper or reused "password123" across five different accounts. Let's be honest: those days are over. Whether we like it or not, password managers have become essential to good cybersecurity hygiene and one of the first lines of defense against unauthorized access.
July 17, 2025 — Source
Securing The New Identity: AI Agents In The Enterprise
Steve Toole discusses AI agent challenges and why current controls are not enough
July 17, 2025 — Source or Source or Source or Source
Socure Workforce Verification detects manipulated or fabricated identities
Socure launched Workforce Verification solution to address the growing threat of employee fraud. Socure's Workforce Verification adapts its enterprise-grade identity verification and fraud prevention specific to hiring workflows, detecting manipulated or fabricated identities before they enter organizations and addressing workforce risk at its source: identity.
July 17, 2025 — Source
Stellar Cyber enhances identity security with ITDR capabilities
At the upcoming Black Hat USA 2025 in Las Vegas, Stellar Cyber will debut its Identity Threat Detection & Response (ITDR) capabilities, fully embedded into its open, unified, AI-driven SecOps platform.
July 17, 2025 — Source
Stop The Spread: How To Contain Machine Identity Sprawl
Jeff Bounds discusses how machine identities became today's biggest blind spots
July 17, 2025 — Source or Source or Source or Source
The FCC wants to ban Chinese tech from the undersea cables that connect the U.S. to the rest of the world — proposed new rules would 'secure cables against foreign adversaries'
FCC chairman Brendan Carr said in a statement that the commission is looking to defend U.S. infrastructure against a variety of threats.
July 17, 2025 — Source
The future of encryption in a post-quantum world
As quantum computing speeds edge closer to practical use, the 'harvest now, decrypt later' approach is already in motion with adversaries collecting encrypted data today, anticipating they'll be able to crack it tomorrow. But is enough being done to prevent it?
July 17, 2025 — Source or Source or Source
The Top 7 NordVPN Alternatives
Explore the best NordVPN alternatives for 2025. Compare top VPNs and modern secure access options to find the right solution for your needs.
July 17, 2025 — Source
Topsy-Turvy Data Breach Reality: Incidents Up, Victims Down
Most Compromises Trace to Financial Services, Healthcare, Professional Services
July 17, 2025 — Source or Source or Source or Source or Source
Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook Privacy Violations
An $8 billion class action investors' lawsuit against Meta stemming from the 2018 privacy scandal involving the Cambridge Analytica political consulting firm.
July 17, 2025 — Source
UK NCSC Announces Software Vulnerability Initiative
Agency to Collaborate with External Experts on Vulnerability Research
July 17, 2025 — Source or Source or Source
VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched
Four CVEs disclosed at the Pwn2Own Berlin 2025 hacking competition have been patched in VMware products.
July 17, 2025 — Source
Watch on Demand: Cloud & Data Security Summit -- Tackling Exposed Attack Surfaces in the Cloud
Virtual event brings together leading experts, practitioners, and innovators for a full day of insightful discussions and tactical guidance on evolving threats and real-world defense strategies in cloud security.
July 17, 2025 — Source
Wiz Deal Highlights Google's Multi-Cloud Security Strategy
COO Francis deSouza Explains Google Cloud's Push for Unified Multi-Cloud Security
July 17, 2025 — Source or Source
Zuckerberg and Meta investors reach settlement in $8B privacy case
Mark Zuckerberg and other current and former Meta executives have settled a lawsuit filed by a group of shareholders, who were seeking $8 billion for the damage the executives caused the company by allowing repeated violations of Facebook users' privacy in relation to the Cambridge Analytica scandal.
July 17, 2025 — Source
Internet — Security Issues — July 14th, 2025
AI Testing and Evaluation: Learnings from cybersecurity
Generative AI presents a unique challenge and opportunity to reexamine governance practices for the responsible development, deployment, and use of AI. To advance thinking in this space, Microsoft has tapped into the experience and knowledge of experts across domains—from genome editing to cybersecurity—to investigate the role of testing and evaluation as a governance tool.
July 14, 2025 — Source
APJ Ransomware Demands Drop 50%, Yet 54% Firms Pay Hackers
Experts Say MDR Services and Proactive Defense Can Break the Payment Cycle
July 14, 2025 — Source or Source or Source or Source or Source
Attackers Now 'Scanning Extensively' for Citrix Bleed 2
Ransomware Group Among Attackers Focused on Exploiting Citrix NetScaler Flaw
July 14, 2025 — Source or Source or Source or Source or Source or Source
Blumira simplifies compliance reporting for IT teams and MSPs
Blumira launched new features and capabilities designed to help IT teams and managed service providers (MSPs) work smarter, reduce alert fatigue and simplify compliance reporting.
July 14, 2025 — Source
CitrixBleed 2 Flaw Poses Unacceptable Risk: CISA
CISA considers the recently disclosed CitrixBleed 2 vulnerability an unacceptable risk and has added it to the KEV catalog.
July 14, 2025 — Source
Elmo's official X account hacked, posts antisemitic tirade
"Elmo's X account was compromised today..."
July 14, 2025 — Source
Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
With two proof-of-concept (PoC) exploits made public late last week, CVE-2025-25257 -- a critical SQL command injection vulnerability in Fortinet's FortiWeb web application firewall -- is expected to be leveraged by attackers soon.
July 14, 2025 — Source
France Nabs Russian Basketball Player in Ransomware Probe
US Authorities Say Daniil Kasatkin, 26, Worked as Negotiator for Ransomware Group
July 14, 2025 — Source or Source or Source or Source or Source
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls.
July 14, 2025 — Source or Source
Hackers Inject Malware Into Gravity Forms WordPress Plugin
Two Gravity Forms WordPress plugin versions available on the official download page were injected with malware in a supply chain attack.
July 14, 2025 — Source
Hackers Just Found a Wild Way to Trick Google Gemini Into Phishing You
Hackers have found a way to use Google Gemini for phishing purposes. A researcher has spotted the flaw and demonstrated how it can be used. Google did respond when asked for a comment, as it tried to reassure users, while also admitting that it found no evidence of Gemini being manipulated in the way a researcher demonstrated.
July 14, 2025 — Source
How AI Expands SASE's Role in Policy, Operations Efficiency
$359M Funding Round to Support Private POPs, Co-Piloted Policy and Global Reach
July 14, 2025 — Source or Source or Source or Source
Louis Vuitton Data Breach Hits Customers in Several Countries
Louis Vuitton customers in the UK, South Korea, Turkey and possibly other countries are being notified of a data breach.
July 14, 2025 — Source
Mapping the minefield: First comprehensive security review of NFTs reveals widespread vulnerabilities
Non-Fungible Tokens (NFTs) have transformed digital ownership by enabling the trade of unique assets through blockchain technology. From art and music to virtual real estate, these tokens have become central to the Web3 economy. Yet, this rapid innovation has outpaced security measures, leaving users vulnerable to sophisticated scams, technical exploits, and project failures.
July 14, 2025 — Source
New Interlock RAT Variant Distributed via FileFix Attacks
The Interlock ransomware group has partnered with the KongTuke TDS to distribute a new RAT variant via FileFix attacks.
July 14, 2025 — Source
Nvidia chips become the first GPUs to fall to Rowhammer bit-flip attacks
GPUhammer is the first to flip bits in onboard GPU memory. It likely won't be the last.
July 14, 2025 — Source
PerfektBlue Bug Chain Exposes Cars to Bluetooth Hacking
Bluetooth Flaws in Car Software Could Enable Hijacking of Infotainment Systems
July 14, 2025 — Source or Source
Stellar Cyber 6.0.0 enhances automation, workflow intelligence, and user experience
Stellar Cyber released version 6.0.0 of its award-winning open and unified SecOps Platform, introducing new AI-driven capabilities and workflow enhancements designed to propel organizations further along their journey to a human-augmented autonomous SOC.
July 14, 2025 — Source
Summarizing Emails With Gemini? Beware Prompt Injection Risk
Attackers Can Trick Gemini Into Displaying Deceptive Messages, Researchers Warn
July 14, 2025 — Source or Source or Source or Source or Source
Top Cyber Struggles of Small, Rural Healthcare Providers
Jennifer Stoll of OCHIN on Overcoming Cyber Obstacles
July 14, 2025 — Source or Source or Source
Train Brakes Can Be Hacked Over Radio—And the Industry Knew for 20 Years
A vulnerability affecting systems named End-of-Train and Head-of-Train can be exploited by hackers to cause trains to brake.
July 14, 2025 — Source
UK launches vulnerability research program for external experts
UK's National Cyber Security Centre (NCSC) has announced a new Vulnerability Research Initiative (VRI) that aims to strengthen relations with external cybersecurity experts.
July 14, 2025 — Source
UK's NCA disputes claim it's nearly three times less efficient than the FBI
Report on serious organized crime fails to account for differences, agency says
July 14, 2025 — Source
Wing FTP Vulnerability Actively Exploited Globally
Remote Code Execution Flaw Affects More Than 5,000 Servers
July 14, 2025 — Source or Source
Internet — Security Issues — July 13th, 2025
Google Gemini flaw hijacks email summaries for phishing
Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings that direct users to phishing sites without using attachments or direct links.
July 13, 2025 — Source
Security vulnerability on U.S. trains that let anyone activate the brakes on the rear car was known for 13 years — operators refused to fix the issue until now
Wireless hardware to seriously disrupt rail transport costs less than $500.
July 13, 2025 — Source
Time's Almost Up: Microsoft Will Delete Your Passwords on Aug. 1. What to Do ASAP
In a few days, your passwords will no longer work. The tech giant is moving to a login method that CNET experts believe is safer.
July 13, 2025 — Source
Week in review: Microsoft fixes wormable RCE bug on Windows, check for CitrixBleed 2 exploitation
For July 2025 Patch Tuesday, Microsoft has released patches for 130 vulnerabilities, among them one that’s publicly disclosed (CVE-2025-49719) and a wormable RCE bug on Windows and Windows Server (CVE-2025-47981).
July 13, 2025 — Source
You have a fake North Korean IT worker problem – here's how to stop it
Thick resumes with thin LinkedIn connections are one sign. Refusing an in-person interview is another
July 13, 2025 — Source
Internet — Security Issues — July 12th, 2025
Fort Firewall 3.18.8 Test01 released
The initial test release for Fort Firewall 3.18.8 is now available for evaluation, accompanied by a change log that specifies a power resume is required to update the driver's configuration.
July 12, 2025 — Source
Hackers are exploiting critical RCE flaw in Wing FTP Server
Hackers have started to exploit a critical remote code execution vulnerability in Wing FTP Server just one day after technical details on the flaw became public.
July 12, 2025 — Source
How To Spot A Fake Account On Facebook Using These Warning Signs
Facebook will always be considered one of the popular social media platforms. The best thing about Facebook is its user interface, which allows anyone to create a new profile without much hassle. However, the smooth account creation process also makes it easier for bad actors to create fake accounts.
July 12, 2025 — Source
Russian pro basketball player gets the cuffs for allegedly being a member of ransomware gang — lawyer claims client "sucks at computers and is not even able to install an application"
Is he a criminal mastermind or a hapless victim?
July 12, 2025 — Source
Internet — Security Issues — July 11th, 2025
'123456' password exposed chats for 64 million McDonald's job chatbot applications
Updated title to reflect thats these are not 64 million unique applicants, but rather applications on the job chatbot.
July 11, 2025 — Source
AI, Sovereign Cloud Propel Cohesity's Post-Veritas Strategy
Cohesity CEO Sanjay Poonen Says Unified Platform Offers Faster, Smarter Recovery
July 11, 2025 — Source or Source or Source or Source or Source or Source
Artificial IntelligenceEU Unveils AI Code of Practice to Help Businesses Comply With Bloc's Rules
The EU code is voluntary and complements the EU's AI Act, a comprehensive set of regulations that was approved last year and is taking effect in phases.
July 11, 2025 — Source
Can an 'ethical' spyware maker justify providing its tech to ICE?
Paragon, an Israeli spyware company that claims to operate as an "ethical" surveillance vendor, faced scrutiny when earlier this year Italy was caught using Paragon's tools to spy on the phones of two journalists. Paragon responded by cutting Italy off from its surveillance products, becoming the first spyware company to ever publicly name one of its customers after the misuse of its products.
July 11, 2025 — Source
Canon Adds Password Protection to 10 cameras for Enhanced Security
Canon listened to their customers, and they are the first camera makers to add password protection to their cameras. Recently, Canon has announced a significant firmware update introducing a password protection feature. This particular improvement enhances the security for photographers and videographers.
July 11, 2025 — Source
CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
The U.S. Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in Citrix NetScaler ADC and Gateway and is giving federal agencies one day to apply fixes.
July 11, 2025 — Source
Critical Wing FTP Server Vulnerability Exploited
Wing FTP Server vulnerability CVE-2025-47812 can be exploited for arbitrary command execution with root or system privileges.
July 11, 2025 — Source
Cyberstarts Launches $300M Liquidity Fund to Help Startups Retain Top Talent
With IPOs taking longer than ever, the venture firm's fund aims to keep startup veterans motivated while staying private.
July 11, 2025 — Source
Hackers under 18 have extra difficulty cracking the parental control app, Verizon claims
Verizon Family Plus has "tamper-resistant features", but talking to kids is also important.
July 11, 2025 — Source
Help For Stretching Cyber Resources in Healthcare
Jim Roeder, VP of IT at Lakewood Health System, on Overcoming Cyber Obstacles
July 11, 2025 — Source or Source or Source or Source or Source or Source or Source or Source or Source
In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware Evolves, DoNot APT Targets Govs
Noteworthy stories that might have slipped under the radar: Microsoft shows attack against AMD processors, SentinelOne details latest ZuRu macOS malware version, Indian APT DoNot targets governments.
July 11, 2025 — Source
ISMG Editors: Russia's Hacker Arrests or Propaganda Play?
Also: SolarWinds Case Nears Quiet Settlement; Securing Agentic AI Requires Layers
July 11, 2025 — Source
McDonald's Chatbot Recruitment Platform Exposed 64 Million Job Applications
Two vulnerabilities in an internal API allowed unauthorized access to contacts and chats, exposing the information of 64 million McDonald's applicants.
July 11, 2025 — Source
Microsoft enables JScript9Legacy scripting engine to improve Windows 11 security
Microsoft has announced that it is moving away from Jscript in Windows 11 24H2 to make scripting more secure, and boost Windows 11 security overall.
July 11, 2025 — Source
NVIDIA shares guidance to defend GDDR6 GPUs against Rowhammer attacks
NVIDIA is warning users to activate System Level Error-Correcting Code mitigation to protect against Rowhammer attacks on graphical processors with GDDR6 memory.
July 11, 2025 — Source
Over half of employees fall for mobile phishing scams
A new report shows that security leaders have false confidence in their capabilities and employees when it comes to mobile security. While 96 percent are confident their employees can spot a phishing attempt, 58 percent have reported incidents where employees fell victim to executive impersonation scams via text message.
July 11, 2025 — Source
Romania and UK Arrest 14 in British Tax Repayment Scam Probe
Britain's Tax Collector HMRC Lost $63 Million to Fraudsters Wielding Taxpayer Data
July 11, 2025 — Source or Source or Source or Source or Source
Rowhammer Attack Demonstrated Against Nvidia GPU
Researchers demonstrated GPUHammer — a Rowhammer attack against GPUs — by degrading the accuracy of machine learning models.
July 11, 2025 — Source
Quantum Computers Could Break Encryption : Are We Ready for the Digital Apocalypse?
Imagine a world where the locks protecting your most sensitive information—your financial records, medical history, or even national security secrets—can be effortlessly picked. This is the looming threat posed by quantum computers, machines so powerful they can break the encryption methods we trust today. While quantum computing promises new advancements in fields like artificial intelligence and drug discovery, it also carries a dark side: the potential to render current cryptographic systems obsolete.
July 11, 2025 — Source
Scammers on Facebook try to ruin Bambu Lab's big 3D printer sale — site has been rife with fake ads for 3D printers
Facebook has been rife with fake ads for 3D printers in an attempt to con you out of money.
July 11, 2025 — Source
Security company hired a used car salesman to build a website, and it didn't end well
First came the dodgy lawyer, then the explosively angry HR person, leaving a whistleblower techie to save his career
July 11, 2025 — Source
The Cybersecurity Blind Spot in DevOps Pipelines
DevOps pipelines create massive attack surfaces through leaks and misconfiguration, and trusted tools become attack vectors. Here are the steps on how to prevent them.
July 11, 2025 — Source
The zero-day that could've compromised every Cursor and Windsurf user
A security researcher from Koi Security stumbled upon a critical zero-day buried deep in the infrastructure powering today's AI coding tools. Had it been exploited, a non-sophisticated attacker could've hijacked over 10 million machines with a single stroke.
July 11, 2025 — Source
US seeks extradition of Russian basketball player for allegedly aiding ransomware gang
His lawyer says a second-hand computer is to blame
July 11, 2025 — Source
Virtru Gets $50M at $500M Valuation to Boost Data Governance
Virtru Targets AI-Driven Control of Unstructured Data With Iconiq-Led Funding Round
July 11, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — July 10th, 2025
AI malware can now evade Microsoft Defender — open-source LLM outsmarts tool around 8% of the time after three months of training
Researchers plan to show off a model that successfully outsmarts Microsoft's security tooling about 8% of the time at Black Hat 2025.
July 10, 2025 — Source
AI Rubio Hoax Further Exposes White House Security Gaps
Impersonation Hoax Leverages Top Officials' Known Use of Commercial Messaging App
July 10, 2025 — Source or Source or Source or Source or Source
Airline Hack Exposes Details Of 5.7M Flyers Including What Some Of Them Ate
Australian airline company, Qantas, has revealed that it suffered a sophisticated cyberattack that affected over 5.7 million of its customers' data. In an update on the incident, the company revealed that of the 5.7 million unique customer records, 4 million contained information related to names, email addresses, and Qantas flyer details.
July 10, 2025 — Source
AirMDR Raises $15.5 Million for MDR Solution
AI-powered MDR provider AirMDR has raised $15.5 million in funding (seed and infusion investment) to support its R&D efforts.
July 10, 2025 — Source
Authorities arrest four hackers linked to UK retail hacking spree
U.K. authorities confirmed on Thursday they had arrested four individuals for allegedly carrying out a series of hacks earlier this year targeting the British retail sector, including Marks & Spencer, Harrods, and the Co-op.
July 10, 2025 — Source
Bitcoin Depot tells 27,000 crypto ATM customers that it leaked their personal information, but waited a year to disclose due to an ongoing investigation
Bitcoin Depot tells 27,000 crypto ATM customers that it leaked their personal information, but waited a year to disclose due to an ongoing investigation
July 10, 2025 — Source
Booz Allen Invests in Machine Identity Firm Corsha
'Machine identities', often used interchangeably with 'non-human identities' (NHIs), have been increasing rapidly since the start of digital transformation.
July 10, 2025 — Source
Breach Roundup: I'm Lovin' McDonald's '123456' Password
Also, US Sanctions North Korean IT Worker Scammers and More Paraguay Hacks
July 10, 2025 — Source or Source or Source
eSIM Hack Allows for Cloning, Spying
Details have been disclosed for an eSIM hacking method that could impact many, but the industry is taking action.
July 10, 2025 — Source
Fast Food, Weak Passwords: McDonald's AI Hiring Tool Exposed Millions of Applicants' Data
Olivia, the AI chatbot McDonald's uses to streamline job application processes, exposed an estimated 64 million chat logs containing applicants' sensitive data.
July 10, 2025 — Source
FBI's CJIS demystified: Best practices for passwords, MFA & access control
Imagine your organization has just won a contract to handle sensitive law-enforcement data -- you might be a cloud provider, a software vendor, or an analytics firm. It won't be long before CJIS is top of mind.
July 10, 2025 — Source
Fighting AI Threats With Behavior-Based Awareness Training
Abnormal AI CEO Evan Reiser on Behavioral Anomalies, Personalized Phishing Training
July 10, 2025 — Source or Source
Four arrested in connection with M&S, Co-op ransomware attacks
Four individuals suspected of having been involved in the ransomware attacks that hit UK-based retailers earlier this year have been arrested by the UK National Crime Agency.
July 10, 2025 — Source or Source or Source
How a Former CIO Transformed Treasury IT, Slowly: Part 1
USDT's Ex-CIO Tony Arcadi on Incremental IT, Oversight, Public Sector Modernization
July 10, 2025 — Source or Source or Source
Ingram Micro Restores Systems Impacted by Ransomware
Ingram Micro has restored operations across all countries and regions after disconnecting systems to contain a ransomware attack.
July 10, 2025 — Source
Microsoft replaces legacy JavaScript engine to improve security in Windows 11
Legacy JScript transitions to JScript9Legacy with automatic migration in Windows 11 24H2
July 10, 2025 — Source
Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack
PCA Cyber Security has discovered critical vulnerabilities in the BlueSDK Bluetooth stack that could have allowed remote code execution on car systems.
July 10, 2025 — Source
NCA arrests four in connection with UK retail ransomware attacks
Crime-fighting agency cagey on details, probes into intrusions at M&S, Harrods, and Co-op continue
July 10, 2025 — Source
OT security becomes a board priority for enterprises
Operational technology (OT) can often be a cybersecurity weak spot for enterprises, relying as it does on older hardware and operating systems that are hard to update.
July 10, 2025 — Source
Persistent security gaps found in hybrid identity systems
Organizations are continuing to struggle to identify and address security vulnerabilities in hybrid identity systems such as Active Directory, Entra ID, and Okta.
July 10, 2025 — Source
Qantas Confirms 5.7 Million Impacted by Data Breach
Hackers compromised names, addresses, email address, phone numbers, and other information pertaining to Qantas customers.
July 10, 2025 — Source
Ransomware is evolving faster than it's being stopped
The number of active ransomware groups has jumped 45 percent in the past year, according to a new report from GuidePoint Security's GRIT team.
July 10, 2025 — Source
Ruckus network management solutions riddled with unpatched vulnerabilities
Claroty researcher Noam Moshe has discovered serious vulnerabilities in two Ruckus Networks (formerly Ruckus Wireless) products that may allow attackers to compromise the environments managed by the affected software, Carnegie Mellon University's CERT Coordination Center (CERT/CC) has warned.
July 10, 2025 — Source
Russia, hotbed of cybercrime, says nyet to ethical hacking bill
Politicians uneasy over potential impact on national security, local reports say
July 10, 2025 — Source
Russian pro basketball player arrested for alleged role in ransomware attacks
Russian professional basketball player Daniil Kasatkin was arrested in France at the request of the United States for allegedly acting as a negotiator for a ransomware gang.
July 10, 2025 — Source
Sigma360 AI Investigator Agent reduces manual reviews
Sigma360 launched AI Investigator Agent, an autonomous GenAI agent that transforms how compliance teams handle risk alerts.
July 10, 2025 — Source
UK authorities arrest four suspected members of hacker group Scattered Spider
The group is reportedly behind the hacking of large UK retailers.
July 10, 2025 — Source
Vibe Hacking Not Yet Possible
AI Models Mostly Fail in Full Track of Vulnerability Research to Exploit
July 10, 2025 — Source or Source or Source or Source or Source
What Can Businesses Do About Ethical Dilemmas Posed by AI?
AI-made decisions are in many ways shaping and governing human lives. Companies have a moral, social, and fiduciary duty to responsibly lead its take-up.
July 10, 2025 — Source
Why Agentic AI in Healthcare Demands Deeper Data Oversight
Attorney Jordan Cohen of Law Firm Akerman LLP on HIPAA Challenges
July 10, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — July 7th, 2025
AI is quietly taking over enterprise cybersecurity -- this is what you need to know
Enterprises are building layered cybersecurity defense systems that combine access controls, endpoint monitoring, and data recovery, and artificial intelligence is helping these systems adapt faster and work more effectively.
July 7, 2025 — Source
Attackers Actively Exploit 'Citrix Bleed 2' Vulnerability
Citrix Issues Patches to Counter Active Attacks Against Two Critical Vulnerabilities
July 7, 2025 — Source or Source or Source or Source or Source
'Batavia' Windows spyware campaign targets dozens of Russian orgs
A previously undocumented spyware called 'Batavia' has been targeting large industrial enterprises in Russia in a phishing email campaign that uses contract-related lures.
July 7, 2025 — Source
'Cyber security' behind decision to end defense satellite sharing of hurricane data
Official notice confirms delay to cutoff until the end of July. Not to worry, AI modelling's in the wings
July 7, 2025 — Source
Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild
CVE-2025-6554 and three other Chromium vulnerabilities could allow attackers to execute code and corrupt memory remotely.
July 7, 2025 — Source
Hacker 'turf war' unfolding as Russian DragonForce ransomware gang drama could lead to 'double extortions,' making life even worse for potential victims
Through the fire and flames they saw... a reason to pick a fight with RansomHub.
July 7, 2025 — Source
Hackers abuse leaked Shellter red team tool to deploy infostealers
Shellter Project, the vendor of a commercial AV/EDR evasion loader for penetration testing, confirmed that hackers used its Shellter Elite product in attacks after a customer leaked a copy of the software.
July 7, 2025 — Source
Hacks Lead Health Data Breach Trends So Far in 2025
345 Major HIPAA Breaches Reported to Feds So Far This Year, Affecting 29.9 Million
July 7, 2025 — Source or Source or Source or Source or Source
How Let's Encrypt made the internet safer and HTTPS standard - and free
Over the last ten years, more than 600 million websites have been secured with free certificates from Let's Encrypt. Here's how it all began and why.
July 7, 2025 — Source
Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks
The notorious Hive successor ceases ransomware operations but pivots to pure data extortion under the new World Leaks brand.
July 7, 2025 — Source
Infostealers blamed for surge in identity attacks
Advanced phishing kits and info-stealing malware have accounted for a 156 percent jump in cyberattacks targeting user logins.
July 7, 2025 — Source
Ingram Micro Scrambling to Restore Systems After Ransomware Attack
The IT products and services giant did not say how the intrusion occurred or whether any data was stolen from its systems.
July 7, 2025 — Source or Source
"No honor among thieves": M&S hacking group starts turf war
A clash between criminal ransomware groups could result in victims being extorted twice.
July 7, 2025 — Source
Parental controls on children's tech devices are out of touch with child's play
Parenting in the digital age can be stressful and demands a lot from parents.
July 7, 2025 — Source
Phishing platforms, infostealers blamed as identity attacks soar
Get your creds in order or risk BEC, ransomware attacks, orgs warned
July 7, 2025 — Source
Ransomware Attack Halts Ingram Micro Operations
SafePay Ransomware Blamed for Prolonged System Outage
July 7, 2025 — Source or Source or Source or Source or Source
Visa's 24/7 war room takes on global cybercriminals
In the heart of Data Center Alley—a patch of suburban Washington where much of the world's internet traffic flows—Visa operates its global fraud command center.
July 7, 2025 — Source
Why Active Directory remains a popular target for attackers and what to do about it [Q&A]
Microsoft Active Directory (AD) turned 25 earlier this year -- remarkable longevity in the technology world. It's the identity backbone for more than 80 percent of enterprises, meaning a breach could be catastrophic.
July 7, 2025 — Source
Why SEC, SolarWinds Agreed to Settle Cyberfraud Lawsuit
Proposed Deal Could End Precedent-Setting SEC Case Over Cybersecurity Misstatements
July 7, 2025 — Source or Source
Will AI Gut the Cybersecurity Talent Pipeline?
Automation Saves Time But Risks Hollowing Out Critical Early-Career Roles
July 7, 2025 — Source or Source or Source or Source
Internet — Security Issues — July 5th, 2025
Ingram Micro outage caused by SafePay ransomware attack
An ongoing outage at IT giant Ingram Micro is caused by a SafePay ransomware attack that led to the shutdown of internal systems, BleepingComputer has learned.
July 5, 2025 — Source
Massive spike in use of .es domains for phishing abuse
¡Cuidado! Time to double-check before entering your Microsoft creds
July 5, 2025 — Source
Police in Brazil arrest a suspect over $100M banking hack
Police in Brazil arrested a suspect in connection with a cyberattack that diverted more than 540 million Brazilian reais (about $100 million) from the country's banking systems, authorities said Friday.
July 5, 2025 — Source
Warning: Thanks to AI you must use "phishing-resistant" passkeys to replace vulnerable passwords
GenAI can help attackers create phishing websites that look more legitimate than ever before.
July 5, 2025 — Source
Internet — Security Issues — July 2nd, 2025
29 North Korean laptop farms busted by U.S. Department of Justice — illicit IT workers across 16 states reportedly obtained employment with more than 100 U.S. companies to help fund regime
IT workers in North Korea are getting jobs at American companies to help fund the country's weapons programs.
July 2, 2025 — Source
A 13-year-old prodigy helped improve the security of Microsoft products
Cybersecurity is a particularly important avenue for any firm, especially those in tech. It's even more critical for companies like Microsoft, which is not only responsible for managing its security infrastructure, but also the security posture of its clients and over a billion customers. The Redmond firm has a dedicated Microsoft Security Response Team (MSRC) that works with researchers all over the globe to identify security vulnerabilities in products made by the company and then collaborate with relevant teams to patch those issues.
July 2, 2025 — Source
AI Meets Cybersecurity: Entry Level CIA Hacking Test Taken Using AI Assistance
What if the next generation of cybersecurity experts didn't just rely on their own skills but also leaned on artificial intelligence to crack complex challenges? Imagine a scenario where an aspiring CIA analyst uses AI to unravel hidden clues embedded in a single image—decoding GPS coordinates, uncovering usernames, and even extracting passwords. This isn't the plot of a spy thriller; it's a real-world exercise in using AI to solve entry-level open source intelligence (OSINT) puzzles.
July 2, 2025 — Source
Data breach reveals Catwatchful 'stalkerware' is spying on thousands of phones
A security vulnerability in a stealthy Android spyware operation called Catwatchful has exposed thousands of its customers, including its administrator.
July 2, 2025 — Source
Chinese Hackers Exploited Ivanti Flaw in France
Hackers Targeted French Government Entities, ANSSI Said
July 2, 2025 — Source
CISA warns the Signal clone used by natsec staffers is being attacked, so patch now
Two flaws in TeleMessage are 'frequent attack vectors for malicious cyber actors'
July 2, 2025 — Source or Source
Cisco warns that Unified CM has hardcoded root SSH credentials
Cisco has removed a backdoor account from its Unified Communications Manager (Unified CM), which would have allowed remote attackers to log in to unpatched devices with root privileges.
July 2, 2025 — Source
Citrix warns of login issues after NetScaler auth bypass patch
Citrix warns that patching recently disclosed vulnerabilities that can be exploited to bypass authentication and launch denial-of-service attacks may also break login pages on NetScaler ADC and Gateway appliances.
July 2, 2025 — Source
Court Approves 23andMe Sale to TTAM Research Institute
23andMe's Ex-CEO Anne Wojcicki Made Privacy Pledge With Successful Bid of $305M
July 2, 2025 — Source or Source or Source or Source
Critical Agentic AI Protocol Is Ripe for Security Attacks
The Model Context Protocol (MCP), introduced by Anthropic in November 2024 to facilitate communication between AI agents and external tools, is now under scrutiny due to significant security vulnerabilities.
July 2, 2025 — Source
Cyberattack Targets International Criminal Court
The International Criminal Court (ICC) has detected and contained a sophisticated and targeted cyberattack.
July 2, 2025 — Source
Cybersecurity company CrowdStrike moving its 'strategic technology hub' into new Redmond space
CrowdStrike is moving into new office space in Redmond, Wash., the cybersecurity software company confirmed on Wednesday.
July 2, 2025 — Source
Cybersecurity M&A Roundup: 41 Deals Announced in June 2025
Forty-one cybersecurity merger and acquisition (Mamp;&A) deals were announced in June 2025.
July 2, 2025 — Source
DOJ investigates ex-ransomware negotiator over extortion kickbacks
An ex-ransomware negotiator is under criminal investigation by the Department of Justice for allegedly working with ransomware gangs to profit from extortion payment deals.
July 2, 2025 — Source
Dozens of fake wallet add-ons flood Firefox store to drain crypto
More than 40 fake extensions in Firefox's official add-ons store are impersonating popular cryptocurrency wallets from trusted providers to steal wallet credentials and sensitive data.
July 2, 2025 — Source
FBI Warns Of Insidious Health Insurance Scam Making The Rounds
You should always be suspicious of unsolicited communications via email, text, and phone calls, especially if you are being asked to provide any kind of personal information. That falls under the category of Safe Computing 101. Lest anyone need reminding, however, the Federal Bureau of Investigation (FBI) is reminding the public at large to be diligent in light of a healthcare scam campaign.
July 2, 2025 — Source
Feds Identify $14.6 Billion in Healthcare Fraud in Takedown
New Multi-Agency 'Fusion Center' Using AI, Other Tech Will Improve Investigations
July 2, 2025 — Source or Source or Source or Source
Feds Notify 103,000 Medicare Beneficiaries of Scam, Breach
Agency: Fraudsters Used Valid Beneficiary Info to Create Fake Medicare.gov Accounts
July 2, 2025 — Source
Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover
A vulnerability in the Forminator WordPress plugin allows attackers to delete arbitrary files and take over impacted websites.
July 2, 2025 — Source or Source
Google launches new AI security initiatives
Ahead of the summer's round of cybersecurity conferences Google is announcing a range of new initiatives aimed at bolstering cyber defenses with the use of AI.
July 2, 2025 — Source
Iran's 'Robert' Hack Targets Trump - and Tests US Cyber Gaps
Iranian-Linked Hackers Claim to Have 100GB of Emails From Trump's Inner Circle
July 2, 2025 — Source or Source or Source or Source or Source
Kelly Benefits Data Breach Impacts 550,000 People
As Kelly Benefits's investigation into a recent data breach progressed, the number of impacted individuals continued to grow.
July 2, 2025 — Source
Microsoft acknowledges Intune issue that wipes out security customizations
Microsoft has published a warning about a problem in its Intune management software that stops customizations from being saved. Stemming from an issue in the security baseline policy update flow, an update can wipe out settings that have been put in place by administrators.
July 2, 2025 — Source
Microsoft's youngest security researcher started collaboration with the company at just 13 — high school junior filed 20 vulnerability reports last summer, named MSRC Most Valuable Researcher twice
Dylan was the reason Microsoft updated its Bug Bounty Program terms to allow 13-year-olds to participate
July 2, 2025 — Source
Northwell deploys new safety and security tech from Motorola
The aim is to build an interconnected ecosystem of tools -- AI-enabled video and analytics, two-way radio comms, mass notification technologies -- to keep staff and patients safe at New York's largest health system.
July 2, 2025 — Source
Qantas data breach sees up to 6M customer records at risk
A Qantas data breach resulting from a cybersecurity attack has put up to 6M customer records at risk of exposure, with names, email addresses, phone numbers, and dates of birth confirmed to be included. The hack was of a contact center database operated by one of the airline's partners
July 2, 2025 — Source or Source or Source or Source or Source
Scattered Spider Suspected in Qantas Data Breach
Adolescent Hacking Group Switches Focus to New Sector
July 2, 2025 — Source or Source or Source
Spain arrests hackers who targeted politicians and journalists
The Spanish police have arrested two individuals in the province of Las Palmas for their alleged involvement in cybercriminal activity, including data theft from the country's government.
July 2, 2025 — Source
The EU's border security software is reportedly full of holes
A new Bloomberg report found SIS II to be vulnerable to attacks.
July 2, 2025 — Source
US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a 'Smear Campaign'
The United States has warned of continued Iranian cyberattacks following American strikes on Iran's nuclear facilities.
July 2, 2025 — Source
Vulnerable Protection Relays Put Power Grid at Risk
Google's Mandiant Warns About Remote Attacks Disrupting Grid Stability
July 2, 2025 — Source or Source or Source or Source or Source
Your Security Stack Is Only as Secure as Your Sales Team
Cybersecurity Awareness Programs Need Focus on Human Risk and Changing Behaviors
July 2, 2025 — Source or Source or Source
Internet — Security Issues — June 30th, 2025
Ahold Delhaize Data Breach Impacts 2.2 Million People
The ransomware attack against grocery giant Ahold Delhaize has resulted in the personal information of millions getting stolen.
June 30, 2025 — Source
AI Beats Top Humans Hackers: How Machines Are Dominating the HackerOne Leaderboard
What if the world's best hacker wasn't human? In a new twist, an AI bot has outperformed top ethical hackers on HackerOne, a platform renowned for its competitive vulnerability detection. This isn't just a technological milestone—it's a paradigm shift in how we approach cybersecurity. Imagine a system that scans millions of lines of code, identifies vulnerabilities, and offers solutions faster than any human could.
June 30, 2025 — Source
Airlines are directly in hackers' crosshairs, FBI warns
Air travel is the latest industry targeted by Scattered Spider, a teen cybercriminal collective.
June 30, 2025 — Source
Airoha Chip Vulnerabilities Expose Headphones to Takeover
Vulnerabilities in Airoha Bluetooth SoCs expose headphone and earbud products from multiple vendors to takeover attacks.
June 30, 2025 — Source
Alleged Verizon data breach sees 61M customer records offered for sale
An alleged Verizon data breach has seen hackers offering for sale a database of 61 million customer records, which includes personal information useful for both phishing attempts and identity theft.
June 30, 2025 — Source
Another Billing Software Vendor Hacked by Ransomware
Horizon Healthcare RCM Hints at Paying Ransom in Data Theft Incident
June 30, 2025 — Source or Source or Source or Source or Source
Avira Antivirus Review 2025: Effective Software, But Privacy Protection Is Lacking
Avira is one of the most well-known freemium antivirus tools on the market. I did hands-on tests to see how it works -- and where it fails.
June 30, 2025 — Source
Blockchain in Healthcare: Enhancing Data Security and Interoperability
Explore how blockchain is reshaping healthcare's digital infrastructure. Learn about its challenges, mechanics, applications, and potential future impact.
June 30, 2025 — Source
Brave New Kernel: Microsoft Previews Safer Windows Ecosystem
Windows 11 Revamp Means No Kernel Access Required for Third-Party Security Tools
June 30, 2025 — Source or Source or Source or Source
Canada Gives Hikvision the Boot on National Security Grounds
Canada has ordered Hikvision to cease all operations in the country and prohibited the purchase and use of Hikvision products within government entities.
June 30, 2025 — Source
Casie Antalis Appointed to Lead CISA Program
Casie Antalis is the new program director of the Joint Cyber Coordination Group at the Cybersecurity and Infrastructure Security Agency.
June 30, 2025 — Source
Cato Networks Raises $359 Million to Expand SASE Business
Founded in 2015, the Tel Aviv based company has now raised more than $1 billion and claims more than 3,500 customers.
June 30, 2025 — Source or Source
Cisco Secure Endpoint updates help security teams see and fix misconfigurations
Cisco has announced new enhancements for its Secure Endpoint solution for businesses which focus on two big cybersecurity challenges: misconfigurations and advanced threat detection.
June 30, 2025 — Source
CitrixBleed 2 might be actively exploited (CVE-2025-5777)
While Citrix has observed some instances where CVE-2025-6543 has been exploited on vulnerable NetScaler networking appliances, the company still says that they don't have evidence of exploitation for CVE-2025-5349 or CVE-2025-5777, both of which have been patched earlier this month.
June 30, 2025 — Source
Cyberattacks shake voters' trust in elections, regardless of party
Nearly half of Americans, both Democrats and Republicans, question whether elections are conducted fairly. Some voters accept election results only when their side wins. The problem isn't just political polarization—it's a creeping erosion of trust in the machinery of democracy itself.
June 30, 2025 — Source
DOJ: Cartel Hacked Phones, Cameras to Track FBI Informants
New Report Says Mexican Cartel Hired Hacker to Identify, Track and Kill FBI Sources
June 30, 2025 — Source or Source or Source
FBI: Cybercriminals steal health data posing as fraud investigators
The Federal Bureau of Investigation (FBI) has warned Americans of cybercriminals impersonating health fraud investigators to steal their sensitive information.
June 30, 2025 — Source
Forget about Fake Cell Towers and Spying Threats: Android 16 Introduces New Security Features
Mobile security enhancements have become an essential part of OS developments. To make mobile security better, Google has announced that Android 16 will include a feature that detects and warns users about fake or insecure cell towers and an often-overlooked threat that can be used to spy on individuals or steal sensitive data.
June 30, 2025 — Source
Fraudsters behind €460 million crypto scam arrested in Spain
Spanish authorities arrested five members of a criminal network responsible for laundering €460 million stolen through global cryptocurrency investment fraud schemes.
June 30, 2025 — Source
Hacker Conversations: Rachel Tobac and the Art of Social Engineering
Rachel Tobac is a cyber social engineer. She is skilled at persuading people to do what she wants, rather than what they know they ought to do.
June 30, 2025 — Source
Hardware security tech can hide and reveal encryption keys on demand using 3D flash memory
Seoul National University College of Engineering announced that a research team has developed a new hardware security technology based on commercially available 3D NAND flash memory (V-NAND flash memory).
June 30, 2025 — Source
Hawaiian Airlines Hacked as Aviation Sector Warned of Scattered Spider Attacks
Scattered Spider is targeting airlines and the recent WestJet hack is believed to be the work of the notorious cybercrime group.
June 30, 2025 — Source
Microsoft warns of Windows update delays due to wrong timestamp
Microsoft warns of Windows update delays due to wrong timestamp
June 30, 2025 — Source
OnePlus Under Fire in the US -- Lawmakers Demand Security Probe
OnePlus is under fire in the US, as two lawmakers have demanded a security probe of the company. They want the Commerce Department to investigate OnePlus over security concerns.
June 30, 2025 — Source
Patrick Ware Named Executive Director of US Cyber Command
The NSA's Patrick Ware has taken up the role of Cybercrom executive director after the departure of Morgan Adamski.
June 30, 2025 — Source
Rethinking IT Risk Assessments for OT Environments
https://www.healthcareinfosecurity.com/rethinking-risk-assessments-for-ot-environments-a-28865
June 30, 2025 — Source or Source or Source or Source
RIFT: New open-source tool from Microsoft helps analyze Rust malware
Microsoft's Threat Intelligence Center has released a new tool called RIFT to help malware analysts identify malicious code hidden in Rust binaries. While Rust is becoming more popular for its speed and memory safety, those same qualities make malware written in Rust harder to analyze. RIFT is designed to cut through that complexity and make the job easier.
June 30, 2025 — Source
Scattered Spider crime spree takes flight as focus turns to aviation sector
Time ticking for defenders as social engineering pros weave wider web
June 30, 2025 — Source
Switzerland says government data stolen in ransomware attack
The government in Switzerland is informing that sensitive information from various federal offices has been impacted by a ransomware attack at the third-party organization Radix.
June 30, 2025 — Source
Threat Modeling for Developers: Identifying Security Risks in Software Projects
Threat modeling is a proactive security process that helps developers identify and mitigate potential threats early in the software development lifecycle.
June 30, 2025 — Source
US Announces Crackdown on North Koreans Posing as IT Workers
DOJ Indictments, Enforcement Actions Follow Nationwide Search for 'Laptop Farms'
June 30, 2025 — Source or Source or Source or Source or Source
Your Brother printer might have a critical security flaw - how to check and what to do next
If your Brother printer is impacted, it's crucial to change the default admin password immediately. Here's how to do it.
June 30, 2025 — Source or Source
Zero-Trust AI: Applying Cybersecurity Best Practices to AI Model Development
Powerful AI models, such as ChatGPT and Google's Gemini, are transforming technology, but they also pose significant security challenges.
June 30, 2025 — Source
Internet — Security Issues — June 29th, 2025
Best Internet Providers in Greenville, South Carolina
CNET recommends AT&T Fiber as the best overall internet provider in Greenville thanks to its fast, symmetrical speeds, solid pricing and high customer satisfaction. Plans start at $55 a month and go up to $245 for the speedy 5-gig plan. If fiber isn't available at your address, Spectrum is a strong backup, which also offers the cheapest plan in the area.
June 29, 2025 — Source
Week in review: Backdoor found in SOHO devices running Linux, high-risk WinRAR RCE flaw patched
SecurityScorecard's STRIKE team has uncovered a network of compromised small office and home office (SOHO) devices they're calling LapDogs.
June 29, 2025 — Source
Internet — Security Issues — June 28th, 2025
Ex-NATO hacker: 'In the cyber world, there's no such thing as a ceasefire'
Watch out for supply chain hacks especially
June 28, 2025 — Source
FBI, cybersecurity firms say a prolific hacking crew is now targeting airlines and the transportation sector
The FBI and cybersecurity firms are warning that the prolific hacking group known as Scattered Spider is now targeting airlines and the transportation sector.
June 28, 2025 — Source
What Does It Mean If Your Email Was Found On The Dark Web?
If you use antivirus software, a VPN, or subscribe to a service like Experian IdentityWorks, you may have received an alert saying your email address was found on the dark web. What this usually means is that your email was included in a data breach, where cybercriminals have gained access to email lists and sometimes other data like passwords or Social Security numbers. This data often ends up on underground marketplaces, where it's traded or sold to cybercriminals looking to carry out phishing attacks, identity theft, account takeovers, and more.
June 28, 2025 — Source
Internet — Security Issues — June 25th, 2025
AI Agents Are Creating Insider Security Threat Blind Spots, Research Finds
Only 30% of US businesses are actively mapping which AI agents have access to critical systems, creating a security blind spot.
June 25, 2025 — Source
AI or Data Governance? Gartner Says You Need Both
Gartner Says Leaders Should Balance AI Innovation With Strong Data Governance
June 25, 2025 — Source< or Source or Source or Source or Source
Best VPN for Georgia: Pornhub workarounds
How to keep your browsing private and still access the website once it's blocked in your state.
June 25, 2025 — Source
Blocking exports and raising tariffs is a bad defense against industrial cyber espionage, study shows
The United States is trying to decouple its economy from rivals like China. Efforts toward this include policymakers raising tariffs on Chinese goods, blocking exports of advanced technology and offering subsidies to boost American manufacturing. The goal is to reduce reliance on China for critical products in hopes that this will also protect U.S. intellectual property from theft.
June 25, 2025 — Source
BreachForums hacking forum operators reportedly arrested in France
The French police have reportedly arrested five operators of the BreachForum cybercrime forum, a website used by cybercriminals to leak and sell stolen data that exposed the sensitive information of millions.
June 25, 2025 — Source
Can Good UX Protect Older Users From Digital Scams?
As online scams become more sophisticated, Carrie Webster explores whether good UX can serve as a frontline defense, particularly for non-tech-savvy older users navigating today's digital world.
June 25, 2025 — Source
Chrome 138, Firefox 140 Patch Multiple Vulnerabilities
Chrome 138 and Firefox 140 are rolling out with fixes for two dozen vulnerabilities, including high-severity memory safety issues.
June 25, 2025 — Source
Clearspeed Raises $60M to Scale AI Voice-Based Risk Platform
Voice Analytics Firm to Expand Footprint in Finance, Defense and Insurance
June 25, 2025 — Source or Source or Source or Source or Source
Code Execution Vulnerability Patched in GitHub Enterprise Server
A high-severity vulnerability in GitHub Enterprise Server could have allowed remote attackers to execute arbitrary code.
June 25, 2025 — Source
FDA Urges Medical Product Makers to Beef Up OT Security
Agency: Rising Threats Put Manufacturing Supply Chains, Patient Safety at Risk
June 25, 2025 — Source or Source or Source or Source or Source
Flaw in Notepad++ installer could grant attackers SYSTEM access (CVE-2025-49144)
A high-severity vulnerability (CVE-2025-49144) in the Notepad++ installer could be exploited by unprivileged users to gain SYSTEM-level privileges through insecure executable search paths.
June 25, 2025 — Source
Fortanix PQC Central boosts post-quantum readiness
Fortanix announced PQC Central, a new feature in the Fortanix Key Insight that reframes how enterprises approach the post-quantum cryptography (PQC) challenge.
June 25, 2025 — Source
French Police Reportedly Bust Five BreachForums Administrators
Notorious Site Facilitated Buying and Selling of Breached Databases, Hacking Tools
June 25, 2025 — Source or Source or Source or Source or Source
Hackers Abuse ConnectWise to Hide Malware
G Data has observed a surge in malware infections originating from ConnectWise applications with modified certificate tables.
June 25, 2025 — Source
Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
A sophisticated malicious campaign that researchers call OneClik has been leveraging Microsoft's ClickOnce software deployment tool and custom Golang backdoors to compromise organizations within the energy, oil, and gas sectors.
June 25, 2025 — Source
Hackers show how they can fully control your 2020 Nissan Leaf remotely
Attackers can also record in-car conversations and track you using its GPS
June 25, 2025 — Source
Hackers turn ScreenConnect into malware using Authenticode stuffing
Threat actors are abusing the ConnectWise ScreenConnect installer to build signed remote access malware by modifying hidden settings within the client's Authenticode signature.
June 25, 2025 — Source
Hackers Using Malicious SonicWall VPN for Credential Theft
Trojanized NetExtender Installer Exfiltrates Data to Hardcoded IP Address
June 25, 2025 — Source or Source< or Source or Source or Source
Heart disease landscape changes: Fewer heart attacks, but more deaths from failure and arrhythmias
While heart disease has been the leading cause of death in the U.S. for over a century, the past 50 years have seen a substantial decrease (66%) in overall age-adjusted heart disease death rates, including a nearly 90% drop in heart attack deaths, according to new research published in the Journal of the American Heart Association.
June 25, 2025 — Source
Mainline Health, Select Medical Each Disclose Data Breaches Impacting 100,000 People
Mainline Health and Select Medical Holdings have suffered data breaches that affect more than 100,000 individuals.
June 25, 2025 — Source
Mastercard adds secure on-chain access to crypto
Mastercard and Chainlink are teaming up to power Swapper Finance, a new way to buy crypto directly from decentralized exchanges (DEXs) using any Mastercard.
June 25, 2025 — Source
Mitiga Helios AI accelerates alert triage and incident response for SecOps teams
Mitiga launched Helios AI, an AI powered SOC assistant that supercharges SecOps teams with automated triage, augmented investigation, and accelerated threat remediation across complex multi-cloud environments.
June 25, 2025 — Source
Multiple Vulnerabilities in Cisco ISE and ISE-PIC Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Cisco ISE and ISE-PIC that could allow for remote code execution. Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure access to network resources. Successful exploitation of these vulnerabilities could allow the attacker to obtain root privileges on an affected device.
June 25, 2025 — Source
New 'CitrixBleed 2' NetScaler flaw let hackers hijack sessions
A recent vulnerability in Citrix NetScaler ADC and Gateway is dubbed "CitrixBleed 2," after its similarity to an older exploited flaw that allowed unauthenticated attackers to hijack authentication session cookies from vulnerable devices.
June 25, 2025 — Source
New Vulnerabilities Expose Millions of Brother Printers to Hacking
Rapid7 has found several serious vulnerabilities affecting over 700 printer models from Brother and other vendors.
June 25, 2025 — Source
New wave of 'fake interviews' use 35 npm packages to spread malware
A new wave of North Korea's 'Contagious Interview' campaign is targeting job seekers with malicious npm packages that infect dev's devices with infostealers and backdoors.
June 25, 2025 — Source
nOAuth Lives on in Cloud App Logins Using Entra ID
Hackers Can Use Unverified Email to Log onto SaaS Apps With Entra ID
June 25, 2025 — Source or Source or Source or Source or Source
OpenRouter raises $40 million to simplify AI model overload
OpenRouter, a startup helping software developers manage the growing number of AI models, has raised $40 million in venture capital. The company wants to make it easier for developers to choose and use the right AI model for their applications, without having to build their own complex systems.
June 25, 2025 — Source
Rubrik to Purchase Predibase to Power Generative AI Growth
Predibase Acquisition Adds AI Talent, Cost-Optimization and Fine-Tuning Model Tech
June 25, 2025 — Source or Source or Source or Source or Source
Russia frees REvil hackers after sentencing
The ransomware group members evaded a five-year prison stint due to time served.
June 25, 2025 — Source
Russian APT Hits Ukrainian Government With New Malware via Signal
Russia-linked APT28 deployed new malware against Ukrainian government targets through malicious documents sent via Signal chats.
June 25, 2025 — Source
SonicWall Warns of Trojanized NetExtender Stealing User Information
SonicWall says a modified version of the legitimate NetExtender application contains information-stealing code.
June 25, 2025 — Source
The Essential 8 Microsoft 365 Cybersecurity Framework Explained
What if a single framework could significantly reduce your organization's risk of cyberattacks while improving resilience against ever-evolving threats? The Essential 8, a cybersecurity framework developed by the Australian Cyber Security Center (ACSC), offers just that—a structured, practical approach to safeguarding your systems. When paired with the powerful tools within Microsoft 365, this framework transforms from a set of guidelines into a dynamic, actionable strategy.
June 25, 2025 — Source
Thousands of SaaS Apps Could Still Be Susceptible to nOAuth
New research suggests more than 10,000 SaaS apps could remain vulnerable to a nOAuth variant despite the basic issue being disclosed in June 2023.
June 25, 2025 — Source
Tines allows teams to choose the right AI level for any workflow
Tines announced autonomous AI capabilities within its workflow automation platform via the launch of agents. Agents mark a significant evolution in Tines' platform, enabling customers to automate workflows with maximum control and flexibility, whether with deterministic logic, human-in-the-loop copilots, or full AI autonomy.
June 25, 2025 — Source
Vibe Coding - a Great Tool if You Know How to Use It
AI Assistants Accelerate Coding But Can Create Huge Risks for the Inexperienced
June 25, 2025 — Source or Source or Source or Source or Source
Why Sincerity Is a Strategic Asset in Cybersecurity
Strong security doesn't just rely on tools—it starts with trust, clarity, and sincerity from the top down.
June 25, 2025 — Source
Windows 10: How to get security updates for free until 2026
Users who want to stick with Windows 10 beyond its planned end-of-support date but still receive security updates, can enroll into the Windows 10 Extended Security Updates (ESU) program, Microsoft has confirmed on Tuesday.
June 25, 2025 — Source
WinRAR exploit enables attackers to run malicious code on your PC — critical vulnerability patched in latest beta update
User interaction is required, but impact could be severe
June 25, 2025 — Source
XBOW's AI reached the top ranks on HackerOne, and now it has $75M to scale up
XBOW has raised $75 million in Series B funding to grow its AI-driven offensive security platform. The round was led by Altimeter's Apoorv Agrawal, with participation from existing investors Sequoia Capital and Nat Friedman. This brings XBOW's total funding to $117 million.
June 25, 2025 — Source
Internet — Security Issues — June 23rd, 2025
7 security risks you need to know when using AI for work
AI can be a powerful tool for productivity, but risks come with its rewards.
June 23, 2025 — Source
743,000 Impacted by McLaren Health Care Data Breach
The personal information of 743,000 individuals was compromised in a 2024 ransomware attack on McLaren Health Care.
June 23, 2025 — Source
A Journalist Security Checklist: Preparing Devices for Travel Through a US Border
This post was originally published by the Freedom of the Press Foundation (FPF). This checklist complements the recent training module for journalism students in border communities that EFF and FPF developed in partnership with the University of Texas at El Paso Multimedia Journalism Program and Borderzine. We are cross-posting it under FPF's Creative Commons Attribution 4.0 International license. It has been slightly edited for style and consistency.
June 23, 2025 — Source
Aflac says cyberattack may have exposed customer data: What we know so far
The company warned that cybercriminals are targeting the insurance industry as a whole.
June 23, 2025 — Source
APT28 hackers use Signal chats to launch new malware attacks on Ukraine
The Russian state-sponsored threat group APT28 is using Signal chats to target government targets in Ukraine with two previously undocumented malware families named BeardShell and SlimAgent.
June 23, 2025 — Source
Asana Fixes Security Flaw in AI Data Integration Tool
MCP Server Paused for Days After Bug Risked Data Leakage Between Users
June 23, 2025 — Source or Source or Source or Source or Source or Source
AT&T Settles for $177 Million Payout Over Years of Data Breaches
AT&T has agreed to a $177 million settlement following two major data breaches in 2024, impacting over 70 million current and former customers. While the carrier denies wrongdoing, affected users could receive payouts by early 2026, with those able to prove specific losses eligible for up to $5,000.
June 23, 2025 — Source
Canadian telecom hacked by suspected China state group
Maximum-security Cisco vulnerability was patched Oct. 2023 and exploited Feb. 2025.
June 23, 2025 — Source
China’s Salt Typhoon Hackers Target Canadian Telecom Firms
Canada’s Centre for Cyber Security and the FBI warn of Chinese hackers targeting telecommunications and other companies in Canada.
June 23, 2025 — Source
Chinese Hackers Turn Unpatched Routers Into ORB Spy Network
ShortLeash Backdoor Hijacks SOHO Linux Devices
June 23, 2025 — Source or Source or Source or Source or Source
CNCF Graduates in‑toto, Bolstering Software Supply Chain Security
On April 23, 2025, the Cloud Native Computing Foundation (CNCF) announced the graduation of in‑toto, a framework designed to enforce supply chain integrity by ensuring that every step in the software development lifecycle, such as building, signing, and deployment, is properly authorized and verifiable.
June 23, 2025 — Source
CoinMarketCap, Cointelegraph compromised to serve pop-ups to drain crypto wallets
The CoinMarketCap and CoinTelegraph websites have been compromised over the weekend to serve clever phishing pop-ups to visitors, asking them to verify/connect their crypto wallets.
June 23, 2025 — Source
Critical Authentication Bypass Flaw Patched in Teleport
A critical-severity vulnerability in Teleport could allow remote attackers to bypass SSH authentication and access managed systems.
June 23, 2025 — Source
Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777)
The vulnerabilities have been privately disclosed and there is no indication that they are under active exploitation. Nevertheless, the company has urged to install the relevant updated versions as soon as possible and terminate active sessions.
June 23, 2025 — Source
Cybercriminals use fake GitHub Minecraft mods to target young players
Russian-speaking operators are thought to be behind the Stargazers Ghost Network
June 23, 2025 — Source
Cybersecurity Innovations in Software Development: How Developers Are Tackling Security Threats
In this blog post, I will discuss the advanced cybersecurity innovations in software development and how software developers are dealing with security problems.
June 23, 2025 — Source
DHS warns critical sectors about pro-Iranian cyberattacks
Homeland Security is calling for vigilance against state-sponsored CyberAv3ngers and other pro-Iranian hacktivists, who have a history of attacking operational control and IoT systems to steal access and control devices.
June 23, 2025 — Source
Experts count staggering costs incurred by UK retail amid cyberattack hell
Cyber Monitoring Centre issues first severity assessment since February launch
June 23, 2025 — Source
Fort Firewall 3.18.3 released
Fort Firewall 3.18.3 has been released with a range of enhancements, featuring timer menu actions, options for copying paths and opening folders, updates to connections and ConfZoneManager, an upgrade to SQLite 3.50.1, and the implementation of GPG signature signing for installers.
June 23, 2025 — Source
House staffers can’t have WhatsApp on their devices
The chief administrative officer claims the messaging app is ‘high-risk.’
June 23, 2025 — Source
How US Cyber Ops May Have Assisted the Midnight Hammer Strike
Analysts Say CYBERCOM Likely Played a Major Role in Strike on Iranian Nuclear Sites
June 23, 2025 — Source or Source or Source or Source
Iran cyberattacks against US biz more likely following air strikes
Plus 'low-level' hacktivist attempts
June 23, 2025 — Source
McLaren Health Care says data breach impacts 743,000 patients
McLaren Health Care is warning 743,000 patients that the health system suffered a data breach caused by a July 2024 attack by the INC ransomware gang.
June 23, 2025 — Source or Source or Source or Source or Source or Source
Microsoft Is Eliminating Passwords in August: Here's What You Need to Do to Prepare
Microsoft Authenticator has already stopped autofilling passwords, but the biggest change comes next month.
June 23, 2025 — Source
Microsoft will start removing legacy drivers from Windows Update
Microsoft will start removing legacy drivers from Windows Update to improve driver quality for Windows users but, most importantly, to increase security, the company has announced.
June 23, 2025 — Source
New AI Jailbreak Bypasses Guardrails With Ease
New “Echo Chamber” attack bypasses advanced LLM safeguards by subtly manipulating conversational context, proving highly effective across leading AI models.
June 23, 2025 — Source
New Journalism Curriculum Module Teaches Digital Security for Border Journalists
Module Developed by EFF, Freedom of the Press Foundation, and University of Texas, El Paso Guides Students Through Threat Modeling and Preparation
June 23, 2025 — Source
North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting
North Korean hackers employ social engineering to trick Zoom Meeting participants into executing system-takeover commands.
June 23, 2025 — Source
Okta Cross App Access secures AI agents in the enterprise
Okta announced Cross App Access, a new protocol to help secure AI agents. As an extension of OAuth, it brings visibility and control to both agent-driven and app-to-app interactions, allowing IT teams to decide what apps are connecting and what information AI agents can access.
June 23, 2025 — Source
Revil ransomware members released after time served on carding charges
Four REvil ransomware members arrested in January 2022 were released by Russia on time served after they pleaded guilty to carding and malware distribution charges.
June 23, 2025 — Source
Stealthy backdoor found hiding in SOHO devices running Linux
SecurityScorecard’s STRIKE team has uncovered a network of compromised small office and home office (SOHO) devices they’re calling LapDogs. The threat is part of a broader shift in how China-Nexus threat actors are using Operational Relay Box (ORB) networks to hide their operations.
June 23, 2025 — Source
Steel giant Nucor confirms hackers stole data in recent breach
Nucor, North America's largest steel producer and recycler, has confirmed that attackers behind a recent cybersecurity incident have also stolen data from the company's network.
June 23, 2025 — Source
Steelmaker Nucor Says Hackers Stole Data in Recent Attack
Nucor has shared an update on the impact of the recent cyberattack and confirmed that some data has been taken from its IT systems.
June 23, 2025 — Source
Stronger OT Security Starts with OT GRC
Why a risk-based GRC approach is essential for securing industrial OT environments
June 23, 2025 — Source
The best password managers for families in 2025
The best password managers provide security, privacy, and ease of use for a reasonable price. I tested the best ones to help you find what's best for your family.
June 23, 2025 — Source
US Braces for Cyberattacks After Bombing Iranian Nuclear Sites
Iranian hackers are expected to intensify cyberattacks against the US after the recent air strikes on Iran’s nuclear sites.
June 23, 2025 — Source
US Homeland Security warns of escalating Iranian cyberattack risks
The U.S. Department of Homeland Security (DHS) warned over the weekend of escalating cyberattack risks by Iran-backed hacking groups and pro-Iranian hacktivists.
June 23, 2025 — Source
WhatsApp Banned on US House Devices Over Security Concerns
The US House has banned WhatsApp from government devices, citing security and data transparency concerns. Approved alternatives include Microsoft Teams, Signal, iMessage, and more. While Meta slammed the banning decision, it also noted that WhatsApp offers stronger security than many apps approved by the CAO.
June 23, 2025 — Source or Source
Internet — Security Issues — June 22nd, 2025
Were 16 billion passwords from Apple, Google, and Facebook leaked? How to protect yourself
Wondering if your information is posted online from a data breach? Here's how to check if your accounts are at risk and what to do next.
June 22, 2025 — Source
Internet — Security Issues — June 21st, 2025
Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data
Aflac said that it's in the early stages of a review of the incident, and so far is unable to determine the total number of affected individuals.
June 21, 2025 — Source
Billions of login credentials have been leaked online, Cybernews researchers say
Researchers at cybersecurity outlet Cybernews say that billions of login credentials have been leaked and compiled into datasets online, giving criminals "unprecedented access" to accounts consumers use each day.
June 21, 2025 — Source
Massive DDoS attack delivered 37.4TB in 45 seconds, equivalent to 10,000 HD movies, to one victim IP address — Cloudflare blocks largest cyber assault ever recorded
This is the largest DDoS attack ever on record, so far.
June 21, 2025 — Source
Teens used encrypted chats to recruit for 'violence as a service' murder ring, Europol says
Skull emoji knife emoji moneybag emoji
June 21, 2025 — Source
There are only 2 free VPNs I actually recommend. Ignore all the rest.
The best VPNs aren't free. But if you really don't want to pay anything, here's what I use.
June 21, 2025 — Source
What We Know So Far About the Supposed 'Mother of All Data Breaches'
Some say more than 16.5 billion credentials are involved. One thing is for sure: the dark web is swimming in stolen data.
June 21, 2025 — Source
Internet — Security Issues — June 20th, 2025
161,000 People Impacted by Krispy Kreme Data Breach
Krispy Kreme is sharing more information on the data breach resulting from the ransomware attack targeting the company in 2024.
June 20, 2025 — Source
184 million passwords leaked across Facebook, Google, more: What to know about this data breach
The file was left entirely unprotected - no encryption, no password, no safeguards - just a plain text document holding millions of sensitive data entries.
June 20, 2025 — Source
16 billion accounts suffer "the largest data breach" — Google, Facebook, Telegram, and more are susceptible to malicious attacks
The breach has reportedly leaked credentials for accounts on platforms from Apple, GitHub, and government services.
June 20, 2025 — Source or Source
A staggering 16 billion passwords just leaked. Here's the real danger
Password managers are still vulnerable to this kind of malware.
June 20, 2025 — Source
AdaCore Merges With CodeSecure for Unified Developer Tools
Merger Strengthens AdaCore's Reach in C and C++ Static Testing for Embedded Systems
June 20, 2025 — Source or Source or Source or Source or Source
Aflac: 'Cybercrime Campaign' Is Targeting Insurance Industry
Experts Suspect Scattered Spider Is Behind Rash of Recent Insurer Breaches
June 20, 2025 — Source or Source or Source or Source or Source or Source
AI can easily impersonate you. This trick helps thwart scammers
A special phrase can keep your friends and family from losing money to scammers.
