The MerchantStore
DirectoryAbout UsLink to Us

3,437 Internet — Security Issues Entries

Internet — Security Issues — February 6th, 2026

5 Bills to Boost Energy Sector Cyber Defenses Clear House Panel
The news comes after the Department of Energy conducted its annual Liberty Eclipse cybersecurity exercise.
February 6, 2026Source

65 percent of businesses upgrade security to meet AI threats
A new survey of 300 senior security professionals highlights that businesses are struggling to adapt and scale their security operations in the face of talent shortages and new threats from AI, with 65 percent saying they need to rapidly upgrade security monitoring and threat detection due to AI concerns.
February 6, 2026Source

Airrived Emerges From Stealth With $6.1 Million in Funding
The startup aims to unify SOC, GRC, IAM, vulnerability management, IT, and business operations through its Agentic OS platform.
February 6, 2026Source

Best Free VPN for 2026: Privacy Without Paying
While free VPNs can pose risks, using one of the best options can protect your privacy without costing anything.
February 6, 2026Source

Best Mobile VPN of 2026: Enjoy Privacy Protection on the Go
Boost your privacy with the best mobile VPNs for Androids and iPhones so you can stream foreign Netflix libraries, bypass mobile traffic-shaping or stay private on public Wi-Fi.
February 6, 2026Source

Best VPN for Android for 2026: Protect Your Privacy on the Go
Using a VPN on your Android device can help you keep your online activity private, stream geo-restricted content and bypass throttling from anywhere.
February 6, 2026Source

Best VPN for Mac 2026: Trustworthy Mac VPNs tested by experts
We tested the best VPNs for Mac to find the fastest, safest, and easiest options -- including the best free VPNs and top picks for privacy.
February 6, 2026Source

Bug Hunting With LLMs: Expert Tool Seeks More 'True' Flaws
Open Source 'Vulnhalla' Promises 'Up to 96% Reduction in False Positives'
February 6, 2026Source or Source or Source or Source

Can a Cardiac Pacemaker Help Find a Missing Person?
It's been widely reported that the last time kidnap victim Nancy Guthrie's implanted cardiac pacemaker synched up with her smartphone was around 2 a.m. on Feb. 1, the morning she - the mother of NBC Today show co-host Savannah Guthrie - was abducted from her Tucson, Arizona, home.
February 6, 2026Source or Source or Source or Source or Source

CISA orders federal agencies to replace end-of-life edge devices
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new binding operational directive requiring federal agencies to identify and remove network edge devices that no longer receive security updates from manufacturers.
February 6, 2026Source

CISA orders federal agencies to rip out EOL edge kit before cybercrooks move in
A year to replace end-of-support firewalls, routers, and VPN gateways
February 6, 2026Source

CISA orders US federal agencies to replace unsupported edge devices
The US Cybersecurity and Infrastructure Security Agency (CISA) issued a new binding operational directive aimed at reducing a long-standing cyber risk across federal networks: outdated "edge devices" that are not longer supported by vendors and aren't receiving timely security updates.
February 6, 2026Source

CISA warns of SmarterMail RCE flaw used in ransomware attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning that ransomware actors are exploiting CVE-2026-24423, a critical vulnerability in SmarterMail that allows remote code execution without authentication.
February 6, 2026Source

Claude Opus 4.6 improves agentic performance and model safety
According to Anthropic, the model applies more deliberate planning during task execution, sustains agent-driven workflows over longer periods, and operates with greater consistency across large codebases. It improves code review and debugging by identifying errors in its own output and correcting them during execution.
February 6, 2026Source

'DKnife' Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks
'DKnife' Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks
February 6, 2026Source

DKnife Linux toolkit hijacks router traffic to spy, deliver malware
A newly discovered toolkit called DKnife has been used since 2019 to hijack traffic at the edge-device level and deliver malware in espionage campaigns.
February 6, 2026Source

Docker AI Bug Lets Image Metadata Trigger Attacks
A critical vulnerability in Docker's Ask Gordon artificial intelligence assistant allows attackers to execute malicious commands by hiding them in the container application development platform's image metadata, security researchers said.
February 6, 2026Source or Source or Source or Source

EDR, Email, and SASE Miss This Entire Class of Browser Attacks
Most enterprise work now happens in the browser. SaaS applications, identity providers, admin consoles, and AI tools have made it the primary interface for accessing data and getting work done.
February 6, 2026Source

EU Envisions Military Data Sharing Sans US Tech
'Kill Switch' Fears Drive EU Tech Sovereignty Push
February 6, 2026Source or Source or Source or Source or Source

EU says TikTok faces large fine over "addictive design"
The European Commission said today that TikTok is facing a fine because its addictive features, including infinite scroll, autoplay, push notifications, and personalized recommendation systems, are breaching the EU's Digital Services Act (DSA).
February 6, 2026Source

Ex-Nuance IT Worker Faces More Charges in Geisinger Breach
Terminated Employee Accused of Stealing 1 Million Patient Records
February 6, 2026Source or Source or Source or Source or Source

Flickr Security Incident Tied to Third-Party Email System
Potential breach at Flickr exposes usernames, email addresses, IP addresses, and activity data.
February 6, 2026Source or Source

From Svedka to Anthropic, brands make bold plays with AI in Super Bowl ads
Following last year’s trend of showcasing AI in multimillion-dollar ad spots, the 2026 Super Bowl advertisements took it a step further by leveraging AI both to create the commercials and to promote the latest AI products. Love it or hate it, the technology has become a star in its own right, alongside the latest movie trailers and snack brands.
February 6, 2026Source

Germany warns of Signal account hijacking targeting senior figures
Germany's domestic intelligence agency is warning of suspected state-sponsored threat actors targeting high-ranking individuals in phishing attacks via messaging apps like Signal.
February 6, 2026Source

In Other News: Record DDoS, Epstein's Hacker, ESET Product Vulnerabilities
Other noteworthy stories that might have slipped under the radar: AT&T and Verizon response to Salt Typhoon, AI agents solve security challenges, man arrested in Poland for DDos Attacks.
February 6, 2026Source

ISMG Editors: Notepad++ Supply Chain Attack Raises Alarm
Also: Healthcare Cyber Risks Collide, Varonis Deal Signals AI Security Shift
February 6, 2026Source or Source or Source or Source

Living off the AI: The Next Evolution of Attacker Tradecraft
Living off the AI isn't a hypothetical but a natural continuation of the tradecraft we've all been defending against, now mapped onto assistants, agents, and MCP.
February 6, 2026Source

Radicl Brings In $31M to Push AI-Driven SOC Toward Autonomy
Series A Funding Accelerates AI-Native Detection and Response Road Map
February 6, 2026Source or Source or Source or Source or Source

Russia Hacked the Polish Electricity Grid. Now What?
Stymied Attack Leaves Poland No Good Options in Responding to Provocation
February 6, 2026Source or Source or Source or Source or Source

The best free VPNs: 5 no-cost top picks
VPNs are best when they're paid for, but the top free VPNs can still keep you private without breaking the bank.
February 6, 2026Source

Who's Liable When Embedded AI Goes Wrong?
Privacy Expert Chiara Rustici on Laws Governing Autonomous Robots, Embedded AI
February 6, 2026Source or Source or Source or Source

Zscaler Purchases SquareX to Secure Browsers Without Agents
CEO Jay Chaudhry: SquareX Deal Targets Unmanaged Devices and Third-Party Access
February 6, 2026Source or Source or Source or Source or Source

Internet — Security Issues — February 4th, 2026

7 apps I use to lock down, encrypt, and store my private files - and most are free
If you want to keep the documents and files on your PC extra secure, these apps will do the trick.
February 4, 2026Source

8 Essential Security Tips for Using AI Chatbots Safely
8 Essential Security Tips for Using AI Chatbots Safely
February 4, 2026Source

After social media ban for teens, France may move to regulate VPNs next
VPN regulation proposals spread as governments tighten online safety rules
February 4, 2026Source

AI-powered phishing attacks doubled in 2025
Last year saw a malicious email attack every 19 seconds a more than doubling of 2024's pace of one every 42 seconds according to the latest report from Cofense that reveals how AI technologies are now central to how threat actors operate, fundamentally transforming the speed, scale, and sophistication of modern phishing attacks.
February 4, 2026Source

Apple Xcode 26.3 adds coding agent support from OpenAI and Anthropic
Apple released Xcode 26.3 with new agentic coding capabilities designed to let AI systems carry out development tasks inside the IDE. The release supports agents such as Anthropic’s Claude Agent and OpenAI’s Codex.
February 4, 2026Source

Avast brings deepfake scam detection to Windows PCs and mobile devices
Avast announced the full international availability of Avast Scam Guardian and Scam Guardian Pro on mobile devices, alongside the launch of Avast Deepfake Guard on Windows PCs, a new AI-powered feature designed to proactively analyze and detect malicious audio in video content. Together, these launches expand the Avast scam protection ecosystem, extending coverage across mobile and PC to help protect people from scams across text messages, calls, and video platforms.
February 4, 2026Source

Blockchain Intelligence Firm TRM Labs Raises $70 Million at $1 Billion Valuation
Blockchain intelligence firm TRM Labs announced it has secured $70 million in a Series C funding round, bringing its valuation to $1 billion. The investment, led by Blockchain Capital and involving participation from several firms including Goldman Sachs and Thoma Bravo, will be used to expand the company’s AI capabilities for disrupting criminal networks and addressing national security risks. This latest funding brings TRM Labs’ total investment to approximately $200 million.
February 4, 2026Source

CISA warns of five-year-old GitLab flaw exploited in attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their systems against a five-year-old GitLab vulnerability that is actively being exploited in attacks.
February 4, 2026Source

ConnectSecure introduces Linux patching capability to simplify cross-distro updates
ConnectSecure announced the launch of a new cross-platform Linux operating system patching capability. The update eliminates the complexity of managing fragmented Linux environments by delivering a single, unified interface for deploying critical security updates across the four most widely used Linux distributions: Red Hat, Ubuntu, Debian, and CentOS.
February 4, 2026Source

Cryptominers, Reverse Shells Dropped in Recent React2Shell Attacks
Two IP addresses accounted for the majority of the 1.4 million exploitation attempts observed over the past week.
February 4, 2026Source

Cyber Insights 2026: Cyberwar and Rising Nation State Threats
While both cyberwar and cyberwarfare will increase through 2026, cyberwarfare is likely to increase more dramatically. We hope it will never boil over – but we should be aware of the possibility and its consequences.
February 4, 2026Source

Detectify Internal Scanning finds and fixes vulnerabilities behind the firewall
Detectify has launched Internal Scanning, a new solution designed to address the growing vulnerability risks within internal networks, challenging the outdated notion of internal networks as inherently secure. This tool extends Detectify’s existing capabilities, utilizing its proprietary crawling and fuzzing engine, powered by ethical hackers and AI, to discover and remediate vulnerabilities behind the firewall.
February 4, 2026Source

DockerDash Flaw in Docker AI Assistant Leads to RCE, Data Theft
The critical vulnerability exists in the contextual trust in MCP Gateway architecture, as instructions are passed without validation.
February 4, 2026Source

EDR killer tool uses signed kernel driver from forensic software
Hackers are abusing a legitimate but long-revoked EnCase kernel driver in an EDR killer that can detect 59 security tools in attempts to deactivate them.
February 4, 2026Source

Fingerprint enables enterprises to tell trusted AI agents apart from bots and scrapers
Fingerprint has released Authorized AI Agent Detection, its new ecosystem of AI agents, including OpenAI, AWS AgentCore, Browserbase, Manus and Anchor Browser. The ecosystem enables enterprises to detect authorized agentic AI traffic with 100% certainty, allowing organizations to distinguish trusted, permissioned automation from malicious bots and scrapers.
February 4, 2026Source

Fresh SolarWinds Vulnerability Exploited in Attacks
The critical-severity SolarWinds Web Help Desk flaw could lead to unauthenticated remote code execution.
February 4, 2026Source

Incognito dark web drug market operator gets 30 years in prison
Rui-Siang Lin, a Taiwanese national, was sentenced to 30 years in U.S. federal prison for operating Incognito Market, one of the world’s largest illicit online narcotics marketplaces.
February 4, 2026Source

'Incognito' operator sentenced to 30 years for running a dark web drug market
The dark web drug 'kingpin' shut down operations in 2024, demanding payment to keep users' identities secret.
February 4, 2026Source

Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk
Researchers at Tenable have disclosed two vulnerabilities, collectively referred to as “LookOut,” affecting Google Looker. Because the business intelligence platform is deployed by more than 60,000 organizations in 195 countries, the flaws could give attackers a path to system takeover or access to sensitive corporate data.
February 4, 2026Source

Microsoft and ServiceNow's exploitable agents reveal a growing - and preventable - AI security crisis
Once deployed on corporate networks, AI agents can become every threat actor's fantasy. Lesson one for cybersecurity pros: limit privileges.
February 4, 2026Source

New Amaranth Dragon cyberespionage group exploits WinRAR flaw
A new threat actor called Amaranth Dragon, linked to APT41 state-sponsored Chinese operations, exploited the CVE-2025-8088 vulnerability in WinRAR in espionage attacks on government and law enforcement agencies.
February 4, 2026Source

OpenClaw’s AI ‘skill’ extensions are a security nightmare
Security researchers found hundreds of malicious add-ons on ClawHub.
February 4, 2026Source

Orion Raises $32 Million for Data Security
The startup will use the funding to accelerate product development and go-to-market operations.
February 4, 2026Source

Owner of Incognito dark web drugs market gets 30 years in prison
A Taiwanese man was sentenced to 30 years in prison for operating Incognito Market, one of the world's largest online narcotics marketplaces that sold over $105 million worth of illegal drugs to customers worldwide.
February 4, 2026Source

SECNAP CloudJacket MXDR integrates SOC, SIEM, and NDR
SECNAP Network Security announced the launch of CloudJacket MXDR, a next-generation managed extended detection and response solution. Built on the company’s patented CloudJacket platform, CloudJacket MXDR enhances SECNAP’s security portfolio by extending its existing capabilities, including advanced network detection and response (NDR).
February 4, 2026Source

Security Analysis of Moltbook Agent Network: Bot-to-Bot Prompt Injection and Data Leaks
Wiz and Permiso have analyzed the AI agent social network and found serious security issues and threats.
February 4, 2026Source

Socure unifies identity, fraud, and program integrity for government at scale
Socure has released Socure for Government (SocureGov) RiskOS to help public sector organizations deliver simpler, faster, and more transparent digital identity verification and fraud prevention at scale.
February 4, 2026Source

The Double-Edged Sword of Non-Human Identities
In a sweeping analysis conducted in late 2025, Flare researchers uncovered more than (including production API keys, cloud tokens, CI/CD credentials, and even AI model access tokens) all pushed into public repositories, often unintentionally by developers.
February 4, 2026Source

Varonis Acquisition of AllTrue.ai Valued at $150 Million
The data security firm has acquired the AI trust, risk, and security management company to expand its capabilities.
February 4, 2026Source

Vulnerabilities Allowed Full Compromise of Google Looker Instances
The flaws dubbed LookOut can be exploited for remote code execution and data exfiltration.
February 4, 2026Source

Internet — Security Issues — February 2nd, 2026

3 security gadgets I never leave home without (and they're more affordable than you'd think)
These must-have tools help protect against hacking and data loss, without costing an arm and a leg.
February 2, 2026Source

Cost-effective rural cybersecurity strategies
Jim Roeder, CIO and VP of IT for Lakewood Health in Staples, Minn., says expert rural IT panelists at HIMSS26 will share cost effective approaches to handling limited resources, staffing and infrastructure needs and discuss regional collaboration.
February 2, 2026Source

CTM360 Report Warns of Global Surge in Fake High-Yield Investment Scams
Fraudulent High-Yield Investment Programs (HYIPs) are surging globally, pushing “guaranteed” profits that no legitimate investment can sustain. These scams lure victims with a simple pitch: deposit money, wait, and withdraw fast returns, often advertised with exaggerated figures such as “40% return in 72 hours.”
February 2, 2026Source

Cyber Insights 2026: Malware and Cyberattacks in the Age of AI
Security leaders share how artificial intelligence is changing malware, ransomware, and identity-led intrusions, and how defenses must evolve.
February 2, 2026Source

Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities
Poland’s CERT has published a report on the recent attack, providing new details on targeted ICS and attribution.
February 2, 2026Source

Enterprise credentials exposed by infostealers
New analysis of 18.7 million infostealer logs carried out by Flare shows a significant rise in enterprise identity compromise. Researchers found that more than one in 10 infections already contained enterprise Single Sign-On (SSO) or Identity Provider (IdP) credentials, and that rate is quickly increasing.
February 2, 2026Source

Facial recognition technology used by police is now very accurate—but public understanding lags behind
The UK government's proposed reforms to policing in England and Wales signal an increase in the use of facial recognition technology. The number of live facial recognition vans is set to rise from ten to 50, making them available to every police force in both countries.
February 2, 2026Source

From Clawdbot to OpenClaw: This viral AI agent is evolving fast - and it's nightmare fuel for security pros
The breakneck speed of the personal AI assistant's evolution has prompted dire warnings from security researchers.
February 2, 2026Source

Hanging Up on ShinyHunters: Experts Detail Vishing Defenses
Sophisticated Voice Phishing Campaigns Don't Exploit Any Software Vulnerabilities
February 2, 2026Source or Source or Source or Source or Source

Hijacked Notepad++ updater quietly targeted users for months
Notepad++ is a favorite of programmers and other power users, but its auto-update function was compromised for months in 2025.
February 2, 2026Source

How state-sponsored attackers hijacked Notepad++ updates
Suspected Chinese state-sponsored attackers hijacked the Notepad++ update mechanism by compromising the software project’s shared hosting server and intercepting and redirecting update traffic destined for notepad-plus-plus.org, the software’s maintainer Don Ho confirmed on Monday.
February 2, 2026Source

Hugging Face Repositories Abused in New Android Malware Campaign
Attackers exploited Hugging Face's trusted infrastructure to spread an Android RAT, using fake security apps and thousands of malware variants.
February 2, 2026Source

Infrastructure cyberattacks are suddenly in fashion. We can buck the trend
Don't be scared of the digital dark -- learn how to keep the lights on
February 2, 2026Source

Japan, Britain to Boost Cybersecurity and Critical Minerals Cooperation as China’s Influence Grows
Japan and Britain agree to accelerate cooperation on cybersecurity and the supply of critical minerals, as China’s influence grows in the region.
February 2, 2026Source

Malwarebytes in ChatGPT delivers AI-powered protection against scams
Malwarebytes announced Malwarebytes in ChatGPT, a new way for individuals and small businesses to get fast, trusted security assistance directly within ChatGPT. Users can ask Malwarebytes to check whether something is a scam or spam, tapping into the company’s deep cybersecurity expertise and decades of threat intelligence.
February 2, 2026Source

Massive 31.4 Tbps DDoS attack breaks records: How the 'apex' of botnets could be weaponizing your home devices
The botnet's ongoing activities highlight how consumer devices are being weaponized to launch cyberattacks on the world stage.
February 2, 2026Source

Microsoft Moves Closer to Disabling NTLM
The next major Windows Server and Windows releases will have the deprecated authentication protocol disabled by default.
February 2, 2026Source

Microsoft sets a path to switch off NTLM across Windows
Windows is shifting to a more secure authentication approach, moving away from New Technology LAN Manager (NTLM) and toward stronger, Kerberos-based options.
February 2, 2026Source

Modern Vulnerability Detection: Using GNNs to Find Subtle Bugs
Move beyond regex-based scanning; learn how graph neural networks and Code Property Graphs analyze true data flow to eliminate SAST false positives.
February 2, 2026Source

NationStates confirms data breach, shuts down game site
NationStates, a multiplayer browser-based game, has confirmed a data breach after taking its website offline earlier this week to investigate a security incident.
February 2, 2026Source

Notepad++ compromised by "state-sponsored hackers" — Here's what you need to do if you use the popular Notepad alternative
Users targeted by the vulnerability were fed a bogus update with malicious content included.
February 2, 2026Source or Source or Source

Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack
A hacker published malicious versions of four established VS Code extensions to distribute a GlassWorm malware loader.
February 2, 2026Source

OpenClaw patches one-click RCE as security Whac-A-Mole continues
Researchers disclose rapid exploit chain that let attackers run code via a single malicious web page
February 2, 2026Source or Source

Over 1,400 MongoDB Databases Ransacked by Threat Actor
Of 3,100 unprotected MongoDB instances, half remain compromised, most of them by a single threat actor.
February 2, 2026Source

Panera Bread breach impacts 5.1 million accounts, not 14 million customers
The data breach notification service Have I Been Pwned says that a data breach at the U.S. food chain Panera Bread affected 5.1 million accounts, not 14 million customers as previously reported.
February 2, 2026Source

ShinyHunters-Branded Extortion Activity Expands, Escalates
Hackers rely on evolved vishing and login harvesting to compromise SSO credentials for unauthorized MFA enrollment.
February 2, 2026Source or Source

Span Cyber Security Arena 2026: Only 10 days left to secure early bird tickets
With preparations well underway, Span Cyber Security Arena 2026 is set to return for its third edition, bringing together domestic and international experts in cyber security. As in previous years, the conference is designed for everyone involved in that area – from regulatory and legal professionals to technical practitioners and decision makers.
February 2, 2026Source

Yes, you should use an encrypted email service. Here's why
It's the smarter way to send emails!
February 2, 2026Source

Internet — Security Issues — February 1st, 2026

Malicious OpenClaw 'skill' targets crypto users on ClawHub — 14 malicious skills were uploaded to ClawHub last month
Security researchers are warning that the growing ecosystem around 'OpenClaw,' the self-hosted AI assistant formerly known as both Clawdbot and Moltbot, has already become a target for malware distribution. According to a report published by OpenSourceMalware, at least 14 malicious "skills" were uploaded to ClawHub between January 27 and 29. These masquerade as crypto trading or wallet automation tools while attempting to deliver malware to users' systems.
February 1, 2026Source

Week in review: Microsoft fixes exploited Office zero-day, Fortinet patches FortiCloud SSO flaw
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
February 1, 2026Source

Internet — Security Issues — January 31st, 2026

Botnet smashes DDoS traffic record, equivalent to streaming 2.2 million Netflix 4K movies at once — 31.4 Tb/s attack was large enough to take entire countries offline
Distributed denial-of-service (DDoS) attacks have become an unfortunate routine part of the modern internet, with botnets of compromised devices spreading ever wider. Unfortunately, the scale and frequency of those attacks have also been rising. The Aisuru-Kimwolf botnet recently smashed its previous record, hitting 31.4 Tb/s in December. To put it into perspective, that's bandwidth enough to stream nearly 2.2 million Netflix 4K movies at once.
January 31, 2026Source

Cloud storage payment scam floods inboxes with fake renewals
Over the past few months, a large-scale cloud storage subscription scam campaign has been targeting users worldwide with repeated emails falsely warning recipients that their photos, files, and accounts are about to be blocked or deleted due to an alleged payment failure.
January 31, 2026Source

Google Takes Down Massive Malicious Proxy Network, Millions of Zombie Devices
Google has a deeply-vested interest in cybersecurity and unparalleled resources to take down bad actors. The latest target on Google's kill list was a malicious proxy network called IPIDEA, and through coordinated efforts inside and outside of Google's umbrella, IPIDEA has been taken down. However, cybercriminals are a notoriously resourceful and persistent bunch, so Google also saw fit to share extensive documentation of its discoveries, so that everyone can take the right measures to keep malicious proxy networks like IPIDEA in the ground.
January 31, 2026Source

Mandiant details how ShinyHunters abuse SSO to steal cloud data
Mandiant says a wave of recent ShinyHunters SaaS data-theft attacks is being fueled by targeted voice phishing (vishing) attacks and company-branded phishing sites that steal single sign-on (SSO) credentials and multi-factor authentication (MFA) codes.
January 31, 2026Source

Internet — Security Issues — January 31st, 2026

eScan Antivirus Delivers Malware in Supply Chain Attack
Hackers compromised a MicroWorld Technologies update server and fed a malicious file to eScan customers.
January 31, 2026Source

Internet — Security Issues — January 30th, 2026

82 percent of hackers now use AI
A future of cybersecurity, powered by AI, promises a world where it's not just about defending against threats, but preemptively shaping a resilient digital landscape. But of course the technology is equally attractive to attackers and that means ethical hackers need to adopt it to.
January 30, 2026Source

9 million Android devices were secretly hijacked by proxy network
Google claims to have shut down a huge criminal network that used users' phones and PCs to distribute illegal data undetected.
January 30, 2026Source

175,000 Exposed Ollama Hosts Could Enable LLM Abuse
Among them, 23,000 hosts were persistently responsible for the majority of activity observed over 293 days of scanning.
January 30, 2026Source

Aisy Launches Out of Stealth to Transform Vulnerability Management
Aisy has emerged from stealth mode with $2.3 million in seed funding for its AI-assisted platform.
January 30, 2026Source

Apple's new privacy feature limits how precisely carriers track your location
Apple users are already accustomed to managing app-level location permissions, and a new privacy feature in iOS 26.3 extends that control to cellular networks. Called Limit Precise Location, it reduces the amount of fine-grained location data that iPhones share with carriers.
January 30, 2026Source

Comcast to Pay $117M in Security Breach Settlement
The breach was linked to a vulnerability known as "CitrixBleed," a flaw affecting Citrix NetScaler Application Delivery Controller and Gateway appliances.
January 30, 2026Source

EFF calls out major tech c

Crypto wallets received a record $158 billion in illicit funds last year
Illegal cryptocurrency flows reached a record $158 billion in 2025, reversing a three-year trend of declining amounts from $86B in 2021 to $64B in 2024.
January 30, 2026Source

Ex-Google engineer found guilty of stealing AI secrets
A federal jury in California convicted former Google software engineer Linwei Ding, also known as Leon Ding, on seven counts of economic espionage and seven counts of theft of trade secrets tied to AI technology.
January 30, 2026Source

Holiday Hits: Hackers Love to Strike When Defenders Are Away
Attack intensity surged over the Western winter holiday period, a trend consistent with hackers' propensity for probing defenses and striking during off hours to maximize dwell time before being discovered.
January 30, 2026Source or Source or Source or Source or Source

Hugging Face Abused to Deploy Android RAT
Android users were lured to applications that served a malicious payload hosted in a Hugging Face repository.
January 30, 2026Source

ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
Sandworm/Electrum hackers targeted communication and control systems at 30 sites.
January 30, 2026Source

In Other News: Paid for Being Jailed, Google's $68M Settlement, CISA Chief's ChatGPT Leak
Other noteworthy stories that might have slipped under the radar: Apple updates platform security guide, LastPass detects new phishing wave, CISA withdraws from RSA Conference.
January 30, 2026Source

Is Google saving your voice recordings? How to check, delete, and opt out - fast
I was a little unsettled by what I found.
January 30, 2026Source

Ivanti Patches Exploited EPMM Zero-Days
The critical-severity vulnerabilities could allow unauthenticated attackers to execute arbitrary code remotely.
January 30, 2026Source

Microsoft sets new timeline for Sentinel transition to Defender portal
Microsoft has updated the timeline for transitioning the Microsoft Sentinel experience from the Azure portal to the Microsoft Defender portal from July 1, 2026 to March 31, 2027. The updated schedule extends access by nearly nine months.
January 30, 2026Source

Nvidia GeForce Security Update Driver 582.28 WHQL for Windows 10, 11
Software security update display driver for GeForce GPUs which are no longer supported by Game Ready Drivers or Nvidia Studio Drivers.
January 30, 2026Source

Russian hackers breached Polish power grid thanks to bad security, report says
The Polish government said Russian government hackers broke into parts of the country's energy grid infrastructure, taking advantage of its poor security.
January 30, 2026Source

Security teams hampered by lack of integrated tools
Security is complicated by a growing number of cloud tools that aren't integrated, sprawling tech stacks and a lack of communication, according to the 2026 Security Operations Insights report released this week by Sumo Logic.
January 30, 2026Source

SoundCloud Data Breach Exposes Nearly 30M User Accounts
A SoundCloud breach affecting 29.8 million accounts exposed email addresses and profile data, increasing phishing risks.
January 30, 2026Source

The best cheap VPN in 2026
You'll get the best VPN experience by paying, but prices don't have to be steep.
January 30, 2026Source

This NVIDIA GeForce GPU Update Is a "Must Have", As It Fixes Critical Security Flaws That Could Put Your PC at Risk
NVIDIA's newest update for its GeForce GPU drivers focuses on mitigating multiple security risks that are deemed "critical" ones, leading to issues like denial of service and many more.
January 30, 2026Source

Thousands more Oregon residents learn their health data was stolen in TriZetto breach
Thousands more Oregonians will soon receive data breach letters in the continued fallout from the TriZetto data breach, in which someone hacked the insurance verification provider and gained access to its healthcare provider customers across multiple US states.
January 30, 2026Source or Source

Tim Berners-Lee, inventor of the World Wide Web, thinks it can still be saved — despite some parts being 'optimized for nastiness'
Creator of the web believes the "battle for [its soul]" can be won.
January 30, 2026Source

White House Scraps 'Burdensome' Software Security Rules
Two Biden-era memorandums have been revoked, but some of the resources they provide can still be used by government organizations.
January 30, 2026Source

Internet — Security Issues — January 19th, 2026

4 in 5 small businesses had cyberscams in 2025 and almost half of attacks were AI powered
A survey by the Identity Theft Resource Center, a San Diego-based education and victim resource nonprofit, found that 38% of small businesses hit by a cyberscam or breach in the previous 12 months passed those losses to customers by raising prices.
January 19, 2026Source

42,000 Impacted by Ingram Micro Ransomware Attack
The compromised personal information includes names, dates of birth, Social Security numbers, and employment-related data.
January 19, 2026Source

Anthropic's Cowork Shipped With Known Vulnerability
AI Agent Can Access File Upload API to Exfiltrate Documents
January 19, 2026Source or Source or Source< or Source or Source

British Army to spend £279 million on permanent cyber regiment base
The British Army has announced a new permanent base for its cyber regiment, backed by £279 million in government spending. The plan centres on 13 Signal Regiment, the unit responsible for defending Army networks and supporting cyber operations.
January 19, 2026Source

Cyber Insights 2026: Information Sharing
Information sharing is necessary for efficient cybersecurity, and is widespread; but never quite perfect in practice.
January 19, 2026Source

Ingram Micro says ransomware attack affected 42,000 people
​Information technology giant Ingram Micro has revealed that a ransomware attack on its systems in July 2025 led to a data breach affecting over 42,000 individuals.
January 19, 2026Source

Fake browser crash alerts turn Chrome extension into enterprise backdoor
Browser extensions are a high-risk attack vector for enterprises, allowing threat actors to bypass traditional security controls and gain a foothold on corporate endpoints.
January 19, 2026Source

Jordanian pleads guilty to selling access to 50 corporate networks
A Jordanian man has pleaded guilty to operating as an "access broker" who sold access to the computer networks of at least 50 companies.
January 19, 2026Source or Source

Keepnet bets on Agentic AI behavioral training to curb security mistakes
Keepnet launched its Agentic AI for Behavioral Microlearning solution, which moves success metrics from "completion rates" to behavior change and verifiable incident reduction. Agentic AI autonomously plans, creates, delivers, and optimizes training based on real-time risk data, eliminating manual intervention.
January 19, 2026Source

Law enforcement tracks ransomware group blamed for massive financial losses
Law enforcement agencies in Ukraine and Germany have identified two members of a Russian-affiliated ransomware group and carried out searches in western Ukraine.
January 19, 2026Source

Malicious Chrome Extension Crashes Browser in ClickFix Variant 'CrashFix'
Posing as an ad blocker, the malicious extension crashes the browser to lure victims into installing malware.
January 19, 2026Source

Microsoft forced to issue emergency out of band updates for Windows 11 after latest security patches broke PC shutdowns and sign-ins
The latest OS updates for Windows 11 introduces two major bugs that caused issues with shutting down your PC or signing into your PC using Remote Desktop.
January 19, 2026Source

Microsoft issues security advisory for IT admins managing Windows Domain Controllers
Almost exactly a year ago, Microsoft shared details regarding the hardening process of Domain Controllers (DCs) to protect them against a couple of security flaws in Kerberos. Now, it is kicking off yet another hardening phase to patch DCs against security issues recently reported via CVE-2026-20833.
January 19, 2026Source

New Reports Reinforce Cyberattack's Role in Maduro Capture Blackout
US officials told The New York Times that cyberattacks were used to turn off the lights in Caracas and disrupt air defense radars.
January 19, 2026Source

Ransomware 'Most Wanted': Cops Seek Head of Black Basta
Crackdown Targets Multiple Members of Cybercrime Group, Including 'Hash Crackers'
January 19, 2026Source or Source or Source