June 20, 2025 — Source
Amazon Linux 2023 achieves FIPS 140-3 validation
Amazon Linux 2023 (AL2023) has earned FIPS 140-3 Level 1 validation for several of its cryptographic modules. This means it's now approved for use in systems that need to meet U.S. and Canadian government standards for encryption.
June 20, 2025 — Source
Are 16 billion compromised passwords really part of a newly discovered data breach?
The mother of all breaches could just be multiple pre-existing archives fused into one
June 20, 2025 — Source
As medical device attacks increase, providers pay more for premium security features
New research shows that 75% of healthcare leaders increased their device and security budgets over the last 12 months, and they're willing to shell out for advanced protection or built-in exploit prevention.
June 20, 2025 — Source
BitoPro exchange links Lazarus hackers to $11 million crypto heist
The Taiwanese cryptocurrency exchange BitoPro claims the North Korean hacking group Lazarus is behind a cyberattack that led to the theft of $11,000,000 worth of cryptocurrency on May 8, 2025.
June 20, 2025 — Source
Can users reset their own passwords without sacrificing security?
Like it or not, passwords aren't going away anytime soon. While many organizations are exploring passwordless authentication, passwords still serve as the main line of defense for most public-facing online services.
June 20, 2025 — Source
Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider
Cloudflare says it mitigated a record-breaking distributed denial of service (DDoS) attack in May 2025 that peaked at 7.3 Tbps, targeting a hosting provider.
June 20, 2025 — Source or Source
Cloudflare Tunnels Abused in New Malware Campaign
A threat actor is abusing Cloudflare Tunnels for the delivery of a Python loader as part of a complex infection chain.
June 20, 2025 — Source
Court Ditches HIPAA Reproductive Health Info Privacy Rule
Ruling: HHS Has No Authority to Distinguish Different Types of PHI for Restrictions
June 20, 2025 — Source or Source or Source
Cyberattack on grocery supplier reveals fragility of US food supply
Hackers infiltrated one grocery distributor, and within days, there were bare shelves at stores around the country and even some pharmacies unable to fill prescriptions.
June 20, 2025 — Source
Cybercriminals Breach Aflac, Private Customer Data Could Be at Risk
It's possible that Social Security numbers may have been compromised. It's unclear how many people may have been affected.
June 20, 2025 — Source
DuckDuckGo's Scam Blocker now blocks more types of scams
Online scams are getting worse and more varied. DuckDuckGo knows that, so they've made changes. Their built-in Scam Blocker now stops more kinds of scam sites, all without tracking you.
June 20, 2025 — Source
FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks
WhatsApp told SecurityWeek that it linked the exploited FreeType vulnerability CVE-2025-27363 to a Paragon exploit.
June 20, 2025 — Source
Godfather Android Trojan Creates Sandbox on Infected Devices
The Godfather Android trojan uses on-device virtualization to hijack legitimate applications and steal users' funds.
June 20, 2025 — Source
Hundreds of Minecraft mods on GitHub are infested with hard-to-spot spyware
Hundreds of GitHub pages are hiding targeted, Java-based malware in Minecraft mod files.
June 20, 2025 — Source
Hype Alert: 'The Largest Data Breach in History' That Wasn't
Experts Debunk Legitimacy of Data Sets With 16 Billion Credentials Being Circulated
June 20, 2025 — Source or Source or Source or Source or Source
I tested the best antivirus software for Windows: Here's what I'd use to protect my PC
ZDNET tested the best antivirus software on the market that supports multiple operating systems, VPNS, and robust protection.
June 20, 2025 — Source
In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer
Noteworthy stories that might have slipped under the radar: China's Salt Typhoon targeted Viasat, Washington Post emails compromised in hack, Rowhammer attack named Crowhammer.
June 20, 2025 — Source
Iran's government says it shut down internet to protect against cyberattacks
At the time, it was unclear what happened or who was responsible for the shutdown, which has severely limited Iranians' means to get information about the ongoing war with Israel, as well as their ability to communicate with loved ones inside and outside of the country.
June 20, 2025 — Source
ISMG Editors: Anubis Ransomware's Puzzling New Tactic
Also: CISA's Leadership Crisis; Why AI's Confident Errors Demand Urgent Oversight
June 20, 2025 — Source or Source or Source or Source or Source
Israel-Iran War: Hacktivist Groups' Claimed Activity Surges
While Exceptions Apply, Such Efforts Often Only Amount to Psychological Operations
June 20, 2025 — Source or Source or Source or Source
Judge Axes Flight Disruption Suit Tied to CrowdStrike Outage
Passengers' Nuisance Claim Against CrowdStrike Barred by Airline Deregulation Act
June 20, 2025 — Source or Source
Low-wage tech support workers become a new gateway for cyberattacks
Outsourced call centers emerge as a new cybercrime battleground
June 20, 2025 — Source
Microsoft boosts default security of Windows 365 Cloud PCs
Windows 365 Cloud PCs now come with new default settings aimed at preventing / minimizing data exfiltration and malicious exploits, Microsoft has announced.
June 20, 2025 — Source
Microsoft to remove legacy drivers from Windows Update for security boost
Microsoft has announced plans to periodically remove legacy drivers from the Windows Update catalog to mitigate security and compatibility risks.
June 20, 2025 — Source
Motors Theme Vulnerability Exploited to Hack WordPress Websites
Threat actors are exploiting a critical-severity vulnerability in Motors theme for WordPress to change arbitrary user passwords.
June 20, 2025 — Source
Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic
Attacker rained down the equivalent of 9,300 full-length HD movies in just 45 seconds.
June 20, 2025 — Source
Two Insurers Say Ongoing Outages Not Ransomware-Based
Erie Insurance and Philadelphia Insurance Still Recovering From Separate Attacks
June 20, 2025 — Source or Source or Source or Source
UK Passes Data Use and Access Regulation Bill
Government Says Bill Will 'Pump 10 Billion Pounds' Into Economy
June 20, 2025 — Source or Source
Yes, 16 billion passwords leaked online. No, it's not what you think.
Think of the leak as a hacker's version of a "Best of" list.
June 20, 2025 — Source
Your Android phone is getting a big security upgrade for free - these Pixel models included
Google has introduced new enterprise-grade security features for managing Android devices across your organization.
June 20, 2025 — Source
Internet — Security Issues — June 18th, 2025
Alarming ASUS Armoury Crate Vulnerability Can Give Hackers Admin Access
Security researchers have revealed that the ASUS Armoury Crate software has a serious vulnerability (tracked as CVE-2025-3464) that could allow hackers to gain admin access to computers.
June 18, 2025 — Source
Amazon CISO: Iranian hacking crews 'on high alert' since Israel attack
Meanwhile, next-gen script kiddies are levelling up faster thanks to agentic AI
June 18, 2025 — Source
AVG Antivirus Review 2025: Robust Free Version but Middling Premium Plans
AVG performed well in my test, but poor customer service and some privacy concerns dragged down its score.
June 18, 2025 — Source
AWS launches new cloud security features
Amazon Web Services has announced new and improved security features at its annual AWS re:Inforce cloud security conference.
June 18, 2025 — Source
Best VPS hosting services 2025: Choose the right private server host for you
I researched and tested the best virtual private server hosting services to help you find the right solution, ranking scalability, security, virtual features, and customer support.
June 18, 2025 — Source
BeyondTrust warns of pre-auth RCE in Remote Support software
BeyondTrust has released security updates to fix a high-severity flaw in its Remote Support (RS) and Privileged Remote Access (PRA) solutions that can let unauthenticated attackers gain remote code execution on vulnerable servers.
June 18, 2025 — Source
Big Risk: Google, Apple & Microsoft Caught in Huge Data Breach
A security researcher has uncovered an unsecured database containing 184 million records with login credentials linked to Apple, Google, Microsoft, and Facebook accounts—likely compiled from past phishing and identity theft campaigns. The discovery underscores the urgent need to move beyond passwords, with tech giants increasingly adopting passkeys and biometric authentication for better security.
June 18, 2025 — Source
Bitdefender acquires Mesh to boost email protection for businesses and MSPs
Bitdefender announced it has agreed to acquire Mesh Security Limited (Mesh), a provider of email security solutions. Through the acquisition, Mesh's email security technology and capabilities will be integrated into Bitdefender's extended detection and response (XDR) platform and managed detection and response (MDR) services.
June 18, 2025 — Source or Source or Source or Source or Source or Source
Can a foreign government hack WhatsApp? A cybersecurity expert explains how that might work
Earlier today, Iranian officials urged the country's citizens to remove the messaging platform WhatsApp from their smartphones. Without providing any supporting evidence, they alleged the app gathers user information to send to Israel.
June 18, 2025 — Source
ChainLink Phishing: How Trusted Domains Become Threat Vectors
Phishing remains one of cybersecurity's most enduring threats, not because defenders aren't evolving, but because attackers are adapting even faster.
June 18, 2025 — Source
Cloudflare Log Explorer detects security and performance issues
Cloudflare announced Cloudflare Log Explorer to help give businesses instant access to critical security and performance insights across their IT environments.
June 18, 2025 — Source
Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products
Veeam and BeyondTrust have resolved several vulnerabilities that could be exploited for remote code execution.
June 18, 2025 — Source
Computer tracking, an 'electronic collar': Gilles Deleuze's 1990 postscript on the societies of control
Gilles Deleuze was one of the most original and imaginative thinkers of postwar France. A lifelong teacher, he spent most of his career at the University of Paris VIII, influencing generations of students but largely shunning the mantle of public intellectual.
June 18, 2025 — Source
Critical Vulnerability Patched in Citrix NetScaler
Citrix has released patches for critical- and high-severity vulnerabilities in NetScaler and Secure Access Client and Workspace for Windows.
June 18, 2025 — Source
Cyber Centre advice on securing operational technology systems
The Canadian Centre for Cyber Security (Cyber Centre) is warning Canadian organizations to defend their operational technology (OT) and industrial control systems (ICS) from malicious cyber actors.
June 18, 2025 — Source
Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection
Misconfigured permissions in Google's Gerrit code collaboration platform could have led to the compromise of ChromiumOS and other Google projects.
June 18, 2025 — Source
Getting email you didn't sign up for? Don't unsubscribe—it might be a scam
Use these two alternative tricks to clear your inbox.
June 18, 2025 — Source
Hackers steal and destroy millions from Iran's largest crypto exchange
Iran's largest crypto exchange, Nobitex, said Wednesday that it was hacked and funds have been drained from its hot wallet.
June 18, 2025 — Source
Healthcare SaaS firm says data breach impacts 5.4 million patients
Episource warns of a data breach after hackers stole health information of over 5 million people in the United States in a January cyberattack.
June 18, 2025 — Source
Iran Shuts Down Internet Access Amid Escalating Conflict
Iranian Officials Call Internet Outages Intentional to Disrupt Israeli Operations
June 18, 2025 — Source or Source or Source or Source or Source
Jumio Liveness Premium combats deepfakes and injection attacks
Jumio launched Jumio Liveness Premium with advanced deepfake detection, the company's most advanced biometric liveness detection solution to date.
June 18, 2025 — Source
Likely Exploited Vulnerabilities (LEV): Breaking Down the New Metric from NIST
Shortly after posting our recent blog on CISA's KEV Catalog, the National Institute of Standards and Technology (NIST) proposed a new metric for Vulnerability Exploitation Probability: Likely Exploited Vulnerabilities (LEV).
June 18, 2025 — Source
Master UniFi's Zone-Based Firewall Rules for Ultimate Network Security
Have you ever wondered how to strike the perfect balance between network security and ease of management? For many, configuring firewalls can feel like navigating a maze of technical jargon and endless rule sets. But UniFi's new zone-based firewall rules aim to change that. By introducing a more intuitive and granular approach to managing traffic, this system enables users to create secure, organized networks without the headache of overly complex setups.
June 18, 2025 — Source
Microsoft 365 to block file access via legacy auth protocols by default
Microsoft has announced that it will start updating security defaults for all Microsoft 365 tenants in July to block access to SharePoint, OneDrive, and Office files via legacy authentication protocols.
June 18, 2025 — Source
Minecraft cheaters never win ... but they may get malware
Infostealers posing as popular cheat tools are cropping up on GitHub
June 18, 2025 — Source
MiniMax M1 Aims to Rival AI Giants on Cost, Performance
Shanghai Firm Bets on Open-Source Strategy, Efficiency Claims
June 18, 2025 — Source or Source or Source
Mitigating AI Threats: Bridging the Gap Between AI and Legacy Security
Adopting a layered defense strategy that includes human-centric tools and updating security components.
June 18, 2025 — Source
Neovera Boosts Bank Fraud Defense With Greenway Acquisition
Deal Adds Live Fraud Red Teaming, Adversarial Testing to Neovera's Cyber Portfolio
June 18, 2025 — Source or Source or Source or Source or Source
North Korean hackers deepfake execs in Zoom call to spread Mac malware
The North Korean BlueNoroff hacking group is deepfaking company executives during Zoom calls to trick employees into installing custom malware on their macOS devices.
June 18, 2025 — Source
Pro-Israel hackers hit Iran's Nobitex exchange, burn $90M in crypto
The pro-Israel "Predatory Sparrow" hacking group claims to have stolen over $90 million in cryptocurrency from Nobitex, Iran's largest crypto exchange, and burned the funds in a politically motivated cyberattack.
June 18, 2025 — Source
Russian Hackers Bypass Gmail MFA With App-Specific Password Ruse
Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords.
June 18, 2025 — Source
Shocking security breach of 16 billion logins includes Apple IDs
Exposed records are being made available to threat agents on a massive scale.
June 18, 2025 — Source
'Stargazers' use fake Minecraft mods to steal player passwords
A large-scale malware campaign specifically targets Minecraft players with malicious mods and cheats that infect Windows devices with infostealers that steal credentials, authentication tokens, and cryptocurrency wallets.
June 18, 2025 — Source
Websites are tracking you via browser fingerprinting, researchers show
Clearing your cookies is not enough to protect your privacy online. New research led by Texas A&M University has found that websites are covertly using browser fingerprinting—a method to uniquely identify a web browser—to track people across browser sessions and sites.
June 18, 2025 — Source
World Leaks Claims Data Theft from State Agency Contractor
Crime Gang Begins Leaking Stolen Freedman HealthCare Data
June 18, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — June 16th, 2025
23andMe's Co-Founder to Buy Company; Makes Privacy Pledge
Anne Wojcicki's New Company Wins Bid for Bankrupt Genomics Testing Firm
June 16, 2025 — Source or Source or Source or Source or Source
240,000 Impacted by Data Breach at Eyecare Tech Firm Ocuco
The KillSec ransomware group has stolen hundreds of gigabytes of data from Ireland-based eyecare technology company Ocuco.
June 16, 2025 — Source
Anubis Ransomware Packs a Wiper to Permanently Delete Files
The emerging Anubis ransomware becomes a major threat, permanently deleting user files and making recovery impossible.
June 16, 2025 — Source
Archetyp Dark Web Market Shut Down by Law Enforcement
The Archetyp Market drug marketplace has been targeted by law enforcement in an operation involving takedowns and arrests.
June 16, 2025 — Source or Source or Source
Asheville Eye Associates Says 147,000 Impacted by Data Breach
Asheville Eye Associates says the personal information of 147,000 individuals was stolen in a November 2024 data breach.
June 16, 2025 — Source
Canadian Airline WestJet Hit by Cyberattack
A cybersecurity incident at WestJet resulted in users experiencing interruptions when accessing the company's application and website.
June 16, 2025 — Source
Canada's WestJet says 'expect interruptions' online as it navigates cybersecurity turbulence
Flights still flying - just don't count on the app or website working smoothly
June 16, 2025 — Source
Copilot AI Bug Could Leak Sensitive Data via Email Prompts
Microsoft Patched Flaw Allowing Attackers to Hijack Copilot Responses
June 16, 2025 — Source or Source or Source or Source
Cyolo expands remote access coverage for OT and cyber-physical systems
Cyolo announced several major new capabilities, headlined by Cyolo Third-Party VPN Control. This capability within the company's Cyolo PRO (Privileged Remote Operations) solution delivers visibility and access control for enforced third-party VPN and direct connections without requiring changes to production infrastructure or vendor workflows.
June 16, 2025 — Source
Eurocops arrest suspected Archetyp admin, shut down mega dark web drug shop
Marketplace as big as Silk Road had more than 600k users and turnover of 'at least' €250M
June 16, 2025 — Source
Google's $32 Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report
According to reports, the US Department of Justice will assess whether the deal would harm competition in the cybersecurity market.
June 16, 2025 — Source
Got a new password manager? Don't leave your old logins exposed in the cloud - do this next
Every major browser on every platform offers a way to save passwords and passkeys. If you use a third-party password manager, those built-in features can create a big mess. Here's how to clean things up.
June 16, 2025 — Source
Hackers Say T-Mobile's Been Hit Again—Company Says "Not Us"
Hackers are claiming to have stolen 64 million T-Mobile customer records, including sensitive personal data, and are selling it online—though T-Mobile denies any breach occurred. While some leaked information appears recycled from past hacks, the presence of new data raises serious concerns about the carrier's ongoing security practices.
June 16, 2025 — Source
Hackers switch to targeting U.S. insurance companies
Threat intelligence researchers are warning of hackers breaching multiple U.S. companies in the insurance industry using all the tactics observed with Scattered Spider activity.
June 16, 2025 — Source
High-Severity Vulnerabilities Patched in Tenable Nessus Agent
Three high-severity Tenable Agent vulnerabilities could allow users to overwrite and delete files, or execute arbitrary code, with System privileges.
June 16, 2025 — Source
History made as MI6 appoints first female Chief
The UK government has appointed Blaise Florence Metreweli as the next Chief of the Secret Intelligence Service (SIS), also known as MI6. Metreweli will take up the role, traditionally referred to by the codename "C," succeeding Sir Richard Moore, who is stepping down after five years in the post.
June 16, 2025 — Source
How Autonomous Security for Cloud May Redefine Risk Response
IBM's Souvik Khamaru on Moving SecOps from Reactive to Proactive Posture
June 16, 2025 — Source
Legacy Systems and Policies Expose West to Cyber Disruption
Adversaries' ability to monitor and disrupt Western critical infrastructure demands a major shift in cybersecurity priorities as well as thinking, said Ciaran Martin, an Oxford professor who's also the director of SANS Institute's CISO Network.
June 16, 2025 — Source or Source
Microsoft 365 security in the spotlight after Washington Post hack
The Washington Post has come under cyberattack which saw Microsoft email accounts of several journalists get compromised. The attack, which was discovered last Thursday, is believed to have been conducted by a foreign government due to the topics the journalists cover, including national security, economic policy, and China. Following the hack, the passwords on the affected accounts were reset to prevent access.
June 16, 2025 — Source
Microsoft: June Windows Server security updates cause DHCP issues
Microsoft acknowledged a new issue caused by the June 2025 security updates, causing the DHCP service to freeze on some Windows Server systems.
June 16, 2025 — Source
New Anubis ransomware can encrypt and destroy data, making file recovery impossible
The RaaS operation poses a double threat to corporate data thanks to its wiper feature
June 16, 2025 — Source
Red Teaming AI: The Build Vs Buy Debate
A strong AI deployment starts with asking the right questions, mapping your risks, and thinking like an adversary — before it's too late.
June 16, 2025 — Source
Scattered Spider has moved from retail to insurance
Google threat analysts warn the team behind the Marks & Spencer break-in has moved on
June 16, 2025 — Source
SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
Vulnerabilities affecting the SinoTrack GPS tracking platform may allow attackers to keep tabs on vehicles' location and even perform actions such as disconnecting power to vehicles' fuel pump (if the tracker can interact with a car's system).
June 16, 2025 — Source
Spy school dropout: GCHQ intern jailed for swiping classified data
Student 'believed he could finish' software dev 'project alone and therefore that the rules did not apply to him'
June 16, 2025 — Source
Suspected Chinese Hackers Targeted the Washington Post
Publication Tells Staff to Reset Passwords After Email Breach
June 16, 2025 — Source or Source or Source or Source or Source
Trump's Pick to Lead CISA is Stuck in Confirmation Limbo
Sean Plankey Has Support, But His CISA Nomination is Blocked and Delayed
June 16, 2025 — Source or Source
Washington Post's email system hacked, journalists' accounts compromised
Email accounts of several Washington Post journalists were compromised in a cyberattack believed to have been carried out by a foreign government.
June 16, 2025 — Source
Why 99% Accuracy Isn't Good Enough: The Reality of ML Malware Detection
ML models need to be complemented with traditional detection techniques for malware detection to work in real enterprise environments, due to the "base rate problem."
June 16, 2025 — Source
Why the $32B Google-Wiz Deal Caught the Eye of US Regulators
Justice Officials Will Reportedly Probe the Google-Wiz Deal on Antitrust Grounds
June 16, 2025 — Source or Source or Source or Source
Your Android Notifications Could Be a Security Nightmare in Waiting
A newly discovered flaw in Android's notification system could let attackers manipulate the "Open Link" button to redirect users to malicious websites. While Google is working on a fix, users are advised to avoid clicking links directly from notifications and instead open them manually from within the app.
June 16, 2025 — Source
Zoomcar discloses security breach impacting 8.4 million users
Zoomcar Holdings (Zoomcar) has disclosed that unauthorized accessed its system led to a data breach impacting 8.4 million users.
June 16, 2025 — Source or Source
Internet — Security Issues — June 13th, 2025
Agentic AI Won't Save the SOC, Yet
Opaque Decision-Making, Lack of Guardrails, Poor Auditability are Risks
June 13, 2025 — Source or Source or Source or Source
Cloudflare: Outage not caused by security incident, data is safe
Cloudflare has confirmed that the massive service outage yesterday was not caused by a security incident and no data has been lost.
June 13, 2025 — Source
Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption
Trend Micro patches critical-severity Apex Central and Endpoint Encryption PolicyServer flaws leading to remote code execution.
June 13, 2025 — Source
Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking
Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication.
June 13, 2025 — Source
Cybersecurity Strategy Shifts Amid Global Political Tensions
NCC Group's Katharina Sommer on Why Nations Are Turning Inward on Cyber Defense
June 13, 2025 — Source
Discord flaw lets hackers reuse expired invites in malware campaign
Hackers are hijacking expired or deleted Discord invite links to redirect users to malicious sites that deliver remote access trojans and information-stealing malware.
June 13, 2025 — Source
Fog Ransomware Attack Employs Unusual Tools
Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41.
June 13, 2025 — Source
Huione's 'Shutdown' Fails to Halt Its Laundering Network
Huione-Linked Crypto Activity Continues Despite Takedown Efforts
June 13, 2025 — Source or Source or Source or Source or Source
In Other News: Cloudflare Outage, Cracked.io Users Identified, Victoria's Secret Cyberattack Cost
Noteworthy stories that might have slipped under the radar: Cloudflare outage not caused by cyberattack, Dutch police identified 126 users of Cracked.io, the Victoria's Secret cyberattack has cost $10 million.
June 13, 2025 — Source
Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday
Industry professionals comment on the Trump administration's new executive order on cybersecurity.
June 13, 2025 — Source
INTERPOL-Led Effort Dismantles Infostealer Malware Network in 26 Countries Across Asia-Pacific Region
INTERPOL partnered with Group-IB, Kaspersky, and Trend Micro to take down a cybercrime network. They alerted more than 216,000 individuals and organizations that were possible victims.
June 13, 2025 — Source
iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
A zero-click attack leveraging a freshly disclosed Messages vulnerability (CVE-2025-43200) has infected the iPhones of two European journalists with Paragon's Graphite mercenary spyware, Citizen Lab researchers have revealed on Thursday.
June 13, 2025 — Source
ISMG Editors: Gartner Security & Risk Management Summit Recap
Security Leadership in Focus - From AI Risks to Cloud Responsibility
June 13, 2025 — Source or Source or Source or Source or Source
ISMG Editors: Supply Chain Attacks Are Spiking - Here's Why
Also: Trump's Rollback of Cyber Rules, 23andMe's Privacy Backlash
June 13, 2025 — Source or Source or Source or Source or Source
Israeli Strikes Raise Fears of Cyberattacks and Retaliation
Analysts Warn US Infrastructure May Be Next as Iran Plans Missile Strike Response
June 13, 2025 — Source or Source or Source or Source
Microsoft Copilot's own default configuration exposed users to the first-ever "zero-click" AI attack, but there was no data breach
Research firm uncovers the first zero-click attack on Microsoft 365 Copilot, but Microsoft has since patched the issue and states that bad actors did not access sensitive user data.
June 13, 2025 — Source
Paid proxy servers vs free proxies: Is paying for a proxy service worth it?
Debating between a paid or free proxy service? These are the benefits and potential issues you should be aware of.
June 13, 2025 — Source
Redefining thermosensing plants: New model could enable climate-tailored crops for food security
An advance by Monash University scientists could transform agriculture with designer crops suited to the climate of individual regions.
June 13, 2025 — Source
Security Bite: Apple's new iOS 26 spam tools will make scammers cry
Earlier this week, during its annual WWDC keynote, Apple unveiled a slew of headline features like Liquid Glass, a new Games app, and Visual Intelligence, as well as two major spam protection tools coming to iOS 26 this fall. While I was a little disappointed in the lack of new security or even privacy features, these new tools will change the game for users who receive annoying spam calls and messages on the daily.
June 13, 2025 — Source
SimpleHelp Vulnerability Exploited Against Utility Billing Software Users
CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider's customers.
June 13, 2025 — Source
StackHawk Sensitive Data Identification provides visibility into high-risk APIs
StackHawk announced Sensitive Data Identification to give security teams visibility into high-risk APIs across thousands of code repositories within an organization.
June 13, 2025 — Source
TeamFiltration Abused in Entra ID Account Takeover Campaign
Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts.
June 13, 2025 — Source
Understanding the Fundamentals of Cryptography
Cryptography protects data using encryption, ensuring only intended users can access it. This article explains its basics with simple examples.
June 13, 2025 — Source
University researchers tout using smartwatches to steal data from air-gapped systems — SmartAttack paper proposes using wearable as a covert ultrasonic signal receiver
The attack sounds unbelievably hard to pull off.
June 13, 2025 — Source
Urban aquaponics as a sustainable solution for food security and environmental conservation
Researchers explore how aquaponics - a system that integrates fish farming with soilless plant cultivation - can enhance urban food security while reducing environmental impacts.
June 13, 2025 — Source
Victoria's Secret restores critical systems after cyberattack
Victoria's Secret has restored all critical systems impacted by a May 24 security incident that forced it to shut down corporate systems and the e-commerce website.
June 13, 2025 — Source
VirtualMacOSX.com user data exposed in breach
Ten thousand user records that included sensitive data were revealed online.
June 13, 2025 — Source
Wanted: Junior cybersecurity staff with 10 years' experience and a PhD
Infosec employers demanding too much from early-career recruits, says ISC2
June 13, 2025 — Source
WhatsApp Backs Apple Over Encryption Fight With UK
WhatsApp CEO Says UK Request Sets "Dangerous Precedent"
June 13, 2025 — Source or Source
ZeroRISC Raises $10 Million for Open Source Silicon Security Solutions
ZeroRISC has raised $10 million in seed funding for production-grade open source silicon security, built on OpenTitan designs.
June 13, 2025 — Source
Internet — Security Issues — June 9th, 2025
184 million major passwords leaked! Avoid these 2 dangers
A few simple steps will protect your PC and your online accounts.
June 9, 2025 — Source
Apple, Google, and Microsoft offer free password managers - but should you use them?
The three dominant computing platforms have each tried to build features that help you manage passwords without paying for third-party software. Are any of them worth your time and effort?
June 9, 2025 — Source
Best free password managers 2025: Online security doesn't have to cost a thing
Shore up your defenses, stat.
June 9, 2025 — Source
Boards Leave CISOs Exposed to Legal Risks
Attorney Jonathan Armstrong Says Board Diversity Must Include Cybersecurity Skills
June 9, 2025 — Source or Source or Source or Source or Source
Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign
Anti-malware vendor said it spent the past twelve months deflecting a stream of network reconnaissance probes from China-nexus threat actors
June 9, 2025 — Source
Chinese Hackers and User Lapses Turn Smartphones Into a 'Mobile Security Crisis'
Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in U.S. cyberdefenses.
June 9, 2025 — Source
Chinese spy crew appears to be preparing for conflict by backdooring 75+ critical orgs
SentinelOne discovered the campaign when they tried to hit the security vendor's own servers
June 9, 2025 — Source
Designing Blue Team playbooks with Wazuh for proactive cyber defense
In cybersecurity, Blue Teams are responsible for defending an organization's IT environment, including networks, endpoints, applications, and data against various types of threats. Their role goes beyond protecting IT assets; they also ensure operational continuity, monitor for malicious activity, and respond to incidents in real-time. To operate effectively, these teams rely on structured processes known as playbooks.
June 9, 2025 — Source
DOGE wins at Supreme Court; conservative majority ends limits on data access
Jackson dissent says majority bends legal standards for Trump administration.
June 9, 2025 — Source
EU launches EU-based, privacy-focused DNS resolution service
DNS4EU, an EU-based DNS resolution service created to strengthen European Union's digital sovereignty, has become reality.
June 9, 2025 — Source
Grocery wholesale giant United Natural Foods hit by cyberattack
United Natural Foods (UNFI), North America's largest publicly traded wholesale distributor, was forced to shut down some systems following a recent cyberattack.
June 9, 2025 — Source
Guardz Banks $56M Series B for All-in-One SMB Security
The Israeli company said the Series B raise was led by ClearSky and included equity stakes for new backer Phoenix Financial.
June 9, 2025 — Source
How To Tell If A Social Security Text Is Real Or A Scam
The digital age has brought with it a seemingly endless stream of legitimately game-changing technologies. It has also opened up new avenues for scammers to take advantage of those who may not be savvy enough to spot a scam or cyberattack when they see one. While there are several different types of cyberattacks for folks to be wary of these days, the goal of each is essentially the same: to acquire personally identifiable information (often shortened to PII) and use it to gain access to otherwise private financial accounts and essentially loot them.
June 9, 2025 — Source
iMessage Zero-Click Attacks Suspected in Targeting of High-Value Individuals
iVerify links iPhone crashes to sophisticated zero-click attacks via iMessage targeting individuals involved in politics in the EU and US.
June 9, 2025 — Source
Malicious NPM Packages Disguised as Express Utilities Allow Attackers to Wipe Systems
Two malicious NPM packages contain code that would delete production systems when triggered with the right credentials.
June 9, 2025 — Source
Mirai Botnet Variant Exploits DVR Flaw to Build Swarm
A Mirai Offshoot Uses DVR Command Injection Bug to Spread, Hitting 50,000 Devices
June 9, 2025 — Source or Source or Source
Mirai Botnets Exploit Flaw in Unpatched Wazuh Servers
No fewer than two separate Mirai botnets are on the hunt for unpatched servers hosting open source SIEM solution Wazuh, an unusual variation on hackers' typical focus on Internet of Things devices for stringing together infected computers.
June 9, 2025 — Source or Source or Source or Source or Source
Mirai Botnets Exploiting Wazuh Security Platform Vulnerability
CVE-2025-24016, a critical remote code execution vulnerability affecting Wazuh servers, has been exploited by Mirai botnets.
June 9, 2025 — Source
NHS: Blood Supply Still Affected by June 2024 Vendor Attack
NHS in England Urging One Million People to Donate Blood to 'Secure' Supply
June 9, 2025 — Source or Source or Source or Source or Source
Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison
Kingsley Uchelue Utulu has been sentenced to more than 5 years in prison for his role in a scheme that involved hacking, fraud and identity theft.
June 9, 2025 — Source
Online Developer Tools a Backdoor to Security Threat
Using online developer utilities like a JSON Viewer can be incredibly convenient for parsing and visualizing JSON data, but they also come with significant risks.
June 9, 2025 — Source
Over 84,000 Roundcube instances vulnerable to actively exploited flaw
Over 84,000 Roundcube webmail installations are vulnerable to CVE-2025-49113, a critical remote code execution (RCE) flaw with a public exploit.
June 9, 2025 — Source
Privacy Victory! Judge Grants Preliminary Injunction in OPM/DOGE Lawsuit
Court to Decide Scope of Injunction Later This Week
June 9, 2025 — Source
React Native Aria Packages Backdoored in Supply Chain Attack
A threat actor published backdoored versions of 17 NPM packages from GlueStack in a fresh supply chain attack.
June 9, 2025 — Source
Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113)
With an exploit for a critical Roundcube vulnerability (CVE-2025-49113) being offered for sale on underground forums and a PoC exploit having been made public, attacks exploiting the flaw are incoming and possibly already happening.
June 9, 2025 — Source
SentinelOne Sees No Breach After Hardware Supplier Hacked
Intrusion Involved ShadowPad Malware, Wielded in Attacks Tied to Chinese APT Groups
June 9, 2025 — Source or Source or Source or Source or Source
Sensata Technologies says personal data stolen by ransomware gang
Sensata Technologies is warning former and current employees it suffered a data breach after concluding an investigation into an April ransomware attack.
June 9, 2025 — Source
Serverless IAM: Implementing IAM in Serverless Architectures with Lessons from the Security Trenches
Serverless IAM combines managed identity services with fine-grained authorization for secure FaaS across major cloud providers.
June 9, 2025 — Source
Trump Cybersecurity Executive Order Targets Digital Identity, Sanctions Policies
President Trump says his new cybersecurity executive order amends problematic elements of Biden- and Obama-era executive orders.
June 9, 2025 — Source
US Seeks Forfeiture of $7.74M in Cryptocurrency Tied to North Korean IT Workers
The US is seeking the forfeiture of $7.74 million in cryptocurrency in frozen wallets tied to North Korean fake IT workers schemes.
June 9, 2025 — Source
Whole Foods Supplier Faces Cyberattack Disrupting Operations
United Natural Foods Inc. Launches Investigation, Confirms IT Systems Breach
June 9, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — June 6th, 2025
145 criminal domains linked to BidenCash Marketplace seized
Approximately 145 darknet and conventional internet domains, along with cryptocurrency funds linked to the BidenCash marketplace, have been seized by the U.S. Attorney's Office for the Eastern District of Virginia. The operators of the BidenCash marketplace use the platform to simplify the process of buying and selling stolen credit cards and associated personal information.
June 6, 2025 — Source
Bitdefender Antivirus Review 2025: I Found This Top-Rated Security Software Effective and Efficient
I spent several days testing Bitdefender's antivirus and online security tools. Here's what I thought of it.
June 6, 2025 — Source
Cisco Patches Critical ISE Vulnerability With Public PoC
Cisco has released patches for a critical vulnerability impacting cloud deployments of Identity Services Engine (ISE).
June 6, 2025 — Source
Critical Fortinet flaws now exploited in Qilin ransomware attacks
The Qilin ransomware operation has recently joined attacks exploiting two Fortinet vulnerabilities that allow bypassing authentication on vulnerable devices and executing malicious code remotely.
June 6, 2025 — Source
Cybersecurity M&A Roundup: 42 Deals Announced in May 2025
The number of cybersecurity-related merger and acquisition (M&A) announcements surged in May 2025.
June 6, 2025 — Source
DA: Sleep Center Worker Installed Secret Camera in Bathrooms
Ex-Employee Faces Criminal Charges; Hospital Reports Incident as Big HIPAA Breach
June 6, 2025 — Source or Source or Source or Source or Source
Destructive 'PathWiper' Targeting Ukraine's Critical Infrastructure
A Russia-linked threat actor has used the destructive malware dubbed PathWiper against a critical infrastructure organization in Ukraine.
June 6, 2025 — Source
EU Prepares for Transnational Cyberattacks
Cyber Blueprint Spells Out Measures to Coordinate Against Disruptive Hacks
June 6, 2025 — Source or Source or Source or Source or Source
Fastest VPN 2025: Top 5 fastest VPNs ranked
If you have the need, the need for VPN speed, we've got recommendations about the best choices for you.
June 6, 2025 — Source
FBI Issues Play Ransomware Security Advisory & Mitigation Steps to Take Now
The Play ransomware group has hit about 900 organizations globally so far and uses "double extortion" after data theft.
June 6, 2025 — Source
Fresh strain of pro-Russian wiper flushes Ukrainian critical infrastructure
Destructive malware has been a hallmark of Putin's multi-modal war
June 6, 2025 — Source
Hackers leak 86 million AT&T customer records with 44 million social security numbers, report says
Plus, AT&T responds.
June 6, 2025 — Source
HPE Patches Critical Vulnerability in StoreOnce
An HPE StoreOnce vulnerability allows attackers to bypass authentication, potentially leading to remote code execution.
June 6, 2025 — Source
In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA
Noteworthy stories that might have slipped under the radar: FBI issues an alert on BadBox 2 botnet, NSO disputing the $168 million WhatsApp fine, 1,000 people left CISA since Trump took office.
June 6, 2025 — Source
ISMG Editors: Infosecurity Europe Conference 2025 Wrap-Up
Also: AI's Promise and Pitfalls and Why Community, Communication, and Basics Matter
June 6, 2025 — Source or Source or Source or Source or Source
Italian lawmakers say Italy used spyware to target phones of immigration activists, but not against journalist
An Italian parliamentary committee confirmed that the Italian government used spyware made by the Israeli company Paragon to hack several activists working to save immigrants at sea. The committee, however, said its investigation concluded that a prominent Italian journalist was not among the victims, leaving key questions about the spyware attacks unanswered.
June 6, 2025 — Source
Kettering Health confirms Interlock ransomware behind cyberattack
Healthcare giant Kettering Health, which manages 14 medical centers in Ohio, confirmed that the Interlock ransomware group breached its network and stole data in a May cyberattack.
June 6, 2025 — Source
Microsoft, Indian police bust AI-powered tech support scam ring targeting elderly in Japan
Working with India's Central Bureau of Investigation (CBI), Microsoft recently assisted in busting a scam network that was targeting the elderly in Japan. The CBI raided 19 locations on May 28, leading to the arrest of six key operatives and the taking down of two call centers. The scammers were impersonating Microsoft specifically and using tech support scams against Japanese seniors.
June 6, 2025 — Source
Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
Millions of Internet-of-Things (IoT) devices running the open-source version of the Android operating system are part of the Badbox 2.0 botnet, the FBI has warned.
June 6, 2025 — Source
Millions of AT&T customer records repackaged for sale on the dark web
Originally released on the dark web in 2024, the repackaged data includes names, dates of birth, phone numbers, email addresses, street addresses, and social security numbers.
June 6, 2025 — Source
Millions of low-cost Android devices turn home networks into crime platforms
BadBox malware has been menacing low-cost Android devices for nearly a decade.
June 6, 2025 — Source
MIND Raises $30 Million for Data Loss Prevention
Data security firm MIND has raised $30 million in Series A funding to expand its R&D and go-to-market teams.
June 6, 2025 — Source
New PathWiper data wiper malware hits critical infrastructure in Ukraine
A new data wiper malware named 'PathWiper' is being used in targeted attacks against critical infrastructure in Ukraine, aimed at disrupting operations in the country.
June 6, 2025 — Source
One Single GitHub User Was Responsible For Over A Hundred Backdoored Malware Repos
Thanks to the curiosity of a Sophos customer about a specific remote access trojan they read about in the news, 100+ poisoned GitHub repos were not just taken down, but tracked back to a single email address. Of the 141 repos associated with that email address 133 were backdoored in some way or another.
June 6, 2025 — Source
Police arrests 20 suspects for distributing child sexual abuse content
Law enforcement authorities from over a dozen countries have arrested 20 suspects in an international operation targeting the production and distribution of child sexual abuse material.
June 6, 2025 — Source
Your ransomware nightmare just came true -- now what?
Don't negotiate unless you must, and if so, drag it out as long as you can
June 6, 2025 — Source
Sinister BADBOX Malware Infected Over 1M Android Devices, Is Yours One?
A new variant of the BADBOX malware campaign has taken root in over a million Android-based devices worldwide, and if you've picked up a cheap smart TV box or projector off Amazon or AliExpress lately, you might be part of the problem. BADBOX 2.0 is a sprawling botnet targeting Android Open Source Project (AOSP) devices—not certified Android TV gear—and it's converting them into residential proxies for cybercrime.
June 6, 2025 — Source
Tax resolution firm Optima Tax Relief hit by ransomware, data leaked
U.S. tax resolution firm Optima Tax Relief suffered a Chaos ransomware attack, with the threat actors now leaking data stolen from the company.
June 6, 2025 — Source
'There Will Be Pain': CISA Cuts Spark Bipartisan Concerns
Analysis of Proposed Budget, Workforce Cuts Reveal Risks to Cyber Readiness
June 6, 2025 — Source or Source or Source or Source or Source
This radical suggestion is simplifying my digital security
File this idea under things I should have thought of sooner.
June 6, 2025 — Source
Uncle Sam moves to seize $7.7M laundered by North Korean IT worker ring
The cash has been frozen for more than two years
June 6, 2025 — Source
US Offering $10 Million Reward for RedLine Malware Developer
A reward is being offered for Maxim Alexandrovich Rudometov, who is accused of developing and managing the RedLine malware.
June 6, 2025 — Source
Why Passkeys Are Better than Passwords (And How to Use Them)
No one likes passwords. Users find managing them annoying, and website managers worry about login credentials being stolen in a data breach. The industry has developed a better solution: passkeys.
June 6, 2025 — Source
Internet — Security Issues — June 3rd, 2025
84 percent of attacks now use legitimate tools
New research from Bitdefender shows that 84 percent of high severity attacks are using Living off the Land (LOTL) techniques, exploiting legitimate tools used by administrators.
June 3, 2025 — Source
1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking
A critical command execution vulnerability has been found by a researcher in Instantel Micromate monitoring units.
June 3, 2025 — Source
Akamai launches DNS Posture Management for real-time monitoring and guided remediation
Akamai Technologies has introduced Akamai DNS Posture Management, a solution that offers unified, multicloud visibility over all DNS assets. The agentless solution provides real-time monitoring and guided remediation across all major DNS providers. Security teams can quickly detect and respond to DNS-based attacks, certificate security risks, vulnerabilities, and misconfigurations that weaken an organization's security posture.
June 3, 2025 — Source
Android chipmaker Qualcomm fixes three zero-days exploited by hackers
Chipmaker giant Qualcomm released patches on Monday fixing a series of vulnerabilities in dozens of chips, including three zero-days that the company said may be in use as part of hacking campaigns.
June 3, 2025 — Source
Android malware Crocodilus adds fake contacts to spoof trusted callers
The latest version of the 'Crocodilus' Android malware has introduced a new mechanism that adds a fake contact to an infected device's contact list to deceive victims when they receive calls from the threat actors.
June 3, 2025 — Source
AttackIQ Ready3 identifies which vulnerabilities are truly exposed
AttackIQ releaseed AttackIQ Ready3. With expanded discovery capabilities, Ready3 maps both internal and external attack surfaces. By correlating asset discovery with vulnerability context, attack paths and compensating controls, the platform helps security teams identify which vulnerabilities are truly exposed because existing defenses are failing to stop them.
June 3, 2025 — Source
Australia Enforces Ransomware Payment Reporting
Covered organizations in Australia are now required to report ransomware and other cyber extortion payments within three days.
June 3, 2025 — Source
Australian Scam Losses Increase 28% in 2025
Number of Reports Is Down, But Citizens Lost AU$60 Million to Investment Scams
June 3, 2025 — Source or Source
Bling slinger Cartier tells customers to be wary of phishing attacks after intrusion
Nothing terribly valuable taken in data heist, though privacy a little tarnished
June 3, 2025 — Source
CISA warns of ConnectWise ScreenConnect bug exploited in attacks
CISA is alerting federal agencies in the U.S. of hackers exploiting a recently patched ScreenConnect vulnerability that could lead to executing remote code on the server.
June 3, 2025 — Source
Cyber Attacks Are Up 47% in 2025 -- AI is One Key Factor
Cyber attacks on businesses continue to escalate in 2025, with global organisations experiencing an average of 1,925 incidents per week in Q1, which is a 47% increase compared to the same period last year, according to new research from Check Point.
June 3, 2025 — Source
Game Changer: AI Discovers Its First Real Zero-Day Vulnerability
OpenAI's o3 AI model has achieved a cybersecurity first: discovering a zero-day vulnerability (CVE-2025-37899) in the Linux kernel's SMB implementation. This critical "use-after-free" bug was verified and patched, marking the first time AI completed the full cycle of finding and resolving a previously unknown flaw, highlighting AI's growing power in security.
June 3, 2025 — Source
Goodbye CVE? European Vulnerability Database EUVD Now Live
The European Union Agency for Cybersecurity (ENISA) has recently launched the beta of the European Vulnerability Database (EUVD), a new public platform operating alongside, but independently from, the widely used Common Vulnerabilities and Exposures (CVE) system. The new platform aims to improve coordination and transparency in vulnerability handling within the EU.
June 3, 2025 — Source
Google patches new Chrome zero-day bug exploited in attacks
Google has released an emergency security update to fix the third Chrome zero-day vulnerability exploited in attacks since the start of the year.
June 3, 2025 — Source or Source
How to Spot Scam Tech Sites: What We Learned the Hard Way
A little while ago, we almost got burned by a website selling wireless earbuds at crazy low prices. The checkout looked legit, but after we ordered, the shipping info never updated. We tried contacting them-no luck.
June 3, 2025 — Source
Illicit crypto-miners pouncing on lazy DevOps configs that leave clouds vulnerable
To stop the JINX-0132 gang behind these attacks, pay attention to HashiCorp, Docker, and Gitea security settings
June 3, 2025 — Source
Is a quantum-cryptography apocalypse imminent?
Will quantum computers crack cryptographic codes and cause a global security disaster? You might certainly get that impression from a lot of news coverage, the latest of which reports new estimates that it might be 20 times easier to crack such codes than previously thought.
June 3, 2025 — Source
Lumma Stealer Malware Resurgence Challenges Global Takedown
Malware Operation Shows Signs of Regrouping
June 3, 2025 — Source or Source
MainStreet Bank Data Breach Impacts Customer Payment Cards
The incident occurred in March and impacted the personally identifiable information of approximately 4.65% of MainStreet Bancshares' customers.
June 3, 2025 — Source
Malwarebytes Scam Guard spots and avoids potential scams
Malwarebytes launched Scam Guard, an AI-powered digital safety companion that provides real-time feedback on scams, threats and malware alongside digital safety recommendations.
June 3, 2025 — Source
Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names
Microsoft and CrowdStrike are running a project that aims to align threat actor names, and Google and Palo Alto Networks will also contribute.
June 3, 2025 — Source
Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones
Mikko Hypponen has joined the Finnish anti-drone company Sensofusion as Chief Research Officer after three decades of fighting malware.
June 3, 2025 — Source
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
June 3, 2025 — Source
New Android malware adds fake contacts to make scam calls look legit
A newly-spotted Trojan app steals crypto and banking info, but goes one step further to make social engineering attacks easier.
June 3, 2025 — Source
Over 30 Vulnerabilities Patched in Android
The latest Android updates fix vulnerabilities in Runtime, Framework, System, and third-party components of the mobile OS.
June 3, 2025 — Source
Privacy abuse involving Meta and Yandex discovered
An international research collaboration has recently uncovered a potential privacy abuse involving Meta and the Russian tech giant Yandex. They found that native Android apps—including Facebook, Instagram, and several Yandex apps such as Maps, Navi, Browser, and Search—silently listen on fixed local ports on mobile devices to de-anonymize users' browsing habits without consent.
June 3, 2025 — Source
Researchers: Meta and Yandex Broke Android Privacy
Web-to-App Pipeline Uses Meta Pixel and Yandex Metrica
June 3, 2025 — Source or Source or Source or Source or Source
RSA enhances passwordless identity platform
RSA announced a new Identity Security Posture Management (ISPM) and enhancements to its passwordless identity platform.
June 3, 2025 — Source
Scattered Spider: Three things the news doesn't tell you
With the recent attacks on UK retailers Marks & Spencer and Co-op, so-called Scattered Spider has been all over the media, with coverage spilling over into the mainstream news due to the severity of the disruption — currently looking like hundreds of millions in lost profits for M&S alone.
June 3, 2025 — Source
Securing Software Created by AI Agents: The Next Security Paradigm
Agentic AI can autonomously write and deploy code, creating new security risks that demand human oversight and robust safeguards.
June 3, 2025 — Source
Silence, Security, Speed — This Antivirus Checks Every Box
ESET NOD32 2025's AI and cloud-powered scanning detect threats faster — and more accurately — than legacy tools.
June 3, 2025 — Source
The UK Brings Cyberwarfare Out of the Closet
The UK's 2025 Strategic Defence Review outlines a unified approach to modern warfare, integrating cyber, AI, and electromagnetic capabilities across military domains.
June 3, 2025 — Securing Software Created by AI Agents: The Next Security Paradigm
Agentic AI can autonomously write and deploy code, creating new security risks that demand human oversight and robust safeguards.
June 3, 2025 — Source
Vendor email compromise attacks get more effective in large enterprises
Drawing on behavioral data from over 1,400 organizations worldwide, the report reveals the extent to which employees are actively engaging with advanced text-based threats like vendor email compromise (VEC) and explores the blind spots attackers are exploiting with highly targeted, socially engineered attacks.
June 3, 2025 — Source
Why Scamming Can't Be Stopped—But It Can Be Managed
With crime-as-a-service lowering the barrier to entry and prosecution lagging behind, enterprise security teams must rethink their strategies to detect and disrupt scams at scale.
June 3, 2025 — Source
Zero Networks Lands $55M Series C to Drive Zero Trust Growth
Florida Vendor Set to Reach $100M ARR by 2027 With Identity Segmentation, ZTNA Push
June 3, 2025 — Source or Source
Internet — Security Issues — May 30th, 2025
Autonomous Payment or Anarchy? AI Gets Purchasing Power
As Visa and Mastercard Deploy AI Agents, Experts Ask: Who Holds the Receipt?
May 30, 2025 — Source or Source
Best VPNs for Android: 5 top picks for phones and tablets
There are tons of VPNs available for Android, but which ones are worth the subscription? Here are our top five picks.
May 30, 2025 — Source
Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments
China-linked hackers used a compromised government site to target other government entities with the ToughProgress malware that uses an attacker-controlled Google Calendar for C&C.
May 30, 2025 — Source
CISA Releases Guidance on SIEM and SOAR Implementation
The guidance outlines the benefits and challenges or SIEM and SOAR platforms, and shares implementation recommendations.
May 30, 2025 — Source
ConnectWise Discloses Suspected State-Sponsored Hack
The IT software provider says ScreenConnect users were impacted by the attack, which exploited a high-severity ASP.NET vulnerability.
May 30, 2025 — Source
Cybersecurity Firm SentinelOne Suffers Major Outage
After Hours-Long Disruption, XDR Vendor Promises Full Root Cause Analysis of Outage
May 30, 2025 — Source or Source or Source or Source or Source
Eight things we learned from WhatsApp versus NSO Group spyware lawsuit
On May 6, WhatsApp scored a major victory against NSO Group when a jury ordered the infamous spyware maker to pay more than $167 million in damages to the Meta-owned company.
May 30, 2025 — Source
ExpressVPN review 2025: Fast speeds and a low learning curve
Simple, undemanding apps make ExpressVPN near-ideal for everyday use.
May 30, 2025 — Source
Firebase, Google Apps Script Abused in Fresh Phishing Campaigns
Security researchers flag two phishing campaigns abusing Firebase and Google Apps Script to host malware and fake login pages.
May 30, 2025 — Source
Genetic Data: Emerging Cyberthreats and Privacy Concerns
Nicholas Morris of Optiv on the Potential for DNA Data Exploits by Cybercriminals
May 30, 2025 — Source or Source or Source or Source or Source
Germany doxxes Conti ransomware and TrickBot ring leader
The Federal Criminal Police Office of Germany (Bundeskriminalamt or BKA) claims that Stern, the leader of the Trickbot and Conti cybercrime gangs, is a 36-year-old Russian named Vitaly Nikolaevich Kovalev.
May 30, 2025 — Source
How we test VPNs
They all say they're the best — here's how we find out who's telling the truth.
May 30, 2025 — Source
ISMG Editors: Are We Less Secure Despite the AI Buzz?
Also: Deepfake Dangers with Veo 3; Claude Opus 4's Manipulative Edge
May 30, 2025 — Source or Source or Source
Linux Crash Dump Flaws Expose Passwords, Encryption Keys
Race-Condition Bugs in Ubuntu and Red Hat Tools Could Leak Sensitive Memory Data
May 30, 2025 — Source or Source or Source or Source or Source
Linux Zero-Day Vulnerability Discovered Using Frontier AI
Vulnerability Researchers: Start Tracking LLM Capabilities, Says Veteran Bug Hunter
May 30, 2025 — Source or Source or Source
MITRE Publishes Post-Quantum Cryptography Migration Roadmap
The roadmap provides an overview of four key stages of the migration process, namely preparation, baseline understanding, planning and execution, and monitoring and evaluation.
May 30, 2025 — Source
Preview: Hot Sessions at Infosecurity Europe 2025 in London
Ransomware, Quantum Computing, Geopolitics, Gen AI and More on the Agenda
May 30, 2025 — Source or Source or Source or Source
The best VPN service for 2025
These are the best virtual private networks out there, as reviewed and tested by experts.
May 30, 2025 — Source
US Sanctions Philippine Company for Supporting Crypto Scams
The US Treasury Department US has slapped sanctions on Funnull Technology for providing support to cryptocurrency investment scams.
May 30, 2025 — Source or Source or Source or Source or Source
Watch Now: Why Context is a Secret Weapon in Application Security Posture Management
Join the live webinar to understand why data in itself is not enough to make informed decisions for prioritization.
May 30, 2025 — Source
Zscaler, Netskope, Palo Alto Top SSE Gartner Magic Quadrant
Gartner0th, 2025
Internet — Security Issues — May 28th, 2025
364,000 Impacted by Data Breach at LexisNexis Risk Solutions
Data broker giant LexisNexis Risk Solutions says personal information was stolen from 364,000 people in a December 2024 data breach.
May 28, 2025 — Source
$223 Million Stolen in Cetus Protocol Hack
Hackers exploited a vulnerability in Cetus Protocol, a liquidity provider on the SUI blockchain.
May 28, 2025 — Source
A Peek Behind the Claude Curtain
Researcher Analyzes System Prompts to Show How New Claude Models Work
May 28, 2025 — Source or Source
Attack on LexisNexis Risk Solutions exposes data on 300k +
Data analytics and risk management biz says software dev platform breached, not itself
May 28, 2025 — Source
Attackers hit MSP, use its RMM software to deliver ransomware to clients
A threat actor wielding the DragonForce ransomware has compromised an unnamed managed service provider (MSP) and pushed the malware onto its client organizations via SimpleHelp, a legitimate remote monitoring and management (RMM) tool.
May 28, 2025 — Source
BalkanID IGA Lite reduces identity risk and ensures compliance
BalkanID has unveiled its self-service Identity Governance and Administration (IGA) Lite Platform, offering flexibility and transparent pricing.
May 28, 2025 — Source
Bitdefender versus McAfee: Which Antivirus Is Right for You?
Compare Bitdefender and McAfee to find the best antivirus for your needs. Discover features and make an informed choice.
May 28, 2025 — Source
Building a Security Portfolio Even When You're a Blue Teamer
Things to Include on Your CV When Your Job Focuses on Keeping Systems Running
May 28, 2025 — Source
Cerby Raises $40 Million for Identity Automation Platform
Identity security automation platform Cerby has raised $40 million in Series B funding to scale operations.
May 28, 2025 — Source
CISA's Leadership Exodus Continues, Shaking Local Offices
'It's Just Totally Destabilizing,' Staffers Say Amid CISA's Leadership Exodus
May 28, 2025 — Source or Source or Source or Source
Czech Government Attributes Foreign Ministry Hack to China
APT31 Compromised the Czech Foreign Affairs Ministry in 2022
May 28, 2025 — SourceSource or Source or Source or Source or Source
Data broker giant LexisNexis says breach exposed personal information of over 364,000 people
LexisNexis Risk Solutions, a data broker that collects and uses consumers' personal data to help its paying corporate customers detect possible risk and fraud, has disclosed a data breach affecting more than 364,000 people.
May 28, 2025 — Source
Interlock ransomware gang deploys new NodeSnake RAT on universities
The Interlock ransomware gang is deploying a previously undocumented remote access trojan (RAT) named NodeSnake against educational institutes for persistent access to corporate networks.
May 28, 2025 — Source
MATLAB Maker MathWorks Recovering From Ransomware Attack
The incident impacted multiple web and mobile applications, licensing services, downloads and online store, website, wiki, MathWorks accounts, and other services.
May 28, 2025 — Source
New PumaBot botnet brute forces SSH credentials to breach devices
A newly discovered Go-based Linux botnet malware named PumaBot is brute-forcing SSH credentials on embedded IoT devices to deploy malicious payloads.
May 28, 2025 — Source
OneDrive Gives Web Apps Full Read Access to All Files
Security researchers warn that OneDrive's file sharing tool may grant third-party web apps access to all your files—not just the one you choose to upload.
May 28, 2025 — Source
PlainID announces Policy Management for Agentic AI
PlainID introduced Policy Management for Agentic AI. Securing the future with a solution that brings identity-aware, policy-based access control to the next generation of AI systems.
May 28, 2025 — Source
PumaBot Malware Targets Linux IoT Devices
Stealthy Malware Installs Cryptomining Software
May 28, 2025 — Source or Source< or Source or Source or Source
Quantum computers may crack RSA encryption with fewer qubits than expected
A team of researchers at AI Google Quantum AI, led by Craig Gidney, has outlined advances in quantum computer algorithms and error correction methods that could allow such computers to crack Rivest--Shamir--Adleman (RSA) encryption keys with far fewer resources than previously thought. The development, the team notes, suggests encryption experts need to begin work toward developing next-generation encryption techniques.
May 28, 2025 — Source
RadiantOne platform enhancements prevent identity-based attacks
Radiant Logic announced its new Identity Observability features as part of the RadiantOne platform.
May 28, 2025 — Source
Researchers find billions of browser cookies for sale on the dark web
Cybercriminals exploiting traditional web standards to commit fraud -- or worse
May 28, 2025 — Source
Revenue Cycle Management Firm's Data Breach Total Soars
ALN Medical Management Now Says 1.82 Million Affected in 2024 Hacking Incident
May 28, 2025 — Source or Source or Source
Russian IT pro sentenced to 14 years forced labor for sharing medical data with Ukraine
The latest in a long line of techies to face Putin's wrath
May 28, 2025 — Source
Security startup Horizon3.ai is raising $100M in new round
Horizon3.ai, a cybersecurity startup that provides tools like autonomous penetration testing, is seeking to raise $100 million in a new funding round and has locked down at least $73 million, the company revealed in an SEC filing this week.
May 28, 2025 — Source
Setting Up A PIN? Security Experts Warn To Avoid These 4-Digit Codes At All Costs
As tempting as it might be, avoid using 0000 as your four-digit PIN code. Same goes for 1010, 1111, 1122, and 1212, which comprises the top five worst PIN codes, according to a list compiled by security experts. Just like a password, you should avoid using PIN codes that are commonly used.
May 28, 2025 — Source
The Root of AI Hallucinations: Physics Theory Digs Into the 'Attention' Flaw
Physicist Neil Johnson explores how fundamental laws of nature could explain why AI sometimes fails—and what to do about it.
May 28, 2025 — Source
Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites
Mandiant warns that a Vietnamese hacking group tracked as UNC6032 is distributing malware via fake AI video generator websites.
May 28, 2025 — Source
Vulnerabilities in CISA KEV Are Not Equally Critical: Report
New report says organizations should always consider environmental context when assessing the impact of vulnerabilities in CISA KEV catalog.
May 28, 2025 — Source
Internet — Security Issues — May 27th, 2025
Adidas warns of data breach after customer service provider hack
German sportswear giant Adidas disclosed a data breach after attackers hacked a customer service provider and stole some customers' data.
May 27, 2025 — Source or Source
Almost half of enterprise apps don't handle credentials securely
A new report from Orchid Security shows nearly half of enterprise applications violate basic credential-handling guidance, with 44 percent undermining centralized identity provider (IdP) policies and 40 percent falling short of widely accepted identity-control standards.
May 27, 2025 — Source
Cancer Center Pays Patients $11.5M in Double-Extortion Hack
Some Patients Threatened Directly by Hackers; Center to Spend $13.5M on Security
May 27, 2025 — Source or Source or Source
Check Point Buys Startup Veriti to Advance Threat Management
Open Garden Strategy, Automated Risk Remediation to Get a Boost With Veriti Buy
May 27, 2025 — Source or Source or Source or Source
DragonForce ransomware abuses SimpleHelp in MSP supply chain attack
The DragonForce ransomware operation successfully breached a managed service provider and used its SimpleHelp remote monitoring and management (RMM) platform to steal data and deploy encryptors on downstream customers' systems.
May 27, 2025 — Source or Source
Dutch intelligence agencies say Russian hackers stole police data in cyberattack
A previously unknown Russian hacker group with suspected ties to the Kremlin was responsible for a cyberattack last year on the Dutch police and has also targeted other Western nations that deliver military support to Ukraine, intelligence agencies announced Tuesday.
May 27, 2025 — Source or Source
Fake AI Tools Lure Users in Year-Long Malware Campaign
Mandiant Says Malware Spread Through Fake AI Video Ads Seen by Millions
May 27, 2025 — Source
FrodoKEM: A conservative quantum-safe cryptographic algorithm
In this post, we describe FrodoKEM, a key encapsulation protocol that offers a simple design and provides strong security guarantees even in a future with powerful quantum computers.
May 27, 2025 — Source
How Threat Modeling, Actor Attribution Grow Cyber Defenses
As cyber threats continue to grow and evolve, U.S. State, Local, Tribal, and Territorial (SLTT) government organizations must implement proactive steps to secure systems, data, and infrastructure before cyber threat actors (CTAs) strike. Two important components of proactive defense are threat modeling and threat actor attribution. Understanding an organization's attack surface and anticipating how CTAs will exploit vulnerabilities or conduct cyber attacks can help organizations align their security practices with real-world attack scenarios.
May 27, 2025 — Source
Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack
Sina Gholinejad pleaded guilty to computer-fraud and wire-fraud-conspiracy charges linked to the Robbinhood ransomware hit on Baltimore.
May 27, 2025 — Source
Iranian pleads guilty to RobbinHood ransomware attacks, faces 30 years
An Iranian national has pleaded guilty to participating in the Robbinhood ransomware operation, which was used to breach the networks, steal data, and encrypt devices of U.S. cities and organizations in an attempt to extort millions of dollars over a five-year span.
May 27, 2025 — Source
Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next
As cloud security spending surges to $111 billion, new data highlights Microsoft's dominance, the U.S. market's outsized role, and Google's strategic acquisition of Wiz.
May 27, 2025 — Source
Kettering Health says radiation oncology is back online after ransomware attack
Less than a week after a cyberattack caused the Ohio-based health system to shut down some of its care offerings, cancer patients again have access to radiotherapy treatments.
May 27, 2025 — Source
'Kisses from Prague': The fall of a Russian ransomware giant
The sudden fall of a ransomware supplier once described as the world's most harmful cybercrime group has raised questions about Moscow's role in its development and the fate of its founder.
May 27, 2025 — Source
Law Firms Warned of Silent Ransom Group Attacks
The FBI warns US law firms that the Silent Ransom Group (SRG) has been constantly targeting the legal industry.
May 27, 2025 — Source
MATLAB dev confirms ransomware attack behind service outage
MathWorks, a leading developer of mathematical computing and simulation software, has revealed that a recent ransomware attack is behind an ongoing service outage.
May 27, 2025 — Source
Meta Begins AI Training Using EU Personal Data
German Court Rebuffs Consumer Group Bid for Injunction
May 27, 2025 — Source
Microsoft releases Defender update to improve the security of your Windows installation images
Having Windows installation images is handy; they can be used to reinstall your operating system, but they are also useful when creating virtual machines. Microsoft is concerned about their safety, however.
May 27, 2025 — Source
Microsoft, Dutch security agencies lift veil on Laundry Bear cyber espionage group
The Dutch intelligence and security services have identified a new Russia-affiliated threat group that has been breaching government organizations and commercial entities in Europe and North America, and they dubbed it Laundry Bear.
May 27, 2025 — Source
New MCP server from groundcover redefines LLM observability
A new MCP server, faster than any other on the market, is launching today from groundcover, the eBPF-driven observability platform. Developers can now enhance their AI-driven workflows with deep system context, powered by groundcover's granular access to logs, metrics, and traces via eBPF.
May 27, 2025 — Source
Ongoing Campaign Uses 60 NPM Packages to Steal Data
Security firm Socket warns flags a campaign targeting NPM users with tens of malicious packages that can hijack system information.
May 27, 2025 — Source
Patched GitLab Duo Flaws Risked Code Leak, Malicious Content
Prompt Injection, HTML Output Rendering Could Be Used for Exploit
May 27, 2025 — Source
Record-breaking performance in data security achieved with quantum mechanics
A joint team of researchers led by scientists at King Abdullah University of Science and Technology (KAUST) and King Abdulaziz City for Science and Technology (KACST) has reported the fastest quantum random number generator (QRNG) to date based on international benchmarks. The QRNG, which passed the required randomness tests of the National Institute of Standards and Technology, could produce random numbers at a rate nearly a thousand times faster than other QRNG.
May 27, 2025 — Source
RobbinHood Ransomware Hacker Pleads Guilty in US Court
A RobbinHood Attack Against Baltimore Cost City $19 Million
May 27, 2025 — Source or Source or Source or Source
Russian Government Hackers Caught Buying Passwords from Cybercriminals
Microsoft flags a new Kremlin hacking team buying stolen usernames and passwords from infostealer markets for use in cyberespionage attacks.
May 27, 2025 — Source
Russian Laundry Bear cyberspies linked to Dutch Police hack
A previously unknown Russian-backed cyberespionage group tracked as Laundry Bear has been linked to a September 2024 Dutch police security breach.
May 27, 2025 — Source
Salt Typhoon Believed to Be Behind Commvault Data Breach
CISA Advisory Says Threat Actors Stole App Secrets in Azure-Hosted Backup Platform
May 27, 2025 — Source or Source or Source or Source
Secure encryption and decryption with luminescent perovskites
To guarantee high data security, encryption must be unbreakable while the data remains rapidly and easily readable. A novel strategy for optical encryption/decryption of information has now been introduced in the journal Angewandte Chemie by a Chinese research team. It is based on compounds with carefully modulated luminescent properties that change in response to external stimuli.
May 27, 2025 — Source
Summer Is Almost Here. Here's How to Check for Skin Cancer Signs
Who doesn't love spending more time in the summer sun? However, it's important to protect your skin and check for signs of skin cancer.
May 27, 2025 — Source
The Seven Pillars of a Secure AI Strategy
Framework for Moving From Scattered Tools to Unified AI Security Strategies
May 27, 2025 — Source or Source or Source
Wilms tumors: How genes and imprinting pave the way for cancer
A research team at the University of Würzburg has gained new insights into the development of kidney tumors in young children. These enable a better risk assessment and could form the basis for targeted screening and improved early detection.
May 27, 2025 — Source
Zscaler to Acquire MDR Specialist Red Canary
Zscaler signals a big push into the security-operations market with the announcement of plans to buy Denver-based Red Canary.
May 27, 2025 — Source
Internet — Security Issues — May 23rd, 2025
3AM Ransomware Gang Hacks Networks With Spoofed IT Calls And Email Bombing
A recent campaign by 3AM ransomware actors found the team using more proactive techniques rather than simple opportunistic hacks by pretending to be IT support. Using a combination of email bombing and spoof IT support calls, unwitting employees dropped their guards, giving the attackers access to their terminals (and thus, corporate systems). From there, the actors were free to deploy whatever nefarious payload they desired.
May 23, 2025 — Source
Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
CVE-2025-4427 and CVE-2025-4428 -- the two Ivanti Endpoint Manager Mobile (EPMM) vulnerabilities that have been exploited in the wild as zero-days and patched by Ivanti last week -- are being leveraged by a Chinese cyber espionage group that has been exploiting zero-days in edge network appliances since at least 2023, EcleticIQ researchers have shared.
May 23, 2025 — Source
Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors
A Chinese espionage group has been chaining two recent Ivanti EPMM vulnerabilities in attacks against organizations in multiple critical sectors.
May 23, 2025 — Source
Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks
A Chinese threat actor exploited a zero-day vulnerability in Trimble Cityworks to hack local government entities in the US.
May 23, 2025 — Source
Cognyte Adds GroupSense in $4M Threat Intelligence Deal
Buyout Targets Deeper US Penetration, Digital Risk Intel, Ransomware Defense
May 23, 2025 — Source or Source or Source or Source or Source
Companies Warned of Commvault Vulnerability Exploitation
CISA warns companies of a widespread campaign targeting a Commvault vulnerability to hack Azure environments.
May 23, 2025 — Source
DanaBot Botnet Disrupted, 16 Suspects Charged
The DanaBot botnet ensnared over 300,000 devices and caused more than $50 million in damages before being disrupted
May 23, 2025 — Source or Source
Disaster or digital spectacle? The dangers of using floods to create social media content
Amid the chaos, videos posted on social media show people deliberately entering or standing above swollen rivers and flooded roads. It is a pattern of dangerous behavior that occurs frequently during natural disasters in Australia.
May 23, 2025 — Source
Dozens of malicious packages on NPM collect host and network data
60 packages have been discovered in the NPM index that attempt to collect sensitive host and network data and send it to a Discord webhook controlled by the threat actor.
May 23, 2025 — Source
Editors' Panel: CrowdStrike Legal Storm Signals Bigger Risks
Also: Privacy on the Line in 23andMe Sale; Google Leads Cyber Aid Charge
May 23, 2025 — Source or Source or Source or Source or Source
FBI warns of Luna Moth extortion attacks targeting law firms
The FBI warned that an extortion gang known as the Silent Ransom Group has been targeting U.S. law firms over the last two years in callback phishing and social engineering attacks.
May 23, 2025 — Source
Feds charge 16 Russians allegedly tied to botnets used in cyberattacks and spying
An example of how a single malware operation can enable both criminal and state-sponsored hacking.
May 23, 2025 — Source
Hacker steals $223 million in Cetus Protocol cryptocurrency heist
The decentralized exchange Cetus Protocol announced that hackers have stolen $223 million in cryptocurrency and is offering a deal to stop all legal action if the funds are returned.
May 23, 2025 — Source
In Other News: Volkswagen App Hacked, DR32 Sentenced, New OT Security Solution
Noteworthy stories that might have slipped under the radar: serious vulnerabilities found in a Volkswagen app, Australian hacker DR32 sentenced in the US, and Immersive launches OT security training solution.
May 23, 2025 — Source
Malware-as-a-Service (MaaS) Hits 390K+ PCs in 3 Months as Microsoft Fights Back
Lumma Stealer is software made to secretly steal personal and organizational information from computers.
May 23, 2025 — Source
Massive data breach exposes 184 million passwords for Google, Microsoft, Facebook, and more
The file was unencrypted. No password protection. No security. Just a plain text file with millions of sensitive pieces of data.
May 23, 2025 — Source
NC Pathology Practice Notifying 236,000 of Data Theft Hack
Did Marlboro-Chesterfield Pathology Pay Cybercrime Gang Safepay a Ransom?
May 23, 2025 — Source or Source or Source or Source or Source
NordVPN Review 2025: Fast, Private and Excellent for Streaming
Whether you just want to stream Netflix or have serious privacy needs, NordVPN is a fast, user-friendly and full-featured virtual private network.
May 23, 2025 — Source
On Demand: Threat Detection & Incident Response (TDIR) Summit
SecurityWeek's 2025 Threat Detection & Incident Response (TDIR) Summit took place as a virtual summit on May 21st.
May 23, 2025 — Source
Oversharing online? 5 ways it makes you an easy target for cybercriminals
Here's why scammers and other malicious actors love when you share details about your life on social media.
May 23, 2025 — Source
Police Tout Darknet Global Takedown 'Operation RapTor'
Global Collaboration Leads to Drug, Firearm Bust
May 23, 2025 — Source
Preventing cybersecurity stagnation through breach containment
In cybersecurity, this saying has never been more fitting. We've seen years of increased investment, a figure Gartner estimates will reach $212 billion this year, yet the cost of breaches continues to rise, reaching $4.8 million in 2024. That's 10 percent higher than 2023, according to IBM.
May 23, 2025 — Source
Proactive Security in Distributed Systems: A Developer's Approach
Distributed systems require early security focus to avoid reworks. This article explores trends and developer defense approaches.
May 23, 2025 — Source
Proof of Concept: Rethinking Identity for the Age of AI Agents
Identity Experts Adam Preis and Troy Leach
May 23, 2025 — Source or Source or Source or Source or Source
Ransomware scum leaked Nova Scotia Power customers' info
Bank accounts, personal details all hoovered up in the attack
May 23, 2025 — Source
Russian Qakbot Gang Leader Indicted in US
Russian national Rustam Gallyamov was indicted in the US for his leading role in the development and distribution of Qakbot malware.
May 23, 2025 — Source
Signal Adds Screenshot-Blocker to Thwart 'Windows Recall'
Signal said the privacy feature is on by default for every Windows 11 user to block Microsoft from taking screenshots for Windows Recall.
May 23, 2025 — Source
TikTok videos + ClickFix tactic = Malware infection
Malware peddlers are using TikTok videos and the ClickFix tactic to trick users into installing infostealer malware on their computers, Trend Micro researchers have warned.
May 23, 2025 — Source
TikTok's DIY Malware Trend Is Peak Internet Stupidity
TikTok is known for viral dances and quirky challenges, but now it might be known for spreading malware. According to recent reports, some TikTok videos are being used to distribute information-stealing malware, through tactic called "ClickFix".
May 23, 2025 — Source
Token Security unveils MCP Server for non-human identity security
Token Security launched Model Context Protocol (MCP) Server for non-human identity (NHI).
May 23, 2025 — Source
UK Legal Aid Agency Hack Imperils Representation
British law firms representing low-income criminal defendants and civil litigants are having to work for free for weeks or decline new cases as the fallout of a cyberattack against the U.K. Legal Aid Agency forced the agency to yank its online portal offline.
May 23, 2025 — Source
Internet — Security Issues — May 22nd, 2025
7 warning signs your computer was hacked — and what to do
If something doesn't seem right, it's time to run some scans.
May 22, 2025 — Source
A huge unsecured credential database discovery is a great reminder to change your passwords
It may not have literally exposed 184 million people, but it's still a threat.
May 22, 2025 — Source
Akamai, Microsoft Disagree on Severity of Unpatched 'BadSuccessor' Flaw
Akamai documents a privilege escalation flaw in Windows Server 2025 after Redmond declines to ship an immediate patch.
May 22, 2025 — Source
Analyzing Techniques to Provision Access via IDAM Models During Emergency and Disaster Response
Exploring and analyzing the scope, benefits, and use cases of different access control models during emergency and disaster response.
May 22, 2025 — Source
Apple logins with plain text passwords found in massive database of 184M records
Apple login credentials were among a massive database of 184 million records found sitting unprotected on a web server. Other logins included Facebook, Google, Instagram, Microsoft, and PayPal.
May 22, 2025 — Source
Authorities carry out global takedown of infostealer used by cybercriminals
Authorities, along with tech companies including Microsoft and Cloudflare, say they've disrupted Lumma.
May 22, 2025 — Source
BadSuccessor: Abusing dMSA to elevate privileges in Active Directory
Delegated Managed Service Accounts (dMSAs) have been introduced in Windows Server 2025. These are service accounts for the Active Directory (AD) that are intended to enable new functions. Security researchers have now discovered that by misusing dMSAs, attackers can take over any principal in the domain.
May 22, 2025 — Source
Breach Roundup: US Indicts Qakbot Malware Leader
Also: Signal Blocks Recall, Europe Sanctions Stark Industries
May 22, 2025 — Source or Source or Source or Source
Bribery-Led Coinbase Hack Affects 70,000 Crypto Customers
Hacker Demanded $20M Ransom to Delete Stolen Personal, Financial Information
May 22, 2025 — Source or Source
Chinese snoops tried to break into US city utilities, says Talos
Intrusions began weeks before Trimble patched the Cityworks hole
May 22, 2025 — Source or Source
Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities
Cisco published 10 security advisories detailing over a dozen vulnerabilities, including two high-severity flaws in its Identity Services Engine (ISE) and Unified Intelligence Center.
May 22, 2025 — Source
Coinbase Reveals Over 69,000 People Had Their Data Exposed in a Breach. Take These Steps Now
Coinbase refused to pay the $20M ransom for data that included names, emails and partial Social Security numbers. However, the company will cover any losses incurred.
May 22, 2025 — Source
Credit Washing and Synthetic ID Fraud Hit All-Time High
Auto Lending Sector Is Hardest Hit by Scammers Using Synthetic Identities
May 22, 2025 — Source
Cryptohack Roundup: 12 Charged in $263M Theft Case
Also: Charges in Unicoin Case, Jury Convicts SafeMoon Ex-CEO
May 22, 2025 — Source or Source or Source or Source or Source
DDoS and IP transit: Why integration is the smart choice for modern connectivity
As Distributed Denial of Service (DDoS) attacks grow in both frequency and sophistication, organizations are being forced to re-evaluate their defensive strategies. Gone are the days when a standalone DDoS mitigation service tacked onto your infrastructure was enough for peace of mind.
May 22, 2025 — Source
Destructive malware available in NPM repo went unnoticed for 2 years
Payloads were set to spontaneously detonate on specific dates with no warning.
May 22, 2025 — Source
FTC finalizes order requiring GoDaddy to secure hosting services
The U.S. Federal Trade Commission (FTC) has finalized an order requiring web hosting giant GoDaddy to secure its services to settle charges of data security failures that led to several data breaches since 2018.
May 22, 2025 — Source
German Cyber Agency Sounds Warning on Grid Vulnerabilities
BSI Cites New Technologies, Geopolitical Tensions as Key Risk Factors
May 22, 2025 — Source or Source or Source or Source or Source
Hackers use fake Ledger apps to steal Mac users' seed phrases
Cybercriminal campaigns are using fake Ledger apps to target macOS users and their digital assets by deploying malware that attempts to steal seed phrases that protect access to digital cryptocurrency wallets.
May 22, 2025 — Source
How to safeguard your small business in the hybrid work era: 5 top cybersecurity solutions
Your best cybersecurity strategy is all about balancing risk and affordability. Keep these five solutions in mind.
May 22, 2025 — Source
How a global malware operation was taken down from a federal court in Georgia
The messages seemed innocuous, mundane even. Someone posing as a prospective guest emailed a hotel questions about a purported comment left on Booking.com. Another message was supposedly from that third-party booking site to review negative guest feedback.
May 22, 2025 — Source
Marks & Spencer Expects Ransomware Attack to Cost $400 Million
UK retailer Marks & Spencer expects the disruptions caused by the recent cyberattack to continue through July.
May 22, 2025 — Source
Marlboro-Chesterfield Pathology Data Breach Impacts 235,000 People
Marlboro-Chesterfield Pathology has been targeted by the SafePay ransomware group, which stole personal information from its systems.
May 22, 2025 — Source
Scammers Troll DNS Records for Abandoned Cloud Accounts
'Hazy Hawk' Behind a Rash of Domain Hijackings
May 22, 2025 — Source or Source
Shields Health to Pay $15.35M to Settle Lawsuit in 2022 Hack
Medical Imaging Provider's Data Theft Incident Affected Nearly 2.4M Individuals
May 22, 2025 — Source or Source or Source
StackHawk raises $12 million to help security teams tackle AI-powered dev cycles
StackHawk, the shift-left API security platform, announced it has taken on $12 million in additional funding from Sapphire and Costanoa Ventures to help security teams keep up with the pace of AI-driven development.
May 22, 2025 — Source
Unpatched Windows Server vulnerability allows full domain compromise
A privilege escalation vulnerability in Windows Server 2025 can be used by attackers to compromise any user in Active Directory (AD), including Domain Admins.
May 22, 2025 — Source
Unsecured Database Exposes 184 Million Login Credentials, Including From Multiple Governments
It's been found that hundreds of credentials from Facebook, Google, Instagram, Roblox, Discord, Microsoft, Netflix, PayPal, and other major platforms have been compromised.
May 22, 2025 — Source
What the AI Boom Reveals About Cybersecurity Careers
Cyber Education Needs to Go Beyond the Checklist to Prepare Future Professionals
May 22, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — May 13th, 2025
Adobe Patches Big Batch of Critical-Severity Software Flaws
Adobe Patch Tuesday headlined by a major Adobe ColdFusion update patching a wide swatch of code execution and privilege escalation attacks.
May 13, 2025 — Source
AI agents can be manipulated into giving away your crypto, according to Princeton researchers
The attackers plant false memories to override security defenses.
May 13, 2025 — Source
AI Drives Smarter Zero-Trust Rollouts
Two Experts Discuss Pros and Cons of Using AI in a Zero-Trust Framework
May 13, 2025 — Source or Source or Source or Source or Source
Ascension: Software Exploit Breach Affects Nearly 440,000
Former Business Partner's Third-Party Software at Center of Hospital Chain's Incident
May 13, 2025 — Source or Source or Source or Source
Best VPN services: 8 top picks for every VPN need
There are a lot of VPN options out there; we'll help you cut through the clutter.
May 13, 2025 — Source
CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor
An information exposure flaw in TeleMessage has been added to CISA's Known Exploited Vulnerabilities catalog.
May 13, 2025 — Source
Commvault fixes critical Command Center issue after flaw finder alert
Pay-to-play security on CVSS 10 issue is now fixed
May 13, 2025 — Source
Customer data stolen in Marks & Spencer cyberattack
British retailer Marks & Spencer said on Tuesday that some personal data of its customers was stolen in a cyberattack that has crippled its online services for weeks.
May 13, 2025 — Source
Customers shocked as VPN firm axes lifetime subscriptions, says it had no idea they existed
For years, customers looking for a one-time purchase for lasting online security saw "lifetime" deals for VPN services pop up on various tech platforms, often promoted through deal partners. This included widespread offers for a VPNSecure subscription, presented at the time as a reliable service with features like "no logging, ever!" and strong encryption.
May 13, 2025 — Source
Cyberhaven Taps Product Chief Nishant Doshi as Interim CEO
CEO Howard Ting's Resignation Comes as Data Protection Company Hits $1B Valuation
May 13, 2025 — Source or Source or Source or Source or Source
How we think about protecting data: Game-based study reveals how context shapes decisions
How should personal data be protected? What are the best uses of it? In our networked world, questions about data privacy are ubiquitous and matter for companies, policymakers, and the public.
May 13, 2025 — Source
Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)
Attackers have exploited vulnerabilities in open-source libraries to compromise on-prem Ivanti Endpoint Manager Mobile (EPMM) instances of a "very limited" number of customers, Ivanti has confirmed on Tuesday, and urged customers to install a patch as soon as possible.
May 13, 2025 — Source or Source or Source
Keyfactor Bolsters Quantum Readiness With Dual Acquisitions
Real-Time, Deep Cryptographic Discovery Added to Certificate Automation Portfolio
May 13, 2025 — Source or Source or Source or Source
Kosovar Man in Tampa Jail for Running Online Illicit Bazaar
Prosecutors Say Liridon Masurica Ran BlackDB.cc
May 13, 2025 — Source or Source or Source or Source or Source
Lenovo introduces ThinkShield Solutions to secure organizations with limited IT resources
Lenovo introduced ThinkShield Solutions, security offerings tailored to protect small and medium sized business (SMBs), schools, and other organizations with limited IT resources facing significant risks.
May 13, 2025 — Source
Orca Snaps Up Opus in Cloud Security Automation Push
Orca positioned the deal as an expansion of its capabilities into the realm of AI-based autonomous remediation and prevention.
May 13, 2025 — Source
Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying
A Turkey-affiliated espionage group has exploited a zero-day vulnerability in Output Messenger since April 2024.
May 13, 2025 — Source
Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
On May 2025 Patch Tuesday, Microsoft has released security fixes for 70+ vulnerabilities, among them five actively exploited zero-days and two publicly disclosed (but not exploited) vulnerabilities.
May 13, 2025 — Source
Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023
The Radware Cloud WAF product vulnerabilities disclosed by CERT/CC were addressed two years ago.
May 13, 2025 — Source
Ransomware attacks up over 120 percent in two years
Between April 2024 and March 2025, ransomware attacks escalated with unpredictable campaigns across a wide range of industries. The number of publicly disclosed victims also saw a 24 percent increase from the previous year.
May 13, 2025 — Source
SAP Patches Another Exploited NetWeaver Vulnerability
SAP has released 16 new security notes on its May 2025 Security Patch Day, including a note dealing with another critical NetWeaver vulnerability exploited in attacks.
May 13, 2025 — Source or Source
Security awareness training programs fall short of business needs
Although 99 percent of organizations responding to a new survey suffered a security incident tied to human error in the past year, the majority state that they struggle to implement effective, scalable security awareness training (SAT) programs that reduce this risk.
May 13, 2025 — Source
Security flaw found in GIMP! Avoid opening this file type until it's fixed
A security vulnerability involving one image file type can allow malicious code to be executed on your system.
May 13, 2025 — Source
Seven things we learned from WhatsApp versus NSO Group spyware lawsuit
On Tuesday, WhatsApp scored a major victory against NSO Group when a jury ordered the infamous spyware maker to pay more than $167 million in damages to the Meta-owned company.
May 13, 2025 — Source
Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments
CTI, digital brand protection and other cyber risk initiatives shouldn't only be utilized by security and cyber teams.
May 13, 2025 — Source
Suspected DoppelPaymer Ransomware Group Member Arrested
A 45-year-old individual was arrested in Moldova for his suspected involvement in DoppelPaymer ransomware attacks.
May 13, 2025 — Source
Tracking Bugs: European Vulnerability Database Goes Live
EU Cybersecurity Agency-Run EUVD Tracks Mitigation Measures, Exploitation Status
May 13, 2025 — Source or Source or Source or Source or Source
Trump Ousts Copyright Chief Amid AI Fair Use Clash
Perlmutter Out After Draft Report Calls Fair Use Into Question for AI Training
May 13, 2025 — Source or Source or Source or Source or Source
Tufin TOS Discovery automates device discovery and onboarding
Tufin launched Tufin Orchestration Suite (TOS) Discovery, a new solution that helps security teams ensure their network topology is always accurate and up-to-date.
May 13, 2025 — Source
Turkish Group Hacks Zero-Day Flaw to Spy on Kurdish Forces
Microsoft Researchers Link Turkish Spy Group to Output Messenger Zero-Day Hack
May 13, 2025 — Source or Source or Source or Source or Source
Twilio denies breach following leak of alleged Steam 2FA codes
Twilio has denied in a statement for BleepingComputer that it was breached after a threat actor claimed to be holding over 89 million Steam user records with one-time access codes.
May 13, 2025 — Source
VPN company cancels 'lifetime' plans for customers who already paid for the service
A perfect encapsulation of the danger of so-called "lifetime deals."
May 13, 2025 — Source or Source
Welcome to the age of paranoia as deepfakes and scams abound
AI-driven fraud is leading people to verify every online interaction they have.
May 13, 2025 — Source
Why conventional disaster recovery won't save you from ransomware
The conventional formula for maintaining business continuity in the face of unexpected IT disruptions is as follows: Back up your data. Make a recovery plan. Test the recovery plan periodically.
May 13, 2025 — Source
Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday
Patch Tuesday: Microsoft patches at least 70 security bugs and flagged five zero-days in the "exploitation detected" category.
May 13, 2025 — Source
Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)
Fortinet has patched a critical vulnerability (CVE-2025-32756) that has been exploited in the wild to compromise FortiVoice phone / conferencing systems, the company's product security incident response team has revealed on Tuesday.
May 13, 2025 — Source
Internet — Security Issues — May 9th, 2025
160,000 Impacted by Valsoft Data Breach
VMS firm Valsoft Corporation says the personal information of over 160,000 people was compromised in a February 2025 data breach.
May 9, 2025 — Source
A DOGE Engineer Was Hacked and His Login Details Are Online
Not just once either. His details have been freely available online for years.
May 9, 2025 — Source
Ascension says recent data breach affects over 430,000 patients
Ascension, one of the largest private healthcare systems in the United States, has revealed that the personal and healthcare information of over 430,000 patients was exposed in a data breach disclosed last month.
May 9, 2025 — Source
AWS Pushes AI-Powered Threat Detection With Key Partners
Partners Use Bedrock, SageMaker for Threat Detection, Response, Vital to Innovation
May 9, 2025 — Source or Source or Source or Source or Source
Chinese hackers behind attacks targeting SAP NetWeaver servers
Forescout Vedere Labs security researchers have linked ongoing attacks targeting a maximum severity vulnerability impacting SAP NetWeaver instances to a Chinese threat actor.
May 9, 2025 — Source
CIS Benchmarks May 2025 Update
The following CIS Benchmarks® and CIS Build Kits have been updated or recently released. We've highlighted the major updates below. Each Benchmark and Build Kit includes a full changelog that references all changes.
May 9, 2025 — Source
Company and Personal Data Compromised in Recent Insight Partners Hack
VC firm Insight Partners is informing partners and employees that their information was exposed in the January 2025 cyberattack.
May 9, 2025 — Source
Cybersecurity readiness stays low as AI attacks increase
Only four percent of organizations worldwide have achieved the 'mature' level of readiness required to effectively withstand today's cybersecurity threats, even as hyperconnectivity and AI introduce new complexities for security practitioners.
May 9, 2025 — Source
CyberUK 2025: Resilience and APT Threats Loom Large
Government Officials Sound 'Wake Up' Alarms
May 9, 2025 — Source or Source or Source or Source
Does Antivirus Software Collect Your Data? Yes, But Here's Why You Shouldn't Worry
Are antivirus software applications spying on you? Here's what the researchers have to say about potential security concerns.
May 9, 2025 — Source
Fake AI platforms deliver malware diguised as video content
A clever malware campaign delivering the novel Noodlophile malware is targeting creators and small businesses looking to enhance their productivity with AI tools.
May 9, 2025 — Source
FBI and Dutch police seize and shut down botnet of hacked routers
A joint international law enforcement action shut down two services accused of providing a botnet of hacked internet-connected devices, including routers, to cybercriminals. U.S. prosecutors also indicted four people accused of hacking into the devices and running the botnet.
May 9, 2025 — Source
Feds Seize Domains in Global Proxy Botnet Crackdown
Russian, Kazakh Hackers Charged in $46 Million Proxy Botnet Scheme
May 9, 2025 — Source or Source or Source or Source or Source
Germany takes down eXch cryptocurrency exchange, seizes servers
The Federal police in Germany (BKA) seized the server infrastructure and shut down the 'eXch' cryptocurrency exchange platform for alleged money laundering cybercrime proceeds.
May 9, 2025 — Source
Google just gave Chrome and Android a secret weapon against online scams
Scammers are using AI to trick you, but Google is using AI to stop them first.
May 9, 2025 — Source
Google Password Manager for Android Will Automatically Upgrade Your Passwords to Passkeys
It's not crazy: According to Microsoft, 98% of passkey login attempts are successful, compared with only 32% for passwords.
May 9, 2025 — Source
Immutable Secrets Management: A Zero-Trust Approach to Sensitive Data in Containers
Immutable secrets and Zero-Trust on Amazon Web Services boost container security, delivery, and resilience, aligning with ChaosSecOps for DevOps awards.
May 9, 2025 — Source
In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak
Noteworthy stories that might have slipped under the radar: surge in cyberattacks between India and Pakistan, Radware cloud WAF vulnerabilities, xAI key leak.
May 9, 2025 — Source
India Tells Financial Sector to Strengthen Cyber Defenses
Old Visuals, AI Deepfakes and Fake Claims Go Viral Amid Escalating Conflict
May 9, 2025 — Source or Source or Source or Source
ISMG Editors: CISA Cuts and US Cyber Plan Raise Alarms
Also: Cyber IPOs and the Investment Climate, the Urgency of AI Explainability
May 9, 2025 — Source or Source or Source or Source or Source
Leaked document reveals more about Eufy's first smart display
Here's what to expect from the 8-inch tablet-like touchscreen device, which has a battery for added portability.
May 9, 2025 — Source
LockBit hacked: What does the leaked data show?
The affiliate panel of the infamous LockBit Ransomware-as-a-Service (RaaS) group has been hacked and defaced, showing a link to a MySQL database dump ostensibly containing leaked data relating to the group's operations:
May 9, 2025 — Source or Source
Malicious NPM Packages Target Cursor AI's macOS Users
Three NPM packages posing as developer tools for Cursor AI code editor's macOS version contain a backdoor.
May 9, 2025 — Source
Mature But Vulnerable: Pharmaceutical Sector's Cyber Reality
Joshua Mullen of Booz Allen Hamilton on Industry's Top Cyber Challenges
May 9, 2025 — Source or Source or Source or Source or Source
Mistral AI Models Fail Key Safety Tests, Report Finds
Pixtral Models 60 Times More Likely to Generate Harmful Content Than Rivals
May 9, 2025 — Source or Source or Source or Source or Source
Mobile security matters: Protecting your phone from text scams
It all starts so innocently. You get a text saying "Your package couldn't be delivered. Click here to reschedule." Little do you know, clicking that link could open the door for scammers to steal your identity, empty your bank account, or even plant malicious software (malware) on your device. Unless you know what to look out for, one little tap on the wrong text could cost you money and peace of mind.
May 9, 2025 — Source
New KnowBe4 CEO Bryan Palma Combats Human Risk Via AI Agents
Strategic Plan Includes Human Risk Management Platform Expansion, IPO Preparation
May 9, 2025 — Source or Source or Source or Source or Source
Police dismantles botnet selling hacked routers as residential proxies
Law enforcement authorities have dismantled a botnet that infected thousands of routers over the last 20 years to build two networks of residential proxies known as Anyproxy and 5socks.
May 9, 2025 — Source
Popular Scraping Tool's NPM Package Compromised in Supply Chain Attack
Supply chain attack compromises the popular rand-user-agent NPM package to deploy and activate a backdoor.
May 9, 2025 — Source
Rising Tides: Kelley Misata on Bringing Cybersecurity to Nonprofits
Sightline Security's founder explains why nonprofits need cybersecurity solutions tailored to their unique missions — and why vendors need to listen.
May 9, 2025 — Source
SAP Zero-Day Targeted Since January, Many Sectors Impacted
Hundreds of SAP NetWeaver instances hacked via a zero-day that allows remote code execution, not only arbitrary file uploads, as initially believed.
May 9, 2025 — Source
Significant Gap Exists in UK Cyber Resilience Efforts
Threat Outpaces Government's Ability to Keep Pace, Says Parliamentary Committee
May 9, 2025 — Source
The best no-log VPNs of 2025: These VPNs provide security, safety, and collect minimal user data
Trust is fragile, especially when it comes to security software. I've tested the best no-log VPNs, which claim not to keep records of their customers' online activities to protect their privacy.
May 9, 2025 — Source
The Geek Squad scam is back. Here's what you need to know.
No, that Geek Squad bill that you received in your email isn't real. It's a scam.
May 9, 2025 — Source
VicOne xAurient accelerates threat response for automakers
VicOne announced xAurient, a new automotive threat intelligence platform that enables streamlined threat response by delivering early threat intelligence tailored to the particular manufacturing environment of an original equipment manufacturer (OEM) or Tier 1 supplier.
May 9, 2025 — Source
What your browser knows about you, from contacts to card numbers
Chrome and Safari are the most popular browser apps, accounting for 90% of the mobile browsers market share, according to Surfshark. They also collect the most data.
May 9, 2025 — Source
Your password manager is under attack: How to defend yourself against a new threat
Heard of polymorphic browser extensions yet? These savage impostors threaten the very future of credential management. Here's what you need to know - and do.
May 9, 2025 — Source
Internet — Security Issues — May 6th, 2025
AI and Infrastructure Resilience Are Keys to US Security
Ex-Deputy NSA Anne Neuberger on Preparing for AI-Driven Threats
May 6, 2025 — Source or Source or Source or Source
Android Update Patches FreeType Vulnerability Exploited as Zero-Day
Android's May 2025 security update includes patches for an exploited vulnerability in the FreeType open source rendering engine.
May 6, 2025 — Source
Apache Parquet exploit tool detect servers vulnerable to critical flaw
A proof-of-concept exploit tool has been publicly released for a maximum severity Apache Parquet vulnerability, tracked as CVE-2025-30065, making it easy to find vulnerable servers.
May 6, 2025 — Source
App Used by Trump Adviser Suspends Services After Hack Taking '15-20 Minutes'
TeleMessage, a messaging app used by Trump adviser Mike Waltz, has suspended services after a hacker accessed sensitive government and corporate data.
May 6, 2025 — Source
Applying AI Agents in Cybersecurity With Trust, Transparency
Salesforce's Brad Arkin on How Agents Are Transforming Security Ops
May 6, 2025 — Source or Source or Source or Source or Source
Applying the OODA Loop to Solve the Shadow AI Problem
By taking immediate actions, organizations can ensure that shadow AI is prevented and used constructively where possible.
May 6, 2025 — Source
Bridging Cyber and Physical Threats
CISO Sean Atkinson on Proactive, Integrated Approach to Hybrid Threat Defense
May 6, 2025 — Source or Source or Source
Businesses Are Turning to This Because Hackers Don't Take Days Off
One code protects each employee's PC with antivirus, VPN, firewall, real-time threat detection, and more.
May 6, 2025 — Source
CISOs Transform Into Business-Critical Digital Risk Leaders
Google's Phil Venables on How AI Creates Structural Advantage in Security
May 6, 2025 — Source
Critical Vulnerability in AI Builder Langflow Under Attack
CISA warns organizations that threat actors are exploiting a critical-severity vulnerability in low-code AI builder Langflow.
May 6, 2025 — Source
Culture comes first in cybersecurity. That puts cybersecurity on the front line in the culture wars
'Trust us, we're from Trumpland' may not help Microsoft as much as it hopes
May 6, 2025 — Source
Cyber Resilience Demands Rethinking Risk, Identity, AI Trust
RSA CEO Rohit Ghai on Security Amid Evolving Threats, Tech Disruption
May 6, 2025 — Source or Source or Source or Source or Source
Don't get hacked! I open dubious PC files in a sandbox. You should too
Files and links that you receive could be infected with viruses. If you are ever unsure whether a file is harmless or whether a link leads to a safe website, check it in an online sandbox.
May 6, 2025 — Source
Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)
An easily and remotely exploitable vulnerability (CVE-2024-7399) affecting Samsung MagicINFO, a platform for managing content on Samsung commercial displays, is being leveraged by attackers.
May 6, 2025 — Source
E-ZPass and toll scam texts are everywhere. What to do if you're targeted.
Be careful with your messages.
May 6, 2025 — Source
Hacker Conversations: John Kindervag, a Making not Breaking Hacker
John Kindervag is best known for developing the Zero Trust Model. He is a hacker, but not within our common definition of a hacker today.
May 6, 2025 — Source
Human Ingenuity Still Crucial in Cybersecurity Defense
HackerOne CEO Warns AI Can't Replace Creativity, Intuition in Cyber Defense Efforts
May 6, 2025 — Source or Source or Source or Source or Source
Immersive delivers a team-based approach to application security training
Immersive launched AppSec Range Exercises, expanding its AppSec solution beyond hands-on labs to help cyber leaders and practitioners prove and improve their capabilities as part of a holistic cyber readiness program.
May 6, 2025 — Source
Kelly Benefits Hack Victim Count Jumps Significantly, Again
Breach Tally Keeps Growing Since Firm Filed Initial Breach Reports Last Month
May 6, 2025 — Source or Source or Source or Source
Microsoft Warns of Attackers Exploiting Misconfigured Apache Pinot Installations
Misconfigured Apache Pinot instances can and have enabled threat actors to gain access to sensitive information.
May 6, 2025 — Source
Minimus Launches With $51M to Tackle Application Protection
Startup Says It Cuts Software Vulnerability Volume, Helps Developers Avoid Overload
May 6, 2025 — Source
Mozilla VPN Review (2025): Features, Pricing, and Security
Mozilla is most famous for its web browser, Mozilla Firefox. So, when the brand launched Mozilla VPN in 2020, expectations were high.
May 6, 2025 — Source
NSO Group must pay more than $167 million in damages to WhatsApp for spyware campaign
Spyware maker NSO Group will have to pay more than $167 million in damages to WhatsApp for a 2019 hacking campaign against more than 1,400 users.
May 6, 2025 — Source
RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248)
A missing authentication vulnerability (CVE-2025-3248) in Langflow, a web application for building AI-driven agents, is being exploited by attackers in the wild, CISA has confirmed by adding it to its Known Exploited Vulnerabilities (KEV) catalog
May 6, 2025 — Source
Retail Sector in Scattered Spider Crosshairs
Don't Fall for Easy Social Engineering Traps, Advises Mandiant
May 6, 2025 — Source or Source or Source or Source
RSA helps organizations secure passwordless environments
RSA announced cybersecurity innovations that defend organizations against the next wave of AI powered identity attacks, including IT Help Desk bypasses, malware, social engineering, and other threats.
May 6, 2025 — Source
Samsung MagicINFO 9 Server RCE flaw now exploited in attacks
Hackers are exploiting an unauthenticated remote code execution (RCE) vulnerability in the Samsung MagicINFO 9 Server to hijack devices and deploy malware.
May 6, 2025 — Source or Source
Second Wave of Attacks Hitting SAP NetWeaver After Zero-Day Compromise
Threat actors are revisiting SAP NetWeaver instances to leverage webshells deployed via a recent zero-day vulnerability.
May 6, 2025 — Source
Supply-chain attack lies dormant for six years before striking hundreds of e-commerce sites
Cybercriminals waited years before activating massive e-commerce backdoor in Magento software
May 6, 2025 — Source
TeleMessage Goes Dark After Trump Adviser Photo Fallout
Hacker Breaches Government-Approved Messaging App Used by Top Trump Officials
May 6, 2025 — Source or Source or Source
The AI Arms Race in Cybersecurity
AllegisCyber Capital's Bob Ackerman Examines Machine-Speed Defense Requirements
May 6, 2025 — Source or Source or Source or Source or Source
Trump's 'Grand Cyber Plan' Coming Soon, Noem Tells Lawmakers
Homeland Security Secretary Accuses Cyber Agency of Failing to Stop China Hacks
May 6, 2025 — Source
US Charges Yemeni Man for Black Kingdom Ransomware Attacks
Rami Khaled Ahmed, a 36-year-old from Yemen, has been charged for launching ransomware attacks between 2021 and 2023.
May 6, 2025 — Source
US Readies Huione Group Ban Over Cybercrime Links
Huione Group Helped Criminals Launder Over $4 Billion Worth of Cybercrime Proceeds
May 6, 2025 — Source or Source
Use of Agentic AI in Cybersecurity Needs More Transparency
Elastic CISO Mandy Andress on Deploying More AI Agents for Cybersecurity Tasks
May 6, 2025 — Source or Source or Source or Source or Source
What a future without CVEs means for cyber defense
The importance of the MITRE-run Common Vulnerabilities and Exposures (CVE) Program shouldn't be understated. For 25 years, it has acted as the point of reference for cybersecurity professionals to understand and mitigate security flaws. By providing a standardized method for naming and cataloguing known vulnerabilities, it offers defenders a shared language for understanding, prioritizing, and responding to real-world threats.
May 6, 2025 — Source
Internet — Security Issues — May 5th, 2025
10 passkey survival tips: Prepare for your passwordless future now
Although passkeys remain an evolving ecosystem, we'd be wise to embrace tomorrow's authentication standard today. Here are ZDNET's 10 recommendations for reaching passkey paradise.
May 5, 2025 — Source
AI-Enabled App Development Outpacing Cybersecurity Controls
Wiz's Ami Luttwak on Managing the 'Speed of AI' Trade-Off in Security Control
May 5, 2025 — Source or Source or Source or Source
ANZ Bank to Eliminate Passwords for Digital Banking Services
Hackers Bypass MFA to Steal Australians' Banking Credentials
May 5, 2025 — Source or Source or Source or Source
Are IoT Devices the New Attack Vector for Ransomware Groups?
Phosphorus Cybersecurity's Phillip Wylie on Asset Inventory, Password Hygiene
May 5, 2025 — Source or Source or Source or Source or Source
Critical Commvault Vulnerability in Attacker Crosshairs
CISA has flagged a critical-severity Commvault vulnerability as exploited one week after technical details were released.
May 5, 2025 — Source
Cybercrime Cooperation Has Become More Regional
Ex-Interpol Director Craig Jones on How Geopolitics Affects Global Cybercrime
May 5, 2025 — Source or Source or Source or Source or Source
Cybersecurity M&A Roundup: 31 Deals Announced in April 2025
Thirty-one cybersecurity merger and acquisition (M&A) deals were announced in April 2025.
May 5, 2025 — Source
Developing privacy-aware building automation
Researchers at the University of Tokyo developed a framework to enable decentralized artificial intelligence-based building automation with a focus on privacy. The system enables AI-powered devices like cameras and interfaces to cooperate directly, using a new form of device-to-device communication.
May 5, 2025 — Source
Doppel Banks $35M for AI-Based Digital Risk Protection
The new investment values Doppel at $205 million and provides runway to meet enterprise demand for AI-powered threat detection tools.
May 5, 2025 — Source
GlobalX, airline used for Trump deportations, gets hacked: Report
GlobalX, an airline used by the Trump administration as part of its massive deportation campaign, has reportedly been hacked.
May 5, 2025 — Source
Hack on Infusion Center Software Supplier Affects 118,000
Maine-Based Firm Already Facing Several Proposed Class Action Lawsuits in Breach
May 5, 2025 — Source or Source or Source
Hacker breaches TeleMessage system used by US officials, raising security concerns
The dangers of archiving encrypted messaging for compliance
May 5, 2025 — Source
Hundreds of e-commerce sites hacked in supply-chain attack
Attack that started in April and remains ongoing runs malicious code on visitors' devices.
May 5, 2025 — Source
Is Windows antivirus software still necessary in 2025?
Why Microsoft's built-in virus scanner is probably good enough (and why you might still look elsewhere).
May 5, 2025 — Source
Kelly Benefits Data Breach Impact Grows to 400,000 Individuals
Kelly Benefits has determined that the impact of the recently disclosed data breach is much bigger than initially believed.
May 5, 2025 — Source
Man Admits Hacking Disney and Leaking Data Disguised as Hacktivist
A 25-year-old has admitted hacking Disney systems and leaking data under the guise of a hacktivist collective named NullBulge.
May 5, 2025 — Source
Multiple Vulnerabilities in SonicWall Secure Mobile Access (SMA) 100 Series Management Interface Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in SonicWall Secure Mobile Access (SMA) 100 Management Interface, which could allow for remote code execution. SonicWall Secure Mobile Access (SMA) is a unified secure access gateway used by organizations to provide employees access to applications from anywhere. Successful exploitation of these vulnerabilities when chained together could allow for remote code execution, potentially leading to session hijacking and full system compromise.
May 5, 2025 — Source
NCSC Recommends Security Measures Amid UK Retailer Hacks
Urges Companies to Enable MFA, Track Atypical Login Attempts
May 5, 2025 — Source or Source or Source
Open-Source Platforms Are More Secure Than Proprietary Ones
Elastic CEO Ash Kulkarni on How AI Transforms Security Data Analysis
May 5, 2025 — Source or Source or Source or Source
OpenAI to Retain Nonprofit Oversight Amid For-Profit Shift
Critics Say Public Benefit Corporation Model May Undermine AI Safety and Oversight
May 5, 2025 — Source or Source
OpenAI Vows Guardrails After ChatGPT's Yes-Man Moment
Flattery Glitch Forces Rollback, Potential Procedural Overhaul
May 5, 2025 — Source or Source or Source
Passkeys for Normal People
Let me start by very simply explaining the problem we're trying to solve with passkeys. Imagine you're logging on to a website like this:
May 5, 2025 — Source
PoC Published for Exploited SonicWall Vulnerabilities
PoC code targeting two exploited SonicWall flaws was published just CISA added them to the KEV catalog.
May 5, 2025 — Source
Ransomware Group Claims Attacks on UK Retailers
The DragonForce ransomware group has claimed responsibility for the recent cyberattacks on UK retailers Co-op, Harrods, and M&S.
May 5, 2025 — Source
Raw Dating App Left User Data Unprotected, Exposing Private Details For All To See
Data breaches, whether due to the nefarious activities of hackers or inadequate security measures, are a major concern due to the harm they can cause to affected users. In this latest breach, a report claims that the dating app Raw left user data unprotected, exposing private details for all to see.
May 5, 2025 — Source
Spy versus spy: Researchers work to secure messaging
When you send a message through WhatsApp or iMessage, you might think only you and the recipient can read it. Thanks to end-to-end encryption (E2EE), that's usually true, but it's not the whole story, says Dr. Nitesh Saxena, a cybersecurity expert at Texas A&M University.
May 5, 2025 — Source
TeleMessage Goes Dark After Trump Adviser Photo Fallout
Hacker Breaches Government-Approved Messaging App Used by Top Trump Officials
May 5, 2025 — Source or Source or Source
TikTok Fined $600 Million for China Data Transfers That Broke EU Privacy Rules
EU privacy watchdog fined TikTok $600 million after a four-year investigation found that data transfers to China put users at risk of spying, in breach of strict EU data privacy rules.
May 5, 2025 — Source
UK retailers under cyber attack: Co-op member data compromised
UK-based retailers Marks & Spencer, Co-op, and Harrods have been targeted by cyber attackers in the last few weeks.
May 5, 2025 — Source
UK shares security tips after major retail cyberattacks
Following three high-profile cyberattacks impacting major UK retailers, the country's National Cyber Security Centre (NCSC) has published guidance that all companies are advised to follow to strengthen their cybersecurity defenses.
May 5, 2025 — Source
US Readies Huione Group Ban Over Cybercrime Links
Huione Group Helped Criminals Launder Over $4 Billion Worth of Cybercrime Proceeds
May 5, 2025 — Source or Source
White House Proposal Slashes Half-Billion From CISA Budget
The proposed $491 million cut is being positioned as a "refocusing"of CISA on its core mission "while eliminating weaponization and waste."
May 5, 2025 — Source
Internet — Security Issues — May 2nd, 2025
5 signs a hacker is watching through your PC's webcam
Know the tell-tale signs that you're being spied on!
May 2, 2025 — Source
A review of 19 billion passwords reveals people are still bad at them
You probably have bad passwords.
May 2, 2025 — Source
Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
Attackers have been using two previously known vulnerabilities (CVE-2024-38475, CVE-2023-44221) to compromise SonicWall secure mobile access devices, the vendor has confirmed by updating the associated advisories.
May 2, 2025 — Source
Best free password managers 2025: Online security doesn't have to cost a thing
Shore up your defenses, stat.
May 2, 2025 — Source
British govt agents step in as Harrods becomes third mega retailer under cyberattack
Experts suggest the obvious: There is an ongoing coordinated attack on UK retail sector
May 2, 2025 — Source
Co-op confirms data theft after DragonForce ransomware claims attack
The Co-op cyberattack is far worse than initially reported, with the company now confirming that data was stolen for a significant number of current and past customers.
May 2, 2025 — Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
Attackers have been using two previously known vulnerabilities (CVE-2024-38475, CVE-2023-44221) to compromise SonicWall secure mobile access devices, the vendor has confirmed by updating the associated advisories.
May 2, 2025 — Source or Source
Cost-effective testing method bolsters US election security amid federal cutbacks
As federal support for election security faces major cutbacks, a study in the journal Operations Research introduces a scientifically backed, low-cost solution to strengthen the integrity of U.S. elections.
May 2, 2025 — Source
Disney Slack Channel Hacker Pleads Guilty
Hacker Who Feigned Russian Hacktivist Persona Faces Up to a Decade in Prison
May 2, 2025 — Source or Source or Source or Source or Source
Hackers have gained access to the membership data of UK retailer Co-op
Customer passwords and payment information weren't accessed, according to Co-op.
May 2, 2025 — Source
I saw how an "evil" AI chatbot finds vulnerabilities. It's as scary as you think
The good guys are trailing behind, too.
May 2, 2025 — Source
Microsoft Accounts Go Passwordless by Default
Microsoft is prioritizing passwordless sign-in and sign-up methods, and is making new accounts passwordless by default.
May 2, 2025 — Source or Source or Source or Source or Source
Nova Scotia Power Says Hackers Stole Customer Information
Nova Scotia Power's investigation has shown that the recent cyberattack resulted in the theft of some customer information.
May 2, 2025 — Source
Opsera improves GitHub security management
Opsera announced new Advanced Security Dashboard capabilities that, available as an extension of Opsera's Unified Insights for GitHub Copilot, help enterprises maximize the benefits of GitHub Advanced Security (GHAS).
May 2, 2025 — Source
Ransomware attacks against government agencies on the rise
Of the 39 confirmed attacks -- where the organization publicly acknowledges what's happened -- in April, 21 were on businesses, nine on government entities, six on healthcare companies and three on educational institutions.
May 2, 2025 — Source
Raytheon, Nightwing to Pay $8.4 Million in Settlement Over Cybersecurity Failures
The US government says defense contractor Raytheon and Nightwing agreed to pay $8.4 million to settle False Claims Act allegations.
May 2, 2025 — Source
RSA Conference 2025 Announcement Summary (Day 3)
Hundreds of companies showcased their products and services this week at the 2025 edition of the RSA Conference in San Francisco.
May 2, 2025 — Source
Stopping Attacks Fast: AI in Cybersecurity Today
AI's Capability to Process at Scale Will Be Promising, IBM's Jeff Crume
May 2, 2025 — Source
UK NCSC: Cyberattacks impacting UK retailers are a wake-up call
The United Kingdom's National Cyber Security Centre warned that ongoing cyberattacks impacting multiple UK retail chains should be taken as a "wake-up call."
May 2, 2025 — Source
UK Retailers Co-op, Harrods and M&S Struggle With Cyberattacks
Major UK retailers Co-op, Harrods, and M&S are scrambling to restore services that were affected by cyberattacks.
May 2, 2025 — Source
Ukrainian Nefilim Ransomware Affiliate Extradited to US
Ukrainian national Artem Stryzhak was extradited to the US and charged with using Nefilim ransomware in attacks on large businesses.
May 2, 2025 — Source
US Indicts Black Kingdom Hacker for Exchange Hacking Tear
Suspected Hacker, Rami Khaled Ahmed, 36, Thought to Be in Yemen
May 2, 2025 — Source or Source or Source or Source or Source or Source
White House Cyber Chief Urges Offensive Response to Threats
National Security Council's Bulazel to Reset Cyber Norms With Offensive Strategy
May 2, 2025 — Source or Source or Source or Source or Source
Why Many Fraud Victims Don't Report Attacks
ITRC's James Lee on Shame, Fatigue and Precision Targeting
May 2, 2025 — Source
Why Simplicity is the Future of Cybersecurity
Fastly CEO Todd Nightingale Makes the Case for Security Without Compromise
May 2, 2025 — Source or Source or Source or Source
Internet — Security Issues — April 28th, 2025
4 Different Types of VPNs & When to Use Them
Learn about the different types of VPNs and when to use them. Find out which type of VPN suits your needs with this comprehensive guide.
April 28, 2025 — Source
4 Million Affected by VeriSource Data Breach
VeriSource Services says the personal information of 4 million people was compromised in a February 2024 cyberattack.
April 28, 2025 — Source
Almost a quarter of HTML email attachments are malicious
When used legitimately, HTML attachments in emails enable organizations to share content, such as newsletters or invitations, that display properly when opened in an email client or web browser.
April 28, 2025 — Source
ArmorCode Anya accelerates critical security decisions
ArmorCode launched Anya, an agentic AI champion purpose-built for AppSec and product security teams. Following a successful early access program, Anya is now available to all ArmorCode enterprise customers, delivering intelligent, conversation-driven security insights that close the expertise gap and accelerate critical security decisions.
April 28, 2025 — Source
Back online after 'catastrophic' attack, 4chan says it's too broke for good IT
Image board hints that rumors of a poorly maintained back end may be true
April 28, 2025 — Source or Source
Censys enables security teams to be more proactive in their threat hunting
Censys is launching a new solution specifically designed to enable threat hunting teams to track adversary infrastructure. The Censys' Threat Hunting solution is part of Censys' recently released Internet Intelligence platform, which provides security teams across the enterprise with the Internet visibility that they need to protect themselves from today's adversaries.
April 28, 2025 — Source
Cloudflare mitigates record number of DDoS attacks in 2025
Internet services giant Cloudflare says it mitigated a record number of DDoS attacks in 2024, recording a massive 358% year-over-year jump and a 198% quarter-over-quarter increase.
April 28, 2025 — Source
Craft CMS Zero-Day Exploited to Compromise Hundreds of Websites
Threat actors have exploited a zero-day vulnerability in Craft CMS to execute PHP code on hundreds of websites.
April 28, 2025 — Source
DragonForce ransomware group announces its forming a hacking cartel
Malware for everyone!
April 28, 2025 — Source
EFF Leads Prominent Security Experts in Urging Trump Administration to Leave Chris Krebs Alone
Political Retribution for Telling the Truth Weakens the Entire Infosec Community and Threatens Our Democracy; Letter Remains Open for Further Sign-Ons
April 28, 2025 — Source
FBI offers $10M bounty for information on Salt Typhoon hackers
The FBI has announced that it is offering a bounty of $10 million to those who help identify the individuals behind the Salt Typhoon hacking group. People behind the group were responsible for hacking major US telecom operators, as well as the US Treasury. The FBI investigation has found that the hacking group breached US networks, stole call data logs, and more under court-ordered US law enforcement requests.
April 28, 2025 — Source
Flashpoint Ignite enhancements improve threat intelligence
Flashpoint announced new capabilities to its flagship platform, Flashpoint Ignite. These innovations are designed to deliver insights that align with customers' threat intelligence needs, enabling organizations to make informed decisions and protect their most critical assets.
April 28, 2025 — Source
From 112K to 4M folks' data -- HR biz attack goes from bad to mega bad
It took a 1 year+ probe, plenty of client calls for VeriSource to understand just how much of a yikes it has on its hands
April 28, 2025 — Source
ICS/OTCritical Vulnerabilities Found in Planet Technology Industrial Networking Products
Planet Technology industrial switches and network management products are affected by several critical vulnerabilities.
April 28, 2025 — Source
Hitachi Vantara takes servers offline after Akira ransomware attack
Hitachi Vantara, a subsidiary of Japanese multinational conglomerate Hitachi, was forced to take servers offline over the weekend to contain an Akira ransomware attack.
April 28, 2025 — Source
How Malwarebytes' security tools can help companies stop online scams before it's too late
Online fraud is costing billions - but Malwarebytes' security tools could be the secret weapon companies need to protect themselves and fight back.
April 28, 2025 — Source
JPMorgan Chase CISO Fires Warning Shot Ahead of RSA Conference
This tension between hard-edged risk realism and breathless AI evangelism sets an unmistakable tone for a bellwether conference where 40,000-plus gather to do business.
April 28, 2025 — Source
Marks & Spencer breach linked to Scattered Spider ransomware attack
Ongoing outages at British retail giant Marks & Spencer are caused by a ransomware attack believed to be conducted by threat actors known as "Scattered Spider" BleepingComputer has learned from multiple sources.
April 28, 2025 — Source
Mobile becomes the preferred route for attacks on enterprises
Mobile threats are no longer an emerging issue, they're here, rapidly evolving, and targeting the devices organizations depend on every day.
April 28, 2025 — Source
NetFoundry Raises $12 Million for Network Security Solutions
Zero-trust network security solutions provider NetFoundry has raised $12 million in funding from SYN Ventures.
April 28, 2025 — Source
Oregon Agency Won't Say If Hackers Stole Data in Cyberattack
Oregon's environmental agency won't say if a group of hackers stole data in a cyberattack that was first announced earlier this month.
April 28, 2025 — Source
Palo Alto Networks Prisma AIRS safeguards the enterprise AI ecosystem
Palo Alto Networks announced Prisma AIRS, an AI security platform that serves as the cornerstone for AI protection, designed to protect the entire enterprise AI ecosystem -- AI apps, agents, models, and data -- at every step.
April 28, 2025 — Source
Palo Alto Networks to Acquire AI Security Firm Protect AI
Palo Alto Networks is acquiring AI security company Protect AI in a deal previously estimated at $650-700 million.
April 28, 2025 — Source or Source
RSA Conference 2025 -- Pre-Event Announcements Summary (Part 3)
Hundreds of companies are showcasing their products and services this week at the 2025 edition of the RSA Conference in San Francisco.
April 28, 2025 — Source
Sentra Data Security for AI Agents protects AI-powered assistants
Sentra launched Data Security for AI Agents solution, specifically designed to address the emerging challenges associated with proliferating AI assistants and empower large enterprises to embrace AI innovation securely and responsibly
April 28, 2025 — Source
South Korea's SK Telecom begins SIM card replacement after data breach
South Korea's largest carrier SK Telecom started on Monday to replace mobile SIM chips for its 23 million users following a data breach, prompting alarmed customers to form long lines for the replacements.
April 28, 2025 — Source
The new role of behavioral biometrics in fraud prevention
Digital security is undergoing profound transformations catalyzed by the shortcomings of traditional authentication methods. Security strategies often force businesses to choose between robust defenses that frustrate users and seamless experiences that heighten vulnerability. Recently, behavioral biometrics -- using unique users' digital interaction patterns -- has emerged to offer a compelling resolution to this longstanding challenge by providing continuous, invisible authentication based on unique human behaviors.
April 28, 2025 — Source
Trend Micro helps organizations secure AI-driven workloads
Trend Micro announced new AI-powered threat detection capabilities designed specifically for enterprises embracing AI at scale. This effort brings together Trend's security expertise with NVIDIA accelerated computing and NVIDIA AI Enterprise software, leveraging AWS infrastructure to support scalable, enterprise-ready deployment.
April 28, 2025 — Source
UK regulator wants to ban apps that can make deepfake nude images of children
'There is no positive reason for these to exist.'
April 28, 2025 — Source
Verizon's Data Breach Report Findings 'Underscore the Importance of a Multi-Layered Defense Strategy'
Verizon surveyed about 22,000 security incidents and 12,000 data breaches. Ransomware incidents increased, while the median ransom payment dropped.
April 28, 2025 — Source
Veza Banks $108 Million Series D at $808 Million Valuation
San Francisco identity security play Veza closes a Series D fund round led by New Enterprise Associates (NEA).
April 28, 2025 — Source
WorkComposer employee monitoring app leak exposes 21 million screenshots online
A misconfigured Amazon S3 storage bucket was the culprit
April 28, 2025 — Source
Internet — Security Issues — April 25th, 2025
AI Experts Urge Regulators to Block OpenAI's Profit Pivot
Challengers Include Ex-OpenAI Staff, Geoffrey Hinton, Margaret Mitchell
April 25, 2025 — Source or Source or Source or Source
Baltimore City Public Schools data breach affects over 31,000 people
Baltimore City Public Schools notified tens of thousands of employees and students of a data breach following an incident in February when unknown attackers hacked into its network.
April 25, 2025 — Source
BreachLock AEV simulates real attacks to validate and prioritize exposures
BreachLock AEV automates multistep, threat-intelligence-led attack scenarios—helping security teams uncover real exposures and prioritize what matters most.
April 25, 2025 — Source
Browser Security Firm SquareX Raises $20 Million
SquareX offers what it has dubbed a "Browser Detection and Response (BDR)" solution.
April 25, 2025 — Source
CISA Grapples With Growing Exodus, Workforce Buyout Turmoil
US Cyber Agency Denies Looming Deadlines Amid Reports of Expanded Workforce Buyouts
April 25, 2025 — Source or Source or Source or Source or Source
Dashlane introduces Omnix for AI-powered credential protection
Dashlane unveiled a new approach to addressing human risk in response to the rise of AI-driven phishing attacks and shadow IT in corporate environments. Built on innovation that pushes beyond vault-based password management, Dashlane Omnix is the AI-accelerated credential security platform that unifies proactive intelligence, real-time response, and protected access to provide businesses complete credential security across their workforce -- all in one intuitive experience.
April 25, 2025 — Source
Data breach at Connecticut's Yale New Haven Health affects over 5 million
A data breach at Connecticut's largest healthcare system Yale New Haven Health affects more than 5.5 million people, according to a legally required notice with the U.S. government's health department.
April 25, 2025 — Source
Detectify Asset Classification and Scan Recommendations improves vulnerability testing
Detectify announced new Asset Classification and Scan Recommendations capabilities. This innovation directly addresses a critical challenge for security teams: knowing what else, beyond their core applications, requires in-depth testing. The new features automatically classify discovered web assets based on attacker reconnaissance techniques and deliver recommendations on where to run DAST, helping organizations bridge the gap between broad and deep vulnerability testing across their entire attack surface.
April 25, 2025 — Source
Emergency patch for potential SAP zero-day that could grant full system control
German software giant paywalls details, but experts piece together the clues
April 25, 2025 — Source
Endor Labs Raises $93M to Expand AI Code Protection Platform
Company Eyes Product Innovation and Strategic M&A After Rapid 30x ARR Growth
April 25, 2025 — Source or Source or Source
Enterprises struggle with serious gaps in cyber response plans
A new survey of 1,000 businesses across the UK, UK, Europe and the Asia-Pacific region reveals a worrying disconnect between organizations' perceived readiness and actual performance in cyber crisis response.
April 25, 2025 — Source
FBI offers $10 million for information about Salt Typhoon members
FBI accepts tips by TOR in likely attempt to woo China-based informants.
April 25, 2025 — Source
FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches
The FBI has asked the public for information on Chinese Salt Typhoon hackers behind widespread breaches of telecommunications providers in the United States and worldwide.
April 25, 2025 — Source
Former Google Cloud CISO Phil Venables Joins Ballistic Ventures
Venables has served as CISO and security executive across several large organizations, including Google Cloud, Goldman Sachs, Deutsche Bank.
April 25, 2025 — Source
From compliance to culture: Making security part of our daily routines
Every organization, sooner or later, writes itself a policy. It gets stapled into onboarding packs and waved about during training, and then quietly forgotten. It's not that people mean to ignore it. It's just that rules don't always make themselves felt when the Wi-Fi's down or the finance team's in a rush. But culture -- that's different. Culture settles into the way people think and work and react. It turns guidelines into instincts. That's when you know security has taken root.
April 25, 2025 — Source
GPT-4.1 May Have a Safety Problem
Tests Suggest OpenAI's Latest Model May Not Meet Alignment Expectations
April 25, 2025 — Source or Source
Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy
With over 12,000 breaches analyzed, this year's DBIR reveals a landscape shaped by not just individual threats, but by entire economies of compromise.
April 25, 2025 — Source
ISMG Editors: Top 2025 Breach Trends From Verizon
Also: Supply Chain Security in Wake of US Tariffs, AI's Role in the SOC
April 25, 2025 — Source or Source or Source or Source or Source
LastPass Secure Access Experiences simplifies access management
As cloud app adoption continues to rise, and the modern workplace continues to evolve, LastPass will introduce a new approach to democratize access management. Built with the needs of small-to-mid-sized businesses in mind, Secure Access Experiences represents a more unified, intuitive way to manage identity and access in a changing world — without the complexity, cost, or confusion that too often defines the category.
April 25, 2025 — Source
Lattica Emerges From Stealth With FHE Platform for AI
Lattica has raised $3.25 million in pre-seed funding for a platform that uses FHE to enable AI models to process encrypted data.
April 25, 2025 — Source
M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat
Mandiant's latest threat report shows how attackers adapt faster than defenses, shifting strategies toward credential theft and insider threats.
April 25, 2025 — Source
Manifest Raises $15 Million for SBOM Management Platform
Software and AI supply chain transparency firm Manifest has raised $15 million in a Series A funding round led by Ensemble VC.
April 25, 2025 — Source
Marks & Spencer pauses online orders after cyberattack
British retailer giant Marks & Spencer (M&S) has suspended online orders while working to recover from a recently disclosed cyberattack.
April 25, 2025 — Source
Mobile provider MTN says cyberattack compromised customer data
African mobile giant MTN Group announced that a cybersecurity incident has compromised the personal information of some of its subscribers in certain countries.
April 25, 2025 — Source
Navigating data privacy and security challenges in AI [Q&A]
As artificial intelligence (AI) continues to reshape industries, data privacy and security concerns are escalating. The rapid growth of AI applications presents new challenges for companies in safeguarding sensitive information.
April 25, 2025 — Source
Privacy Nightmare: Employee Monitoring App Leaks Millions Of Screenshots
A recent report has revealed that an employee surveillance app has been leaking sensitive information about employees and companies in a public storage resource, which raises the question as to the extent to which employers should be allowed to access employees' private data.
April 25, 2025 — Source
Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
Researchers have uncovered three serious vulnerabilities in Rack, a server interface used by most Ruby web app frameworks (Ruby on Rails, Sinatra, Hanami, Roda, and others).
April 25, 2025 — Source
RSA Conference 2025 -- Pre-Event Announcements Summary (Part 2)
Hundreds of companies are showcasing their products and services next week at the 2025 edition of the RSA Conference in San Francisco.
April 25, 2025 — Source
Rubrik Identity Resilience protects vulnerable authentication infrastructure
Rubrik announced its upcoming solution, Identity Resilience, designed to secure the entire identity landscape alongside data.
April 25, 2025 — Source
Security Bite: FBI releases 2024 Internet Crime Report, 'new record for losses'
This year marks the 25th anniversary of the FBI's Internet Crime Complaint Center, or IC3 for short. Since its inception in 2000, the organization has released an annual report detailing trends based on the thousands of cybercrime complaints it receives daily from victims. This week, the FBI released its 2024 Internet Crime Report (PDF), revealing a record $16.6 billion in reported losses—a 33% increase and "a new record for losses reported to IC3."
April 25, 2025 — Source
SAP fixes suspected NetWeaver zero-day exploited in attacks
SAP has released out-of-band emergency NetWeaver updates to fix a suspected remote code execution (RCE) zero-day flaw actively exploited to hijack servers.
April 25, 2025 — Source
SAP Zero-Day Possibly Exploited by Initial Access Broker
A zero-day vulnerability in SAP NetWeaver potentially affects more than 10,000 internet-facing applications.
April 25, 2025 — Source
Scamnetic Raises $13 Million to Prevent Scams in Real Time
AI-powered threat protection startup Scamnetic has raised $13 million in a Series A funding round led by Roo Capital.