'SolyxImmortal' Information Stealer Emerges
The information stealer abuses legitimate APIs and libraries to exfiltrate data to Discord webhooks.
January 19, 2026Source

TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking
The researcher who discovered the vulnerability saw more than 2,500 internet-exposed devices.
January 19, 2026Source

UK govt. warns about ongoing Russian hacktivist group attacks
The U.K. government is warning of continued malicious activity from Russian-aligned hacktivist groups targeting critical infrastructure and local government organizations in the country in disruptive denial-of-service (DDoS) attacks.
January 19, 2026Source

Internet — Security Issues — January 15th, 2026

Asimily extends Cisco ISE integration to turn device risk into segmentation policy
Asimily announced enhanced microsegmentation capabilities, including new support for Security Group Access Control Lists (SGACL) within Cisco Identity Services Engine (ISE). The release builds on Asimily's longstanding ISE integration, enabling organizations to translate device intelligence and risk context into enforceable segmentation policies that move beyond visibility to actionable risk reduction.
January 15, 2026Source

AWS European Sovereign Cloud puts data, operations, and oversight inside the EU
Amazon has made the AWS European Sovereign Cloud generally available to customers across the European Union, backed by a €7.8 billion investment. According to AWS, the funding will support infrastructure buildout, staffing, and long-term operations, and is expected to drive regional economic activity and job creation over the coming years.
January 15, 2026Source

Bitwarden advances passkeys and credential risk controls
Bitwarden revealed continued product innovation and ecosystem maturity to advance identity security capabilities for users and enterprises. Bitwarden introduced enterprise credential risk insights and guided remediation through Bitwarden Access Intelligence, expanded passkey interoperability across browsers, devices, and operating systems, and deepened alignment with industry standards and major platform providers, including the FIDO Alliance and Microsoft.
January 15, 2026Source

Central Maine Healthcare Data Breach Impacts 145,000 Individuals
Hackers stole patients' personal, treatment, and health insurance information from the organization's IT systems.
January 15, 2026Source

Critical WhisperPair flaw lets hackers track, eavesdrop via Bluetooth audio devices
Security researchers have discovered a critical vulnerability in Google's Fast Pair protocol that can allow attackers to hijack Bluetooth audio accessories, track users, and eavesdrop on their conversations.
January 15, 2026Source

Cryptohack Roundup: UK Crypto Firms Tied to Iran Sanctions
Also: NodeCordRAT Malware, North Korean QR-Phishing Campaign
January 15, 2026Source or Source or Source

D7VK 1.2 Released For Improving Direct3D 6 Front-End
Started last year was D7VK as a project bringing Direct3D 7 implemented over the Vulkan API for enjoying better performance and support for legacy Windows games on Linux, akin to DXVK and VKD3D-Proton for newer versions of Direct3D over Vulkan that is used by Valve's Steam Play (Proton). Back in December D7VK added a Direct3D 6 front-end for allowing even older game titles to be accelerated using the modern Vulkan API. Today D7VK 1.2 is out for furthering the D3D6 support.
January 15, 2026Source

Delinea expands identity security platform through StrongDM acquisition
Delinea has signed a definitive agreement to acquire StrongDM. Delinea's leadership in enterprise privileged access management (PAM), combined with StrongDM's just-in-time (JIT) runtime authorization capabilities and developer-first access model, will form a new class of identity security platform designed for continuous, always-on environments.
January 15, 2026Source

Depthfirst Raises $40 Million for Vulnerability Management
The startup will use the investment to accelerate R&D, expand go-to-market efforts, and hire new talent.
January 15, 2026Source

Goverlay 1.7.1 released
Goverlay 1.7.1 has been released with several new features and improvements for its supported tools, including MangoHud and OptiScaler. The update brings changes to MangoHud's temperature display handling and the addition of a RAM temperature option specifically for DDR5 setups. Additionally, the update addressed GPU vendor spoofing issues in OptiScaler and enhanced edge detection for cutting-edge builds. The release also includes various bug fixes and improvements to the build process, including better automation and versioning controls.
January 15, 2026Source

F5 targets AI runtime risk with new guardrails and adversarial testing tools
F5 has unveiled general availability of F5 AI Guardrails and F5 AI Red Team, two solutions that secure mission-critical enterprise AI systems. With these releases, F5 is providing a comprehensive end-to-end lifecycle approach to AI runtime security, including enhanced ability to connect and protect AI agents with both out-of-the-box and custom guardrails.
January 15, 2026Source

Forget Predictions: True 2026 Cybersecurity Priorities From Leaders
Security leaders chart course beyond predictions with focus on supply chain, governance, and team efficiency.
January 15, 2026Source

FTC bans GM from selling drivers' location data for five years
The U.S. Federal Trade Commission has finalized an order with General Motors (GM) and its subsidiary, OnStar, settling charges that they collected and sold the location and driving data of millions of drivers without consent.
January 15, 2026Source

How a simple link allowed hackers to bypass Copilot's security guardrails - and what Microsoft did about it
Reprompt let attackers control Copilot and pull your data, even after you closed the chat.
January 15, 2026Source

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Aveva, Phoenix Contact
Only a dozen new advisories have been published this Patch Tuesday by industrial giants.
January 15, 2026Source

I spent a year on Linux and forgot to miss Windows
One year on Linux, two distros, a few tears, four desktop environments, and zero regrets about leaving Windows.
January 15, 2026Source

Imagination Driver To Support The TI AM62P SoC In Linux 6.20~7.0
Sent out today was the latest DRM-Misc-Next pull request of new material ahead of the next kernel cycle either Linux 6.20 or 7.0 depending upon what Linus Torvalds decides to call it.
January 15, 2026Source

isVerified Emerges From Stealth With Voice Deepfake Detection Apps
isVerified provides Android and iOS mobile applications designed to protect enterprise communications.
January 15, 2026Source

libvirt 12.0 Released - Bhyve ARM64 Support & Other Improvements For The BSD Hypervisor
Libvirt 12.0 released today as this open-source virtualization API for management across different virtualization technologies/hypervisors. With libvirt 12.0, improving Bhyve as the FreeBSD hypervisor was a big focus.
January 15, 2026Source

Linux Patches Bring Mainline Kernel Support For The ASUS IPMI Expansion Card
DeviceTree patches worked on recently allow for the mainline Linux kernel to run on the ASUS "Kommando" IPMI Expansion Card. This is interesting for opening up new possibilities for this external IPMI/BMC expansion card but too bad that less than three years after launching it's difficult to find.
January 15, 2026Source

New 'Reprompt' Attack Silently Siphons Microsoft Copilot Data
The attack bypassed Copilot's data leak protections and allowed for session exfiltration even after the Copilot chat was closed.
January 15, 2026Source

New 'StackWarp' Attack Threatens Confidential VMs on AMD Processors
Researchers have disclosed technical details on a new AMD processor attack that allows remote code execution inside confidential VMs.
January 15, 2026Source

oVirt 4.5.7 Released After Two Years With New OS & CPU Support
The oVirt 4.5.7 open-source virtualization management platform released this week after not seeing any new releases in two years. While Red Hat had started the oVirt open-source project for which their Red Hat Virtualization platform is based, since they shifted that to maintenance mode to focus on the Red Hat OpenShift platform and stopped contributing to oVirt, it's been up to the open-source community to keep it going.
January 15, 2026Source

Palo Alto Networks warns of DoS bug letting hackers disable firewalls
Palo Alto Networks patched a high-severity vulnerability that could allow unauthenticated attackers to disable firewall protections in denial-of-service (DoS) attacks.
January 15, 2026Source

PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
A critical vulnerability (CVE-2025-64155) in Fortinet's FortiSIEM security platform has now been accompanied by publicly released proof-of-concept (PoC) exploit code, raising the urgency for organizations to patch immediately.
January 15, 2026Source

Ransomware activity surges to record levels
Ransomware victim numbers hit a new all-time high last year with 2,287 ransomware victims posted in Q4 2025 alone. At the same time the number of threat groups has reached record levels. 124 distinct ransomware groups were active in 2025, the highest ever recorded and a 46 percent year-on-year increase.
January 15, 2026Source

Ransomware by the Numbers: Victim and Group Count Surges
Despite Some Well-Known Groups Disappearing, Ransomware Competition Remains Fierce
January 15, 2026Source or Source or Source or Source or Source

Sensitive data of Eurail, Interrail travelers compromised in data breach
A data breach at the Netherlands-based company that sells Eurail (Interrail) train passes resulted in the compromise of personal and sensitive information belonging to an as-yet unknown number of travelers.
January 15, 2026Source

Tines rolls out a governance layer for agents, copilots, and MCPs
Tines unveiled AI in Tines, a unified interaction layer for agents, copilots, and MCPs, enabling organizations to operationalize enterprise AI in a governed environment.
January 15, 2026Source

Traveler Information Stolen in Eurail Data Breach
Hackers stole the personal and reservation information of people with a Eurail pass and those who made a seat reservation with the company.
January 15, 2026Source

Trump Renominates Sean Plankey to Lead CISA
Former NSC Cyber Adviser Renominated to Lead CISA Amid Ongoing Senate Gridlock
January 15, 2026Source or Source or Source

Trump's National Fraud Enforcement Plan Falls Short
New Agency Focuses on Public Programs, Ignores Private Sector Fraud
January 15, 2026Source or Source

Vibe Coding Tested: AI Agents Nail SQLi but Fail Miserably on Security Controls
Vibe coding generates a curate's egg program: good in parts, but the bad parts affect the whole program.
January 15, 2026Source

VoidLink Linux Malware Framework Targets Cloud Environments
Designed for long-term access, the framework targets cloud and container environments with loaders, implants, and rootkits.
January 15, 2026Source

Internet — Security Issues — January 14th, 2026

Aikido Security Raises $60 Million at $1 Billion Valuation
The developer security company has raised a total of more than $84 million in funding.
January 14, 2026Source

Airia adds AI Governance for compliance, accountability, and control
Airia announced the launch of its AI Governance product, the third pillar of its comprehensive enterprise AI management ecosystem. The new offering joins Airia's established AI Security and Agent Orchestration capabilities to provide enterprises with end-to-end visibility, control, and compliance across their AI deployments.
January 14, 2026Source

Anthropic backs Python Software Foundation security work with $1.5 million
Anthropic has signed a two-year partnership with the Python Software Foundation (PSF), committing a total of $1.5 million to support the foundation's work, with a focus on Python ecosystem security.
January 14, 2026Source

Belgian cybersecurity startup becomes unicorn
Aikido Security secures $60 M Series B and joins the unicorn club
January 14, 2026Source

Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities
The two browser updates resolve 26 security defects, including bugs that could be exploited for code execution.
January 14, 2026Source or Source

Cloud marketplace Pax8 accidentally exposes data on 1,800 MSP partners
Cloud marketplace and distributor Pax8 has confirmed that it mistakenly sent an email to fewer than 40 UK-based partners containing a spreadsheet with internal business information, including MSP customer and Microsoft licensing data.
January 14, 2026Source

ConsentFix debrief: Insights from the new OAuth phishing attack
In December, the Push Security research team discovered and blocked a brand new attack technique that we coined ConsentFix. This technique merged ClickFix-style social engineering with OAuth consent phishing to hijack Microsoft accounts.
January 14, 2026Source

Cybersecurity Trends 2026: From Unapproved AI to Passkeys, Clear Steps to Stay Safe
What if the very technologies designed to propel us into the future are also the ones that could unravel our digital security? IBM Technology explores how advancements like Shadow AI, quantum computing, and deepfakes are reshaping the cybersecurity landscape in 2026, presenting both unprecedented opportunities and alarming threats. Imagine a world where unauthorized AI systems quietly operate within your organization, bypassing safeguards and opening doors to costly breaches.
January 14, 2026Source

DeadLock Ransomware Group Utilizes Polygon Smart Contracts
Stealthy Group Taps Blockchain 'EtherHiding' to Facilitate Victim Communications
January 14, 2026Source or Source or Source

Exploit code public for critical FortiSIEM command injection flaw
Technical details and a public exploit have been published for a critical vulnerability affecting Fortinet's Security Information and Event Management (SIEM) solution that could be leveraged by a remote, unauthenticated attacker to execute commands or code.
January 14, 2026Source

Flaw in AI Libraries Exposes Models to Remote Code Execution
3 Major Tech Firms Shipped Vulnerable Open-Source Tools to Hugging Face
January 14, 2026Source or Source or Source or Source or Source

Fortinet Patches Critical Vulnerabilities in FortiFone, FortiSIEM
Exploitable without authentication, the two security defects could lead to configuration leak and code execution.
January 14, 2026Source

How to change your Windows PIN for better security
Straightforward Windows security.
January 14, 2026Source

How to Secure a Spring AI MCP Server with an API Key via Spring Security
Discover how to protect your Spring AI MCP server with an API key, including clear instructions, sample code, and recommended security practices.
January 14, 2026Source

Investor Lawsuit Over CrowdStrike Outage Dismissed
A judge has ruled that the plaintiffs failed to demonstrate intent to defraud investors.
January 14, 2026Source

Joint guidance on secure connectivity principles for operational technology
The Canadian Centre for Cyber Security (Cyber Centre) has joined the United Kingdom's National Cyber Security Centre (NCSC-UK) and the following international partners in releasing guidance on secure connectivity principles for operational technology (OT):
January 14, 2026Source

Microsoft January 2026 Security Updates
Microsoft January 2026 Security Updates
January 14, 2026Source

Microsoft updates Windows DLL that triggered security alerts
Microsoft has resolved a known issue that was causing security applications to flag a core Windows component, the company said in a service alert posted this week.
January 14, 2026Source

Monroe University says 2024 data breach affects 320,000 people
Monroe University revealed that threat actors stole the personal, financial, and health information of over 320,000 people after breaching its systems in a December 2024 cyberattack.
January 14, 2026Source

Novee Emerges From Stealth With $51.5 Million in Funding
Novee provides continuous AI-driven penetration testing to uncover and address novel vulnerabilities.
January 14, 2026Source

One Identity Manager 10.0 introduces risk-based governance and ITDR capabilities
One Identity has unveiled a major upgrade to One Identity Manager, strengthening identity governance as a critical security control for modern enterprise environments. One Identity Manager 10.0 introduces security-driven capabilities for risk-based governance, identity threat detection and response (ITDR), and AI-assisted insight, helping organizations better anticipate, contain, and manage identity-driven attacks across their complex IT ecosystems.
January 14, 2026Source

Predator Spyware Turns Failed Attacks Into Intelligence for Future Exploits
The Predator spyware is more sophisticated and dangerous than previously realized.
January 14, 2026Source or Source

RedVDS Cybercrime Service Disrupted by Microsoft and Law Enforcement
RedVDS enables threat actors to set up servers that can be used for phishing, BEC attacks, account takeover, and fraud.
January 14, 2026Source

Reprompt attack hijacked Microsoft Copilot sessions for data theft
Researchers identified an attack method dubbed "Reprompt" that could allow attackers to infiltrate a user's Microsoft Copilot session and issue commands to exfiltrate sensitive data.
January 14, 2026Source

Robo-Advisor Betterment Discloses Data Breach
A threat actor breached Betterment's systems, accessed customer information, and sent scam crypto-related messages.
January 14, 2026Source

SpyCloud launches Supply Chain Threat Protection to expose vendor identity risk
SpyCloud has released Supply Chain Threat Protection solution, an advanced layer of defense that expands identity threat protection across the extended workforce, including organizations' entire vendor ecosystems.
January 14, 2026Source

Victorian Department of Education says hackers stole students' data
The Department of Education in Victoria, Australia, notified parents that attackers accessed a database containing the personal information and email addresses of current and former students, prompting password resets.
January 14, 2026Source

UK scraps digital ID requirement for workers
The government still plans to fully transition to digital right-to-work checks by 2029.
January 14, 2026Source or Source

WitnessAI Raises $58 Million for AI Security Platform
The company will use the fresh investment to accelerate its global go-to-market and product expansion.
January 14, 2026Source

Internet — Security Issues — January 9th, 2026

377,000 Impacted by Data Breach at Texas Gas Station Firm
Gulshan Management Services has informed authorities about a recent data breach resulting from a ransomware attack.
January 9, 2026Source

Attackers target remote work and data storage
New research from internet service provider Beaming shows UK businesses were targeted more than 791,600 times last year and attackers are focused on systems that facilitate remote work and data storage, turning them into high-risk entry points.
January 9, 2026Source

Breach Roundup: Firewalls Headed for Obsolescence
Also, Sedgwick Confirms Breach, Romanian Power Firm Hit, D-Link Flaws Exploited
January 9, 2026Source or Source or Source or Source or Source

CISA Closes 10 Emergency Directives as Vulnerability Catalog Takes Over
The Emergency Directives were retired because they achieved objectives or targeted vulnerabilities included in the KEV catalog.
January 9, 2026Source or Source

CrowdStrike Adds Real-Time Identity Control With SGNL Deal
$740M SGNL Acquisition Boosts Dynamic Identity Enforcement for Humans and AI Agents
January 9, 2026Source or Source or Source or Source

European Commission opens consultation on EU digital ecosystems
The European Commission has opened a public call for evidence on European open digital ecosystems, a step toward a planned Communication that will examine the role of open source in EU's digital infrastructure.
January 9, 2026Source

Exploit for VMware Zero-Day Flaws Likely Built a Year Before Public Disclosure
Fresh attacks targeted three VMware ESXi vulnerabilities that were disclosed in March 2025 as zero-days.
January 9, 2026Source

FBI: North Korean Spear-Phishing Attacks Use Malicious QR Codes
The North Korean state-sponsored espionage group Kimsuky has targeted government organizations, think tanks, and academic institutions.
January 9, 2026Source

Hackers target misconfigured proxies to access paid LLM services
Threat actors are systematically hunting for misconfigured proxy servers that could provide access to commercial large language model (LLM) services.
January 9, 2026Source

How hackers are fighting back against ICE surveillance tech
Remember when government agents didn't wear masks?
January 9, 2026Source

Illinois Department of Human Services data breach affects 700K people
The Illinois Department of Human Services (IDHS), one of Illinois' largest state agencies, accidentally exposed the personal and health data of nearly 700,000 residents due to incorrect privacy settings.
January 9, 2026Source

Illinois man charged with hacking Snapchat accounts to steal nude photos
U.S. prosecutors have charged an Illinois man with orchestrating a phishing operation that allowed him to hack the Snapchat accounts of nearly 600 women to steal private photos and sell them online.
January 9, 2026Source or Source or Source

Illinois Notifies 700,000 of Misconfiguration Breach
Mapping Platform Exposed Addresses and Medical Assistance Plans
January 9, 2026Source or Source or Source or Source or Source

ISMG Editors: Lack of MFA Keeps Fueling Cloud Data Breaches
Also: Turning AI Data Into AI Defense, Autonomous Border Patrol Robots
January 9, 2026Source or Source or Source or Source or Source

January 2026 Patch Tuesday forecast: And so it continues
Welcome to a new year of my Patch Tuesday forecast blog where I provide a summary of Microsoft and other vendor's security patch activity (and reported issues) for the month, talk about some of the latest trends, processes, and evolution of patch management, and finally yes, provide a forecast of what security patches are expected to release next week on Patch Tuesday.
January 9, 2026Source

Key Areas of Convergence for IT-OT Security in Energy Sector
Hitachi Energy Security Head Joe Doetzl on Common Tools and Practices
January 9, 2026Source or Source or Source

No Rest in 2026 as Patch Alerts Amass for Cisco, HPE and n8n
Cisco Fixes ISE Bug; HPE OneView Under Fire; Exploit Code Drops for n8n Flaw
January 9, 2026Source or Source or Source or Source or Source

NordPass streamlines two-factor authentication with a built-in Authenticator across devices
NordPass simplifies secure logins by including Authenticator on multiple devices in the application for personal use. The time-based one-time password (TOTP) support enables users to add an extra layer of security to their accounts with two-factor authentication, without the need to download or install additional applications. Authentication codes are synchronized within the account, letting users access them on both the mobile app or browser extension.
January 9, 2026Source

Reports Of A Russian Weapon Aimed At Starlink Have Experts Shaking Their Heads
Even if you've never used the service you're likely familiar with Starlink, the global internet service provider that depends on an array of satellites in low-earth orbit (LEO). SpaceX launched the first Starlink satellites in 2019, and since them more than 9,000 more have joined those initial five dozen. Starlink plans an eventual fleet of over 40,000, but before that can happen Russia seems interested in knocking some of them out of commission.
January 9, 2026Source

The best free VPNs: 5 no-cost top picks
VPNs are best when they're paid for, but the top free VPNs can still keep you private without breaking the bank.
January 9, 2026Source

Tim Kosiba Named NSA Deputy Director
Kosiba, a veteran of the Intelligence Community with over 30 years of federal service, returns to the agency as its most senior civilian leader.
January 9, 2026Source

Why Encryption Alone Is Not Enough in Cloud Security
Practical Lessons from Real-World Scenarios That Clearly Demonstrate Why Relying on Encryption Alone Cannot Fully Protect Cloud Workloads
January 9, 2026Source

'ZombieAgent' Attack Let Researchers Take Over ChatGPT
Radware bypassed ChatGPT's protections to exfiltrate user data and implant a persistent logic into the agent's long-term memory.
January 9, 2026Source

Internet — Security Issues — January 8th, 2026

77 percent of successful email attacks impersonate trusted platforms
New research from StrongestLayer highlights a fundamental shift in attacker behavior, where adversaries increasingly hide behind business-critical platforms such as DocuSign, Microsoft, and Google Calendar -- services organizations can't block without disrupting operations.
January 8, 2026Source

2025 proved hackers aren't slowing down -- and neither should you
Europe's biggest cyber attacks show why smarter online habits are important.
January 8, 2026Source

As agents run amok, CrowdStrike's $740M SGNL deal aims to help get a grip on identity security
Authentication is basically solved. Authorization is another thing entirely...
January 8, 2026Source

Blackbird.AI Raises $28 Million for Narrative Intelligence Platform
The company will use the funds to enhance its AI-based narrative intelligence technology platform and accelerate go-to-market efforts.
January 8, 2026Source

Breach Roundup: Firewalls Headed for Obsolescence
Also, Sedgwick Confirms Breach, Romanian Power Firm Hit, D-Link Flaws Exploited
January 8, 2026Source or Source or Source or Source or Source

Britain Debuts Early Revamp of Government Cyber Action Plan
Experts Salute Urgency and Direction of Travel, Question Funding and Enforcement
January 8, 2026Source or Source or Source or Source or Source

ChatGPT Health: Top Privacy, Security, Governance Concerns
OpenAI: Tool Will 'Securely' Connect With Medical Records, But How Will That Work?
January 8, 2026Source or Source or Source or Source

CISA flags actively exploited Office relic alongside fresh HPE flaw
Max-severity OneView hole joins a PowerPoint bug that should've been retired years ago
January 8, 2026Source

Cisco warns of Identity Service Engine flaw with exploit code
Cisco warns of Identity Service Engine flaw with exploit code
January 8, 2026Source

Critical HPE OneView Vulnerability Exploited in Attacks
The maximum-severity code injection flaw can be exploited without authentication for remote code execution.
January 8, 2026Source

Critical Vulnerability Exposes n8n Instances to Takeover Attacks
Tracked as CVE-2026-21858 (CVSS score 10), the bug enables remote code execution without authentication.
January 8, 2026Source

Critical Vulnerability Patched in jsPDF
The bug can allow attackers to read arbitrary files from the system, potentially exposing configurations and credentials.
January 8, 2026Source

Critics pan spyware maker NSO's transparency claims amid its push to enter US market
NSO Group, one of the most well-known and controversial makers of government spyware, released a new transparency report on Wednesday, as the company enters what it described as "a new phase of accountability."
January 8, 2026Source

CrowdStrike to Buy Identity Security Firm SGNL for $740 Million in Cash
The deal aims to bolster CrowdStrike's Falcon platform with "continuous identity" protection to secure human and AI-driven access in real-time.
January 8, 2026Source

Cruz Accuses Ford's Farley Of Swindling Taxpayers, Calls Him Too Scared To Testify
Jim Farley bailed on planned senate grilling after learning Tesla's Elon Musk was given a pass
January 8, 2026Source

Cryptohack Roundup: Alleged Fraud Kingpin Deported to China
Also: Unleash Protocol Hack, LastPass Breach Linked to Crypto Thefts
January 8, 2026Source or Source or Source or Source or Source

Cyber Retaliation Risks Rise After US-Venezuela Operation
CISA Warns of Retaliatory Cyber Action From Hostile State Actors After Venezuela
January 8, 2026Source or Source or Source or Source or Source

Cyera Raises $400 Million at $9 Billion Valuation
The New York-based data security company has tripled its valuation in just one year.
January 8, 2026Source or Source or Source or Source or Source or Source

Detect and Respond Faster with Elastic & Tines
Security operations center (SOC) teams are under nonstop pressure. Threats are rising, attack techniques are evolving, and analysts are drowning in alerts. Meanwhile, SOC leaders are asked to do more with fewer resources and tighter budgets.
January 8, 2026Source

FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs
The North Korean state-sponsored hacker group Kimsuki is using malicious QR codes in spearphishing campaigns that target U.S. organizations, the Federal Bureau of Investigation warns in a flash alert.
January 8, 2026Source

How Hackers Are Fighting Back Against ICE
Read more about how ICE has spent hundreds of millions of dollars on surveillance technology to spy on anyone—and potentially everyone—in the United States, and how to follow the Homeland Security Spending Trail..
January 8, 2026Source or Source

I Talked to Cybersecurity Experts After These LinkedIn Scams Almost Fooled Me
Experts say scammers often exploit the professional nature of LinkedIn with job offers that seem legitimate. Here's how to spot them.
January 8, 2026Source

IPFire update brings new network and security features to firewall deployments
Security and operations teams often work with firewall platforms that require frequent tuning or upgrades to meet evolving network demands. IPFire has released its 2.29 Core Update 199, aimed at network and protection teams that manage this open source firewall distribution.
January 8, 2026Source

Illinois health department exposed over 700,000 residents' personal data for years
The health department for the U.S. state of Illinois has confirmed that a years-long security lapse exposed the personal information of more than 700,000 state residents.
January 8, 2026Source

JumpCloud Grows Presence in Brazil With MSP MacSolution Buy
Acquisition of MSP MacSolution Boosts Global Services and Cloud Migration Expertise
January 8, 2026Source or Source or Source or Source

Michigan man learns the hard way that "catch a cheater" spyware apps aren't legal
Spying doesn't become legal just because "cheaters" are the targets.
January 8, 2026Source

Maximum-severity n8n flaw lets randos run your automation server
Unauthenticated RCE means anyone on the network can seize full control
January 8, 2026Source

NordPass launches Authenticator for personal accounts
NordPass Authenticator is a feature that generates one-time passwords directly in a NordPass vault. It gives all the security of two-factor authentication without an extra app. However, until now it's only been available to business users.
January 8, 2026Source

PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)
Trend Micro has released a critical patch fixing several remotely exploitable vulnerabilities in Apex Central (on-premise), including a flaw (CVE-2025-69258) that may allow unauthenticated attackers to achieve code execution on affected installations.
January 8, 2026Source

Ransomware attacks kept climbing in 2025 as gangs refused to stay dead
Cop wins hit crime infrastructure, not the people behind it
January 8, 2026Source

Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
An unauthenticated remote code execution vulnerability (CVE-2025-37164) affecting certain versions of HPE OneView is being leveraged by attackers, CISA confirmed by adding the flaw to its Known Exploited Vulnerabilities catalog.
January 8, 2026Source

Researchers Expose WHILL Wheelchair Safety Risks via Remote Hacking
CISA advisory warns that unauthenticated Bluetooth access in WHILL devices allows for unauthorized movement.
January 8, 2026Source

Secure Log Tokenization Using Aho--Corasick and Spring
This article shows how to use the Aho--Corasick algorithm and deterministic tokenization in Spring Boot to intercept logs in real time, remove sensitive values.
January 8, 2026Source

UK Government Unveils New Cyber Action Plan
The UK government's cyber action plan is by the government for the government, and has no advice for the private sector nor CNI.
January 8, 2026Source

Upwind Choppy AI simplifies cloud security exploration and investigation
Upwind announced Choppy AI, embedding new AI-powered capabilities across the company's CNAPP platform. Choppy AI introduces natural-language--driven experiences that make cloud security exploration, investigation, and analysis more intuitive, while providing transparency, control, and trust for security teams.
January 8, 2026Source

Vannadium's Leap combines on-chain performance and data integrity for explainable AI
Vannadium has launched Leap, a platform that combines blockchain-level data integrity with real-time, on-chain performance.
January 8, 2026Source

VMware ESXi zero-days likely exploited a year before disclosure
Chinese-speaking threat actors used a compromised SonicWall VPN appliance to deliver a VMware ESXi exploit toolkit that seems to have been developed more than a year before the targeted vulnerabilities became publicly known.
January 8, 2026Source

Watch out! This fake Windows BSOD is a trap
Attackers are using ClickFix social engineering, fake CAPTCHAs, and phony BSODs to convince victims into copying and pasting malicious code. Here's how the attack works.
January 8, 2026Source

What Testers Can Do to Ensure Software Security
A secure software development life cycle means baking security into plan, design, build, test, and maintenance, rather than sprinkling it on at the end, Sara Martinez said in her talk Ensuring Software Security at Online TestConf. Testers aren't bug finders but early defenders, building security and quality in from the first sprint. Culture first, automation second, continuous testing and monitoring all the way; that's how you make security a habit instead of a fire drill, she argued.
January 8, 2026Source

Yes, criminals are using AI to vibe-code malware
They also hallucinate when writing ransomware code
January 8, 2026Source

Internet — Security Issues — January 7th, 2026

900,000 Users Hit as Malicious Chrome Extensions Steal ChatGPT, DeepSeek Chats
OX Security reveals how malicious Chrome extensions exposed AI chats from ChatGPT and DeepSeek, silently siphoning sensitive data from 900,000 users.
January 7, 2026Source

7 essential tips to maximize AI security
AI can be a bit scary, but if you pay attention to privacy, double-check your facts, and take control of your data, you can use it safely and smartly.
January 7, 2026Source

Australia's Scams Framework Criticized Over Major Exclusions
Treasury Submissions Want Broader Coverage; Gaps Could Weaken Protections
January 7, 2026Source or Source or Source or Source or Source

Best travel VPNs of 2026: The top VPNs for security and speed worldwide
VPNs shield you from spying and can resolve online blocks you may find in other countries including the UK's new checks. My favorite travel VPNs offer fast speeds, massive server networks, and solid encryption.
January 7, 2026Source

Best VPN services: 8 top picks for every VPN need
There are a lot of VPN options out there; we'll help you cut through the clutter.
January 7, 2026Source

Best VPNs for streaming 2026: Watch your favorite shows worldwide with my favorite VPNs
Check out our favorite VPNs for rapid speeds, high server counts, and access to streaming libraries when you leave home.
January 7, 2026Source

Chrome fixes a problematic security flaw in first update of 2026
Google has released the first security update of the new year for Chrome.
January 7, 2026Source

Chrome Extensions With 900,000 Downloads Caught Stealing AI Chats
Impersonating a legitimate extension from AITOPIA, the two malicious extensions were also exfiltrating users' browser activity.
January 7, 2026Source

Complex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks
Threat actors spoof legitimate domains to make their phishing emails appear to have been sent internally.
January 7, 2026Source

Critical jsPDF flaw lets hackers steal secrets via generated PDFs
The jsPDF library for generating PDF documents in JavaScript applications is vulnerable to a critical vulnerability that allows an attacker to steal sensitive data from the local filesystem by including it in generated files.
January 7, 2026Source

Cyber Flatlines in FY 2026 Justice, Commerce Spending Bill
Congress Holds Cyber Funding at 2024 Levels Across Key Civilian Agencies
January 7, 2026Source or Source or Source or Source or Source

Cybersecurity Firms Secured $14 Billion in Funding in 2025: Analysis
2025 was the strongest year for cybersecurity funding since the 2021 peak, according to Pinpoint Search Group.
January 7, 2026Source

Debian seeks volunteers to rebuild its data protection team
The Debian Project is asking for volunteers to step in after its Data Protection Team became inactive. All three members of the team stepped down at the same time, leaving no dedicated group to handle privacy and data protection work.
January 7, 2026Source or Source or Source or Source or Source or Source

ESA calls cops as crims lift off 500 GB of files, say security black hole still open
Two weeks, two major data leaks ... not a good look for the European Space Agency
January 7, 2026Source

Fake Booking.com emails and BSODs used to infect hospitality staff
Suspected Russian attackers are targeting the hospitality sector with fake Booking.com emails and a fake "Blue Screen of Death" to deliver the DCRat malware.
January 7, 2026Source

FDA Takes Hands-Off Approach to AI Devices and Software
Agency: Guidance Favors Market Innovation Over Federal Scrutiny
January 7, 2026Source or Source or Source or Source or Source

Financial services overtakes healthcare as most at risk from cyberattacks
The financial services sector has now overtaken healthcare as the industry with the highest number of data compromises.
January 7, 2026Source

Google Tops List of the Most Exploited Accounts in the US, Report Finds
A new report reveals that Google accounts are the most exploited in the US, largely due to how many services are tied to a single login. The article also explains how users can better protect themselves using stronger passwords, 2FA, and passkeys.
January 7, 2026Source

Hackers Exploit Zero-Day in Discontinued D-Link Devices
The critical-severity vulnerability allows unauthenticated, remote attackers to execute arbitrary shell commands.
January 7, 2026Source

How attackers are weaponizing open-source package managers [Q&A]
A new wave of attacks is hitting the JavaScript package ecosystem, specifically through open-source managers like NPM. Instead of malicious code hiding in the package itself, attackers now weaponize the install process. So, the code looks clean at build-time but later executes in end-user browsers, where it quietly steals data.
January 7, 2026Source

HSBC app takes a dim view of sideloaded Bitwarden installations
Customers report being locked out after grabbing the password manager via F-Droid
January 7, 2026Source

IBM's AI agent Bob easily duped to run malware, researchers show
Prompt injection lets risky commands slip past guardrails
January 7, 2026Source

In 2026, Hackers Want AI: Threat Intel on Vibe Hacking & HackGPT
Right now, across , channels, and underground , hackers are talking about artificial intelligence - but not in the way most people expect.
January 7, 2026Source

Jaguar Land Rover wholesale volumes plummet 43% in cyberattack aftermath
Production halts and supply-chain disruption left luxury automaker reeling in fiscal Q3
January 7, 2026Source

Max severity Ni8mare flaw lets hackers hijack n8n servers
A maximum severity vulnerability dubbed "Ni8mare" allows remote, unauthenticated attackers to take control over locally deployed instances of the N8N workflow automation platform.
January 7, 2026Source

Microsoft scraps Exchange Online spam clamp after customers cry foul
Negative feedback sinks Redmond's plan to cap outbound email recipients
January 7, 2026Source

Ministry of Justice splurged £50M on security -- still missed Legal Aid Agency cyberattack
High-risk system compromised long before intrusion was finally spotted
January 7, 2026Source

New Veeam vulnerabilities expose backup servers to RCE attacks
Veeam released security updates to patch multiple security flaws in its Backup & Replication software, including a critical remote code execution (RCE) vulnerability.
January 7, 2026Source

Orca, Wiz End Dueling Lawsuits Over Cloud Security Patents
Patent Board Decision Invalidating 3 Orca Patents Weakens Case, Leads to Dismissal
January 7, 2026Source or Source or Source or Source or Source

Orthopedic Practice Pays $500K Settlement to NYS in Hack
2023 Incident Affected More Than 650,000 Patients, Employees
January 7, 2026Source or Source or Source or Source or Source

ownCloud urges users to enable MFA after credential theft reports
File-sharing platform ownCloud warned users today to enable multi-factor authentication (MFA) to block attackers using compromised credentials from stealing their data.
January 7, 2026Source

Phishing-as-a-service kits doubled in 2025 as tactics evolve
In 2025, the number of known phishing-as-a-service (PhaaS) kits doubled in number, increasing the pressure on security teams trying to defend against this ever-evolving threat.
January 7, 2026Source

Poison Pill Defense Protects Proprietary AI Data From Theft
Researchers Weaponize False Data to Wreck Stolen AI Systems
January 7, 2026Source or Source or Source or Source or Source

Samsung patches high-risk security vulnerability in its SSD software, update yours now
If you have a Samsung SSD in your computer and you use the Samsung Magician app, it is time to update to the latest version, as Samsung reported a high-severity vulnerability in some of the older versions of the program.
January 7, 2026Source

Several Code Execution Flaws Patched in Veeam Backup & Replication
Four vulnerabilities have been fixed in the latest release of Veeam Backup & Replication.
January 7, 2026Source

Stalkerware slinger pleads guilty for selling snooper software to suspicious spouses
pcTattletale boss Bryan Fleming faces up to 15 years in prison when sentenced later this year
January 7, 2026Source

The Hidden Security Risks in ETL/ELT Pipelines for LLM-Enabled Organizations
As LLMs enter data pipelines, ETL/ELT becomes part of the AI security boundary, where untrusted inputs can introduce upstream risks.
January 7, 2026Source

The Loudest Voices in Security Often Have the Least to Lose
Security advice fails when it comes from those who don't bear the consequences and won't be responsible for making it work.
January 7, 2026Source

UK announces plan to strengthen public sector cyber defenses
The United Kingdom has announced a new cybersecurity strategy, backed by more than £210 million ($283 million), to boost cyber defenses across government departments and the wider public sector.
January 7, 2026Source or Source or Source or Source

Vulnerability in Totolink Range Extender Allows Device Takeover
An error in the firmware-upload handler leads to devices starting an unauthenticated root-level Telnet service.
January 7, 2026Source

What does cybersecurity look like in the quantum age?
Quantum computers promise unprecedented computing speed and power that will advance both business and science. These same qualities also make them a prime target for malicious hackers, according to Swaroop Ghosh, professor of computer science and of electrical engineering at the Penn State School of Electrical Engineering and Computer Science.
January 7, 2026Source

WWT introduces ARMOR, a vendor-agnostic framework for secure AI readiness
World Wide Technology (WWT) announced its AI Readiness Model for Operational Resilience (ARMOR), a vendor-agnostic solution, delivered by WWT, leveraging a jointly developed framework with NVIDIA. Refined with real-world feedback from The Texas A&M University System, ARMOR is among the first vendor-agnostic, end-to-end AI security frameworks designed to empower organizations to accelerate AI adoption confidently while ensuring robust security, compliance, and operational resilience.
January 7, 2026Source

Zero Trust for the Age of Autonomous AI Agents - Part 1
Why Human-Centric Zero Trust Models Fail in a World of Autonomous AI Agents
January 7, 2026Source or Source or Source or Source or Source

Internet — Security Issues — January 6th, 2026

Are Copilot prompt injection flaws vulnerabilities or AI limits?
Microsoft has pushed back against claims that multiple prompt injection and sandbox-related issues raised by a security engineer in its Copilot AI assistant constitute security vulnerabilities.
January 6, 2026Source

Conduent Hack Victim Count Soars by at Least 50%
Why Are Third-Party Vendor Breaches So Hard to Figure Out?
January 6, 2026Source or Source or Source or Source or Source

Critical Dolby Vulnerability Patched in Android
The flaw is tracked as CVE-2025-54957 and its existence came to light in October 2025 after it was discovered by Google researchers.
January 6, 2026Source

Cyber Risk Trends for 2026: Building Resilience, Not Just Defenses
We can't outpace the adversary by trying to stop every attack, but we can outlast them by engineering systems and culture to take a punch and try to quickly rebound.
January 6, 2026Source

Cybersecurity M&A Roundup: 30 Deals Announced in December 2025
Significant cybersecurity M&A deals announced by Akamai, Red Hat, Checkmarx, Silent Push, and ServiceNow.
January 6, 2026Source

Direct 3D printing of nanolasers can boost optical computing and quantum security
In future high-tech industries, such as high-speed optical computing for massive AI, quantum cryptographic communication, and ultra-high-resolution augmented reality (AR) displays, nanolasers—which process information using light—are gaining significant attention as core components for next-generation semiconductors.
January 6, 2026Source or Source

FCC Loses Lead Support for Biden-Era IoT Security Labeling
FCC Lacks Lead for Cyber Trust Mark Program After UL Solutions Steps Down From Post
January 6, 2026Source or Source or Source or Source

Hacker Conversations: Katie Paxton-Fear Talks Autism, Morality and Hacking
From dismantling online games as a child to uncovering real-world vulnerabilities, Katie Paxton-Fear explains how autism, curiosity, and a rejection of ambiguity shaped her path into ethical hacking.
January 6, 2026Source

How generative AI accelerates identity attacks against Active Directory
Active Directory is still how most organizations manage user identities, making it a frequent focus during attacks. What's changed isn't the target, but how much faster and more effective these attacks have become.
January 6, 2026Source

If Your Security Camera Is in One of These 7 Spots, You're Basically Doing the Intruder's Job for Them
If Your Security Camera Is in One of These 7 Spots, You're Basically Doing the Intruder's Job for Them
January 6, 2026Source

Kimwolf Android botnet abuses residential proxies to infect internal devices
The Kimwolf botnet, an Android variant of the Aisuru malware, has grown to more than two million hosts, most of them infected by exploiting vulnerabilities in residential proxy networks to target devices on internal networks.
January 6, 2026Source

Missing MFA Strikes Again: Hacker Hits Collaboration Tools
Terabytes of Data Stolen From Cloud-Based Collaboration Tools, Researchers Warn
January 6, 2026Source or Source or Source or Source or Source

New D-Link flaw in legacy DSL routers actively exploited in attacks
Threat actors are exploiting a recently discovered command injection vulnerability that affects multiple D-Link DSL gateway routers that went out of support years ago.
January 6, 2026New D-Link flaw in legacy DSL routers actively exploited in attacks
Threat actors are exploiting a recently discovered command injection vulnerability that affects multiple D-Link DSL gateway routers that went out of support years ago.
January 6, 2026
Source

" target="new" class="RM1">Source

NordVPN Denies Breach After Hacker Leaks Data
The VPN company has conducted an investigation after a threat actor claimed to have hacked its systems.
January 6, 2026Source

Nvidia Bets on Reasoning AI for Self-Driving Cars
Chipmaker CEO Huang Launches Alpamayo Models, Rubin Platform
January 6, 2026Source or Source or Source or Source

Researchers Trap Scattered Lapsus$ Hunters in Honeypot
Using fake accounts and synthetic data to lure the hackers, the researchers gathered information on their servers.
January 6, 2026Source

Samsung Explores How Trust, Security and Privacy Shape the Future of AI at CES 2026
Samsung Tech Forum series continues at CES 2026 with AI Platform Center discussion on the future of trust and AI
January 6, 2026Source

Sedgwick confirms breach at government contractor subsidiary
Claims administration and risk management company Sedgwick has confirmed that its federal contractor subsidiary, Sedgwick Government Solutions, was the victim of a security breach.
January 6, 2026Source

Sophisticated ClickFix Campaign Targeting Hospitality Sector
Fake Booking reservation cancellations and fake BSODs trick victims into executing malicious code leading to RAT infections.
January 6, 2026Source

Threats to Critical Infrastructure Expected to Intensify
Geopolitics Puts OT at Greater Risk From Nation States, Criminals and Hacktivists
January 6, 2026Source or Source or Source or Source

UK injects just £210M into cyber plan to stop Whitehall getting pwnd
Central government will supposedly be as secure as energy facilities and datacenters under new proposals
January 6, 2026Source

Why Palo Alto Is Eyeing a $400M Buy of Endpoint Vendor Koi
Deal Represents Return to Tuck-In M&A for Palo After 3 Multi-Billion Dollar Deals
January 6, 2026Source or Source or Source or Source or Source

Internet — Security Issues — January 5th, 2026

Aflac Notifies 22.7 Million People of June Data Theft Attack
Insurer's Hack Could Rank as Largest US Health Data Breach Reported in 2025
January 5, 2026Source or Source or Source or Source or Source

Agentic AI Is an Identity Problem and CISOs Will Be Accountable for the Outcome
If you are a CISO today, agentic AI probably feels familiar in an uncomfortable way. The technology is new, but the pattern is not. Business leaders are pushing hard to deploy AI agents across the organization, while security teams are expected to make it safe without slowing anything down.
January 5, 2026Source

Breached E-Commerce Giant Details $1B 'Customer Trust' Plan
Critics of South Korea's Coupang Dismiss Offer as Marketing More Than Compensation
January 5, 2026Source or Source or Source or Source or Source

Brightspeed Investigating Cyberattack
The hacking group Crimson Collective has claimed the theft of personal information pertaining to over 1 million Brightspeed customers.
January 5, 2026Source

California just made it much easier to delete your data across 500 brokers
California is taking on the data broker industry with automation
January 5, 2026Source or Source

China Launched 2.6M Daily Cyberattacks on Taiwan in 2025
Cyberspace has become a central arena in cross-strait tensions, complementing military maneuvers, diplomatic isolation, and economic pressure.
January 5, 2026Source

CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries
With 24 new vulnerabilities known to be exploited by ransomware groups, the list now includes 1,484 software and hardware flaws.
January 5, 2026Source

ClickFix attack uses fake Windows BSOD screens to push malware
A new ClickFix social engineering campaign is targeting the hospitality sector in Europe, using fake Windows Blue Screen of Death (BSOD) screens to trick users into manually compiling and executing malware on their systems.
January 5, 2026Source

Cloud file-sharing sites targeted for corporate data theft attacks
A threat actor known as Zestix has been offering to sell corporate data stolen from dozens of companies likely after breaching their ShareFile, Nextcloud, and OwnCloud instances.
January 5, 2026Source

Congrats, cybercrims: You just fell into a honeypot
Resecurity offered its "congratulations" to the Scattered Lapsus$ Hunters cybercrime crew for falling into its threat intel team's honeypot -- resulting in a subpoena being issued for one of the data thieves. Meanwhile, the notorious extortionists have since removed their claims of gaining "full access" to the security shop's systems.
January 5, 2026Source

Covenant Health Notifying 480K Patients of 2025 Data Theft
Ransomware Gang Qilin Had Claimed It Stole 852 GB of Health System's Data
January 5, 2026Source or Source or Source or Source or Source

Covenant Health patient data breach numbers skyrocket
According to a revised breach notification, the provider sent out an additional 470,000 letters for a ransomware attack initially reported last year as affecting upwards of 8,000 individuals.
January 5, 2026Source

Cyberattack Unlikely in Communications Failure That Grounded Flights in Greece
Flights across Greece were impacted for several hours after noise was reported on multiple air traffic communication channels.
January 5, 2026Source

Food insecurity tied to increased long COVID risk in kids
New research led by Mass General Brigham investigators suggests that long COVID is more prevalent in school-aged children and adolescents who experience economic instability and adverse social conditions. The multi-center, observational study found that the risk of long COVID was significantly higher in households that faced food insecurity and challenges such as low social support and high levels of discrimination.
January 5, 2026Source

Hacker Dressed as the Pink Ranger Takes Down White Supremacist Websites Live Onstage
Now that's a performance that needs an encore.
January 5, 2026Source

Kimwolf Android Botnet Grows Through Residential Proxy Networks
The 2-million-device-strong botnet allows monetization through DDoS attacks, app installs, and the selling of proxy bandwidth.
January 5, 2026Source

Ledger customers impacted by third-party Global-e data breach
Ledger is informing some customers that their personal data has been exposed after hackers breached the systems of third-party payment processor Global-e.
January 5, 2026Source

Managing the Explosion of Machine Identities in Financial Services
CyberArk and Accenture Experts Discuss Modernization, Identity Sprawl, Securing AI
January 5, 2026Source or Source or Source or Source or Source

New Zealand orders review into Manage
Government 'incredibly' concerned about breach potentially affecting more than 100,000 patients
January 5, 2026Source

New Zealand Probes Ransomware Hack of Health Portal
More Than 100,000 Affected by Hack Detected on Dec. 30
January 5, 2026Source or Source or Source or Source or Source

NordVPN denies breach claims, says attackers have "dummy data"
NordVPN denied allegations that its internal Salesforce development servers were breached, saying that cybercriminals obtained "dummy data" from a trial account on a third-party automated testing platform.
January 5, 2026Source

Palo Alto Networks Eyes $400M Acquisition of Koi Security
A high-profile acquisition by a global cybersecurity leader could help signal renewed confidence in Israeli cyber startups.
January 5, 2026Source

Playing Koi: Palo Alto isn't saying if it will buy security start-up
CEO Nikesh Arora's trip to Tel Aviv last month sparked rumors.
January 5, 2026Source

Popular VPN maker NordVPN shares details on yesterday's alleged Salesforce user data breach
Yesterday on January 4, a breach forum post alleged that a threat actor had accessed a "NordVPN Salesforce development server" which meant user data was allegedly hacked into. NordVPN has now issued a statement clarifying the situation as the firm has said that it concluded an "immediate forensic review" of such claims.
January 5, 2026Source

Proton Authenticator instead of Microsoft or Google solutions?
I'd like to address a topic that might be of interest to some of you. I've been using the Proton Authenticator for two-factor authentication for a while now. Here's some information on the subject.
January 5, 2026Source

Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes
WhatsApp device fingerprinting can be useful in the delivery of sophisticated spyware, but impact is very limited without a zero-day.
January 5, 2026Source

Sedgwick Confirms Cyberattack on Government Subsidiary
Hackers have compromised a file transfer system at Sedgwick's subsidiary that serves government agencies.
January 5, 2026Source

The Enduring Attack Surface of VPNs
Paper Traces Pandemic-Era Spike in Attacks
January 5, 2026Source or Source or Source or Source or Source

The nation's strictest privacy law just took effect, to data brokers' chagrin
Californians can now submit demands requiring 500 brokers to delete their data.
January 5, 2026Source

Trump, the US and a Blackout: What Cut Off Venezuela's Grid?
Experts Say Grid Disruption Amid Venezuela Operation Signals Cyber's Expanding Role
January 5, 2026Source or Source or Source

Trusted Google Notifications Used in Phishing Campaign Targeting 3,000+ Orgs
Researchers warn that attackers are abusing Google notifications and cloud services to deliver phishing emails that bypass traditional email security controls.
January 5, 2026Source

US broadband provider Brightspeed investigates breach claims
Brightspeed, one of the largest fiber broadband companies in the United States, is investigating security breach and data theft claims made by the Crimson Collective extortion gang.
January 5, 2026Source

VSCode IDE forks expose users to "recommended extension" attacks
Popular AI-powered integrated development environment solutions, such as Cursor, Windsurf, Google Antigravity, and Trae, recommend extensions that are non-existent in the OpenVSX registry, allowing threat actors to claim the namespace and upload malicious extensions.
January 5, 2026Source

Why a Cisco-Axonius Deal Makes Sense, and Why It Might Not
Despite Cisco's Cyber Struggles, the Perks of Offering Asset Management Are Clear
January 5, 2026Source or Source or Source

Windows Users at Risk as Critical Zoom Vulnerability Exploited
A critical Zoom vulnerability put Windows users at risk of data theft and system compromise. Zoom has patched the flaw. Users should update immediately.
January 5, 2026Source

Your Home Address Might Be Exposed. Here's How to Scrub It From the Internet.
Protect your privacy and keep your home address off the internet with these tips.
January 5, 2026Source

Zoom users, beware: These browser extensions are spying on you
A new malware campaign called Zoom Stealer is spying on Zoom users and stealing their sensitive data.
January 5, 2026Source

Internet — Security Issues — January 2nd, 2026

5 Challenges and Solutions in Mobile App Testing
Common challenges you must overcome during testing include device fragmentation, app security, connectivity issues, and more.
January 2, 2026Source

Adobe ColdFusion Servers Targeted in Coordinated Campaign
GreyNoise has observed thousands of requests targeting a dozen vulnerabilities in Adobe ColdFusion during the Christmas 2025 holiday.
January 2, 2026Source

Covenant Health Data Breach Impacts 478,000 Individuals
The Qilin ransomware group hacked the healthcare organization and stole data from its systems in May 2025.
January 2, 2026Source

Cybercrook claims to be selling infrastructure info about three major US utilities
A cybercrook claims to have breached Pickett and Associates, a Florida-based engineering firm whose clients include major US utilities, and is selling what they claim to be about 139 GB of engineering data about Tampa Electric Company, Duke Energy Florida, and American Electric Power. The price is 6.5 bitcoin, which amounts to about $585,000.
January 2, 2026Source

ISMG Editors: How AI Is Reshaping Cybersecurity Strategy
Also: Leadership Decisions Shaping Cybersecurity in 2026
January 2, 2026Source or Source or Source or Source

Nasty GlassWorm Malware Pivots From Windows To Target Mac Users
Security firm Koi has been busy lately. Its researchers have not only uncovered a sprawling spyware campaign, but they're also keeping tabs on the ever-evolving malware dubbed GlassWorm. In its latest form, GlassWorm has shifted from exclusively targeting Windows users to targeting macOS users as well, and it has a dangerous new trick up its sleeve to boot.
January 2, 2026Source

Over 10K Fortinet firewalls exposed to actively exploited 2FA bypass
Over 10,000 Fortinet firewalls are still exposed online and vulnerable to ongoing attacks exploiting a five-year-old critical two-factor authentication (2FA) bypass vulnerability.
January 2, 2026Source

RondoDox Botnet Exploiting React2Shell Vulnerability
In December, the botnet's operators focused on weaponizing the flaw to compromise vulnerable Next.js servers.
January 2, 2026Source

Trust Wallet links $8.5 million crypto theft to Shai-Hulud NPM attack
Trust Wallet believes the compromise of its web browser to steal roughly $8.5 million from over 2,500 crypto wallets is likely related to an "industry-wide" Sha1-Hulud attack in November.
January 2, 2026Source

Upgrade your online security in 2026 with this portable VPN router
This pocket-sized VPN travel router protects your data anywhere.
January 2, 2026Source

RansomwareTwo US Cybersecurity Pros Plead Guilty Over Ransomware Attacks
Ryan Goldberg and Kevin Martin have admitted being affiliates of the BlackCat/Alphv ransomware group.
January 2, 2026Source

Why 47-Day TLS and SSL Certificate Renewal Cycles Alarm CIOs
Visibility Gaps Increase the Risk of Certificate-Driven Outages
January 2, 2026Source or Source or Source or Source or Source

Internet — Security Issues — January 1ST, 2026

Best VPN Service for 2026: Our Top Picks in a Tight Race
Streaming, gaming or traveling? You might want a virtual private network. Our expert testing team rigorously evaluated these top VPNs for privacy, speed and more.
January 1, 2026Source

Breach Roundup: Clop Tied to Korean Air Vendor Breach
Also: China-Linked APT Hijack Updates, Conde Nast Data Leaked, La Poste Hit
January 1, 2026Source or Source or Source or Source or Source

Cryptohack Roundup: $7M Trust Wallet Hack
Indian Police Arrests Ex-Coinbase Staffer Over Data Breach Charges
January 1, 2026Source or Source or Source or Source or Source

Internet — Security Issues — December 26th, 2025

Data sovereignty, cloud and security [Q&A]
As more and more information is stored in the cloud, often with hyperscale providers, the issue of data sovereignty -- where the information resides and who can access it -- becomes increasingly crucial.
December 26, 2025Source

From video games to cyber defense: If you don't think like a hacker, you won't win
In supercharged AI race, defenders need to keep up
December 26, 2025Source

The 9 top cybersecurity startups from Disrupt Startup Battlefield
Every year, TechCrunch's Startup Battlefield pitch contest draws thousands of applicants. We whittle those applications down to the top 200 contenders, and of them, the top 20 compete on the big stage to become the winner, taking home the Startup Battlefield Cup and a cash prize of $100,000. But the remaining 180 startups all blew us away as well in their respective categories and compete in their own pitch competition.
December 26, 2025Source

These are the cybersecurity stories we were jealous of in 2025
It's the end of the year. That means it's time for us to celebrate the best cybersecurity stories we didn't publish. Since 2023, TechCrunch has looked back at the best stories across the board from the year in cybersecurity.
December 26, 2025Source

Internet — Security Issues — December 25th, 2025

AI-Driven Attacks and the Future of Security
Trend Micro's David Sancho on How AI Is Shaping Cyberthreats
December 25, 2025Source or Source or Source or Source

Breach Roundup: Spotify Metadata Dumped Online
Also: SudamericaData Leak, RaccoonO365 Arrest and Nefilim Conspirator Pleads Guilty
December 25, 2025Source or Source or Source or Source or Source

Cryptohack Roundup: FCA Outlines UK Crypto Rules
Also: Trader Loses $50M in USDT in Address Poisoning Scam
December 25, 2025Source or Source or Source or Source or Source

Reducing Cyber, Privacy Risks in Healthcare Sector M&As
Attorney Jonian Rafti of Proskauer on Top Considerations
December 25, 2025Source or Source or Source or Source or Source

US Energy Dept Flags AI, Cyber Gaps as Top Risks for 2026
New Report Says DOE Cyber and AI Governance Is Lagging Behind Rapid Deployment
December 25, 2025Source or Source

Internet — Security Issues — December 21st, 2025

How to Completely Uninstall McAfee Antivirus Easily
McAfee loves to hang around longer than invited. Here's how to remove it for good on Windows and Mac.
December 21, 2025Source

Internet — Security Issues — December 20th, 2025

Identity Theft Protection versus Antivirus: Where to Spend First
Malware wants your files. Scammers want your identity. Choose your fighter.
December 20, 2025Source

Russian hackers exploited misconfigured customer devices hosted on AWS for years, Amazon says
Amazon links sustained cyber campaign to Russia's GRU
December 20, 2025Source

Internet — Security Issues — December 19th, 2025

AI Security Firm Ciphero Emerges From Stealth With $2.5 Million in Funding
The startup's solution captures, verifies, and governs all AI interactions within an enterprise's environment.
December 19, 2025Source

AI-Generated Code Ships Faster, but Crashes Harder
Machine-Written Pull Requests Contain 70% More Bugs
December 19, 2025Source or Source or Source or Source or Source

Amazon confirms years-long Russian cyberattack against AWS customers' devices
The attack has been ongoing for half a decade.
December 19, 2025Source

ATM jackpotting gang accused of unleashing Ploutus malware across US
Latest charges join the mountain of indictments facing alleged Tren de Aragua members
December 19, 2025Source

Chinese APT 'LongNosedGoblin' Targeting Asian Governments
The hacking group has been using Group Policy to deploy cyberespionage tools on governmental networks.
December 19, 2025Source

Criminal IP and Palo Alto Networks Cortex XSOAR integrate to bring AI-driven exposure intelligence to automated incident response
Criminal IP, the AI-powered threat intelligence and attack surface monitoring platform developed by AI SPERA, is now officially integrated into Palo Alto Networks' Cortex XSOAR.
December 19, 2025Source

Denmark blames Russia for destructive cyberattack on water utility
Danish intelligence officials blamed Russia for orchestrating cyberattacks against Denmark's critical infrastructure, as part of Moscow's hybrid attacks against Western nations.
December 19, 2025Source or Source

Europe's AI Challenge Runs Deeper Than Regulation
Europe Faces Barriers No Legal Rewrite Can Fix
December 19, 2025Source or Source or Source or Source or Source

Fortifying Cloud Security Operations with AI-Driven Threat Detection
Transforming cloud security operations by leveraging predictive and intelligent automation for faster, smarter threat detection and response.
December 19, 2025Source

Hackers can take over your WhatsApp account with this sneaky trick
Other accounts that use this login method could be targeted this way, too.
December 19, 2025Source

Hacks, thefts, and disruption: The worst data breaches of 2025
Every year, TechCrunch looks back at the cybersecurity horror shows of the past 12 months — from the biggest data breaches to hacks resulting in weeks of disruption — to see what we can learn. This year, the data breaches were like nothing we've seen before.
December 19, 2025Source

HPE tells customers to patch fast as OneView RCE bug scores a perfect 10
Maximum-severity vuln lets unauthenticated attackers execute code on trusted infra management platform
December 19, 2025Source

Hundreds of Cisco customers are vulnerable to new Chinese hacking campaign, researchers say
On Wednesday, Cisco revealed that a group of Chinese government-backed hackers is exploiting a vulnerability to target its enterprise customers who use some of the company's most popular products.
December 19, 2025Source

In Other News: Docker AI Attack, Google Sues Chinese Cybercriminals, Coupang Hacked by Employee
Other noteworthy stories that might have slipped under the radar: Trump could use private firms for cyber offensive, China threat to US power grid, RaccoonO365 suspect arrested in Nigeria.
December 19, 2025Source

ISMG Editors: When KYC No Longer Signals Trust
Also: Cyber Insurers Brace for AI Risk, Shopping Agents Rewrite E-commerce
December 19, 2025Source or Source or Source or Source or Source

Italian Ferry Malware Attack Sparks International Probe
French intelligence agencies uncovered what appears to be a coordinated foreign interference operation targeting the GNV Fantastic.
December 19, 2025Source

Kirsten Davies Confirmed as Pentagon CIO
Former Unilever CISO to Lead Department of Defense IT
December 19, 2025Source or Source or Source or Source

Microsoft 365 accounts targeted in wave of OAuth phishing attacks
Multiple threat actors are compromising Microsoft 365 accounts in phishing attacks that leverage the OAuth device code authorization mechanism.
December 19, 2025Source

Microsoft's The Top Brand Scammers Use When Phishing For Clicks, Study Shows
Nearly as soon as the web was born, scammers were using it to con people out of their money. From foreign princes who need your help to reclaim their family fortunes to chain emails with embedded ransomware, there's no shortage of schemes deployed by those unscrupulous fraudsters. But one of the most tried and true is the Microsoft support scam, and new research conducted by a cybersecurity firm attests to its popularity.
December 19, 2025Source

New critical WatchGuard Firebox firewall flaw exploited in attacks
WatchGuard has warned customers to patch a critical, actively exploited remote code execution (RCE) vulnerability in its Firebox firewalls.
December 19, 2025Source

New UEFI flaw enables pre-boot attacks on motherboards from Gigabyte, MSI, ASUS, ASRock
The UEFI firmware implementation in some motherboards from ASUS, Gigabyte, MSI, and ASRock is vulnerable to direct memory access (DMA) attacks that can bypass early-boot memory protections.
December 19, 2025Source

Nigeria arrests dev of Microsoft 365 'Raccoon0365' phishing platform
The Nigerian police arrested three individuals linked to targeted Microsoft 365 cyberattacks via Raccoon0365 phishing platform
December 19, 2025Source

North Korea's Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers
Data from Chainalysis and Amazon offers a glimpse into North Korea's cyber activities surrounding cryptocurrency theft and fake IT workers.
December 19, 2025Source

North Korean infiltrator caught working in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location
A barely perceptible keystroke delay was the smoking gun that led to the uncovering of a malign imposter.
December 19, 2025Source

Over 25,000 FortiCloud SSO devices exposed to remote attacks
Internet security watchdog Shadowserver has found over 25,000 Fortinet devices exposed online with FortiCloud SSO enabled, amid ongoing attacks targeting a critical authentication bypass vulnerability.
December 19, 2025Source

Palo Alto Networks Fuels Google Cloud Pact to Guard AI Stack
Landmark Cybersecurity Deal Embeds Prisma AIRS in Google Cloud for AI Protection
December 19, 2025Source

Senate Intel Chair Warns of Open-Source Security Risks
Top Lawmaker Urges White House to Review Foreign Influence in Open-Source Code
December 19, 2025Source or Source or Source or Source or Source

Thailand Conference Launches International Initiative to Fight Online Scams
Similar pledges to fight scam networks were made by members of the Association of Southeast Asian Nations in the months leading up to the Bangkok conference.
December 19, 2025Source

UK Foreign Office Targeted by Hackers
Chinese Hacking Group Reportedly Behind the Hack
December 19, 2025Source or Source or Source or Source or Source

University of Sydney Data Breach Affects 27,000 Individuals
Downloaded from a code library, the information pertains to current and former staff and affiliates, and to alumni and students.
December 19, 2025Source

US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator
The exchange has been allegedly involved in laundering money for ransomware groups and other transnational cybercriminal organizations.
December 19, 2025Source

VPN systems targeted in mass attacks using a simple method that can lead to devastating results
A massive targeted campaign is taking place against sensitive VPN infrastructure.
December 19, 2025Source

Why a product-first approach can put security and reliability at risk
During my time in consulting and working across various companies, I've often noticed a disproportionate focus on product features. These are usually framed as the most important and urgent tasks, while other business priorities — such as technical maintenance, security, updating libraries and frameworks, or even internal tools that save employees time — are repeatedly postponed or marked as "for later."
December 19, 2025Source

Why Smart Glasses in Hospitals Are Not a Bright Idea
Garrett Zickgraf of LBMC on Privacy Risks of Meta Ray Ban Glasses and Similar Gear
December 19, 2025Source or Source or Source or Source or Source

Why You Should Switch These Accounts to Passkeys Before the New Year
Before you promise to jog more or drink less, fix the passwords that could ruin your year.
December 19, 2025Source

Zero Trust Model for Nonprofits: Protecting Mission in the Digital Age
Implement identity-first security to protect donor data, enable volunteers to work safely, and prevent costly cyber incidents.
December 19, 2025Source

Internet — Security Issues — December 15th, 2025

700Credit data breach impacts 5.8 million vehicle dealership customers
700Credit, a U.S.-based financial services and fintech company, will start notifying more than 5.8 million people that their personal information has been exposed in a data breach incident.
December 15, 2025Source or Source