April 25, 2025 — Source
So long, passwords: 5 easy ways to use passkeys
There's nothing to memorize—unless you count where you've stored your passkeys.
April 25, 2025 — Source
South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days
Multiple South Korean organizations across industries have been targeted in a recent Lazarus campaign dubbed Operation SyncHole
April 25, 2025 — Source
Spy versus spy: A new automated removal tool can stop most remote-controlled malware
Cyberattacks can snare workflows, put vulnerable client information at risk, and cost corporations and governments millions of dollars. A botnet—a network infected by malware—can be particularly catastrophic. A new Georgia Tech tool automates the malware removal process, saving engineers hours of work and companies money.
April 25, 2025 — Source
Suspected Scattered Spider Head Extradited From Spain
Tyler Buchanan, a 23-year-old Scottish Man Extradited to the US on Wednesday
April 25, 2025 — Source or Source or Source or Source or Source
The TechCrunch Cyber Glossary
The cybersecurity world is full of jargon and lingo. At TechCrunch, we have been writing about cybersecurity for years, and we frequently use technical terms and expressions to describe the nature of what is happening in the world. That's why we have created this glossary, which includes some of the most common — and not so common — words and expressions that we use in our articles, and explanations of how, and why, we use them.
April 25, 2025 — Source
Two Ransomware Hacks Affect 1.1 Million Patients
Hackers Hit Maryland Medical Group and California Hospital, Claim 480 GB Data Theft
April 25, 2025 — Source or Source or Source or Source or Source or Source
WhatsApp, Signal scam leads to Microsoft account hacks. How to spot it.
Be careful what you click.
April 25, 2025 — Source
Windows "inetpub" security fix can be abused to block future updates
A recent Windows security update that creates an 'inetpub' folder has introduced a new weakness allowing attackers to prevent the installation of future updates.
April 25, 2025 — Source
Internet — Security Issues — April 22nd, 2025
1Password adds protection for agentic AI in the enterprise
Current AI models can perform many tasks such as generating text, but these are 'prompted' -- that is the AI isn't acting by itself. But this is about to change with the arrival of agentic AI.
April 22, 2025 — Source
54% of tech hiring managers expect layoffs in 2025
54% of tech hiring managers say their companies are likely to conduct layoffs within the next year, and 45% say employees whose roles can be replaced by AI are most likely to be let go, according to a new study by General Assembly.
April 22, 2025 — Source
A pot of $250K is now available to ransomware researchers, but it feeds a commercial product
Security bods can earn up to $10K per report
April 22, 2025 — Source
AI's Phantom Packages Invite Slopsquatting Supply Chain Risk
Open-Source Models Hallucinate More Than Commercial Ones, Found Study
April 22, 2025 — Source or Source or Source or Source
Australian Businesses Gear Up for Ransom Reporting Deadline
Ransom Threats to Be Reported Under New Australian Legislation
April 22, 2025 — Source or Source or Source or Source or Source
BigID unveils AI Privacy Risk Posture Management
BigID launched AI Privacy Risk Posture Management to help organizations manage data privacy risks across the AI lifecycle. With automated assessments and actionable privacy controls, BigID empowers enterprises to govern AI responsibly while staying ahead of fast-evolving regulations.
April 22, 2025 — Source
Cloud Data Security Play Sentra Raises $50 Million Series B
Sentra has now raised north of $100 million for controls technology to keep sensitive data out of misconfigured AI workflows.
April 22, 2025 — Source
Cookie-Bite attack PoC uses Chrome extension to steal session tokens
A proof-of-concept attack called "Cookie-Bite" uses a browser extension to steal browser session cookies from Azure Entra ID to bypass multi-factor authentication (MFA) protections and maintain access to cloud services like Microsoft 365, Outlook, and Teams.
April 22, 2025 — Source
Cyber Firm CEO Accused of Placing Malware on Hospital Device
Faces Two Counts of Oklahoma Computer Crime Act Violations
April 22, 2025 — Source or Source or Source or Source or Source
Cyberattack Knocks Texas City's Systems Offline
The city of Abilene, Texas, is scrambling to restore systems that have been taken offline in response to a cyberattack.
April 22, 2025 — Source
DataKrypto Launches Homomorphic Encryption Framework to Secure Enterprise AI Models
DataKrypto's FHEnom for AI combines real-time homomorphic encryption with trusted execution environments to protect enterprise data and models from leakage, exposure, and tampering.
April 22, 2025 — Source
Email still the main channel for cyberattacks and disinformation
Malicious actors are increasingly exploiting email to impersonate brands, launch phishing campaigns, and spread false information -- often using sophisticated methods made simpler by emerging technologies.
April 22, 2025 — Source
Embedded smart trackers boost security for radioactive shipments
Every day, cancer patients visit medical facilities for treatments to lessen or alleviate the destructive illness. Treatments often include radioisotopes and other radioactive materials that target and destroy cancer cells effectively.
April 22, 2025 — Source
FBI Claims It Lost Records About Its Mysterious Hacking Abilities
The bureau isn't being forthcoming when it comes to recently procured cyber tools.
April 22, 2025 — Source
Fog ransomware channels Musk with demands for work recaps or a trillion bucks
In effect: 'Ha ha -- the government is borked and so are you'
April 22, 2025 — Source
Google's Costly Strategy to Secure Default Status on Samsung Devices Revealed
It was just revealed that Google is paying Samsung an "enormous sum" to Samsung in order to keep Gemini pre-installed on the company's devices. This is not first such deal with Samsung, this is in addition to its multi-billion deal for Google Search.
April 22, 2025 — Source
Google's email spoofed by cunning phisherfolk who re-used DKIM creds
PLUS: Malware developers adopt Node.js; US disinformation warriors disbanded; Gig worker accounts for sale; and more
April 22, 2025 — Source
Hackers abuse Zoom remote control feature for crypto-theft attacks
A hacking group dubbed 'Elusive Comet' targets cryptocurrency users in social engineering attacks that exploit Zoom's remote control feature to trick users into granting them access to their machines.
April 22, 2025 — Source
Ketch Data Sentry uncovers hidden privacy risks
Ketch launched Data Sentry, a frontend data map for detecting website privacy risks. Designed for privacy and security teams, Data Sentry provides real-time visibility into website data flows—pinpointing hidden vulnerabilities before they lead to lawsuits or regulatory action.
April 22, 2025 — Source
Legacy Google Service Abused in Phishing Attacks
A sophisticated phishing campaign abuses weakness in Google Sites to spoof Google no-reply addresses and bypass protections.
April 22, 2025 — Source
Many Malware Campaigns Linked to Proton66 Network
Security researchers detail various malware campaigns that use bulletproof services linked to Proton66 ASN.
April 22, 2025 — Source
Marks & Spencer confirms cybersecurity incident amid ongoing disruption
Retail giant Marks & Spencer has confirmed a cybersecurity incident, as customers report ongoing disruption and outages.
April 22, 2025 — Source
New Google email scams are alarmingly convincing - how to spot them
Until Google rolls out a fix, you'll have to be on the lookout for this particularly convincing phishing scam.
April 22, 2025 — Source
New study reveals cybersecurity threats in next-gen DNA sequencing
Researchers have identified multiple cyberthreats in every stage of the DNA sequencing process
April 22, 2025 — Source
Not if, but when -- Why every organization needs a cyber resilience strategy
Because of AI, data has become the most valuable competitive asset for organizations regardless of industry. However, cyber-attacks are continuing to escalate, so the need for robust security measures is more important than ever. It is no longer enough to focus solely on prevention, so organizations must shift their mindset and resources toward rapid recovery and resilience.
April 22, 2025 — Source
NymVPN: Introducing a security-first decentralized VPN with a Mixnet flair
It's not often we see a VPN developed as more than just a way to hide your IP address and give you some online protection against tracking. So how does the open-source, Mixnet-based NymVPN project stack up?
April 22, 2025 — Source
Open Source Security Firm Hopper Emerges From Stealth With $7.6M in Funding
Hopper has emerged from stealth mode with a solution designed to help organizations manage open source software risk.
April 22, 2025 — Source
Perforce Puppet update accelerates vulnerability remediation
Perforce Software announced its latest platform update for Puppet Enterprise Advanced, designed to streamline DevSecOps practices and fortify enterprise security postures.
April 22, 2025 — Source
PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)
There are now several public proof-of-concept (PoC) exploits for a maximum-severity vulnerability in the Erlang/OTP SSH server (CVE-2025-32433) unveiled last week.
April 22, 2025 — Source
Proofpoint Prime unifies multistage attack protection across digital channels
Proofpoint has unveiled the global availability of Proofpoint Prime Threat Protection, the human-centric cybersecurity solution that brings together previously disparate critical threat defense capabilities—protection against multistage attacks across digital channels, impersonation protection, and risk-based employee guidance and education—in a single integrated solution.
April 22, 2025 — Source
Russian, Chinese Hackers Targeted Dutch Government
Hackers Targeted Critical Infrastructure for Sabotage, Data Theft
April 22, 2025 — Source or Source or Source or Source
SaaS security needs a more unified approach
New research commissioned by Valence Security from the Cloud Security Alliance looks at the current state of SaaS security to uncover key challenges and explore how organizations are securing and managing their SaaS environments.
April 22, 2025 — Source
Senior CISA Advisers Announce Exits Amid Federal Downsizing
Senior Advisers Behind 'Secure by Design' Step Down From CISA Amid Workforce Cuts
April 22, 2025 — Source or Source or Source or Source
SK Telecom warns customer USIM data exposed in malware attack
South Korea's largest mobile operator, SK Telecom, is warning that a malware infection allowed threat actors to access sensitive USIM-related information for customers.
April 22, 2025 — Source
Software Bill of Materials (SBOM): Enhancing Software Transparency and Security
Explore key concepts of SBOMs and how they are an essential tool in modern software development and cybersecurity frameworks.
April 22, 2025 — Source
SSL.com Scrambles to Patch Certificate Issuance Vulnerability
A vulnerability in SSL.com has resulted in nearly a dozen certificates for legitimate domains being wrongly issued.
April 22, 2025 — Source
Startup Sentra Nabs $50M to Boost AI-Powered Data Protection
Series B Investment to Boost AI, Expand Coverage Across IaaS, PaaS, SaaS, On-Prem
April 22, 2025 — Source or Source or Source or Source or Source
Stellar Cyber boosts security operations with human-augmented Autonomous SOC
At the upcoming RSAC 2025 Conference in San Francisco, Stellar Cyber will unveil the next evolution of modern SecOps: the human-augmented Autonomous SOC, powered by its breakthrough Agentic AI framework.
April 22, 2025 — Source
StrikeReady Security Command Center v2 accelerates threat response
For years, security teams have operated in reactive mode, contending with siloed tools, fragmented intelligence, and a never-ending backlog of alerts. Traditional Security Operations platforms were supposed to unify data and streamline response—but they often introduced their own complexity, requiring heavy customization and manual oversight.
April 22, 2025 — Source
The danger of data breaches — what you really need to know
In today's digital world, your personal data is like cold hard cash, and that's why cyberthieves are always looking for ways to steal it. Whether it's an email address, a credit card number, or even medical records, your personal information is incredibly valuable in the wrong hands.
April 22, 2025 — Source
Two CISA officials jump ship, both proud of pushing for Secure by Design software
As cyber-agency faces cuts, makes noises about switching up program
April 22, 2025 — Source
Two Healthcare Orgs Hit by Ransomware Confirm Data Breaches Impacting Over 100,000
Bell Ambulance and Alabama Ophthalmology Associates have suffered data breaches affecting over 100,000 people after being targeted in ransomware attacks.
April 22, 2025 — Source
UN Researchers Warn That Asian Scam Operations Are Spreading Across the Rest of the World
Transnational organized crime groups in East and Southeast Asia are spreading their lucrative scam operations across the globe, according to a UN report.
April 22, 2025 — Source
UN says Asian scam call center epidemic expanding globally amid political heat
What used to be a serious issue mainly in Southeast Asia is now the world's problem
April 22, 2025 — Source
Internet — Security Issues — April 20th, 2025
Week in review: LLM package hallucinations harm supply chains, Nagios Log Server flaws fixed
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
April 20, 2025 — Source
Internet — Security Issues — April 17th, 2025
Ahold Delhaize confirms data theft after INC ransomware claims attack
Food retail giant Ahold Delhaize confirms that data was stolen from its U.S. business systems during a November 2024 cyberattack.
April 17, 2025 — Source
Breach Roundup: Cyber Insurance Market Set to Double by 2030
Also, a 'Perfect Tool' for Cyberespionage and EU Stocks Up on Burner Phones
April 17, 2025 — Source or Source or Source or Source or Source
Canada Warns Cyberdefenders to Buttress Edge Devices
Canadian Cyber Agency Warns of Rising Chinese Cyberthreats
April 17, 2025 — Source or Source or Source or Source or Source
Chinese APT Mustang Panda Updates, Expands Arsenal
The Chinese state-sponsored group Mustang Panda has used new and updated malicious tools in a recent attack.
April 17, 2025 — Source
CISA tags SonicWall VPN flaw as actively exploited in attacks
On Wednesday, CISA warned federal agencies to secure their SonicWall Secure Mobile Access (SMA) 100 series appliances against attacks exploiting a high-severity remote code execution vulnerability.
April 17, 2025 — Source
CISA Issues Guidance After Oracle Cloud Hack
CISA is making recommendations for organizations and users in light of the recent Oracle legacy cloud environment hack.
April 17, 2025 — Source
CISA warns of increased breach risks following Oracle Cloud leak
On Wednesday, CISA warned of heightened breach risks after the compromise of legacy Oracle Cloud servers earlier this year and highlighted the significant threat to enterprise networks.
April 17, 2025 — Source
Credential theft escalates as threat actors use stealthier tactics
Cybercriminals are pivoting to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises have declined.
April 17, 2025 — Source
Critical Erlang/OTP SSH Flaw Exposes Many Devices to Remote Hacking
Servers exposed to complete takeover due to CVE-2025-32433, an unauthenticated remote code execution flaw in Erlang/OTP SSH.
April 17, 2025 — Source
CTM360 Tracks Global Surge in SMS-Based Reward and Toll Scams
CTM360 has observed a notable surge in two SMS-based phishing campaigns: PointyPhish (reward scams) and TollShark (toll payment scams).
April 17, 2025 — Source
Cyber threats against energy sector surge as global tensions mount
Cyberattacks targeting the energy sector are increasing, driven by a host of geopolitical and technological factors. A report published by Sophos in July 2024, and which surveyed 275 cybersecurity and IT leaders from the energy, oil/gas, and utilities sector across 14 countries, found 67% of respondents who said their organizations had suffered a ransomware attack in the last year.
April 17, 2025 — Source
Data-stealing cyberattacks are surging - 7 ways to protect yourself and your business
The number of infostealers sent through phishing emails jumped by 84% last year. IBM X-Force offers these recommendations for defending yourself from all manner of malware.
April 17, 2025 — Source
Demystifying Security Posture Management
While the Security Posture Management buzz is real, its long-term viability depends on whether it can deliver measurable outcomes without adding more complexity.
April 17, 2025 — Source
DNA sequencing at risk: Hackers could exploit genomic data vulnerabilities
Next-generation DNA sequencing (NGS)—the same technology which is powering the development of tailor-made medicines, cancer diagnostics, infectious disease tracking, and gene research—could become a prime target for hackers.
April 17, 2025 — Source or Source
Lawsuit: Therapist Accessed Nude Breast Photos of 425 Women
Kansas Plastic Surgeon's Patients Allege Privacy Abuses Over Worker's EHR Access
April 17, 2025 — Source or Source or Source or Source or Source
MITRE Hackers' Backdoor Has Targeted Windows for Years
Windows versions of the BrickStorm backdoor that the Chinese APT used in the MITRE hack last year have been active for years.
April 17, 2025 — Source
Most enterprise hybrid Active Directory environments have critical vulnerabilities
A new survey of more than 1,000 IT and security professionals carried out for Cayosoft finds that 88 percent of enterprise hybrid Active Directory environments have critical vulnerabilities.
April 17, 2025 — Source
Network Security at the Edge for AI-ready Enterprise
The widespread use of AI, particularly generative AI, in modern businesses creates new network security risks for complex enterprise workloads across various locations
April 17, 2025 — Source
Report Warns US Allies Are Using Chinese-Owned Mobile Routes
Researchers Say Chinese Mobile Route Firms Dominate Global Interconnect Industry
April 17, 2025 — Source or Source or Source or Source or Source
SafeLine Bot Management: Self-hosted alternative to Cloudflare
Modern websites are under constant pressure from automated traffic: scraping, credential stuffing, inventory hoarding, and other malicious bot behaviors.
April 17, 2025 — Source
SonicWall Flags Old Vulnerability as Actively Exploited
A SonicWall SMA 100 series vulnerability patched in 2021, which went unnoticed at the time of patching, is being exploited in the wild.
April 17, 2025 — Source
Startup Exaforce Nabs $75M to Grow AI-Powered SOC Automation
Exaforce's AI-Powered Automation Aims to Streamline Security Ops for Enterprises
April 17, 2025 — Source or Source or Source or Source or Source
Symbiotic Security v1 empowers developers to write secure code
Symbiotic Security launched Symbiotic Security version 1 that ensures code security keeps pace with development speed, by using AI to secure code in real-time through remediation and training integrated within their workflows.
April 17, 2025 — Source
Targeted by Trump, Chris Krebs Resigns Job to Fight Probe
Cybersecurity Expert Sees Retribution for Stating 2020 Election Results Legitimate
April 17, 2025 — Source or Source or Source or Source or Source
The Hidden Breach: Secrets Leaked Outside the Codebase Pose a Serious Threat
Secrets aren't just in code. Recent reports show major leaks in collaboration tools like Slack, Jira, and Confluence. Here's what security teams need to know.
April 17, 2025 — Source
The best VPN service for 2025
These are the best virtual private networks out there, as reviewed and tested by experts.
April 17, 2025 — Source
The US almost let the CVE system die - the cybersecurity world's universal bug tracker
A last-minute funding extension saved the system--but only for 11 months
April 17, 2025 — Source
Vulnerabilities Patched in Atlassian, Cisco Products
Atlassian and Cisco have released patches for multiple high-severity vulnerabilities, including remote code execution bugs.
April 17, 2025 — Source
Warning! Don't Fall For This Clever Gmail Phishing Scam That Looks Legit
A recent report of a highly sophisticated phishing attack exploiting Google services targeting a lead developer at Ethereum Foundation, Nick Johnson, proves that internet users need to take more precautions to protect themselves from social engineering tactics like phishing.
April 17, 2025 — Source
Why 'One Community' Resonates in Cybersecurity
Our collective voices and one community will provide the intelligence we need to safeguard our businesses in today's modern digital environment.
April 17, 2025 — Source
Windows NTLM hash leak flaw exploited in phishing attacks on governments
A Windows vulnerability that exposes NTLM hashes using .library-ms files is now actively exploited by hackers in phishing campaigns targeting government entities and private companies.
April 17, 2025 — Source or Source
Internet — Security Issues — April 11th, 2025
Best free VPN of 2025: It's important to choose wisely
VPNs are best when they're paid for, but if a premium account isn't in the cards then here are our top recommendations for a free service.
April 11, 2025 — Source
Cybersecurity Community Must Not Remain Silent On Executive Order Attacking Former CISA Director
Cybersecurity professionals and the infosec community have essential roles to play in protecting our democracy, securing our elections, and building, testing, and safeguarding government infrastructure. It is critically important for us to speak up to ensure that essential work continues and that those engaged in these good faith efforts are not maligned by an administration that has tried to make examples of its enemies in many other fields.
April 11, 2025 — Source
Fortinet: Hackers retain access to patched FortiGate VPNs using symlinks
Fortinet warns that threat actors use a post-exploitation technique that helps them maintain read-only access to previously compromised FortiGate VPN devices even after the original attack vector was patched.
April 11, 2025 — Source
Hacked documents reveal guide to serving Elon Musk on private jets
A recent breach of Berkshire Hathaway-owned private jet company NetJets has revealed a guide for flight attendants serving Elon Musk, per a Bloomberg report. The memo offers an interesting glimpse into the personal preferences of the world's richest man.
April 11, 2025 — Source
Hackers Breach Morocco's Social Security Database
The hackers who posted the documents on Telegram said the attack was in response to alleged Moroccan "harassment" of Algeria on social media platforms.
April 11, 2025 — Source
Hackers exploit old FortiGate vulnerabilities, use symlink trick to retain limited access to patched devices
A threat actor that has been using known old FortiOS vulnerabilities to breach FortiGate devices for years has also been leveraging a clever trick to maintain undetected read-only access to them after the original access vector was locked down, Fortinet has revealed on Thursday.
April 11, 2025 — Source
In Other News: Scattered Spider Still Active, EncryptHub Unmasked, Rydox Extraditions
Noteworthy stories that might have slipped under the radar: Scattered Spider still active despite arrests, hacker known as EncryptHub unmasked, Rydox admins extradited to US.
April 11, 2025 — Source
Initial access brokers target mid-sized businesses for ransomware
Initial access brokers (IABs) are the invisible engine of modern cybercrime. They don't execute ransomware attacks, but they do enable them.
April 11, 2025 — Source
Interior Department Ousts Key Cyber Leaders Amid DOGE Spat
Senior Technology, Cybersecurity Officials Removed From Interior Department
April 11, 2025 — Source or Source or Source or Source or Source
KELA Digital Cyber Analysts improves security teams' efficiency
KELA unveiled Digital Cyber Analysts, next-generation AI-powered digital employees designed to transform how security teams consume, prioritize, and act on threat intelligence.
April 11, 2025 — Source
Medical Lab Hack Affects Planned Parenthood Patients
Laboratory Services Cooperative Says 1.6 Million Patients, Workers, Others Affected
April 11, 2025 — Source or Source or Source or Source or Source
Microsoft is rolling out its controversial Recall feature to Windows Insiders
Its release has been relayed several times in the past.
April 11, 2025 — Source
Microsoft: Windows 'inetpub' folder created by security fix, don't delete
Microsoft has now confirmed that an April 2025 Windows security update is creating a new empty "inetpub" folder and warned users not to delete it.
April 11, 2025 — Source
Nation-StateChina Admitted to Volt Typhoon Cyberattacks on US Critical Infrastructure: Report
In a secret meeting between Chinese and US officials, the former confirmed conducting cyberattacks on US infrastructure.
April 11, 2025 — Source
Radiology Practice Pays Feds $350,000 in HIPAA Settlement
HHS Cites Security Risk Analysis Failures in Hack That Affected Nearly 300,000
April 11, 2025 — Source or Source or Source
Ransomware attack cost IKEA operator in Eastern Europe $23 million
Fourlis Group, the operator of IKEA stores in Greece, Cyprus, Romania, and Bulgaria, has informed that the ransomware attack it suffered just before Black Friday on November 27, 2024, caused losses estimated to €20 million ($22.8 million).
April 11, 2025 — Source
Ransomware crims hammering UK more than ever as British techies complain the board just doesn't get it
Issues at the very top continue to worsen
April 11, 2025 — Source
Ransomware Hackers Target Active Directory Domain Controllers
Domain Controllers Commandeered to Distribute Malware, Warns Microsoft
April 11, 2025 — Source or Source or Source or Source or Source
Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle
The CVE-2025-22457 has already been exploited by a China-nexus hacking gang notorious for breaking into edge network devices.
April 11, 2025 — Source
Researcher uncovers dozens of sketchy Chrome extensions with 4 million installs
Even weirder: Why would Google give so many the "Featured" stamp for trustworthiness?
April 11, 2025 — Source
Rising Tides: Bryson Bort on Cyber Entrepreneurship and the Needed Focus on Critical Infrastructure
Very few people in the cybersecurity industry do not know, or know of, Bryson Bort, CEO/Founder of SCYTHE and the co-founder of ICS Village.
April 11, 2025 — Source
Security Bite: Down the rabbit hole of neat, lesser-known Terminal commands (Pt. 1)
You might be wondering, "What does this have to do with security?" Fair question—this is a 9to5Mac Apple security column, after all. While not all commands below aren't explicitly security-focused, they could help you work smarter, increase your efficiency, and allow you to show off some genuinely useful tricks.
April 11, 2025 — Source
SonicWall Patches High-Severity Vulnerability in NetExtender
SonicWall has released fixes for three vulnerabilities in NetExtender for Windows, including a high-severity bug.
April 11, 2025 — Source
Span Cyber Security Arena 2025: Infosec leaders to discuss the future of digital defense
Today, in the age of quantum threats, AI and sophisticated digital manipulations, the question is: where does the human factor end, and where does technology begin?
April 11, 2025 — Source
US lab testing provider exposed health data of 1.6 million people
Laboratory Services Cooperative (LSC) has released a statement informing it suffered a data breach where hackers stole sensitive information of roughly 1.6 million people from its systems.
April 11, 2025 — Source
Vulnerability in OttoKit WordPress Plugin Exploited in the Wild
A vulnerability in the OttoKit WordPress plugin with over 100,000 active installations has been exploited in the wild.
April 11, 2025 — Source
Western Sydney University discloses security breaches, data leak
Western Sydney University (WSU) announced two security incidents that exposed personal information belonging to members of its community.
April 11, 2025 — Source
Internet — Security Issues — April 7th, 2025
8 simple ways to teach your friends and family about cybersecurity - before it's too late
Your friends and family members are sitting ducks for online attackers. They need your help.
April 7, 2025 — Source
AI Outsmarts Human Red Teams in Phishing Tests
Hoxhunt Predicts Phishing-as-a-Service Will Adopt AI Spear-Phishing Agents
April 7, 2025 — Source or Source
CRM, Bulk Email Providers Targeted in Crypto Phishing Campaign
'PoisonSeed' phishing campaign targets CRM and bulk email providers to distribute "crypto seed phrase" messages.
April 7, 2025 — Source
Cyber security advice for political candidates
Threat actors target Canadian elections to influence decisions on key global issues or to exploit data and disrupt the democratic process.
April 7, 2025 — Source
Dental Practice Support Firm Notifying 173,400 of Email Hack
Breach Affects Pediatric, Orthodontic and Dental Surgery Practices in 6 States
April 7, 2025 — Source
Encryption method for key exchange enables tap-proof communication to fend off future quantum tech threats
Quantum computers are a specter for future data security because they might break many of today's encryption methods. Among other things, this will affect encrypted emails, messenger services, or online banking. Together with partners, researchers from Karlsruhe Institute of Technology (KIT) have developed a method that can reliably protect today's Internet communication from tomorrow's quantum technology threats.
April 7, 2025 — Source
Everest ransomware's dark web leak site defaced, now offline
The dark web leak site of the Everest ransomware gang has apparently been hacked over the weekend by an unknown attacker and is now offline.
April 7, 2025 — Source
FedRAMP's Automation Goal Brings Major Promises - and Risks
Analysts Praise FedRAMP's Speed Goals, but Worry About Unclear Execution Details
April 7, 2025 — Source or Source
Food giant WK Kellogg discloses data breach linked to Clop ransomware
US food giant WK Kellogg Co is warning employees and vendors that company data was stolen during the 2024 Cleo data theft attacks.
April 7, 2025 — Source
Google's Sec-Gemini v1 Takes on Hackers & Outperforms Rivals by 11%
Sec-Gemini v1 has access to real-time cybersecurity data from trusted sources including Google Threat Intelligence, Mandiant's attack reports, and the Open Source Vulnerabilities database.
April 7, 2025 — Source
Immuta Data Marketplace enhancements accelerate data provisioning
Immuta announced enhancements to its Data Marketplace solution to help organizations that are increasingly focusing on data-driven decision making and artificial intelligence address the increase in volume of data access requests while minimizing data risk.
April 7, 2025 — Source
Lazarus Expands NPM Campaign With Trojan Loaders
North Korea's Lazarus Deploys Malicious NPM Packages to Steal Data
April 7, 2025 — Source or Source or Source or Source
NIST Puts Pre-2018 CVEs on Back Burner as It Works to Clear Backlog
NIST has marked pre-2018 CVEs in NVD as 'Deferred' and will no longer spend resources on enriching them.
April 7, 2025 — Source
PCI DSS 4.0.1: A Cybersecurity Blueprint by the Industry, for the Industry
As PCI DSS 4.0.1 comes into force, it shows the power of industry collaboration in cybersecurity.
April 7, 2025 — Source
Port of Seattle Says 90,000 People Impacted by Ransomware Attack
The Port of Seattle says the personal information of 90,000 individuals was stolen in an August 2024 ransomware attack.
April 7, 2025 — Source
Ransomware Underground Faces Declining Relevance
Rising Attacks Mask Lowering Profits, Attention Economy Competition
April 7, 2025 — Source or Source or Source or Source
RunSafe Risk Reduction Analysis offers insights into memory-based CVEs
RunSafe Security launched the RunSafe Risk Reduction Analysis, which analyzes total exposure to Common Vulnerabilities and Exposures (CVEs) and memory-based zero days in software.
April 7, 2025 — Source
Scammers are exploiting tax season panic with convincing new email traps
"Surely the IRS can't ask for my credit card details?"
April 7, 2025 — Source
Someone hacked ransomware gang Everest's leak site
A leak site used by the Everest ransomware gang was hacked and defaced this weekend, TechCrunch has learned.
April 7, 2025 — Source
Suspected Scattered Spider Hacker Pleads Guilty
A 20-year-old arrested last year and charged alongside others believed to be members of Scattered Spider has pleaded guilty.
April 7, 2025 — Source
Tariff Wars: The Technology Impact
How CIOs and CISOs Can Navigate With Balance
April 7, 2025 — Source or Source or Source or Source
The Convergence of IAM, Cybersecurity, Fraud and Compliance
Gartner's Pete Redshaw on Why the CISO or CRO Should Take the Lead
April 7, 2025 — Source or Source or Source or Source
UK's demand for Apple backdoor should not be heard in secret, says court
The U.K. government has lost its bid to keep secret the details of a surveillance order it brought against Apple, according to a newly released decision by the U.K. surveillance powers' court.
April 7, 2025 — Source
WinRAR MotW bypass flaw fixed, update ASAP (CVE-2025-31334)
WinRAR users, upgrade your software as soon as possible: a vulnerability (CVE-2025-31334) that could allow attackers to bypass Windows' Mark of the Web (MotW) security warning and execute arbitrary code on your machine has been fixed in version 7.11.
April 7, 2025 — Source
Internet — Security Issues — April 4th, 2025
7 password rules security experts live by in 2025 - the last one might surprise you
What makes a password strong in 2025? How long should it be, and how often should you update it? Here's the latest recommendations from top cybersecurity experts.
April 4, 2025 — Source
23andMe Bankruptcy: Should DNA Data Go to the Top Bidder?
Lawyer Jonathan Armstrong on Legal, Ethical Fallout From Looming 23andMe Auction
April 4, 2025 — Source
Attackers Abuse Remote Desktop Protocol, Microsoft Binaries
Investigators See Ongoing Use of Living-Off-the-Land Binaries, Frequent RDP Abuse
April 4, 2025 — Source or Source or Source or Source
CaaStle CEO Accused of a Major Fraud Faux Pas
Company Says Misleading Revenue and Liquidity Numbers Provided to Key Stakeholders
April 4, 2025 — Source
Call Records of Millions Exposed by Verizon App Vulnerability
A patch has been released for a serious information disclosure vulnerability affecting a Verizon call filtering application.
April 4, 2025 — Source
Chinese Espionage Group Targeting Legacy Ivanti VPN Devices
More Evidence Surfaces of Chinese Hackers Targeting Ivanti Products
April 4, 2025 — Source
Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack
Evidence shows a SpotBugs token compromised in December 2024 was used in the March 2025 GitHub Actions supply chain attack.
April 4, 2025 — Source
Critical Apache Parquet Vulnerability Leads to Remote Code Execution
A critical vulnerability in Apache Parquet can be exploited to execute arbitrary code remotely, leading to complete system compromise.
April 4, 2025 — Source
DDoS Attacks Now Key Weapons in Geopolitical Conflicts, NETSCOUT Warns
Hackers now use AI and botnets to launch powerful DDoS attacks, bypassing security and overwhelming servers as law enforcement struggles to keep up.
April 4, 2025 — Source
EU may "make an example of X" by issuing $1 billion fine to Musk's social network
Regulators discuss size of penalty as X calls punishment "political censorship."
April 4, 2025 — Source
Gamers beware! This new malware hides in your GPU
Malware that targets gamers is so uncool!
April 4, 2025 — Source
In Other News: Apple Improving Malware Detection, Cybersecurity Funding, Cyber Command Chief Fired
Noteworthy stories that might have slipped under the radar: Apple adding TCC events to Endpoint Security, cybersecurity funding report for Q1 2025, Trump fires the head of NSA and Cyber Command.
April 4, 2025 — Source
ISMG Editors: Who Will Shore Up Trump's Federal Cyber Cuts?
Also: 23andMe's Privacy Meltdown, Investors' $500M AI Bet on ReliaQuest
April 4, 2025 — Source or Source or Source or Source
Mullvad VPN review: Fast speeds and low prices, with a focus on privacy and anonymity
Mullvad VPN may be one of the more obscure VPN services, but its no-frills subscription model and advanced security features make it ideal for people interested in strong online security and privacy.
April 4, 2025 — Source
North Korean Hackers Disguised as IT Workers Targeting UK, European Companies, Google Finds
The attackers pose as legitimate remote IT workers, looking to both generate revenue and access sensitive company data through employment. "Europe needs to wake up fast," according to Google's Jamie Collier.
April 4, 2025 — Source
NSA warns "fast flux" threatens national security. What is fast flux anyway?
Used by nation-states and crime groups, fast flux bypasses many common defenses.
April 4, 2025 — Source
Oracle Confirms Cloud Hack
Oracle has confirmed suffering a data breach but the tech giant is apparently trying to downplay the impact of the incident.
April 4, 2025 — Source
PoisonSeed phishing campaign behind emails with wallet seed phrases
A large-scale phishing campaign dubbed 'PoisonSeed' compromises corporate email marketing accounts to distribute emails containing crypto seed phrases used to drain cryptocurrency wallets.
April 4, 2025 — Source
Port of Seattle says ransomware breach impacts 90,000 people
Port of Seattle, the U.S. government agency overseeing Seattle's seaport and airport, is notifying roughly 90,000 individuals of a data breach after their personal information was stolen in an August 2024 ransomware attack.
April 4, 2025 — Source
State Bar of Texas Says Personal Information Stolen in Ransomware Attack
The State Bar of Texas is notifying thousands of individuals that their personal information was stolen in a February ransomware attack.
April 4, 2025 — Source
The best password managers for businesses: Expert tested
A secure password management system is a must for businesses of all sizes. Whether you want an enterprise-grade solution or a simple setup for a small business, these are the best options on the market.
April 4, 2025 — Source
The best travel VPNs: Expert tested
When you travel, it's important to protect your privacy with VPNs that shield you from spying and online tracking. Our top picks include features like fast speeds, expansive server networks, unlimited connections, and more.
April 4, 2025 — Source
Trump Fires NSA, Cyber Command Chief, Fueling Security Fears
Officials Warn Trump's Abrupt Firings Severely Weaken National Cyber Defenses
April 4, 2025 — Source or Source or Source or Source or Source
UK Home Office Ransom Ban Proposal Needs More Clarity
Cybersecurity Wonks Find Fault With Home Office Ransomware Proposals
April 4, 2025 — Source or Source or Source or Source or Source
US, Allies Warn of Threat Actors Using 'Fast Flux' to Hide Server Locations
US and allied countries warn of threat actors using the "fast flux" technique to change DNS records and hide malicious servers' locations.
April 4, 2025 — Source
What last year's biggest data breaches have taught us about authentication [Q&A]
According to the Identity Theft Resource Center (ITRC) there were 1.1 billion breaches in the first half of 2024 -- a 490 percent increase over the first half of the year before.
April 4, 2025 — Source
Internet — Security Issues — April 2nd, 2025
Apple Removes VPN Apps from App Store After Links to Chinese Military Are Found
Apple has removed two VPN applications, Thunder VPN and Snap VPN, from the App Store after reports surfaced regarding their links to a Chinese company with alleged military ties. The reports, conducted by the Tech Transparency Project and the Financial Times, say that these apps, along with three others, Turbo VPN, VPN Proxy Master, and Signal Secure VPN (unrelated to the Signal messaging app), are connected to Qihoo 360, a company sanctioned by the United States in 2020.
April 2, 2025 — Source
AVG Internet Security review: Reliable, budget-friendly antivirus software
AVG Internet Security rounds out the company's solid antivirus software with additional online protections, while not costing too much.
April 2, 2025 — Source
Best antivirus software 2025: Keep your PC safe from malware, spyware, and more
You need more than just prayer and luck—choose from our top antivirus software picks to stay safe.
April 2, 2025 — Source
Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities
Chrome 135 and Firefox 137 were released on Tuesday with fixes for several high-severity memory safety vulnerabilities.
April 2, 2025 — Source
Cisco warns of CSLU backdoor admin account used in attacks
Cisco has warned admins to patch a critical Cisco Smart Licensing Utility (CSLU) vulnerability, which exposes a built-in backdoor admin account now used in attacks.
April 2, 2025 — Source
Clicked on a phishing link? 7 steps to take immediately to protect your accounts
Phishing scams are becoming brutally effective, and even technically sophisticated people can be fooled. Here's how to limit the damage immediately and what to do next.
April 2, 2025 — Source
Counterfeit Android devices found preloaded with Triada malware
A new version of the Triada trojan has been discovered preinstalled on thousands of new Android devices, allowing threat actors to steal data as soon as they are set up.
April 2, 2025 — Source
Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion
Cyberhaven bags $100 million in funding at a billion-dollar valuation, a sign that investors remain bullish on data security startups.
April 2, 2025 — Source
Does a VPN really provide 100% privacy? Here's what you need to know
VPNs can help keep you private, but they won't make you disappear.
April 2, 2025 — Source
Elon Musk's X might have a mole problem: "How could someone enumerate all Twitter user IDs, unless they were an employee?"
X was hit by two major data breaches in 2023 and 2025, with the data belonging to over 200 million users, including 2.8 billion unique Twitter IDs, released to the public for free.
April 2, 2025 — Source
Email SecurityGoogle Brings End-to-End Encrypted Emails to All Enterprise Gmail Users
Gmail now allows enterprise users to send end-to-end encrypted emails to colleagues, and will soon allow sending to any inbox.
April 2, 2025 — Source
Exabeam Nova accelerates threat detection and response
Exabeam unveiled Exabeam Nova, an autonomous AI agent delivering actionable intelligence that enables security teams to respond faster to incidents, reduce investigation times by over 50%, and mitigate threats more effectively.
April 2, 2025 — Source
Google DeepMind Unveils Framework to Exploit AI's Cyber Weaknesses
DeepMind found that current AI frameworks are ad hoc, not systematic, and fail to provide defenders with useful insights.
April 2, 2025 — Source
How to map and manage your cyber attack surface with EASM
In today's digital landscape, understanding your organization's attack surface is crucial for maintaining robust cybersecurity. To effectively manage and mitigate the cyber-risks hiding in modern attack surfaces, it's important to adopt an attacker-centric approach.
April 2, 2025 — Source
ImageRunner Flaw Exposed Sensitive Information in Google Cloud
Google has patched a Cloud Run vulnerability dubbed ImageRunner that could have been exploited to gain access to sensitive data.
April 2, 2025 — Source
Microsoft's 'ultimate goal is to remove passwords completely' — this overhaul could make it happen
The new interface for logging into a Microsoft account is optimized for a passwordless setup and using passkeys.
April 2, 2025 — Source
Nation-StateLazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks
North Korea's Lazarus hackers are using the ClickFix technique for malware deployment in fresh attacks targeting the cryptocurrency ecosystem.
April 2, 2025 — Source
North Korea's IT Operatives Are Exploiting Remote Work Globally
The global rise of North Korean IT worker infiltration poses a serious cybersecurity risk—using fake identities, remote access, and extortion to compromise organizations.
April 2, 2025 — Source
North Korean IT workers set their sights on European organizations
North Korean IT workers are expanding their efforts beyond the US, and are seeking to fraudulently gain employment with organizations around the world, but most especially in Europe.
April 2, 2025 — Source
Oracle's masterclass in breach comms: Deny, deflect, repeat
Fallout shows how what you say must be central to disaster planning
April 2, 2025 — Source
Police shuts down KidFlix child sexual exploitation platform
Kidflix, one of the largest platforms used to host, share, and stream child sexual abuse material (CSAM) on the dark web, was shut down on March 11 following a joint action coordinated by German law enforcement.
April 2, 2025 — Source
Politically motivated DDoS attacks target critical infrastructure
Distributed Denial of Service (DDoS) attacks have become a dominant means of waging cyberwarfare linked to socio-political events such as elections, civil protests and policy disputes, according to the latest DDoS Threat Intelligence Report from NetScout.
April 2, 2025 — Source
Questions Remain Over Attacks Causing DrayTek Router Reboots
DrayTek has shared some clarifications regarding the recent attacks causing router reboots, but some questions remain unanswered.
April 2, 2025 — Source
Should You Use an Identity Theft Protection Service? 3 Things to Consider
Knowledge is your greatest weapon against fraud, and these services could help to provide the tools you need.
April 2, 2025 — Source
Strengthening Our App Ecosystem: Enhanced Tools for Secure & Efficient Development
Knowing that you're building on a safe, secure ecosystem is essential for any app developer. We continuously invest in protecting Android and Google Play, so millions of users around the world can trust the apps they download and you can build thriving businesses. And we're dedicated to continually improving our developer tools to make world--class security even easier to implement.
April 2, 2025 — Source
The core pillars of cyber resiliency
As we enter a new era of cybersecurity threats, which has prompted the evolution of new vulnerabilities, organizations are challenged on how to best respond to these evolving attacks. The threat landscape is more complex than ever causing organizations to grapple with new tactics to safeguard their critical data.
April 2, 2025 — Source
The rise of the 'gray bots' targeting websites for data
We all know about good bots like search engine crawler bots, SEO bots, and customer service bots. And we know about bad bots, designed for malicious or harmful online activities like breaching accounts to steal personal data or commit fraud.
April 2, 2025 — Source
Travelers Cyber Risk Services reduces the risk of a cyberattack
The Travelers Companies announced Travelers Cyber Risk Services, a suite of capabilities added to all cyber liability policies designed to help lower both the risk of a cyberattack and the cost to recover from one.
April 2, 2025 — Source
Watch out! Don't fall victim to these fake CAPTCHA scams on the web
Fake CAPTCHA tests are increasingly being used by hackers to spread malware. Here's what you need to know.
April 2, 2025 — Source
What NIS2 implementation means for enterprises [Q&A]
As cyberattacks across sectors continue to rise, businesses face pressure to enhance their security postures amid budget restraints and operational challenges.
April 2, 2025 — Source
X Breach: Here's what hackers can do with the leaked information
Don't fall for phishing emails related to the leak.
April 2, 2025 — Source
Internet — Security Issues — March 31st, 2025
6 Best Password Recovery Tools
Looking for a trustworthy password recovery tool? Use our guide to review our editorial picks and compare pricing, features, pros and cons.
March 31, 2025 — Source
A Peek Into How AI 'Thinks' - and Why It Hallucinates
Researchers Try to Determine What Happens Between Input and Output
March 31, 2025 — Source or Source or Source or Source or Source
Are Passwords Dead? What Are Passkeys, and Why Everyone's Talking About Them
Passkeys Explained
March 31, 2025 — Source
Best free antivirus 2025: Keep your PC safe without spending a dime
Many of the big names in antivirus offer a free version of their security suites. Here are our top choices for free antivirus.
March 31, 2025 — Source
Canada launches breach risk self-assessment online tool
Privacy Commissioner of Canada Philippe Dufresne has launched a new online tool that will help businesses and federal institutions that experience a privacy breach to assess whether the breach is likely to create a real risk of significant harm to individuals.
March 31, 2025 — Source
Check Point Breach 'Very Pinpointed Event'
Hackers Claim on BreachForums to Have Stolen 'Highly Sensitive' Data
March 31, 2025 — Source or Source
CISA Analyzes Malware Used in Ivanti Zero-Day Attacks
CISA has published its analysis of Resurge, a SpawnChimera malware variant used in attacks targeting a recent Ivanti Connect Secure zero-day.
March 31, 2025 — Source
CISA reveals new malware variant used on compromised Ivanti Connect Secure devices
CISA has released indicators of compromise, detection signatures, and updated mitigation advice for rooting out a newly identified malware variant used by the attackers who breached Ivanti Connect Secure VPN appliances in December 2024 by exploiting the CVE-2025-0282 zero-day.
March 31, 2025 — Source
'Crocodilus' Android Banking Trojan Allows Device Takeover, Data Theft
The newly identified Android banking trojan Crocodilus takes over devices, enabling overlay attacks, remote control, and keylogging.
March 31, 2025 — Source
EU invests €1.3 billion in AI and cybersecurity
The European Commission has approved the 2025-2027 Digital Europe Programme (DIGITAL) work program, allocating €1.3 billion to advance key technologies essential for the EU's future and technological sovereignty.
March 31, 2025 — Source
FTC: 23andMe's Buyer Must Uphold Co.'s Data Privacy Pledge
Letter to Bankruptcy Trustee Says 23andMe's Privacy Promises Must Carry Over
March 31, 2025 — Source or Source or Source or Source
GovernmentPart of EU's New €1.3 Billion Investment Going to Cybersecurity
The European Commission plans on investing €1.3 billion ($1.4 billion) in cybersecurity, artificial intelligence and digital skills.
March 31, 2025 — Source
Hackers abuse WordPress MU-Plugins to hide malicious code
Hackers are utilizing the WordPress mu-plugins ("Must-Use Plugins") directory to stealthily run malicious code on every page while evading detection.
March 31, 2025 — Source
Hacker Leaks Samsung Customer Data
Hacker leaks 270,000 customer tickets allegedly stolen from Samsung Germany using long-compromised credentials.
March 31, 2025 — Source
North Korean hackers adopt ClickFix attacks to target crypto firms
The notorious North Korean Lazarus hacking group has reportedly adopted 'ClickFix' tactics to deploy malware targeting job seekers in the cryptocurrency industry, particularly centralized finance (CeFi).
March 31, 2025 — Source
Oracle Health Responding to Hack of Legacy Cerner EHR Data
Customer Credentials Possibly Compromised at EHR Vendor Acquired by Oracle in 2022
March 31, 2025 — Source or Source or Source or Source or Source
Privacy died last century, the only way to go is off-grid
From smartphones to surveillance cameras to security snafus, there's no escape
March 31, 2025 — Source
Ransomware crews add 'EDR killers' to their arsenal -- and some aren't even malware
Crims are disabling security tools early in attacks, Talos says
March 31, 2025 — Source
Rootkit, Backdoor and Tunneler: Ivanti Malware Does It All
CISA Publishes Anatomy of Advanced Ivanti VPN Malware
March 31, 2025 — Source or Source
senhasegura rebrands as Segura, marking a new chapter in identity security
senhasegura, a globally recognized leader in Privileged Access Management (PAM), announces its evolution into Segura, marking a new chapter for the company and its mission to deliver futureproof identity security.
March 31, 2025 — Source
Speed versus Security: The Digital Bank Dilemma
Jason Costain on Ways Traditional and Digital Banks Could Learn from Each Other
March 31, 2025 — Source or Source or Source
Standardized security playbooks can improve protection against cyberattacks
One attack, many responses—organizations use various solutions to ward off online attacks. The playbooks that outline countermeasures also vary in their specifics. In the CyberGuard project, Fraunhofer researchers are working on standardized playbooks to help companies optimize their security strategies and align them with each other. The playbooks are generated by large language models and support the automation of IT security.
March 31, 2025 — Source
Threat Actors Deploy WordPress Malware in 'mu-plugins' Directory
Sucuri has discovered multiple malware families deployed in the WordPress mu-plugins directory to evade routine security checks.
March 31, 2025 — Source
What users need to know about privacy and data after 23andMe's bankruptcy filing
23andMe, one of the first companies to provide direct-to-consumer genetic testing kits, has filed for bankruptcy. Since its founding in 2006, it has sold over 12 million DNA kits, with high-profile users including Oprah Winfrey and Warren Buffett.
March 31, 2025 — Source
Windows 11 quick machine recovery: Restoring devices with boot issues
Microsoft has rolled out quick machine recovery, a new Windows feature aimed at preventing prolonged widespread outages like the one caused by a faulty CrowdStrike update in July 2024.
March 31, 2025 — Source
Zero to Hero -- A "Measured" Approach to Building a World-Class Offensive Security Program
A strong security program will sometimes require substantial organizational and cultural changes around security practices, and inevitably, a higher cost.
March 31, 2025 — Source
Internet — Security Issues — March 28th, 2025
Again and again, NSO Group's customers keep getting their spyware operations caught
The two journalists, who work for the Serbia-based Balkan Investigative Reporting Network (BIRN), received suspicious text messages including a link — basically a phishing attack, according to the nonprofit. In one case, Amnesty said its researchers were able to click on the link in a safe environment and see that it led to a domain that they had previously identified as belonging to NSO Group's infrastructure.
March 28, 2025 — Source
Already using random passwords? Great. It's still not enough
Times are changing.
March 28, 2025 — Source
Cardiff's children's chief confirms data leak 2 months after cyber risk was 'escalated'
Department director admits Welsh capital's council still trying to get heads around threat of dark web leaks
March 28, 2025 — Source
Cloudflare open sources OPKSSH to bring Single Sign-On to SSH
OPKSSH (OpenPubkey SSH) makes it easy to authenticate to servers over SSH using OpenID Connect (OIDC), allowing developers to ditch manually configured SSH keys in favor of identity provider-based access.
March 28, 2025 — Source
Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware
Analysis found that 99% of healthcare organizations are vulnerable to publicly available exploits.
March 28, 2025 — Source
Critical Firefox, Tor Browser sandbox escape flaw fixed (CVE-2025-2857)
Google's fixing of CVE-2025-2783, a Chrome zero-day vulnerability exploited by state-sponsored attackers, has spurred Firefox developers to check whether the browser might have a similar flaw -- and they found it.
March 28, 2025 — Source
Cyber threats to elections
Cyber threat activity targeting democratic processes is on the rise worldwide. Leading up to and during an election, cyber threat actors may launch cyber attacks to:
March 28, 2025 — Source
Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia
Firefox developers have determined that their browser is affected by a vulnerability similar to the recent Chrome sandbox escape zero-day.
March 28, 2025 — Source
Fresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europe
The Grandoreiro banking trojan has reemerged in new campaigns targeting users in Latin America and Europe.
March 28, 2025 — Source
How Enterprises Can Mitigate the Quiet Threat of Shadow AI
C-Suite Strategies for AI Risk Management, Data Protection
March 28, 2025 — Source or Source
How the FBI Tracked, and Froze, Millions Sent to Criminals in Massive Caesars Casino Hack
A new court document shows the FBI raced to stop hackers moving the ransom Caesars paid, with authorities freezing much of the extortion payment.
March 28, 2025 — Source
In Other News: Hellcat Hackers Unmasked, CrushFTP Bug Controversy, NYU Hacked
Noteworthy stories that might have slipped under the radar: Key members of Hellcat ransomware group identified, controversy around CrushFTP flaw CVE, NYU website hacked and defaced.
March 28, 2025 — Source
ISMG Editors: Ransomware's Stealth versus Spectacle Tactics
Also: Rapid7's Boardroom Shake-Up, China's Tactical Cyber Shift
March 28, 2025 — Source or Source or Source or Source or Source
Microsoft Makes A Big Security Change Impacting Over 1 Billion Users
We've reported a number of sophisticated cyberattacks where threat actors circumvent 2FA restrictions. In response to the increased vulnerability of passwords, Microsoft has announced a major change in its authentication requirements that will affect over a billion users. This change will see a significant shift from passwords to passkeys. Microsoft believes that by the end of April, it will have made a passwordless sign-in experience possible for most users worldwide.
March 28, 2025 — Source
Microsoft's passwordless future is here for Outlook, Xbox, 365, and more
Microsoft's new sign-in screens push you to finally ditch passwords - here's how.
March 28, 2025 — Source
New banking trojan targets 750+ finance & crypto Android apps
Downloading apps from outside the Play Store without being 100% sure of their legitimacy or that they come from a reliable source isn't the best idea. This is the starting point for many malware attacks. Bad actors take advantage of the ignorance or naivety of internet users. A new banking trojan targeting Android devices has emerged as a reminder.
March 28, 2025 — Source
New Issuance Requirements Improve HTTPS Certificate Validation
HTTPS certificate issuance now requires Multi-Perspective Issuance Corroboration and linting to improve validation.
March 28, 2025 — Source
Nir Zuk: Google's Multi-Cloud Security Strategy Won't Work
Palo Alto Networks Founder Says Customers Prefer Independent Multi-Cloud Solutions
March 28, 2025 — Source or Source or Watch Video or Source
Oracle Health breach compromises patient data at US hospitals
A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from legacy servers.
March 28, 2025 — Source
Over 60 percent of malicious traffic targets retailers ahead of PCI DSS 4.0 deadline
As we approach the 31st March deadline for compliance with the new PCI DSS 4.0 payment security standard, new data from Cequence Security shows automated fraud is increasing with retailers facing 66.5 percent of all malicious traffic.
March 28, 2025 — Source
Report: Top Trump Officials' Private Data Leaked
Private Details of Top Trump Officials Found Online Amid Growing Security Scandal
March 28, 2025 — Source or Source or Source
Retail giant Sam's Club investigates Clop ransomware breach claims
Sam's Club, an American warehouse supermarket chain owned by U.S. retail giant Walmart, is investigating claims of a Clop ransomware breach.
March 28, 2025 — Source
Revenue Cycle Management Firm Hack Affects Patients, Clients
Incident Spotted in March 2024 Is Yet Another Attack Against Medical Billing Firms
March 28, 2025 — Source or Source or Source
Security in the CI/CD Pipeline
Secure CI/CD pipelines with integrated security checks, static analysis, dependency scanning, and container security to prevent vulnerabilities in production.
March 28, 2025 — Source
Speed versus Security: The Digital Bank Dilemma
Jason Costain on Ways Traditional and Digital Banks Could Learn from Each Other
March 28, 2025 — Source or Source or Source or Source or Source
Top firewall management challenges for large enterprises
Network security issues are among the most significant challenges for larger enterprises. In fact, a UK government Cyber Security Breach Survey revealed that 50% of all businesses in the United Kingdom were targeted by cyberattacks between 2023 and 2024.
March 28, 2025 — Source
U.S. officials in Signal chat left their Venmo data exposed online
The tech security breaches involving U.S. officials show no signs of slowing.
March 28, 2025 — Source
Internet — Security Issues — March 24th, 2025
23andMe faces an uncertain future — so does your genetic data
DNA and genetic testing firm 23andMe is in turmoil following a 2023 data breach and its ongoing financial decline. The once-pioneering giant now faces an uncertain future as bankruptcy looms over the company, intensifying concerns about what might happen to the genetic data of 23andMe's some 15 million customers.
March 24, 2025 — Source
AI-driven phishing scams exploded last year. The trend continues in 2025
Phishing scams are already hard to spot, but AI is making them more deceptive and more dangerous than ever.
March 24, 2025 — Source
Albabat Ransomware Expands Targets, Abuses GitHub
New versions of the Albabat ransomware target Windows, Linux, and macOS, and retrieve configuration files from GitHub.
March 24, 2025 — Source
Alleged Snowflake hacker agrees to be extradited to the US
Connor Moucka faces 20 federal charges connected to data breaches that hit companies like Ticketmaster and AT&T.
March 24, 2025 — Source
API Security: Another Critical Asset Under Threat
Adam Arellano of Traceable by Harness on Creating Multi-Layered Defense
March 24, 2025 — Source or Source or Source or Source
As nation-state hacking becomes 'more in your face,' are supply chains secure?
Ex-US Air Force officer says companies shouldn't wait for govt mandates
March 24, 2025 — Source
Chinese Weaver Ant hackers spied on telco network for 4 years
A China-linked advanced threat group named Weaver Ant spent more than four years in the network of a telecommunications services provider, hiding traffic and infrastructure with the help of compromised Zyxel CPE routers.
March 24, 2025 — Source
Critical Next.js auth bypass vulnerability opens web apps to compromise (CVE-2025-29927)
A critical vulnerability (CVE-2025-29927) in the open source Next.js framework can be exploited by attackers to bypass authorization checks and gain unauthorized access to web pages they should no have access to (e.g., the web app's admin panel).
March 24, 2025 — Source or Source
Cyberattack disrupts train ticket sales in Ukraine
Ukraine's state-owned railway operator Ukrzaliznytsia said Monday that it was hit by a large-scale cyberattack.
March 24, 2025 — Source or Source
'Delete your data': Genetic testing firm 23andMe files for bankruptcy
Pioneering US genetic testing company 23andMe has filed for bankruptcy and is looking for a buyer two years after hackers gained access to millions of profiles.
March 24, 2025 — Source
Despite Rip-and-Replace Efforts, FCC Suspects Banned Chinese Telecom Providers Still Active in US
The FCC is investigating whether Chinese firms such as Huawei, ZTE and China Telecom are still operating in the US.
March 24, 2025 — Source
Encrypted Messaging Apps Promise Privacy. Government Transparency Is Often the Price
Public officials and private citizens are consistently warned about hacking and data leaks, but technologies designed to increase privacy often decrease government transparency.
March 24, 2025 — Source
FBI Reveals the Dark Side of Free Online File Conversion Tools
We often find ourselves needing to convert or merge files. However, not all of us have software installed on our PCs to perform that task. In this case, many of us turn to the internet to search for free online file converter tools. While these file converter tools do the job we need, they could be stealing our info or injecting malware on our devices, warns the FBI.
March 24, 2025 — Source
FBI Warns Millions Of Drivers To Beware Of Unpaid Toll Road SMS Scam
In today's high-tech world, some toll roads keep the traffic moving by using transponders and cameras, rather than requiring that every driver come to a full stop to shove money into a machine (or into the hands of a gatekeeper). Mistakes can happen, though, and the FBI issued a warning to hundreds of millions of commuters to be on the lookout for fraudulent text messages claiming an unpaid toll is owed.
March 24, 2025 — Source
Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks
As businesses continue to migrate their operations to the cloud, maintaining and managing the security of these environments has become mission-critical. Microsoft 365 is a widely adopted suite of productivity tools, but relying solely on its built-in security features may leave organizations vulnerable to significant risks.
March 24, 2025 — Source
How AI, corruption and digital tools fuel Europe's criminal underworld
Europol has released its 2025 report on serious and organized crime in the EU. The EU Serious and Organised Crime Threat Assessment (EU-SOCTA) is based on intelligence from EU countries and global law enforcement. The findings are stark. Organized crime is becoming more complex and harmful, with deeper roots across Europe.
March 24, 2025 — Source
I'm watching out for personalized scams. You should, too
A strong first line of defense is awareness.
March 24, 2025 — Source
iProov Workforce MFA mitigates risk of account takeovers
iProov launched iProov Workforce MFA. This device-independent, FIDO Alliance-certified, biometric authentication solution helps organizations mitigate the risk of one of workforce security's most crucial concerns: account takeover.
March 24, 2025 — Source
Is your Windows PC's security firewall good enough? An explainer
Does the Windows firewall protect your computer sufficiently? What contribution does your router make -- and who needs additional security software? This article explains.
March 24, 2025 — Source
Malware strikes again. I'm starting to worry about Steam's lax security
For the second time in two months, a new Steam game listing has been used to spread malware.
March 24, 2025 — Source
Medusa Ransomware Brings Its Own Vulnerable Driver
Hackers Use Stolen Certificates to Bypass Endpoint Detection and Response
March 24, 2025 — Source or Source or Source or Source or Source
NetSfere Launches Quantum-Resilient Messaging Platform for Enterprise and Government Use
NetSfere Integrates ML-KEM and AES into its text, voice and video messaging platform to meet 2027 NSA Quantum Security mandates.
March 24, 2025 — Source
New VanHelsing ransomware targets Windows, ARM, ESXi systems
A new multi-platform ransomware-as-a-service (RaaS) operation named VanHelsing has emerged, targeting Windows, Linux, BSD, ARM, and ESXi systems.
March 24, 2025 — Source
NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD
The effects of the backlog are already being felt in vulnerability management circles where NVD data promises an enriched source of truth.
March 24, 2025 — Source
Oracle Denies Cloud Breach After Hacker Offers to Sell Data
Oracle has denied that Cloud systems have been breached after a hacker claimed to have stolen millions of records.
March 24, 2025 — Source or Microsoft announces security AI agents to help overwhelmed humans
Microsoft has six new security agents that can do things like process phishing and data loss alerts
March 24, 2025 — Source or Source
Proof of Concept: Is the US Losing Its Cyber Grip?
Cunningham and Daniel Warn That Poor Leadership, Cuts Are Hurting US Cyber Posture
March 24, 2025 — Source or Source
Report: Fortune 500 employee-linked account exposure
A backbone of our economy, Fortune 500 companies employ more than 31 million people worldwide.
March 24, 2025 — Source
Rethinking risk -- are you taking the right path around security?
In the film Sliding Doors, a split second choice leads to two branching stories -- yet while the two stories are very different, they both lead to hospital trips and potential tragedy. The world of cyber security is similar. Whatever decisions we make, we are still under pressure and we will -- eventually, whatever we do -- end up facing significant risk.
March 24, 2025 — Source
Russian Firm Offers $4 Million for Telegram Exploits
A Russian exploit acquisition firm is offering up to $4 million for a full-chain exploit targeting messaging service Telegram.
March 24, 2025 — Source
Secure by Design Must Lead Software Development
Crossley of Schneider Electric Urges Supplier Scrutiny and Continuous Risk Review
March 24, 2025 — Source or Source or Source or Source or Source
Tencent Says It Does More in AI With Fewer GPUs
Not Every New Generation of LLM Needs Exponentially More Chips, Says Tencent Exec
March 24, 2025 — Source or Source or Source or Source
US Lifts Sanctions Against Crypto Mixer Tornado Cash
The US Department of the Treasury has removed sanctions against the fully decentralized cryptocurrency mixer service Tornado Cash.
March 24, 2025 — Source or Source
Using security information and event management tools to manage cyber security risks (ITSM.80.024)
This publication provides large organizations and enterprises with advice and guidance related to security information and event management (SIEM) solutions. SIEM solutions are sets of tools and services that collect, aggregate and analyze volumes of data from multiple sources in real time. SIEMs are an important enterprise security solution to incorporate in a defence-in-depth approach to cyber security and risk management.
March 24, 2025 — Source
Wheelchair Firm Ramps Up Notices to 500,000 for Email Hack
Large Health Data Breach Started With Phishing Lure in Employees' Email
March 24, 2025 — Source or Source or Source or Source or Source
Why we need to focus on mobile device security [Q&A]
When getting a new smartphone most people focus on features and pricing, while security tends to be overlooked. But as we access the internet more using mobile devices, protecting users' personal information, transactions, and digital identities is vital.
March 24, 2025 — Source
Internet — Security Issues — March 21st, 2025
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
March 21, 2025 — Source
A Win for Encryption: France Rejects Backdoor Mandate
In a moment of clarity after initially moving forward a deeply flawed piece of legislation, the French National Assembly has done the right thing: it rejected a dangerous proposal that would have gutted end-to-end encryption in the name of fighting drug trafficking. Despite heavy pressure from the Interior Ministry, lawmakers voted Thursday night (article in French) to strike down a provision that would have forced messaging platforms like Signal and WhatsApp to allow hidden access to private conversations.
March 21, 2025 — Source
AI-driven phishing scams exploded last year. The trend continues in 2025
Phishing scams are already hard to spot, but AI is making them more deceptive and more dangerous than ever.
March 21, 2025 — Source
China Borrows From Feds' Anti-Hacker Psychological Playbook
Supposed Taiwanese State Hackers Unmasked by China's Ministry of State Security
March 21, 2025 — Source or Source or Source or Source
Chinese Hackers Exploit Unpatched Servers in Taiwan
UAT-5918 Breaches Taiwan's Critical Sectors Using N-Day Flaws for Cyberespionage
March 21, 2025 — Source or Source or Source
Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley
The FishMonger APT group, a subdivision of Chinese cybersecurity firm I-Soon, compromised seven organizations in a 2022 campaign.
March 21, 2025 — Source
Enterprise AI usage surges but security worries remain
A new report from Zscaler reveals a 3,000 percent year-on-year growth in enterprise use of AI/ML tools, highlighting the rapid adoption of AI technologies across industries to unlock new levels of productivity, efficiency, and innovation.
March 21, 2025 — Source
Fake Out: Babuk2 Ransomware Group Claims Bogus Victims
What Do You Mean, Hospital-Targeting Sociopath Ransomware Wielders Continue to Lie?
March 21, 2025 — Source or Source or Source or Source or Source
Former NFL, Michigan Assistant Coach Matt Weiss Charged With Hacking for Athletes' Intimate Photos
Former NFL and University of Michigan assistant football coach Matt Weiss hacked into the computer accounts of thousands of college athletes seeking intimate photos and videos.
March 21, 2025 — Source
Fortinet-Targeting Ransomware Attacks Leave Devices Patched
'Wave of Ransomware Attacks' Hitting FortiOS and FortiProxy Devices, Warn Experts
March 21, 2025 — Source or Source or Source or Source
Google Maps yanks over 10,000 fake business listings - how to spot the scam
The fake listings were part of a scam that used the old bait-and-switch tactic to prey on people - and there may be more lurking out there.
March 21, 2025 — Source
Google search might be sharing your home address. Here's how to stop it
Fully restoring your anonymity is a two-step process.
March 21, 2025 — Source
How cyber security experts are fighting AI-generated threats
AI-powered cyber security is critical to staying ahead of attackers
March 21, 2025 — Source
How Google-Wiz Deal Counters Microsoft Defender's Dominance
Google Aims to Match Microsoft Defender With $32B Buy of Wiz's Cloud Security Tech
March 21, 2025 — Source or Source or Source or Source or Source
Impact, Root Cause of GitHub Actions Supply Chain Hack Revealed
More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.
March 21, 2025 — Source
In Other News: Critical Chrome Bug, Capital One Hacker Resententencing, Story of Expat Flaw
Noteworthy stories that might have slipped under the radar: Capital One hacker's sentence reversed, Google patches critical Chrome vulnerability, the story of an Expat flaw.
March 21, 2025 — Source
ISMG Editors: Impact of Google's $32B Buy on Cloud Security
Also: Trump's Cybersecurity Shake-Up, IBM's X-Force Event Highlights
March 21, 2025 — Source or Source or Source or Source or Source
Malicious ads target Semrush users to steal Google account credentials
Cyber crooks are exploiting users' interest in Semrush, a popular SEO, advertising, and market research SaaS platform, to steal their Google account credentials.
March 21, 2025 — Source
NAKIVO Backup & Replication vulnerability exploited by attackers (CVE-2024-48248)
A vulnerability (CVE-2024-48248) in NAKIVO Backup and Replication, a backup, ransomware protection and disaster recovery solution designed for organizations of all sizes and managed service providers (MSPs), is being actively exploited.
March 21, 2025 — Source
New Jailbreak Technique Uses Fictional World to Manipulate AI
Cato Networks discovers a new LLM jailbreak technique that relies on creating a fictional world to bypass a model's security controls.
March 21, 2025 — Source
Ransomware Group Claims Attack on Virginia Attorney General's Office
The Cloak ransomware group has claimed responsibility for a February cyberattack on Virginia Attorney General's Office
March 21, 2025 — Source
Ransomware readiness -- how boards can lead the charge against cyber threats [Q&A]
Ransomware attacks are increasingly targeting organizations across industries, with the potential to cause devastating financial, operational, and reputational damage.
March 21, 2025 — Source
Russian zero-day seller is offering up to $4 million for Telegram exploits
Operation Zero, a company that acquires and sells zero-days exclusively to the Russian government and local Russian companies, announced on Thursday that it's looking for exploits for the popular messaging app Telegram, and is willing to offer up to $4 million for them.
March 21, 2025 — Source
Shifting the Mindset from Cost Center to Revenue Generator
How Strong AML and Fraud Prevention Controls Can Differentiate Your Fintech and Help You Scale
March 21, 2025 — Source or Source
Software Firm Notifying Patients, Practices of Data Exposure
Researcher Found Unsecured Database Server Containing 1,864 GB of OrthoMinds' Data
March 21, 2025 — Source or Source or Source or Source or Source
Steam pulls game demo infecting Windows with info-stealing malware
Valve has removed from its Steam store the game title 'Sniper: Phantom's Resolution' following multiple users reporting that the demo installer infected their systems with information stealing malware.
March 21, 2025 — Source
Tech Giants, Utility Firms Form AI Consortium
Open Power AI Consortium Members Include Nvidia and Microsoft
March 21, 2025 — Source or Source or Source or Source or Source or Source
US removes sanctions against Tornado Cash crypto mixer
The U.S. Department of Treasury announced today that it has removed sanctions against Tornado Cash, a cryptocurrency mixer used by North Korean Lazarus hackers to launder hundreds of millions stolen in multiple crypto heists.
March 21, 2025 — Source
Watch on Demand: Supply Chain & Third-Party Risk Security Summit
Join the virtual event as we explore of the critical nature of software and vendor supply chain security issues.
March 21, 2025 — Source
Internet — Security Issues — March 17th, 2025
100 Car Dealerships Hit by Supply Chain Attack
The websites of over 100 auto dealerships were found serving malicious ClickFix code in a supply chain compromise.
March 17, 2025 — Source
8,000 New WordPress Vulnerabilities Reported in 2024
Nearly 8,000 new vulnerabilities affecting the WordPress ecosystem were reported last year, nearly all in plugins and themes.
March 17, 2025 — Source
Accounting Firm Notifying 217,000 of Health Data Hack
CPA Says Clients' Employee Benefit Plan Information Compromised in 2024 Incident
March 17, 2025 — Source or Source or Source or Source or Source
Amazon Will Listen to All Your Voice Recordings If You Use Alexa+
Amazon is nixing one of the few privacy protections against accessing users' voice data, and you can blame AI for the change.
March 17, 2025 — Source
Bedrock Security's metadata lake technology strengthens data security
Bedrock Security is declaring an end to data security without data visibility with the launch of its metadata lake technology — a centralized repository powering the patented Bedrock Platform.
March 17, 2025 — Source
Cloudflare boosts defenses against future quantum threats
Cloudflare announced that it is expanding end-to-end support for post-quantum cryptography to its Zero Trust Network Access solution.
March 17, 2025 — Source
Critical RCE flaw in Apache Tomcat actively exploited in attacks
A critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild, enabling attackers to take over servers with a simple PUT request.
March 17, 2025 — Source
Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum
Exploits swirling for remote code execution vulnerability (CVE-2025-24813) in open-source Apache Tomcat web server.
March 17, 2025 — Source
GitHub project maintainers targeted with fake security alert
A phishing campaign targeting GitHub account owners has been trying to scare them with a fake security alert into allowing a malicious OAuth app access to their account and repositories.
March 17, 2025 — Source
GitHub supply chain attack spills secrets from 23,000 projects
Large organizations among those cleaning up the mess
March 17, 2025 — Source
Google, OpenAI Push Urges Trump to Ease AI Export Controls
AI Giants Also Like 'Fair Use' Exemptions for Copyrighted Material
March 17, 2025 — Source or Source or Source or Source or Source
Hackers are exploiting Fortinet firewall bugs to plant ransomware
Security researchers have observed hackers linked to the notorious LockBit gang exploiting a pair of Fortinet firewall vulnerabilities to deploy ransomware on several company networks.
March 17, 2025 — Source
How to encrypt and secure sensitive files on macOS
Encrypting files keeps sensitive data like personal details, finances, and passwords safe from attackers by making them unreadable to unauthorized users. Encryption also safeguards data in case of device loss or theft, preventing malicious actors from accessing or misusing the information even if the drive is removed.
March 17, 2025 — Source
How to take back control after your data was breached
5 things to do when your personal information is at risk following a data leak.
March 17, 2025 — Source
Medusa Ransomware Strikes 300+ Targets: FBI & CISA Urge Immediate Action to #StopRansomware
Medusa ransomware now operates as a RaaS model, recruiting affiliates from criminal forums to launch attacks, encrypt data, and extort victims worldwide.
March 17, 2025 — Source
Microsoft 365 Targeted in New Phishing, Account Takeover Attacks
Threat actors are abusing Microsoft 365 infrastructure in a BEC campaign, and target its users in two brand impersonation campaigns.
March 17, 2025 — Source
NIST Announces HQC as Fifth Standardized Post Quantum Algorithm
First choices for both KEMs and DSAs are already standardized, and organizations should not wait for the backups to be available before migrating to PQC.
March 17, 2025 — Source
NordPass versus Bitwarden: Which Is Safer and Easier to Use in 2025?
Which is better, NordPass or Bitwarden? This guide provides a detailed comparison of their features, security and pricing to help you choose your best fit.
March 17, 2025 — Source
Nvidia Patches Vulnerabilities That Could Let Hackers Exploit AI Services
Vulnerabilities in Nvidia Riva could allow hackers to abuse speech and translation AI services that are typically expensive.
March 17, 2025 — Source
Popular GitHub Action Targeted in Supply Chain Attack
The tj-actions/changed-files GitHub Action, which is used in 23,000 repositories, has been targeted in a supply chain attack.
March 17, 2025 — Source
Rethinking Insider Risk in an AI-Driven Workplace
Carnegie Mellon CERT's Dan Costa on Addressing Root Causes of Insider Risk
March 17, 2025 — Source or Source or Source or Source or Source
Supply chain attack on popular GitHub Action exposes CI/CD secrets
A supply chain attack on the widely used 'tj-actions/changed-files' GitHub Action, used by 23,000 repositories, potentially allowed threat actors to steal CI/CD secrets from GitHub Actions build logs.
March 17, 2025 — Source
Supply Chain Attack Targets GitHub Repositories and Secrets
Over 23,000 Code Repositories at Risk After Malicious Code Added to GitHub Actions
March 17, 2025 — Source or Source or Source or Source
TikTok's New Security Dashboard Makes It Easier to Lock Down Your Account
TikTok wants to give people greater visibility and control over their accounts.
March 17, 2025 — Source
Top Security Automation Tools for Auto-Remediation
Speed is vital in cybersecurity, and auto-remediation tools help by quickly detecting and mitigating risks, boosting response efficiency
March 17, 2025 — Source
Internet — Security Issues — March 14th, 2025
Accused LockBit ransomware developer extradited to the US
Rostislav Panev, a 51-year-old dual Russian and Israeli national who is accused of being a key developer for the notorious LockBit ransomware gang, has been extradited from Israel to the United States, the Department of Justice announced on Thursday.
March 14, 2025 — Source
AdGuard brings full-system ad blocking to Linux with new standalone app
For many years now, Linux users looking to block ads have needed to piece together a mixture of browser extensions, DNS-based filtering, and network-wide tools (such as Pi-hole). While these solutions certainly help, none of them offer complete system-wide protection.
March 14, 2025 — Source
ClickFix Widely Adopted by Cybercriminals, APT Groups
The ClickFix technique has been employed by cybercrime and APT groups for information stealer and other malware deployment.
March 14, 2025 — Source
Corero Network Security expands AI capabilities across its portfolio
Corero Network Security announced the strategic advancement of AI capabilities across its product portfolio and operations—building on a long-standing legacy of intelligent, adaptive security solutions.
March 14, 2025 — Source
DeepSeek-R1 Can Almost Generate Malware
DeepSeek Comes Very Close to Producing a Keylogger and Ransomware
March 14, 2025 — Source or Source or Source or Source or Source
In Other News: Swiss Breach Disclosure Rules, ESP32 Chip Backdoor Disputed, MassJacker
Noteworthy stories that might have slipped under the radar: Switzerland requires disclosure of critical infrastructure attacks, ESP32 chips don't contain a backdoor, MassJacker cryptojacking malware.
March 14, 2025 — Source
Insurer Notifying 335,500 Customers, Agents, Others of Hack
Texas Incident Is the Largest Breach Reported by a Health Plan So Far in 2025
March 14, 2025 — Source or Source or Source or Source or Source
ISMG Editors: The X Outage - When DDoS and Politics Converge
Also: Gartner's Sydney Summit Highlights, Rising OT Security Risks
March 14, 2025 — Source or Source or Source or Source or Source
LockBit Ransomware Developer Extradited to US
Russian-Israeli LockBit ransomware developer Rostislav Panev has been extradited from Israel to the United States.
March 14, 2025 — Source
New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI Models
Measure the different level of risk inherent to all gen-AI foundational models and use that to fine-tune the operation of in-house AI deployments.
March 14, 2025 — Source or Source or Source or Source or Source
Quantifying cyber risk strategies to resonate with CFOs and boards
In this Help Net Security interview, Mir Kashifuddin, Data Risk & Privacy Leader at PwC, discusses how CISOs can translate cyber risk into business value and secure a more strategic role within their organizations. He explains that aligning cybersecurity with business objectives and leveraging data governance, AI, and financial risk quantification drives resilience and growth.
March 14, 2025 — Source
Recent Fortinet Vulnerabilities Exploited in 'SuperBlack' Ransomware Attacks
The newly discovered SuperBlack ransomware has been exploiting two vulnerabilities in Fortinet firewalls.
March 14, 2025 — Source
RSA Conference Playbook: Smart Strategies from Seasoned Attendees
Your guide on how to get through the conference with your sanity, energy, and key performance indicators (KPIs) intact.
March 14, 2025 — Source
Suspected LockBit ransomware dev extradited to United States
A dual Russian-Israeli national, suspected of being a key developer for the LockBit ransomware operation, has been extradited to the United States to face charges.
March 14, 2025 — Source
The poor the bad and the terrible -- popular passwords around the world
Passwords are an essential part of our digital lives, yet many people still use weak or simple combinations of letters and numbers that can be cracked in just a few seconds.
March 14, 2025 — Source
US lawmakers urge UK spy court to hold Apple 'backdoor' secret hearing in public
A group of bipartisan U.S. lawmakers are urging the head of the U.K.'s surveillance court to hold an open hearing into Apple's anticipated challenge of an alleged secret U.K. government legal demand.
March 14, 2025 — Source
What Do You Get When You Hire a Ransomware Negotiator?
Negotiators Can Buy Time and Lower Ransoms, But Do They Just Encourage Cyber Gangs?
March 14, 2025 — Source or Source
Workplace Chaos and Uncertainty Stoke Insider Risk Warnings
Expect Malicious Insiders to Pose 'Big Challenge' This Year for CISOs, Expert Warns
March 14, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — March 13th, 2025
5 Ways Docker Can Improve Security in Mobile App Development
Docker enhances mobile app security with dependency isolation, consistent environments, secure images, and proactive vulnerability scanning.
March 13, 2025 — Source
Are you PCI compliant yet?
The transition from PCI DSS 3.2.1 to 4.0 is a heavy lift for many businesses
March 13, 2025 — Source
CISA: We didn't fire red teams, we just unhired a bunch of them
Agency tries to save face as it also pulls essential funding for election security initiatives
March 13, 2025 — Source
Cisco Patches 10 Vulnerabilities in IOS XR
Cisco has released patches for 10 vulnerabilities in IOS XR, including five denial-of-service (DoS) bugs.
March 13, 2025 — Source
ClickFix attack delivers infostealers, RATs in fake Booking.com emails
Microsoft is warning that an ongoing phishing campaign impersonating Booking.com is using ClickFix social engineering attacks to infect hospitality workers with various malware, including infostealers and RATs.
March 13, 2025 — Source
DeepSeek's Malware-Generation Capabilities Put to Test
Researchers have analyzed the ability of the Chinese gen-AI DeepSeek to create malware such as ransomware and keyloggers.
March 13, 2025 — Source or Source
Developing an ontology for smart city infrastructure threats, cybercrime and digital investigation
With technological advancements and a growing awareness about the United Nations (UN) Sustainable Development Goals (SDGs), interconnected systems within cities that capture real-time data indicators reflecting chosen SDGs are a way forward. Known as smart city infrastructure (SCI), these systems are vital to nations in assessing their alignment with the UN SDGs. As the role of smart city infrastructure becomes apparent, it inevitably becomes a prime target for adversaries and cyber criminals.
March 13, 2025 — Source
Don't click on those road toll texts. Officials issue warnings about the smishing scam
State officials are warning Americans not to respond to a surge of scam road toll collection texts.
March 13, 2025 — Source
EFF Thanks Fastly for Donated Tools to Help Keep Our Website Secure
EFF's most important platform for welcoming everyone to join us in our fight for a better digital future is our website, eff.org. We thank Fastly for their generous in-kind contribution of services helping keep EFF's website online.
March 13, 2025 — Source
EU Seeks US Assurances on Trans-Atlantic Data Flows
Worries Grow Over Data Privacy Framework Stability
March 13, 2025 — Source or Source or Source or Source or Source
FreeType Zero-Day Being Exploited in the Wild
Meta's Facebook security team warns of live exploitation of a zero-day vulnerability in the open-source FreeType library.
March 13, 2025 — Source
Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign
Threat actors are likely targeting Grafana path traversal bugs for reconnaissance in a SSRF exploitation campaign targeting popular platforms.
March 13, 2025 — Source
Groups From China, Russia, Iran Hitting OT Systems Worldwide
Threat Groups Are Mapping OT Networks for Future Targeting, Warns Dragos
March 13, 2025 — Source or Source or Source or Source
Hackers from North Korea deploy spyware through Google Play
Cybersecurity researchers at Lookout have discovered KoSpy, a sophisticated Android spyware linked to North Korea that has managed to infiltrate the Google Play Store. The malware is attributed to ScarCruft (APT37), a North Korean hacking group, and disguises itself as legitimate apps. It targets Korean and English-speaking users and can steal sensitive data while remaining undetected for months.
March 13, 2025 — Source
How to secure your personal metadata from online trackers
When it comes to safeguarding your privacy online, most people focus on securing passwords, encrypting communications, and clearing browsing history. While these practices are essential, they overlook one important element—metadata. This data, which is collected about your digital interactions, can often reveal more about you than you think.
March 13, 2025 — Source
How to set up Bitwarden for personal and work use - and why you should keep them separate
Don't let work invade your personal life. Separate your passwords with two Bitwarden accounts for better security and peace of mind.
March 13, 2025 — Source
Juniper patches bug that let Chinese cyberspies backdoor routers
uniper Networks has released emergency security updates to patch a Junos OS vulnerability exploited by Chinese hackers to backdoor routers for stealthy access.
March 13, 2025 — Source
Malware compromised bank data from 26 million devices
Remember that game cheat file you downloaded from a suspicious-looking website? It might not have been a legitimate file. You may have infected your computer with an infostealer malware. According to a report from Kaspersky, you are not alone in this. The cybersecurity company has revealed about 26 million devices worldwide whose bank data might have been compromised by this malware.
March 13, 2025 — Source
Medusa Ransomware Made 300 Critical Infrastructure Victims
CISA, FBI, and MS-ISAC warn of Medusa ransomware attacks targeting critical infrastructure organizations.
March 13, 2025 — Source
Microsoft Warns of Hospitality Sector Attacks Involving ClickFix
A cybercrime group named Storm-1865 has targeted hospitality organizations via fake Booking.com emails and the use of social engineering.
March 13, 2025 — Source
Navigating AI-powered cyber threats in 2025: 4 expert security tips for businesses
AI-powered cyber threats are reshaping security landscapes. Businesses that don't evolve will be vulnerable to increasingly sophisticated attacks - here's how to stay ahead.
March 13, 2025 — Source
New SuperBlack ransomware exploits Fortinet auth bypass flaws
A new ransomware operator named 'Mora_001' is exploiting two Fortinet vulnerabilities to gain unauthorized access to firewall appliances and deploy a custom ransomware strain dubbed SuperBlack.
March 13, 2025 — Source
Nextcloud puts out fire after data leak panic
Community calls for off-by-default data sharing setting
March 13, 2025 — Source
QuamCore Emerges From Stealth With $9 Million to Build a Quantum Computer
QuamCore's secret sauce is a patented architecture that will allow the integration of 1 million qubits in a single cryostat.
March 13, 2025 — Source
Radiology Clinic, Hospital Among Latest Rural Cyber Victims
IT Outages Are Affecting Patient Services, NC Practice Is 'Temporarily Closed'
March 13, 2025 — Source or Source or Source or Source
Red Report 2025: Unmasking a 3X Spike in Credential Theft and Debunking the AI Hype
Cybercriminals have turned password theft into a booming enterprise, malware targeting credential stores jumped from 8% of samples in 2023 to 25% in 2024, a threefold increase.
March 13, 2025 — Source
Security is just a side quest: Insights from the video game industry
The video game industry is a constantly changing market worth billions. In a qualitative interview study with industry experts, CISPA researcher Philip Klostermeyer from the team of CISPA Faculty Prof. Dr. Sascha Fahl investigated the challenges involved in incorporating security considerations into game development.
March 13, 2025 — Source
Security Maturity Models: Leveraging Executive Risk Appetite for Your Secure Development Evolution
Organizations can align their processes with one of two global industry standards for self-assessment and security maturity—BSIMM and OWASP SAMM.
March 13, 2025 — Source
Sola Security Debuts AI-Powered SOAR Product with $30M Boost
Funds Will Support Next-Gen Security Orchestration and Response, Eliminate Complexity
March 13, 2025 — Source or Source or Source or Source or Source
That 'angry guest' email from Booking.com? It's a scam, not a 1-star review
Phishers check in, your credentials check out, Microsoft warns
March 13, 2025 — Source
The FCC is creating a new Council for National Security within the agency
The group, which has goals related to China, will include representatives from eight FCC Bureaus and Offices.
March 13, 2025 — Source
Understaffed but still delivering -- the reality of cybersecurity teams
A new survey of over 900 security decision makers across the US, Europe and Australia, finds 60 percent of security teams are small, with fewer than 10 members. But despite their size, 72 percent report taking on more work over the past year, and an impressive 88 percent are meeting or exceeding their goals.
March 13, 2025 — Source
Unofficial parental control apps put children's safety and privacy at risk
Some "unofficial" parental control apps have excessive access to personal data and hide their presence, raising concerns about their potential for unethical surveillance as well as domestic abuse, according to new research from UCL and St. Pölten UAS, Austria.
March 13, 2025 — Source
Unpatched Edimax Camera Flaw Exploited Since at Least May 2024
A recently disclosed Edimax zero-day vulnerability has been exploited in the wild by Mirai botnets for nearly a year.
March 13, 2025 — Source
Why AI-powered security tools are your secret weapon against tomorrow's attacks
In the cybersecurity arms race, you have access to the same weapons as the bad guys. Just how well-armed are you now?
March 13, 2025 — Source
Internet — Security Issues — March 12th, 2025
360 Privacy Raises $36 Million for Digital Executive Protection Platform
360 Privacy has raised $36 million in equity investment to scour the surface and dark web for leaked PII and remove it.
March 12, 2025 — Source
A Guide to Security Investments: The Anatomy of a Cyberattack
Organizations must recognize that security is not about the number of tools deployed, it is about ensuring those tools effectively disrupt the attack chain at every stage.
March 12, 2025 — Source
Apple patches security flaw that would allow an 'extremely sophisticated' attack
There's a myth that Apple devices are more secure compared to Android. This comes from the misconception that just because Apple doesn't allow sideloading and extensive customizations, it is safe. In fact, Apple recently issued an update to iOS and iPadOS, bringing them up to version 18.3.2. This update isn't about flashy new features.
March 12, 2025 — Source
Attackers Can Manipulate AI Memory to Spread Lies
Tested on Three OpenAI Models, 'Minja' Has High Injection and Attack Rates
March 12, 2025 — Source or Source or Source or Source or Source
Beware of DeepSeek Hype: It's a Breeding Ground for Scammers
Exploiting trust in the DeepSeek brand, scammers attempt to harvest personal information or steal user credentials.
March 12, 2025 — Source
Beyond calls: How your Android phone helps build and strengthen relationships
In today's fast-paced world, your Android phone has become more than just a device for making calls and sending texts. It has evolved into a powerful tool that helps users build, nurture, and maintain relationships, whether with family, friends, or colleagues. With an array of apps and features designed to foster communication, your Android phone can deepen your connections, bridge gaps across long distances, and even introduce you to new people.
March 12, 2025 — Source
Big March patch fixes dozens of security flaws in Windows and Office
Microsoft fixed 58 security vulnerabilities on Patch Tuesday, including several that are already being exploited in the wild.
March 12, 2025 — Source
Browser-Based Data Leaks: 3 Biggest Data Security Challenges Today
For years, Data Loss Prevention (DLP) solutions focused on email, endpoints, and network traffic, where security teams could enforce clear policies with predictable outcomes.
March 12, 2025 — Source
China's Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days
Dragos case study reveals that Volt Typhoon hacked the US electric grid and stole information on OT systems.
March 12, 2025 — Source
Chinese Cyberespionage Group Tied to Juniper MX Router Hacks
Juniper Networks Urges Immediate Updating and Malware Scans to Block Attackers
March 12, 2025 — Source or Source or Source or Source or Source
Chinese cyberspies backdoor Juniper routers for stealthy access
Chinese hackers are deploying custom backdoors on Juniper Networks Junos OS MX routers that have reached end-of-life (EoL) and no longer receive security updates.
March 12, 2025 — Source
CISA Defunds Threat-Sharing Hubs for States and Elections
Cyber Defense Agency Axes Funding for Key ISACs as Trump Shifts Federal Priorities
March 12, 2025 — Source or Source or Source or Source or Source
Criminals stole $12.5B through online scams in the US last year
Online scam attempts have been present practically since the dawn of the internet. After all, it’s simply a matter of transferring practices carried out in the real world to the digital environment, taking advantage of additional tech tools to boost their effectiveness. According to the FTC, 2024 was an especially fruitful year for cybercriminals in the US, with significant involvement of AI and crypto.
March 12, 2025 — Source
Criminology scholar connects Cambodian temple trafficking to white-collar crime
Professor Simon Mackenzie from the School of Social and Cultural Studies recently published a paper in Crime, Law and Social Change about the dynamics of transnational crime and illegal global markets, exploring the movement of cultural and natural collectibles from economically-poor to wealthy countries.
March 12, 2025 — Source
Expired Juniper routers find new life – as Chinese spy hubs
Fewer than 10 known victims, but Mandiant suspects others compromised, too
March 12, 2025 — Source
Fortinet Patches 18 Vulnerabilities
Fortinet has published 17 new advisories to inform customers about 18 vulnerabilities patched in its products.
March 12, 2025 — Source
Four Chinese firms looking to shake up the tech world in the wake of DeepSeek
The success of the Chinese AI firm DeepSeek shocked financial markets and major US tech firms in January 2025. But it shouldn't have come as such a surprise.
March 12, 2025 — Source
Fraud Losses Reached $12.5 Billion in 2024: FTC
FTC says reported losses to fraud exceeded $12.5 billion in 2024, with $5.7 billion lost to investment scams.
March 12, 2025 — Source
Free95 claims to be a GPL 3 Windows clone, but it's giving vaporware vibes
Don't, don't, DON'T believe the hype
March 12, 2025 — Source
Garantex administrator arrested in India at request of US authorities
Indian police have arrested the co-founder of Garantex, a Russian cryptocurrency exchange sanctioned by the European Union and the U.S. government, under India’s extradition law, TechCrunch has exclusively learned and confirmed with state authorities.
March 12, 2025 — Source
Goodbye passwords? Enterprises ramping up passkey adoption
87% of companies have, or are in the midst of, rolling out passkeys with goals tied to improved user experience, enhanced security, and compliance, according to the FIDO Alliance.
March 12, 2025 — Source
How to Use Zero Trust to Help Protect Cloud Workloads
AI-Enabled Security Offers Continuous Monitoring for Distributed Enterprise Apps
March 12, 2025 — Source or Source or Source or Source or Source
Keeper versus LastPass: Best Password Manager for 2025
Keeper and LastPass are some of the best password managers on the market, each offering advanced data protection and security features. Compare the two with our in-depth comparison guide before you buy.
March 12, 2025 — Source
Lawmakers Take Another Stab to Improve Patient ID Matching
Bipartisan 'Match IT Act' Aims to Reduce Risk of Medical Mistakes, Privacy Mishaps
March 12, 2025 — Source or Source or Source or Source or Source
Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers
China-nexus cyberespionage group caught planting custom backdoors on end-of-life Juniper Networks Junos OS routers.
March 12, 2025 — Source
Microsoft patches Windows Kernel zero-day exploited since 2023
Slovak cybersecurity company ESET says a newly patched zero-day vulnerability in the Windows Win32 Kernel Subsystem has been exploited in attacks since March 2023.
March 12, 2025 — Source
New partnership simplifies zero trust access for enterprises
The shift to hybrid working means that managing enterprise networks has become more complicated, but legacy remote access solutions fall short in meeting the needs of supporting both managed and unmanaged users and devices.
March 12, 2025 — Source
Newly Patched Windows Zero-Day Exploited for Two Years
Microsoft on Tuesday patched a zero-day vulnerability in the Windows Win32 kernel that has been exploited since March 2023.
March 12, 2025 — Source
NIST selects HQC as backup algorithm for post-quantum encryption
Last year, NIST standardized a set of encryption algorithms that can keep data secure from a cyberattack by a future quantum computer. Now, NIST has selected a backup algorithm that can provide a second line of defense for the task of general encryption, which safeguards internet traffic and stored data alike.
March 12, 2025 — Source
North Korean government hackers snuck spyware on Android app store
A group of hackers with links to the North Korean regime uploaded Android spyware onto the Google Play app store and were able to trick some people into downloading it, according to cybersecurity firm Lookout.
March 12, 2025 — Source or Source
Pentera Secures $60M to Boost AI-Powered Security Validation
Series D Funding to Drive U.S. Growth and AI Advancements in Cybersecurity
March 12, 2025 — Source or Source or Source or Source or Source
PowerSchool Portal Compromised Months Before Massive Data Breach
Hackers used compromised credentials to access PowerSchool's PowerSource portal months before the December 2024 data breach.
March 12, 2025 — Source
Protecting controlled information in non-Government of Canada systems and organizations (ITSP.10.171)
This publication provides recommended security requirements for protecting the confidentiality of controlled information when residing in non-Government of Canada (GC) systems and organizations.
March 12, 2025 — Source
Research reveals 'major vulnerabilities' in deepfake detectors
An international team of researchers is calling for urgent improvements in deepfake detection technologies after uncovering critical flaws in widely used detection tools.
March 12, 2025 — Source
Security Validation Firm Pentera Banks $60M Series D
Israeli startup in the automated security validation space secures a $60 million round led by Evolution Equity Partners.
March 12, 2025 — Source
Starlink internet inches closer to India as it gets Jio as new partner after Airtel
Not a day has passed since Bharti Airtel announced a new partnership with SpaceX to bring Starlink satellite internet services to India. The Elon Musk-owned company has another Indian partner, Jio Platforms, as the space technology giant gears for a potential launch.
March 12, 2025 — Source
Study finds public security disclosures may aid adversaries
When security and defense agencies publicly announce the deployment of new technologies—such as enhanced baggage scanners at airports—they may inadvertently help malicious actors identify which locations are defended and how, according to new research from the University at Buffalo School of Management.
March 12, 2025 — Source
That weird CAPTCHA could be a malware trap - here's how to protect yourself
Follow the 'I'm not a robot' CAPTCHA, and you might just end up with malware on your PC.
March 12, 2025 — Source or Source
This is the FBI, open up. China's Volt Typhoon is on your network
Power utility GM talks to El Reg about getting that call and what happened next
March 12, 2025 — Source
Trump Administration Halts Funding for Two Cybersecurity Efforts, Including One for Elections
The Trump administration has cut millions of dollars in federal funding from two cybersecurity initiatives, including one dedicated to helping state and local election officials.
March 12, 2025 — Source
US Hasn't Determined Who Was Behind Cyberattack That Caused Outage on Musk's X
US officials have not determined who was behind an apparent cyberattack on the social media site X that limited access to the platform for thousands of users.
March 12, 2025 — Source
Why Browser-Based Security Is Vital to Zero Trust Operations
Browser Isolation Protects Access Points as Remote Work Expands Attack Surface
March 12, 2025 — Source or Source or Source or Source or Source
Zoom Patches 4 High-Severity Vulnerabilities
Zoom has patched five vulnerabilities in its applications, including four high-severity flaws.
March 12, 2025 — Source
Zut Alors! Cyberattacks Targeting France Surged in 2024
The Edge Device Hacking Wave Hasn't Spared French Companies
March 12, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — March 11th, 2025
70 percent of leaked credentials remain active two years on
A new report shows 70 percent of secrets leaked in 2022 remain active today, creating an expanding attack surface that grows more dangerous with each passing day.
March 11, 2025 — Source
1,600 Victims Hit by South American APT's Malware
South American cyberespionage group Blind Eagle has infected over 1,600 organizations in Colombia in a recent campaign.
March 11, 2025 — Source
Alloy Fraud Attack Radar provides intelligence on fraud threats
Alloy launched Fraud Attack Radar, a machine learning-powered solution that provides financial institutions (FIs) and fintechs with actionable intelligence on fraud threats targeting new account creation.
March 11, 2025 — Source
Americans lost a record $12.5 billion to fraud in 2024, with investment scams leading the losses
If it seems too good to be true, it usually is
March 11, 2025 — Source
Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw
Apple warns that the WebKIt bug "may have been exploited in an extremely sophisticated attack against specific targeted individuals."
March 11, 2025 — Source
AuditBoard unveils AI-powered audit capabilities
AuditBoard announced new AI-powered audit capabilities, further integrating AI into the product, boosting efficiency, and enabling auditors to focus on more strategic tasks.
March 11, 2025 — Source
Beware this sneaky new 'CAPTCHA' that tricks you into installing malware
It's both stupid yet brilliant, relying on knee-jerk CAPTCHA reactions to get users to manually install malware.
March 11, 2025 — Source
CISA tags critical Ivanti EPM flaws as actively exploited in attacks
CISA warned U.S. federal agencies to secure their networks against attacks exploiting three critical vulnerabilities affecting Ivanti Endpoint Manager (EPM) appliances.
March 11, 2025 — Source
CISA Warns of Ivanti EPM Vulnerability Exploitation
CISA has added three critical-severity flaws in Ivanti EPM to its Known Exploited Vulnerabilities catalog.
March 11, 2025 — Source
Critical PHP RCE vulnerability mass exploited in new attacks
Threat intelligence company GreyNoise warns that a critical PHP remote code execution vulnerability that impacts Windows systems is now under mass exploitation.
March 11, 2025 — Source
Cybercriminals are cloning DeepSeek AI website to ship malware
Cybercriminals are using a variety of methods to compromise the private data or credentials of potential victims online. One of the most popular methods is cloning legitimate services. Malicious actors are no strangers to the huge popularity of DeepSeek, the new artificial intelligence that is on everyone's lips. Researchers have discovered a malware campaign where attackers impersonate DeepSeek AI.
March 11, 2025 — Source
Developer faces decade in prison for installing kill switch in former employer's network
The switch was designed to trigger upon his termination
March 11, 2025 — Source
Edimax Says No Patches Coming for Zero-Day Exploited by Botnets
Edimax is aware that CVE-2025-1316 has been exploited in the wild, but the impacted devices were discontinued over a decade ago.
March 11, 2025 — Source
EFF Sends Letter to the Senate Judiciary Committee Opposing the STOP CSAM Act
On Monday, March 10, EFF sent a letter to the Senate Judiciary Committee opposing the Strengthening Transparency and Obligation to Protect Children Suffering from Abuse and Mistreatment Act (STOP CSAM Act) ahead of a committee hearing on the bill.
March 11, 2025 — Source
Elon Musk claims bad actors in Ukraine are behind "massive" X cyberattack
Will users ever abandon the Twitter brand? X outages suggest the answer is no.
March 11, 2025 — Source
False confidence leaves businesses at risk of phishing scams
While 86 percent of employees believe they can confidently identify phishing emails, nearly half have fallen for scams according to new research from security awareness training company KnowBe4.
March 11, 2025 — Source
Federal agents confirm LastPass breach linked to massive cryptocurrency heists
The LastPass breach is tied to a $150 million crypto theft
March 11, 2025 — Source
Forcepoint to Enhance Data Security With Getvisibility Buy
Getvisibility's AI Mesh Integration to Bolster Data Classification, Risk Management
March 11, 2025 — Source or Source or Source or Source or Source
Hackers Take Credit for X Cyberattack
Information is coming to light on the cyberattack that caused X outages, but it should be taken with a pinch of salt.
March 11, 2025 — Source
HHS Investigators Get New Mission Under Trump: Root Out DEI
Stretched Agency Must Balance HIPAA Enforcement With Policing DEI in Healthcare
March 11, 2025 — Source or Source or Source or Source or Source
How to protect operational technology from targeted cyber attacks
Cyber attacks against operational technology are becoming increasingly sophisticated and frequent
March 11, 2025 — Source
How to spot and avoid AI-generated scams
As AI technology advances, cybercriminals create more personalized and convincing scams. This includes mimicking voices, deepfake videos, and highly convincing phishing emails that are difficult to spot.
March 11, 2025 — Source
Knockout of X Tied to Pro-Palestinian Hacktivists' Botnet
Experts Express Surprise Over Major Social Platform Falling Victim to DDoS Attacks
March 11, 2025 — Source or Source or Source or Source or Source
Lawsuit Says DOGE Is Ignoring Key Social Security Data Rules
Ousted Social Security Official Accuses DOGE of Bypassing Critical Data Protections
March 11, 2025 — Source or Source or Source or Source or Source
MassJacker malware uses 778,000 wallets to steal cryptocurrency
A newly discovered clipboard hijacking operation dubbed 'MassJacker' uses at least 778,531 cryptocurrency wallet addresses to steal digital assets from compromised computers.
March 11, 2025 — Source
Microsoft Flags Six Active Zero-Days, Patches 57 Flaws: Patch Tuesday
Redmond ships major security updates with warnings that a half-dozen Windows vulnerabilities have already been exploited in the wild.
March 11, 2025 — Source
Most ransomware incidents start with compromised perimeter security
A new report from cyber insurance provider Coalition shows 58 percent of ransomware claims in 2024 started with threat actors compromising perimeter security appliances like virtual private networks (VPNs) or firewalls.
March 11, 2025 — Source
New Ballista IoT Botnet Linked to Italian Threat Actor
Cato Networks has analyzed a new IoT botnet named Ballista, which targets TP-Link Archer routers.
March 11, 2025 — Source
New cybersecurity product seeks to safeguard executives and their families
You might not often feel sorry for executives and entrepreneurs but research from Deloitte shows that their 'family offices' are prime targets for cybercriminals looking to exploit their personal networks, private data, and home devices which represent a weak security link.
March 11, 2025 — Source
New York Sues Insurance Giant Over Data Breaches
The New York Attorney General sued National General and its parent company Allstate over two data breaches.
March 11, 2025 — Source
North Korean Lazarus hackers infect hundreds via npm packages
Six malicious packages have been identified on npm (Node package manager) linked to the notorious North Korean hacking group Lazarus.
March 11, 2025 — Source
Patch Tuesday: Critical Code Execution Bugs in Adobe Acrobat and Reader
Adobe documents 35 security flaws in a wide range of products, including code-execution issues in the Acrobat and Reader applications.
March 11, 2025 — Source
PowerSchool previously hacked in August, months before data breach
PowerSchool has published a long-awaited CrowdStrike investigation into its massive December 2024 data breach, which determined that the company was previously hacked over 4 months earlier, in August, and then again in September.
March 11, 2025 — Source
Popular Voice Cloning Tools Lack Safeguards
Abuse Can Lead to Fraud, Impersonation Scams
March 11, 2025 — Source or Source or Source or Source
Rambus introduces CryptoManager Security IP solutions
Rambus announced its next-generation CryptoManager Security IP solutions including Root of Trust, Hub and Core families.
March 11, 2025 — Source
Report warns of 'cyberwashing' in digital security claims
A new Monash University report highlights the growing problem of organizations resorting to "cyberwashing" to mislead the public about their data privacy practices and recommends measures to build a genuine culture of cybersecurity.
March 11, 2025 — Source
SAP Patches High-Severity Vulnerabilities in Commerce, NetWeaver
SAP released 21 new security notes and updated three security notes on March 2025 security patch day.
March 11, 2025 — Source
Security researchers aren't buying Musk's spin on the cyberattack that took down X
A new report in Wired suggests X may have left some of its servers unsecured.
March 11, 2025 — Source
Sola Security Deposits Hefty $30M Seed Funding
The financing was provided by S Capital and investor Mike Moritz, S32, Glilot Capital Partners, and several angel investors.
March 11, 2025 — Source
Some say passkeys are clunky — this startup wants to change that
Passwords are ubiquitous, despite not being foolproof and cannot alone protect your online identity. Almost one-third of data breaches reported over the past decade happened due to stolen credentials, per Verizon, including some of the biggest breaches of all time.
March 11, 2025 — Source
TikTok’s mood music will tell teens to ‘wind down’ after 10PM
Now TikTok’s Family Pairing feature will enable parents to lock the app during certain times.
March 11, 2025 — Source
Trump nominates Sean Plankey as new CISA director
President Donald Trump nominated Sean Plankey to head the Cybersecurity and Infrastructure Security Agency (CISA), according to a White House email sent to journalists on Tuesday.
March 11, 2025 — Source
Trump Taps Ex-DOE, NSC Leader Sean Plankey as CISA Director
Plankey Led Efforts to Engage Energy Sector in Cyber Prep During Trump's First Term
March 11, 2025 — Source or Source or Source or Source or Source
UK Government Report Calls for Stronger Open Source Supply Chain Security Practices
Report from the Department for Science, Innovation & Technology (DSIT) finds weaknesses in current practices.
March 11, 2025 — Source
UK 'Extremely Worried' About Cyberthreats
Risk of Espionage and Disruption Key Risks, Lawmakers Warned
March 11, 2025 — Source or Source or Source or Source or Source
When you should use a VPN - and when you shouldn't
Using a VPN 24/7 isn't always the best idea. Here's why.
March 11, 2025 — Source
X was hacked and disruptions continue, with inaccessible feeds and more
Since yesterday, users have been reporting problems with X (formerly Twitter).
March 11, 2025 — Source
Yoel Roth pushes for action on online scams amid scrutiny of Match Group
At SXSW, experts warn that online scams are reaching new levels of sophistication and that platforms must adapt.
March 11, 2025 — Source
Internet — Security Issues — March 10th, 2025
560,000 People Impacted Across Four Healthcare Data Breaches
Several healthcare organizations in different US states have disclosed data breaches affecting 100,000-200,000 individuals.
March 10, 2025 — Source
Attackers can use undocumented commands to hijack Chinese-made Bluetooth chips
Security researchers have shared details of newly discovered, undocumented commands in ESP32 Bluetooth firmware that can be exploited by an attacker. The Chinese-made chip is found in millions of devices, meaning the findings are significant.
March 10, 2025 — Source
Beware! Fake parking ticket SMS scams are on the rise
A new wave of scam text messages is hitting major cities across the US.
March 10, 2025 — Source
Cobalt Strike Abuse Dropped 80% in Two Years
Fortra has shared an update on the effects of actions taken to reduce the abuse of Cobalt Strike by threat actors.
March 10, 2025 — Source
Countering a flaw in anti-censorship tools to improve global internet freedom
A newly identified time-based vulnerability exposes a widely used technique to evade internet censorship, University of Michigan researchers have found. The findings emphasize the need to develop more robust countermeasures for the millions of people in heavily censored regions who rely on evasion techniques.
March 10, 2025 — Source
Critical PHP Vulnerability Under Mass Exploitation
GreyNoise warns of mass exploitation of a critical vulnerability in PHP leading to remote code execution on vulnerable servers.
March 10, 2025 — Source
Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks
Palo Alto Networks has shared details on several high-severity Mitsubishi Electric and Iconics SCADA vulnerabilities.
March 10, 2025 — Source
Detectify Alfred helps security teams collect threat intelligence
Detectify announced Alfred, a system that uses AI to completely autonomously source, prioritize, and generate high-fidelity security tests for the CVEs that are most likely to be exploited.
March 10, 2025 — Source
Developer Convicted for Hacking Former Employer's Systems
Davis Lu was convicted of sabotaging his employer's systems through malicious code, and deleting encrypted data.
March 10, 2025 — Source
Downgraded: Alert Over IoT Wireless Chip 'Backdoor'
Cybersecurity Firm Warns of 'Hidden Features' in the Widely Used ESP32 Chip
March 10, 2025 — Source or Source or Source or Source or Source
EFF's 'Rayhunter' Device Shines a Light On Cellular Spying
The organization hopes journalists, researchers, activists, and others will use the open-source device to catch sneaky forms of digital surveillance.
March 10, 2025 — Source
Elon Musk claims X being targeted in 'massive cyberattack' as service goes down
Hours after a series of outages Monday that left X unavailable to thousands of users, Elon Musk claimed that the social media platform was being targeted in a "massive cyberattack."
March 10, 2025 — Source or Source or Source
Following takedown operation, Garantex invites customers to 'face-to-face' Moscow meeting
It has not been a good week for Russian crypto exchange Garantex.
March 10, 2025 — Source
Forcepoint to Enhance Data Security With Getvisibility Buy
Getvisibility's AI Mesh Integration to Bolster Data Classification, Risk Management
March 10, 2025 — Source or Source or Source or Source or Source
Google paid $12 million in bug bounties last year to security researchers
Google paid almost $12 million in bug bounty rewards to 660 security researchers who reported security bugs through the company's Vulnerability Reward Program (VRP) in 2024.
March 10, 2025 — Source or Source
Google researchers uncover critical security flaw in all AMD Zen processors
Google has released an open-source jailbreak toolkit to deploy custom microcode patches on vulnerable CPUs
March 10, 2025 — Source
Lawsuit Says DOGE Is Ignoring Key Social Security Data Rules
Ousted Social Security Official Accuses DOGE of Bypassing Critical Data Protections
March 10, 2025 — Source or Source or Source or Source
Manus AI: Hype or a True Leap in Autonomous Intelligence?
Chinese AI Developer Says Model Is Potentially a 'Glimpse Into AGI'
March 10, 2025 — Source or Source or Source or Source or Source
NHS patient data could have been exposed due to misconfigured APIs
A company called Medefer, which works with the UK's NHS, has been potentially exposing NHS patient data publicly for up to six years due to a misconfigured API that was discovered in November last year.
March 10, 2025 — Source
Pondurance Platform 2.0 identifies data breach risks
Pondurance announced a major new version of its cybersecurity platform. Pondurance Platform 2.0 provides the foundation for Pondurance's risk-based MDR service specifically designed to eliminate breach risks.
March 10, 2025 — Source
Protect Sensitive Data with Data Shredder Stick's Unrecoverable File Deletion
Permanently delete files, folders, and even drives with military-grade data overwriting to prevent recovery.
March 10, 2025 — Source
Quantum leap: Passwords in the new era of computing security
Last August, the National Institute of Standards and Technology (NIST) released its first three finalized post-quantum encryption standards, designed to withstand attacks from quantum computers. It was the latest sign of a changing security world -- but what does it all mean for passwords?
March 10, 2025 — Source
Review: The Cybersecurity Trinity
The Cybersecurity Trinity provides a comprehensive approach to modern cybersecurity by integrating AI, automation, and active cyber defense (ACD) into a unified strategy. Instead of addressing these elements in isolation, the author demonstrates how they work together to enhance security effectiveness, offering a practical and actionable framework grounded in the NIST Cybersecurity Framework.
March 10, 2025 — Source
Rhysida Hacking Group Strikes More Healthcare Providers
Mental Health Provider, Kansas Clinics Are Latest Victims of Cybercriminal Gang
March 10, 2025 — Source or Source or Source
Russian disinformation 'infects' AI chatbots, researchers warn
A sprawling Russian disinformation network is manipulating Western AI chatbots to spew pro-Kremlin propaganda, researchers say, at a time when the United States is reported to have paused its cyber operations against Moscow.
March 10, 2025 — Source
SimSpace Stack Optimizer allows organizations to measure their security technologies
SimSpace launched Stack Optimizer, designed to help organizations evaluate, test, and optimize their security and IT infrastructure.
March 10, 2025 — Source
Swiss critical sector faces new 24-hour cyberattack reporting rule
Switzerland's National Cybersecurity Centre (NCSC) has announced a new reporting obligation for critical infrastructure organizations in the country, requiring them to report cyberattacks to the agency within 24 hours of their discovery.
March 10, 2025 — Source
The NHS security culture problem is a crisis years in the making
Insiders say board members must be held accountable and drive positive change from the top down
March 10, 2025 — Source
Trump Coins Used as Lure in Malware Campaign
Binance is being spoofed in an email campaign using free TRUMP Coins as a lure leading to the installation of the ConnectWise RAT.
March 10, 2025 — Source
What Is a Password Manager and How Does It Work?
Learn how password managers work, their benefits and why your organization needs one to secure sensitive data and prevent security breaches.
March 10, 2025 — Source
Why you should never, ever delete spam email
Unsubscribing can also potentially trigger ransomware attacks.
March 10, 2025 — Source
X Social Media Platform Hit by Apparent DDoS Attack
'Dark Storm Team' Takes Responsibility for 4 Major Outages on Monday
March 10, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — March 9th, 2025
Microsoft and Amazon quantum advancements spark questions about the future of encryption
Microsoft's new "Majorana 1" processor is the first quantum chip powered by a topological core based on a new class of materials.
March 9, 2025 — Source
Researchers uncover hidden 'backdoor' in widely used ESP32 microchip
Over a billion devices worldwide contain this chip
March 9, 2025 — Source
US cities warn of wave of unpaid parking phishing texts
US cities are warning of an ongoing mobile phishing campaign pretending to be texts from the city's parking violation departments about unpaid parking invoices, that if unpaid, will incur an additional $35 fine per day.
March 9, 2025 — Source
Internet — Security Issues — March 8th, 2025
Developer guilty of using kill switch to sabotage employer's systems
Developer guilty of using kill switch to sabotage employer's systems
March 8, 2025 — Source
YouTubers extorted via copyright strikes to spread malware
Cybercriminals are sending bogus copyright claims to YouTubers to coerce them into promoting malware and cryptocurrency miners on their videos.
March 8, 2025 — Source
Internet — Security Issues — February 28th, 2025
$1.5B Bybit Hack is Linked to North Korea, FBI Says, in Potentially the Largest Crypto Heist Ever
The U.S. Federal Bureau of Investigation has confirmed that North Korea was behind the theft of $1.5 billion worth of digital tokens from cryptocurrency exchange firm Bybit last week. This is thought to be the biggest crypto heist of all time.
February 28, 2025 — Source
Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist
Amnesty International publishes technical details on zero-day vulnerabilities exploited by Cellebrite's mobile forensic tools to spy on a Serbian student activist.
February 28, 2025 — Source
Claroty, Nozomi, Armis Top Cyber-Physical Security Rankings
Gartner MQ for Cyber-Physical Security Details Pros, Cons of Pure-Play Approach
February 28, 2025 — Source or Source or Source or Source or Source
Evidence-Based Investment a Growing Priority for Enterprises
Findings From KPMG Report Show Shifting Attitude to Digital Transformation
February 28, 2025 — Source or Source or Source or Source or Source
Gabbard Decries Britain's Reported Demand for Apple to Provide Backdoor Access to Users' Cloud Data
The Director of National Intelligence said such a demand would violate Americans' rights and raise concerns about a foreign government pressuring a U.S.-based technology company.
February 28, 2025 — Source
GPT-4.5 Scores EQ Points, but Not Much Else
Model Appears to Be a Way Station on the Road to Something Greater
February 28, 2025 — Source or Source or Source or Source
How to Protect Your Mac from the Latest Parallels Desktop Vulnerability
Two Mac exploits are live in the wild, including a Parallels Desktop vulnerability. Inside, I teach you how to protect yourself.
February 28, 2025 — Source
In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story
Noteworthy stories that might have slipped under the radar: Krispy Kreme data breach costs $11M, Pwn2Own moves to Berlin, the story of the 2024 Disney hack.
February 28, 2025 — Source
ISMG Editors: Black Basta Falls, Is Ransomware on the Ropes?
Also: U.S. Health Data Privacy Crackdowns, Reality versus Hype of LLMs in Security
February 28, 2025 — Source or Source or Source or Source or Source
Leaked Chat Logs Reveal Black Basta's Dark Night of the Soul
After Disrupting Ascension Health, Black Basta Forecast Reprisals From FBI, Moscow
February 28, 2025 — Source or Source or Source or Source or Source
Microsoft Names Suspects in Lawsuit Against AI Hackers
In a lawsuit targeting cybercriminals who abuse AI services, Microsoft has named individuals from Iran, the UK, China and Vietnam.
February 28, 2025 — Source or Source or Source or Source or Source
OSPS Baseline: Practical security best practices for open source software projects
The Open Source Security Foundation (OpenSSF), a cross-industry initiative by the Linux Foundation, has announced the initial release of the Open Source Project Security Baseline (OSPS Baseline), a tiered framework of security practices that evolve with the maturity of open source projects.
February 28, 2025 — Source
OT/ICS cyber threats escalate as geopolitical conflicts intensify
Ransomware attacks against industrial organizations surged by 87% over the past year, while new malware families designed specifically for OT environments emerged. These findings highlight a troubling trend: OT systems are increasingly becoming mainstream targets, and even sophisticated threat actors use relatively unsophisticated tactics to infiltrate and disrupt industrial operations.
February 28, 2025 — Source
Police arrests suspects tied to AI-generated CSAM distribution ring
Law enforcement agencies from 19 countries have arrested 25 suspects linked to a criminal ring that was distributing child sexual abuse material (CSAM) generated using artificial intelligence (AI).
February 28, 2025 — Source
Qilin ransomware claims attack at Lee Enterprises, leaks stolen data
The Qilin ransomware gang has claimed responsibility for the attack at Lee Enterprises that disrupted operations on February 3, leaking samples of data they claim was stolen from the company.
February 28, 2025 — Source
Ransomware criminals love CISA's KEV list -- and that's a bug, not a feature
1 in 3 entries are used to extort civilians, says new paper
February 28, 2025 — Source
Ransomware Group Takes Credit for Lee Enterprises Attack
The Qilin ransomware gang claims to have stolen 350 Gb of files from Lee Enterprises in the attack that caused newspaper disruptions.
February 28, 2025 — Source
Serbian police used Cellebrite zero-day hack to unlock Android phones
Serbian authorities have reportedly used an Android zero-day exploit chain developed by Cellebrite to unlock the device of a student activist in the country and attempt to install spyware.
February 28, 2025 — Source or Source
'Termite' Gang Leaks Australian Fertility Clinic Records
Researchers: Ransomware Group Emerged Last Fall; Variant of Babuk Malware
February 28, 2025 — Source or Source or Source or Source or Source
Trump's Staffing Overhauls Hit Nation's Cyber Defense Agency
Current and Former Officials Express Optimism, Concerns Over Cyber Leadership Picks
February 28, 2025 — Source or Source or Source or Source or Source or Source
Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes
The Vo1d botnet is now powered by 1.6 million Android TV devices, up from 1.3 million half a year ago.
February 28, 2025 — Source
Internet — Security Issues — February 18th, 2025
A third of people would like to delete themselves from the internet
Around a third of web users say they would like to delete themselves from the internet, with people in the US and Canada being at the top of the list.
February 18, 2025 — Source
Addresses, earnings, medical records of Americans could be in DOGE's hands soon
The Department of Government Efficiency just ousted the head of the Social Security Administration and is now trying to access the agency's records.
February 18, 2025 — Source
AI and VBC go mainstream in 2025 amid cybersecurity gains, expert predicts
Robert Connely of Pega says patching legacy systems will give way to true health IT modernization, a security breakthrough will lead artificial intelligence into routine use -- and AI will make value-based care the industry standard.
February 18, 2025 — Source
As US newspaper outages drag on, Lee Enterprises blames cyberattack for encrypting critical systems
Newspaper publishing giant Lee Enterprises said an ongoing cyberattack is causing disruptions across its business, and is now in its third week of outages.
February 18, 2025 — Source
Chinese hackers abuse Microsoft APP-v tool to evade antivirus
The Chinese APT hacking group "Mustang Panda" has been spotted abusing the Microsoft Application Virtualization Injector utility as a LOLBIN to inject malicious payloads into legitimate processes to evade detection by antivirus software.
February 18, 2025 — Source
Compliance Isn't Security: Why a Checklist Won't Stop Cyberattacks
Think you're safe because you're compliant? Think again. Recent studies continue to highlight the concerning trend that compliance with major security frameworks does not necessarily prevent data breaches. For instance, in 2024, the average cost of a data breach reached an all-time high of $4.88 million, a 10% increase from the previous year.
February 18, 2025 — Source
Critical Vulnerability Patched in Juniper Session Smart Router
A critical vulnerability tracked as CVE-2025-21589 has been patched in Juniper Networks' Session Smart Router.
February 18, 2025 — Source
CSE calls on Canadian organizations and critical infrastructure providers to strengthen defences on third anniversary of Russia's invasion of Ukraine
The Communications Security Establishment Canada (CSE) and its Canadian Centre for Cyber Security (Cyber Centre) are urging Canadian organizations to remain vigilant and strengthen their protection against malicious cyber threats as the three-year mark of Russia's full-scale invasion of Ukraine approaches.
February 18, 2025 — Source
Data Privacy and Governance in Real-Time Data Streaming
Real-time data streaming delivers fast insights but raises privacy and compliance risks. Use encryption, tokenization, and policy enforcement for secure streaming.
February 18, 2025 — Source
Don't want to be hacked? These 10 simple security tweaks keep you safe
These everyday online security tips are simple, fast, easy, and free.
February 18, 2025 — Source
Ex-NSO Group CEO's Security Firm Dream Raises $100M at $1.1B Valuation
Israeli cybersecurity startup Dream has raised $100 million in Series B funding and is now valued at $1.1 billion.
February 18, 2025 — Source
Exploit Approaches Published for 2 New OpenSSH Bugs
Rapid Patching Urged: Flaws Pose Man-in-the-Middle Attack, Denial of Service Risks
February 18, 2025 — Source
ExpressVPN unveils massive upgrade to its Lightway Protocol
Lightway now promises to be "the VPN protocol of the future".
February 18, 2025 — Source
Finastra Starts Notifying People Impacted by Recent Data Breach
Financial software firm Finastra is notifying individuals whose personal information was stolen in a recent data breach.
February 18, 2025 — Source
FreSSH bugs undiscovered for years threaten OpenSSH security
Exploit code now available for MitM and DoS attacks
February 18, 2025 — Source
Golang Backdoor Abuses Telegram for C&C Communication
A newly discovered Golang backdoor is abusing Telegram for communication with its command-and-control (C&C) server.
February 18, 2025 — Source
Hacker group releases updated tool to activate almost all modern Microsoft software
The MAS project is donation-free because "profiting from piracy is not good," the pirates say
February 18, 2025 — Source
Healthcare outfit that served military personnel settles allegations it faked infosec compliance for $11M
If this makes you feel sick, knowing this happened before ransomware actors started targeting medical info may help
February 18, 2025 — Source
HIMSS25 Healthcare Cybersecurity Forum: Beyond tips and best practices
The day-long preconference symposium will offer real-world lessons on building safer and more resilient IT systems while creating organizational culture where cybersecurity is fundamental.
February 18, 2025 — Source
Juniper patches critical auth bypass in Session Smart routers
Juniper Networks has patched a critical vulnerability that allows attackers to bypass authentication and take over Session Smart Router (SSR) devices.
February 18, 2025 — Source
Lee Enterprises newspaper disruptions caused by ransomware attack
Newspaper publishing giant Lee Enterprises has confirmed that a ransomware attack is behind ongoing disruptions impacting the group's operations for over two weeks.
February 18, 2025 — Source
Microsoft Warns of Improved XCSSET macOS Malware
Microsoft has observed a new variant of the XCSSET malware being used in limited attacks against macOS users.
February 18, 2025 — Source or Source
MirrorTab Raises $8.5M Seed Round to Take on Browser-Based Attacks
San Francisco startup secures $8.5 million in seed funding led by Valley Capital Partners to tackle browser-based malware attacks.
February 18, 2025 — Source
New Mac Malware Poses as Browser Updates
Researchers warn of rising macOS-targeted attacks as hackers exploit fake updates to bypass security. FrigidStealer malware highlights growing enterprise risks.
February 18, 2025 — Source
New OpenSSH flaws expose SSH servers to MiTM and DoS attacks
OpenSSH has released security updates addressing two vulnerabilities, a man-in-the-middle (MitM) and a denial of service flaw, with one of the flaws introduced over a decade ago.
February 18, 2025 — Source
New WinRAR version strips Windows metadata to increase privacy
WinRAR 7.10 was released yesterday with numerous features, such as larger memory pages, a dark mode, and the ability to fine-tune how Windows Mark-of-the-Web flags are propagated when extracting files.
February 18, 2025 — Source
Palo Alto firewalls under attack as miscreants chain flaws for root access
If you want to avoid urgent patches, stop exposing management consoles to the public internet
February 18, 2025 — Source
Palo Alto Networks Confirms Exploitation of Firewall Vulnerability
Palo Alto Networks has confirmed that a recently patched firewall vulnerability tracked as CVE-2025-0108 is being actively exploited.
February 18, 2025 — Source
Pangea Launches AI Guard and Prompt Guard to Combat Gen-AI Security Risks
Guardrail specialist releases new products to aid the development and use of secure gen-AI apps.
February 18, 2025 — Source
PowerSchool's simple security error was avoidable. You can do better
This easy security upgrade could have protected millions of kids.
February 18, 2025 — Source
Singulr Launches With $10M in Funding for AI Security and Governance Platform
Singulr AI announced its launch with $10 million in seed funding raised for an enterprise AI security and governance platform.
February 18, 2025 — Source
Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload
Because stealing your credentials, banking info, and IP just wasn't enough
February 18, 2025 — Source
This new Android 16 feature shows that Google is serious about security
Security is one of the most important subjects in tech nowadays. A major gateway into our private data happens to be our phones. We keep a ton of sensitive information on these devices, and there are always people who want it. Well, Android 16 has a new API that tells apps when you have Advanced Protection activated. It can make your phone much more secure.
February 18, 2025 — Source
US newspaper publisher uses linguistic gymnastics to avoid saying its outage was due to ransomware
Called it an 'incident' in SEC filing, but encrypted apps and data exfiltration suggest Lee just can't say the R word
February 18, 2025 — Source
Venture capital giant Insight Partners hit by cyberattack
New York-based venture capital and private equity firm Insight Partners has disclosed that its systems were breached in January following a social engineering attack.
February 18, 2025 — Source
Internet — Security Issues — February 18th, 2025
6 considerations for 2025 cybersecurity investment decisions
Cybersecurity professionals may be concerned about the constantly shifting threat landscape. From the increased use of artificial intelligence (AI) by malicious actors to the expanding attack surface, cybersecurity risks evolve, and defenders need to mitigate them.
February 18, 2025 — Source
BlackLock ransomware onslaught: What to expect and how to fight it
BlackLock is on track to become the most active ransomware-as-a-service (RaaS) outfit in 2025, according to ReliaQuest.
February 18, 2025 — Source
Clinical Trial Database Exposes 1.6M Records to Web
Researcher Says Firm Failed to Secure Sensitive Health Data From Survey Forms
February 18, 2025 — Source or Source or Source or Source or Source
Cybercriminals shift focus to social media as attacks reach historic highs
A new report from Gen highlights a sharp rise in online threats, capping off a record-breaking 2024. Between October and December alone, 2.55 billion cyber threats were blocked -- an astonishing rate of 321 per second.
February 18, 2025 — Source
Deepwatch Buys Dassana for Agentic AI, Exposure Management
Acquisition Boosts Speed With Agentic AI for Analysts and Automated Risk Reporting
February 18, 2025 — Source or Source or Source or Source or Source
DOGE Team Wins Legal Battle, Retains Access to Federal Data
Court Clears Way for Musk's DOGE Team to Continue Accessing Sensitive Federal Data
February 18, 2025 — Source or Source or Source or Source or Source
Dream Raises $100M to Strengthen AI-Driven National Security
Investment Led by Bain Capital to Enhance Predictive Threat Detection Capabilities
February 18, 2025 — Source or Source or Source or Source or Source
Exploit Approaches Published for 2 New OpenSSH Bugs
Rapid Patching Urged: Flaws Pose Man-in-the-Middle Attack, Denial of Service Risks
February 18, 2025 — Source or Source or Source or Source
Is Russia Reining In Ransomware-Wielding Criminals?
Flurry of Arrests a Potential Prelude to Russia-Ukraine Peace Negotiations
February 18, 2025 — Source or Source or Source or Source or Source
Italian Privacy Agency Warns Against Unlawful Spyware Use
Use Other Than for Police Purposes Can Invoke Fine Up to 20 Million Euros
February 18, 2025 — Source or Source or Source or Source or Source
North Korea Stealing Cryptocurrency With JavaScript Implant
'Marstech1' Malware Targets Developers Through GitHub Repository
February 18, 2025 — Source or Source or Source or Source
Privacy Constraints Are Keeping Banks From Tackling Scams
M&T Bank's Karen Boyer on Need for Shared Responsibility with Telecoms, Tech Firms
February 18, 2025 — Source or Source or Source or Source or Source
ProcessUnity accelerates third-party assessments
ProcessUnity announced the next generation of the Global Risk Exchange. This platform transforms the third-party assessment process, reducing friction for both organizations and their third parties while streamlining vendor onboarding and accelerating assessment cycles.
February 18, 2025 — Source
Unit21 empowers financial institutions to detect and stop scams
Unit21 launched its new scams solution that helps financial institutions and fintechs detect and stop scams before they cause financial harm.
February 18, 2025 — Source
Internet — Security Issues — February 17th, 2025
6 LastPass Alternatives and Competitors for 2025
Looking for LastPass alternatives? Check out our list of the top password managers that offer secure and convenient options for managing your passwords.
February 17, 2025 — Source
127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police
After governments announced sanctions against the Zservers/XHost bulletproof hosting service, Dutch police took 127 servers offline.
February 17, 2025 — Source
A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)
The suspected Chinese state-sponsored hackers who breached workstations of several US Treasury employees in December 2024 did so by leveraging not one, but two zero-days, according to Rapid7 researchers.
February 17, 2025 — Source
Attackers Exploit Palo Alto Zero-Day Authentication Bypass
Surge in Attack Attempts Spotted After Palo Alto Networks Details and Patches Flaw
February 17, 2025 — Source or Source or Source or Source
Downloads of DeepSeek's AI Apps Paused in South Korea Over Privacy Concerns
DeepSeek has temporarily paused downloads of its chatbot apps in South Korea while it works with local authorities to address privacy concerns.