2025's Top Phishing Trends and What They Mean for Your Security Strategy
2025 saw a huge amount of attacker innovation when it comes to phishing attacks, as attackers continue to double down on identity-based techniques. The continual evolution of phishing means it remains one of the most effective methods available to attackers today — in fact, it's arguably more effective than ever.
December 15, 2025Source

AI chatbot to help cybersecurity teams protect infrastructure
Experts led by Professor Carsten Maple at the University of Warwick's Cyber Security Center, have developed a new tool, called ICSThreatQA, to tackle the problem of cybersecurity breaches.
December 15, 2025Source

AI Governance Unlocks Speed, Not Bureaucracy
ServiceNow's Neeraj Jain on Risk Mitigation and Real-Time Data Access for AI Agents
December 15, 2025Source or Source or Source or Source or Source

Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw
Apple has released macOS and iOS updates to patch two WebKit zero-days exploited in an "extremely sophisticated" attack.
December 15, 2025Source

Apple, Google forced to issue emergency 0-day patches
Both admit attackers were already exploiting the bugs, with scant detail and hints of spyware-grade abuse
December 15, 2025Source

Astra introduces offensive-grade cloud vulnerability scanner to cut noise and prove risk
Astra Security announced the launch of its Cloud Vulnerability Scanner, a new solution designed to help organizations continuously maintain validated cloud security.
December 15, 2025Source

Atlassian Patches Critical Apache Tika Flaw
Atlassian has released software updates for Bamboo, Bitbucket, Confluence, Crowd, Fisheye/Crucible, and Jira.
December 15, 2025Source

China, Iran are having a field day with React2Shell, Google warns
Who hasn't exploited this max-severity flaw?
December 15, 2025Source

Conduent data breach exposed data of 10.5 million people, including Social Security numbers
The business services company has begun sending notices to impacted individuals.
December 15, 2025Source

Denmark takes a Viking swing at VPN-enabled piracy
Minister insists 'modest' bill is not an assault on privacy-preserving tech
December 15, 2025Source

Fastest VPN 2026: Expert picks of the top 5 VPN speed demons
If you have the need, the need for VPN speed, we've got recommendations about the best choices for you.
December 15, 2025Source

French Interior Ministry confirms cyberattack on email servers
The French Interior Minister confirmed on Friday that the country's Ministry of the Interior was breached in a cyberattack that compromised e-mail servers.
December 15, 2025Source

Google links more Chinese hacking groups to React2Shell attacks
​Over the weekend, ​Google's threat intelligence team linked five more Chinese hacking groups to attacks exploiting the maximum-severity "React2Shell" remote code execution vulnerability.
December 15, 2025Source or Source

Google's 'dark web report' feature will no longer be available starting in February
Google has revealed that its "dark web report" feature will be discontinued starting February 16, 2026. Launched initially about a year and a half ago, this tool aimed to help users monitor their personal information on the dark web.
December 15, 2025Source or Source

Illegal Downloads of 'One Battle After Another' Contain Dangerous Malware
The movie starts streaming at HBO Max on Dec. 19.
December 15, 2025Source

JLR: Payroll data stolen in cybercrime that shook UK economy
Automaker admits raid that crippled its factories in August led to the theft of sensitive info
December 15, 2025Source

Legal protection for ethical hacking under Computer Misuse Act is only the first step
I'm dreaming of a white hat mass
December 15, 2025Source

Microsoft will finally kill obsolete cipher that has wreaked decades of havoc
The weak RC4 for administrative authentication has been a hacker holy grail for decades.
December 15, 2025Source

Nation-State and Cybercrime Exploits Tied to React2Shell
2 More Vulnerabilities Need Patching in React Server Components, Warns Vercel
December 15, 2025Source or Source or Source or Source or Source

New SantaStealer malware steals data from browsers, crypto wallets
A new malware-as-a-service (MaaS) information stealer named SantaStealer is being advertised on Telegram and hacker forums as operating in memory to avoid file-based detection.
December 15, 2025Source

'One Battle After Another' torrents hide ultra-sophisticated malware
Anyone currently trying to download Leonardo DiCaprio 'One Battle After Another" runs the risk of infecting their PC with malware. Security researchers explain what you need to watch out for.
December 15, 2025Source

Ongoing SoundCloud issue blocks VPN users with 403 server error
Users accessing the SoundCloud audio streaming platform through a virtual private network (VPN) connection are denied access to the service and see a 403 'forbidden' error.
December 15, 2025Source

PornHub extorted after hackers steal Premium member activity data
Adult video platform PornHub is being extorted by the ShinyHunters extortion gang after the search and watch history of its Premium members was reportedly stolen in a recent Mixpanel data breach.
December 15, 2025Source

ServiceNow mulls buying Armis to gain full visibility into the IT stack
If the buy happens, the big question is will they integrate the codebase or keep it separate?
December 15, 2025Source or Source

Soverli Raises $2.6 Million for Secure Smartphone OS
The sovereign smartphone OS runs along Android or iOS, allowing users to switch between secure, isolated environments.
December 15, 2025Source

Third DraftKings Hacker Pleads Guilty
Nathan Austad admitted in court to launching a credential stuffing attack against a fantasy sports and betting website.
December 15, 2025Source

Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
Apple has issued security updates with fixes for two WebKit vulnerabilities (CVE-2025-14174, CVE-2025-43529) that have been exploited as zero-days.
December 15, 2025Source

What Cloudflare's 2025 internet review says about attacks, outages, and traffic shifts
The internet stayed busy, brittle, and under constant pressure in 2025. Cloudflare's annual Radar Year in Review offers a wide view of how traffic moved, where attacks clustered, and what failed when systems were stressed.
December 15, 2025Source

Why ServiceNow Is Eyeing a $7B Buy of Venture-Backed Armis
Deal Would Move ServiceNow's Cybersecurity Ambitions From the Shadow to Spotlight
December 15, 2025Source or Source or Source or Source

Youth Sports, NCAA Insurance Claims Potentially Hacked
National Accident Health Says Breach Exposed Medical Info of 181,000 People
December 15, 2025Source or Source or Source or Source

Internet — Security Issues — December 12th, 2025

Best VPNs for streaming 2025: Open up film and TV libraries worldwide with my favorite VPNs
If you want to access your favorite streaming services from different locations, a VPN might help. Check out my favorites for the fastest speeds and most servers.
December 12, 2025Source

Coupang data breach traced to ex-employee who retained system access
A data breach at Coupang that exposed the information of 33.7 million customers has been tied to a former employee who retained access to internal systems after leaving the company.
December 12, 2025Source

Data breach at credit check giant 700Credit affects at least 5.6 million
At least 5.6 million people had their names, addresses, dates of birth, and Social Security numbers stolen in a data breach at 700Credit, a company that runs credit checks and identity verification services for auto dealerships across the United States.
December 12, 2025Source

EFF and 12 Organizations Urge UK Politicians to Drop Digital ID Scheme Ahead of Parliamentary Petition Debate
The UK Parliament convened earlier this week to debate a petition signed by 2.9 million people calling for an end to the government's plans to roll out a national digital ID. Ahead of that debate, EFF and 12 other civil society organizations wrote to politicians in the country urging MPs to reject the Labour government's newly announced digital ID proposal.
December 12, 2025Source

Elastic Makes On-Demand Training Free to Everyone
Elastic Is Scaling Security Training With Modular Learning, Hands-On Skills-Building
December 12, 2025Source or Source or Source or Source

Europe's Quest for a Domestic Alternative to US Hyperscalers
Europe Tries, Tries Again Amid Transatlantic Uncertainty
December 12, 2025Source or Source or Source or Source

Fieldtex, TriZetto Reveal New Healthcare Breaches
Companies Are Among the Latest HIPAA Business Associates Revealing Recent Hacks
December 12, 2025Source or Source

Financial sector hit hard by breaches but ransomware seeks targets elsewhere
The banking, financial services and insurance (BFSI) sector has been the most targeted in 2025 accounting for 17.8 percent of all incidents (172 incidents out of 966) tracked in Cyble's latest North American Threat Landscape Report.
December 12, 2025Source

Firewalla Orange brings zero trust anywhere
Firewalla announced Firewalla Orange, a portable multi-gigabit cybersecurity firewall and Wi-Fi 7 router designed to reset expectations for how networks should be protected. Firewalla Orange delivers more than 2 gigabits of packet processing performance and brings enterprise grade zero trust security to both stationary and mobile environments in a form factor small enough to fit in a jacket pocket.
December 12, 2025Source

Flaw in photo booth maker's website exposes customers' pictures
A company that makes photo booths is exposing pictures and videos of its customers online thanks to a simple flaw in its website where the files are stored, according to a security researcher.
December 12, 2025Source

Gladinet CentreStack Flaw Exploited to Hack Organizations
Threat actors have hacked at least nine organizations by exploiting the recently patched Gladinet CentreStack flaw.
December 12, 2025Source

Google and Apple roll out emergency security updates after zero-day attacks
Apple and Google have released several software updates to protect against a hacking campaign targeting an unknown number of their users.
December 12, 2025Source

Hackers are pretending to be cops — and tech companies keep falling for it
A coordinated doxing group has repeatedly impersonated police officers to retrieve user data from tech firms
December 12, 2025Source

Half of exposed React servers remain unpatched amid active exploitation
Wiz says React2Shell attacks accelerating, ranging from cryptominers to state-linked crews
December 12, 2025Source

Home Depot exposed access to internal systems for a year, says researcher
A security researcher said Home Depot exposed access to its internal systems for a year after one of its employees published a private access token online, likely by mistake. The researcher found the exposed token and tried to privately alert Home Depot to its security lapse but was ignored for several weeks.
December 12, 2025Source

How self-governing identity infrastructure can streamline policy enforcement [Q&A]
Managing identity is one of the more challenging cybersecurity tasks and can soak up a good deal of time and resources.
December 12, 2025Source

How the Hacking World Has Changed: 'All Tech is Political'
Black Hat's Jeff Moss: 'We're in a Political Situation, Whether You Like It or Not'
December 12, 2025Source or Source or Source or Source or Source

ImmuniWeb enhances AI vulnerability testing and compliance reporting
ImmuniWeb has unveiled a major update to its ImmuniWeb AI Platform, based on ongoing research as well as valuable feedback from customers and partners in over 50 countries.
December 12, 2025Source

ISMG Editors: Abandoned Identities Fuel Shadow Market
Also: Australia's AI Policy Backtrack, Legal Protections for White Hat Hackers
December 12, 2025Source or Source

Microsoft promises more bug payouts, with or without a bounty program
Critical vulnerabilities found in third-party applications eligible for award under 'in scope by default' move
December 12, 2025Source or Source or Source

Microsoft RasMan DoS 0-day gets unofficial patch - and a working exploit
Exploit hasn't been picked up by any malware detection engines, CEO tells The Reg
December 12, 2025Source

MITRE shares 2025's top 25 most dangerous software weaknesses
MITRE has shared this year's top 25 list of the most dangerous software weaknesses behind over 39,000 security vulnerabilities disclosed between June 2024 and June 2025.
December 12, 2025Source or Source

Monitoring the Electric Grid Is Easier Said Than Done
New Rules Tell Power Grid Operators to Log All OT Network Traffic
December 12, 2025Source or Source or Source

New React vulns leak secrets, invite DoS attacks
And the earlier React2Shell patch is vulnerable
December 12, 2025Source

New Windows RasMan zero-day flaw gets free, unofficial patches
Free unofficial patches are available for a new Windows zero-day vulnerability that allows attackers to crash the Remote Access Connection Manager (RasMan) service.
December 12, 2025Source

Notepad++ Patches Updater Flaw After Reports of Traffic Hijacking
Notepad++ found a vulnerability in the way the software updater authenticates update files.
December 12, 2025Source

One in 25 digital identity checks flagged as fraudulent
Regulatory tightening across the EU and UK, including the EU's new anti-money laundering package and platform-economy rules, as well as emerging age-assurance requirements around online safety, have pushed organizations to formalize identity checks at scale.
December 12, 2025Source

Processing 630 Million More Pwned Passwords, Courtesy of the FBI
The sheer scope of cybercrime can be hard to fathom, even when you live and breathe it every day. It's not just the volume of data, but also the extent to which it replicates across criminal actors seeking to abuse it for their own gain, and to our detriment.
December 12, 2025Source

Recent GeoServer Vulnerability Exploited in Attacks
Because user input is not sufficiently sanitized, attackers could exploit the flaw to define external entities within an XML request.
December 12, 2025Source

Saviynt Gets $700M at $3B Valuation to Fuel Identity Defense
KKR-Led Series B Investment Propels AI Agent, Nonhuman Identity Management Push
December 12, 2025Source or Source

Shadow spreadsheets: The security gap your tools can't see
Your IT team just wrapped an exhaustive security test. The network is locked down. Your organization's tech stack has MFA enforced across the board. Employees just finished anti-phishing training.
December 12, 2025Source

Swissbit adds HID Seos to iShield Key 2
Swissbit is expanding its portfolio of multi-application security keys with the launch of the iShield Key 2, introducing a new variant featuring HID Seos, one of the most widely used credential technologies for physical access control. Following the addition of MIFARE DESFire EV3, Swissbit now supports another major global standard, offering customers a single token that unifies phishing-resistant digital authentication and secure physical access.
December 12, 2025Source

The best security keys you can buy: These physical devices secure the keys to your online kingdom
Security keys are the ultimate physical security measure for protecting your online accounts. We tested and ranked the best security keys on the market today.
December 12, 2025Source

Trump Targets State AI Regulations in Federal Override Push
Trump Tees Up Federal Lawsuits Against State Rules in Executive Order
December 12, 2025Source or Source or Source

U.S. Government Websites Are Hosting PDFs Promoting Porn and Scams
Not exactly a public service.
December 12, 2025Source

Uncle Sam sues ex-Accenture manager over Army cloud security claims
Justice Department alleges federal auditors were misled over compliance with FedRAMP and DoD requirements
December 12, 2025Source

UK ICO Fines LastPass Over 2022 Data Breach
Password Manager Must Pay 1.2M Pounds
December 12, 2025Source or Source

US Military Cyber Budget Jumps to $15B in 2026 NDAA
Defense Bill Expands Cyber Authorities, Tech Adoption and Talent Pipeline
December 12, 2025Source or Source or Source

US Warns of Ongoing Pro-Russia Critical Infrastructure Hacks
Ukrainian National Twice Indicted in Los Angeles for Pro-Russian Hacking
December 12, 2025Source or Source or Source or Source or Source

User privacy in digital databases: New metric allows for more accurate assessment
Universidad Carlos III de Madrid (UC3M), in collaboration with the National Cybersecurity Institute (INCIBE), an entity under the Ministry for Digital Transformation and Public Administration through the Secretariat of State for Telecommunications and Digital Infrastructure, have promoted the development of a new probabilistic metric designed to more accurately measure the level of privacy and protection that users have in different databases.
December 12, 2025Source

Internet — Security Issues — December 11th, 2025

Beware Of DroidLock Malware That Hijacks Android Devices To Extort Ransom Money
The holidays may be upon us, but that isn't slowing down threat actors. Zimperium's zlabs research team has discovered a new piece of malware targeting Android users, dubbed DroidLock, that aims to completely hijack a device and enable the theft of login credentials or destruction of a victim's data.
December 11, 2025Source

Breach Roundup: DPRK-Linked EtherRAT Targets React2Shell
Also, Dutch Defend the Nexperia Takeover, Hikvision Challenges FCC, Qilin Strikes
December 11, 2025Source or Source or Source or Source or Source

Cryptohack Roundup: Android Chips Hot Wallet Attack
Also: 700M Euro Fraud Busted, 2 Arrested in Crypto-Linked Killing Case
December 11, 2025Source or Source or Source or Source

Georgia Hospital Settles Lawsuit in Alleged Embargo Hack
Class Members Can Claim Up to $5K Each for Documented Losses Tied to Breach
December 11, 2025Source or Source

Hackers exploit Gladinet CentreStack cryptographic flaw in RCE attacks
Hackers are exploiting a new, undocumented vulnerability in the implementation of the cryptographic algorithm present in Gladinet's CentreStack and Triofox products for secure remote file access and sharing.
December 11, 2025Source

How much for a bot army? Index tracks prices across hundreds of online platforms, from TikTok to Amazon
A new site that tracks the daily fluctuating costs behind building a bot army on over 500 social media and commercial platforms—from TikTok to Amazon and Spotify—in every nation on the planet is launched today by the University of Cambridge.
December 11, 2025Source

How to Talk to the Board About Agentic AI
Ex-Mastercard Exec JoAnn Stonier on Redefining Governance, ROI and Decision-Making
December 11, 2025Source or Source or Source

Best malware removal software 2025: Wipe malware from your PC and smartphone with our top picks
If you need to eradicate malware from your device, check out our favorite, tried-and-tested solutions that can easily deal with spyware, Trojans, and more.
December 11, 2025Source

New gamified tool helps defend satellite supply chains from cyber threats
As the world's reliance on satellites intensifies, so too does the risk of sophisticated cyberattacks targeting space-based systems and critical infrastructure, with almost 240 cyber hacks targeting the space sector in the past two years.
December 11, 2025Source

Notepad++ fixes flaw that let attackers push malicious update files
Notepad++ version 8.8.9 was released to fix a security weakness in its WinGUp update tool after researchers and users reported incidents in which the updater retrieved malicious executables instead of legitimate update packages.
December 11, 2025Source

UK ICO Fines LastPass Over 2022 Data Breach
Password Manager Must Pay 1.2M Pounds
December 11, 2025Source or Source or Source

Malicious VSCode Marketplace extensions hid trojan in fake PNG file
A stealthy campaign with 19 extensions on the VSCode Marketplace has been active since February, targeting developers with malware hidden inside dependency folders.
December 11, 2025Source

OpenAI Braces for AI Models That Could Breach Defenses
AI Firm Says New Models May Be 'High Risk' as Dual-Use Capabilities Grow
December 11, 2025Source or Source or Source or Source or Source

Russian hackers debut simple ransomware service, but store keys in plain text
Operators accidentally left a way for you to get your data back
December 11, 2025Source

Russian Ring Using Ex-Immigrant Data to Fuel Fake ID Sales
Telegram-Based Market Is Exploiting Gaps in US Tracking of Departed Visa Holders
December 11, 2025Source or Source or Source or Source or Source

Saviynt Gets $700M at $3B Valuation to Fuel Identity Defense
KKR-Led Series B Investment Propels AI Agent, Nonhuman Identity Management Push
December 11, 2025Source or Source or Source

Should you stop logging in through Google and Facebook? Consider these SSO risks versus benefits
Relying on consumer SSO creates significant challenges, and passkeys may offer a solution.
December 11, 2025Source

The 12 most common internet scams to be aware of in 2025
Be careful out there, folks.
December 11, 2025Source

Unpatched Gogs Zero-Day Exploited for Months
The exploited flaw allows attackers to overwrite files outside the repository, leading to remote code execution.
December 11, 2025Source

Why Isn't Online Age Verification Just Like Showing Your ID In Person?
This blog also appears in our Age Verification Resource Hub: our one-stop shop for users seeking to understand what age-gating laws actually do, what's at stake, how to protect yourself, and why EFF opposes all forms of age verification mandates. Head to EFF.org/Age to explore our resources and join us in the fight for a free, open, private, and yes—safe—internet.
December 11, 2025Source

Wide Range of Malware Delivered in React2Shell Attacks
Security firms have seen cryptocurrency miners, Linux backdoors, botnet malware, and various post-exploitation implants in React2Shell attacks.
December 11, 2025Source

Your Stolen WinRAR Copy Is Being Actively Exploited In The Wild, Patch ASAP
Those of you using WinRAR, Windows 10, or both should be on high alert. Two new vulnerabilities have been documented in the wild and are being actively exploited. As of this week, The National Coordinator for Critical Infrastructure Security and Resilience (CISA) has documented CVE-2025-6218 and CVE-2025-6222, two currently-active attack vectors. Alongside its public disclosure of the issues, CISA has also ordered all United States federal agencies to address these vulnerabilities by December 30th.
December 11, 2025Source

Zero Day: 700 Instances of Self-Hosted Git Service Exploited
Unpatched Flaw in Open-Source Gogs Service Facilitates Remote Code Execution
December 11, 2025Source or Source or Source or Source or Source

Internet — Security Issues — December 5th, 2025

23andMe to Get $16.5M in Unused Cyber Insurance
Bankrupt Firm Plans to Use the Settlement Money to Pay Off Cyber Claims
December 5, 2025Source or Source or Source or Source or Source

A Practical Guide to Continuous Attack Surface Visibility
Most organizations are familiar with the traditional approach to external visibility: rely on passive internet-scan data, subscription-based datasets, or occasional point-in-time reconnaissance to understand what they have facing the public internet. These sources are typically delivered as static snapshots of lists of assets, open ports, or exposures observed during a periodic scan cycle.
December 5, 2025Source

AI Is Getting Better at Hacking Crypto's Smart Contracts
And the arguments have already started.
December 5, 2025Source

Aisuru Botnet Powers Record DDoS Attack Peaking at 29 Tbps
Cloudflare recently mitigated a new record-breaking Aisuru attack that peaked at 14.1 Bpps.
December 5, 2025Source

Android Malware Albiriox: Dangerous New Threat That Can Empty Your Bank Account
Researchers have uncovered a new Android RAT malware called Albiriox that can hijack banking and crypto apps to steal money directly from users. It spreads through malicious APKs shared via messaging apps, but avoiding sideloaded apps and sticking to trusted sources can keep users protected.
December 5, 2025Source or Source

Apple issues huge state-backed hacking warning to users worldwide
Apple, which pioneered cyber threat notifications in 2021 to alert users of potential state-sponsored spyware attacks, and follower Google, which eventually followed suit with its own similar program in 2023, have sent a new round of such warnings to users around the world this week. The companies announced their latest effort to insulate customers against surveillance threats.
December 5, 2025Source

Asus supplier hit by ransomware attack as gang flaunts alleged 1 TB haul
Laptop maker says a vendor breach exposed some phone camera code, but not its own systems
December 5, 2025Source

Beijing-linked hackers are hammering max-severity React bug, AWS warns
State-backed attackers started poking flaw as soon as it dropped -- anyone still unpatched is on borrowed time
December 5, 2025Source

Bots, bias, and bunk: How can you tell what's real on the net?
You can improve the odds by combining skepticism, verification habits, and a few technical checks
December 5, 2025Source

Check Point introduces Quantum Firewall R82.10 with new AI and zero trust security capabilities
Check Point announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments, and simplify zero trust across hybrid networks.
December 5, 2025Source

Chinese Nation-State Groups Tied to 'React2Shell' Targeting
Validated, Weaponized Exploit Code for Widely Used Web Framework Bug Now Public
December 5, 2025Source or Source or Source or Source

Critical React2Shell flaw actively exploited in China-linked attacks
Multiple China-linked threat actors began exploiting the React2Shell vulnerability (CVE-2025-55182) affecting React and Next.js just hours after the max-severity issue was disclosed.
December 5, 2025Source

CrowdStrike Identifies New China-Nexus Espionage Actor
CrowdStrike's investigation shows that WARP PANDA initially infiltrated some victim networks as early as late 2023, later expanding operations.
December 5, 2025Source

ExpressVPN versus NordVPN: Clash of the heavyweight titans
In the red corner we have ExpressVPN and in the blue corner we have NordVPN.
December 5, 2025Source

FBI warns of virtual kidnapping scams using altered social media photos
The FBI warns of criminals altering images shared on social media and using them as fake proof of life photos in virtual kidnapping ransom scams.
December 5, 2025Source

Don't Be Overwhelmed. Changing Your IP Address Is Easy With These Methods, Like Using a VPN
You can use various techniques, such as a VPN or proxy server, to quickly and easily change your IP address.
December 5, 2025Source

Helmet Security Emerges From Stealth Mode With $9 Million in Funding
Helmet Security has built an end-to-end platform that secures the infrastructure for agentic AI communication.
December 5, 2025Source

Imper.ai Emerges From Stealth Mode With $28 Million in Funding
The cybersecurity startup detects impersonation risk in real-time, across video, phone, and chat communication.
December 5, 2025Source

In Other News: X Fined €120 Million, Array Flaw Exploited, New Iranian Backdoor
Other noteworthy stories that might have slipped under the radar: Akamai patches HTTP smuggling vulnerability, Claude Skills used to execute ransomware, PickleScan flaws.
December 5, 2025Source

ISMG Editors: Inside the Rapid Evolution of Ransomware
Also: More HIPAA Challenges, the Growing AI Gap for Small- to Medium-Sized Firms
December 5, 2025Source or Source

Lumia Security Raises $18 Million for AI Security and Governance
The startup will invest in expanding its engineering and research teams, deepening product integrations, and scaling go-to-market efforts.
December 5, 2025Source

No Vote, No Leader: CISA Faces 2026 Without a Director
US Cyber Defense Agency Faces Procedural Delays Blocking Director Confirmation
December 5, 2025Source or Source or Source or Source or Source

Paranoia rules -- how automation can enable better detection and response [Q&A]
Security analysts want to capture more events in order to spot threats earlier which requires more detection rules. But doing so risks driving up alert volumes leading to issues with alert fatigue.
December 5, 2025Source

Pharma firm Inotiv discloses data breach after ransomware attack
American pharmaceutical firm Inotiv is notifying thousands of people that their personal information was stolen in an August 2025 ransomware attack.
December 5, 2025Source

React Flaw Mitigation Leads to Cloudflare Outage
Outage Briefly Took Down Zoom, LinkedIn and Other Websites
December 5, 2025Source or Source or Source or Source

Rethinking the CIO-CISO Dynamic in the Age of AI
Enterprises Are Reimagining Org Roles, Risk Management and Skillsets in the AI Race
December 5, 2025Source or Source or Source or Source or Source

Threats improve to slip past firewalls and filters
The latest Cyber Threat Intelligence Report from Hoxhunt looks at the quantity and quality of threats that bypass firewalls and email filters.
December 5, 2025Source or Source

UK pushes ahead with facial recognition expansion despite civil liberties backlash
Plan would create statutory powers for police use of biometrics, prompting warnings of mass surveillance
December 5, 2025Source

US Organizations Warned of Chinese Malware Used for Long-Term Persistence
Warp Panda has been using the BrickStorm, Junction, and GuestConduit malware in attacks against US organizations.
December 5, 2025Source

Internet — Security Issues — December 3rd, 2025

A leading kids safety bill has been poison pilled, supporters say
Advocates warn that overriding state laws is worse than doing nothing at all.
December 3, 2025Source

Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack
In just three months, the massive Aisuru botnet launched more than 1,300 distributed denial-of-service attacks, one of them setting a new record with a peak at 29.7 terabits per second.
December 3, 2025Source

Arizona Attorney General Sues Chinese Online Retailer Temu Over Data Theft Claims
Arizona is the latest state to sue Temu and its parent company PDD Holdings over allegations that the Chinese online retailer is stealing customers' data.
December 3, 2025Source

ASUS Listed by Everest Ransomware Group, 1 TB Data Stolen
The Everest ransomware group claims it has breached ASUS and stolen more than 1 TB of internal data, including what it describes as "camera source code." The allegation was posted on the group's dark-web leak site on December 2. Everest says the data includes internal documents, engineering material, and other confidential files, and is demanding that ASUS contact them via the encrypted platform Qtox. No ransom amount has been disclosed. In this context, "camera source code" likely refers to firmware or low-level software used in ASUS devices with integrated cameras (smartphones, laptops) such as drivers, applications related to image processing, or internal developer tools.
December 3, 2025Source

Australia Abandons Proposed Mandatory AI Rules in New Plan
Government Opts for Voluntary Frameworks Over Enforceable Safeguards
December 3, 2025Source or Source or Source or Source or Source

AVG Internet Security for Mac review: Solid protection, but the free version could be enough
We test AVG Internet Security for Mac and find it easy to use and effective at catching viral, phishing, and malware activity on a Mac.
December 3, 2025Source

AWS: Shifting From Cloud-Based Apps to an Agentic AI Cloud
CEO Matt Garman Shares Plans for Developing Billions of Autonomous Agents
December 3, 2025Source or Source or Source or Source or Source

Bitwarden Access Intelligence helps enterprises take action on risky credentials
Bitwarden announced Bitwarden Access Intelligence for Enterprise plans. Access Intelligence provides visibility into weak, reused, or exposed credentials across critical applications, with guided remediation workflows for consistent credential updates at scale.
December 3, 2025Source

BlackFog releases ADX Vision to block data loss from unapproved AI use
BlackFog announced the availability of its newest solution, ADX Vision. Designed to secure every endpoint and every LLM interaction, ADX Vision gives organizations the visibility and control needed to manage AI securely. Operating directly on the device, it detects shadow AI activity, prevents unauthorized data movement in real time, and enforces governance policies automatically without disrupting productivity.
December 3, 2025Source

China Skirts US Attempts to Restrict AI Exports
China Still Relies on US Technology, Experts tell Senate
December 3, 2025Source or Source or Source or Source or Source

CISA Warns of Severe Flaws in Nuclear Med Tracking Software
Mirion Medical Says Bugs Are Fixed in New Release of BioDose/NMIS Software
December 3, 2025Source or Source or Source or Source or Source

Codex Bug Let Repo Files Execute Hidden Commands
Attackers Could Hijack Developer Machines via Tampered Config Files
December 3, 2025Source or Source or Source or Source

Critical King Addons Vulnerability Exploited to Hack WordPress Sites
A critical-severity vulnerability in the King Addons for Elementor plugin for WordPress has been exploited to take over websites.
December 3, 2025Source

Deep dive into DragonForce ransomware and its Scattered Spider connection
Security researchers have conducted an in-depth analysis of DragonForce ransomware that initially emerged in 2023 and has since evolved into what it calls a "ransomware cartel."
December 3, 2025Source

FBI Flags Rising Holiday Scams Spreading Across Email, Social, and Web
The FBI warns holiday scammers are hitting email, social media, fake sites, delivery alerts, and calls, with new data showing losses and complaints rising.
December 3, 2025Source

Fintech firm Marquis alerts dozens of US banks and credit unions of a data breach after ransomware attack
Fintech company Marquis is notifying dozens of U.S. banks and credit unions that they had customer data stolen in a cyberattack earlier this year.
December 3, 2025Source

How to use your security camera's 2-way audio (without being weird about it)
Two-way audio is more useful than most people realize. Here's how to use it without creating awkward moments or safety risks.
December 3, 2025Source

HTB AI Range benchmarks the safety and limits of autonomous security agents
Hack The Box (HTB) unveiled HTB AI Range, a controlled AI cyber range built to test and benchmark the safety, limits, and capabilities of autonomous AI security agents. HTB AI Range replicates live, high stakes cyber battlegrounds tailored for enterprise readiness, where AI agents and human operators are evaluated side by side. Every model and every human is tested, refined, and retested until mastery is measurable.
December 3, 2025Source

Implementing Zero Trust on Google Cloud
This is a guide to implementing Zero Trust on Google Cloud using IAM, access controls, Deny Policies, Principal Access Boundaries, and policy monitoring.
December 3, 2025Source

Is your PC secretly trapped in a botnet? This free tool checks instantly
Have hackers secretly taken over your computer, router, or another device for a botnet? This free online scanner can tell you right away.
December 3, 2025Source

Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
Class Action Litigation Alleges Web Trackers Shared Patient Data With Tech Firms
December 3, 2025Source or Source or Source or Source or Source

Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say
A sprawling network that's seemingly maintained to serve (illegal) online gambling opportunities and deliver malware to Indonesian citizens is likely also being used to provide threat actors command and control (C2) and anonymity services.
December 3, 2025Source

Microsoft Silently Mitigated Exploited LNK Vulnerability
Windows now displays in the properties tab of LNK files critical information that could reveal malicious code.
December 3, 2025Source

Mobile security gaps revealed by BYOD and hybrid work
Organizations face massive mobile security vulnerabilities as they increasingly embrace BYOD and hybrid strategies. At the same time traditional mobile security tools are failing to mitigate these risks while also compromising employee privacy.
December 3, 2025Source

New Joint Guide Advances Secure Integration of Artificial Intelligence in Operational Technology
Guidance empowers organizations to mitigate risks and achieve a balanced integration of AI in OT systems for OT environments that control vital public services
December 3, 2025Source

Niobium Raises $23 Million for FHE Hardware Acceleration
The startup will invest the funds in accelerating development of its second-generation fully homomorphic encryption (FHE) platforms.
December 3, 2025Source

Penn and Phoenix Universities Disclose Data Breach After Oracle Hack
The University of Pennsylvania and the University of Phoenix confirm that they are victims of the recent Oracle EBS hacking campaign.
December 3, 2025Source

re:Invent 2025: AWS and Security Vendors Unveil New Products and Capabilities
AWS and cybersecurity vendors have made several announcements at the cloud giant's re:Invent 2025 event.
December 3, 2025Source