February 17, 2025 — Source
ExpressVPN Rolls Out Major Upgrade to Its Already Impressive Lightway Protocol
By recoding its Lightway protocol in Rust, ExpressVPN claims it has beefed up its speed, security and performance.
February 17, 2025 — Source
Is Russia Reining In Ransomware-Wielding Criminals?
Flurry of Arrests a Potential Prelude to Russia-Ukraine Peace Negotiations
February 17, 2025 — Source or Source or Source
McAfee+ Ultimate review: Comprehensive security that needs more polish
More polish would make this flagship security suite shine.
February 17, 2025 — Source
Microsoft spots XCSSET macOS malware variant used for crypto theft
A new variant of the XCSSET macOS modular malware has emerged in attacks that target users' sensitive information, including digital wallets and data from the legitimate Notes app.
February 17, 2025 — Source or Source
New FinalDraft Malware Spotted in Espionage Campaign
A newly identified malware family abuses the Outlook mail service for communication, via the Microsoft Graph API.
February 17, 2025 — Source
Researchers Caution AI Benchmark Score Reliability
Leaderboard Race May Be More Marketing Than Merit
February 17, 2025 — Source or Source or Source or Source or Source
Russian State Hackers Target Organizations With Device Code Phishing
Russian hackers have been targeting government, defense, telecoms, and other organizations in a device code phishing campaign.
February 17, 2025 — Source
The XCSSET info-stealing malware is back, targeting macOS users and devs
A new, improved variant of the XCSSET macOS malware has been spotted "in limited attacks" by Microsoft's threat researchers.
February 17, 2025 — Source
Two Estonians plead guilty in $577M cryptocurrency Ponzi scheme
Two Estonian nationals may spend the next 20 years in prison for stealing hundreds of millions of dollars through a massive cryptocurrency Ponzi scheme, the US Department of Justice announced last week.
February 17, 2025 — Source
Unlocking OSINT: Top books to learn from
Discover the top Open-Source Intelligence (OSINT) books in this curated list. From investigative techniques to digital footprint analysis, these titles offer insights for security professionals, journalists, and researchers looking to master the art of gathering and analyzing publicly available data.
February 17, 2025 — Source
Why Some States Are Beefing Up Their Health Cyber Regs
Attorney Amy Magnano of Morgan Lewis on What's Next From Feds, States
February 17, 2025 — Source or Source or Source or Source or Source
Xerox Versalink Printer Vulnerabilities Enable Lateral Movement
Xerox released security updates to resolve pass-back attack vulnerabilities in Versalink multifunction printers.
February 17, 2025 — Source
Internet — Security Issues — February 14th, 2025
Apps that threaten your security are on the rise in main app stores
Typically, major mobile app stores (namely Google's Play Store and Apple's App Store, among others) are a safe environment. Companies have invested in shields and security measures to keep users away from potentially harmful software. However, there are still some cases where malicious apps manage to temporarily sneak into these app stores, potentially compromising your security.
February 14, 2025 — Source
Avira Prime review: Comprehensive, user-friendly antivirus
Dig into this dead-simple antivirus suite and you'll find a sophisticated set of PC utilities.
February 14, 2025 — Source
Chinese hackers breach more US telecoms via unpatched Cisco routers
China's Salt Typhoon hackers are still actively targeting telecoms worldwide and have breached more U.S. telecommunications providers via unpatched Cisco IOS XE network devices.
February 14, 2025 — Source
Grip Security unveils SSPM solution to strengthen SaaS security posture
Grip Security has unveiled its SaaS Security Posture Management (SSPM) solution, which proactively identifies misconfigurations, enforces best practices and strengthens SaaS security posture against emerging risks. Unlike traditional SSPM products, Grip SSPM is built on a foundation of visibility and automation, enabling organizations to combine misconfiguration remediation and policy enforcement as part of a comprehensive security program that addresses SaaS security end-to-end. By consolidating SaaS security into a single platform, Grip SSPM streamlines operations, automates risk reduction and ensures continuous compliance.
February 14, 2025 — Source
Hackers exploit authentication bypass in Palo Alto Networks PAN-OS
Hackers are launching attacks against Palo Alto Networks PAN-OS firewalls by exploiting a recently fixed vulnerability (CVE-2025-0108) that allows bypassing authentication.
February 14, 2025 — Source
Hackers Exploit Palo Alto Firewall Vulnerability Day After Disclosure
Attempts to exploit CVE-2024-0108, an authentication bypass vulnerability in Palo Alto firewalls, started one day after disclosure.
February 14, 2025 — Source
Memorizing a good email password is easy. Here's how to do it
We all hate remembering passwords. But it's very doable.
February 14, 2025 — Source
Meta Paid Out Over $2.3 Million in Bug Bounties in 2024
Meta received close to 10,000 vulnerability reports and paid out over $2.3 million in bug bounty rewards in 2024.
February 14, 2025 — Source
New GRC and cyber risk strategies emphasize risk adaptability
MetricStream has unveiled its annual forecast of key trends shaping the future of GRC and Cyber GRC. These 2025 predictions offer a roadmap for building resilience strategies, addressing emerging risks, and seizing new opportunities.
February 14, 2025 — Source
New Windows Zero-Day Exploited by Chinese APT: Security Firm
ClearSky Cyber Security says it has seen a new Windows zero-day being exploited by a Chinese APT named Mustang Panda.
February 14, 2025 — Source
PirateFi game on Steam caught installing password-stealing malware
A free-to-play game named PirateFi in the Steam store has been distributing the Vidar infostealing malware to unsuspecting users.
February 14, 2025 — Source
Rising Tides: Lesley Carhart on Bridging Enterprise Security and OT—and Improving the Human Condition
In the latest edition of “Rising Tides” we talk with Lesley Carhart, Technical Director of Incident Response at Dragos.
February 14, 2025 — Source
SailPoint's Public Return Highlights SaaS Growth Strategy
President Matt Mills Shares M&A Vision, Machine Identity Security, Market Expansion
February 14, 2025 — Source or Source or Source or Source or Source
Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks
China-linked APT Salt Typhoon has been exploiting known vulnerabilities in Cisco devices in attacks on telecom providers in the US and abroad.
February 14, 2025 — Source
Sean Cairncross is Trump Nominee for National Cyber Director
Former RNC official Sean Cairncross has been nominated for the post of National Cyber Director to streamline the US cybersecurity strategy.
February 14, 2025 — Source
SGNL Raises $30 Million for Identity Management Solution
Identity management provider SGNL has raised $30 million in a Series A funding round led by Brightmind Partners.
February 14, 2025 — Source
SonicWall firewall bug leveraged in attacks after PoC exploit release
Attackers are now targeting an authentication bypass vulnerability affecting SonicWall firewalls shortly after the release of proof-of-concept (PoC) exploit code.
February 14, 2025 — Source or Source
SonicWall firewalls now under attack: Patch ASAP or risk intrusion via your SSL VPN
Roses are red, violets are blue, CVE-2024-53704 is sweet for a ransomware crew
February 14, 2025 — Source
Stop saving your email login in your password manager
Memorize your email password separately to avoid account lockouts.
February 14, 2025 — Source
The Benefits of the M&A Frenzy in Fraud Solutions
Emerging Vendors, Consolidation Drive Innovation in Fraud, AML and Scam Prevention
February 14, 2025 — Source or Source or Source or Source or Source
The Crux of Security Awareness: Stopping 'Death Clickers'
Who Are 'Death Clickers,' and How Do They Weaken Company's Cyber Defense?
February 14, 2025 — Source or Source or Source or Source
The security threats organizations are most concerned about [Q&A]
The cybersecurity landscape is constantly evolving and organizations need to stay up to date if they're to adequately protect themselves.
February 14, 2025 — Source
Threat actors are using legitimate Microsoft feature to compromise M365 accounts
Suspected Russian threat actors have been taking advantage of Microsoft Device Code Authentication to trick targets into granting them access to their Microsoft 365 (M365) accounts.
February 14, 2025 — Source
vCISOs are in high demand
Regardless of job title, 92% of executives stated they had some degree of confidence in their organization’s ability to meet compliance requirements and tackle advanced threats with current staff and tools, but confidence levels differed across leadership roles, according to Cyber Defense Group.
February 14, 2025 — Source
Virginia Attorney General's Office Struck by Cyberattack Targeting Attorneys' Computer Systems
The chief deputy attorney general of the agency sent an email on Wednesday that said nearly all of is computer systems were offline.
February 14, 2025 — Source
Why Private Equity Is Now Kicking the Tires on Trend Micro
Sluggish Sales Growth and Lower Relevance in Endpoint Could Make Trend Attractive
February 14, 2025 — Source or Source or Source or Source
YouTube Warns Users To Stay Vigilant As It Investigates Account Hijacking Campaign
For tech-savvy users (and everyone, really), it goes without saying that you should never click on links in emails willy-nilly. In light of a recent account hijacking campaign, however, YouTube has taken to X/Twitter with a warning to "be cautious" of phishing tomfoolery as it investigates bogus emails making the rounds that appear to come from YouTube.
February 14, 2025 — Source
Internet — Security Issues — February 10th, 2025
Building Trust in AI: Security and Risks in Highly Regulated Industries
This article highlights the essential concepts of responsible AI and its growing importance across industries, focusing on security, Machine Learning Operations (MLOps), and future implications of AI technologies. As organizations integrate AI, they must focus on security, transparency, ethical concerns, and compliance with emerging regulations. This summary reflects our presentation at QCon London 2024.
February 10, 2025 — Source
Can AI Early Warning Systems Reboot the Threat Intel Industry?
News analysis: The big AI platforms are emerging as frontline early warning systems, detecting nation-state hackers at the outset of their campaigns. Can this help save the threat intel industry?
February 10, 2025 — Source
Cyberattack disrupts Lee newspapers' operations across the US
Lee Enterprises, one of the largest newspaper groups in the United States, says a cyberattack that hit its systems caused an outage last week and impacted its operations.
February 10, 2025 — Source
Edge Devices Face Surge in Mass Brute-Force Password Attacks
Scale of Long-Running Attacks 'Unprecedented,' Warns The Shadowserver Foundation
February 10, 2025 — Source or Source or Source or Source or Source
Gmail Users Warned About the “Most Sophisticated Gmail Attacks Ever” AI-Powered Phishing Attack
Gmail users are facing an increasing risk of phishing attacks, with experts warning that these threats have become more sophisticated due to the use of AI. The Federal Bureau of Investigation (FBI), cybersecurity experts, and Google have issued guidance to help users protect their accounts from these evolving threats.
February 10, 2025 — Source
Hotspot Shield review: Feeling the need, the need for speed
Fast, secure, and good for streaming.
February 10, 2025 — Source
HPE Says Personal Information Stolen in 2023 Russian Hack
HPE is notifying an unknown number of individuals that Russian hackers accessed their personal information in a December 2023 attack.
February 10, 2025 — Source
Incorporating 'secure by design' into the software supply chain [Q&A]
Developers historically have not been all that security savvy, but as software supply chain security becomes a larger and larger problem every day, enterprises are going to need to secure packages before they are put into production environments.
February 10, 2025 — Source
Indiana Man Sentenced to 20 Years in Prison for Hacking, $37 Million Crypto Theft
Evan Light was sentenced to 20 years in federal prison for hacking an investment holdings company and stealing $37 million in cryptocurrency.
February 10, 2025 — Source
Information of 120,000 Stolen in Ransomware Attack on Georgia Hospital
Memorial Hospital and Manor says 120,000 people had their personal information stolen in a November 2024 ransomware attack.
February 10, 2025 — Source
Malicious ML models found on Hugging Face Hub
Researchers have spotted two machine learning (ML) models containing malicious code on Hugging Face Hub, the popular online repository for datasets and pre-trained models.
February 10, 2025 — Source
Media giant Lee Enterprises confirms cyberattack as news outlets report ongoing disruption
Publishing giant Lee Enterprises has confirmed a cyberattack on its systems is behind ongoing disruption at dozens of newspapers and media outlets across the United States.
February 10, 2025 — Source
Microsoft Expands Copilot Bug Bounty Program, Increases Payouts
Microsoft has added more Copilot consumer products to its bug bounty program and is offering higher rewards for medium-severity vulnerabilities.
February 10, 2025 — Source
Microsoft Warns of New Malware Attacks Exploiting ASP.NET Keys
Microsoft has warned about attackers exploiting exposed ASP.NET machine keys to deploy malware through ViewState code injection attacks. According to Microsoft Threat Intelligence experts, some developers have unknowingly used the ASP.NET validation key and decryption key values in their software's public code documentation and repositories.
February 10, 2025 — Source
Orthanc Server Vulnerability Poses Risk to Medical Data, Healthcare Operations
A critical vulnerability found in Orthanc servers can pose a serious risk to medical data and healthcare operations.
February 10, 2025 — Source
Police arrests 2 Phobos ransomware suspects, seizes 8Base sites
A global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of two suspected hackers in Phuket, Thailand, and the seizure of 8Base's dark web sites. The suspects are accused of conducting cyberattacks on over 1,000 victims worldwide.
February 10, 2025 — Source
Qubits to qudits: Using quantum mechanics to transmit information more securely
In the realm of quantum information distribution, sending a signal from point A to point B is like a baseball pitcher relaying a secret pitch call to the catcher. The pitcher has to disguise the signal from the opposing team and coaches, base runners, and even onlookers in the stands so no one else cracks the code.
February 10, 2025 — Source
Security Controls in the Android Operating System (OS)
In this post, we will learn the different security controls provided by the Android operating system (OS) to protect the applications running on the device.
February 10, 2025 — Source
SolarWinds Taken Private in $4.4 Billion Turn/River Capital Acquisition
SolarWinds will become a privately held company following its acquisition by Turn/River Capital for $4.4 billion in cash.
February 10, 2025 — Source
The biggest microcode attack in our history is underway
When your state machines are vulnerable, all bets are off
February 10, 2025 — Source
UK armed forces fast-tracking cyber warriors to defend digital front lines
High starting salaries promised after public sector infosec pay criticized
February 10, 2025 — Source
UK’s secret Apple iCloud backdoor order is a global emergency, say critics
In its latest attempt to erode the protections of strong encryption, the U.K. government has reportedly secretly ordered Apple to build a backdoor that would allow British security officials to access the encrypted cloud storage data of Apple customers anywhere in the world.
February 10, 2025 — Source
US news org still struggling to print papers a week after 'cybersecurity event'
Publications across 25 states either producing smaller issues or very delayed ones
February 10, 2025 — Source
Veridas helps companies combat AI-driven injection attacks
Generative AI is fueling a new wave of identity fraud, making digital security more critical than ever. In response, Veridas has introduced an advanced injection attack detection capability to combat the growing threat of synthetic identities.
February 10, 2025 — Source
Internet — Security Issues — February 7th, 2025
A View on Understanding Non-Human Identities Governance
Rethinking the governance, lifecycles, and interdependencies of your machine identities is essential for eliminating secrets sprawl and reducing your attack surface.
February 7, 2024 — Source
Asian Governments Rush to Ban DeepSeek Over Privacy Concerns
Governments Are Skeptical of Chinese AI Platform's Data Security Controls
February 7, 2024 — Source or Source or Source or Source or Source
Attackers Exploit Cryptographic Keys for Malware Deployment
3,000 Exposed ASP.NET Keys Put Web Applications at Risk of Code Injection Attacks
February 7, 2024 — Source or Source or Source or Source or Source
Cloudflare outage caused by botched blocking of phishing URL
An attempt to block a phishing URL in Cloudflare's R2 object storage platform backfired yesterday, triggering a widespread outage that brought down multiple services for nearly an hour.
February 7, 2024 — Source
Cyber Attack Severity Rating System Established in UK
The U.K.'s new cyberattack rating system ranks incidents from 1 to 5, but experts warn businesses must go beyond awareness and strengthen their defences.
February 7, 2024 — Source
DOGE Staffer Previously Fired From Cybersecurity Company for Leaking Secrets
The teen went by Big Balls online.
February 7, 2024 — Source
Encryption Debate: Britain Reportedly Demands Apple Backdoor
Secret Order Seeks to Compel Apple to Weaken Encryption, Washington Post Reports
February 7, 2024 — Source or Source or Source or Source
Hackers exploit Cityworks RCE bug to breach Microsoft IIS servers
Software vendor Trimble is warning that hackers are exploiting a Cityworks deserialization vulnerability to remotely execute commands on IIS servers and deploy Cobalt Strike beacons for initial network access.
February 7, 2024 — Source
Hidden backdoor in Go package remained undetected for years
A caching proxy server owned by Google turned into a significant security risk
February 7, 2024 — Source
HPE begins notifying data breach victims after Russian government hack
Hewlett Packard Enterprise has begun notifying individuals whose personal information was stolen during a 2023 cyberattack, which the company blamed on Russian government hackers.
February 7, 2024 — Source or Source
I found the most private and secure way to browse the web - and it isn't incognito mode
If you want the highest level of privacy and security online, you should be using the Tor browser.
February 7, 2025 — Source
In Other News: Cybersecurity Salaries, NanoLock Collapse, NSO Transparency Report
Noteworthy stories that might have slipped under the radar: NanoLock Security ceases operations, NSO publishes transparency report, cybersecurity salaries data.
February 7, 2025 — Source
Information of 883,000 Stolen in Crippling Attack on Hospital Sisters Health System
Hospital Sisters Health System says the personal information of 883,000 individuals was compromised in a 2023 crippling cyberattack.
February 7, 2025 — Source
ISMG Editors: AI Security Wake-Up Call From DeepSeek
Also: Addressing AI Vulnerabilities and Governance Challenges
February 7, 2025 — Source or Source or Source or Source or Source or Source
IT Teams Worry About Increasing Cost of Cyber Tools From AI Features, While Criminals Barely Use Them
Most IT leaders believe generative AI will increase the cost of their security tools, according to Sophos research. But, by the looks of cyber crime forums, hackers are barely using AI.
February 7, 2025 — Source
Joint guidance on building trust in artificial intelligence through a cyber risk-based approach
AI impacts almost every sector, from defence to energy. While it presents many opportunities for organizations, threat actors can exploit vulnerabilities and jeopardize the use of AI technology. Organizations and stakeholders need to assess the risks linked to their increased reliance on AI and their rapid adoption of large language models (LLMs). Understanding and mitigating these risks is critical to fostering trusted AI development and implementation.
February 7, 2025 — Source
Lakeside Software MSI Flaw Identified by Google Mandiant
SysTrack LsiAgent Installer Flaw Escalates Privileges Locally
February 7, 2025 — Source or Source or Source or Source or Source
Microsoft Edge update adds AI-powered Scareware Blocker
Microsoft Edge 133 is now rolling out globally, and it ships with several improvements, including a new scareware blocker feature. In addition, Microsoft is updating the backend of the Downloads UI with performance improvements.
February 7, 2025 — Source
Microsoft shares workaround for Windows security update issues
Microsoft has shared a workaround for users affected by a known issue that blocks Windows security updates from deploying on some Windows 11 24H2 systems.
February 7, 2025 — Source
Microsoft Warns of ViewState Code Injection Attacks Using Publicly Disclosed Machine Keys
Microsoft Threat Intelligence has identified a limited attack campaign leveraging publicly available ASP.NET machine keys to conduct ViewState code injection attacks.
February 7, 2025 — Source
Modern Bank Heists 2025: Revenge of the Zero Days
Tom Kellermann's Annual Report on Key Threats to Financial Sector
February 7, 2025 — Source or Source or Source or Source
Ransomware attacks hold your files hostage. These tools can free them
In a ransomware attack, extortionists demand a ransom and threaten to destroy data.
February 7, 2025 — Source
Ransomware Payments Dropped to $813 Million in 2025
An analysis by Chainalysis shows that ransomware payments dropped to $813 million in 2024, from $1.25 billion in 2023.
February 7, 2025 — Source
Shaping the future of cloud security with CNAPP [Q&A]
As cloud environments become complex, security teams face increasing challenges in detecting, prioritizing, and addressing risks.
February 7, 2025 — Source
The best travel VPNs: Expert tested
We tested the best VPNs for travel purposes, ranking their networks, security, speed, and streaming capabilities. These VPNs are our favorites.
February 7, 2025 — Source
ThreatMate Raises $3.2 Million for Attack Surface Management Platform
ThreatMate has raised $3.2 million in seed funding for its AI-powered attack surface management solution for MSPs.
February 7, 2025 — Source
Trimble Cityworks Customers Warned of Zero-Day Exploitation
Trimble Cityworks is affected by a zero-day vulnerability that has been exploited in attacks involving the delivery of malware.
February 7, 2025 — Source
Trump Targets FBI, CISA Cyber Officials in Workforce Purge
White House Ousts Key FBI and CISA Cyber Leaders, Raising Security Concerns
February 7, 2025 — Source or Source or Source or Source or Source
UK Engineering Giant IMI Hit by Cyberattack
UK engineering firm IMI says it suffered a cyberattack that resulted in unauthorized access to some of its systems.
February 7, 2025 — Source
UK Home Office silent on alleged Apple backdoor order
Blighty's latest stab at encryption? A secret order to pry open iCloud, sources claim
February 7, 2025 — Source
UK industry leaders unleash hurricane-grade scale for cyberattacks
Freshly minted organization aims to take the guesswork out of incident severity for insurers and policy holders
February 7, 2025 — Source
US health system notifies 882,000 patients of August 2023 breach
Hospital Sisters Health System notified over 882,000 patients that an August 2023 cyberattack led to a data breach that exposed their personal and health information.
February 7, 2025 — Source
Was Your Personal Data Exposed in the Grubhub Data Breach? Here's How to Protect Yourself
If you use the online food delivery service, there are a few steps you can take.
February 7, 2025 — Source
Internet — Security Issues — February 5th, 2025
3 Health Groups Report 2024 Hacks Affecting 1.2 Million
Attacks Hit Hospitals, Clinics in California, Alabama and Colorado
February 5th, 2025 — Source or Source
7-Zip 0-day was exploited in Russia's ongoing invasion of Ukraine
Vulnerability stripped MotW tag Windows uses to flag Internet-downloaded files.
February 5th, 2025 — Source or Source
21% of CISOs Have Been Pressured Not to Report a Compliance Issue, Research Finds
CISOs face growing boardroom pressure, compliance challenges, and cyber threats. Discover key insights from Splunk's latest report on cybersecurity leadership.
February 5th, 2025 — Source
Abandoned Amazon S3 Buckets Could Have Enabled Attacks Against Governments, Big Firms
150 abandoned Amazon S3 buckets could have been leveraged to deliver malware or backdoors to governments and Fortune companies.
February 5th, 2025 — Source
AMD fixes bug that lets hackers load malicious microcode patches
AMD has released mitigation and firmware updates to address a high-severity vulnerability that can be exploited to load malicious CPU microcode on unpatched devices.
February 5th, 2025 — Source
As Internet enshittification marches on, here are some of the worst offenders
Ars staffers take aim at some of the web's worst predatory practices.
February 5th, 2025 — Source
Atrinet URL Scanner helps comabat SMS phishing
Atrinet launched Atrinet URL Scanner, a solution designed to combat real-time SMS fraud.
February 5th, 2025 — Source
Avast One review: Well-priced PC security with excellent protection
This security suite stands out for more than just its excellent antivirus protection.
February 5th, 2025 — Source
Best free VPN of 2025: It's important to choose wisely
VPNs are best when they're paid for, but if a premium account isn't in the cards then here are our top recommendations for a free service.
February 5th, 2025 — Source
Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities
Chrome 133 and Firefox 135 were released with patches for multiple high-severity memory safety vulnerabilities.
February 5th, 2025 — Source
CISA Adds Four Vulnerabilities to Catalog for Federal Enterprise
CISA adds four new vulnerabilities to its catalog, urging agencies to remediate risks. Learn about the latest exploits and how they impact enterprise security.
February 5th, 2025 — Source
CISA Issues Exploitation Warning for .NET Vulnerability
CISA has added CVE-2024-29059, a flaw affecting Microsoft .NET, to its Known Exploited Vulnerabilities catalog.
February 5th, 2025 — Source
Cisco patches two critical Identity Services Engine flaws
One gives root access, the other lets you steal info and reconfig nodes, in the right (or should that be wrong) circumstances
February 5th, 2025 — Source
Constitutional classifiers: New security system drastically reduces chatbot jailbreaks
A large team of computer engineers and security specialists at AI app maker Anthropic has developed a new security system aimed at preventing chatbot jailbreaks.
February 5th, 2025 — Source
Cyber Insights 2025: OT Security
Just as OT technology differs from IT technology, the threats, likely adversaries, and potential harm also differ.
February 5th, 2025 — Source
Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
XE Group, a cybercriminal outfit that has been active for over a decade, has been quietly exploiting zero-day vulnerabilities (CVE-2025-25181, CVE-2024-57968) in VeraCore software, a popular solution for warehouse management and order fulfillment.
February 5th, 2025 — Source
Cybersecurity M&A Roundup: 45 Deals Announced in January 2025
A significant number of cybersecurity-related merger and acquisition (M&A) deals announced in January 2025.
February 5th, 2025 — Source
Cynet's New CEO Jason Magee Seeks Scalable US Market Growth
Former ConnectWise CEO Plans US Growth, Operational Maturity, Product Innovation
February 5th, 2025 — Source or Source or Source or Source or Source
eBay's newest Nvidia GPU scams are even dumber than before
As always, duplicitous scammers are trying to bilk you out of your bucks — now with a veneer of "anti-bot" BS.
February 5th, 2025 — Source
Ex-HIPAA Officer: State Illegally Shared PHI for Research
Lawsuit Claims R.I. Health Information Exchange Retaliated Against 'Whistleblower'
February 5th, 2025 — Source or Source or Source or Source
Data breaches in UK legal sector up over a third
The report shows that in the period between Q3 2023 and Q2 2024, the number of identified data breaches in the UK legal sector rose by 39 percent (2,284 cases were reported to the ICO, compared to 1,633 the previous year).
February 5th, 2025 — Source
DDoSed by Policy: Website Takedowns and Keeping Information Alive
Who needs a DDoS (Denial of Service) attack when you have a new president? As of February 2nd, thousands of web pages and datasets have been removed from U.S. government agencies following a series of executive orders. The impacts span the Department of Veteran Affairs and the Center of Disease Control and Prevention, all the way to programs like Head Start.
February 5th, 2025 — Source
Dynatrace strengthens cloud security posture management
Dynatrace announced the expansion of its security portfolio with a new Cloud Security Posture Management (CSPM) solution.
February 5th, 2025 — Source
Five Eyes Releases Guidance on Securing Edge Devices
Guidance Intended to Help Companies Detect Compromises Faster
February 5th, 2025 — Source or Source or Source
Forrester: DeepSeek's Security, Privacy, Geopolitical Risks
Analyst Allie Mellen on Open-Source AI Adoption, Vendor Considerations, Data Risks
February 5th, 2025 — Source or Source or Source or Source or Source
Go Module Mirror served backdoor to devs for 3+ years
Supply chain attack targets developers using the Go programming language.
February 5th, 2025 — Source
Hackers spoof Microsoft ADFS login pages to steal credentials
A help desk phishing campaign targets an organization's Microsoft Active Directory Federation Services (ADFS) using spoofed login pages to steal credentials and bypass multi-factor authentication (MFA) protections.
February 5th, 2025 — Source
GrubHub got hacked. Go change your password!
The amount of leaked data varies by individual.
February 5th, 2025 — Source
How Agentic AI will be Weaponized for Social Engineering Attacks
With each passing year, social engineering attacks are becoming bigger and bolder thanks to rapid advancements in artificial intelligence.
February 5th, 2025 — Source
How attackers abuse S3 Bucket Namesquatting — And How to Stop Them
With the sheer amount of data and users leveraging AWS, it's easy for misconfigurations to slip through the cracks. One commonly overlooked area is the naming of S3 buckets.
February 5th, 2025 — Source
How to turn on Private DNS Mode on Android - and why it's a must for security
Enabling Private DNS Mode on Android means your searches and other DNS queries are encrypted and safe from prying eyes. Here's everything else you need to know.
February 5th, 2025 — Source
Kaspersky researchers find screenshot-reading malware on the App Store and Google Play
It might be the first time this type of stealer has cracked iPhones.
February 5th, 2025 — Source
Mental Malware: Overcoming Self-Doubt That Holds You Back
Mitigate Career Risk With a Self-Audit, Targeted Training and Real-World Testing
February 5th, 2025 — Source or Source or Source or Source or Source
Netgear Issues Critical Security Alert For These Gaming Wi-Fi Routers
Netgear has issued an urgent security update for six of its popular WiFi home gateways, including three Nighthawk Pro gaming routers, after researchers uncovered severe Remote Code Execution (RCE) vulnerabilities. These flaws, which allow attackers to run arbitrary code on the devices without authentication, have been patched—but users must manually update their firmware to stay protected.
February 5th, 2025 — Source
New target of Paragon spyware comes forward
On Wednesday, Mediterranea Saving Humans, an Italian nonprofit with the mission of rescuing immigrants who try to cross the Mediterranean Sea from Africa to Europe, said one of its founders was among the targets of a recent spyware campaign carried out against WhatsApp users.
February 5th, 2025 — Source
Paragon spyware used to target citizens across Europe, says Italian government
The Italian government said in a press release on Wednesday that a spyware campaign revealed by WhatsApp, and carried out with spyware made by Paragon Solutions, targeted people across several countries in Europe.
February 5th, 2025 — Source
Phishing-as-a-Service kits see a surge as threat actors target weaknesses
Because PhaaS kits are increasingly accessible, it's easier for threat actors to carry out advanced phishing attacks with minimal technical knowledge. According to the LevelBlue Threat Trends Report, there's a new PhaaS, known as RaccoonO365, on the block too. This kit uses methods that can intercept user credentials and multi-factor authentication (MFA) session cookies to bypass these common defensive measures.
February 5th, 2025 — Source
Proton Pass versus 1Password: Which password manager is right for you?
Proton Pass and 1Password offer secure password safekeeping with similarly priced plans. Still, one service may suit your needs better than the other. Here's how to pick the right one.
February 5th, 2025 — Source
Open-Source AI: Power Shift or Pandora's Box?
Could Open-Source AI Redefine the Future? Here's What Experts Say
February 5th, 2025 — Source or Source or Source or Source or Source
Ransomware payments fell by 35% in 2024, totalling $813,550,000
Payments to ransomware actors decreased 35% year-over-year in 2024, totaling $813.55 million, down from $1.25 billion recorded in 2023.
February 5th, 2025 — Source
Ransomware: Victims Who Pay a Ransom Drops to All-Time Low
Incident Response Firm Reports 25% of Victims Paid - Typically for a Decryptor
February 5th, 2025 — Source or Source or Source or Source or Source
Riot Raises $30 Million for Employee Cybersecurity Solution
Riot has raised $30 million in Series B funding for a platform that helps employees improve their cybersecurity posture.
February 5th, 2025 — Source
SafeBreach exposure validation platform identifies security gaps
SafeBreach launched SafeBreach exposure validation platform, which combines the power of its time-tested breach and attack simulation (BAS) product—now called Validate—and its new attack path validation product, Propagate. Together, they provide enterprise security teams with deeper insight into threat exposure and a more comprehensive view of cyber risk.
February 5th, 2025 — Source
Satori provides visibility into data store risk levels
Satori announced its new capabilities, enabling security teams to be in control of all customer data across the development lifecycle in a simple, cost-effective, and holistic way.
February 5th, 2025 — Source
Semgrep Raises $100M for AI-Powered Code Security Platform
San Francisco application security startup raises $100 million in a Series D funding round led by Menlo Ventures.
February 5th, 2025 — Source
Spain arrests suspected hacker of US and Spanish military agencies
The Spanish police have arrested a suspected hacker in Alicante for allegedly conducting 40 cyberattacks targeting critical public and private organizations, including the Guardia Civil, the Ministry of Defense, NATO, the US Army, and various universities.
February 5th, 2025 — Source
Stop saving your email login in your password manager
Memorize your email password separately to avoid account lockouts.
February 5th, 2025 — Source
Swap EOL Zyxel routers, upgrade Netgear ones!
There will be no patches for EOL Zyxel routers under attack via CVE-2024-40891, the company has confirmed. Meanwhile, Netgear has issued patches for critical flaws affecting its routers and wireless access points.
February 5th, 2025 — Source
Thailand to Cut Off Power to Scam Centers - Will It Work?
Officials Hope to Curb Global Fraud by Targeting Border Operations in Myanmar
February 5th, 2025 — Source or Source or Source or Source or Source or Source
The best VPN services: Expert tested
The VPN market has continued to expand in 2025. We've extensively tested and analyzed the best VPN solutions available, ranking their security, speed, and features.
February 5th, 2025 — Source
White House Defends Musk Amid Sensitive Data Access Uproar
Lawmakers Warn of Security Risks as DOGE is 'Running Roughshod' in Federal Systems
February 5th, 2025 — Source or Source or Source
Worried About Data Breaches? Here's How to Freeze Your Credit Right Now
Data breaches happen pretty much every day, across multiple industries. Freezing your credit offers you a way to protect your identity for free.
February 5th, 2025 — Source
Virtual private networks (ITSAP.80.101)
A virtual private network (VPN ) is a secure connection that can allow remote access to a corporate network. A VPN acts as a tunnel to send and receive data securely and to allow users to interact and work as though they are onsite. This publication introduces some of the considerations when an organization is looking to use VPN technologies for business purposes.
February 5th, 2025 — Source
Zyxel Issues 'No Patch' Warning for Exploited Zero-Days
Multiple Zyxel legacy DSL CPE products are affected by exploited zero-day vulnerabilities that will not be patched.
February 5th, 2025 — Source
Internet — Security Issues — February 3rd, 2025
2 officers bailed as anti-corruption unit probes data payouts to N Irish cops
Investigating compensation to police whose sensitive info was leaked in 2023
February 3rd, 2025 — Source
4 exotic phishing scams are on the rise. Here's how to catch them in the act
Phishing attacks can be difficult to spot, especially when AI is involved.
February 3rd, 2025 — Source
6 Best No-Log VPNs for 2025
Looking for the best anonymous (no-log) VPN? Check out our comprehensive list to find the top VPN services that prioritize anonymity and security.
February 3rd, 2025 — Source
1 Million Impacted by Data Breach at Connecticut Healthcare Provider
Community Health Center, Inc. says hackers stole the personal and health information of over one million individuals.
February 3rd, 2025 — Source
Amazon Redshift gets new default settings to prevent data breaches
Amazon has announced key security enhancements for Redshift, a popular data warehousing solution, to help prevent data exposures due to misconfigurations and insecure default settings.
February 3rd, 2025 — Source
DeepSeek AI blocked by 'hundreds' of companies, report reveals
DeepSeek's arrival has shaken the foundations of the current artificial intelligence industry. However, its data handling policies have also raised red flags among experts and US officials alike. Now, it appears that "hundreds" of companies and government organizations are blocking DeepSeek over concerns about data security.
February 3rd, 2025 — Source or Source or Source or Source or Source
Canadian charged with stealing $65 million using DeFI crypto exploits
The U.S. Justice Department has charged a Canadian man with stealing roughly $65 million after exploiting two decentralized finance (DeFI) protocols.
February 3rd, 2025 — Source
Casio Website Infected With Skimmer
A threat actor has infected Casio UK's website with a web skimmer on all pages, except the typical checkout page.
February 3rd, 2025 — Source or Source
Crossing the divide: How IT and OT can work together to secure the future
In cybersecurity, the divide between IT (Information Technology) and OT (Operational Technology) remains a problem that practitioners, vendors, and consultants must navigate daily. The differences between these two mindsets -- one rooted in the world of delivering data and maintaining software, the other firmly planted in the realm of continuous uptime of industrial systems -- can lead to conflicting priorities and misunderstandings. Even as the industry strives to align these domains, this divergence is still evident, as I was reminded just this week.
February 3rd, 2025 — Source
Cyber Insights 2025: Quantum and the Threat to Encryption
2025 is an important year -- it is probably our last chance to start our migration to post quantum cryptography before we are all undone by cryptographically relevant quantum computers.
February 3rd, 2025 — Source
Cyber security implications of DeepSeek's open-source AI model
Experts discuss the cyber security ramifications following the shock release of DeepSeek's open-source AI model
February 3rd, 2025 — Source
Discord user data leak resurfaces on hacker forum as third-party service disputes breach
RestoreCord, a Discord backup service, previously suffered a data breach, but wants to dispel current reports about a new leak.
February 3rd, 2025 — Source
Elon Musk Access to Key Data Systems Sparks Cyber Alarms
Lawmakers Demand Answers After Musk Aides Gain Access to Key Payment Systems
February 3rd, 2025 — Source or Source or Source or Source
Hundreds of Thousands Hit by Data Breaches at Healthcare Firms in Colorado, North Carolina
Hundreds of thousands have been impacted by data breaches at Asheville Eye Associates and Delta County Memorial Hospital District.
February 3rd, 2025 — Source
Insurance Company Globe Life Notifying 850,000 People of Data Breach
Insurance firm Globe Life says a threat actor may have compromised the personal information of roughly 850,000 individuals.
February 3rd, 2025 — Source
Is Bluesky the New X?
You might have noticed "Bluesky" popping up across your social media feeds recently, sparking curiosity about this new platform. Bluesky is an alternative to Elon Musk's X (formerly Twitter), featuring a similar color scheme and logo. Rapidly gaining traction, Bluesky currently adds around one million new users daily, with over 30 million users as of February 2025—a number likely to grow quickly.
February 3rd, 2025 — Source
Is iOSGods Safe To Download on iOS? Read This First
While searching for alternative ways to install iOS apps, you may have found information about "lesser-known" sources. One of these is iOSGods, and you may be wondering what it is and whether it's safe to use. Here's what you have to know about iOSGods and other alternative ways of installing iOS apps.
February 3rd, 2025 — Source
Journalist targeted on WhatsApp by Paragon spyware: 'I feel violated'
On Friday, at 2:48 p.m., Francesco Cancellato received an ominous notification on his cell phone while he was at home near Milan.
February 3rd, 2025 — Source
MDR for MSPs: Navigating EDR compatibility
When it comes to endpoint detection and response (EDR) compatibility within an MDR offering, managed service providers (MSPs) are weighing two key priorities: native EDR integration or the flexibility to support multiple solutions. According to a recent OpenText survey, opinions are split almost evenly. While 52% of MSPs view native compatibility as moderately or very important, 48% place greater value on flexibility.
February 3rd, 2025 — Source
Microsoft 365 is dumping its VPN - try these alternatives instead
The company is retiring the VPN tool while raising prices for Microsoft 365 Personal and Family subscriptions.
February 3rd, 2025 — Source
Microsoft to kill off Defender VPN this month
Throw Copilot down the same well, too, maybe? No? OK
February 3rd, 2025 — Source or Source
Modern Discord hacked into Windows 95 and 98, slimmed down version keeps core functionality intact
There are some era-appropriate limitations, though
February 3rd, 2025 — Source
New Microsoft Unit to Navigate Impact of AI
'Advanced Planning Unit' to Focus on Societal, Economic, Workplace Implications
February 3rd, 2025 — Source or Source or Source or Source or Source
New Phishing Kit Bypasses Two-Factor Protections
Astaroth Kit Offered for $2,000 on Telegram, Intercepts Authentication in Real Time
February 3rd, 2025 — Source
Qualys TotalAppSec enables organizations to address risks across web applications and APIs
Qualys announced TotalAppSec, its new AI-powered application risk man
February 3rd, 2025 — Source
Riot raises $30 million for its cybersecurity product suite focused on employees
French startup Riot has raised a $30 million Series B round after reaching $10 million in annual revenue in 2024. Originally focused on educating employees about cybersecurity risks, the company now wants to go one step further and nudge employees so that they minimize their attack surface.
February 3rd, 2025 — Source
Singapore to Probe DeepSeek's High-End Nvidia Chip Purchases
US to Investigate Whether DeepSeek Bypassed Export Controls to Obtain Nvidia Chips
February 3rd, 2025 — Source or Source or Source or Source or Source
Tana snaps up $25M as its AI-powered knowledge graph for work racks up a 160K+ waitlist
An app that helps people and teams in the working world simplify their to-do lists — ideally by organizing and doing some of the work for them — has remained one of the unsolved goals in business technology. Leaning into AI, on top of battle scars from once building Google Wave, a startup called Tana believes it's cracked the code on how to reach it.
February 3rd, 2025 — Source
The Stumbling Blocks of Open Banking
UK Banks Face Adoption Challenges and Cybersecurity Concerns
February 3rd, 2025 — Source or Source or Source or Source or Source
Total Fines Imposed by EU Privacy Regulators Dropped in 2025
At the Same Time, the Total Number of Breach Notifications to Consumers Increased
February 3rd, 2025 — Source or Source or Source or Source
TSA's airport facial-recog tech faces audit probe
Senators ask, Homeland Security watchdog answers: Is it worth the money?
February 3rd, 2025 — Source
What PowerSchool won't say about its data breach affecting millions of students
It's only February, but the recent hack of U.S. edtech giant PowerSchool has the potential to be one of the biggest breaches of the year.
February 3rd, 2025 — Source
XE Group Cybercrime Gang Moves from Credit Card Skimming to Zero-Day Exploits
Vietnamese cybercrime gang shifts from credit card-skimming to exploiting at least two zero-day vulnerabilities enterprise software product.
February 3rd, 2025 — Source
Internet — Security Issues — January 24th, 2025
80 percent of organizations are adopting passkeys but many face challenges with older systems
A new report finds that 80 percent of organizations are using or planning to adopt passkeys, as they offer a significant reduction in risks like phishing and credential stuffing, compared to traditional passwords.
January 24th, 2025 — Source
Americans Are Using Stupid Passwords, Here’s the Best Tool to Stay Protected
"secret", "123456" and "password" are the most common (and bad) passwords in the U.S.
January 24th, 2025 — Source
Aviat Networks enhances software cybersecurity offering
Aviat Networks announced that it has enhanced its Secure Software Development Lifecycle (SSDLC) process and Software Vulnerability Alert (SVA) service designed to strengthen Aviat’s software and firmware development process to comply with latest cybersecurity requirements.
January 24th, 2025 — Source
CISA Warns of Flaws in Aircraft Collision Avoidance Systems
Hackers Unlikely to Exploit Flaws in the Wild
January 24th, 2025 — Source or Source or Source or Source or Source
CISA Warns of Old jQuery Vulnerability Linked to Chinese APT
CISA has added the JQuery flaw CVE-2020-11023, previously linked to APT1, to its Known Exploited Vulnerabilities (KEV) catalog.
January 24th, 2025 — Source
Curbing the Rise in Investment Scams
Fraud Expert Ken Westbrook on Successful Ways to Stop Fake Investment Sites
January 24th, 2025 — Source or Source or Source or Source
Cyber Insights 2025: Social Engineering Gets AI Wings
Business resilience must be the ultimate purpose of all the security controls and processes we employ, because we will never conclusively defeat or protect ourselves from social engineering.
January 24th, 2025 — Source
Don't Get Schooled: Lessons From PowerSchool's Big Breach
Why MFA and Data Minimization Remain Key for Preventing Massive Data Breaches
January 24th, 2025 — Source or Source or Source or Source or Source
Don't want your Kubernetes Windows nodes hijacked? Patch this hole now
SYSTEM-level command injection via API parameter *chef's kiss*
January 24th, 2025 — Source
Google launches Identity Check, a new location-based security feature, and completes roll-out of AI-powered theft detection
Theft of mobile devices is a crime that is not going away any time soon. Phones are now completely central to so many aspects of life, and the theft (or loss) is about much more than the monetary value of the device itself. There is great potential for a thief to gain access to a wealth of information via a stolen phone.
January 24th, 2025 — Source
Hacker infects 18,000 "script kiddies" with fake malware builder
A threat actor targeted low-skilled hackers, known as "script kiddies," with a fake malware builder that secretly infected them with a backdoor to steal data and take over computers.
January 24th, 2025 — Source
Hackers Earn $886,000 at Pwn2Own Automotive 2025 for Charger, OS, Infotainment Exploits
Pwn2Own Automotive 2025 has come to an end and participants have earned a total of $886,000 for exploits targeting EV chargers and infotainment systems.
January 24th, 2025 — Source or Source
Hackers use Windows RID hijacking to create hidden admin account
A North Korean threat group has been using a technique called RID hijacking that tricks Windows into treating a low-privileged account as one with administrator permissions.
January 24th, 2025 — Source
If you use the Chrome Browser, you need to heed this security warning now!
A new security alert has been issued for the billions of people who use the Google Chrome web browser on all platforms except for one-iOS. To reiterate, those using the Chrome Browser on Android and other platforms need to heed the latest security update warning for Chrome. Incredibly, just last week the Chrome Browser was the subject of another security alert. The platforms where Chrome is vulnerable to the following vulnerabilities include Android, Linux, macOS, and Windows.
January 24th, 2025 — Source
In Other News: VPN Supply Chain Attack, PayPal $2M Settlement, RAT Builder Hacks Script Kiddies
Noteworthy stories that might have slipped under the radar: Korean VPN supply chain attack, PayPal settles with New York for $2 million, trojanized RAT builder targets script kiddies.
January 24th, 2025 — Source
Information Security Career Advice: 'Pick Your Battles'
'Decide What You Care About,' Advises Black Hat Conference Founder Jeff Moss
January 24th, 2025 — Source or Source
Lawsuit Claims LinkedIn Used Private Messages to Train AI
California User's Class Action Suit Says LinkedIn Violated Contract, Privacy Regs
January 24th, 2025 — Source or Source or Source or Source
Managed Detection and Response – How are you monitoring?
Security Information and Event Management (SIEM) systems are now a critical component of enterprise security operations, helping organizations detect, respond to, and manage threats in an increasingly complex cyber threat landscape.
January 24th, 2025 — Source
Microsoft is changing the way you sign in - and it could be a security nightmare
Starting next month, if you don't want the browser to remember your Microsoft login credentials, you'll have to manually log out or open the page in private browsing mode.
January 24th, 2025 — Source
Microsoft: Outdated Exchange servers fail to auto-mitigate security bugs
Microsoft says outdated Exchange servers cannot receive new emergency mitigation definitions because an Office Configuration Service certificate type is being deprecated.
January 24th, 2025 — Source
Millions Impacted by PowerSchool Data Breach
Four decades of student and educator information was stolen from PowerSchool – tens of millions are potentially affected.
January 24th, 2025 — Source
Millions of Subarus could be remotely unlocked, tracked due to security flaws
Flaws also allowed access to one year of location history.
January 24th, 2025 — Source
North Korean Fake IT Workers More Aggressively Extorting Enterprises
North Korean fake IT workers are more aggressively extorting their employers in response to law enforcement actions.
January 24th, 2025 — Source
North Korean IT workers are extorting employers, FBI warns
The FBI is on a mission to raise awareness about the threat that North Korean IT workers present to organizations in the US and around the world.
January 24th, 2025 — Source or Source
OpenAI Launches AI Agent 'Operator'
Operator Cannot Yet Reliably Perform Complex, Customized Tasks
January 24th, 2025 — Source or Source or Source or Source or Source
Palo Alto Networks Addresses Impact of BIOS, Bootloader Vulnerabilities on Its Firewalls
Eclypsium warns that Palo Alto Networks firewalls are impacted by BIOS and bootloader flaws, but the vendor says users should not be concerned.
January 24th, 2025 — Source
Patching Lags for Vulnerabilities Targeted by Salt Typhoon
Chinese Hackers Hitting Unpatched Products From Microsoft, Sophos, Fortinet, Ivanti
January 24th, 2025 — Source or Source or Source or Source or Source
Post-Quantum Cryptography 2025: The Enterprise Readiness Gap
Enterprises Prepare for Quantum-Resilient Infrastructures to Combat Future Threats
January 24th, 2025 — Source or Source or Source or Source or Source
Security Bite: How hackers are still using Google Ads to spread malware
Last weekend, Google was found again serving a malicious website at the top of Search as a sponsored result. This isn’t the first time Google Ads has approved websites with embedded malware; in fact, the first instance of this goes back to 2007 when the platform (then called Google AdWords) was promoting fake antivirus software widely referred to as “scareware” at the time. But how, in 2025, can Google, with its DeepMind and deeper pockets, still allow this to happen? How are hackers outsmarting it?
January 24th, 2025 — Source
Startup radar: Seattle founders tackle city permits, medical records, estate planning, cybersecurity
We’re spotlighting four new startups in Seattle that are looking to shake up various business processes with help from AI and other software tools.
January 24th, 2025 — Source
Subaru Starlink flaw let hackers hijack cars in US and Canada
Security researchers have discovered an arbitrary account takeover flaw in Subaru's Starlink service that could let attackers track, control, and hijack vehicles in the United States, Canada, and Japan using just a license plate.
January 24th, 2025 — Source or Source or Source
The best password managers for businesses: Expert tested
These are the best password managers for businesses on the market, whether you own a small business or need an enterprise-grade security solution.
January 24th, 2025 — Source
The Microsoft 365 Copilot launch was a total disaster
At the start of the New Year, with no warning, Microsoft gives its flagship productivity app a name change and a huge price increase. Why would the company make this mess? I asked Copilot, who explained it very well.
January 24th, 2025 — Source
The rising tide of ransomware and what it means for small and medium-sized businesses [Q&A]
Small and medium-sized businesses (SMBs) are facing an escalating onslaught of cyberattacks as they evolve in both sophistication and speed. Among the most insidious threats are ransomware variants like QakBot and Black Basta, which operate in the shadows, often slipping past the radar of law enforcement and the media.
January 24th, 2025 — Source
The top 10 brands exploited in phishing attacks - and how to protect yourself
Impersonating a well-known brand is an easy way for scammers to get people to click their malicious links. Here's what to watch for.
January 24th, 2025 — Source
Trans-Atlantic Commercial Data Flows Could be Imperiled
The EU-US Data Privacy Framework Requires a Functional PCLOB
January 24th, 2025 — Source
Trump Reorders Federal AI Policy
Executive Order Scraps Biden-Era Policies
January 24th, 2025 — Source or Source or Source or Source
US Charges Five People Over North Korean IT Worker Scheme
The US has announced charges against five individuals involved in a fake IT workers scheme to funnel funds to North Korea.
January 24th, 2025 — Source
Watch out for malicious QR codes! This kind of scam is increasing
Think before you scan.
January 24th, 2025 — Source
Why AI in Healthcare Harkens Back to Early Social Media Use
Keith Fricke of tw-Security on AI Opportunities and Challenges
January 24th, 2025 — Source or Source or Source or Source or Source
Why Surfshark is the best affordable VPN for protecting your privacy
Surfshark has quickly become my go-to VPN, and it's easy to see why it stands out from the crowd. Whether I'm on Windows, Mac, Linux, Android, or iOS, this VPN ensures all my devices are fully protected. That kind of cross-platform support is exactly what I need in a service.
January 24th, 2025 — Source
Zyxel warns of bad signature update causing firewall boot loops
Zyxel is warning that a bad security signature update is causing critical errors for USG FLEX or ATP Series firewalls, including putting the device into a boot loop.
January 24th, 2025 — Source
Internet — Security Issues — January 22nd, 2025
15 States Sue HHS to Drop HIPAA Reproductive Health Info Reg
HHS' Privacy Rule Update Limits Use, Disclosure of Reproductive Health PHI
January 22nd, 2025 — Source or Source or Source or Source or Source
2025 Seems To Be Bringing A Botnet Bonanza
2025 is looking, amongst other things, to be the year of the botnet. Yesterday Cloudflare reported on a recent DDoS from 13,000 IoT devices infected by a variant of Mirai that peaked at 5.6 terabits per second, which is now the largest DDoS ever recorded. Another security company, Qualys, found 1,500 IP addresses assigned to AVTECH cameras and Huawei HG532 routers infected with a Mirai variant called Murdoc Botnet which seems to be growing by hundreds of devices every day.
January 22nd, 2025 — Source
48,000+ internet-facing Fortinet firewalls still open to attack
Despite last week's confirmation of and warnings about long-standing exploitation of CVE-2024-55591, a critical vulnerability affecting Fortinet Fortigate firewalls, too many vulnerable devices are still accessible from the Internet and open to attack: over 48,000, according to data from the Shadowserver Foundation.
January 22nd, 2025 — Source
Application Security Firm DryRun Raises $8.7 Million in Seed Funding
DryRun Security has raised $8.7 million in a seed funding round for its AI-powered application security solutions.
January 22nd, 2025 — Source
Best VPNs for torrenting 2025: Speed, privacy, and security matter
Stay safe while torrenting with these top VPN picks.
January 22nd, 2025 — Source
Book Review: Infected -- A Candid Look at VirusTotal's Birth and Legacy
Part entrepreneurial adventure, part security history, Bernardo Quintero's 'Infected' documents how the VirusTotal side project became a threat-intel cornerstone.
January 22nd, 2025 — Source
Call for Presentations Open for SecurityWeek's 2025 Supply Chain Security & Third-Party Risk Summit
Join Us in Shaping the Future of Supply Chain Security -- Don't miss this chance to be part of the conversation addressing one of the most pressing cybersecurity challenges .
January 22nd, 2025 — Source
Cisco warns of denial of service flaw with PoC exploit code
Cisco has released security updates to patch a ClamAV denial-of-service (DoS) vulnerability, which has proof-of-concept (PoC) exploit code.
January 22nd, 2025 — Source
Cloudflare CDN flaw leaks user location data, even through secure chat apps
A security researcher discovered a flaw in Cloudflare's content delivery network (CDN), which could expose a person's general location by simply sending them an image on platforms like Signal and Discord.
January 22nd, 2025 — Source
Conduent confirms cybersecurity incident behind recent outage
American business services giant and government contractor Conduent confirmed today that a recent outage resulted from what it described as a "cyber security incident."
January 22nd, 2025 — Source or Source
Continuous controls monitoring 'transformative' for security
According to a new report from RegScale and The CISO Society, 94.2 percent of CISOs believe continuous controls monitoring (CCM) has the potential to significantly enhance both compliance and security outcomes.
January 22nd, 2025 — Source
Critical zero-days impact premium WordPress real estate plugins
The RealHome theme and the Easy Real Estate plugins for WordPress are vulnerable to two critical severity flaws that allow unauthenticated users to gain administrative privileges.
January 22nd, 2025 — Source
Cyber Insights 2025: APIs -- The Threat Continues
APIs are easy to develop, simple to implement, and frequently attacked. They are prime and lucrative targets for cybercriminals.
January 22nd, 2025 — Source
DataDome DDoS Protect detects application layer-based threats
DataDome unveiled DDoS Protect, a cloud-based service designed to block distributed denial-of-service (DDoS) attack traffic at the edge before it overwhelms an organization's infrastructure.
January 22nd, 2025 — Source
Delta Force Security Team Highlights New Anti-cheat Measures
Dear Operator, to maintain a fair gaming environment and improve your experience, G.T.I. Security is committed to fighting every kind of cheat. We previously announced our efforts against DMA cheats. Now, we're introducing our measures against VT cheats.
January 22nd, 2025 — Source
DHS Disbands Cyber Safety Review Board, Ending One of CISA's Few Bright Spots
The Trump administration has disbanded the Cyber Safety Review Board (CSRB), ending one of the few bright spots at CISA.
January 22nd, 2025 — Source
Digital driving licences plan triggers security fears
But "GOV UK is a brand you know and trust", says the government...
January 22nd, 2025 — Source
Doti AI Raises $7 Million Seed Funding for Instant Access to Internal Company Data
Doti's platform uses AI to improve, automate, and streamline standard office and business processes across distributed and hybrid environments.
January 22nd, 2025 — Source
EnGenius Cloud Managed ESG320 VPN Router improves security and network performance
EnGenius released EnGenius Cloud Managed ESG320 VPN Router. Designed to meet the growing demands of small businesses, the ESG320 delivers enterprise-grade performance, security, and simplified cloud-based management, making it the ideal choice for companies looking to optimize their network infrastructure, ensure data protection, and increase operational efficiency.
January 22nd, 2025 — Source
ENISA: Embedding Resilience in Critical Infrastructure
ENISA's Marnix Dekker on Supply Chain Attacks, Harmonizing the New NIS2 Regulations
January 22nd, 2025 — Source or Source or Source or Source or Source or Source or Source or Source or Source
Fraud Watch: E-Skimmers and Scam E-Commerce Sites Still Bite
Criminals Listed 269 Million Stolen Payment Card For Sale in 2024, Researchers Find
January 22nd, 2025 — Source
Hackers exploit 16 zero-days on first day of Pwn2Own Automotive 2025
On the first day of Pwn2Own Automotive 2025, security researchers exploited 16 unique zero-days and collected $382,750 in cash awards.
January 22nd, 2025 — Source
Heads up! Fake VPN apps are infecting devices with dangerous malware
Google has warned about fake VPN apps that can smuggle malware onto your device.
January 22nd, 2025 — Source
How to Create a Secure Username
Discover how to create a unique and secure username for your online accounts, and find out why it's just as important as having a strong password.
January 22nd, 2025 — Source
Infosec was literally the last item in Trump's policy plan, yet major changes are likely on his watch
Everyone agrees defense matters. How to do it is up for debate
January 22nd, 2025 — Source
Implementing Zero Trust Security in Kubernetes
Adopting these strategies will enable organizations to enhance their Kubernetes security posture and better defend against evolving cyber threats.
January 22nd, 2025 — Source
Inversion6 launches service to help companies combat cyber threats
Inversion6 launched its new Incident Response (IR) Service, a comprehensive offering to help organizations effectively manage, mitigate and recover from cybersecurity incidents.
January 22nd, 2025 — Source
Lookout Mobile Intelligence APIs identifies cross-platform attacks
Lookout announced their new Lookout Mobile Intelligence Application Programming Interfaces (APIs), exponentially expanding the scope of visibility into enterprise mobile security data.
January 22nd, 2025 — Source
Microsoft's Bold Move to End Passwords Forever with Passwordless Authentication Technologies
The era of passwords is steadily fading as technology leaders like Microsoft spearhead the adoption of passwordless authentication to combat the rising tide of identity attacks. With a staggering 99% of these attacks still targeting passwords, the demand for secure and user-friendly alternatives has reached a critical point. Innovations such as passkeys, Microsoft Authenticator, and Windows Hello for Business are leading the charge toward a safer digital environment.
January 22nd, 2025 — Source
Mirai botnet behind the largest DDoS attack to date
Researchers have uncovered two Mirai-based botnets harnessing Internet of Things (IoT) devices to DDoS target organizations around the world.
January 22nd, 2025 — Source
Mitiga Brings In $30M for Cloud and SaaS Protection Growth
Series B Funding Round to Drive European Expansion, R&D and Automated Remediation
January 22nd, 2025 — Source
Mobile intelligence APIs open up visibility into enterprise mobile security data
Mobile and cloud security company Lookout is launching new Mobile Intelligence APIs integrating critical security data from mobile devices into the solutions already in use by enterprise security teams -- those like SIEM, SOAR, and XDR.
January 22nd, 2025 — Source
Murdoc Botnet Ensnaring Avtech, Huawei Devices
The Mirai-based Murdoc botnet has been actively targeting Avtech and Huawei devices for roughly half a year.
January 22nd, 2025 — Source
Oracle Patches 200 Vulnerabilities With January 2025 CPU
Oracle has released 318 new security patches to address roughly 200 unique CVEs as part of its January 2025 Critical Patch Update.
January 22nd, 2025 — Source
Over $380,000 Paid Out on First Day of Pwn2Own Automotive 2025
$380,000 paid out on the first day of Pwn2Own Automotive 2025 for exploits targeting car infotainment units, operating systems, and chargers.
January 22nd, 2025 — Source
Passkey vs. Password: What's the Difference?
Passwords: love them, hate them, or... well, mostly hate them. They've been around forever, and it feels like that pair of socks you keep wearing despite having a hole in them. They are functional but always let you down when you need them most. Enter passkeys, the shiny new alternative promising to save us from "password fatigue." But what's the real difference, and why should you care? Let's break it down.
January 22nd, 2025 — Source
Persona helps businesses detect and prevent AI-driven fraud
Persona announced significant advancements in its AI-based face spoof detection capabilities. These updates strengthen Persona's ability to detect and prevent increasingly sophisticated generative AI fraud techniques.
January 22nd, 2025 — Source
PowerSchool hacker claims they stole data of 62 million students
The hacker who breached education tech giant PowerSchool claimed in an extortion demand that they stole the personal data of 62.4 million students and 9.5 million teachers.
January 22nd, 2025 — Source
Ransomware scum make it personal for Reg readers by impersonating tech support
That invitation to a Teams call on which IT promises to mop up a spamstorm may not be what it seems
January 22nd, 2025 — Source
Record-Breaking DDoS Attack Reached 5.6 Tbps
Cloudflare saw a 53% increase in DDoS attack frequency last year, when it blocked a record-breaking 5.6 Tbps attack.
January 22nd, 2025 — Source
Researcher Says ABB Building Control Products Affected by 1,000 Vulnerabilities
ABB has patched building control product vulnerabilities that can expose many facilities to remote attacks.
January 22nd, 2025 — Source
Rimini Protect AHS safeguards against security breaches
Rimini Street announced Rimini Protect Advanced Hypervisor Security (AHS), an exclusive solution powered by proven Vali Cyber AI/ML security technology.
January 22nd, 2025 — Source
Scammers Want to Cash In on Wildfire Relief: Here's How to Avoid Them
The many charities and reliefs efforts arising to help victims of the Southern California wildfires have become targets for scams.
January 22nd, 2025 — Source
Stratoshark: Wireshark for the cloud -- now available!
Stratoshark is an innovative open-source tool that brings Wireshark's detailed network visibility to the cloud, providing users with a standardized approach to cloud observability.
January 22nd, 2025 — Source
Supply chain attack hits Chrome extensions, could expose millions
Threat actor exploited phishing and OAuth abuse to inject malicious code
January 22nd, 2025 — Source
Telegram captcha tricks you into running malicious PowerShell scripts
Threat actors on X are exploiting the news around Ross Ulbricht to direct unsuspecting users to a Telegram channel that tricks them into run PowerShell code that infects them with malware.
January 22nd, 2025 — Source
Texas Investigates Insider Breach, Theft of Benefit Funds
7 Texas Health and Human Services Workers Fired in Incident Affecting 61,000 People
January 22nd, 2025 — Source or Source or Source or Source
Texas Is Enforcing Its State Data Privacy Law. So Should Other States.
States need to have and use data privacy laws to bring privacy violations to light and hold companies accountable for them. So, we were glad to see that the Texas Attorney General’s Office has filed its first lawsuit under Texas Data Privacy and Security Act (TDPSA) to take the Allstate Corporation to task for sharing driver location and other driving data without telling customers.
January 22nd, 2025 — Source
The Best Security Camera Deals for January 2025
Make sure you see trouble coming and keep it away with these deep discounts on well-reviewed security cameras from top brands.
January 22nd, 2025 — Source
The Internet is (once again) awash with IoT botnets delivering record DDoSes
Bigger, badder DDoSes are flooding the Internet. Dismal IoT security is largely to blame.
January 22nd, 2025 — Source
Trump admin fires security board investigating Chinese hack of large ISPs
Dismantled Cyber Safety Review Board was investigating Salt Typhoon telecom hack.
January 22nd, 2025 — Source
Trump administration fires members of cybersecurity review board in 'horribly shortsighted' decision
On Tuesday, a day after Donald Trump's inauguration as the new U.S. president, the Department of Homeland Security told members of several advisory committees that they were effectively fired.
January 22nd, 2025 — Source
Trump Frees Silk Road Founder From Life in Federal Prison
President Fulfills Campaign Promise to Pardon Ross Ulbricht, Blames DOJ Abuse
January 22nd, 2025 — Source or Source or Source or Source or Source or Source
Trump Pardons Founder of Silk Road Website
President Donald Trump has pardoned Ross Ulbricht, the founder of Silk Road, an underground website for selling drugs.
January 22nd, 2025 — Source
Trump 'waved a white flag to Chinese hackers' as Homeland Security axed cyber advisory boards
And: America 'has never been less secure,' retired rear admiral tells Congress
January 22nd, 2025 — Source
Trump-Backed Stargate Initiative to Pour $500B Into AI
AI Consortium Includes OpenAI, SoftBank and Oracle
January 22nd, 2025 — Source or Source or Source or Source or Source
US Congress Hears Calls for Aggressive Anti-China Cyber Ops
House Committee on Homeland Security Mulls Response to Volt Typhoon, Future of CISA
January 22nd, 2025 — Source or Source or Source or Source or Source
Use this AI chatbot prompt to create a password-exclusion list
One of the most successful forms of password breaches occurs when hackers simply guess commonly used passwords. And while organizations often invest in advanced security measures, they sometimes overlook this basic level of protection.
January 22nd, 2025 — Source
VICTORY! Federal Court (Finally) Rules Backdoor Searches of 702 Data Unconstitutional
Better late than never: last night a federal district court held that backdoor searches of databases full of Americans’ private communications collected under Section 702 ordinarily require a warrant. The landmark ruling comes in a criminal case, United States v. Hasbajrami, after more than a decade of litigation, and over four years since the Second Circuit Court of Appeals found that backdoor searches constitute “separate Fourth Amendment events” and directed the district court to determine a warrant was required. Now, that has been officially decreed.
January 22nd, 2025 — Source
Vishal Rao to Pull Double Duty as CEO of Trellix, Skyhigh
Rao Replaces Bryan Palma, Who Combined McAfee Enterprise, FireEye to Form Trellix
January 22nd, 2025 — Source or Source or Source or Source or Source
What PowerSchool won’t say about its data breach affecting millions of students
It’s only February, but the recent hack of U.S. edtech giant PowerSchool has the potential to be one of the biggest breaches of the year.
January 22nd, 2025 — Source
Xona Platform simplifies user access deployment
Xona Systems launched new Xona Platform. Designed to provide simple user access without allowing insecure user endpoints from connecting to critical assets, the platform is redefining how industries such as utilities, oil & gas, and manufacturing approach secure access for remote workers, 3rd parties, and onsite employees.
January 22nd, 2025 — Source
Zombie nuclear reactors could be revived thanks to AI data center demand
A South Carolina utility wants to restart construction on a power plant that was mothballed eight years ago after running over budget and pushing an iconic American company into bankruptcy.
January 22nd, 2025 — Source
Internet — Security Issues — January 20th, 2025
Amazon Details Measures to Counter S3 Encryption Hacks
Hackers Using Valid Customer Credentials to Re-Encrypt S3 Objects
January 20th, 2025 — Source or Source or Source or Source or Source
CERT-UA warns against "security audit" requests via AnyDesk
Attackers are impersonating the Computer Emergency Response Team of Ukraine (CERT-UA) via AnyDesk to gain access to target computers.
January 20th, 2025 — Source
CISA, FBI Update Software Security Recommendations
CISA and the FBI have updated their guidance regarding risky software security bad practices based on feedback received from the public.
January 20th, 2025 — Source
Details Disclosed for Mercedes-Benz Infotainment Vulnerabilities
Kaspersky has disclosed the details of over a dozen vulnerabilities discovered in a Mercedes-Benz MBUX infotainment system.
January 20th, 2025 — Source
FCC Taking Action in Response to China's Telecoms Hacking
The FCC adopts declaratory ruling requiring telecommunications providers to secure their networks against nation-states and other threats.
January 20th, 2025 — Source
HPE Investigating Breach Claims After Hacker Offers to Sell Data
HPE is investigating claims by the hacker IntelBroker, who is offering to sell source code and other data allegedly stolen from the tech giant.
January 20th, 2025 — Source
India's 'digital arrest' scammers stealing savings
Within five hours while sitting at home in India, retired professor Kamta Prasad Singh handed over his hard-earned savings to online fraudsters impersonating police.
January 20th, 2025 — Source
Industrial Switch Vulnerabilities Allow Remote Exploitation
Researchers Uncover Three Vulnerabilities, Urge Firmware Update
January 20th, 2025 — Source or Source or Source or Source or Source
PowerSchool Faces 23 Lawsuits Over Schools' Mega Data Breach
Customers Question Why PowerSource Support Tool Had Direct Access to Their Systems
January 20th, 2025 — Source or Source or Source or Source or Source
PowerSchool hackers have your kid's info. These 3 steps will protect them
You can take preventative measures to defend your kids from fraud.
January 20th, 2025 — Source
Private Internet Access VPN Review: How Good Is PIA VPN?
When it comes to privacy and security, PIA VPN is among the best. Discover its features, performance, pricing, and more with this in-depth review.
January 20th, 2025 — Source
SailPoint IPO Filing Reveals Sales Growth, Improved Losses
In First Pure-Play Cybersecurity IPO Filing Since '21, SailPoint Talks Channel Ties
January 20th, 2025 — Source or Source or Source or Source or Source
Sen. Warren Fires Off 175 Questions to RFK Jr. on HHS, HIPAA
Elizabeth Warren Letter Probes Kennedy on His Plans if Confirmed As HHS Secretary
January 20th, 2025 — Source or Source or Source or Source or Source
Social Media Security Firm Spikerz Raises $7 Million
Social media security startup Spikerz has raised $7 million in a seed funding round led by Disruptive AI.
January 20th, 2025 — Source
Threat Intelligence's Top Players Tackle Evolving Cyber Risk
Acquisitions, AI and Emerging Threats Define Strategy for Recorded Future, Google
January 20th, 2025 — Source or Source or Source
Washington Man Admits to Role in Multiple Cybercrime, Fraud Schemes
Marco Raquan Honesty has pleaded guilty to his roles in several fraud schemes, including smishing, identity theft, and bank account takeover.
January 20th, 2025 — Source
Your tax return is a ripe target for fraud. Here's how to protect it
Thankfully, blocking this kind of scam is simple.
January 20th, 2025 — Source
Internet — Security Issues — January 17th, 2025
1touch.io's SaaS offering delivers enterprise-grade security
In an exciting development for organizations struggling with data security, 1touch.io has announced its Sensitive Data Intelligence platform as a Software-as-a-Service (SaaS) solution.
January 17th, 2025 — Source
Abandoned Online Domains Unlock Services With Google OAuth
Google Says Platforms Shouldn't Use Emails as Unique Identifiers
January 17th, 2025 — Source or Source or Source or Source or Source
Biden Boosts Sanctions Powers to Target Cyber Underground
Final Cybersecurity Executive Order Unlocks New Powers for Next Administration
January 17th, 2025 — Source or Source or Source or Source or Source
Biotech Firm to Pay $7.5M to Settle Lawsuit in 2023 Hack
Enzo Biochem Previously Paid Three States $4.5M in Fines for Same Breach
January 17th, 2025 — Source or Source or Source or Source or Source
China-linked hackers accessed over 400 US Treasury computers, including Janet Yellen's
Employee usernames and passwords were compromised.
January 17th, 2025 — Source
Could your VPN get around the TikTok ban? What you need to know
TikTok is about to disappear for U.S. users, but a VPN might be the answer.
January 17th, 2025 — Source
Downloads, Trump and VPNs: Everything to Know Before the TikTok Ban
The law will go into effect Sunday, so here's what could happen.
January 17th, 2025 — Source
Dynatrace reduces time-consuming compliance configuration checks associated with DORA
Dynatrace has extended its existing compliance capabilities to support the Digital Operational Resilience Act (DORA) EU regulation.
January 17th, 2025 — Source
FBI triggers self-destruction of China-backed malware infecting US computers
Command-and-control servers can also be useful to law enforcement agencies
January 17th, 2025 — Source
FCC orders telecoms to secure their networks after Salt Tyhpoon hacks
The Federal Communications Commission (FCC) has ordered U.S. telecommunications carriers to secure their networks following last year's Salt Typhoon security breaches.
January 17th, 2025 — Source
Fortinet Users See Active Zero-Day Warnings Past and Present
Actively Targeted Zero-Day Patched; Warning Issued After Device Configurations Leak
January 17th, 2025 — Source or Source or Source or Source or Source
How Russian hackers went after NGOs' WhatsApp accounts
Star Blizzard, a threat actor tied to the Russian Federal Security Service (FSB), was spotted attempting to compromise targets' WhatsApp accounts through a clever phishing campaign.
January 17th, 2025 — Source
How Star Blizzard tried to hack the WhatsApp accounts of government and diplomatic staff
Microsoft has detailed how the Russian hacker group, Star Blizzard, targeted very influential people like politicians to steal their WhatsApp data right up until the end of November. We all know we have to be on the lookout for malicious actors trying to trick us, but Star Blizzard came up with a fairly elaborate scheme to gain access to WhatsApp accounts.
January 17th, 2025 — Source
ISMG Editors: UK Ransomware Reporting Mandate Sparks Debate
Also: Bringing AML and Fraud Programs Together; the Global AI Arms Race
January 17th, 2025 — Source or Source or Source or Source
Malicious PyPi package steals Discord auth tokens from devs
A malicious package named 'pycord-self' on the Python package index (PyPI) targets Discord developers to steal authentication tokens and plant a backdoor for remote control over the system.
January 17th, 2025 — Source
Malware stole internal PowerSchool passwords from engineer's hacked computer
A cyberattack and data breach at U.S. edtech giant PowerSchool that was discovered December 28 threatens to expose the private data of tens of millions of schoolchildren and teachers.
January 17th, 2025 — Source
Medusa ransomware group claims attack on UK's Gateshead Council
Pastes allegedly stolen documents on leak site with £600K demand
January 17th, 2025 — Source
Nord Security founders launch Nexos.ai to help enterprises take AI projects from pilot to production
A new AI orchestration startup from the founders of Lithuanian unicorn Nord Security is setting out to help enterprises put their AI projects into production, with an initial focus on bringing greater visibility, security, and adaptability to large language models (LLMs).
January 17th, 2025 — Source
Otelier data breach exposes info, hotel reservations of millions
Hotel management platform Otelier suffered a data breach after threat actors breached its Amazon S3 cloud storage to steal millions of guests' personal information and reservations for well-known hotel brands like Marriott, Hilton, and Hyatt.
January 17th, 2025 — Source
Prove Purchases Portabl to Advance Identity Authentication
Acquisition Boosts Standardized Consent Frameworks, Identity Data Interoperability
January 17th, 2025 — Source or Source or Source or Source or Source
This Latest 'Brushing' Scam Tempts You With Free Items. Don't Fall for It
If you get an unrecognized package with a QR code inside, never scan it. Do this instead.
January 17th, 2025 — Source
Treasury sanctions Salt Typhoon hacking group behind breaches of major US telecom firms
The U.S. government has announced sanctions against a Chinese organization with links to Salt Typhoon, the hacking group responsible for the largest telecoms hack in U.S. history.
January 17th, 2025 — Source
US Identifies Hacking Firm Behind Salt Typhoon Telecom Hacks
Department of Treasury Imposes Sanctions
January 17th, 2025 — Source or Source or Source or Source or Source
US sanctions Chinese firm, hacker behind telecom and Treasury hacks
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has sanctioned Yin Kecheng, a Shanghai-based hacker for his role in the recent Treasury breach and a company associated with the Salt Typhoon threat group.
January 17th, 2025 — Source
VPN Interest Is Surging for This X-Rated Reason
Residents of states with age verification requirements for adult sites are turning to virtual private networks as a way around the regulations.
January 17th, 2025 — Source
VPNs Are Not a Solution to Age Verification Laws
On January 1st, Florida joined 18 other states in implementing an age verification law that burdens Floridians' access to sites that host adult content, including pornography websites like Pornhub. In protest to these laws, PornHub blocked access to users in Florida. Residents in the "Free State of Florida" have now lost access to the world's most popular adult entertainment website and 16th-most-visited site of any kind in the world.
January 17th, 2025 — Source
Internet — Security Issues — January 13th, 2025
A major data broker hack may have leaked precise location info for millions
Broker Gravy Analytics, a company the FTC targeted with a ban in December, disclosed the breach late last week.
January 13th, 2025 — Source
AI Won't Take This Job: Microsoft Says Human Ingenuity Crucial to Red-Teaming
Redmond's AI Red Team says human involvement remains irreplaceable in addressing nuanced risks.
January 13th, 2025 — Source
Alleged Blender, Sinbad cryptomixer operators arrested, indicted
Three Russian nationals have been indicted in the Northern District of Georgia for their alleged role as operators of cryptocurrency mixing (cryptomixer) services Blender.io and Sinbad.io.
January 13th, 2025 — Source
Attackers are encrypting AWS S3 data without using ransomware
A ransomware gang dubbed Codefinger is encrypting data stored in target organizations' AWS S3 buckets with AWS's server-side encryption option with customer-provided keys (SSE-C), and asking for money to hand over the key they used.
January 13th, 2025 — Source
Banshee Malware Puts 100 Million Apple Users At Risk Of Data Theft
Many people believe MacBooks are impervious to malware. While strong security measures such as Xprotect, Gatekeeper, and Sandboxing are in place on macOS, they do not offer foolproof protection.
January 13th, 2025 — Source
Best VPN services 2025: Top picks for speed, price, privacy, and more
There are a lot of VPN options out there; we'll help you cut through the clutter.
January 13th, 2025 — Source
Bitwarden versus 1Password: Battle of the Best -- Who Wins?
Bitwarden and 1Password are two of the top password managers. Find out which password manager is the best for you using this comprehensive comparison.
January 13th, 2025 — Source
Celebs and tech luminaries including Mark Ruffalo want to create a fully open social media ecosystem
This is an attempt to save platforms "from billionaire capture."
January 13th, 2025 — Source
Chainalysis Expands Fraud Detection With Alterya Acquisition
Alterya's AI-Powered Data Will Combat Scams Across Traditional Financial Ecosystems
January 13th, 2025 — Source or Source or Source or Source or Source
Data Broker Hack Exposes Location Info From Millions of iPhone Users
Data broker Gravy Analytics has been hacked, and location information from millions of iPhone and Android users is at risk, reports TechCrunch. Gravy Analytics' parent company Unacast disclosed the data breach earlier this month [PDF], and said that its AWS cloud storage environment had been accessed by an unauthorized person using a "misappropriated access key."
January 13th, 2025 — Source
Disgraced Ex-Disney Employee Fesses Up To Dangerous Allergy Menu Hack
Michael Scheuer and his legal team have entered a guilty plea for hacking Disney World's restaurant menu-creation software, altering allergen information, inserting swastikas, and changing wine regions to mass shooting locations. Among other things, the outcome of this federal criminal case will require Scheuer to pay Disney for damages as well as a fine to the government. Prior to the hack, Scheuer was fired from Disney upon his return from paternity leave, so could this be a case of disgruntled employee acting inappropriately?
January 13th, 2025 — Source
EU law enforcement training agency data breach: Data of 97,000 individuals compromised
Personal data of nearly 100,000 individuals that have participated in trainings organized by CEPOL, the European Union (EU) Agency for Law Enforcement Training, has potentially been compromised due to the cyberattack suffered by the agency in May 2024.
January 13th, 2025 — Source
FRAML Reality Check: Is Full Integration Really Practical?
Experts Weigh the Pros and Cons of Work Culture and Merging AML and Fraud Teams
January 13th, 2025 — Source or Source or Source or Source or Source
Hacker Broke into 'Path of Exile 2' Admin Account, Hijacked Wave of Characters
The forums for Path of Exile 2 have been awash with people claiming they've been hacked and their inventories emptied of valuable items. Now there's an explanation for at least dozens of the account compromises.
January 13th, 2025 — Source
Hackers exploit critical Aviatrix Controller RCE flaw in attacks
Threat actors are exploiting a critical remote command execution vulnerability, tracked as CVE-2024-50603, in Aviatrix Controller instances to install backdoors and crypto miners.
January 13th, 2025 — Source
Infostealer Masquerades as PoC Code Targeting Recent LDAP Vulnerability
A fake proof-of-concept (PoC) exploit for a recent LDAP vulnerability distributes information stealer malware.
January 13th, 2025 — Source
Juniper Networks Fixes High-Severity Vulnerabilities in Junos OS
Juniper Networks has patched multiple high-severity vulnerabilities in Junos OS and its third-party components.
January 13th, 2025 — Source
Microsoft MFA outage blocking access to Microsoft 365 apps
Microsoft is investigating an ongoing Multi-Factor Authentication (MFA) outage that is blocking customers from accessing Microsoft 365 Office apps.
January 13th, 2025 — Source
OneBlood confirms personal data stolen in July ransomware attack
Blood-donation not-for-profit OneBlood confirms that donors' personal information was stolen in a ransomware attack last summer.
January 13th, 2025 — Source
Ransomware abuses Amazon AWS feature to encrypt S3 buckets
A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key.
January 13th, 2025 — Source
Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days
'Codefinger' crims on the hunt for compromised keys
January 13th, 2025 — Source
Securing the future of AI: Innovations in decentralized federated learning
Federated learning represents a significant shift in the landscape of machine learning, enabling many clients or devices to collaboratively train models while substantially enhancing the privacy of the data involved.
January 13th, 2025 — Source
Security in the Age of AI: Challenges and Best Practices
Key security challenges in AI and strategies to protect systems, from data breaches to adversarial attacks, to ensure robust and secure AI integration.
January 13th, 2025 — Source
UK domain giant Nominet confirms cybersecurity incident linked to Ivanti VPN hacks
Nominet, the U.K. domain registry that maintains .co.uk domains, has experienced a cybersecurity incident that it confirmed is linked to the recent exploitation of a new Ivanti VPN vulnerability.
January 13th, 2025 — Source
UK domain registry Nominet breached via Ivanti zero-day
The number of internet-facing Ivanti Connect Secure instances vulnerable to attack via CVE-2025-0282 has fallen from 2,048 to 800 in the last four days, the Shadowserver Foundation shared today.
January 13th, 2025 — Source or Source
US Charges 3 Russians for Operating Cryptocurrency Mixers Used by Cybercriminals
The US Justice Department has announced charges against three Russians for operating the Blender and Sinbad cryptocurrency mixers.
January 13th, 2025 — Source
Why MSPs must offer 24/7 cybersecurity protection and response — and how OpenText MDR can help
In today's cyber threat landscape, good enough is no longer good enough. Cyberattacks don't clock out at 5 PM, and neither can your security strategy. For Managed Service Providers (MSPs), offering customers 24/7 cybersecurity protection and response isn't just a competitive advantage—it's an essential service for business continuity, customer trust, and staying ahead of attackers.
January 13th, 2025 — Source
Wi-Fi is down: cyberattack strikes ASML's neighbor and talent feeder
Eindhoven University of Technology, closely linked to chip machine maker ASML, has shut down its computer network following a cyberattack.
January 13th, 2025 — Source
Internet — Security Issues — January 10th, 2025
Banshee macOS Malware Expands Targeting
The latest version of the Banshee macOS information stealer no longer checks if the infected systems have the Russian language installed.
January 10th, 2025 — Source
Biden Administration Releases 'AI Strategic Plan' for HHS
Days Are Dwindling But Biden White House Unveils New AI Roadmap for HHS
January 10th, 2025 — Source or Source or Source or Source or Source
China hacked US Treasury's CFIUS, which reviews foreign investments for national security risks
Chinese hackers have reportedly breached a key office within the U.S. Treasury tasked with reviewing foreign investments and transactions that could threaten U.S. national security.
January 10th, 2025 — Source or Source or Source
Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases
Gee, wonder why Beijing is so keen on the -- checks notes -- Committee on Foreign Investment in the US
January 10th, 2025 — Source
Cloud Security, APT Threats, AI Risks Loom Large in 2025
Google Mandiant's Jamie Collier on the Biggest Cloud Security Challenges
January 10th, 2025 — Source or Source or Source or Source or Source
Docker Desktop blocked on Macs due to false malware alert
Docker is warning that Docker Desktop is not starting on macOS due to malware warnings after some files were signed with an incorrect code-signing certificate.
January 10th, 2025 — Source
Final Biden Cybersecurity Order Will Face Political Hurdles
Officials Worry Trump's Cybersecurity Agenda Could Scrap Biden's Final Cyber Orders
January 10th, 2025 — Source or Source
Google DeepMind's Consolidation, World Modelling Initiatives
Firm Folds AI Studio, Gemini API Into DeepMind; Sets up World Model Team
January 10th, 2025 — Source or Source or Source or Source or Source
How AI will transform cybersecurity in 2025 - and supercharge cybercrime
From AI-driven defense to evolving ransomware tactics, here's what cybersecurity industry leaders and experts are preparing for this year.
January 10th, 2025 — Source
In Other News: Bank of America Warns of Data Breach, Trucking Cybersecurity, Treasury Hack Linked to Silk Typhoon
Noteworthy stories that might have slipped under the radar: 2025 trucking cybersecurity report, Bank of America discloses data breach, Silk Typhoon behind US Treasury hack.
January 10th, 2025 — Source
ISMG Editors: The Coming Battle Over Chinese Cyberthreats
Also: Cybersecurity Tech Leader Amit Yoran's Life, Leadership and Legacy
January 10th, 2025 — Source or Source or Source or Source or Source
Job-seeking devs targeted with fake CrowdStrike offer via email
Cryptojackers are impersonating Crowdstrike via email to get developers to unwittingly install the XMRig cryptocurrency miner on their Windows PC, the company has warned.
January 10th, 2025 — Source
Major Addiction Treatment Firm BayMark Confirms Ransomware Attack Caused Data Breach
Substance abuse treatment provider BayMark Health Services says patient personal information was compromised in a data breach.
January 10th, 2025 — Source
Meet the Chinese 'Typhoon' hackers preparing for war
Of the cybersecurity risks facing the United States today, few loom larger than the potential sabotage capabilities posed by China-backed hackers, which senior U.S. national security officials have described as an "epoch-defining threat."
January 10th, 2025 — Source
Meloni Says Italy Is Exploring Deals on Telecoms Security, but Denies Private Talks With Musk
If the deal is sealed, SpaceX would provide encryption services for the Italian government and communications infrastructure for the military and emergency services.
January 10th, 2025 — Source
Microsoft DRM Hacking Raises Questions on Vulnerability Disclosures
A research project into vulnerabilities affecting Microsoft's PlayReady DRM raises some questions on responsible disclosure.
January 10th, 2025 — Source
New Web3 attack exploits transaction simulations to steal crypto
Threat actors are employing a new tactic called "transaction simulation spoofing" to steal crypto, with one attack successfully stealing 143.45 Ethereum, worth approximately $460,000.
January 10th, 2025 — Source
PayPal Phishing Campaign Employs Genuine Links to Take Over Accounts
Fortinet warns of a phishing campaign that uses legitimate links to take over the victims' PayPal accounts.
January 10th, 2025 — Source
PowerSchool data breach leaks info of students and staff at schools across the US
Parents and educators are receiving notifications about the breach, but it's still unclear exactly how many people have been affected or what information was leaked.
January 10th, 2025 — Source or Source or Source or Source or Source or Source
Seattle cybersecurity company WatchGuard snaps up threat analysis startup ActZero
WatchGuard has bought numerous companies over the years, including Cyglass, Percipient Networks, Datablink and Panda Security.
January 10th, 2025 — Source
Security Bite: macOS malware 'Banshee' found using Apple's own code to evade detection
A new report from Check Point Research details how a new variant of the infamous Banshee stealer malware from Russian-speaking cybercriminals takes a page from Apple's own security practices to evade detection. The malware remained undetected for over two months by cleverly incorporating the same encryption methods as Mac's XProtect antivirus detection suite.
January 10th, 2025 — Source
Suspected Russian Cryptomixer Mastermind Trio Indicted in US
Blender and Sinbad Were Favorites of Ransomware and North Korean Hackers
January 10th, 2025 — Source or Source or Source or Source or Source
The Future of CISA in Healthcare in the New Administration
Nitin Natarajan, Departing Deputy Director of CISA, on Building on Cyber Momentum
January 10th, 2025 — Source or Source or Source or Source or Source
The role of encryption in the cybersecurity landscape [Q&A]
Despite being an effective tool for safeguarding sensitive information, encryption remains underutilized by many organizations, leaving them vulnerable to cyber threats.
January 10th, 2025 — Source
Those Banner Ads In Mobile Apps Are Used To Track Your Location In Real Time
It is well known that many apps do indeed track your movements in real time, and for some years now security researchers have been trying to get people to grasp just how wide spread it is. Despite numerous warnings, both users and the legal system have preferred to ignore these warnings, but thanks to recent revelations people are starting to pay attention.
January 10th, 2025 — Source
Treasury hackers also breached US foreign investments review office
Silk Typhoon Chinese state-backed hackers have reportedly breached a Treasury Department office that reviews foreign investments for national security risks.
January 10th, 2025 — Source
US charges operators of cryptomixers linked to ransomware gangs
The U.S. Department of Justice indicted three operators of sanctioned Blender.io and Sinbad.io crypto mixer services used by ransomware gangs and North Korean hackers to launder ransoms and stolen cryptocurrency.
January 10th, 2025 — Source
US government charges operators of crypto mixing service used by North Korea and ransomware gangs
On Friday, the U.S. Department of Justice announced the indictments of Russian citizens Roman Vitalyevich Ostapenko, Alexander Evgenievich Oleynik, and Anton Vyachlavovich Tarasov, accusing them of operating services that helped criminals launder cryptocurrency.
January 10th, 2025 — Source
Internet — Security Issues — January 9th, 2025
Banshee stealer evades detection using Apple XProtect encryption algo
A new version of the Banshee info-stealing malware for macOS has been evading detection over the past two months by adopting string encryption from Apple's XProtect.
January 9th, 2025 — Source or Source
Breach Roundup: Finland Detains Tanker Tied to Cable Sabotage
Also, Alleged Gravy Analytics Breach Exposes Location Data
January 9th, 2025 — Source or Source or Source or Source or Source
BreachLock Unified Platform provides visibility into the organization's attack surface
Eliminating the inefficiencies, silos, unnecessary complexity, and coverage gaps that security practitioners have faced with fragmented security tools, the newly unveiled BreachLock Unified Platform integrates findings from Penetration Testing as a Service (PTaaS), Attack Surface Management (ASM), and continuous penetration testing and red teaming into one cohesive platform.
January 9th, 2025 — Source
Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location
A hack of location data company Gravy Analytics has revealed which apps are—knowingly or not—being used to collect your information behind the scenes.
January 9th, 2025 — Source
Code Intelligence Spark automates software testing
Code Intelligence announced Spark, an AI test agent that autonomously identifies bugs in unknown code without human interaction.
January 9th, 2025 — Source
Criminal IP: Bringing Real-Time Phishing Detection to Microsoft Outlook
Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has launched its Criminal IP Malicious Link Detector add-in on the Microsoft Marketplace. This cutting-edge tool provides real-time phishing email detection and URL blocking for Microsoft Outlook, adding an essential layer of email security in the face of increasing cyber threats.
January 9th, 2025 — Source
Cryptohack Roundup: Kwon's Trial, China's Blockchain Plan
Also: Penalty on Illegal Cryptomining in Siberia
January 9th, 2025 — Source or Source or Source or Source or Source
Darktrace Acquires Cado Security as AI Meets Cloud Forensics
Cado Security Deal Brings Enhanced Forensics, Automation and AI-Powered Analytics
January 9th, 2025 — Source or Source or Source or Source or Source
European Court Fines European Commission for Privacy Breach
Transfer of German Man's IP Address Wins Him 400 Euros
January 9th, 2025 — Source or Source or Source or Source or Source
Excelsior Orthopaedics Data Breach Impacts 357,000 People
Excelsior Orthopaedics says the information of roughly 357,000 patients and employees was stolen in a June 2024 data breach.
January 9th, 2025 — Source
Exit Interview: CISA's Nitin Natarajan on Threats to Watch
Deputy Director Reflects on Term and Offers Advice to Successors
January 9th, 2025 — Source or Source or Source or Source or Source
Exploitation of New Ivanti VPN Zero-Day Linked to Chinese Cyberspies
Google Cloud's Mandiant has linked the exploitation of CVE-2025-0282, a new Ivanti VPN zero-day, to Chinese cyberspies.
January 9th, 2025 — Source
Facebook awards researcher $100,000 for finding bug that granted internal access
In October 2024, security researcher Ben Sadeghipour was analyzing Facebook's ad platform when he found a security vulnerability that allowed him to run commands on the internal Facebook server housing that platform, essentially giving him control of the server.
January 9th, 2025 — Source
Fake CrowdStrike job offer emails target devs with crypto miners
CrowdStrike is warning that a phishing campaign is impersonating the cybersecurity company in fake job offer emails to trick targets into infecting themselves with a Monero cryptocurrency miner (XMRig).
January 9th, 2025 — Source
Final Biden Cybersecurity Order Will Face Political Hurdles
Officials Worry Trump's Cybersecurity Agenda Could Scrap Biden's Final Cyber Orders
January 9th, 2025 — Source or Source or Source
Florida Firm Fined $337K by Feds for Data Deleted in Hack
USR Holdings Lost Electronic PHI for Nearly 3,000 Patients in Breach
January 9th, 2025 — Source or Source or Source or Source or Source
From Silos to Synergy: Transforming Threat Intelligence Sharing in 2025
In the face of ever-growing threats and adversaries, organizations must break down the silos between ALL teams involved in security.
January 9th, 2025 — Source
GFI KerioControl Firewall Vulnerability Exploited in the Wild
Threat actors are exploiting a recent GFI KerioControl firewall vulnerability that leads to remote code execution.
January 9th, 2025 — Source
Hackers are exploiting a new Ivanti VPN security bug to hack into company networks
U.S. software giant Ivanti has warned that a zero-day vulnerability in its widely used enterprise VPN appliance has been exploited to compromise the networks of its corporate customers.
January 9th, 2025 — Source
Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
The zero-day attacks leveraging the Ivanti Connect Secure (ICS) vulnerability (CVE-2025-0282) made public on Wednesday were first spotted in mid-December 2024, Mandiant researchers have shared.
January 9th, 2025 — Source
Ivanti zero-day attacks infected devices with custom malware
Hackers exploiting the critical Ivanti Connect Secure zero-day vulnerability disclosed yesterday installed on compromised VPN appliances new malware called 'Dryhook' and 'Phasejam' that is not currently associated with any threat group.
January 9th, 2025 — Source
Largest US addiction treatment provider notifies patients of data breach
BayMark Health Services, North America's largest provider of substance use disorder (SUD) treatment and recovery services, is notifying an undisclosed number of patients that attackers stole their personal and health information in a September 2024 breach.
January 9th, 2025 — Source
Look for the label: White House rolls out 'Cyber Trust Mark' for smart devices
Beware the IoT that doesn't get a security
January 9th, 2025 — Source
Medical Billing Firm Medusind Says Data Breach Impacts 360,000 People
Medical billing solutions provider Medusind has revealed that a data breach discovered in December 2023 impacts over 360,000 individuals.
January 9th, 2025 — Source
Meta's Fact-Checking Pullback Could Help Scammers Thrive
Facebook Unveils Community Notes Program But Has Done Little to Curb Fraud
January 9th, 2025 — Source or Source or Source or Source
Microsoft to make performance-based job cuts across departments, including security, impacting "less than 1%" of the workforce
The latest cuts have a high emphasis on security thresholds.
January 9th, 2025 — Source
Microsoft updates several Surface devices with audio and security improvements
Microsoft has released new firmware updates for four of its Surface PCs. Patches are available for the now-discontinued (still supported) Surface Studio 2+, Surface Pro 9 with Intel processors, Surface Laptop Go 3, and Surface Laptop 4 with Intel processors.
January 9th, 2025 — Source
MirrorFace hackers targeting Japanese govt, politicians since 2019
The National Police Agency (NPA) and the Cabinet Cyber Security Center in Japan have linked a cyber-espionage campaign targeting the country to the Chinese state-backed "MirrorFace" hacking group.
January 9th, 2025 — Source
Ongoing attacks on Ivanti VPNs install a ton of sneaky, well-written malware
In-the-wild attacks tamper with built-in security tool providing infection warnings.
January 9th, 2025 — Source
Over 195 million records breached in ransomware attacks last year
In 2024, ransomware groups claimed responsibility for 5,461 successful ransomware attacks on organizations worldwide. Of these 1,204 were confirmed by the targeted organizations, according to analysis by Comparitech.
January 9th, 2025 — Source
Palo Alto Networks Patches High-Severity Vulnerability in Retired Migration Tool
Palo Alto Networks has released patches for multiple vulnerabilities in the Expedition migration tool, which was retired on December 31, 2024.
January 9th, 2025 — Source
PowerSchool says hackers stole students' sensitive data, including Social Security numbers, in data breach
Edtech giant PowerSchool has warned customers that hackers accessed its customers' highly sensitive information — including student Social Security numbers, grades, and medical information — during a recent data breach, TechCrunch has learned.
January 9th, 2025 — Source
Security pros baited with fake Windows LDAP exploit traps
Tricky attackers trying yet again to deceive the good guys on home territory
January 9th, 2025 — Source
The 'Worst in Show' CES Products Put Your Data at Risk and Cause Waste, Privacy Advocates Say
Some of the innovative products presented at CES can pose a serious risk to data and privacy.
January 9th, 2025 — Source
UN Cybercrime Treaty Faces Long Odds to US Passage
US Senate Unlikely to Ratify Contentious Cybercrime Treaty Amid Mounting Concerns
January 9th, 2025 — Source or Source or Source or Source< or Source
US Treasury hack linked to Silk Typhoon Chinese state hackers
Chinese state-backed hackers, tracked as Silk Typhoon, have been linked to the U.S. Office of Foreign Assets Control (OFAC) hack in early December.
January 9th, 2025 — Source
VulnerabilitiesSonicWall Patches Authentication Bypass Vulnerabilities in Firewalls
SonicWall has released patches for multiple vulnerabilities in SonicOS, including high-severity authentication bypass flaws.
January 9th, 2025 — Source
WatchGuard Strengthens MDR Services With ActZero Acquisition
ActZero Purchase Adds Artificial Intelligence, Open Platform and Process Maturity
January 9th, 2025 — Source or Source or Source or Source or Source
What's Next for Open Source Software Security in 2025?
Hidden dependencies, social engineering attacks, and the complexity of foundation models can all contribute tothe insecure use of open-source software in 2025.
January 9th, 2025 — Source
White House Launches US Cyber Trust Mark for IoT Devices
Biden Administration Hopes Good Cybersecurity Is Also Good Marketing
January 9th, 2025 — Source or Source or Source or Source
Wireshark 4.4.3 released: Updated protocol support, bug fixes
Wireshark, the popular network protocol analyzer, has reached version 4.4.3. Wireshark offers deep inspection across hundreds of protocols, live and offline analysis, and display filters. With multi-platform support, VoIP analysis, and capture file compatibility, it's perfect for professionals seeking intuitive GUI or TTY-mode network troubleshooting and analysis capabilities.
January 9th, 2025 — Source
Zero-day exploits plague Ivanti Connect Secure appliances for second year running
Factory resets and apply patches is the advice amid fortnight delay for other appliances
January 9th, 2025 — Source
Zero-Day Patch Alert: Ivanti Connect Secure Under Attack
Suspected Chinese Attackers Again Tied to Active Exploitation of VPN Appliances
January 9th, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — January 8th, 2025
2 HIPAA Business Associates Pay HHS Ransomware Settlements
Agency Kicks Off New Year With First HIPAA Enforcement Actions, $170K in Fines
January 8th, 2025 — Source
Abandoned Backdoors: How Malicious Infrastructure Lives On
Studying Backdoors in Web Shells, Researchers Find 4,000 Infected Systems
January 8th, 2025 — Source or Source or Source or Source
API and Security: From IT to Cyber
Learn how to protect your APIs beyond the basics. This article explores the risks, but also the solutions, which are not necessarily limited to the API Manager.
January 8th, 2025 — Source
AWS Cloud Security: Key Components, Common Vulnerabilities, and Best Practices
Organizations can achieve a robust security posture in AWS by understanding key AWS security components, mitigating vulnerabilities, and adhering to best practices.
January 8th, 2025 — Source
BioConnect unveils biometric devices for secure access control
BioConnect introduced its Arc Series biometric devices. Designed to address the evolving security, compliance, and scalability needs of enterprises and data centers, the Arc Series sets a new standard in modern access control.
January 8th, 2025 — Source
Casio says hackers stole personal data of 8,500 people during October ransomware attack
Japanese electronics giant Casio has confirmed that the personal data of almost 8,500 individuals was stolen during an October ransomware attack.
January 8th, 2025 — Source
CISA Warns of Mitel MiCollab Vulnerabilities Exploited in Attacks
CISA says two recently disclosed path traversal vulnerabilities in the Mitel MiCollab collaboration platform have been exploited in attacks.
January 8th, 2025 — Source
Clever PayPal attack dodges phishing checks to take over accounts
Research by Fortinet has uncovered what it terms a 'phish-free' PayPal phishing attack that seeks to trick the unwary into giving up control of their account.
January 8th, 2025 — Source
Cybersecurity Funding Reached $9.5 Billion in 2024: Report
Cybersecurity firms raised $9.5 billion in over 300 funding rounds in 2024, with Wiz scoring the largest investment at $1 billion.
January 8th, 2025 — Source or Source or Source or Source
Devices with strong cybersecurity can now apply for a government seal of approval
The US Cyber Trust Mark will adorn products that have passed compliance testing.
January 8th, 2025 — Source
Edtech giant PowerSchool says hackers accessed personal data of students and teachers
Education technology giant PowerSchool has told customers that it experienced a "cybersecurity incident" that allowed hackers to compromise the personal data of students and teachers in K-12 school districts across the United States.
January 8th, 2025 — Source
EU "energetically" probing disinformation, right-wing bias on X, report says
Elon Musk wading further into global right-wing politics raises alarms in EU.
January 8th, 2025 — Source
European Court Fines European Commission for Privacy Breach
Transfer of German Man's IP Address Wins Him 400 Euros
January 8th, 2025 — Source or Source or Source or Source or Source
First Android Update of 2025 Patches Critical Code Execution Vulnerabilities
This year's first batch of monthly security updates for Android resolves 36 vulnerabilities, including critical remote code execution flaws.
January 8th, 2025 — Source
Hackers exploit KerioControl firewall flaw to steal admin CSRF tokens
Hackers are trying to exploit CVE-2024-52875, a critical CRLF injection vulnerability that leads to 1-click remote code execution (RCE) attacks in GFI KerioControl firewall product.
January 8th, 2025 — Source
High-Paying Security Career: Choosing a Path, Getting There
Know the Challenges and Opportunities of Working as a CISO, Architect or Pen Tester
January 8th, 2025 — Source or Source or Source or Source
How initial access brokers (IABs) sell your users' credentials
Even if you haven't looked into the methods of initial access brokers (IABs), you've almost certainly read about their handiwork in recent cyber-attacks. These specialized cybercriminals break into corporate networks and sell stolen access to other attackers. Think of them as high-tech locksmiths for hire — they crack security systems and sell the "keys" to ransomware groups and cyber criminals who launch their own attacks.
January 8th, 2025 — Source
Insider Threat: Tackling the Complex Challenges of the Enemy Within
The insider threat problem will worsen, and the solutions will widen, in the age of generative-AI.
January 8th, 2025 — Source
Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282)
Ivanti has fixed two vulnerabilities affecting Ivanti Connect Secure, Policy Secure and ZTA gateways, one of which (CVE-2025-0282) has been exploited as a zero-day by attackers to compromise Connect Secure VPN appliances.
January 8th, 2025 — Source
Ivanti warns of new Connect Secure flaw used in zero-day attacks
Ivanti is warning that hackers exploited a Connect Secure remote code execution vulnerability tracked as CVE-2025-0282 in zero-day attacks to install malware on appliances.
January 8th, 2025 — Source
Ivanti Warns of New Zero-Day Attacks Hitting Connect Secure Product
Ivanti confirms zero-day exploitation of a remotely exploitable code execution flaw in its Connect Security product line.
January 8th, 2025 — Source
Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data
Japan on Wednesday linked more than 200 cyberattacks over the past five years targeting the country's national security and high technology data to a Chinese hacking group, MirrorFace, detailing their tactics and calling on government agencies and businesses to reinforce preventive measures.
January 8th, 2025 — Source or Source or Source
Medical billing firm Medusind discloses breach affecting 360,000 people
Medusind, a leading billing provider for healthcare organizations, is notifying hundreds of thousands of individuals of a data breach that exposed their personal and health information more than a year ago, in December 2023.
January 8th, 2025 — Source
Meta's Fact-Checking Pullback Could Help Scammers Thrive
Facebook Unveils Community Notes Program But Has Done Little to Curb Fraud
January 8th, 2025 — Source or Source or Source or Source or Source
Misconfigured license plate readers are leaking data and video in real time
Video feeds from at least 150 Motorola license plate readers accessible without a password.
January 8th, 2025 — Source
Mitel 0-day, 5-year-old Oracle RCE bug under active exploit
3 CVEs added to CISA's catalog
January 8th, 2025 — Source
Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers
CISA has added Mitel MiCollab (CVE-2024-41713, CVE-2024-55550) and Oracle WebLogic Server (CVE-2020-2883) vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog.
January 8th, 2025 — Source
New Labels Will Help People Pick Devices Less at Risk of Hacking
The US government is rolling out a consumer labeling system designed to help Americans pick smart devices that are less vulnerable to hacking.
January 8th, 2025 — Source
Over 4,000 backdoors hijacked by registering expired domains
Over 4,000 abandoned but still active web backdoors were hijacked and their communication infrastructure sinkholed after researchers registered expired domains used for commanding them.
January 8th, 2025 — Source
Rationalizing the Stack: The Case for Security Vendor Consolidation
Consolidating from an overly burdensome number of point solutions to an easier to manage platform-based approach brings with it a number of benefits.
January 8th, 2025 — Source
Russian ISP confirms Ukrainian hackers "destroyed" its network
Ukrainian hacktivists, part of the Ukrainian Cyber Alliance group, announced on Tuesday they had breached Russian internet service provider Nodex's network and wiped hacked systems after stealing sensitive documents.
January 8th, 2025 — Source or Source or Source
SonicWall urges admins to patch exploitable SSLVPN bug immediately
SonicWall is emailing customers urging them to upgrade their firewall's SonicOS firmware to patch an authentication bypass vulnerability in SSL VPN and SSH management that is "susceptible to actual exploitation."
January 8th, 2025 — Source
Swimlane Hero helps solve complex security operations problems
Swimlane unveiled Hero, a private agentic AI security operations (SecOps) companion.
January 8th, 2025 — Source
T-Mobile is under fire again over its 2021 data breach
Washington state claims the company had years to fix known security breaches but didn't.
January 8th, 2025 — Source
Telegram Shared Data of Thousands of Users After CEO's Arrest
After its CEO was arrested last summer, Telegram has been increasingly sharing user data at the request of authorities.
January 8th, 2025 — Source
The U.S. Cyber Trust Mark set to launch
The White House has announced the launch of the U.S. Cyber Trust Mark, a voluntary cybersecurity labeling program for consumer-grade internet-connected devices.
January 8th, 2025 — Source
This Sleek Schlage Lock Uses UWB to Predict Your Moment-by-Moment Arrival
Schlage came to CES 2025 with a new trick: This smart lock uses ultra-wideband to predict exactly when you're reaching for the door.
January 8th, 2025 — Source
Thousands Impacted by Casio Data Breach
Casio has completed its investigation into the data breach caused by a recent ransomware attack and found that thousands of individuals are impacted.
January 8th, 2025 — Source
Transcend Migration Accelerator improves privacy strategies for organizations
Transcend announced its white-glove Migration Accelerator for businesses leaving behind legacy privacy platforms.
January 8th, 2025 — Source
UN aviation agency confirms recruitment database security breach
The United Nations' International Civil Aviation Organization (ICAO) has confirmed that a threat actor has stolen approximately 42,000 records after hacking into its recruitment database.
January 8th, 2025 — Source
UN's aviation agency confirms attack on recruitment database
Various data points compromised but no risk to flight security
January 8th, 2025 — Source
Understanding WebRTC Security Architecture and IoT
Learn more about how WebRTC's triple-layer security architecture protects IoT communications and creates the building blocks of secure device interactions.
January 8th, 2025 — Source
US to Launch Cyber Trust Mark to Label Secure Smart Devices
The Cyber Trust Mark is designed to help consumers make more informed decisions about the cybersecurity of devices they may purchase.
January 8th, 2025 — Source
Veracode Fuels Supply Chain Security With Phylum Acquisition
Phylum's Product Delivers Real-Time Detection of Malicious Open-Source Packages
January 8th, 2025 — Source or Source or Source or Source
White House Launches US Cyber Trust Mark for IoT Devices
Biden Administration Hopes Good Cybersecurity Is Also Good Marketing
January 8th, 2025 — Source or Source or Source or Source or Source or Source
Internet — Security Issues — January 7th, 2025
1Password Acquires Trelica to Boost SaaS Access Management
Unified Extended Access Management Platform Gains Key Integrations and Workflows
January 7th, 2025 — Source or Source or Source or Source or Source
A Violent Gang Is Using U-Haul to Hack and Dox Victims
Hacked accounts tied to the rental service can provide critical information to cybercriminals.
January 7th, 2025 — Source
Almost half Gen Z and Millennials have had their social media passwords hacked
New research from hardware authentication security key provider Yubico shows nearly half of Gen Z (47 percent) and Millennials (46 percent) have had their social media account passwords hacked.
January 7th, 2025 — Source
AWS re:Invent 2024: The Future of Cloud, AI and Resilience
ISMG Compendium Showcases More Than 50 Interviews on Threats, Emerging Solutions
January 7th, 2025 — Source or Source or Source or Source or Source
Best Home Security Systems for Renters in 2025
Renting a place doesn't mean you should be compromising on the security. These affordable and easy-to-install home security systems can safeguard your property efficiently.
January 7th, 2025 — Source
BIOS flaws expose iSeq DNA sequencers to bootkit attacks
BIOS/UEFI vulnerabilities in the iSeq 100 DNA sequencer from U.S. biotechnology company Illumina could let attackers disable devices used for detecting illnesses and developing vaccines.
January 7th, 2025 — Source or Source or Source
Buying a smart home device? Look for this new cybersecurity seal - here's why
A new program from the FCC should make it easier to find devices you can trust.
January 7th, 2025 — Source
Casio says data of 8,500 people exposed in October ransomware attack
Japanese electronics manufacturer Casio says that the October 2024 ransomware incident exposed the personal data of approximately 8,500 people.
January 7th, 2025 — Source
China Protests US Sanctions for Its Alleged Role in Hacking, Complains of Foreign Hacker Attacks
China has slammed a decision by the US Treasury to sanction a Beijing-based cybersecurity company for its alleged role in multiple hacking incidents targeting critical infrastructure.
January 7th, 2025 — Source
Chinese Tech Companies Tencent, CATL and Others Protest US Listings as Army-Linked Companies
The U.S. Defense Department added dozens of Chinese companies, including Tencent, SenseTime and battery maker CATL, to a list of companies it says have ties to China's military.
January 7th, 2025 — Source
CISA Issues New Goals to Strengthen IT Cybersecurity
CISA Urges IT and Design Sector Software Developers to Improve Cyber Hygiene
January 7th, 2025 — Source or Source or Source or Source or Source
CISA says Treasury was the only US agency breached via BeyondTrust
The US Cybersecurity and Infrastructure Security Agency (CISA) has shared on Monday that the Treasury Department was the only US federal agency affected by the recent cybersecurity incident involving compromised BeyondTrust Remote Support SaaS instances.
January 7th, 2025 — Source
CISA warns of critical Oracle, Mitel flaws exploited in attacks
CISA has warned U.S. federal agencies to secure their systems against critical vulnerabilities in Oracle WebLogic Server and Mitel MiCollab systems that are actively exploited in attacks.
January 7th, 2025 — Source
CISA: No Federal Agency Beyond Treasury Impacted by BeyondTrust Incident
CISA says no federal agencies other than Treasury were impacted by the recent compromise of a BeyondTrust cloud-based service.
January 7th, 2025 — Source
Critical Infrastructure Ransomware Attack Tracker Reaches 2,000 Incidents
Temple University's Critical Infrastructure Ransomware Attacks (CIRA) database now contains over 2,000 entries.
January 7th, 2025 — Source
CSE's evolved Security Review Program
Please note that assurance testing of designated supplier products by CSE-qualified third-party laboratories has ceased as of December 2023. A list of reviewed versions is available upon request by email at tcrp@cyber.gc.ca. For the latest guidance related to designated suppliers, see the Government of Canada's policy statement on securing Canada's telecommunications system.
January 7th, 2025 — Source
Dell, HPE, MediaTek Patch Vulnerabilities in Their Products
MediaTek, HPE and Dell release advisories to inform customers about potentially serious vulnerabilities found and patched in their products.
January 7th, 2025 — Source
Don't wait 'til October to switch to Windows 11, security expert warns
Support for Windows 10 continues to October, but an expert says you should switch to Windows 11 sooner than later.
January 7th, 2025 — Source
FDA Warns of Cyber Risks in Guidance for AI-Enabled Devices
New Non-Binding Recommendations Target Medical Device Makers, Software Developers
January 7th, 2025 — Source or Source or Source or Source or Source
Former NSA Director Rob Joyce Joins DataTribe as Venture Partner
DataTribe said Joyce will be a venture partner tasked with finding entrepreneurs developing new and emerging technologies for cyber defense.
January 7th, 2025 — Source
'Frankenstein Fraud' Identity Theft Frequently Targets Young Children: How It Works
Thieves can use a stolen Social Security number to create a new identity and go undetected for years.
January 7th, 2025 — Source
Enhancing Cloud Cybersecurity for Critical Infrastructure Protection
Cloud computing enhances infrastructure but raises security risks. Developers must secure systems with zero trust, automation, and collaboration.
January 7th, 2025 — Source
From logs to security: How process analysis is transforming access control
Researchers at the University of Electro-Communications have developed a framework for improving system security by analyzing business process logs. The research is published in the International Journal of Software Engineering and Knowledge Engineering.
January 7th, 2025 — Source
Hackers Claim Massive Breach of Location Data Giant, Threaten to Leak Data
Gravy Analytics has been one of the most important companies in the location data industry for years, collating smartphone location data from around the world selling some to the U.S. government. Hackers say they stole a mountain of data.
January 7th, 2025 — Source
January Pixel update arrives carrying security patches and bug fixes
Google today released the January Pixel update which can be installed on the Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, and the Pixel 9 Pro Fold. Since Google released a Pixel Feature Drop just last month, the January update wasn't expected to deliver any exciting new features. The update does include security patches to fix software vulnerabilities.
January 7th, 2025 — Source
Malicious Browser Extensions are the Next Frontier for Identity Attacks
More than 2.6 million users across thousands of organizations worldwide learned this the hard way, just before the New Year, when they found out that their cookies and identity data were exposed as part of an attack campaign exploiting browser extensions.
January 7th, 2025 — Source or Source
McAfee Scam Detector spots scams across text, email, and video
McAfee launched the AI-powered McAfee Scam Detector — a tool designed to protect against text, email, and video scams.McAfee launched the AI-powered McAfee Scam Detector — a tool designed to protect against text, email, and video scams.
January 7th, 2025 — Source
Moxa Warns of Critical Industrial Router Vulnerabilities
Flaws Enable Privilege Escalation and Remote Exploitation
January 7th, 2025 — Source or Source or Source
NETGEAR Armor, powered by Bitdefender, protects home networks against cyber threats
NETGEAR announced the nExt generation of NETGEAR Armor, powered by Bitdefender. As a subscription, Armor is a comprehensive cybersecurity service available on Orbi mesh systems and Nighthawk routers that protects IoT and mobile devices connected to the home network and on the go.
January 7th, 2025 — Source
New EagerBee Campaign Targeting Middle Eastern Organizations
Hackers Use Updated Version of the Malware Plugin, Kaspersky Says
January 7th, 2025 — Source or Source or Source or Source or Source
New labels will help people pick devices less at risk of hacking
The federal government is rolling out a consumer labeling system designed to help Americans pick smart devices that are less vulnerable to hacking.
January 7th, 2025 — Source
New Mirai botnet targets industrial routers with zero-day exploits
A relatively new Mirai-based botnet has been growing in sophistication and is now leveraging zero-day exploits for security flaws in industrial routers and smart home devices.
January 7th, 2025 — Source
Report: Flaws in Illumina DNA Sequencer Devices Allow Hacks
Eclypsium Report Describes BIOS/UEFI Issues in Illumina iSeq 100 Firmware
January 7th, 2025 — Source or Source or Source
Security platform adopts Open API standards
Exabeam's cloud-native, New-Scale Security Operations Platform has become the first security operations platform compatible with the Open-API Standard (OAS).
January 7th, 2025 — Source
Study shows head trauma may activate latent viruses, leading to neurodegeneration
Researchers suggest results may lead to preventive strategies using antiviral drugs
January 7th, 2025 — Source
T-Mobile Sued by Washington State Over 2021 Data Breach
Attorney General Accuses Telecom of Failing to Correctly Notify Millions of Victims
January 7th, 2025 — Source or Source or Source or Source or Source
This Smart Home Pod Promises Powerful New Tricks to Stop Porch Pirates
Hyve showed up to CES with a mission: Create a delivery box that's both useful and package theft-proof.
January 7th, 2025 — Source
Trolley Problem, Safety Versus Security of Generative AI
The only way to advance AI safety is to increase human interactions, human values and societal governance to promote a reinforced human feedback loop, much like we do with traditional AI training methods.
January 7th, 2025 — Source
UN aviation agency 'investigating' security breach after hacker claims theft of personal data
The International Civil Aviation Organization (ICAO), a United Nations agency that defines international operating standards for civil aviation, has confirmed it's investigating a cybersecurity incident.
January 7th, 2025 — Source or Source
UN aviation agency investigating possible data breach
The United Nation's International Civil Aviation Organization (ICAO) confirmed on Monday that it's "actively investigating reports of a potential information security incident allegedly linked to a threat actor known for targeting international organizations."
January 7th, 2025 — Source
US government set to launch its Cyber Trust Mark cybersecurity labeling program for internet-connected devices in 2025
The U.S. government announced Tuesday that its long-awaited cybersecurity labeling program for consumer internet-connected devices will launch in 2025.
January 7th, 2025 — Source
US govt launches cybersecurity safety label for smart devices
Today, the White House announced the launch of the U.S. Cyber Trust Mark, a new cybersecurity safety label for internet-connected consumer devices.
January 7th, 2025 — Source
Veracode Fuels Supply Chain Security With Phylum Acquisition
Phylum's Product Delivers Real-Time Detection of Malicious Open-Source Packages
January 7th, 2025 — Source or Source or Source or Source
Veracode Targets Malicious Code Threats With Phylum Acquisition
The deal includes certain Phylum assets, including its malicious package analysis, detection, and mitigation technology.
January 7th, 2025 — Source
Washington Attorney General Sues T-Mobile Over 2021 Data Breach
Washington State Attorney General Bob Ferguson has filed a lawsuit against T-Mobile over a 2021 data breach that impacted over 76 million consumers.
January 7th, 2025 — Source
Washington state sues T-Mobile over 2021 data breach security failures
Washington state has sued T-Mobile over failing to secure the sensitive personal information of over 2 million Washington residents in a 2021 data breach.
January 7th, 2025 — Source
Internet — Security Issues — January 6th, 2025
Achieving Security and Trust in a Data Fabric: The Role of Zero Trust Architecture
Explore how Zero Trust Architecture (ZTA) can provide a solid foundation for achieving security and trust in a data fabric.
January 6th, 2025 — Source
Anticipating the Cyber Frontier: Top Predictions for 2025
The cybersecurity landscape in 2025 will demand a careful balance between robust defense mechanisms and adaptive resilience.
January 6th, 2025 — Source
Eagerbee backdoor deployed against Middle Eastern govt orgs, ISPs
New variants of the Eagerbee malware framework are being deployed against government organizations and internet service providers (ISPs) in the Middle East.
January 6th, 2025 — Source
EFF Goes to Court to Uncover Police Surveillance Tech in California
EFF filed a motion in California Superior Court to join—or intervene in—an existing lawsuit to get access to documents we requested. The private company Pen-Link sued the San Joaquin Sheriff's Office to block the agency from disclosing to EFF the unredacted contracts between them, claiming the information is a trade secret. We are going to court to make sure the public gets access to these records.
January 6th, 2025 — Source
Emerging Mobile Threats and Defensive Strategies for Developers
The growth of mobile tech drives innovation but also invites risks. Learn about emerging threats to mobile applications with detailed examples and insights.
January 6th, 2025 — Source
Charter, Consolidated, Windstream reportedly join China's Salt Typhoon victim list
Slow drip of compromised telecom networks continues
January 6th, 2025 — Source
China's Hacking of US Telecoms: Officials Name More Victims
Reportedly Hacked: Charter Communications, Consolidated Communications, Windstream
January 6th, 2025 — Source or Source or Source or Source or Source
Chinese hackers also breached Charter and Windstream networks
More U.S. companies have been added to the list of telecommunications firms hacked in a wave of breaches by a Chinese state-backed threat group tracked as Salt Typhoon.
January 6th, 2025 — Source
CISA Investigates Chinese Hacking of Treasury Department
US Cyber Defense Agency Confirms Role in Federal Probe Following 'Major Incident'
January 6th, 2025 — Source or Source or Source or Source or Source
CISA says 'no indication' of wider government hack beyond Treasury
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said in a brief statement Monday that there is "no indication" that any other U.S. federal agency was hacked during a recent cyberattack at the U.S. Treasury Department in December.
January 6th, 2025 — Source
CISA says recent government hack limited to US Treasury
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said today that the Treasury Department breach disclosed last week did not impact other federal agencies.
January 6th, 2025 — Source
Code Execution Flaw Found in Nuclei Vulnerability Scanner
A vulnerability in Nuclei's template signature verification system could have allowed attackers to execute arbitrary code.
January 6th, 2025 — Source
Cybersecurity M&A Roundup: 37 Deals Announced in December 2025
Roundup of the thirty-seven cybersecurity-related merger and acquisition (M&A) deals announced in December 2024.
January 6th, 2025 — Source
Is Your Car Spying on You? What It Means That Tesla Shared Data in the Las Vegas Explosion
Many cars know where you've been and where you are going, and also often have access to your contacts, call logs, texts and other sensitive information thanks to cell phone syncing.
January 6th, 2025 — Source
IT Giant Atos Responds to Ransomware Group's Data Theft Claims
IT services giant Atos has responded to the data breach claims made by a ransomware group named Space Bears.
January 6th, 2025 — Source
Longtime Tenable CEO, NetWitness Head Amit Yoran Dies at 54
Yoran's Passing Comes 10 Months After Cancer Diagnosis, 1 Month After Taking Leave
January 6th, 2025 — Source or Source or Source or Source
Meet the Chinese 'Typhoon' hackers preparing for war
Of the cybersecurity risks facing the United States today, few loom larger than the potential sabotage capabilities posed by China-backed hackers, which senior U.S. national security officials have described as an "epoch-defining threat."
January 6th, 2025 — Source
Microsoft disguises Bing as Google to fool inattentive searchers
If you can't beat Google, trick your users into thinking that they're using Google.
January 6th, 2025 — Source
Nuclei Patches High Severity Flaw in Security Tool
Flaw Enabled Signature Bypassing on Nuclei ProjectDiscovery
January 6th, 2025 — Source or Source or Source or Source or Source
Online Behavioral Ads Fuel the Surveillance Industry—Here's How
A global spy tool exposed the locations of billions of people to anyone willing to pay. A Catholic group bought location data about gay dating app users in an effort to out gay priests. A location data broker sold lists of people who attended political protests.
January 6th, 2025 — Source
Patch Alert: Remotely Exploitable LDAP Flaws in Windows
Proof-of-Concept Exploit 'LDAP Nightmare' Crashes 'Any Unpatched Windows Server'
January 6th, 2025 — Source or Source or Source or Source or Source
Staten Island Hospital Notifying 674,000 of May 2023 Hack
Data Theft Incident Also Disrupted IT Systems for Nearly a Month
January 6th, 2025 — Source or Source or Source or Source or Source
Surfshark One review: Adequate antivirus protection with caveats
How this security software defends against malware won't suit everyone.
January 6th, 2025 — Source
Telegram Hands U.S. Authorities Data on Thousands of Users
The number of data requests fulfilled by Telegram skyrocketed, with the company providing data to U.S. authorities on 2,253 users last year.
January 6th, 2025 — Source
Tenable Disables Nessus Agents Over Faulty Updates
Tenable has disabled two Nessus scanner agent versions after a differential plugin update caused the agents to go offline.
January 6th, 2025 — Source
The best VPN in January 2025
All the best VPNs for streaming, online security, anonymity, and everything else.
January 6th, 2025 — Source
The importance of modernizing cyber defenses [Q&A]
The state of high-profile cyber incidents in recent years has highlighted the fact that defenses need to be kept up to date to provide adequate protection.
January 6th, 2025 — Source
Tired of begging, Microsoft now trying to trick users into thinking Bing is Google
If you can't beat 'em, just imitate their branding, hide yours and hope they don't notice
January 6th, 2025 — Source
US Sanctions Chinese Firm Linked to Flax Typhoon Attacks on Critical Infrastructure
The US Treasury has sanctioned Chinese company Integrity Technology for supporting state-sponsored group Flax Typhoon in hacking US critical infrastructure.
January 6th, 2025 — Source
Violent Hackers Are Using U-Haul To Dox Targets
Members of an underground criminal community are targeting U-Haul because of the wealth of non-public information it can hold on targets.
January 6th, 2025 — Source
Wallet Drainer Malware Used to Steal $500 Million in Cryptocurrency in 2025
Close to $500 million in cryptocurrency from over 332,000 addresses was stolen in 2024 using wallet drainer malware.
January 6th, 2025 — Source
Internet — Security Issues — January 3rd, 2025
36 Chrome Extensions Compromised in Supply Chain Attack
Developers Listed as Public Contact Points Targeted in Phishing Campaign
January 3rd, 2025 — Source or Source or Source or Source or Source
A Mixed Bag for Cybersecurity Stocks in 2024 as Paths Differ
Data Protection, Firewall Stocks Surge as Vulnerability Management Stocks Struggle
January 3rd, 2025 — Source or Source or Source or Source or Source
Apple's AI Photo Analyzer Faces Privacy Backlash
iPhone Maker Introduced Feature Without Explicit Consent
January 3rd, 2025 — Source or Source or Source
Data ProtectionIn Other News: Volkswagen Data Leak, DoubleClickjacking, China Denies Hacking US Treasury
Noteworthy stories that might have slipped under the radar: location data of 800,000 electric Volkswagen cars leaked, DoubleClickjacking attack, China denies hacking US Treasury.
January 3rd, 2025 — Source
Dental Practice Pays State in Alleged Data Breach 'Cover Up'
Indiana Attorney General Fines Westend Dental $350K in 2020 Ransomware Hack
January 3rd, 2025 — Source or Source or Source or Source
Digital fingerprint: Cascading style sheets leaves users vulnerable to tracking
Processor type, IP address, browser in use, installed fonts—by collecting these and other characteristics of browser settings and the underlying operating system, it is possible to create a highly detailed and, in some cases, even unique profile of users. This phenomenon is known as browser fingerprinting.
January 3rd, 2025 — Source
Ex-Terraform CEO Extradited to US Over Crypto Fraud Charges
Do Hyeong Kwon Extradited to US for Allegedly Defrauding Investors Out of Billions
January 3rd, 2025 — Source or Source or Source or Source or Source
Exploit Code Published for Potentially Dangerous Windows LDAP Vulnerability
Proof-of-concept (PoC) code was published for CVE-2024-49113, a denial-of-service (DoS) vulnerability in Windows LDAP.
January 3rd, 2025 — Source
FireScam Android Malware Packs Infostealer, Spyware Capabilities
The FireScam Android infostealer monitors app notifications and harvests credentials and financial data and sends it to a Firebase database.
January 3rd, 2025 — Source
French govt contractor Atos denies Space Bears ransomware attack claims
French tech giant Atos, which secures communications for the country's military and secret services, has denied claims made by the Space Bears ransomware gang that they compromised one of its databases.
January 3rd, 2025 — Source
Japanese Businesses Hit By a Surge In DDoS Attacks
DDoS Attacks Primarily Target Logistics, Government and Financial Entities
January 3rd, 2025 — Source or Source or Source or Source or Source
Microsoft, Ping, Okta Dominate Access Management Gartner MQ
Access Management Leaders Remain Unchanged as Customer Identity Cases Proliferate
January 3rd, 2025 — Source or Source or Source or Source
New York Hospital Says Ransomware Attack Data Breach Impacts 670,000
Richmond University Medical Center has been investigating a ransomware attack since May 2023 and it recently determined that it affects 670,000 people.
January 3rd, 2025 — Source
Unsettling Reasons Why You Might Want To Avoid Using The Same Password Over & Over
You need an account for just about everything these days. You need to create accounts for services such as Gmail, Netflix, and Amazon, as well as for online forums or sites like Reddit and YouTube. And even if an account isn't strictly required, you might be locked out of certain features or content until you make one. With so many accounts to keep track of, you will have to memorize just as many passwords.
January 3rd, 2025 — Source
US CFPB Needs to Look Beyond Zelle to Curb Scams
Ken Palla on Lessons From U.K and Australia to Reduce Fraud and Scams
January 3rd, 2025 — Source or Source or Source or Source or Source
US CISA Issues Final Cyber Rules for Restricted Bulk Data
Cyber Defense Agency Aims to Bolster Protections Against Chinese Intrusion
January 3rd, 2025 — Source or Source or Source or Source or Source
US Imposes Sanctions on Russian and Iranian Groups Over Disinformation Targeting American Voters
The United States has imposed sanctions on two groups linked to Iranian and Russian efforts to target American voters with disinformation ahead of this year’s election.
January 3rd, 2025 — Source
US Sanctions Beijing Company for Flax Typhoon Hacking
Integrity Technology Group Built Botnet for Chinese Hackers, US Treasury Says
January 3rd, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — January 2nd, 2025
Breach Roundup: MetLife Denies RansomHub Cyberattack Claims
Also: German Prosecutors Charge Three Alleged Russian Saboteurs
January 2nd, 2025 — Source or Source or Source or Source or Source
China-linked attack on US Treasury Department reportedly targeted its sanctions office
The office investigates potential sanction targets.
January 2nd, 2025 — Source
Chinese cyber-spies reportedly targeted sanctions intel in US Treasury raid
OFAC, Office of the Treasury Secretary feared hit in data-snarfing swoop
January 2nd, 2025 — Source
Chinese government hackers reportedly targeted US Treasury's sanctions office during December cyberattack
Chinese government hackers targeted the U.S. Treasury's highly sensitive sanctions office during a December cyberattack, according to reports.