Salt Security identifies external misuse and abuse of MCP servers by AI agents
Salt Security announced it is extending its API behavioral threat protection to detect and block malicious intent targeting Model Context Protocol (MCP) servers deployed within the AWS ecosystem.
December 3, 2025Source

Scaling AI From Copilots to Agentic Workflows
Kyndryl CIO Kim Basile on Human-Centered Adoption, Role-Based Training, Governance
December 3, 2025Source or Source or Source or Source or Source

ServiceNow to Acquire Identity Security Firm Veza in Reported $1 Billion Deal
Veza Security was recently valued at more than $800 million after raising $108 million in Series D funding.
December 3, 2025Source

ShadyPanda Malware Patiently Spread Across Edge And Chrome Web Store For Years Before Activating
ShadyPanda is a nasty project that has been running invisibly for years only to attempt to unleash devastation this year. The group behind it has been publishing useful apps to both the Chrome Web Store and the Edge marketplace, some apps gaining Featured and Verified status on those platforms. The apps were handy tools which were downloaded millions of times and got many great reviews on both stores. The group behind ShadyPanda was even nice enough to keep those apps updated as new versions of the browsers came out and bugs were discovered.
December 3, 2025Source

Thousands of Computer Viruses Are Created Every Day. Here's How to Protect Your Computer From Cyberattacks
Use these strategies to keep your computer safe from viruses and other threats.
December 3, 2025Source

US Telecoms Reject Regulation as Answer to Chinese Hacking
Industry Wants to Stick to Voluntary Measures
December 3, 2025Source or Source or Source

University of Phoenix discloses data breach after Oracle hack
The University of Phoenix (UoPX) has joined a growing list of U.S. universities breached in a Clop data theft campaign targeting vulnerable Oracle E-Business Suite instances in August 2025.
December 3, 2025Source

Utilities Warn US Grid at Risk as Federal Cyber Funds Dry Up
Federal Cuts Threaten Grid Security as Nation-State Hackings Escalate, Analysts Say
December 3, 2025Source or Source or Source or Source or Source

Wasabi Covert Copy strengthens cloud storage security
Wasabi has expanded its cyber resilient cloud storage capabilities with Covert Copy, a patent pending, ransomware-resistant storage solution that allows users to create a locked, hidden copy of storage buckets to ensure critical data remains untouchable, even in the event of a cyberattack.
December 3, 2025Source

WASM in the Enterprise: Secure, Portable, and Ready for Business
Andrea Peruffo explains the power of server-side WebAssembly, especially on the JVM. Using Red Hat's Chicory runtime, he details how to achieve secure sandboxing, fault isolation, and cross-architecture portability without foreign function interfaces. Learn through case studies how WebAssembly solves real-world enterprise problems, including achieving 10x - 40x speedups with AOT compilation.
December 3, 2025Source

Watch your favorite shows from home with Norton VPN
Watch what you want, when you want, where you want, with Norton VPN.
December 3, 2025Source

When ERP Systems Become the Attack Surface
Skills Needed: Enterprise Architecture, Configuration and Vulnerability Management
December 3, 2025Source

Yes, the government can track your location, but usually not by spying on you directly
If you use a mobile phone with location services turned on, it is likely that data about where you live and work, where you shop for groceries, where you go to church and see your doctor, and where you traveled to over the holidays is up for sale. And U.S. Immigration and Customs Enforcement is one of the customers.
December 3, 2025Source

Internet — Security Issues — November 30th, 2025

5 Simple Habits That Instantly Make You Safer Online
The digital ecosystem is a place filled to the brim with opportunities and entertainment. Learning, gaming, and even entire jobs live online today. Modern internet users can work, study, and interact with friends in absentia with the help of a basic internet connection and a device they trust. That trust part is where the modern internet gets a little murky, though. For one thing, cookies and other seemingly harmless little bits of digital interaction come together to create a surprisingly comprehensive digital profile of every user. Bring in data brokers, and it's actually quite easy to find that your personal data has been spread out across the internet. Removing it isn't all that difficult, but it does take vigilance, and often the help of a scrubbing service.
November 30, 2025Source

2025's Most Common Passwords Are Hilariously Easy To Guess
It would appear that Gen Z is no more tech-savvy than Baby Boomers when it comes to cybersecurity, according to new research released by the password management program Nordpass. Working with a related cybersecurity site Nordstellar, NordPass pulled data from public breaches and dark web repositories between September 2024 and September 2025. The methodology isn't entirely clear (NordPass doesn't specify if this is just their user base or a broader sample.), but the findings paint an interesting picture: When it came to setting passwords, 18-year-olds and 80-year-olds weren't so different.
November 30, 2025Source

Best VPN for Chromebooks for 2025: Keep your Browsing Habits and Streaming Activity Private
The best Chromebook VPNs add an extra layer of privacy while browsing the web or unblocking streaming content.
November 30, 2025Source

Best VPN for iPhone 2025: Boost Your Privacy on the Go
Enhance your privacy while surfing the web, stream foreign Netflix libraries, unblock regional sports and avoid mobile traffic shaping with the best iPhone VPNs.
November 30, 2025Source

Best VPN for Mac for 2025: Improve Your Privacy for Web Browsing, Streaming and Gaming
Keep your web browsing activity hidden, mask your torrenting activity and unblock geo-protected streaming content with the best VPNs for Mac.
November 30, 2025Source

Swiss government says give M365, and all SaaS, a miss as it lacks end-to-end encryption
PLUS: Exercise app tells spies to stop mapping; GitLab scan reveals 17,000 secrets; Leak exposes Iran's Charming Kitten; And more!
November 30, 2025Source

Week in review: Fake "Windows Update" fuels malware, Salesforce details Gainsight breach
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
November 30, 2025Source

Internet — Security Issues — November 29th, 2025

Best VPN for Chrome 2025: Keep Your Browsing Traffic Private
The best VPNs for Google Chrome protect your privacy while browsing the web and allow you to bypass geographical restrictions with ease.
November 29, 2025Source

Definitely Use a Password Manager, but Know It Can't Protect You From These 5 Things
A password manager is an essential tool for your online security, but it shouldn't be where your cybersecurity awareness ends.
November 29, 2025Source

I'm a Digital Nomad and These Are the 6 VPN Rules I Swear By
Two cybersecurity professionals shared their top six tips for frequent travelers or digital nomads, like me, to safely protect client data and personal privacy while working as a digital nomad.
November 29, 2025Source

Japanese beer giant Asahi says data breach hit 1.5 million people
Asahi Group Holdings, Japan's largest beer producer, has finished the investigation into the September cyberattack and found that the incident has impacted up to 1.9 million individuals.
November 29, 2025Source

Internet — Security Issues — November 26th, 2025

A CISO's Perspective on Scaling GenAI Securely
Going Beyond the Copilot Pilot - A CISO's Perspective
November 23, 2025Source or Source or Source or Source or Source

Account Takeover Fraud Caused $262 Million in Losses in 2025: FBI
Cybercriminals impersonating financial institutions have targeted individuals, businesses, and organizations of different sizes.
November 23, 2025Source

Akira's SonicWall Hacks Are Taking Down Large Enterprises
Businesses That Inherit SSL VPNs Through M&A Activity Falling Victim, Warn Experts
November 23, 2025Source or Source or Source or Source

ASUS warns of new critical auth bypass flaw in AiCloud routers
ASUS has released new firmware to patch nine security vulnerabilities, including a critical authentication bypass flaw in routers with AiCloud enabled.
November 23, 2025Source

Backgrounder: Malicious cyber activity targeting Canadian critical infrastructure
Canada's critical infrastructure (CI) -- including energy, water, food, transportation, and health systems -- underpins the safety and well-being of Canadians. Disruptions caused by malicious cyber activity can lead to service outages, economic losses, and risks to public health and safety.
November 23, 2025Source

Bug in jury systems used by several US states exposed sensitive personal data
Several public websites designed to allow courts across the United States and Canada to manage the personal information of potential jurors had a simple security flaw that easily exposed their sensitive data, including names and home addresses, TechCrunch has exclusively learned.
November 23, 2025Source

Clover Security Raises $36 Million to Secure Software by Design
The cybersecurity startup embeds AI agents into widely used tools to identify design flaws and eliminate them early.
November 23, 2025Source

CodeRED emergency alert system CodeDEAD after INC ransomware attack
Regions across US affected, and one tore up its contract for the product
November 23, 2025Source

Coding assistance websites exposed credentials for banks, government, and more
Two websites intended to help software developers format and structure their code have exposed thousands of login credentials, authentication keys, and other highly sensitive information.
November 23, 2025Source

Comcast to pay $1.5M fine for vendor breach affecting 270K customers
Comcast will pay a $1.5 million fine to settle a Federal Communications Commission investigation into a February 2024 vendor data breach that exposed the personal information of nearly 275,000 customers.
November 23, 2025Source

Congress Moves to Defend Undersea Cables From China, Russia
Bipartisan Bill Seeks Sanctions and Industry Coordination to Defend Undersea Cables
November 23, 2025Source or Source or Source or Source or Source

Cybersecurity Is Now a Core Business Discipline
Boardroom conversations about cyber can no longer be siloed apart from strategy, operations, or geopolitics.
November 23, 2025Source

Dartmouth College Confirms Data Theft in Oracle Hack
Dartmouth College has disclosed a data breach after cybercriminals leaked over 226 Gb of files stolen from the university.
November 23, 2025Source

Data Leaks: Why Are We So Stupid About Free Online Services?
JSON Code 'Beautifiers' Expose Sensitive Data From Banks, Government Agencies
November 23, 2025Source or Source or Source or Source

Do You Know the Risks of Letting Your Browser Remember Your Credit Card?
Your browser wants to help you shop, and cybercriminals hope you let it.
November 23, 2025Source

Even 'outdated' cybersecurity methods can be useful
Barrett Loveless, infrastructure director of PET Imaging Institute, says it processes 4,200 pages of protected documents daily and has had zero breaches in a decade.
November 23, 2025Source

Even 'Prove You're Not a Robot' Checks Aren't Safe From Scammers
Is this security check actually verifying that you're a human, or is it installing malware?
November 23, 2025Source

Gainsight breach: Salesforce details attack window, issues investigation guidance
The number of Salesforce customers affected by the recent compromise of Gainsight-published applications is yet to be publicly confirmed, but Salesforce released indicators of compromise (IoCs) and simultaneously shed some light on when the attack likely started.
November 23, 2025Source or Source

Google Warns Users: Don't Fall For This Dangerous VPN Scam
The use of Virtual Private Networks (VPNs) has been increasing, with a recent CNET survey finding that 43% of American adults are now using them. There are several reasons why so many people are now installing these apps. Accessing content banned in certain countries and saving money on streaming service costs are two commonly cited reasons for their popularity. However, the primary reason for using one is privacy and security, with 52% of Americans saying that protecting their IP address was the main factor.
November 23, 2025Source

How Uber is reducing manual logins by 4 million per year with the Restore Credentials API
Uber is the world's largest ridesharing company, getting millions of people from here to there while also supporting food delivery, healthcare transportation, and freight logistics. Simplicity of access is crucial to its success; when users switch to a new device, they expect a seamless transition without needing to log back into the Uber app or go through SMS-based one-time password authentication. This frequent device turnover presents a challenge, as well as an opportunity for strong user retention.
November 23, 2025Source

Info Blocking Enforcement: What HHS Will Likely Focus On
Attorney Nan Halstead on Critical Compliance Considerations
November 23, 2025Source or Source or Source or Source or Source

KEV catalog missing 88 percent of exploits
New research from Miggo Security suggests that CISA's Known Exploited Vulnerabilities (KEV) catalog now reflects only a small slice of real-world exploit risk in open source, and it raises questions about how the industry should be using KEV going forward.
November 23, 2025Source

Microsoft to secure Entra ID sign-ins from script injection attacks
Microsoft plans to enhance the security of the Entra ID authentication system against external script injection attacks starting in mid-to-late October 2026.
November 23, 2025Source

Mobile industry warns patchwork cyber regs are driving up costs
GSMA says fragmented, poorly designed laws add burdens without making networks any safer
November 23, 2025Source

Multiple London Councils Responding to Cyberattack
Whether Hackers Stole Data Not Yet Known
November 23, 2025Source or Source or Source or Source

My Mathy Friends, Cybersecurity Needs You
Securing the World for the Age of Quantum-Resistant Cryptography
November 23, 2025Source or Source or Source or Source

This new Android malware is scary -- it steals banking info and records your screen in secret
A newly discovered Trojan called Sturnus can capture your decrypted messages, fake your banking login screens, and more.
November 23, 2025Source or Source

New CISA alert: encryption isn't what's failing on Signal and WhatsApp
State-backed hackers aren't cracking Signal. They're cracking your phone.
November 23, 2025Source

New "HashJack" attack can hijack AI browsers and assistants
Security researchers at Cato Networks have uncovered a new indirect prompt injection technique that can force popular AI browsers and assistants to deliver phishing links or disinformation (e.g., incorrect medicine dosage guidance or investment advice), send sensitive data to the attacker, or push users to perform risky actions.
November 23, 2025Source

New ShadowV2 botnet malware used AWS outage as a test opportunity
A new Mirai-based botnet malware named 'ShadowV2' has been observed targeting IoT devices from D-Link, TP-Link, and other vendors with exploits for known vulnerabilities.
November 23, 2025Source

Popular Forge library gets fix for signature verification bypass flaw
A vulnerability in the 'node-forge' package, a popular JavaScript cryptography library, could be exploited to bypass signature verifications by crafting data that appears valid.
November 23, 2025Source

Ransomware Attack Disrupts Local Emergency Alert System Across US
The OnSolve CodeRED platform has been targeted by the Inc Ransom ransomware group, resulting in disruptions and a data breach.
November 23, 2025Source

Rare APT Collaboration Emerges Between Russia and North Korea
Researchers say Russia's Gamaredon and North Korea's Lazarus may be sharing infrastructure — a rare APT collaboration.
November 23, 2025Source

Spyware Abuse of Signal and WhatsApp Targeting US Officials
Cyber Advisory Cites Abuse of Linked Devices to Monitor Sensitive Communications
November 23, 2025Source or Source or Source or Source or Source

The invisible attack that could be stealing your payment details while you shop
Experts from NordVPN are warning about a rise in 'invisible' attacks that can steal payment details on legitimate eCommerce sites.
November 23, 2025Source

These routers are vulnerable to hackers: Update urgently now!
A security vulnerability in Asus router models can be exploited for targeted attacks. A firmware update provides a remedy, so users should install it urgently.
November 23, 2025Source

Thousands of Secrets Leaked on Code Formatting Platforms
JSONFormatter and CodeBeautify users exposed credentials, authentication keys, configuration information, private keys, and other secrets.
November 23, 2025Source

UK Parliamentary Committee Recommends Software Liability
Security by Design or Be Fined, Committee Suggests
November 23, 2025Source or Source or Source or Source or Source

Unifying Cloud Strategy to Unlock AI Potential
Talcott Financial Group's Dalavi on Oracle to Azure Migration and AI Innovation
November 23, 2025Source or Source or Source or Source

Why Cyber Defenses Continue to Lag at Rural Hospitals
Jackie Mattingly of Clearwater on Making Cybersecurity a Higher Priority
November 23, 2025Source or Source or Source or Source

Internet — Security Issues — November 23rd, 2025

Best Free VPN for 2025: Privacy Without Paying
While free VPNs can pose risks, using one of the best options can protect your privacy without costing anything.
November 23, 2025Source

Best password managers: 6 trustworthy options
If you're still using your dog's name to log in to your bank, you're courting disaster.
November 23, 2025Source

Homeland Security Is Reportedly Probing Bitcoin Mining Giant Bitmain for National Security Reasons
And there's an additional Trump family connection.
November 23, 2025Source

Iberia discloses customer data leak after vendor security breach
Spanish flag carrier Iberia has begun notifying customers of a data security incident stemming from a compromise at one of its suppliers.
November 23, 2025Source

Week in review: Stealth-patched FortiWeb vulnerability under active exploitation, Logitech data breach
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
November 23, 2025Source

Internet — Security Issues — November 22nd, 2025

Best antivirus software 2025: These 8 apps keep your PC safe
You need more than just prayer and luck—choose from our top antivirus software picks to stay safe.
November 22, 2025Source

Best VPN for Travel: Stay Private on Public Wi-Fi and Unblock Regional Streaming Content on the Go
A VPN makes a great travel companion for fundamental privacy or streaming, and best of all, it won't take up any room in your checked bag or carry-on.
November 22, 2025Source

Chinese APT24 Deploys Custom Malware, New Stealthy Tactics
3-Year Espionage Campaign Targeted Taiwanese Firms
November 21, 2025Source or Source or Source

Cox Enterprises discloses Oracle E-Business Suite data breach
Cox Enterprises is notifying impacted individuals of a data breach that exposed their personal data to hackers who breached the company network after exploiting a zero-day flaw in Oracle E-Business Suite.
November 22, 2025Source

Piecing Together the Puzzle: A Qilin Ransomware Investigation
A big part of a security analyst's everyday role is figuring out what actually happened during an incident. We can do that by piecing together breadcrumbs--whether that's through logs, antivirus detections, and other clues--that help us understand how the attacker achieved initial access and what they did after.
November 22, 2025Source

Security Bite: Why I stopped using camera covers and you should too
Plastic webcam covers—especially of the sliding kind—boomed in popularity sometime in the 2010s as a low-tech way to keep hackers from eavesdropping on compromised machines. The concern felt justified at the time. But by 2020, Apple was beginning to issue warnings that those covers aren't actually needed and can even damage a MacBook's display.
November 21, 2025Source

This hacker conference installed a literal antivirus monitoring system
Organizers had a way for attendees to track CO2 levels throughout the venue—even before they arrived.
November 22, 2025Source

Internet — Security Issues — November 21st, 2025

AI Governance Risks Rise as Enterprises Scale Agents
Rubrik's Dev Rishi on Mounting Pressure to Adopt AI Amid Operational Risks
November 21, 2025Source or Source or Source or Source

Avast Makes AI-Driven Scam Defense Available for Free Worldwide
Driven by a commitment to make cutting-edge scam protection available to everyone, Avast, a leader in digital security and privacy and part of Gen, has unveiled Scam Guardian, a new AI-powered offering integrated into its award-winning Avast Free Antivirus.
November 21, 2025Source

Best Free Antivirus Software for Device Protection in 2025
Want to keep your devices safe? These tried-and-true free antivirus tools can protect your computer, phone and other devices -- without breaking the bank.
November 21, 2025Source

Chinese Cyberspies Deploy 'BadAudio' Malware via Supply Chain Attacks
APT24 has been relying on various techniques to drop the BadAudio downloader and then deploy additional payloads.
November 21, 2025Source

Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day
CVE-2025-61757 is an unauthenticated remote code execution vulnerability affecting Oracle Identity Manager.
November 21, 2025Source

CrowdStrike catches insider feeding information to hackers
American cybersecurity firm CrowdStrike has confirmed that an insider shared screenshots taken on internal systems with hackers after they were leaked on Telegram by the Scattered Lapsus$ Hunters threat actors.
November 21, 2025Source

CrowdStrike fires 'suspicious insider' who passed information to hackers
Cybersecurity giant CrowdStrike has confirmed firing a "suspicious insider" last month who allegedly fed information about the company to a notorious hacking group.
November 21, 2025Source

Cutting Through the Hype: A Guide to Decoding Exaggerated VPN Marketing Lingo
VPN ads often promise security and freedom from Big Brother, but marketing can be misleading.
November 21, 2025Source

Despite Chinese hacks, Trump's FCC votes to scrap cybersecurity rules for phone and internet companies
The Federal Communications Commission voted 2-1 along party lines on Thursday to scrap rules that required U.S. phone and internet giants to meet certain minimum cybersecurity requirements.
November 21, 2025Source

FCC rolls back cybersecurity rules for telcos, despite state-hacking risks
The Federal Communications Commission (FCC) has rolled back a previous ruling that required U.S. telecom carriers to implement stricter cybersecurity measures following the massive hack from the Chinese threat group known as Salt Typhoon.
November 21, 2025Source

Google says hackers stole data from 200 companies following Gainsight breach
Google has confirmed that hackers have stolen the Salesforce-stored data of more than 200 companies in a large-scale supply chain hack.
November 21, 2025Source

Grafana warns of max severity admin spoofing vulnerability
Grafana Labs is warning of a maximum severity vulnerability (CVE-2025-41115) in its Enterprise product that can be exploited to treat new users as administrators or for privilege escalation.
November 21, 2025Source

Hacker Is Selling Samsung Info — But It Isn't What You Think
A hacker is reportedly selling internal data from Samsung Medison, a medical equipment subsidiary, on a cybercrime forum. This breach does not affect Samsung Electronics or consumer products, so user data for phones and other devices remains safe.
November 21, 2025Source

Hardware Hackers Urge Vendor Engagement for Security Success
Experts Detail Upsides of Bug Bounties and Getting Devices Into Researchers' Hands
November 21, 2025Source or Source or Source or Source or Source

How Microsoft's new security agents help businesses stay a step ahead of AI-enabled hackersx
Copilot customers will find the agents embedded in their relevant security and management dashboards.
November 21, 2025Source

Impersonators are (still) targeting companies with fake TechCrunch outreach
A growing number of scammers are impersonating TechCrunch reporters and event leads and reaching out to companies, pretending to be our staff when they absolutely are not. These bad actors are using our name and reputation to try to dupe unsuspecting businesses. It drives us crazy and infuriates us on your behalf. It ebbs and flows. Judging by the increased number of emails we're receiving, asking, "Does this person really work for you?" it appears to be happening more actively at the moment.
November 21, 2025Source

In Other News: ATM Jackpotting, WhatsApp-NSO Lawsuit Continues, CISA Hiring
Other noteworthy stories that might have slipped under the radar: surge in Palo Alto Networks scanning, WEL Companies data breach impacts 120,000 people, AI second-order prompt injection attack.
November 21, 2025Source

Is That Medical Device Secure? Get It Right in the Contract
HSCC 'Model Contract' Calls for Shared Cyber Risks for Providers and Device Makers
November 21, 2025Source or Source or Source or Source

ISMG Editors: Inside the Staffing Crisis Crippling CISA
Also: Akira Ransomware Targets Healthcare, AI's Sycophancy Becomes a Security Risk
November 21, 2025Source or Source or Source or Source or Source

New Onapsis platform updates enhance visibility and protection across SAP landscapes
Onapsis introduced a series of new updates to its Onapsis Control product line, advancing security capabilities across SAP and cloud ERP application development environments. These enhancements include integration with SAP Continuous Integration and Delivery (CI/CD), expanded Git repository support to secure more code at rest, and strengthened workflow integration with SAP Transport Management System (TMS).
November 21, 2025Source

Salesforce Confirms New Breach Linked to Gainsight Apps
Salesforce is probing unusual activity in Gainsight apps that may have exposed customer data, while ShinyHunters claims a new OAuth-based attack.
November 21, 2025Source

'Scattered Spider' teens plead not guilty to UK transport hack
Two British teenagers have denied charges related to an investigation into the breach of Transport for London (TfL) in August 2024, which caused millions of pounds in damage and exposed customer data.
November 21, 2025Source

SEC Ends SolarWinds Suit After Major Legal Setbacks
Federal securities regulators abandoned their remaining charges against SolarWinds and its chief information security officer, ending a high-profile lawsuit that accused the company of masking cybersecurity weaknesses ahead of a far-reaching Russian cyberattack.
November 21, 2025Source or Source or Source or Source

WhatsApp API Could Bulk Leak User Telephone Numbers
Researchers Were Able to Query 3.5 Billion Accounts
November 21, 2025Source or Source or Source or Source or Source

Internet — Security Issues — November 20th, 2025

$5M Settlement in Geisinger Health, Nuance Insider Breach
Class Action Litigation and Criminal Case Focus on Actions of an Ex-Tech Worker
November 20, 2025Source or Source or Source or Source or Source

AI is providing emotional support for employees, but is it a valuable tool or privacy threat?
As artificial intelligence tools like ChatGPT become an increasingly popular avenue for people seeking personal therapy and emotional support, the dangers that this can present—especially for young people—have made plenty of headlines. What hasn't received as much attention is employers using generative AI to assess workers' psychological well-being and provide emotional support in the workplace.
November 20, 2025Source

Critics Say White House's Draft AI Order Is a Power Grab
Leaked Executive Order Would Strip States of Power to Regulate AI Tech Firms
November 20, 2025Source or Source or Source or Source or Source

Crypto mixer founders sent to prison for laundering over $237 million
The founders of the Samourai Wallet (Samourai) cryptocurrency mixing service have been sent to prison for helping criminals launder over $237 million.
November 20, 2025Source

D-Link warns of new RCE flaws in end-of-life DIR-878 routers
D-Link is warning of three remotely exploitable command execution vulnerabilities that affect all models and hardware revisions of its DIR-878 router, which has reached end-of-service but is still available in several markets.
November 20, 2025Source

Defending AI, Securing OT: Fortinet's Strategy for Modern Cyber Risk
Fortinet's Rashish Pandey on Security Leadership, Regulation and IT-OT Convergence
November 20, 2025Source or Source

Do You Really Need a VPN for Public Wi-Fi? Does It Make Me Truly Anonymous?
A virtual private network hides your internet traffic, but not your tracks entirely.
November 20, 2025Doppel Raises $70 Million at $600 Million Valuation
The AI-native social engineering defense (SED) platform will accelerate product innovation and expand its offerings.
November 20, 2025
Source

" target="new" class="RM1">Source

Doordash data breach exposes names, addresses, phone numbers, and more
A Doordash data breach has exposed the personal data of an unspecified number of customers, including name, phone number, email address, and physical address.
November 20, 2025Source

Doppel Raises $70 Million at $600 Million Valuation
The AI-native social engineering defense (SED) platform will accelerate product innovation and expand its offerings.
November 20, 2025Source

Education boards left gates wide open for PowerSchool mega-breach, say watchdogs
Privacy cops say attack wasn't just bad luck but a result of sloppy homework
November 20, 2025Source

ENISA Is Now a CVE Program Root
European Cybersecurity Agency Can Assign CVE IDs and Publish CVE Records
November 20, 2025Source or Source or Source or Source or Source

Evasive Sturnus Malware Can Take Full Control Of Infected Android Devices
Security researchers at Threat Fabric have discovered new malware targeting Android devices, which is still "in a development or limited testing phase." However, even in its current form it's still incredibly potent, enabling attackers to take complete control of a victim's device including obtaining access to encrypted messages.
November 20, 2025Source

Fired techie admits sabotaging ex-employer, causing $862K in damage
PowerShell script locked thousands of workers out of their accounts
November 20, 2025Source

Free VoIP Speed Testing: How to Evaluate Call Quality on Your Network
Learn different ways to conduct a VoIP speed test at no cost, plus our best tips for making the most of your results.
November 20, 2025Source

Google exposes BadAudio malware used in APT24 espionage campaigns
China-linked APT24 hackers have been using a previously undocumented malware called BadAudio in a three-year espionage campaign that recently switched to more sophisticated attack methods.
November 20, 2025Source

Half of security teams struggling to cope with volume of vulnerabilities
As the number of CVEs continues to rise, a new study finds 46 percent of respondents say that the volume of vulnerabilities has placed additional strain on their security teams' resources impacting not only organizational security but also staff well being.
November 20, 2025Source

ID-Pal upgrades ID-Detect, delivering protection against deepfakes and synthetic IDs
ID-Pal has announced a major enhancement to its document-fraud detection feature, ID-Detect, delivering even more powerful defences against AI-generated digital manipulation—one of the fastest-growing threats facing financially regulated enterprises and payments providers.
November 20, 2025Source

Internet Providers Can Monitor Their Own Cybersecurity Standards, Says Trump's FCC
In what the Electronic Frontier Foundation calls a "terrible idea," the Federal Communications Commission has rescinded the requirement for telecom companies to issue yearly cybersecurity reports.
November 20, 2025Source

MacOS DigitStealer malware poses as DynamicLake, targets Apple Silicon M2/M3 devices
A new infostealer is targeting macOS users by masquerading as the legitimate DynamicLake UI enhancement and productivity utility and possibly Google's Drive for desktop app.
November 20, 2025Source

Minimus debuts Image Creator for building secure, hardened container images
Minimus announced the general availability of Image Creator, a new feature that empowers customers to build their own hardened container images, fully powered and secured by Minimus' container security software and software supply chain security technology.
November 20, 2025Source

Multi-threat Android malware Sturnus steals Signal, WhatsApp messages
A new Android banking trojan named Sturnus can capture communication from end-to-end encrypted messaging platforms like Signal, WhatsApp, and Telegram, as well as take complete control of the device.
November 20, 2025Source

New SonicWall SonicOS flaw allows hackers to crash firewalls
American cybersecurity company SonicWall urged customers today to patch a high-severity SonicOS SSLVPN security flaw that can allow attackers to crash vulnerable firewalls.
November 20, 2025Source

Oligo delivers runtime-native security for models and agents
Oligo Security announced new capabilities to protect the broadest spectrum of AI deployments, including AI applications, LLMs, and agentic AI. The new platform modules address the largest blind spot in AI security by securing production AI technologies that remain largely ungoverned, unmonitored, and operating in real time.
November 20, 2025Source

Over 50,000 Asus Routers Hacked in 'Operation WrtHug'
A Chinese threat actor is exploiting known vulnerabilities in discontinued Asus devices in an Operational Relay Box (ORB) facilitation campaign.
November 20, 2025Source

Palo Alto kit sees massive surge in malicious activity amid mystery traffic flood
GlobalProtect login endpoints targeted, sparking concern that something bigger may be brewing
November 20, 2025Source

Recent 7-Zip Vulnerability Exploited in Attacks
A proof-of-concept (PoC) exploit targeting the high-severity remote code execution (RCE) bug exists.
November 20, 2025Source

Russian Hacking Suspect Wanted by the FBI Arrested on Thai Resort Island
Thailand's Cyber Crime Investigation Bureau said an FBI tip that the "world-class hacker" was traveling to Thailand led to his arrest in Phuket.
November 20, 2025Source

Salesforce investigates customer data theft via Gainsight breach
Salesforce says it revoked refresh tokens linked to Gainsight-published applications while investigating a new wave of data theft attacks targeting customers.
November 20, 2025Source or Source

Security gap in Perplexity's Comet browser exposed users to system-level attacks
There is a serious security problem inside Comet, the AI-powered agentic browser made by Perplexity, SquareX researchers say: Comet's MCP API allows the browser's built-in (but hidden from the user) extensions to issue commands directly to a user's device, and the capability can be leveraged by attackers.
November 20, 2025Source

ShinyHunters Hack Salesforce Instances Via Gainsight Apps
Salesforce Revoked Gainsight Authentication Tokens
November 20, 2025Source or Source or Source or Source or Source

Turn your Windows 11 migration into a security opportunity
Not all versions of Windows were created equal, at least not according to Windows users. Windows XP was a legendary operating system that Microsoft found hard to replace. It didn't help that XP's successor, Windows Vista, was basically an Edsel-level bust.
November 20, 2025Source

Two-factor security? Nah, let's do 30-factor instead
Now wink a lot.
November 20, 2025Source

US and Allies Sanction Russian Bulletproof Hosting Service Providers
Media Land, Hypercore, and their leadership and employees are allegedly connected to various cybercriminal activities.
November 20, 2025Source

Vulnerability Allowed Scraping of 3.5 Billion WhatsApp Accounts
Researchers demonstrated a now-patched vulnerability that could have been used to enumerate all WhatsApp accounts.
November 20, 2025Source

Watch out for this clever and dangerous new 'Apple Support' hoax
Phishing attack uses authentic Apple alerts and messages in order to seem legitimate.
November 20, 2025Source

WhatsApp flaw let researchers scrape 3.5 billion phone numbers, photos, and statuses
Researchers called out inadequate protections; Meta insists no messages were compromised
November 20, 2025Source

Why a 'health-based approach' to cybersecurity makes sense
With a holistic and adaptive cyber resilience plan, Renown Health aligns information security and technology innovations to the organization's strategic pillars, its CISO says.
November 20, 2025Source

X wants to call you out for using a VPN (and maybe catch a few trolls, too)
A weapon against trolls, or a privacy disaster?
November 20, 2025Source

Internet — Security Issues — November 14th, 2025

A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
A suspected (but currently unidentified) zero-day vulnerability in Fortinet FortiWeb is being exploited by unauthenticated attackers to create new admin accounts on vulnerable, internet-facing devices.
November 14, 2025Source

Akira Ransomware Group Made $244 Million in Ransom Proceeds
Akira was seen exploiting SonicWall vulnerabilities and encrypting Nutanix Acropolis Hypervisor (AHV) VM disk files this year.
November 14, 2025Source