January 2nd, 2025 — Source
Chinese Hack Breached US Sanctions Office in Treasury Attack
Hackers Reportedly Target Treasury Department Offices Overseeing Economic Sanctions
January 2nd, 2025 — Source or Source or Source or Source or Source
Cryptohack Roundup: Cambodia's New Crypto Directive
Animoca Brands Co-Founder's Social Media Hacked
January 2nd, 2025 — Source or Source or Source or Source or Source
'DoubleClickjacking' Threatens Major Websites' Security
Flaw Bypasses Clickjacking Defenses and Enables Account Takeovers
January 2nd, 2025 — Source or Source or Source or Source or Source
Finland Suspects Eight in Deep-Sea Cable Sabotage Incident
Police Prevent Crew Member Suspects From Leaving Eagle S Ship, Anchored in Port
January 2nd, 2025 — Source or Source or Source or Source or Source
Ransomware gang leaks data stolen in Rhode Island's RIBridges Breach
The Brain Cipher ransomware gang has begun to leak documents stolen in an attack on Rhode Island's "RIBridges" social services platform.
January 2nd, 2025 — Source
Selling fear: Marketing for cybersecurity products often leaves consumers less secure
You have likely seen multiple ads for products and services designed to make you more secure online. When you turn on your television, see online ads, or even when you get in-app notifications, you are likely to encounter cybersecurity technology marketed as the ultimate solution and the last line of defense against digital threats.
January 2nd, 2025 — Source
Significant U.S. Treasury cybersecurity breach is the latest in string of China hack attacks claims U.S. officials
The breach is the latest in a series of cyber-attacks targeting U.S. entities.
January 2nd, 2025 — Source
These 'countries of concern' can no longer buy Americans' sensitive data
The Biden administration is worried about espionage and hacking from certain nations.
January 2nd, 2025 — Source
What's in HHS' Proposed HIPAA Security Rule Overhaul?
Experts: New Mandates Could Be Difficult, Costly for Many Entities
January 2nd, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — January 1st, 2025
A 20-Year-Old U.S. Army Soldier Has Been Arrested By Federal Authorities For Allegedly Breaching AT&T And Verizon Systems
In the past year, telecommunication systems have been exposed to critical vulnerabilities, such as hackers accessing sensitive information. This led to an overall mistrust and increased risk to privacy, especially with many big companies falling prey to cyber-attacks. It seems that not only telecommunication networks but also federal authorities are now actively pursuing the breaches and charging strict penalties against them. Now, a 20-year-old U.S. Army soldier has been arrested for being behind major breaches of AT&T and Verizon systems.
January 1st, 2025 — Source
New Year, New You: Making the Cybersecurity Pivot
Step-by-Step Guide to Rebranding Your Cybersecurity Career With Transferable Skills
January 1st, 2025 — Source or Source or Source or Source or Source or Top 10 Cybersecurity Trends to Watch in 2025
Experts on Ransomware, Deepfakes, AI Innovation and Cyber Defense the in Year Ahead
January 1st, 2025 — Source
The future of VPNs: Decentralized and post-quantum security
VPN companies are working on new and innovative solutions for at-home IoT coverage. More and more services are switching over to unlimited device connection models. Others such as ExpressVPN have even started selling their own routers, ready to go right out of the box, with the VPN built into them.
January 1st, 2025 — Source
US soldier arrested after allegedly posting hacked Trump and Harris call logs
The soldier is reportedly connected to a hacking alias that was offering to sell stolen data from the Snowflake breaches.
January 1st, 2025 — Source
What's Ahead for Healthcare Cyber Regs, Legislation in 2025?
Cassie Ballard and Chelsea Arnone of CHIME on What to Watch From the Feds
January 1st, 2025 — Source or Source or Source or Source or Source
Internet — Security Issues — December 31st, 2024
Addressing Gen AI Privacy, Security Governance in Healthcare
As healthcare entities embrace generative AI tools, it's critical they take a holistic approach addressing privacy and security governance, said Dave Perry, digital workspace operations manager, St. Joseph's Healthcare in Ontario, who discusses how his organization is tackling those challenges.
December 31st, 2024 — Source or Source or Source or Source or Source
Alleged 7-Zip arbitrary code execution exploit leaked to Twitter — the 7-Zip author claims this exploit not only isn't real but was generated by AI
An alleged 7-Zip Arbitrary Code Execution exploit gets leaked to Twitter.
December 31st, 2024 — Source
Arrest of US Army Soldier Tied to AT&T and Verizon Extortion
Cameron Wagenius Suspected of Extorting Snowflake Customers Over Stolen Data
December 31st, 2024 — Source or Source or Source or Source or Source or Source
AT&T and Verizon Say Chinese Hackers Ejected From Networks
U.S. telecommunications giants AT&T and Verizon Communications believe they have finally ejected Chinese cyber espionage hackers from their networks. The White House said the "Salt Typhoon" nation-state hackers infiltrated at least nine U.S. telcos' infrastructure, and have been hard to eject.
December 31st, 2024 — Source or Source or Source or Source or Source
Cyberhaven Chrome Extension Hack Linked to Widening Supply Chain Campaign
The recent compromise of Cyberhaven's Chrome extension appears to be part of a broad campaign that started over a year ago.
December 31st, 2024 — Source
Federal Regulators Limit Location Brokers from Selling Your Whereabouts: 2024 in Review
The opening and closing months of 2024 saw federal enforcement against a number of location data brokers that track and sell users’ whereabouts through apps installed on their smartphones. In January, the Federal Trade Commission brought successful enforcement actions against X-Mode Social and InMarket, banning the companies from selling precise location data—a first prohibition of this kind for the FTC.
December 31st, 2024 — Source
Hacker demonstrates the supposedly-patched Windows 11 BitLocker is still vulnerable to hackers — default encryption can be overcome with network access
Windows 11's default BitLocker encryption is put under additional scrutiny by a hacker who showcases an old bug still being exploitable.
December 31st, 2024 — Source
Major cybersecurity breach hits US Treasury, linked to Chinese hackers
The breach, which occurred in early December 2024, exploited a vulnerability in BeyondTrust's remote support product.
December 31st, 2024 — Source
Passkeys were supposed to be secure and simple; here's how they fail
I've been arguing that passwords are horrible for the best part of a decade now, and was an enthusiastic early adopter of the far better approach of passkeys.
December 31st, 2024 — Source
Patched BitLocker Flaw Still Susceptible to Hack
A previously patched flaw in Windows BitLocker disk encryption feature is susceptible to attacks allowing hackers to decrypt information, new research has found. Security researcher Thomas Lambertz extracted data from the system memory, including the master key.
December 31st, 2024 — Source or Source or Source or Source or Source
Ransomware downtime costs U.S. healthcare organizations $1.9M daily
That has culminated in an estimated $21.9 billion in downtime losses over the past six years, a new report shows, with medical organizations experiencing 17 days of downtime per incident, on average.
December 31st, 2024 — Source
Recommended cyber security contract clauses for cloud services (ITSM.50.104)
As more organizations move to cloud-based services and technologies, there is a growing need to identify supporting contract clauses and principles to ensure cyber security expectations are clearly understood and documented. Cyber security clauses and principles are important service components. They should be combined with foundational contract elements, such as service level agreements (SLAs), task orders, and governing standards.
December 31st, 2024 — Source
Safety Concerns, Pushback Against OpenAI's For-Profit Plan
OpenAI's attempt to convert to a for-profit company is facing opposition from competitors and artificial intelligence safety activists, who argue that the transition would "undermine" the tech giant's commitment to secure AI development and deployment.
December 31st, 2024 — Source or Source or Source or Source or Source
The US Treasury Department has been hacked, Chinese hackers accused
According to a new report by The New York Times, the US Treasury Department has been hacked. The report says that the attack was linked to a "China state-sponsored Advanced Persistent Threat actor".
December 31st, 2024 — Source
These were the badly handled data breaches of 2024
Blaming victims, months of silence, and suing security researchers all featured in cybersecurity in 2024.
December 31st, 2024 — Source
US telco Lumen says its network is now clear of China's Salt Typhoon hackers
Lumen says there is 'no evidence' that customer data was accessed during the intrusion
December 31st, 2024 — Source
Internet — Security Issues — December 30th, 2024
A Year of AI Pragmatism and Paradigm Shifts
2025 Is Likely to See Balanced Approach to AI Across Industries
December 30th, 2024 — Source or Source or Source or Source or Source
AT&T and Verizon give all clear after Salt Typhoon attack
Telecom giants AT&T and Verizon have assured the public that their networks are secure following a string of cyberattacks attributed to a China-linked hacking group known as Salt Typhoon.
December 30th, 2024 — Source or Source or Source
AT&T, Verizon publicly address Chinese hacking of their networks
The hacking of US telecom infrastructure from China is one of the main topics on the desk of officials. The Wall Street's report brought the situation to public attention in October. However, the FBI has been investigating it for some time. AT&T and Verizon are two of the carriers affected by the Salt Typhoon attack.
December 30th, 2024 — Source
Cisco Confirms Authenticity of Data After Second Leak
Cisco has confirmed that 4 Gb of data leaked by a hacker is authentic and related to a recently disclosed security incident.
December 30th, 2024 — Source
Four-Faith Industrial Router Vulnerability Exploited in Attacks
Threat actors are exploiting a command injection vulnerability in Four-Faith industrial routers to deploy a reverse shell.
December 30th, 2024 — Source
Four-Faith Routers Exploited Using New Flaw
Attackers Exploiting OS Command Injection Vulnerability
December 30th, 2024 — Source or Source or Source or Source or Source
Hackers exploit Four-Faith router flaw to open reverse shells
Threat actors are exploiting a post-authentication remote command injection vulnerability in Four-Faith routers tracked as CVE-2024-12856 to open reverse shells back to the attackers.
December 30th, 2024 — Source
Hackers Launch Supply Chain Attack Against Chrome Extensions
Users of Cyberhaven's Data-Loss Prevention Chrome Extension Among Those Targeted
December 30th, 2024 — Source or Source or Source or Source
Palo Alto Networks Patches Firewall Zero-Day Exploited for DoS Attacks
Palo Alto Networks has patched CVE-2024-3393, a vulnerability that has been exploited for DoS attacks against the company's firewalls.
December 30th, 2024 — Source
Passkey technology is elegant, but it's most definitely not usable security
Just in time for holiday tech-support sessions, here's what to know about passkeys.
December 30th, 2024 — Source
Protecting Highly Sensitive Health Data for Research
Kurt Rohloff of Duality Technologies on Advancing Privacy Frameworks
December 30th, 2024 — Source or Source or Source or Source or Source
Several Chrome Extensions Compromised in Supply Chain Attack
Cyberhaven and other Chrome extensions were compromised in a supply chain attack targeting Facebook advertising users.
December 30th, 2024 — Source
US Issues Final Rule for Protecting Personal Data Against Foreign Adversaries
The DoJ has issued a final rule addressing adversaries' access to and exploitation of Americans' bulk sensitive personal information.
December 30th, 2024 — Source
Internet — Security Issues — December 29th, 2024
A 9th Telecoms Firm Has Been Hit by a Massive Chinese Espionage Campaign, the White House Says
A top White House official said at least eight U.S. telecom firms and dozens of nations have been impacted by a Chinese hacking campaign.
December 29th, 2024 — Source
Internet — Security Issues — December 28th, 2024
Hackers hijacked legitimate Chrome extensions to try to steal data
A cyberattack campaign inserted malicious code into multiple Chrome browser extensions as far back as mid-December, Reuters reported yesterday. The code appeared designed to steal browser cookies and authentication sessions, targeting "specific social media advertising and AI platforms," according to a blog post from Cyberhaven, one of the companies that was targeted.
December 28th, 2024 — Source or Source
How cops taking down LockBit, ALPHV led to RansomHub's meteoric rise
Cut off one head, two more grow back in its place
December 28th, 2024 — Source
Japan Airlines was hit by a cyberattack, delaying flights during the year-end holiday season
Japan Airlines said it was hit by a cyberattack Thursday, causing delays to more than 20 domestic flights but the carrier said it was able to stop the onslaught and restore its systems hours later. There was no impact on flight safety, it said.
December 28th, 2024 — Source
Microsoft faces FTC scrutiny over alleged antitrust practices in federal cybersecurity deals
Using free trials to lock government and military into expensive subscriptions?
December 28th, 2024 — Source
US identifies 9th telecom hacked by China-based group Salt Typhoon
The United States has identified a ninth telecommunications company compromised by Salt Typhoon, a cyberespionage campaign allegedly linked to China. This announcement comes amid various efforts by U.S. officials to strengthen cybersecurity defenses following what some lawmakers have described as the most significant telecommunications breach in American history.
December 28th, 2024 — Source
Internet — Security Issues — December 27th, 2024
Cyber firm’s Chrome extension hijacked to steal user passwords
Data-loss prevention startup Cyberhaven says hackers published a malicious update to its Chrome extension that was capable of stealing customer passwords and session tokens, according to an email sent to affected customers, who may have been victims of this suspected supply-chain attack.
December 27th, 2024 — Source or Source
D-Link Botnet Attacks Surge in Global Spike
Mirai and Kaiten Botnet Variants Exploit Unpatched Routers
December 27th, 2024 — Source or Source or Source or Source
Feds Identify Ninth Telecom Victim in Salt Typhoon Hack
Officials Say Chinese Hackers Maintained 'Broad and Full' Access to Telecom Systems
December 27th, 2024 — Source or Source or Source or Source or Source
Hackers stole an unbelievable amount of data in 2024
It’s no little-known fact that hackers are always out there for your data. It’s one of the biggest risks of existing in this internet age. A single click can turn your entire life upside-down. Well, according to a new report, a bunch of lives were turned upside-down this year. CloudSEK released its 2024 report, and it shows just how much data was stolen this year.
December 27th, 2024 — Source
Human error to blame in Ascension data breach that impacted 5.6 million patients
An "honest" mistake exposed a wealth of sensitive information
December 27th, 2024 — Source
Palo Alto Patches Exploited Firewall Denial-of-Service Flaw
Unauthenticated Attackers Using Malicious Packet to Crash Devices' PAN-OS Software
December 27th, 2024 — Source or Source or Source or Source or Source
Ransomware Group Hits Substance Abuse Treatment Service
American Addiction Centers Says 422,424 Individuals' Private Details Exposed
December 27th, 2024 — Source or Source or Source or Source or Source
US Finalizes Rule Throttling Bulk Data Sales to China
Rule Aims to Stymie Weaponization of Americans' Data
December 27th, 2024 — Source or Source or Source or Source or Source or Source
Wanted: An Incident Repository For Healthcare Nonprofits
Stanley Mierzwa of Kean University on Why a Central Repository Is Needed
December 27th, 2024 — Source or Source or Source or Source or Source
White House Clears HIPAA Security Rule Update
HHS Proposes Encryption, Security Standards for Healthcare Firms
December 27th, 2024 — Source or Source or Source or Source or Source or Source
White House links ninth telecom breach to Chinese hackers
A White House official has added a ninth U.S. telecommunications company to the list of telecoms breached in a Chinese hacking campaign that impacted dozens of countries.
December 27th, 2024 — Source
Internet — Security Issues — December 26th, 2024
7 Ways to Stop VoIP DDoS Attacks from Crashing Your Phones
Threat actors are capable of launching massive VoIP DDoS attacks. Learn how to protect your VoIP network before they wreak havoc.
December 26th, 2024 — Source
Ascension cyberattack exposed medical data of 5.6M customers
Information included payment details such as credit card or bank account numbers and insurance info ranging from Medicaid and Medicare IDs to policy numbers and claims. Secure EHR data was not accessed.
December 26th, 2024 — Source
Defense Giant General Dynamics Says Employees Targeted in Phishing Attack
General Dynamics says several benefits accounts were hacked after threat actors targeted employees in a phishing campaign.
December 26th, 2024 — Source
Breach Roundup: Cyberattack Disrupts Japan Airlines
Also, US Court Rules NSO Group Violated Hacking Laws With Pegasus Spyware
December 26th, 2024 — Source or Source or Source or Source
Cl0p Ransomware Group to Name Over 60 Victims of Cleo Attack
The Cl0p ransomware group has confirmed that Blue Yonder was hit in the Cleo attack and the hackers are preparing to name over 60 others.
December 26th, 2024 — Source
Contingency Planning for Attacks on Critical Third Parties
Attorney Betsy Hodge of Akerman on Healthcare Supply Chain Considerations
December 26th, 2024 — Source or Source or Source or Source or Source
Cryptohack Roundup: FBI Fingers TraderTraitor for $308M Hack
Also: Bitfinex Hacker Lichtenstein's Social Media Post From Prison
December 26th, 2024 — Source or Source or Source or Source
Finland Boards Tanker Suspected of Rupturing Undersea Cables
The 'Eagle S' Forms Part of Sanctions-Busting Russian Shadow Fleet, Says EU
December 26th, 2024 — Source or Source or Source or Source or Source
IoT and ransomware are big security risks, and health systems feel unprepared
"The usage of AI and automatic vulnerability scanning performed by the attackers allows them to find an exposed IoT device and conduct an attack on it much quicker than they used to be able to," says one security researcher in a new report.
December 26th, 2024 — Source
Japan Airlines was hit by a cyberattack, delaying flights during the year-end holiday season
Japan Airlines said it was hit by a cyberattack Thursday, causing delays to more than 20 domestic flights but the carrier said it was able to stop the onslaught and restore its systems hours later. There was no impact on flight safety, it said.
December 26th, 2024 — Source or Source
New 'OtterCookie' malware used to backdoor devs in fake job offers
North Korean threat actors are using new malware called OtterCookie in the Contagious Interview campaign that is targeting software developers.
December 26th, 2024 — Source
Salt Security Tackles API Risks with AI-Powered Innovations
CEO Roey Eliyahu on Using AI to Simplify API Security
December 26th, 2024 — Source or Source or Source or Source or Source
Savvy security needs SASE: Addressing the security challenges organizations are grappling with
With the threat landscape becoming increasingly sophisticated, companies need agile approaches to improve their defenses and mitigate risks. After all, hackers are adapting their strategies and introducing new tools and technologies to improve their success rates. The resulting rise in cyber-attacks is evident in Xalient's latest research report 'Why SASE is the Blueprint for Future-proofing Your Network in 2025 and Beyond', where a staggering 99 percent of respondents say they have experienced an attack in the last 12 months.
December 26th, 2024 — Source
These were the badly handled data breaches of 2024
For the past few years, TechCrunch has looked back at some of the worst, badly handled data breaches and security incidents in the hope — maybe! — other corporate giants would take heed and avoid making some of the same calamities of yesteryear.
December 26th, 2024 — Source
US Congress Authorizes $3B to Replace Chinese Telecom Gear
Federal 'Rip-and-Replace' Program Gets Funding Boost in Defense Bill
December 26th, 2024 — Source or Source or Source or Source or Source
Year In Review: Australia Expands Cyber Regulation
2024 Marked the Government's Increasing Role Mandating Cybersecurity
December 26th, 2024 — Source or Source or Source or Source or Source
Internet — Security Issues — December 25th, 2024
Windows includes built-in ransomware protection. Here's how to turn it on
Be sure to enable automatic backups, too.
December 25th, 2024 — Source
Internet — Security Issues — December 20th, 2024
AI-driven gait analysis bridges health care and security fields
The analysis of a person's individual walking pattern, or gait, can reveal details about their identity and reflect differences between individuals, groups and even populations.
December 20th, 2024 — Source
Another NetWalker affiliate sentenced to 20 years in prisonA 30-year old Romanian man was sentenced to 20 years in prison for leveraging the Netwalker ransomware to extort money from victims, the US Department of Justice announced on Thursday.
#2693
December 20th, 2024 — Source or Source
Ascension: Health data of 5.6 million stolen in ransomware attack
Ascension, one of the largest private U.S. healthcare systems, is notifying nearly 5.6 million patients and employees that their personal and health data was stolen in a May cyberattack linked to the Black Basta ransomware operation.
December 20th, 2024 — Source
BadBox malware infects close to 200,000 Android devices
There are many Android TV boxes out there for sale. Some are surprisingly cheap. Before you consider pulling the trigger on that cheap Android TV box, think again. This is because according to a report from the researchers at BitSight, the BadBox malware is back and that it has managed to infect close to 200,000 devices so far.
December 20th, 2024 — Source
Botnet of 190,000 BadBox-Infected Android Devices Discovered
Bitsight has discovered a BadBox botnet consisting of over 190,000 Android devices, mainly Yandex smart TVs and Hisense smartphones.
December 20th, 2024 — Source
CISA Urges Immediate Patching of Exploited BeyondTrust Vulnerability
CISA is urging federal agencies to patch a recent critical vulnerability in BeyondTrust remote access products in one week.
December 20th, 2024 — Source
CISA: Use Signal or other secure communications app
In the wake of the widespread compromise of US telecom giants’ networks by Chinese hackers and the FBI advising Americans to use end-to-end encrypted communications, CISA is advising “highly targeted individuals” – senior government officials and politicians – to lock down and protect their smartphones as much as possible and to use “Signal or a similar app” for secure communications.
December 20th, 2024 — Source
Cyber Threats of Tomorrow: Are You Prepared for 2025?
Are you prepared for cyber threats in 2025? You may not be as protected as you think. Traversing the great internet landscape has always left individuals and businesses open to online threats, and these threats only become more prevalent as humanity’s development of new tech increases. Below, I take a look at what new threats are developing in 2025, the cost of these attacks, and what an average internet user can do to protect themselves.
December 20th, 2024 — Source
Data BreachesRansomware Group Claims Theft of Personal, Financial Data From Krispy Kreme
The Play ransomware group claims to have stolen sensitive data from donut and coffee retail chain Krispy Kreme.
December 20th, 2024 — Source
Europe's move toward cybersecurity sovereignty [Q&A]
Governments around the world are increasingly legislating for cybersecurity and privacy. But regions often have differing views on how this should be achieved.
December 20th, 2024 — Source
Five cybersecurity tips to protect yourself from scams and deepfakes
In an age when misinformation and deepfakes blur the lines between fact and fiction, identifying scams has never been more challenging. Falling for a scam can have devastating social, financial, and personal consequences. Over the past year, victims of cybercrime reported losing an average of $30,700 per incident.
December 20th, 2024 — Source
Krispy Kreme breach, data theft claimed by Play ransomware gang
The Play ransomware gang has claimed responsibility for a cyberattack that impacted the business operations of the U.S. doughnut chain Krispy Kreme in November.
December 20th, 2024 — Source
Microsoft patches four security vulnerabilities in the latest Edge update
Microsoft has released two updates for the Edge browser. One is available for all users in the Stable Channel, and the other is for those using Edge in the Extended Stable Channel (it receives big updates every eight weeks instead of four). Both updates contain fixes for four high-severity Chromium security vulnerabilities.
December 20th, 2024 — Source
Operational tech under attack, deepfake phishing and learning to use passkeys -- cybersecurity predictions for 2025
With a constant power struggle between attackers and defenders cybersecurity is a fast-moving area. That makes it notoriously hard to predict what might happen, but that doesn't stop us trying. Here are what some industry experts think the cybersecurity world has in store for 2025.
December 20th, 2024 — Source
Ransomware attack on health giant Ascension hits 5.6 million patients
A May ransomware attack on Ascension, a U.S. healthcare giant with more than 140 hospitals and dozens of senior living facilities, allowed hackers to steal personal and sensitive health information on 5.6 million patients, according to a new filing with Maine’s attorney general. The cyberattack caused widespread disruption across its hospital system, with some staff describing harrowing lapses in healthcare as a result, including delayed or lost lab results, and medication errors.
December 20th, 2024 — Source
Rockwell PowerMonitor Vulnerabilities Allow Remote Hacking of Industrial Systems
Rockwell’s PowerMonitor is affected by critical vulnerabilities that can enable remote access to industrial systems for disruption or further attacks.
December 20th, 2024 — Source
Serbian Government Exploits Qualcomm Zero-Days for Android Spyware ‘NoviSpy’
Researchers have uncovered a new spyware called NoviSpy, linked to the Serbian government. The spyware exploits Qualcomm’s zero-day vulnerabilities to infiltrate Android devices. Amnesty International’s Security Lab discovered the spyware deployed against journalists, activists, and dissidents following reports of suspicious phone activity.
December 20th, 2024 — Source
The Galaxy S25 Slim won't be slim when it comes to specs
The Ultra variants of the Galaxy S phones have typically been the most exciting variants, but that might change next year. While the Galaxy S25 Ultra has a ton of hype around it, our attention remains on the Galaxy S25 Slim. Rumors say that this phone will have a much thinner profile, and that’s all that we know. Well, thanks to some new leaks, we might know some of the Galaxy S25 Slim’s specs.
December 20th, 2024 — Source
US charges Russian-Israeli as suspected LockBit ransomware coder
The US Department of Justice has charged a Russian-Israeli dual-national for his suspected role in developing malware and managing the infrastructure for the notorious LockBit ransomware group.
December 20th, 2024 — Source
VPN used for VR game cheat sells access to your home network
Big Mama VPN tied to network which offers access to residential IP addresses.
December 20th, 2024 — Source
Internet — Security Issues — December 18th, 2024
AI Regulation Gets Serious in 2025 – Is Your Organization Ready?
While the challenges are significant, organizations have an opportunity to build scalable AI governance frameworks that ensure compliance while enabling responsible AI innovation.
December 18th, 2024 — Source
Appdome protects applications running on mobile-enabled platforms
Appdome announced that the Appdome Mobile Defense Platform now protects applications running on mobile-enabled platforms like Apple macOS, Apple visionOS, Meta Quest, HarmonyOS Next, Android Auto, Apple CarPlay, Android TV, Apple TV, and Google Play Games for PC.
December 18th, 2024 — Source
BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356)
BeyondTrust has fixed an unauthenticated command injection vulnerability (CVE-2024-12356) in its Privileged Remote Access (PRA) and Remote Support (RS) products that may allow remote code execution, and is urging organizations with on-premise installations to test the patch and implement it quickly.
December 18th, 2024 — Source
BeyondTrust Patches Critical Vulnerability Discovered During Security Incident Probe
A critical vulnerability in BeyondTrust Privileged Remote Access and Remote Support could lead to arbitrary command execution.
December 18th, 2024 — Source
Bureau Raises $30M to Tackle Deepfakes, Payment Fraud
San Francisco startup scores a Series B round to thwart money mule accounts, deep-fake identities, account takeovers and payment fraud.
December 18th, 2024 — Source
CISA Issues Binding Operational Directive for Improved Cloud Security
CISA’s Binding Operational Directive 25-01 requires federal agencies to align cloud environments with SCuBA secure configuration baselines.
December 18th, 2024 — Source
European companies hit with effective DocuSign-themed phishing emails
A threat actor looking to take over the Microsoft Azure cloud infrastructure of European companies has successfully compromised accounts of multiple victims in different firms, according to Palo Alto Networks’ Unit 42 researchers.
December 18th, 2024 — Source
Exploitation of Recent Critical Apache Struts 2 Flaw Begins
Researchers warn of malicious attacks exploiting a recently patched critical vulnerability in Apache Struts 2 leading to remote code execution (RCE).
December 18th, 2024 — Source
Hacker Leaks Cisco Data
IntelBroker has leaked 2.9 Gb of data stolen recently from a Cisco DevHub instance, but claims it’s only a fraction of the total.
December 18th, 2024 — Source
GitGuardian launches multi-vault integration to combat secrets sprawl
GitGuardian unveiled a comprehensive Non-Human Identity (NHI) security strategy with integrations across major secrets management platforms, addressing the growing challenge of secrets sprawl in enterprise environments.
December 18th, 2024 — Source
Recorded Future Tagged as ‘Undesirable’ in Russia
The Russian government accuses the US threat-intel firm of participating in the collection and analysis of data on the actions of the Russia’s armed forces.
December 18th, 2024 — Source
Regional Care Data Breach Impacts 225,000 People
Healthcare insurance firm Regional Care has disclosed a data breach impacting more than 225,000 individuals.
December 18th, 2024 — Source
Stairwell Core boosts threat intelligence for security teams
Stairwell announces Stairwell Core, which enables organizations to privately collect, store, and continuously reassess executable files so they can confidently determine if malware has affected their systems.
December 18th, 2024 — Source
Internet — Security Issues — December 16th, 2024
2025 cybersecurity forecast: Preparing for the next generation of threats
As we navigate an increasingly digital landscape, the threats posed by cybercriminals are evolving at an alarming pace. The latest predictions highlight a future where AI-driven technologies, particularly deep fakes, will become more sophisticated, making it challenging for individuals and organizations to distinguish between genuine and malicious entities.
December 16th, 2024 — Source
900,000 People Impacted by ConnectOnCall Data Breach
ConnectOnCall has disclosed a data breach impacting the personal information of more than 900,000 individuals.
December 16th, 2024 — Source
Access tokens and service accounts next target for cyberattacks
New research shows 88 percent of security leaders believe machine identities, specifically access tokens and their connected service accounts, are the next big target for attackers.
December 16th, 2024 — Source
Android users targeted by two new spyware threats
Google’s spokesperson reached out with a statement. The company has confirmed “that users are automatically protected from known versions of this spyware by Google Play Protect, which is on by default on Android devices with Google Play Services“.
December 16th, 2024 — Source
Android Zero-Day Exploited in Spyware Campaigns, Amnesty International Points to Cellebrite
Israeli forensics firm Cellebrite has been linked to an Android zero-day used to secretly install spyware on Serbian journalists’ phones.
December 16th, 2024 — Source
Arctic Wolf Buys Cylance for $160M Plus Stock From BlackBerry, Which Bought It for $1.4B
Security operations firm Arctic Wolf has acquired Cylance from BlackBerry for $160 million in cash and 5.5 million common shares.
December 16th, 2024 — Source
AT&T And Verizon Under Fire For Failing To Inform Millions Of Customers About Data Breaches
Hackers finding vulnerabilities in telecommunication companies has become increasingly common, with sensitive information being compromised in many cases. A major breach that has been going on for quite some time is by a Chinese hacking group, Salt Typhoon, entrenched in the U.S. telecommunication system. It is considered one of the most severe breach cases, but despite the gravity of the situation, it is reported that many of the affected companies have failed to inform the consumer of the intrusion. AT&T and Verizon have both been in hot waters recently for being the most intensely impacted companies yet going with a limited approach to customer notifications.
December 16th, 2024 — Source
CISA Urges Enhanced Coordination in Incident Response Plan
Draft National Response Plan Offers Flexible Coordination Strategies Across Sectors
December 16th, 2024 — Source or Source or Source or Source or Source
Citrix Warns of Password Spraying Attacks Targeting NetScaler Appliances
Citrix issues warning on password spraying attacks targeting NetScaler and NetScaler Gateway appliances deployed by organizations worldwide.
December 16th, 2024 — Source
Clop Ransomware Takes Responsibility for Cleo Mass Exploits
File-Transfer Software Being Exploited by One or More Groups; Vendor Pushes Patches
December 16th, 2024 — Source or Source or Source or Source
Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'
Personal and financial data probably stolen
December 16th, 2024 — Source
European Union Sanctions Russian Malicious Cyber Actors
Trading Bloc Includes Doppelganger Actors and GRU Unit 29155 in Sanctions List
December 16th, 2024 — Source or Source or Source or Source or Source
Evasive Node.js loader masquerading as game hack
Malware peddlers are using NodeLoader, a loader written in Node.js, to foil security solutions and deliver infostealers and cryptominers to gamers.
December 16th, 2024 — Source
FBI spots HiatusRAT malware attacks targeting web cameras, DVRs
The FBI warned today that new HiatusRAT malware attacks are now scanning for and infecting vulnerable web cameras and DVRs that are exposed online.
December 16th, 2024 — Source
Hackers seek ransom after getting SSNs, banking info from state gov’t portal
Rhode Island said it's being extorted after hack of Deloitte-run benefits system.
December 16th, 2024 — Source
Israeli spyware maker Paragon bought by US private equity giant
Paragon, an Israeli spyware maker that has largely kept a low profile in recent years, was acquired last week by American private equity giant AE Industrial Partners, according to Israeli news reports.
December 16th, 2024 — Source
Keepit Raises $50 Million for SaaS Data Protection Solution
Denmark-based data protection company Keepit has raised $50 million, which brings the total investment to $90 million.
December 16th, 2024 — Source
Major Auto Parts Firm LKQ Hit by Cyberattack
LKQ, a major provider of auto parts, told the SEC that a recent cyberattack caused disruptions at a Canadian business unit.
December 16th, 2024 — Source
Malicious ads push Lumma infostealer via fake CAPTCHA pages
A large-scale malvertising campaign distributed the Lumma Stealer info-stealing malware through fake CAPTCHA verification pages that prompt users to run PowerShell commands to verify they are not a bot.
December 16th, 2024 — Source
Microsoft confirms critical Windows Defender vulnerability. What you need to do right now.
Not much, it turns out.
December 16th, 2024 — Source
MUT-1244 targeting security researchers, red teamers, and threat actors
A threat actor tracked as MUT-1244 by DataDog researchers has been targeting academics, pentesters, red teamers, security researchers, as well as other threat actors, in order to steal AWS access keys, WordPress account credentials and other sensitive data.
December 16th, 2024 — Source
Rhode Island confirms data breach after Brain Cipher ransomware attack
Rhode Island is warning that its RIBridges system, managed by Deloitte, suffered a data breach exposing residents' personal information after the Brain Cipher ransomware gang hacked its systems.
December 16th, 2024 — Source
Risk Aperture AI360 manages AI-specific vulnerabilities and threats
Risk Aperture launched AI360, a solution designed to address the growing cybersecurity risks posed by artificial intelligence (AI).
December 16th, 2024 — Source
Securing APIs in Modern Web Applications
Learn about key practices for securing APIs in modern web apps, including authentication, encryption, and monitoring, to guard against vulnerabilities.
December 16th, 2024 — Source
Securing Cloud-Native Systems: A Vendor-Neutral Approach
Nick Reva of Snap on Overcoming Cloud Misconfigurations With Scalable Security
December 16th, 2024 — Source or Source or Source
Serbian authorities are reportedly hacking and installing spyware on activists’ phones
Amnesty International says that Serbian police detained activists and journalists on false premises in order to hack their devices with Cellebrite tools and install Android spyware.
December 16th, 2024 — Source
Serbian government used Cellebrite to unlock phones, install spyware
Serbian police and intelligence officers used Cellebrite forensic extraction software to unlock journalists’ and activists’ phones and install previously unknown Android spyware called NoviSpy, a new Amnesty International report claims.
December 16th, 2024 — Source
SRP Federal Credit Union Ransomware Attack Impacts 240,000
SRP Federal Credit Union says the personal information of 240,000 was stolen in a recent cyberattack claimed by a ransomware gang.
December 16th, 2024 — Source
Strengthening IAM Security for Cloud IaaS Accounts
This guide will help you implement IAM-specific configurations in your OCI tenancy account to enhance security and protect your cloud infrastructure.
December 16th, 2024 — Source
Texas Tech University System data breach impacts 1.4 million patients
The Texas Tech University Health Sciences Center and its El Paso counterpart suffered a cyberattack that disrupted computer systems and applications, potentially exposing the data of 1.4 million patients.
December 16th, 2024 — Source
Thousands Affected by Data Theft Hack of Smallest US State
Brain Cipher Gang Claims Credit for Hit on State of Rhode Island's Vendor Deloitte
December 16th, 2024 — Source or Source or Source or Source
Trump adviser wants to make cyberattackers pay
In a recent interview with CBS’ “Face the Nation”, Trump adviser US Rep Mike Waltz suggested that the government needs to take a tougher stance on cyberattackers. Instead of playing defense, Waltz said that it might be time to go on the offense.
December 16th, 2024 — Source
UK internet watchdog gives social media companies three months to improve safety or face huge fines
Ofcom can issue fines up to $23 million, or 10 percent of a company's global revenue.
December 16th, 2024 — Source
Undocumented DrayTek Vulnerabilities Exploited to Hack Hundreds of Orgs
Undocumented vulnerabilities in DrayTek devices were exploited in ransomware campaigns that compromised over 300 organizations.
December 16th, 2024 — Source
US telecoms haven't notified victims of Chinese data breaches
A new report claims that neither AT&T nor Verizon have notified the majority of people impacted by the latest data breaches from China. These two telecom service providers seem to have suffered the most severe impact.
December 16th, 2024 — Source
Watch Now: Navigating Your OT Cybersecurity Journey: From Assessment to Implementation
Learn how to develop a holistic solution that provides you and your team the power to mitigate cyber threats effectively within your OT environment.
December 16th, 2024 — Source
What's behind the surge in mysterious drone sightings over New Jersey, Massachusetts and other states?
A month after mysterious drones were first reported over New Jersey, authorities are still trying to determine where they are coming from as sightings increase in frequency and spread into neighboring states.
December 16th, 2024 — Source
Why AI Adoption Stalls: Data, Talent and Strategy Gaps
Brett Barton of Unisys on Bridging the AI Readiness Gap for Competitive Advantage
December 16th, 2024 — Source or Source or Source or Source
Winnti-Like 'Glutton' Backdoor Targets Cybercriminals
Malware Exploits Cybercrime Ecosystem for Profit
December 16th, 2024 — Source or Source or Source or Source or Source
Internet — Security Issues — December 13th, 2024
CISA confirms critical Cleo bug exploitation in ransomware attacks
CISA confirmed today that a critical security vulnerability in Cleo Harmony, VLTrader, and LexiCom file transfer software is being exploited in ransomware attacks.
December 13th, 2024 — Source
CISA warns water facilities to secure HMI systems exposed online
CISA and the Environmental Protection Agency (EPA) warned water facilities today to secure Internet-exposed Human Machine Interfaces (HMIs) from cyberattacks.
December 13th, 2024 — Source
Celigo Private Cloud enhances security and connectivity
Celigo introduced Celigo Private Cloud, a transformative solution offering enterprises fully private automation instances. Designed for businesses that prioritize enhanced security, control, and compliance, Celigo Private Cloud empowers organizations to scale their automation strategies with confidence.
December 13th, 2024 — Source
Clinicians' phones a cybersecurity risk, says study
A new study led by Dr. Tafheem Wani, a La Trobe lecturer in Digital Health Information Management, showed that clinicians' phones (and other digital devices) contained sensitive patient information, which was not often protected by antivirus software and passcodes.
December 13th, 2024 — Source
Critical Vulnerabilities Found in Ruijie Reyee Cloud Management Platform
Researchers warn about critical vulnerabilities in Ruijie Networks’ Reyee cloud management platform and Reyee OS network devices.
December 13th, 2024 — Source
Crypto Roundup: Crypto Pros Targeted With Fake Meeting Apps
Also: Australia Fines Kraken AU$8 Million Over Breaches
December 13th, 2024 — Source or Source or Source or Source or Source
Game-like ‘task scams’ stole more than $220 million in six months
The FTC says these fake online jobs have accounted for over 40 percent of all scam reports this year.
December 13th, 2024 — Source
Germany blocks BadBox malware loaded on 30,000 Android devices
Germany's Federal Office for Information Security (BSI) has disrupted the BadBox malware operation pre-loaded in over 30,000 Android IoT devices sold in the country.
December 13th, 2024 — Source
German BSI Disrupts Android Malware Infecting IoT Devices
Around 30,000 German IoT Devices Infected From Backdoored Android Applications
December 13th, 2024 — Source or Source or Source or Source or Source
Germany Sinkholes Botnet of 30,000 BadBox-Infected Devices
Germany’s cybersecurity agency BSI has sinkholed a botnet of 30,000 devices shipped with BadBox malware pre-installed.
December 13th, 2024 — Source
Hackers Possibly Stole Personal Data From Bitcoin ATM Operator Byte Federal
Byte Federal says the personal information of 58,000 was compromised after a GitLab flaw allowed attackers to access a server.
December 13th, 2024 — Source
Hackers Steal 17M Patient Records in Attack on 3 Hospitals
IT Outage, Downtime Procedures Affecting Services at California Healthcare Provider
December 13th, 2024 — Source or Source or Source or Source or Source
In Other News: Gen Digital Makes $1B Buy, Recall Captures Sensitive Data, MITRE ATT&CK Evaluations
Noteworthy stories that might have slipped under the radar: AV brand owner Gen Digital makes a $1 billion acquisition, Microsoft Recall captures sensitive data, MITRE releases ATT&CK evaluations.
December 13th, 2024 — Source
Iranian Hackers Use IOCONTROL Malware to Target OT, IoT Devices in US, Israel
The Iranian threat group CyberAv3ngers has used custom-built malware named IOCONTROL to target IoT and OT devices in the US and Israel.
December 13th, 2024 — Source
ISMG Editors: CEO Shooting Sparks AI Accountability Debate
Also: How Leading Cybersecurity Firms Are Gearing Up for 2025
December 13th, 2024 — Source or Source or Source or Source or Source
Major Microsoft Multifactor Authentication Vulnerability Revealed
A vulnerability in Microsoft’s multifactor authentication (MFA) system has been uncovered by cybersecurity firm Oasis Security, allowing attackers to bypass security measures and access sensitive data across services including Outlook, OneDrive, Teams and Azure.
December 13th, 2024 — Source
Microsoft Patches Vulnerabilities in Windows Defender, Update Catalog
Microsoft has patched potentially critical vulnerabilities in Update Catalog and Windows Defender on the server side.
December 13th, 2024 — Source
Researchers: Iranian Custom Malware Targets Fuel Systems
An Iranian state hacking group is using custom malware that researchers liken to a "cyber weapon" to compromise IoT and OT infrastructure in Israel and the United States.
December 13th, 2024 — Source or Source or Source or Source or Source
Rubrik Turbo Threat Hunting accelerates cyber recovery
As organizations around the world struggle with extended downtime and revenue loss due to widespread cyberattacks, Rubrik announces Rubrik Turbo Threat Hunting.
December 13th, 2024 — Source
Russian cyberspies target Android users with new spyware
Russian cyberspies Gamaredon has been discovered using two Android spyware families named 'BoneSpy' and 'PlainGnome' to spy on and steal data from mobile devices.
December 13th, 2024 — Source
Rydox Cybercrime Marketplace Disrupted, Administrators Arrested
The US announced the takedown of Rydox, a marketplace for stolen personal information, and the arrest of three administrators.
December 13th, 2024 — Source
Study reveals vulnerability of metaverse platforms to cyber attacks
Having access to virtual worlds from your home computer via your web browser and being able to interact with others in a secure and private manner: that is the promise of metaverse platforms.
December 13th, 2024 — Source
The future of VPNs: Decentralized and post-quantum security
These are the most exciting advancements coming to VPNs in the next few years.
December 13th, 2024 — Source
Threats to encryption, security fears and a race to gain a competitive edge -- quantum predictions for 2025
As we approach the end of the year it's time to start wondering what the next one will have in store. As always we'll be running a series of pieces looking at what industry experts think will be key tech industry trends for 2025.
December 13th, 2024 — Source
US Updates a Science and Technology Pact With China to Reflect Growing Rivalry and Security Threats
The new agreement has a narrower scope and additional safeguards to minimize the risk to national security.
December 13th, 2024 — Source
Watch out! Your latest data breach notification might not be real
As always, scammers try to capitalize on any and all opportunities.
December 13th, 2024 — Source
Internet — Security Issues — December 10th, 2024
21 years since its inception, GNU Shepherd 1.0.0 is released
GNU Shepherd is a service manager designed to oversee the system’s daemons. It functions both as an “init” system (PID 1) and as a tool for unprivileged users to manage per-user daemons.
December 10th, 2024 — Source
$50 Million Radiant Capital Heist Blamed on North Korean Hackers
Radiant Capital says a North Korean threat actor stole $50 million in assets in a sophisticated October attack.
December 10th, 2024 — Source
Astrix Security Banks $45M Series B to Secure Non-Human Identities
Tel Aviv company building software to secure non-human identities banks a $45 million funding round led by Menlo Ventures.
December 10th, 2024 — Source
Astrix's $45M Series B Targets Non-Human Identity Security
Startup Aims to Secure AI Agents, Expand Global Reach, Do User Access Management
December 10th, 2024 — Source or Source or Source or Source
Attackers actively exploiting flaw(s) in Cleo file transfer software (CVE-2024-50623)
Attackers are exploiting a vulnerability (CVE-2024-50623) in file transfer software by Cleo – LexiCo, VLTransfer, and Harmony – to gain access to organizations’ systems, Huntress researchers warned on Monday.
December 10th, 2024 — Source
Cisco Says Flaws in Industrial Routers, BGP Tool Remain Unpatched 8 Months After Disclosure
Cisco Talos has disclosed the details of apparently unpatched vulnerabilities in MC Technologies industrial routers and the GoCast BGP tool.
December 10th, 2024 — Source
Citrix Acquisitions Boost Zero Trust Defense for Hybrid Work
deviceTRUST, Strong Network Acquisitions Improve Zero Trust, Developer Protections
December 10th, 2024 — Source or Source or Source or Source or Source
Cleo File Transfer Tool Vulnerability Exploited in Wild Against Enterprises
CVE-2024-50623, an improperly patched vulnerability affecting Cleo file transfer tools, has been exploited in the wild.
December 10th, 2024 — Source
Containers are a weak link in supply chain security
The use of container images is growing fast thanks to their flexibility and convenience, but they can also represent a weak cybersecurity link in software supply chains.
December 10th, 2024 — Source
Best Free Antivirus Software for 2024
Keep your computer safe with these tried-and-tested free antivirus tools.
December 10th, 2024 — Source
Financial Sector Turning to Multi-Cloud Strategies
Report: Financial Orgs Shift to Multi-Cloud to Address Cyberthreats and Regulation
December 10th, 2024 — Source or Source or Source or Source
Heart surgery device maker's security bypassed, data encrypted and stolen
Sounds like th-aorta get this sorted quickly
December 10th, 2024 — Source
Horizon3.ai NodeZero Insights enables executives to visualize changes in their security posture
Horizon3.ai launched NodeZero Insights, a platform designed for security leaders, CIOs, CISOs and practitioners. This new solution delivers real-time dashboards to measure, track and strengthen an organization’s security posture over time.
December 10th, 2024 — Source
Hospital Notifies 316,000 of Breach in Christmas 2023 Hack
Cybercriminal Gang 'Money Message' Claims Credit, Publishes Stolen Records
December 10th, 2024 — Source or Source or Source or Source or Source
Ivanti warns of maximum severity CSA auth bypass vulnerability
Today, Ivanti warned customers about a new maximum-severity authentication bypass vulnerability in its Cloud Services Appliance (CSA) solution.
December 10th, 2024 — Source
Microsoft Bets $10,000 on Prompt Injection Protections of LLM Email Client
Microsoft offers $10,000 in rewards to researchers who can manipulate a realistic simulated LLM-integrated email client.
December 10th, 2024 — Source
Microsoft Rolls Out Default NTLM Relay Attack Mitigations
Microsoft has rolled out new default security protections that mitigate NTLM relaying attacks across on-premises Exchange, AD CS, and LDAP services.
December 10th, 2024 — Source
Microsoft Ships Urgent Patch for Exploited Windows CLFS Zero-Day
Patch Tuesday: Redmond patches 71 security flaws and calls immediate attention to an exploited Windows zero-day reported by CrowdStrike.
December 10th, 2024 — Source
Moody's: Hackers Aim for Big Payouts, Supply Chain Attacks
Big Game Hunting Will Intensify in 2025, Says Credit Rating Agency
December 10th, 2024 — Source or Source
New Cleo zero-day RCE flaw exploited in data theft attacks
Hackers are actively exploiting a zero-day vulnerability in Cleo managed file transfer software to breach corporate networks and conduct data theft attacks.
December 10th, 2024 — Source
OpenWrt Update Flaw Exposed Devices to Malicious Firmware
Flaw in Embedded Device Operating System Allowed Hackers to Bypass Integrity Check
December 10th, 2024 — Source or Source or Source
Police 'need to play a larger role' in recovering cybercrime money
The study also recommends that, as a priority, Police Scotland should make clear to communities that it can be relied upon in cases of economic cybercrime.
December 10th, 2024 — Source
SAP Patches Critical Vulnerability in NetWeaver
SAP has released patches for 16 vulnerabilities, including a critical-severity SSRF bug in NetWeaver (Adobe Document Services).
December 10th, 2024 — Source
Satya Nadella's Vision for Microsoft: AI, AI and AI
Copilot Enhancements and Other Key Announcements From Microsoft Ignite 2024
December 10th, 2024 — Source or Source or Source or Source
SecureAuth protects sensitive information with biometric continuous identity assurance
SecureAuth is releasing biometric continuous identity assurance (BCIA). This ability is designed to safeguard a company’s sensitive information for the duration of a user’s session — providing additional protection from emerging threats in today’s hybrid and remote work environments.
December 10th, 2024 — Source
Stamus Networks Clear NDR uncovers unauthorized activity
Stamus Networks announced Clear NDR, an open and transparent NDR system that empowers cyber defenders to uncover and stop serious threats and unauthorized activity before they cause harm to the organization.
December 10th, 2024 — Source
US Indicts, Sanctions Alleged Chinese Sophos Firewall Hacker
Tianfeng Guan Allegedly Developed Zero-Day Exploit of Sophos XG Firewall
December 10th, 2024 — Source or Source or Source or Source or Source
US offers $10 mn reward for wanted Chinese hacker
The United States offered a $10 million reward on Tuesday for information leading to the arrest of a Chinese man and co-conspirators wanted for hacking computer firewalls.
December 10th, 2024 — Source
US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks
The Department of the Treasury is sanctioning Chinese cybersecurity company Sichuan Silence, and one of its employees, Guan Tianfeng, for their roles in the April 2020 compromise of tens of thousands of firewalls worldwide. Many of the victims were U.S. critical infrastructure companies.
December 10th, 2024 — Source
US sanctions Chinese firm for hacking firewalls in ransomware attacks
The U.S. Treasury Department has sanctioned Chinese cybersecurity company Sichuan Silence and one of its employees for their involvement in a series of Ragnarok ransomware attacks targeting U.S. critical infrastructure companies and many other victims worldwide in April 2020.
December 10th, 2024 — Source
Versa Endpoint DLP prevents data exfiltration
Versa announced Versa Endpoint DLP, an integrated endpoint data loss prevention (DLP) capability delivered by the Versa SASE Client as part of the VersaONE Universal SASE Platform.
December 10th, 2024 — Source
Wald.ai Raises $4M in Seed Funding to Protect Data in Conversations With AI Assistants
Wald.ai has raised $4 million in seed funding for a solution designed to ensure data protection when organizations use AI assistants.
December 10th, 2024 — Source
Wipe Your Home Address Permanently Off the Internet With These Tips
Hide your home address from the Web and keep it away from easy Googling with these effective steps.
December 10th, 2024 — Source
Wyden proposes bill to secure US telecoms after Salt Typhoon hacks
U.S. Senator Ron Wyden of Oregon announced a new bill to secure the networks of American telecommunications companies breached by Salt Typhoon Chinese state hackers earlier this year.
December 10th, 2024 — Source
You can boost your cybersecurity skills for free with this new initiative
Need to improve your cybersecurity skills but don't know where to start (or have much budget)? This network connects public-interest community organizations with a volunteer professional - entirely free.
December 10th, 2024 — Source
Internet — Security Issues — December 6th, 2024
5 Reasons to Use a Stateless Firewall (+3 Key Downsides)
A stateless firewall is an efficient, low-maintenance way to screen lots of network traffic quickly — but there are a few important drawbacks.
December 6th, 2024 — Source
a16z-backed Toka wants to help US agencies hack into security cameras and other IoT devices
U.S. government agencies legally hack into cell phones or emails all the time: think of the FBI wiretapping a suspected drug lord or the NSA monitoring emails for terrorism plots.
December 6th, 2024 — Source
Atrium Health Data Breach Impacts 585,000 People
Atrium Health has notified the HHS of a data breach impacting 585,000 individuals, and the incident may be related to online tracking.
December 6th, 2024 — Source
Badass Russian techie outsmarts FSB, flees Putinland all while being tracked with spyware
Threatened with life in prison, Kyiv charity worker gives middle finger to state spies
December 6th, 2024 — Source
Blue Yonder SaaS giant breached by Termite ransomware gang
The Termite ransomware gang has officially claimed responsibility for the November breach of software as a service (SaaS) provider Blue Yonder.
December 6th, 2024 — Source
Cryptohack Roundup: Solana npm Package Attack's Wallet Risks
Also, Man Who Stole $3.5M of Cloud Computing to Mine $1M in Crypto Pleads Guilty
December 6th, 2024 — Source or Source or Source or Source or Source
Cyber defense vs. cyber resilience: why it's time to prioritize recovery
In an era when successful hacks are now an inevitability, too many organizations have a false sense of security when it comes to their data. Unfortunately, cyber criminals are ready and willing to take advantage of this complacency.
December 6th, 2024 — Source
Dutch Counter-Ransomware Initiative Led to Global Takedowns
Project Mellissa Contributed Toward Disruptive Actions
December 6th, 2024 — Source or Source or Source or Source or Source
Echoworx enhances secure access to encrypted messages
Echoworx announced the addition of 2-Step Verification (2SV) when using OAuth and Passkeys for authentication for encrypted messages.
December 6th, 2024 — Source
Employee Data Access Behaviors Putting Australian Employers At Risk
New CyberArk research finds Australian employees choosing convenience over cyber security policies.
December 6th, 2024 — Source
Ethyca Raises $10 Million for Data Privacy Platform
Data privacy solutions provider Ethyca has raised $10 million in a funding round led by Aspenwood Ventures and AVP.
December 6th, 2024 — Source
Following Salt Typhoon, FCC targets US telecom security gaps with new regulatory proposal
The Federal Communications Commission (FCC) is introducing a new rule that could force telecom carriers to improve their cybersecurity practices. This move comes after a series of cyberattacks, including one attributed to the Chinese hacking group Salt Typhoon, raised serious concerns about the vulnerability of America's communication infrastructure.
December 6th, 2024 — Source or Source
Google Open Sources Security Patch Validation Tool for Android
Google has announced the open source availability of Vanir, a patch validation tool for Android platform developers.
December 6th, 2024 — Source
Here's Where Top Cybersecurity Vendors Stand as 2025 Nears
Palo Alto, CrowdStrike, Zscaler Eye Firewall, SIEM Replacement, Incident Recovery
December 6th, 2024 — Source or Source or Source or Source or Source
How to choose secure, verifiable technologies?
The Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring software (proprietary or open source), hardware (e.g., IoT devices), and cloud services (SaaS, MSP services).
December 6th, 2024 — Source
In Other News: Cloudflare Abuse, UK and EU Cybersecurity Reports, FBI Gen-AI Alert
Noteworthy stories that might have slipped under the radar: ENISA and NCSC release cybersecurity reports, abuse of Cloudflare services, FBI warns of gen-AI enabling fraud.
December 6th, 2024 — Source
Insider Breach, Email Attacks Net $1.7M in HIPAA Fines
Incidents at Pain Management Firm, Pediatric Hospital Affect 50,000 People
December 6th, 2024 — Source or Source or Source or Source or Source
PoC Exploit Published for Unpatched Mitel MiCollab Vulnerability
WatchTowr has published proof-of-concept (PoC) code for an unpatched vulnerability in the Mitel MiCollab enterprise collaboration platform.
December 6th, 2024 — Source
Pro-Russian hacktivists target Europe
A new report shows that 96 percent of attacks conducted by a leading pro-Russian hacktivist group targeted Europe this year, with attackers focusing on influencing public perception and trust over direct technical disruptions.
December 6th, 2024 — Source
Protecting the C-Suite in the Wake of UHC CEO's Murder
Chris Pierson, CEO of BlackCloak, on Rising Digital, Physical Threats
December 6th, 2024 — Source or Source or Source or Source or Source
Recently Charged Scattered Spider Suspect Did Poor Job at Covering Tracks
A California teen suspected of being a Scattered Spider member left a long trail of evidence and even used an FBI service to launder money.
December 6th, 2024 — Source
Resecurity introduces AI-powered GSOC at NATO Edge 2024
Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center (GSOC) during NATO Edge 2024, the NATO Communications and Information Agency's flagship conference.
December 6th, 2024 — Source
SonicWall Patches 6 Vulnerabilities in Secure Access Gateway
SonicWall has released patches for multiple high-severity flaws in the SMA100 SSL-VPN secure access gateway.
December 6th, 2024 — Source
Spyware Campaign Targets Sino Minority Groups Via WeChat
Possible Chinese State-Sponsored Exploit Kit Using Browser Flaws to Deploy Spyware
December 6th, 2024 — Source or Source or Source or Source or Source
The 6 Tradeoffs Between a Stateful vs. Stateless Firewall
Understanding the stateful firewall vs. stateless firewall distinction will help you decide on the best strategy for protecting your network.
December 6th, 2024 — Source
The best antivirus software and apps you can buy
Protect yourself this holiday season with the best antivirus software of 2024, tested and recommended by our experts.
December 6th, 2024 — Source
Trump's AI, Crypto Czar David Sacks Faces Conflict Scrutiny
David Sacks Appointed as Trump's AI and Crypto Czar Amid Growing Industry Concerns
December 6th, 2024 — Source or Source or Source or Source or Source
Weaponized AI: Hot for Fraud, Not for Election Interference
FBI Sees Rising AI-Enabled Fraud; Meta Reports Scant Election Interference Use
December 6th, 2024 — Source or Source or Source or Source or Source
Why it's time for a reset of security metrics [Q&A]
Historically, security metrics have focused on measuring how many attacks are successful and how long it takes for a successful attack to be detected. This is perhaps unsurprising since the bulk of the industry has focused on building tools to detect adversaries./span>
December 6th, 2024 — Source
Windows, macOS users targeted with crypto-and-info-stealing malware
Downloading anything from the internet is a gamble these days: you might think that you are downloading an innocuous app from a legitimate firm but thanks to clever misuse of AI and some social engineering, you can end up with information and cryptocurrency-stealing malware.
December 6th, 2024 — Source
Internet — Security Issues — December 2nd, 2024
Avira Prime review: Comprehensive, user-friendly antivirus
Dig into this dead-simple antivirus suite and you'll find a sophisticated set of PC utilities.
December 2nd, 2024 — Source
Bitwarden Review (2024): Is It a Secure Password Manager?
Bitwarden’s excellent free version makes it one of the best free password managers available. To learn more, read our full Bitwarden review.
December 2nd, 2024 — Source
Cloud security specialist Upwind confirms it raised $100M at a $900M valuation
In November, TechCrunch broke the news that cybersecurity startup SourceUpwind was getting a lot of inbound interest to raise money on a big valuation. Now, we can confirm that the deal is done: Upwind has closed a Series A round of $100 million. The round values it at $900 million post-money.
December 2nd, 2024 — Source
Critical Vulnerability Found in Zabbix Network Monitoring Tool
A critical-severity vulnerability in open source enterprise network monitoring tool Zabbix could lead to full system compromise.
December 2nd, 2024 — Source
Ex-Google CEO Eric Schmidt Warns About AI Risks and Global Security Threats
Eric Schmidt, the former CEO of Google, has issued a stark warning about the accelerating advancements in artificial intelligence (AI). His concerns focus on the global implications of these developments, particularly as nations like China make significant strides in AI innovation. From the risks of open-source AI to the weaponization of autonomous systems, Schmidt emphasizes the urgent need for international cooperation and regulation to address the ethical and security challenges posed by these rapidly evolving technologies.
December 2nd, 2024 — Source
Ex-NBA athlete Omri Casspi launches $60M fund targeting cybersecurity, cloud infra and AI
Former NBA athlete Omri Casspi has raised $60 million for his latest venture fund, Swish Ventures, which will invest in early-stage cybersecurity, cloud infrastructure, and AI startups. The fund plans to back 10 companies, and will invest $5 million to $7 million per deal.
December 2nd, 2024 — Source
Feds Propose AI 'Guardrails' for Medicare Advantage Plans
Provision Emphasizes Existing Medicare Regs for Equitable Access to Health Services
December 2nd, 2024 — Source or Source or Source or Source or Source
Hacking group claims to have cracked Microsoft's software licensing security on a massive scale
Is Microsoft's entire licensing business in trouble?
December 2nd, 2024 — Source
Interim dollar gains, cybersecurity pains: Expert explains how financial loss from data breaches can be mitigated
Between 2005 and 2018, incidents of data breach in the United States rose by nearly eight times, according to the Identity Theft Resource Center.
December 2nd, 2024 — Source
Open source supply chain faces security issues
The open source software supply chain shows signs of 'AppSec exhaustion,' with organizations showing diminished engagement in security practices and struggling to meet vulnerability management goals, according to a new report.
December 2nd, 2024 — Source
Prototype UEFI Bootkit is South Korean University Project; LogoFAIL Exploit Discovered
The ‘Bootkitty’ prototype UEFI bootkit contains an exploit for LogoFAIL and was created in a South Korea university program.
December 2nd, 2024 — Source
Russia arrests one of its own – a cybercrime suspect on FBI's most wanted list
The latest in an unusual change of fortune for group once protected by the Kremlin
December 2nd, 2024 — Source
Russia Indicts Alleged Ransomware Hacker Wanted by the FBI
Suspected LockBit, Babuk Operator Mikhail Matveev Arrested in Russia
December 2nd, 2024 — Source or Source or Source or Source or Source
Russian Hacker With $10 Million Bounty on His Head Reportedly Arrested
Russian authorities have reportedly arrested Mikhail Matveev, who is wanted by the US for ransomware attacks against critical infrastructure.
December 2nd, 2024 — Source
SmokeLoader Campaign Targets Taiwanese Companies
Threat Actor Uses the Trojan as an Infostealer
December 2nd, 2024 — Source or Source or Source or Source or Source
Special abilities of users should be employed in a targeted way in order to increase cyber security, says expert
When it comes to cyber security, many people initially think of sophisticated technologies, such as encryption programs, email filters or anti-virus software. However, even the best encryption program is of little benefit if it is not used. Weak passwords are definitely a risk factor.
December 2nd, 2024 — Source
Telco security is a dumpster fire and everyone's getting burned
The politics of cybersecurity are too important to be left to the politicians
December 2nd, 2024 — Source
The shocking speed of AWS key exploitation
It’s no secret that developers often inadvertently expose AWS access keys online and we know that these keys are being scraped and misused by attackers before organizations get a chance to revoke them.
December 2nd, 2024 — Source
Top 5 Cyber Security Trends for 2025
The cyber landscape is more turbulent than ever. Microsoft recently reported a 2.75-fold increase in ransomware attempts this year, while research predicts that global cyber attacks in 2024 will surge 105% compared to 2020.
December 2nd, 2024 — Source
Two UK Hospitals Hit by Cyberattacks, One Postponed Procedures
Alder Hey Children’s Hospital and Wirral University Teaching Hospital have fallen victim to cyberattacks, including one involving ransomware.
December 2nd, 2024 — Source
Upwind Raises $100M to Thwart Cloud Security Vulnerabilities
Firm Focuses on Runtime Context, AI Enhancements to Counter Evolving Cloud Threats
December 2nd, 2024 — Source or Source or Source or Source or Source
Internet — Security Issues — December 1st, 2024
How a Hacker Outsmarted AI to Win $50,000 in Cryptocurrency
In a high-stakes AI-driven competition, a participant exploited vulnerabilities in an AI agent named "Freysa AI" to extract $50,000 worth of cryptocurrency. This event, designed to test the resilience of AI systems, highlighted critical weaknesses in areas such as prompt engineering and logic safeguards. The AI hacker cryptocurrency outcome exposed not only the fragility of AI in adversarial scenarios but also provided valuable insights into securing AI systems in sensitive environments.
December 1st, 2024 — Source
Week in review: Exploitable flaws in corporate VPN clients, malware loader created with gaming engine
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
December 1st, 2024 — Source
Internet — Secuirty Issues — Miscellaneous
Adaptive Research & Design Co.
data recovery from crashes, viruses, electrical surges, and sabotage, on hard and floppy drives under any operating system.
Provides a Service — Source
Anti-Phishing Working Group
Committed to wiping out Internet scams and fruad.
An Article — Source
Catapult Integrated Systems
is a premier systems integrator and commercial managed Internet services provider serving northern California since 1992.
Provides a Service — Source
Data Security
Seclore is an information rights management company which helps to protect documents and information by preserving enterprise rights management.
Provides a Service — Source
European Institute for Computer Anti-Virus Research (EICAR)
leads task forces, organizes conferences, and publishes documents.
Provides Information — Source
Leprechaun Software
develops VirusBUSTER, an anti-virus software that protects PCs from boot, program, macro, and email based viruses.
Provides Information — Source
Packet Analytics
Net/FSE, Packet Analytics' network data search engine, puts the power of real time searches over terabytes of NetFlow data in the hands of security analysts. Employing sophisticated algorithms, Net/FSE reduces exposure to significant business risk by enabling security specialists to quickly and determine the extent of a network alert.
Provides a Service — Source
PhishTank
Out of the Net, into the Tank.
Provides a Service — Source
Remove Windows Script Hosting
completely from your system.
Provides Information — Source
SecureList
Kaspersky Lab presents Lab Matters, a series of webcasts that get right to the heart of some of the IT security industry's hottest topics. in the first program, two of the company's leading antimalware experts, Costin Raiu and Magnus Kalkuhl, will be giving viewers the complete lowdown on targeted attacks and discussing a host of other fascinating topics.
Provides Information — Source
Stiller Research
We provide current anti-virus news, a list of myths regarding viruses, a virus information list and a list of in-the-wild viruses.
Provides Information — Source
Symantec Security Updates
library of documents on computer viruses including the top ten list of most common viruses and new viruses to be on the alert for, as well as general virus Q&Amp;A.
Provides Information — Source
Virus Alert
for GOOD TIMES, read about these fake viruses.
Provides Information — Source
VirusTotal
VirusTotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.
Provides a Service — Source