Checkout.com snubs hackers after data breach, to donate ransom instead
UK financial technology company Checkout announced that the ShinyHunters threat group has breached one of its legacy cloud storage systems and is now extorting the company for a ransom.
November 14, 2025Source

CISA flags imminent threat as Akira ransomware starts hitting Nutanix AHV
Advisory updated as leading cybercrime crew opens up its target pool
November 14, 2025Source

Don't commit to a VPN that lacks these 6 important features
Unpacking what makes a good VPN!
November 14, 2025Source

DoorDash Says Relax, Data Breach Only Exposed Names, Phones, Emails & Addresses
Food delivery giant DoorDash has once again come under negative limelight, this time with a massive data breach stemming from a sophisticated social engineering attack that targeted one of its employees in October. The incident allowed an unauthorized third party to gain access to and exfiltrate key contact information belonging to a mix of consumers, delivery drivers ("Dashers"), and merchants across its operating regions, including the U.S., Canada, Australia, and New Zealand.
November 14, 2025Source

FBI flags scam targeting Chinese speakers with bogus surgery bills
Crooks spoof US insurers, threaten bogus extradition to pry loose personal data and cash
November 14, 2025Source

Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks
Fortinet has confirmed that it has silently patched a critical zero-day vulnerability in its FortiWeb web application firewall, which is now "massively exploited in the wild."
November 14, 2025Source

German court rules Google must pay €572M for violating antitrust rules in price comparison sector
A German court has found that Google has abused its dominant market position in the price comparison sector and ruled that the company must pay a total of €572 million ($665.6 million) in damages to two German price comparison companies, according to a report by Reuters.
November 14, 2025Source

Meta must rein in scammers — or face consequences
If the company won't remove obvious scam ads, regulators need to step in.
November 14, 2025Source

Report blasts UK Ministry of Defence over Afghan data-handling failures
Public Accounts Committee tears into department responsible for the most dangerous breach in British history
November 14, 2025Source

The best password managers: Make remembering your password a breeze with vaults that do it for you
Are you tired of remembering all of your online credentials? The right password manager takes on this task for you. We've tested and ranked the best password manager apps of 2025.
November 14, 2025Source

The best VPN for Windows: Tighten up your online security without sacrificing speed
These Windows VPNs will help mask your online activities and enhance your personal security. These are my favorite VPN picks for the Windows operating system this year.
November 14, 2025Source

The Scariest Online Threats in 2025, and How to Protect Your Privacy
Internet crooks have smarter tools now, but common sense still beats artificial intelligence.
November 14, 2025Source

US announces new strike force targeting Chinese crypto scammers
U.S. federal authorities have established a new task force to disrupt Chinese cryptocurrency scam networks that defraud Americans of nearly $10 billion annually.
November 14, 2025Source

You may be owed up to $7,500 from the AT&T data breach settlement
Submit a claim before December 18
November 14, 2025Source

Internet — Security Issues — November 13th, 2025

1Password Simplifies Access With New Unlock Setting
1Password today announced a redesigned unlock system for Mac and Windows that allows the app to open automatically when a user unlocks their devic
November 13, 2025Source

1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium
An individual believed to have been involved in the operation of VenomRAT was arrested recently in Greece.
November 13, 2025Source

2B email addresses and 1.3B passwords compromised in multiple data breaches
Some 2 billion email addresses and 1.3 billion passwords have been compromised in a series of data breaches highlighted by a cybersecurity company.
November 13, 2025Source

ChatGPT Vulnerability Exposed Underlying Cloud Infrastructure
A researcher found a way to exploit an SSRF vulnerability related to custom GPTs to obtain an Azure access token.
November 13, 2025Source

CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks
Federal agencies have reported as 'patched' ASA or FTD devices running software versions vulnerable to attacks.
November 13, 2025Source

CISA warns feds to fully patch actively exploited Cisco flaws
CISA warned U.S. federal agencies to fully patch two actively exploited vulnerabilities in Cisco Adaptive Security Appliances (ASA) and Firepower devices.
November 13, 2025Source

CISA warns of WatchGuard firewall flaw exploited in attacks
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has warned government agencies to patch an actively exploited vulnerability impacting WatchGuard Firebox firewalls.
November 13, 2025Source

CISA, FBI and Partners Unveil Critical Guidance to Protect Against Akira Ransomware Threat
Provides: New Insights to Combat Ransomware Threats across Multiple Business Sectors and Critical Infrastructure
November 13, 2025Source

Critical WatchGuard Firebox Vulnerability Exploited in Attacks
Tracked as CVE-2025-9242 (CVSS score of 9.3), the flaw leads to unauthenticated, remote code execution on vulnerable firewalls.
November 13, 2025Source

Extra, extra, read all about it: Washington Post clobbered in Clop caper
Nearly 10,000 staff and contractors warned after attackers raided newspaper's Oracle EBS setup
November 13, 2025Source

Google Sues China-Based 'Lighthouse' Phishing Service After $1B+ Scams Target Millions
Google Sues China-Based 'Lighthouse' Phishing Service After $1B+ Scams Target Millions
November 13, 2025Source

Google to pay millions to South African news outlets: Watchdog
Google will pay more than $40 million to support South African news media, many of them floundering in a digital age, the country's competition authority said Thursday.
November 13, 2025Source

Kerberoasting in 2025: How to protect your service accounts
Kerberoasting attacks remain an enduring headache for IT professionals, allowing hackers to escalate privileges and reach the highest levels of your Active Directory (AD) environment. But by enforcing robust passwords, encryption, and cybersecurity policies, you can disrupt the criminals before they even begin.
November 13, 2025Source

NHS supplier ends probe into ransomware attack that contributed to patient death
Synnovis's 18-month forensic review of Qilin intrusion completed, now affected patients to be notified
November 13, 2025Source

Nokod Security launches Adaptive Agent Security to protect AI agents across the entire ADLC
Nokod Security announced the launch of Adaptive Agent Security, a solution that delivers real-time visibility, governance, and protection from threats across the Agent Development Lifecycle (ADLC).
November 13, 2025Source

"Patched" but still exposed: US federal agencies must remediate Cisco flaws (again)
CISA has ordered US federal agencies to fully address two actively exploited vulnerabilities (CVE-2025-20333, CVE-2025-20362) in Cisco Adaptive Security Appliances (ASA) and Firepower firewalls.
November 13, 2025Source

Popular Android-based photo frames download malware on boot
Uhale Android-based digital picture frames come with multiple critical security vulnerabilities and some of them download and execute malware at boot time.
November 13, 2025Source

Rhadamanthys infostealer operation disrupted by law enforcement
The rumors were true: Operation Endgame, a joint effort between law enforcement and judicial authorities of several European countries, Australia, Canada, the UK and the US, has disrupted the infrastructure supporting the operation of the Rhadamanthys infostealer.
November 13, 2025Source

Rhadamanthys malware admin rattled as cops seize a thousand-plus servers
International cops have pulled apart the Rhadamanthys infostealer operation, seizing 1,025 servers tied to the malware in coordinated raids between November 10-13.
November 13, 2025Source

Synnovis Confirms Patient Information Stolen in Disruptive Ransomware Attack
The ransomware attack on the pathology services provider disrupted operations at several London hospitals.
November 13, 2025Source

Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm
The spam campaign is likely orchestrated by an Indonesian threat actor, based on code comments and the packages' random names.
November 13, 2025Source

TrojAI Defend for MCP brings real-time security, visibility, and policy enforcement to agentic AI
TrojAI has launched its new AI runtime defense solution for agentic AI workflows, TrojAI Defend for MCP. Model Context Protocol (MCP) is an open protocol that allows AI agents to connect with external data, tools, and services in a standardized way enabling AI innovation at a rapid pace. TrojAI Defend for MCP was built to monitor traffic to and from MCP servers, providing unified visibility, policy analysis, and runtime enforcement across agents and MCP gateways.
November 13, 2025Source

UK Cyber Defense Laws Aim to Bolster NHS and Energy Infrastructure
Cyber Security and Resilience Bill represents a fundamental shift in how it defends its digital backbone against attacks now costing the nation nearly £15 billion annually.
November 13, 2025Source

Washington Post data breach impacts nearly 10K employees, contractors
The Washington Post is notifying nearly 10,000 employees and contractors that some of their personal and financial data has been exposed in the Oracle data theft attack.
November 13, 2025Source

Internet — Security Issues — November 9th, 2025

Best VPN for Windows PCs 2025: Browse the Web, Torrent, Stream and Game Privately
The best VPNs for Windows PCs let you browse the web, stream videos from services like Netflix, game and download torrents in private.
November 9, 2025Source

Dangerous runC flaws could allow hackers to escape Docker containers
Three newly disclosed vulnerabilities in the runC container runtime used in Docker and Kubernetes could be exploited to bypass isolation restrictions and get access to the host system.
November 9, 2025Source

Laid-off Intel employee allegedly steals 'Top Secret' files, then disappears — ex-engineer downloaded 18,000 files before vanishing
The ex-employee took a treasure trove of data with him after Intel let him go.
November 9, 2025Source

NAKIVO Introduces v11.1 with Upgraded Disaster Recovery and MSP Features
NAKIVO, a global leader in backup, ransomware protection and disaster recovery across virtual, physical, cloud, NAS and SaaS environments, has officially introduced NAKIVO Backup & Replication v11.1.
November 9, 2025Source

Internet — Security Issues — November 8th, 2025

Redis Critical Remote Code Execution Vulnerability Discovered after 13 Years
Redis recently released a security advisory regarding CVE-2025-49844. This critical (CVSS 10.0) use-after-free (UAF) vulnerability in Lua scripting could allow authenticated attackers to execute remote code on older versions of Redis and Valkey with Lua scripting enabled. Developers are urged to upgrade to patched releases as soon as possible.
November 8, 2025Source

Who's watching the watchers? This Mozilla fellow, and her Surveillance Watch map
Esra'a Al Shafei spoke with The Reg about the spy tech 'global trade'
November 8, 2025Source

Internet — Security Issues — November 7th, 2025

5 reasons why your internet is running slow
How to diagnose a slow connection!
November 7, 2025Source

7 CIS Experts' 2026 Cybersecurity Predictions
Elimination of federal funding for the Multi-State Information Sharing and Analysis Center® (MS-ISAC®) ... cyber threat actors (CTAs') ongoing use of artificial intelligence (AI) ... the AWS outage in October
November 7, 2025Source

18 Arrested in Crackdown on Credit Card Fraud Rings
Between 2016 and 2021, the suspects defrauded 4.3 million cardholders in 193 countries of €300 million (~$346 million).
November 7, 2025Source

A New Type of AI Malware Threatens Smart Homes, But These Security Habits Can Help
The rise of promptware means cybercriminals have new ways to hack smart homes. New security methods are required to fight back.
November 7, 2025Source

Attackers upgrade ClickFix with tricks used by online stores
Attackers have taken the ClickFix technique further, with pages borrowing tricks from online sellers to pressure victims into performing the steps that will lead to a malware infection.
November 7, 2025Source

Bank of England says JLR's cyberattack contributed to UK's unexpectedly slower GDP growth
This kind of material economic impact from online crooks thought to be a UK-first
November 7, 2025Source

Beware the 'Hi, how are you?' text. It's a scam - here's how it works
Americans lost $3.5 billion to investment scams in early 2025. Here's how to avoid becoming the next victim.
November 7, 2025Source

Bill Seeks HIPAA-Like Protections for Consumer Health Data
Proposed legislation by U.S. Sen. Bill Cassidy, R-La., a physician and chair of the high-profile Senate health committee, aims to create parallel HIPAA-like privacy protections to many more types of health information - such as data collected by consumer wearable devices and health apps - that are not currently covered under HIPAA and the HITECH Act.
November 7, 2025Source or Source or Source or Source

CBO Hit by Suspected Nation-State Cyberattack
Nation-State Actor Suspected in Breach of Congressional Budget Office
November 7, 2025Source

Chrome 142 Update Patches High-Severity Flaws
An out-of-bounds write flaw in WebGPU tracked as CVE-2025-12725 could be exploited for remote code execution.
November 7, 2025Source

Cisco: Actively exploited firewall flaws now abused for DoS attacks
Cisco warned this week that two vulnerabilities, which have been used in zero-day attacks, are now being exploited to force ASA and FTD firewalls into reboot loops.
November 7, 2025Source

ClickFix Attacks Against macOS Users Evolving
ClickFix prompts typically contain instructions for Windows users, but now they are tailored for macOS and they are getting increasingly convincing.
November 7, 2025Source

Commercial spyware "Landfall" ran rampant on Samsung phones for almost a year
Targeted attack could steal all of a phone's data and activate camera or mic.
November 7, 2025Source

Congressional Budget Office confirms it was hacked
Caitlin Emma, a spokesperson for CBO, told TechCrunch on Friday that the agency is investigating the breach and "has identified the security incident, has taken immediate action to contain it, and has implemented additional monitoring and new security controls to further protect the agency's systems going forward."
November 7, 2025Source

Crowdstrike: AI Accelerating Ransomware Attacks Across Europe
CrowdStrike's 2025 report reveals how AI is accelerating ransomware attacks and reshaping Europe's cyber threat landscape.
November 7, 2025Source

Data Exposure Vulnerability Found in Deep Learning Tool Keras
The vulnerability is tracked as CVE-2025-12058 and it can be exploited for arbitrary file loading and conducting SSRF attacks.
November 7, 2025Source

Destructive Russian Cyberattacks on Ukraine Expand to Grain Sector
Multiple state-sponsored Russian groups are targeting Ukrainian entities and European countries linked to Ukraine.
November 7, 2025Source

For OT Cyber Defenders, Lack of Data Is the Biggest Threat
OT Security 'a Generation Behind Traditional IT'
November 7, 2025Source or Source or Source or Source

Former OnlyFans CEO's next app is coming — and it allows topless pics
The future of social media is 18+, Ami Gan said.
November 7, 2025Source

Free tool fixes Windows 10 ESU registration issues and restores Microsoft security updates
Microsoft officially ended support for Windows 10 last month, leaving most systems without regular updates. For users in the European Union, the European Economic Area, and Switzerland, the software giant offers free Windows 10 ESU (Extended Security Updates) patches to keep PCs protected. Unfortunately, for many who qualify, the ESU registration option doesn't appear in Windows Update.
November 7, 2025Source

How to trade your $214,000 cybersecurity job for a jail cell
Ransomware doesn't pay what it used to.
November 7, 2025Source

ID verification laws are fueling the next wave of breaches
The cybersecurity community has long lived by a simple principle: Don't collect more data than you can protect. But ID laws and other legal mandates now force many organizations to store massive amounts of sensitive data, putting them in the precarious situation of dealing with information they don't necessarily want but have to safeguard.
November 7, 2025Source

In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests
Other noteworthy stories that might have slipped under the radar: rogue ransomware negotiators charged, F5 hack prompts OT security guidance, Germany targets Huawei tech.
November 7, 2025Source

Incogni review: The set-it-and-forget-it online privacy solution
Your secret weapon in the fight against data brokers.
November 7, 2025Source

Infostealers are making this old security practice new again
Like with carpenter jeans, I'm surprised this practice is relevant again.
November 7, 2025Source

ISMG Editors: Lawsuits Follow Year's Top Health Data Breach
Conduent Gets Sued; US Government's Cyber Shutdown Woes; Hacktivist Hits Rise
November 7, 2025Source

It's nearly 2026 and most people still use '123456' as a password
Check out the top 100 horrors
November 7, 2025Source

Landfall Android Spyware Targeted Samsung Phones via Zero-Day
Threat actors exploited CVE-2025-21042 to deliver malware via specially crafted images to users in the Middle East.
November 7, 2025Source or Source

Microsoft shares Windows 10 extended security updates requirements and activation IDs
Last month Windows 10 support ended as Microsoft released the final Patch Tuesday update under KB5066791. Alongside that, the company also published information on how users can proceed if they want to keep using their system in a supported state, ie, continue receiving regular OS security updates outside of the Defender updates.
November 7, 2025Source

Millions Of Online Accounts Are At Risk: This Study Names The Worst Passwords Of 2025
There's still about seven and a half weeks remaining in 2025, but a new study already has a beat on the worst passwords of the year, with the most awful of the bunch appearing more than 7.6 million times in various data breaches. Suffice to say, if you're using any of the passwords on the extensive list, you should change it immediately.
November 7, 2025Source

Moonlock review: We put MacPaw's new antivirus suite to work
MacPaw brings an antiviral/anti-malware utility into its own, even if the UI could use a bit of polish.
November 7, 2025Source

New LandFall spyware exploited Samsung zero-day via WhatsApp messages
A threat actor exploited a zero-day vulnerability in Samsung's Android image processing library to deploy a previously unknown spyware called 'LandFall' using malicious images sent over WhatsApp.
November 7, 2025Source

Online Job Scams Creating News Risks for Corporate Networks
It's Time for Enterprises to Manage Risks Posed by Compromised Personal Devices
November 7, 2025Source or Source or Source or Source

Ping Identity Boosts Frontline Staff Access With Keyless Buy
Keyless's Biometric Tech to Improve Privacy, Account Recovery and User Experience
November 7, 2025Source or Source or Source or Source

Radical Empowerment From Your Leadership: Understood by Few, Essential for All
When leaders redefine power as trust instead of control, teams unlock their potential — and organizations find their edge.
November 7, 2025Source

Samsung Zero-Day Flaw Exploited by 'Landfall' Spyware
Spyware Targets Samsung Galaxy Devices, Says Unit 42
November 7, 2025Source or Source or Source or Source

Scam centers in southeast Asia are on the rise despite crackdowns to root out the illegal industry
It often starts with a text message asking if you are available on weekends, looking for a part-time job or you get a simple "hello" from an unknown number. Halfway across the world, a laborer is usually pulling in 12-16 hour days, sending non-stop messages, hoping someone will take the bait.
November 7, 2025Source

Seattle security startup Oleria lands $19M in latest funding round
Oleria, a Seattle-based cybersecurity startup that manages employee access to applications and data, raised $19 million in a new round of funding.
November 7, 2025Source

The Congressional Budget Office Was Hacked. It Says It Has Implemented New Security Measures
The Congressional Budget Office confirmed it had been hacked, potentially disclosing important government data to malicious actors.
November 7, 2025Source

The FBI Is Trying to Unmask the Registrar Behind Archive.Today
The popular archiving website is being targeted for investigation.
November 7, 2025Source

US Authorities Consider Ban on DJI Drones Over Security Risks
The US FCC has gained the power to ban the sale and import of goods previously allowed in the region. The ban can only be carried out if the brand or manufacturer is designated as a national security risk. Thankfully, the existing owners of the products are not at risk of having their devices confiscated.
November 7, 2025Source

Warning! Don't open these WhatsApp images, else you'll get hacked
WhatsApp scammers are using malicious images to trick users. Don't fall for it and don't open any messages that fit this scam!
November 7, 2025Source

Washington Post confirms data breach linked to Oracle hacks
The Washington Post has said that it was one of the victims of a hacking campaign tied to Oracle's suite of corporate software apps.
November 7, 2025Source

Workload Identities: Bridging Infrastructure and Application Security
Replace static secrets with verifiable workload identities to close security gaps and build a stronger zero-trust foundation.
November 7, 2025Source

Internet — Security Issues — November 6th, 2025

AI-Slop ransomware test sneaks on to VS Code marketplace
A malicious extension with basic ransomware capabilities seemingly created with the help of AI, has been published on Microsoft's official VS Code marketplace.
November 6, 2025Source

Aptori Code-Q delivers verified, explainable fixes that integrate into development workflows
Aptori announced Code-Q (Code Quick Fix), a new agent in its AI-powered security platform that automatically generates, validates and applies code-level remediations for confirmed vulnerabilities.
November 6, 2025Source

Automotive IT Firm Hyundai AutoEver Discloses Data Breach
Hyundai AutoEver America was hacked in February and the attackers managed to steal SSNs and other personal data.
November 6, 2025Source

Best free password managers 2025: Online security doesn't have to cost a thing
Shore up your defenses, stat.
November 6, 2025Source

Breach Roundup: UPenn Hit by Email Breach
Also, Australian Police Arrest 55 in New Round of Anom App Sting
November 6, 2025Source or Source or Source or Source

Cisco Patches Critical Vulnerabilities in Contact Center Appliance
The flaws allow attackers to execute arbitrary code remotely and elevate their privileges to root on an affected system.
November 6, 2025Source

CISO budgets increase with identity and data protection top priorities
A new study from RSAC finds most CISOs' budgets increased between 2024 and 2025 and their top areas of investment for 2025-2026 are identity and data protection.
November 6, 2025Source

ClickFix malware attacks evolve with multi-OS support, video tutorials
ClickFix attacks have evolved to feature videos that guide victims through the self-infection process, a timer to pressure targets into taking risky actions, and automatic detection of the operating system to provide the correct commands.
November 6, 2025Source

Continuous Purple Teaming: Turning Red-Blue Rivalry into Real Defense
In many organizations, red and blue teams still work in silos, usually pitted against each other, with the offense priding itself on breaking in and the defense doing what they can to hold the line.
November 6, 2025Source

Cryptohack Roundup: Europol Busts 600M Euro Fraud Network
Also: SBF Appeals Conviction, PHP Exploits Fuel Cryptomining
November 6, 2025Source or Source or Source or Source

CybercrimeDeFi Protocol Balancer Starts Recovering Funds Stolen in $128 Million Heist
Hackers drained more cryptocurrency from Balancer by exploiting a rounding function and performing batch swaps.
November 6, 2025Source

EFF Teams Up With AV Comparatives to Test Android Stalkerware Detection by Major Antivirus Apps
EFF partnered with AV Comparatives to test Android antivirus apps' detection of stalkerware in 2025, finding mixed results with Malwarebytes showing 100% detection.
November 6, 2025Source

FBI Accuses Fired White Hat Hacking Pros Of Carrying Out Illegal Cyberattacks On US Companies
It's like something out of a contemporary spy novel: Two cybersecurity professionals that worked to help businesses fend off hackers have now been accused of being cybercriminals themselves. The FBI and federal prosecutors allege that two cybersecurity firms' former employees took part in a yearlong conspiracy to hack and extort multiple U.S. companies for millions of dollars in total.
November 6, 2025Source

European Police Dismantle €600M Crypto Fraud Network
European authorities have arrested nine suspects accused of laundering through fake crypto investment platforms.
November 6, 2025Source

Federally Qualified Health Center Reports Ransomware Breach
Central Jersey Medical Center Runs Health Centers for Schools in Newark
November 6, 2025Source or Source or Source or Source

Follow Pragmatic Interventions to Keep Agentic AI in Check
Agentic AI speeds operations, but requires clear goals, least privilege, auditability, red‑teaming, and human oversight to manage opacity, misalignment, and misuse.
November 6, 2025Source

Google Flags AI Malware Surge As Hackers Use LLMs To Mutate Code On-The-Fly
The industry-wide effort to AI all the things isn't without its seedy side. Namely, we're quickly entering an era of more sophisticated malware strains evading common antivirus protections, with threat actors taking advantage of powerful large language models (LLMs) that pose evolving threats, Google Threat Intelligence Group (GTIG) warns in a new security report.
November 6, 2025Source or Source

Google flags new wave of online scams fueled by AI fakes and holiday hustles
Scammers are getting smarter, and Google's new report shows how they're doing it.
November 6, 2025Source

Gootloader malware back for the attack, serves up ransomware
Move fast - miscreants compromised a domain controller in 17 hours
November 6, 2025Source

How a ransomware gang encrypted Nevada government's systems
The State of Nevada has published an after-action report detailing how hackers breached its systems to deploy ransomware in August, and the actions taken to recover from the attack.
November 6, 2025Source

Hypori Secure Workspace Ecosystem helps IT teams protect enterprise data
Hypori announced the expansion of its platform with the launch of the Hypori Secure Workspace Ecosystem, a suite of next-generation products designed to give organizations flexibility, scalability, and control over secure mobile access.
November 6, 2025Source

Italian political consultant says he was targeted with Paragon spyware
Francesco Nicodemo, a consultant who works with left-wing politicians in Italy, has gone public as the latest person targeted with Paragon spyware in the country.
November 6, 2025Source

Longer Conversations Can Break AI Safety Filters
Adversarial Success Rates Jump Tenfold in Longer AI Chats, Finds Cisco
November 6, 2025Source or Source or Source or Source or Source

Louvre heist reveals museum used 'LOUVRE' as password for its video surveillance, still has workstations with Windows 2000 - glaring security weaknesses revealed in previous report
It's like using your name as your password.
November 6, 2025Source

MajorKey IDProof+ combats AI-driven fraud
MajorKey Technologies announced IDProof+, a high-assurance identity verification solution leveraging biometric technology. Developed in collaboration with identity verification innovator authID, IDProof+ is designed to help enterprises combat AI-driven fraud and streamline remote workforce onboarding.
November 6, 2025Source

Malware-pwned laptop gifts cybercriminals Nikkei's Slack
Stolen creds let miscreants waltz into 17K employees' chats, spilling info on staff and partners
November 6, 2025Source

Meta earns about $7 billion a year on scam ads, report says
Yikes. That's a lot of ads for counterfeit Sildenafil and online casinos.
November 6, 2025Source

Nevada Ransomware Attack Started Months Before It Was Discovered, Per Report
The ransomware attack discovered in August occurred as early as May when a state employee mistakenly downloaded malicious software.
November 6, 2025Source

Over 1 billion passwords and emails leaked: How to see if you're affected
Have I Been Pwned just acquired a huge collection of unique email addresses and passwords that have been leaked and/or stolen.
November 6, 2025Source

Ping Identity offers protection against adversarial AI threats
As organizations embrace agentic AI to boost productivity and commerce, Ping Identity is redefining how enterprises enable this new class of autonomous digital identities, delivering visibility, access control, governance, and privilege oversight to build trust into every interaction. Identity for AI will help enterprises engage the agentic commerce channel, secure the autonomous workforce, and protect against adversarial AI threats.
November 6, 2025Source

Prowler embeds AI directly into security workflows
Prowler launched Prowler Lighthouse AI, an intelligent security assistant and MCP Server, that brings autonomous AI directly into DevSecOps workflows.
November 6, 2025Source

Report: Nevada State Hackers Evaded Detection for Months
Statewide Breach Hit 60 Agencies Before Ransomware Was Deployed
November 6, 2025Source or Source or Source or Source or Source or Source or Source

Russia-linked hackers intensify attacks as global APT activity shifts
State-aligned hacking groups have spent the past six months ramping up espionage, sabotage, and cybercrime campaigns across multiple regions, according to ESET's APT Activity Report covering April through September 2025. The research highlights how operations linked to Russia, China, Iran, and North Korea have evolved in scope and technique, showing that nation-state activity remains a constant source of disruption.
November 6, 2025Source

Russia's Destructive Wiper Attacks on Ukraine Rise Again
Nation-State Teams Tied to Grain Sector Targeting, Plus More Joined-Up Operations
November 6, 2025Source

Sandworm hackers use data wipers to disrupt Ukraine's grain sector
Russian state-backed hacker group Sandworm has deployed multiple data-wiping malware families in attacks targeting Ukraine's education, government, and the grain sector, the country's main revenue source.
November 6, 2025Source

SonicWall fingers state-backed cyber crew for September firewall breach
Spies, not crooks, were behind digital heist -- damage stopped at the backups, says US cybersec biz
November 6, 2025Source or Source

State-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack
The threat actor stole the firewall configuration files of all SonicWall customers who used the cloud backup service.
November 6, 2025Source

Team Cymru RADAR investigates external infrastructure in real time
Team Cymru announced RADAR, a new real-time discovery module designed to give threat analysts visibility into all internet-facing infrastructure, whether known or unknown, without waiting on asset inventories, third-party scans, or compliance-oriented tools.
November 6, 2025Source

Truffle Security Raises $25 Million for Secret Scanning Engine
The investment will fuel the development of Truffle's enterprise-grade secrets detection, verification, and remediation platform.
November 6, 2025Source

Why Microsegmentation Is Just a Dream for Many IT Teams
Audit Issues, Policy Debt and Limited Project Scope Are Hampering Adoption
November 6, 2025Source

Wipers from Russia's most cut-throat hackers rain destruction on Ukraine
Sandworm and other Russian-state hackers unleash data-destroying payloads on their neighbors.
November 6, 2025Source

You'll never guess what the most common passwords are. Oh, wait, yes you will
Most of you still can't do better than 123456?
November 6, 2025Source

Internet — Security Issues — November 5th, 2025

2 Ex-Cyber Specialists Indicted for Alleged BlackCat Attacks
DOJ: Suspects Hit 5 Firms, Including 3 in Healthcare, Netted $1.3M in Ransom Money
November 5, 2025Source or Source or Source or Source or Source

18 arrested in €300 million global credit card fraud scheme
A coordinated international operation has led to 18 arrests in a massive credit card fraud case worth at least €300 million. The effort, led by Eurojust, targeted a network of suspects accused of running fake online subscription services for dating, pornography, and streaming sites. Among those detained were five executives from four German payment service providers.
November 5, 2025Source

81 percent of security teams lack visibility into AI coding
While AI adoption is now nearly universal, governance and visibility have failed to keep pace, according to a new report from Cycode.
November 5, 2025Source

82 percent of finserv organizations suffered a data breach in the last year
A new report, based on a global survey of 250 decision makers at large financial services organizations of over 5,000 employees, shows that 82 percent have suffered a data breach via cyberattack, or a data leak, an unintentional exposure of sensitive data, in the past year.
November 5, 2025Source

AI makes holiday shopping scams harder to spot
As we approach the busiest time of the year for online shopping, scammers and phisherfolk are also preparing for a seasonal bonanza. 1Password has surveyed 2,000 American adults to learn how people are protecting themselves -- or not -- from phishing scams.
November 5, 2025Source

AI SOC Agents Slash Alert Response Time, Study Shows
Cloud Security Alliance's Troy Leach on How AI Helps SOC Analysts Move 61% Faster
November 5, 2025Source or Source or Source or Source or Source

AMD red-faced over random-number bug that kills cryptographic security
Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way
November 5, 2025Source

Anna's Archive now accounts for 5% of all URLs reported to Google for takedown
The piracy website, Anna's Archive, has achieved a pretty interesting goal. It only came onto the scene three years ago, but because of its success in the book piracy scene, publishers have been sending an enormous amount of takedown requests to Google to make it harder to find books on the website.
November 5, 2025Source

Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation
Armis recently surpassed $300 million in annual recurring revenue as it prepares for an IPO.
November 5, 2025Source

Australia adds Reddit and Kick to social media platforms banning children under 16
Australia has added message board Reddit and livestreaming service Kick to its list of social media platforms that must ban children younger than 16 from holding accounts.
November 5, 2025Source

Barracuda Assistant accelerates security operations
Barracuda Networks launched Barracuda Assistant, powered by Barracuda AI. Integrated into the BarracudaONE cybersecurity platform, Barracuda Assistant accelerates security operations to help organizations strengthen cyber resilience and drive productivity and ROI.
November 5, 2025Source

CISA warns of critical CentOS Web Panel bug exploited in attacks
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is warning that threat actors are exploiting a critical remote command execution flaw in CentOS Web Panel (CWP).
November 5, 2025Source

CleanStart SBOM Analyzer strengthens software supply chain security
CleanStart has released its SBOM Analyzer, an add-on tool that generates complete, CISA-compliant Software Bills of Materials (SBOMs) for container images. The tool deepens visibility into software components and dependencies, helping organizations secure their supply chains before deployment.
November 5, 2025Source

ConductorOne Raises $79 Million in Series B Funding
Leveraging AI, ConductorOne's platform secures and manages millions of human, non-human, and AI identities.
November 5, 2025Source

Cops Cuff 18 Suspects Over $345M Credit Card Fraud Scheme
German Payment Processor Insiders Accused of Laundering Fake Subscription Proceeds
November 5, 2025Source or Source or Source

Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
On Tuesday, CISA added two vulnerabilities to its Known Exploited Vulnerabilities catalog: CVE-2025-11371, which affects Gladinet's CentreStack and Triofox file-sharing and remote access platforms, and CVE-2025-48703, a vulnerability in Control Web Panel (CWP), a web hosting control panel designed for managing servers running CentOS or CentOS-based distributions.
November 5, 2025Source

Cyber theory versus practice: Are you navigating with faulty instruments?
Picture this: you're at the helm of a sophisticated avionics suite, trusting every gauge and blinking light. Your flight plan is impeccable, air traffic control is on call, and your co‑pilot follows every procedure.
November 5, 2025Source

Daylight Raises $33 Million for AI-Powered MDR Platform
The funding will fuel the development of Daylight's security operations platform and the launch of new protection modules.
November 5, 2025Source

Deepwatch NEXA platform transforms MDR collaboration with agentic AI
Deepwatch has released Deepwatch NEXA, a collaborative agentic AI ecosystem that delivers outcome-focused agents to transform how MDR providers and customers work together. NEXA combines natural language interaction with agentic AI to provide real-time visibility, context, and actionable insights across the entire security lifecycle. This enables MDR providers and customers to detect, investigate, and respond to threats faster while shifting from reactive defense to proactive, business-aligned protection.
November 5, 2025Source

Did your logins just get leaked? How to check online for free (and what to do next)
Have I Been Pwned adds biggest trove of breaches, and no, Gmail wasn't hacked
November 5, 2025Source

Experts warn AI tools are fueling a rise in scams targeting older adults
Experts are warning that the rapid development and growing availability of artificial intelligence tools is leading to an alarming rise in cybercrimes targeting older adults. Since technology alone cannot stop social engineering, specialists suggest that seniors learn to recognize the recurring scam patterns that criminals have used for decades to steal money and personal data.
November 5, 2025Source

Exploited 'Post SMTP' Plugin Flaw Exposes WordPress Sites to Takeover
The critical vulnerability allows attackers to read arbitrary emails, including password reset messages.
November 5, 2025Source

Flare Raises $30 Million for Threat Exposure Management Platform
The company plans to advance its identity exposure management capabilities and pursue M&A opportunities.
November 5, 2025Source

Fortinet launches Secure AI Data Center to protect AI infrastructures end-to-end
Fortinet announced the Secure AI Data Center solution, an end-to-end framework purpose-built to protect AI infrastructures. Designed to secure the entire AI stack, from data center infrastructure to applications and LLMs, the solution delivers advanced AI threat defense with ultra-low latency and reduces power consumption on average by 69% compared to traditional approaches.
November 5, 2025Source

Google uncovers malware using LLMs to operate and evade detection
PromptLock, the AI-powered proof-of-concept ransomware developed by researchers at NYU Tandon and initially mistaken for an active threat by ESET, is no longer an isolated example: Google's latest report shows attackers are now creating and deploying other malware that leverages LLMs to operate and evade security systems.
November 5, 2025Source

Google warns of new AI-powered malware families deployed in the wild
Google's Threat Intelligence Group (GTIG) has identified a major shift this year, with adversaries leveraging artificial intelligence to deploy new malware families that integrate large language models (LLMs) during execution.
November 5, 2025Source

Have I Been Pwned adds biggest trove of breaches, and no, Gmail wasn't hacked
Have I Been Pwned, the website that lets you know if your data was involved in any breaches, has processed and indexed the largest corpus of breached data in its history. The batch is known as the Synthient Credential Stuffing Threat Data. It features almost two billion email addresses and 1.3 billion passwords, 625 million of which have never been seen by HIBP before.
November 5, 2025Source

Here's what the redesigned Google Photos and Maps icons look like
The company's bringing similar changes made to its AI and the "G" logo to more apps.
November 5, 2025Source

Hyundai AutoEver America data breach exposes SSNs, drivers licenses
Hyundai AutoEver America is notifying individuals that hackers breached the company's IT environment and gained access to personal information.
November 5, 2025Source

Immigration Database Pressed by DHS Into Voter Verification
DHS Plans to Expand SAVE Database Use to Raise Privacy, Accuracy, Security Concerns
November 5, 2025Source or Source or Source or Source

Implementing runtime security for the cloud [Q&A]
Cloud-native platforms are built for speed with ephemeral workloads, rapid deployments, and plenty of third-party app dependencies.
October 31, 2025Source

In Other News: WhatsApp Passkey-Encrypted Backups, Russia Targets Meduza Malware, New Mastercard Solution
Other noteworthy stories that might have slipped under the radar: several interesting Android malware families, UN cybercrime treaty, criminal complaint against Clearview AI in Europe.
October 31, 2025Source

Jamf to Go Private Following $2.2 Billion Acquisition by Francisco Partners
The private equity firm will purchase the outstanding shares of Jamf common stock for $13 per share in an all-cash transaction.
October 31, 2025Source

Japan Issues OT Security Guidance for Semiconductor Factories
The 130-page document covers several important aspects and it's available in both Japanese and English.
October 31, 2025Source

Keeping Revenue Forecasts From Becoming Legal Liabilities
Why the Fortinet Earnings Case Is a Cautionary Tale for the Cybersecurity Sector
October 31, 2025Source or Source or Source or Source or Source

Layered Defences are Key to Combating AI-Driven Cyber Threats, CNCF Report Finds
The Cloud Native Computing Foundation has published an analysis of modern cybersecurity practices, finding that attacks using Artificial Intelligence are now a significant threat. The report highlights the criticality for organisations to adopt multi-layered defence strategies as artificial intelligence transforms both the threat landscape and the protective measures available to businesses.
October 31, 2025Source

New Threads Tools Let You Approve and Filter Replies
Threads gets a new Reply Approval tool, which allows you to choose which replies appear publicly on your posts before anyone else can see them. This will allow you to keep the discussion on topic. Then there's also an option to filter replies from people you follow, or those that include mentions.
October 31, 2025Source

Open VSX Downplays Impact From GlassWorm Campaign
Open VSX fully contained the GlassWorm attacks and says it was not a self-replicating worm in the traditional sense.
October 31, 2025Source

Pornhub records big drop in UK traffic thanks to Online Safety Act
Earlier this year, the UK put into effect the Online Safety Act to protect children from online harms, including pornographic content. Now, Pornhub claims that its site's traffic is down 77% compared to July when the OSA was brought in. According to data from Ofcom, visits to porn sites in general in the UK have fallen by almost a third in the three months since the law came into effect.
October 31, 2025Source

Proton VPN Promises Major Improvements in Its Fall and Winter Updates
The popular VPN service says it's adding new free server locations and a fresh VPN architecture.
October 31, 2025Source

Ransomware gang runs ads for Microsoft Teams to pwn victims
You click and think you're getting a download page, but get malware instead
October 31, 2025Source

Searchlight Cyber Buys Intangic to Help Quantify Cyber Risk
European Startup Acquisition Aims to Unify Technical and Financial Cyber Insights
October 31, 2025Source or Source or Source or Source or Source

Surfshark versus Proton VPN: Two of the Best VPNs Compared
Both VPNs are well-rounded, but offer different privacy selling points. Your choice will depend on whether you want critical privacy protections or innovative features.
October 31, 2025Source

Ukrainian extradited from Ireland on Conti ransomware charges
A Ukrainian national believed to be a member of the Conti ransomware operation has been extradited to the United States and faces charges that could get him 25 years in prison.
October 31, 2025Source

Ukrainian Man Extradited From Ireland to US Over Conti Ransomware Charges
Oleksii Oleksiyovych Lytvynenko is now in the US after being held in custody in Ireland since 2023.
October 31, 2025Source

Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
A Windows vulnerability (CVE-2025-9491, aka ZDI-CAN-25373) that state-sponsored threat actors and cybercrime groups have been quietly leveraging since at least 2017 continues to be exploited for attacks.
October 31, 2025Source

'We got hacked' emails threaten to leak University of Pennsylvania data
The University of Pennsylvania suffered a cybersecurity incident on Friday, where students and alumni received a series of offensive emails from various University email addresses, claiming that data was stolen in a breach.
October 31, 2025Source

Windows zero-day actively exploited to spy on European diplomats
A China-linked hacking group is exploiting a Windows zero-day in attacks targeting European diplomats in Hungary, Belgium, and other European nations.
October 31, 2025Source

Why password controls still matter in cybersecurity
In January 2024, Russian hackers broke into Microsoft's systems by slipping past what many believed was an ironclad security setup. The attack proved that even with multiple layers of protection, passwords often remain the weakest link in network security.
October 31, 2025Source

WordPress Anti-Malware Plugin Flaw Exposes 100K Sites To An Alarming Security Threat
A new threat in is the wild affecting sites that run WordPress, a popular content management system. Wordfence, a company that focuses on security research in the WordPress ecosystem, is reporting that a vulnerability is affecting the Anti-Malware Security and Brute-Force Firewall plugin that's currently deployed on over 100,000 websites.
October 31, 2025Source

IT Failure Starts With Silence, Not Systems
Former DoE CIO Ann Dunkin on the Lack of Communication, Engagement in IT Projects
November 5, 2025Source

Komodor's self-healing capabilities remediate issues with or without a human in the loop
Komodor released autonomous self-healing and cost optimization capabilities that simplify operations for SRE, DevOps, and Platform teams managing large-scale Kubernetes environments.
November 5, 2025Source

M&S pegs cyberattack cleanup costs at £136M as profits slump
Retailer's tech systems aren't down anymore, but the same can't be said for its rocky financials
November 5, 2025Source

Malanta Emerges From Stealth With $10 Million Seed Funding
Why people don't demand data privacy, even as governments and corporations collect more personal information
November 5, 2025Source

Malware Developers Test AI for Adaptive Code Generation
Google Details How Attackers Could Use LLMs to Mutate Scripts
November 5, 2025Source or Source or Source or Source or Source

Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns
Google has released a report describing the novel ways in which malware has been using AI to adapt and evade detection.
November 5, 2025Source

New ExtraHop capabilities target malicious PowerShell use across enterprise environments
ExtraHop has announced new capabilities to detect the malicious use of PowerShell. These enhancements provide the visibility needed to disrupt the attack kill chain and deliver insight to stop lateral movement in its tracks.
November 5, 2025Source

Nikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack
The Japanese media giant says compromised Slack credentials were used to steal employee and business partner information.
November 5, 2025Source

Over 42 Million Malicious Android Apps Downloaded from Google Play — Here's What You Need to Know
Google spokesperson reached out with a statement regarding this report. Here's what the company has to say: "User protection against these identified malware versions was already in place through Google Play Protect prior to this report. Based on our current detection, no apps containing these versions of this malware are found on Google Play. We're constantly enhancing our protections to help keep users safe from bad actors."
November 5, 2025Source

Police busts credit card fraud rings with 4.3 million victims
International authorities have dismantled three massive credit card fraud and money laundering networks, linked to losses exceeding €300 million ($344 million) and affecting over 4.3 million cardholders across 193 countries.
November 5, 2025Source

Portal26 Raises $9 Million for Gen-AI Adoption Platform
The gen-AI adoption management platform will invest the funds in accelerating growth and product innovations.
November 5, 2025Source

r/Im14andthisisbanned: Australia Adds Reddit to No-Go List for Kids
The country will also prevent under-16s from using Kick.
November 5, 2025Source

SonicWall says state-sponsored hackers behind September security breach
SonicWall's investigation into the September security breach that exposed customers' firewall configuration backup files concludes that state-sponsored hackers were behind the attack.
November 5, 2025Source

Starting Over in Cybersecurity: Advice I Wish I'd Had
Learn the Business, Be Intentional, Find a Mentor and Build Non-Technical Skills
November 5, 2025Source or Source or Source or Source

University of Pennsylvania confirms data stolen in cyberattack
The University of Pennsylvania has confirmed that a hacker breached numerous internal systems related to the university's development and alumni activities and stole data in a cyberattack.
November 5, 2025Source

University of Pennsylvania confirms hacker stole data during cyberattack
The University of Pennsylvania confirmed on Tuesday that a hacker stole university data as part of last week's data breach, during which alumni and other affiliates received suspicious emails from official university email addresses.
November 5, 2025Source

Unpatched Windows Flaw a Boon for Nation-State Hackers
Chinese Hackers Target European Diplomats With LNK File Flaw
November 5, 2025Source or Source

US sanctions North Korean bankers linked to cybercrime, IT worker fraud
The U.S. Treasury Department imposed sanctions on two North Korean financial institutions and eight individuals involved in laundering cryptocurrency stolen in cybercrime and fraudulent IT worker schemes.
November 5, 2025Source

What factors determine the severity and outcomes of cyberwarfare between countries?
Cyberwarfare between nation states has become increasingly common in recent years. To address several important questions that this phenomenon raises, scientists developed a game theoretical model of cyberwarfare between nations.
November 5, 2025Source

Why people don't demand data privacy, even as governments and corporations collect more personal information
Despite widespread concern about data privacy, most individuals feel powerless to influence how their information is used, leading to passive acceptance of data collection by governments and corporations. This sense of helplessness, termed data disaffection, is reinforced by inadequate regulations, convoluted consent processes, and cultural narratives that portray data misuse as inevitable.
November 5, 2025Source

Internet — Security Issues — October 31st, 2025

AI blew open software security, now OpenAI wants to fix it with an agent called Aardvark
AI promises to find bugs and gaps in your apps
October 31, 2025Source

Alleged Meduza Stealer malware admins arrested after hacking Russian org
The Russian authorities have arrested three individuals in Moscow who are believed to be the creators and operators of the Meduza Stealer information-stealing malware.
October 31, 2025Source

Attackers dig up $11M in Garden Finance crypto exploit
Bitcoin bridge biz offers 10 percent reward to attackers if they play nice
October 31, 2025Source

Australia warns of BadCandy infections on unpatched Cisco devices
The Australian government is warning about ongoing cyberattacks against unpatched Cisco IOS XE devices in the country to infect routers with the BadCandy webshell.
October 31, 2025Source

Building Cyber Resilience Across Canada's Skies
NAV Canada CISO Tom Bornais on Keeping IT and OT Systems Running
October 31, 2025Source or Source or Source or Source or Source

Canada Warns of Cyberattacks Targeting Industrial Control Systems
Hackers breached Canadian water, energy, and farm systems, prompting national warnings to secure industrial control networks.
October 31, 2025Source

Chainguard Banks $280M for Global Open-Source Security Play
Non-Dilutive Funding From General Catalyst Supports Global Go-to-Market Push
October 31, 2025Source or Source or Source or Source or Source

Chinese APT Exploits Unpatched Windows Flaw in Recent Attacks
The Windows shortcut vulnerability has been seen in attacks conducted by Mustang Panda to drop the PlugX malware.
October 31, 2025Source

CISA Adds Exploited XWiki, VMware Flaws to KEV Catalog
Broadcom has updated its advisory on CVE-2025-41244 to mention the vulnerability's in-the-wild exploitation.
October 31, 2025Source

CISA and partners take action as Microsoft Exchange security risks mount
In partnership with international cybersecurity agencies, the US Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) outlined security best practices for organizations that use on-premises versions of Microsoft Exchange Server.
October 31, 2025Source

CISA: High-severity Linux flaw now exploited by ransomware gangs
CISA confirmed on Thursday that a high-severity privilege escalation flaw in the Linux kernel is now being exploited in ransomware attacks.
October 31, 2025Source

CISA: High-severity Linux flaw now exploited by ransomware gangs
CISA confirmed on Thursday that a high-severity privilege escalation flaw in the Linux kernel is now being exploited in ransomware attacks.
October 31, 2025Source

Court Finalizes HCA Data Breach Class Action Settlement
Multimillion Dollar Deal Resolves 27 Lawsuits After 2023 Email Storage Hack
October 31, 2025Source or Source or Source or Source or Source

Denmark Withdraws Chat Control Proposal Amid Controversy
Denmark Concedes Domestic and International Opposition Against Client Scanning
October 31, 2025Source or Source or Source or Source

ExpressVPN review: A premium service worth every penny
Top-of-the-line features and renowned privacy makes it one of the best.
October 31, 2025Source

FCC to rescind ruling that said ISPs are required to secure their networks
FCC chair to rely on ISPs' voluntary commitments instead of Biden-era ruling.
October 31, 2025Source

Government hackers breached telecom giant Ribbon for months before getting caught
U.S. telecommunications giant Ribbon has confirmed that government-backed hackers had access to its network for almost a year before getting caught, according to a public filing.
October 31, 2025Source

Hackers threaten to leak data after breaching University of Pennsylvania to send mass emails
On Friday morning, University of Pennsylvania alumni, students, staff, and community affiliates received several emails from hackers purporting to represent the university's Graduate School of Education (GSE).
October 31, 2025Source or Source

How to Fix Decades of Technical Debt
Global Tech Debt Impedes Growth as AI, Cloud and Legacy Systems Collide
October 31, 2025Source or Source or Source or Source or Source

ImmuniWeb Continuous now enables always-on, AI-powered security testing
ImmuniWeb has unveiled an upgraded version of ImmuniWeb Continuous, designed for continuous penetration testing and 24/7 automated vulnerability scanning of web applications, APIs, and microservices.
October 31, 2025Source

Internet — Security Issues — October 30th, 2025

3+ billion PCs and phones are defenseless against new browser security flaw
Whether you're on Windows, Linux, macOS, Android, or iOS, you're vulnerable if you use Chrome or any Chromium-based browser.
October 30, 2025Source

10 Million Impacted by Conduent Data Breach
The hackers stole names, addresses, dates of birth, Social Security numbers, and health and insurance information.
October 30, 2025Source

136 NPM Packages Delivering Infostealers Downloaded 100,000 Times
The packages deployed malicious code harvesting system information, credentials, tokens, API keys, and other sensitive information.
October 30, 2025Source

Akeyless introduces AI Agent Identity Security for safer AI operations
Akeyless has released a new AI Agent Identity Security solution designed to secure the rise of autonomous AI systems.
October 30, 2025Source

Attackers exploiting WSUS vulnerability drop Skuld infostealer (CVE-2025-59287)
Attackers have been spotted exploiting the recently patched WSUS vulnerability (CVE-2025-59287) to deploy infostealer malware on unpatched Windows servers.
October 30, 2025Source

Best Antivirus Software We've Tested in 2025: This Security Service Just Dethroned a Top Competitor
We researched and tested top antivirus software like Bitdefender and McAfee to help you select the best cybersecurity suite for your digital safety needs.
October 30, 2025Source

Best password managers: 6 trustworthy options
If you're still using your dog's name to log in to your bank, you're courting disaster.
October 30, 2025Source

Breach Roundup: Hackers Probe Canada's Critical Infrastructure
Also: F5 Revenue Dips, Swedish Utility Operator Breached
October 30, 2025Source or Source or Source

Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm
The Canadian Centre for Cyber Security has warned CISOs that hacktivists are increasingly targeting internet-exposed ICS.
October 30, 2025Source

ClickFix Infrastructure Surprises Inform Better Blocking
Big Crossover Found Between ClickFix and Adversary-in-the-Middle Infrastructure
October 30, 2025Source

ConductorOne Hauls in $79M to Modernize Identity Security
Surge in AI and Non-Human Identities Drives Demand for More Powerful Access Control
October 30, 2025Source

CISA and NSA share tips on securing Microsoft Exchange servers
The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have released guidance to help IT administrators harden Microsoft Exchange servers on their networks against attacks.
October 30, 2025Source

CISA Issues Guidance to Curb Microsoft Exchange Exploits
US Cyber Defense Agency Releases Best Practices to Harden Exchange Environments
October 30, 2025Source or Source or Source

CISA orders feds to patch VMware Tools flaw exploited by Chinese hackers
On Thursday, CISA warned U.S. government agencies to secure their systems against attacks exploiting a high-severity vulnerability in Broadcom's VMware Aria Operations and VMware Tools software.
October 30, 2025Source

CISA, NSA and Global Partners Unveil Security Blueprint for Hardening Microsoft Exchange Servers
New Advanced Guidance to Fortify On-Premises Exchange Servers Against Persistent Cyber Threats
October 30, 2025Source

Copilot AI's latest trick? A secure sandbox for its agentic activity
Microsoft 365 users can now test "Researcher with Computer Use," an autonomous agent that can access files that it couldn't before.
October 30, 2025Source

Cyberpunks mess with Canada's water, energy, and farm systems
Infosec agency warns hacktivists broke into critical infrastructure systems to tamper with controls
October 30, 2025Source

Defending against adversary-in-the-middle threats with phishing-resistant multi-factor authentication (ITSM.30.031)
In the ever-evolving landscape of cyber security , the rise of adversary-in-the-middle (AitM) phishing poses a significant threat to organizations. AitM phishing has become increasingly popular among threat actors as organizations move to the cloud, shifting the frontline from defending traditional network perimeters to prioritizing identity protection.
October 30, 2025Source

Docker Compose vulnerability opens door to host-level writes -- patch pronto
Docker Compose users are being strongly urged to upgrade their versions of the orchestration tool after a researcher uncovered a flaw that could allow attackers to stage path traversal attacks.
October 30, 2025Source

Ex-L3Harris exec guilty of selling cyber exploits to Russian broker
Peter Williams, an Australian national and a former general manager at U.S. defense contractor L3Harris Trenchant, has pleaded guilty in U.S. District Court to stealing and selling confidential cybersecurity information to a Russian vulnerability exploit broker.
October 30, 2025Source

Former US Defense Contractor Executive Admits to Selling Exploits to Russia
Peter Williams stole trade secrets from his US employer and sold them to a Russian cybersecurity tools broker.
October 30, 2025Source

Google says your Gmail wasn't hacked — but maybe check anyway, as the internet's not buying it after 183M accounts were allegedly breached
It's not a Gmail breach, it's just a remix of every other one — according to Google, which denies reports, but 16 million fresh credentials still surfaced.
October 30, 2025Source

How neighbors could spy on smart homes
Even with strong wireless encryption, privacy in connected homes may be thinner than expected. A new study from Leipzig University shows that someone in an adjacent apartment could learn personal details about a household without breaking any encryption. By monitoring the wireless traffic of nearby smart devices, the "nosy neighbor" can infer what people are doing, when they are home, and even which room they are in.
October 30, 2025Source

How to Block North Korean IT Worker Scams in Remote Hiring
Attorney Jonathan Armstrong on Vetting Job Applicants, Red Flags and Compliance
October 30, 2025Source or Source or Source

Joint guidance on Microsoft Exchange Server security best practices
The Canadian Centre for Cyber Security (Cyber Centre) has joined the United States' National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) as well as the Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC) in releasing guidance on Microsoft Exchange Server security best practices.
October 30, 2025Source

LinkedIn phishing targets finance execs with fake board invites
Hackers are abusing LinkedIn to target finance executives with direct-message phishing attacks that impersonate executive board invitations, aiming to steal their Microsoft credentials.
October 30, 2025Source

Major US Telecom Backbone Firm Hacked by Nation-State Actors
Ribbon Communications provides technology for communications networks and its customers include the US government and major telecom firms.
October 30, 2025Source or Source

Massive surge of NFC relay malware steals Europeans' credit cards
Near-Field Communication (NFC) relay malware has grown massively popular in Eastern Europe, with researchers discovering over 760 malicious Android apps using the technique to steal people's payment card information in the past few months.
October 30, 2025Source

New OpenText capabilities enhance enterprise defense with AI across identity, data, and apps
OpenText announced new cybersecurity capabilities designed to help enterprises embed AI into everyday security operations and enforce governance and compliance at scale.
October 30, 2025Source

OpenAI unveils 'Aardvark,' a GPT-5-powered agent for autonomous cybersecurity research
OpenAI said the new cybersecurity agent can identify, explain, and help fix vulnerabilities. Here's how it works.
October 30, 2025Source

Opt Out October: Daily Tips to Protect Your Privacy and Security
Trying to take control of your online privacy can feel like a full-time job. But if you break it up into small tasks and take on one project at a time it makes the process of protecting your privacy much easier. This month we're going to do just that. For the month of October, we'll update this post with new tips every weekday that show various ways you can opt yourself out of the ways tech giants surveil you.
October 30, 2025Source

Organizations struggle to manage AI and SaaS use safely
The study from 1Password, based on data from 5,200 desk-based knowledge workers across the US, Canada, the UK, Germany, France, and Singapore, also finds 52 percent of employees have downloaded apps without IT approval.
October 30, 2025Source

Postcode Lottery's lucky dip turns into data slip as players draw each other's info
Biz says 'technical error' caused short-lived leak affecting small number of users
October 30, 2025Source

Proton Data Breach Observatory reports as soon as your personal data hits the dark web
Security-conscious readers probably already use the data breach alert site Have I Been Pwned, but a new Proton website is aiming to alert you at an earlier stage with what the company says will be near real-time reporting.
October 30, 2025Source

Proton's new Data Breach Observatory shines a light into the dark web
Date breaches affecting businesses and online services are ever more frequent and can affect anyone who is unfortunate enough to be a customer or supplier.
October 30, 2025Source

Reflectiz Raises $22 Million for Website Security Solution
The company will expand its product offering, establish global headquarters in Boston, and fuel growth and go-to-market efforts.
October 30, 2025Source

Rethinking identity security in the age of autonomous AI agents
The rise of autonomous AI agents is challenging the very foundation of enterprise security. These systems don't just follow static workflows or code. They make independent decisions, take actions across systems, and in many cases, do so without human oversight.
October 30, 2025Source

Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience
Spektrum Labs has raised $10 million in seed funding for its cyber resilience platform.
October 30, 2025Source

Sublime Secures $150M to Advance Agentic Email Protection
Series C Funding Fuels Autonomous Agents That Detect and Block Attacks in Real Time
October 30, 2025Source or Source or Source or Source or Source

Suspected Chinese snoops weaponize unpatched Windows flaw to spy on European diplomats
Expired security cert, real Brussels agenda, plus PlugX malware finish the job
October 30, 2025Source

Tata Motors Breach Exposed 70TB of Sensitive Data Before Fix
Security researcher Eaton Zveare discovered that two sets of Amazon Web Services keys were left exposed across Tata Motors' online platforms.
October 30, 2025Source

Upwind unveils AI-powered Exposure Validation Engine to redefine dynamic CSPM
Upwind has launched its Exposure Validation Engine, a capability that introduces dynamic, real-time validation into the Cloud Security Posture Management (CSPM) layer. This innovation enables security, engineering, and compliance teams to validate live cloud exposures with precision under real-world conditions.
October 30, 2025Source

US, Japan, and Korea Unite to Lead AI Chips Race
During his visit to Asia, President Trump signed a new agreement with South Korea and Japan. As per the agreement, the countries will help each other work on advanced technologies and provide a safer environment for them.
October 30, 2025Source

WhatsApp adds passkey protection to end-to-end encrypted backups
WhatsApp is adding a new way to access your encrypted backups with passkey support. This means if you lose your device, you can use methods like fingerprint, face, or the screen lock code of your previous device to access WhatsApp's backup.
October 30, 2025Source or Source

Internet — Security Issues — October 26th, 2025

Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoors
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
October 26, 2025Source

Internet — Security Issues — October 25th, 2025

183 million email accounts just got breached. Check if you're affected
The data breach tracking service known as Have I Been Pwned just added an immense collection of leaked user data.
October 25, 2025Source

New CoPhish attack steals OAuth tokens via Copilot Studio agents
A new phishing technique dubbed 'CoPhish' weaponizes Microsoft Copilot Studio agents to deliver fraudulent OAuth consent requests via legitimate and trusted Microsoft domains.
October 25, 2025Source

Internet — Security Issues — October 24th, 2025

Apple pulls 'Tea' and 'TeaOnHer' apps from its App Store
This summer, the Tea app — a platform where women anonymously rated and discussed men, ostensibly to help each other date safely —suffered data breaches that exposed users' personal information. In response, men launched a counterpart app called TeaOnHer, while Tea faced a class-action lawsuit from users furious over their private data being vulnerable to hackers. Now, Apple has removed both from the App Store.
October 24, 2025Source

AWS Outage Exposes Cloud Dependency, Concentration Risks
Forrester's Brent Ellis and Dario Maisto on Lessons Learned for Large Enterprises
October 24, 2025Source or Source or Source

Best VPN routers 2025: Protect your entire household with a VPN-ready router and easy installation
My favorite VPN routers give you blanket home protection and security without the need for advanced technical knowledge. These are my top picks.
October 24, 2025Source

Civilian Airport OT: the US Military's Soft Underbelly
Airport Baggage Carousels Are Weapons, in the Right Hands
October 24, 2025Source or Source or Source or Source or Source

Confidence in ransomware recovery is high but actual success rates remain low
A new OpenText study reveals high confidence in ransomware recovery, yet only 15% fully recover data after an attack, highlighting preparation gaps.
October 24, 2025Source

Critical Windows Server WSUS Vulnerability Exploited in the Wild
CVE-2025-59287 allows a remote, unauthenticated attacker to execute arbitrary code and a PoC exploit is available.
October 24, 2025Source

Fake LastPass death claims used to breach password vaults
LastPass is warning customers of a phishing campaign sending emails with an access request to the password vault as part of a legacy inheritance process.
October 24, 2025Source

Fortinet Accused of Securities Fraud Over Firewall Forecasts
Pension Funds Say Fortinet Leaders Misled Market With Overly Rosy Refresh Outlook
October 24, 2025Source

Hackers launch mass attacks exploiting outdated WordPress plugins
A widespread exploitation campaign is targeting WordPress websites with GutenKit and Hunk Companion plugins vulnerable to critical-severity, old security issues that can be used to achieve remote code execution (RCE).
October 24, 2025Source

Hackers Target Perplexity Comet Browser Users
Shortly after the browser was launched, numerous fraudulent domains and fake applications were discovered.
October 24, 2025Source

How to reduce costs with self-service password resets
We all need to reset our passwords occasionally, whether it's due to a simple memory lapse or wider security concerns. However, the process can rack up surprising expenses for organizations. This means self-service password resets (SSPR) aren't just a 'nice to have', they are essential.
October 24, 2025Source

In Other News: iOS 26 Deletes Spyware Evidence, Shadow Escape Attack, Cyber Exec Sold Secrets to Russia
Other noteworthy stories that might have slipped under the radar: Everest group takes credit for Collins Aerospace hack, Maryland launches VDP, gamers targeted with red teaming tool and RAT.
October 24, 2025Source

Infostealers Run Wild
Malware Captures Billions of Credentials
October 24, 2025Source or Source or Source or Source

Microsoft blocks risky file previews in Windows File Explorer
Along with fixing many code-based vulnerabilities, the October 2025 Windows updates also change how File Explorer handles files downloaded from the internet.
October 24, 2025Source

Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks
In files downloaded from the internet, HTML tags referencing external paths could be used to leak NTLM hashes during file previews.
October 24, 2025Source

Microsoft Outlook is getting an AI overhaul under new leaders
Outlook won't simply bolt on AI but rebuild around it.
October 24, 2025Source

Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
Microsoft has released an out-of-band security update that "comprehensively" addresses CVE-2025-59287, a remote code execution vulnerability in the Windows Server Update Services (WSUS) that is reportedly being exploited in the wild.
October 24, 2025Source

Microsoft removing support for Windows 10 could increase e-waste, cybersecurity threats
Ending support for Windows 10 will leave about 40% of Windows users with limited upgrade options, potentially resulting in up to 240 million devices becoming e-waste and increasing greenhouse gas emissions. Users unable to upgrade face heightened cybersecurity risks as vulnerabilities go unpatched. Alternatives like Linux Mint and right-to-repair initiatives may help mitigate these impacts.
October 24, 2025Source

North Korean Hackers Aim at European Drone Companies
Lazarus has used fake job offers in attacks targeting companies developing UAV technology, for information theft.
October 24, 2025Source

Pwn2Own WhatsApp Hacker Says Exploit Privately Disclosed to Meta
Questions have been raised over the technical viability of the purported WhatsApp exploit, but the researcher says he wants to keep his identity private.
October 24, 2025Source

Seduction is the new spyware: US tech startups are now the target of "sex warfare"
The spy who shagged me?
October 24, 2025Source

Surfshark introduces web content blocker for home users
Cybersecurity and privacy firm Surfshark has launched a new web content blocker aimed at home users who want to filter online material without the tracking aspect often found in parental control software.
October 24, 2025Source

This popular 'privacy browser' is actually tracking users and stealing data
One browser used to evade online gambling laws in China has been found to be a serious security risk—with possible ties to criminal rings.
October 24, 2025Source

Toys 'R' Us Canada Customer Information Leaked Online
The customer information published on the dark web includes names, addresses, phone numbers, and email addresses.
October 24, 2025Source

Windows Server emergency patches fix WSUS bug with PoC exploit
Microsoft has released out-of-band (OOB) security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability with publicly available proof-of-concept exploit code.
October 24, 2025Source

Yale New Haven Health Will Pay $18M to Settle Hack Lawsuit
March Breach Affected Nearly 5.6 Million; NextGen Proposed Settlement Also Reached
October 24, 2025Source or Source or Source or Source

Internet — Security Issues — October 20th, 2025

A New Bill Aims to Ban Both Adult Content Online and VPN Use. Could It Work?
Michigan representatives just proposed a bill to ban many types of internet content, as well as VPNs that could be used to circumvent it. Here's what we know.
October 20, 2025Source

A simple AI prompt saved a developer from this job interview scam
Plus: Ransomware posing as Teams installer, Cisco 0-day exploit to drop rootkit, and European cops bust SIM-box service
October 20, 2025Source

American Airlines Subsidiary Envoy Air Hit by Oracle Hack
Envoy Air, which operates the American Eagle brand, has confirmed that business information was stolen by hackers.
October 20, 2025Source

China blames US for cyber break-in, claims America is world's biggest bit burglar
'US is ... the greatest source of chaos in cyberspace'
October 20, 2025Source

China says it has foiled a series U.S. cyberattacks on its critical infrastructure — Ministry of State Security says it has 'irrefutable evidence' NSA tried to cause 'international time chaos'
The accusation comes after the US NSA was reportedly caught infiltrating the organization that runs high-precision timing services in Beijing.
October 20, 2025Source

China-linked Salt Typhoon hackers attempt to infiltrate European telco
Salt Typhoon, the China-linked APT group that has a penchant for targeting telecommunications companies, has been spotted trying to sneak into yet another one.
October 20, 2025Source

CISA: High-severity Windows SMB flaw now exploited in attacks
CISA says threat actors are now actively exploiting a high-severity Windows SMB privilege escalation vulnerability that can let them gain SYSTEM privileges on unpatched systems.
October 20, 2025Source

ConnectWise Patches Critical Flaw in Automate RMM Tool
Attackers could exploit vulnerable deployments to intercept and tamper with communications in certain configurations.
October 20, 2025Source

Cyberattack Disrupts Services at 2 Massachusetts Hospitals
IT Systems, Radiology Services Taken Offline; Ambulance Patients Diverted
October 20, 2025Source or Source or Source

Find hidden malicious OAuth apps in Microsoft 365 using Cazadora
If you manage even one Microsoft 365 tenant, it's time to audit your OAuth apps. Statistically speaking, there's a strong chance a malicious app is lurking in your environment.
October 20, 2025Source

Google is retiring Privacy Sandbox
Privacy Sandbox was Google's vision for replacing third-party cookies, but now the company is giving up and moving on from the idea. First launched six years ago, Privacy Sandbox suffered with low-adoption, and Google has gradually snuffed out various technologies relating to the system. Now it has taken things further.
October 20, 2025Source

Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)
Moxa has fixed 5 vulnerabilities in its industrial network security appliances and routers, including a remotely exploitable flaw (CVE-2025-6950) that may result in complete system compromise.
October 20, 2025Source

How AI is driving email phishing and how to beat the threat [Q&A]
Among all of the various forms of cyberattack phishing attempts delivered by email are still one of the most common.
October 20, 2025Source

How Unified Exposure Management Cuts Risk, Boosts Efficiency
Tenable's Nate Dyer on Moving Beyond Traditional Vulnerability Management
October 20, 2025Source

Is AI really behind layoffs, or just a convenient excuse for companies?
Are companies using the technology as a scapegoat?
October 20, 2025Source

ISMG Editors: Inside the Scattered Lapsus$ Hunters Takedown
In this week's panel, four ISMG editors discussed the FBI's disruption of Scattered Lapsus$ Hunters, turmoil inside CISA amid the U.S. federal government shutdown and how LevelBlue's acquisition of Cybereason signals big shifts in the XDR and MDR markets.
October 20, 2025Source or Source

Jamf adds AI forensics to help organizations detect and respond to mobile threats
Jamf announced the beta release of AI Analysis for Jamf Executive Threat Protection, a new AI-powered capability designed to accelerate and simplify mobile forensic analysis.
October 20, 2025Source

Lumma Stealer Activity Drops After Doxxing
The identities of alleged core members of the Lumma Stealer group were exposed in an underground doxxing campaign.
October 20, 2025Source

Massive AWS outage takes down dozens of services, including Alexa, Reddit, and Fortnite
Not a cyberattac
October 20, 2025Source

Meta Adds New Parental Controls to Limit Teen Chats with AI on Instagram and Facebook
Meta has announced new supervision tools for parents to get insights and more control on their teens activity on platforms like Instagram and Facebook. It includes their kids interaction with AI characters alongside Meta AI assistant as well. Parents will be able to either cut off their teens one-on-one chat with AI characters entirely or opt for blocking specific AI characters.
October 20, 2025Source

NPM Ecosystem Suffers Two AI-Enabled Credential Stealing Supply Chain Attacks
The Node Package Manager (npm) ecosystem has suffered from two major supply chain attacks in recent months, affecting hundreds of packages and exposing developers to credential theft and data exfiltration. The attack vector of these incidents shows an AI-enabled evolution of how open-source software dependencies can be compromised.
October 20, 2025Source

NSO Ordered to Stop Hacking WhatsApp, but Damages Cut to $4 Million
The judge ruled that punitive damages of $167 million awarded by a jury were excessive.
October 20, 2025Source

Philippine state health insurer to beef up cybersecurity with AI
PhilHealth recently introduced digital verification two years after getting hit by a ransomware attack.
October 20, 2025Source

Retail giant Muji halts online sales after ransomware attack on supplier
Japanese retail company Muji has taken offline its store due to a logistics outage caused by a ransomware attack at its delivery partner, Askul.
October 20, 2025Source

Salt Typhoon Targets European Telecom
Attack Began With Citrix NetScaler Gateway Compromise, Darktrace Said
October 20, 2025Source or Source or Source or Source

SIM Farm Dismantled in Europe, Seven Arrested
The individuals ran a highly sophisticated cybercrime-as-a-service (CaaS) platform that caused roughly €5 million (~$5.8 million) in losses.
October 20, 2025Source

UK Ministry of Defense Probes Military Contractor Data Leak
Ransomware Group Lynx Reportedly Stole 4TB of Data
October 20, 2025Source or Source or Source or Source

US Court Blocks Spyware Maker NSO Over WhatsApp Hack
NSO Group Blocked From WhatsApp and Must Destroy Code Used to Hack 1,400 Devices
October 20, 2025Source or Source or Source

US Scrambles to Patch F5 Amid China-Linked Breach
Concerns Grow Over F5 Hacking Amid Stalled Government Shutdown
October 20, 2025Source or Source or Source

Vulnerability in Dolby Decoder Can Allow Zero-Click Attacks
On Android, the out-of-bounds write issue can be triggered during the processing of media files without user interaction.
October 20, 2025Source

WatchGuard VPN Flaw Gives Hackers Full Firewall Control
A severe vulnerability in Fireware allows remote attackers to run arbitrary code without authentication, effectively transforming a trusted security device into a potential entry point for exploitation.
October 20, 2025Source

WhatsApp is working on a new way to cut down on spam
Like email, SMS, and just about every other method of communication, WhatsApp suffers from spam. There are certainly things that can be done by users to stem the flow of spam that makes its way to their inboxes, but WhatsApp is also trying to help.
October 20, 2025Source

Xubuntu downloads section injection threatens users with crypto infection
Attempted exploit was a feeble effort to target Windows users
October 20, 2025Source

Your IP address reveals more than you think. VPNs are the answer
Are you doing enough to protect your online privacy?
October 20, 2025Source

Internet — Security Issues — October 17th, 2025

3 Must Have AI Cybersecurity Tools: AI Is Fighting Back Against Sophisticated Cyberattacks
Imagine receiving an email that looks identical to one from your bank, complete with logos, professional language, and even a personalized greeting. You click a link, enter your credentials, and within minutes, your account is compromised. This isn't a hypothetical scenario, it's the reality of modern cybercrime, where AI-powered attacks are becoming more sophisticated and harder to detect. With over 166 million people affected by cyberattacks in 2023, the stakes have never been higher. But here's the twist: the same technology fueling these threats also holds the key to defending against them. Enter AI agents, your digital allies in the fight for cybersecurity.
October 17, 2025Source

2025 Nobel Prize Hit By Suspected Cyber Crime According To Norwegian Officials
Norwegian officials are looking into a potential cyber crime after they noticed a massive surge in betting activity on this year's Nobel Peace Prize winner, several hours before the official announcement was made. The convenient timing, coupled with the sheer amount of money wagered, means the Norwegian Nobel Institute is treating it as a possible case of espionage.
October 17, 2025Source

AI Agents Transform Enterprise Application Development
Why DevOps, Infrastructure Must Evolve to Manage AI-Accelerated Development
October 17, 2025Source or Source or Source or Source or Source

AI-Powered Cybersecurity: Inside Google's Gemini and Microsoft's Security Copilot
AI is reshaping cybersecurity. Here's how Google Gemini shields consumers on-device, while Microsoft Security Copilot automates enterprise detection and response.
October 17, 2025Source

Avoid 'GetSupport.Apple.com' Text Scam: How to Spot a Phishing Attack
If you've recently received a text or email claiming to be from Apple about an "unknown Apple Pay request" or a "pending charge" under your Apple ID, stop and take a breath. It's not from Apple. This latest phishing scam is making the rounds, tricking users with fake "GetSupport.Apple.com" messages that look almost legitimate.
October 17, 2025Source

Best Free Antivirus Software for Mac in 2025
While macOS is built with strong security features, it's not immune to modern threats like malware, ransomware, and phishing attacks. Whether you're using a new MacBook or an older iMac, adding antivirus protection is a smart move (and you don't have to pay for it). Several free antivirus tools offer reliable defense, minimal system impact, and user-friendly interfaces, making them ideal for everyday Mac users.
October 17, 2025Source

Censys ICS/OT solution closes visibility gaps and secures exposed industrial systems
Censys announced the release of a new ICS/OT Internet intelligence offering designed to close the visibility gap defenders face when securing exposed industrial assets.
October 17, 2025Source

Cross-Border Phishing Attacks Spreads Across Asia
Attacks Move From China to Malaysia Using Phishing PDFs
October 17, 2025Source or Source or Source or Source or Source

Gladinet Patches Exploited CentreStack Vulnerability
The unauthenticated local file inclusion bug allows attackers to retrieve the machine key and execute code remotely via a ViewState deserialization issue.
October 17, 2025Source

Hackers Steal Sensitive Data From Auction House Sotheby's
Sotheby's has disclosed a data breach impacting personal information, including SSNs.
October 17, 2025Source

Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
Threat actors have leveraged a recently patched IOS/IOS XE vulnerability (CVE-2025-20352) to deploy Linux rootkits on vulnerable Cisco network devices.
October 17, 2025Source

Have I Been Pwned logs 17.6M victims in Prosper breach
P2P lending platform says it could not verify the claims at present
October 17, 2025Source

'Highest Ever' Severity Score Assigned by Microsoft to ASP.NET Core Vulnerability
CVE-2025-55315 is an HTTP request smuggling bug leading to information leaks, file content tampering, and server crashes.
October 17, 2025Source

"I saw numerous records marked as confidential" — 40 billion unencrypted records exposed by marketing firm, raising serious security concerns
Another day, another data leak. This time it's 13TB and 40 billion records — courtesy of Netcore.
October 17, 2025Source

In Other News: CrowdStrike Vulnerabilities, CISA Layoffs, Mango Data Breach
Other noteworthy stories that might have slipped under the radar: Capita fined £14 million, ICTBroadcast vulnerability exploited, Spyware maker NSO acquired.
October 17, 2025Source

ISMG Editors: Inside the Scattered Lapsus$ Hunters Takedown
Also: Continued Turmoil at CISA, MSSP Level Blue's Acquisition of Cybereason
October 17, 2025Source or Source or Source

Madman Theory Spurs Crazy Scattered Lapsus$ Hunters Playbook
Chaos Theory and Ransomware's Love Child Serves Up Nonstop Unpredictability
October 17, 2025Source or Source or Source or Source or Source

Microsoft fixes highest-severity ASP.NET Core flaw ever
Earlier this week, Microsoft patched a vulnerability that was flagged with the "highest ever" severity rating received by an ASP.NET Core security flaw.
October 17, 2025Source

Microsoft revokes 200 certs used to sign malicious Teams installers
By revoking 200 software-signing certificates, Microsoft has hampered the activities of Vanilla Tempest, a ransomware-wielding threat actor that has been targeting organizations with malware posing as Microsoft Teams.
October 17, 2025Source

Microsoft Warns Rising ClickFix Attacks Are Fooling Users Into Running Malware
Microsoft has reported a sharp increase in ClickFix-based attacks in its Digital Defense Report 2025. It uses a rare trick to force users to unknowingly infect themselves. The tech giant has also shared some precautionary measures to stay safe from these kinds of attacks.
October 17, 2025Source

Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US
The U.S. is the top target for cyberattacks, with criminals and foreign adversaries targeting companies, governments and organizations.
October 17, 2025Source

Notorious hacker group doxxes ICE and FBI officials in new leak, report says
Hundreds of ICE, FBI, and DOJ officials have allegedly been unmasked.
October 17, 2025Source

Opt Out October: Daily Tips to Protect Your Privacy and Security
Trying to take control of your online privacy can feel like a full-time job. But if you break it up into small tasks and take on one project at a time it makes the process of protecting your privacy much easier. This month we're going to do just that. For the month of October, we'll update this post with new tips every weekday that show various ways you can opt yourself out of the ways tech giants surveil you.
October 17, 2025Source

Over 266,000 F5 BIG-IP instances exposed to remote attacks
Internet security nonprofit Shadowserver Foundation has found more than 266,000 F5 BIG-IP instances exposed online after the security breach disclosed by cybersecurity company F5 this week.
October 17, 2025Source

Over $3 Million in Prizes Offered at Pwn2Own Automotive 2026
The unauthenticated local file inclusion bug allows attackers to retrieve the machine key and execute code remotely via a ViewState deserialization issue.
October 17, 2025Source

Prosper Market Data Breach Affects 17.6M Individuals
Breach Notification Service Details Peer-to-Peer Lending Marketplace Victim Count
October 17, 2025Source or Source or Watch Video or Source or Source

Q3 Ransomware Attacks Increase 36% YoY, BlackFog Report Reveals
"From grounded aircraft and stranded passengers to manufacturers forced to halt production, the disruption has been significant."
October 17, 2025Source

Ring lets police ask for security videos. Here's how to opt out
A feature in Ring's Neighbors app allows law enforcement to request footage from your Ring cameras. You don't have to play ball.
October 17, 2025Source

This new cyberattack tricks you into hacking yourself. Here's how to spot it
Traditional anti-phishing methods won't protect you.
October 17, 2025Source

US Scrambles to Patch F5 Amid China-Linked Breach
Concerns Grow Over F5 Hacking Amid Stalled Government Shutdown
October 17, 2025Source or Source

Internet — Security Issues — October 15th, 2025

'A Call to Arms' as UK Faces 50% Surge in Major Cyberattacks
In its Annual Review, published on Tuesday, the security agency states that the UK has experienced a 50% increase in "highly significant" cyberattacks over the past year. Officials attributed the surge to the UK's increasing dependence on digital systems and a sharp increase in ransomware activity targeting organisations for financial gain.
October 15, 2025Source

Aura enhancements simplify opt-outs and strengthen online privacy
Aura new tools to help consumers reclaim control over their personal information online. The new capabilities automate some of the most time-consuming privacy tasks, including removing personal details from Google search results, opting out of data broker sites, and identifying forgotten or active accounts that may be leaking sensitive data.
October 15, 2025Source

Banking Scams Up 65% Globally in Past Year
Prices go up. Population goes up. And to complete this unhappy trinity, banking scams go up.
October 15, 2025Source

BarracudaONE adds AI-powered tools to help MSPs simplify security
Barracuda Networks unveiled enhancements to its AI-powered BarracudaONE platform. New capabilities, including bulk remediation for email threats, PSA integrations for automated billing and invoicing, and streamlined account management, are purpose-built for managed service providers (MSPs), helping them accelerate security across multi-tenant environments, simplify operations, and drive scalable growth.
October 15, 2025Source

Beyond Secrets Manager: Designing Zero-Retention Secrets in AWS With Ephemeral Access Patterns
Ephemeral access patterns in AWS eliminate credential sprawl. This architecture uses IAM, STS, and brokers to enable zero-retention secrets at scale.
October 15, 2025Source

BigID introduces MCP Server to unlock AI-native access to enterprise data
BigID announced the launch of its Model Context Protocol (MCP) server, designed to unlock AI-native access to enterprise data context across the broadest range of data sources — structured, unstructured, on-prem, cloud, business applications, and AI frameworks.
October 15, 2025Source

Capita fined £14M after 58-hour delay exposed 6.6M records
ICO makes example of outsourcing giant over sluggish cyber response
October 15, 2025Source

Chinese Actor Targets Russian IT Provider
Symantec Says It Spotted Likely Supply Chain Hack
October 15, 2025Source or Source

CISA Issues Emergency Directive to Address Critical Vulnerabilities in F5 Devices
Nation-State Cyber Threat Actor Poses Immediate Risk to Federal Networks
October 15, 2025Source

CISA: F5 Hack Exposes Fed Networks to Full Compromise
Federal Agencies Ordered to Patch or Decommission F5 Devices Amid Imminent Risk
October 15, 2025Source or Source

Clothing giant MANGO discloses data breach exposing customer info
Spanish fashion retailer MANGO is sending notices of a data breach to its customers, warning that its marketing vendor suffered a compromise exposing personal data.
October 15, 2025Source

Customer Service Firm 5CA Denies Responsibility for Discord Data Breach
After being named by Discord as the third-party responsible for the breach, 5CA said none of its systems were involved.
October 15, 2025Source

Cyber giant F5 Networks says government hackers had 'long-term' access to its systems, stole code and customer data
Cybersecurity firm F5 Networks says government-backed hackers had "long-term, persistent access" to its network, which allowed them to steal the company's source code and customer information.
October 15, 2025Source

Discord Data Breach Plot Thickens As Third-Party Firm Denies It Was Hacked
A Discord data breach involving government IDs has taken a turn, as the third-party firm 5CA denies being hacked and blames "human error."
October 15, 2025Source

Discord's data breach drama is now turning into a blame game
Discord blamed 5CA, 5CA says it's not its fault. Nevertheless, thousands of people's sensitive data was leaked.
October 15, 2025Source

F5 data breach: "Nation-state attackers" stole BIG-IP source code, vulnerability info
US tech company F5 has suffered a breach, and the attackers made off with source code of and vulnerability information related to its BIG-IP family of networking and security products, the company confirmed today.
October 15, 2025Source

F5 discloses major security breach linked to nation-state hackers
F5 disclosed a security breach where nation-state hackers infiltrated its systems, stealing source code and vulnerability details. Customers are being notified and updates have been released.
October 15, 2025Source

F5 releases BIG-IP patches for stolen security vulnerabilities
Cybersecurity company F5 has released security updates to address BIG-IP vulnerabilities stolen in a breach detected on August 9, 2025.
October 15, 2025Source

F5 says hackers stole undisclosed BIG-IP flaws, source code
U.S. cybersecurity company F5 disclosed that nation-state hackers breached its systems and stole undisclosed BIG-IP security vulnerabilities and source code.
October 15, 2025Source

F5 Says Nation-State Hackers Stole Source Code and Vulnerability Data
F5 shared few details on the threat actor, but the attack profile seems to point to China.
October 15, 2025Source

Federated learning AI developed for hospitals and banks without personal information sharing
Federated learning was devised to solve the problem of difficulty in aggregating personal data, such as patient medical records or financial data, in one place. However, during the process where each institution optimizes the collaboratively trained AI to suit its own environment, a limitation arose: The AI became overly adapted to the specific institution's data, making it vulnerable to new data.
October 15, 2025Source

Fresh Phishing Kit Innovation: Automated ClickFix Attacks
Latest Toolkits Target Microsoft 365 Credentials, Offer Easy-to-Deploy Lures
October 15, 2025Source or Source

Gen Z targeted by AI-driven extortion scams
New research looking at high pressure extortion scams reveals that Gen Z is being particularly impacted by AI-powered threats. All mobile users are at risk, however, with one in three having been targeted by an extortion scam, often threatening to expose pictures or browsing history, and nearly one in five falling victim.
October 15, 2025Source

Google introduces new tools to help users fight against evolving phishing scams effectively
Keeping you a step ahead of phishing attempts.
October 15, 2025Source

Google now lets you add friends as contacts for account recovery
Google is announcing new privacy and recovery tools to combat spam across multiple products related to Android, including suspicious link detection in messages, sign-in with phone number, and recovery contacts.
October 15, 2025Source

Google steps up the fight against scams with new tools and more education
Scams and fraud are an ever present threat on the internet and the rise of AI means that they're getting harder to spot with the old giveaways of bad grammar and dodgy attachments largely eliminated.
October 15, 2025Source

Harmonic Security targets AI data risks with Model Context Protocol Gatewa
Harmonic Security announced Model Context Protocol (MCP) Gateway, a developer-friendly, locally installed gateway that gives security teams complete visibility and control over their organization's agentic AI ecosystem.
October 15, 2025Source

High-Severity Vulnerabilities Patched by Fortinet and Ivanti
High-Severity Vulnerabilities Patched by Fortinet and Ivanti
October 15, 2025Source

'Highly sophisticated' government goons hacked F5, stole source code and undisclosed bug details
Security shop F5 today said "highly sophisticated nation-state" hackers broke into its network and stole BIG-IP source code, undisclosed vulnerability details, and customer configuration data belonging to a "small percentage" of its users.
October 15, 2025Source

How to spot dark web threats on your network using NDR
Cybersecurity professionals recognize that enterprise networks are prime targets for dark web risks such as ransomware, unauthorized insider activity, and data exfiltration. What's less obvious is that evidence of this activity often hides in plain sight, buried within everyday network traffic.
October 15, 2025Source

Human Risk Report Reveals Overconfidence in Phishing Defenses
A new report reveals that despite continued confidence in cybersecurity defenses, everyday employee behaviors — from phishing errors to risky AI practices — remain a leading cause of data breaches.
October 15, 2025Source

ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact
Over 20 advisories have been published by industrial giants this Patch Tuesday.
October 15, 2025Source

Imprivata Buys Verosint for Real-Time Identity Risk Spotting
Risk Scoring to Enable Real-Time Action by Imprivata on Suspicious Access Attempts
October 15, 2025Source or Source

Microsoft patches three zero-days actively exploited by attackers
On October 2025 Patch Tuesday, Microsoft released fixes for 175+ vulnerabilities, including three zero-days under active attack: CVE-2025-24990, CVE-2025-59230, and CVE-2025-47827.
October 15, 2025Source

Microsoft Tightens Edge's IE Mode After Hackers Exploit Zero-Day Flaws
According to Microsoft's investigation, the attack chain started when users were tricked into visiting exploitative websites.
October 15, 2025Source or Source

My brain finally grasps 2FA security after watching this adorable parrot
Pets can be both fun and educational to watch!
October 15, 2025Source

New Cranium AI features enhance compliance, security, and agentic AI scalability
Cranium AI released several new agentic AI capabilities and featured releases to its AI Governance and Security Platform. These new products and capabilities are designed to enable enterprises to scale faster with AI agents, streamline compliance and fortify AI systems against real-world vulnerabilities.
October 15, 2025Source

New York Hospitals Are Facing Tougher Cyber Rules Than HIPAA
Matthew Bernstein of Bernstein Data on Broadening Data Privacy Hurdles
October 15, 2025Source or Source or Source or Source or Source

Open source malware up 140 percent
The latest OS Malware Index from Sonatype shows a 140 percent surge in open source malware as attackers target data and trusted dependencies.
October 15, 2025Source

PowerSchool hacker gets sentenced to four years in prison
19-year-old college student Matthew D. Lane, from Worcester, Massachusetts, was sentenced to 4 years in prison for orchestrating a cyberattack on PowerSchool in December 2024 that resulted in a massive data breach.
October 15, 2025Source

Preparing for the Post-Quantum Cryptography Shift
Point Wild's Zulfikar Ramzan Says Cryptography Is Crucial Against Quantum Risks
October 15, 2025Source or Source

Recovering and rebuilding trust after a cyberattack [Q&A]
However good your defenses, cyberattacks can still happen. However, in many cases, the aftermath can be worse than the attack itself, as enterprises struggle to calm nerves and reassure staff, customers, and shareholders.
October 15, 2025Source

Red Hat AI 3 helps enterprises scale AI workloads across hybrid environments
Red Hat released Red Hat AI 3, an evolution of its enterprise AI platform. Bringing together the latest innovations from Red Hat AI Inference Server, Red Hat Enterprise Linux AI (RHEL AI), and Red Hat OpenShift AI, the platform simplifies the complexities of high-performance AI inference at scale, enabling organizations to move workloads more easily from proof of concept to production and enhance collaboration on AI-enabled applications.
October 15, 2025Source

RGS IC Cloud Support enables Kubernetes management in restricted cloud environments
Rancher Government Solutions (RGS) announced the launch and general availability of IC Cloud Support, a new capability purpose-built for government and military teams operating in classified cloud environments.
October 15, 2025Source

Thousands of customers imperiled after nation-state ransacks F5's network
Risks to BIG-IP users include supply-chain attacks, credential loss, and vulnerability exploits.
October 15, 2025Source

Training the grid to spot cyberattacks without seeing your data
SUTD researchers test a privacy-preserving approach that blends federated learning with cloud coordination for smart grids in future 6G environments.
October 15, 2025Source

UK ICO Fines Capita 14M Pounds Over 2023 Hack
British outsourcing giant Capita must pay 14 million pounds to British data regulators for privacy violations tied to a 2023 hack that impacted more than 6 million individuals.
October 15, 2025Source or Source or Source or Source or Source

Visa Puts Autonomous Commerce at the Core of Payments
The Payments Giant Is Creating Digital Rails for Secure, AI-Driven Commerce
October 15, 2025Source or Source or Source or Source or Source

When 'Secure Boot' Doesn't Mean 'Secure'
Roughly 200,000 laptops and desktops made by modular sensation Framework contain a firmware vulnerability allowing attackers to disable Secure Boot and run unsigned code, say security researchers.
October 15, 2025Source or Source or Source

Internet — Security Issues — October 13th, 2025

Android 'Pixnapping' attack can capture app data like 2FA codes
GPU-based timing attack inspired by decade-old iframe technique
October 13, 2025Source

Chinese Owners Locked Out of Dutch Chip Maker Nexperia
Dutch Ministry Invokes National Security Law to Impose Domestic Control
October 13, 2025Source

Cybercriminals are not the lone wolves of 20 years ago, says expert
City University London spoke to Professor Rajarajan about his mission to protect us all from the threat of international cyber criminality. Professor Raj Rajarajan is an academic at City St George's, University of London whose research focuses on cybersecurity and security engineering.
October 13, 2025Source

Dutch government puts Nexperia on a short leash over chip security fears
Minister invokes powers to stop firm shifting knowledge to China, citing governance shortcomings
October 13, 2025Source or Source or Source or Source or Source

Harvard investigating breach linked to Oracle zero-day exploit
Harvard University is investigating a data breach after the Clop ransomware gang listed the school on its data leak site, saying the alleged breach was likely caused by a recently disclosed zero-day vulnerability in Oracle's E-Business Suite servers.
October 13, 2025Source

Is that virus warning real? How to spot false alarms
When an antivirus program sounds the alarm, it always triggers a moment of shock in the user. But the warning is not always justified. Because even a virus scanner can make mistakes.
October 13, 2025Source

Malicious Code on Unity Website Skims Information From Hundreds of Customers
The video game software development company says the incident impacted users of its SpeedTree website.
October 13, 2025Source

Meet Varonis Interceptor: AI-Native Email Security
Today, we are excited to announce Varonis Interceptor, AI-native email security.
October 13, 2025Source

Microsoft 'illegally' tracked students via 365 Education, says data watchdog
Redmond argued schools, education authorities are responsible for GDPR
October 13, 2025Source

NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms
Threat actors used automation to create over 175 malicious NPM packages targeting more than 135 organizations.
October 13, 2025Source

Oracle releases emergency patch for new E-Business Suite flaw
Oracle has issued an emergency security update over the weekend to patch another E-Business Suite (EBS) vulnerability that can be exploited remotely by unauthenticated attackers.
October 13, 2025Source or Source

Pro-Russia TwoNet Hacktivists Target Water Utility Honeypot
Today's Hapless Hackers Are Tomorrow's Threat, Warns Forescout
October 13, 2025Source or Source or Source or Source or Source

Salesforce announces Agentforce 360 as enterprise AI competition heats up
Salesforce announced Monday the latest version of its AI agent platform as the company looks to lure enterprises to its AI software in an increasingly crowded market.
October 13, 2025Source

Senators try to save cyber threat sharing law, sans government funding
A bipartisan Senate duo has introduced a bill to revive and extend America's cyber threat-sharing law for another ten years after its authorization lapsed during the government shutdown.
October 13, 2025Source

SonicWall SSL VPN Accounts in Attacker Crosshairs
Threat actors have rapidly compromised more than 100 SonicWall SSL VPN accounts pertaining to over a dozen entities.
October 13, 2025Source or Source

Spanish Authorities Dismantle 'GXC Team' Crime-as-a-Service Operation
The authorities arrested GoogleXcoder, the alleged administrator of GXC Team, which offered phishing kits and Android malware.
October 13, 2025Source

UK fines 4Chan over online safety compliance
Ofcom says that 4Chan will face ongoing daily penalties for ignoring 'legally-binding information requests.'
October 13, 2025Source or Source

Vulnerability in confidential cloud environments uncovered
Some data is so sensitive that it is processed only in specially protected cloud areas. These are designed to ensure that not even a cloud provider can access the data. ETH Zurich researchers have now found a vulnerability that could allow hackers to breach these confidential environments.
October 13, 2025Source

Internet — Security Issues — October 10th, 2025

77% of Employees Share Company Secrets on ChatGPT, Report Warns
New report reveals 77% of employees share sensitive company data through ChatGPT and AI tools, creating major security and compliance risks.
October 10, 2025Source

Accenture helps organizations advance agentic AI with Gemini Enterprise
Accenture and Google Cloud announced that their strategic alliance is driving client reinvention with Gemini Enterprise agentic AI solutions, building on the successful adoption of Google Cloud technologies for organizations across industries.
October 10, 2025Source

ALN, Octapharma Plasma Agree to Settle Breach Lawsuits
2 Firms Hit by Separate 2024 Attacks to Pay Total of $6.5M in Class Action Claims
October 10, 2025Source or Source or Source or Source or Source

Apple Bug Bounty Update: Top Payout $2 Million, $35 Million Paid to Date
Apple has announced significant updates to its bug bounty program, including new categories and target flags.
October 10, 2025Source

Apple offers $2 million for zero-click exploit chains
Apple bug bounty program's categories are expanding and rewards are rising, and zero-click exploit chains may now earn researchers up to $2 million.
October 10, 2025Source

Australia Levies First-Ever Privacy Act Fine Over Lab Breach
Australian Clinical Labs Ordered to Pay $3.8 Million Over Pathology Unit Data Theft
October 10, 2025Source or Source

Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
CVE-2025-11371, an unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and Triofox file-sharing and remote access platforms, is being exploited by attackers in the wild.
October 10, 2025Source

Blackpoint Cyber versus Arctic Wolf: Which MDR Solution is Right for You?
Want to improve your security? Compare Blackpoint Cyber and Arctic Wolf to find the best MDR solution.
October 10, 2025Source

Can't FB ATM, BB -- the social media acronyms that have us scratching our heads
The tech industry has always been fond of acronyms for various technologies, and the rise of social media has brought many more into everyday use. But how many of these have you shrugging your shoulders and saying IDK* what that means?
October 10, 2025Source

CISA in Disarray Amid Shutdown and Growing Political Threats
US Cyber Defense Agency Slammed by Shutdown, Personnel Cuts and Resource Crisis
October 10, 2025Source or Source or Source or Source

comforte AG debuts TAMUNIO, its all-in-one shield for data security
comforte AG launched TAMUNIO, an all-in-one data security platform integrating tokenization, encryption, and confidential computing to address growing cyber threats and regulatory scrutiny.
October 10, 2025Source

Cops nuke BreachForums (again) amid cybercrime supergroup extortion blitz
US and French fuzz pull the plug on Scattered Lapsus$ Hunters' latest leak shop targeting Salesforce
October 10, 2025Source

Creepy Israeli Spyware Vendor NSO Group Reportedly Sells to U.S. Company at the Worst Possible Time
Journalists beware.
October 10, 2025Source

FBI takes down BreachForums portal used for Salesforce extortion
The FBI seized a BreachForums domain used by the ShinyHunters group as a data leak extortion site for the widespread Salesforce attacks, with the threat actor stating that law enforcement also stole database backups for the notorious hacking forum.
October 10, 2025Source

Google Brings Open Third-Party Extensions to Gemini CLI
Unlike ChatGPT's tightly managed system, developers can integrate their own apps into Gemini's command-line tool.
October 10, 2025Source

Google's Gemini Enterprise Signals the Next Phase of Workplace AI
Google unveils Gemini Enterprise, an all-in-one AI platform designed to unify workplace tools, automate workflows, and simplify how teams get work done.
October 10, 2025Source

Hackers Exploit LFI Flaw in File-Sharing Platforms
Attackers Read Server Files and Steal Credentials in Gladinet CentreStack, Triofox
October 10, 2025Source

Hackers exploiting zero-day in Gladinet file sharing software
Threat actors are exploiting a zero-day vulnerability (CVE-2025-11371) in Gladinet CentreStack and Triofox products, which allows a local attacker to access system files without authentication.
October 10, 2025Source

Homeland Security reassigns 'hundreds' of CISA cyber staffers to support Trump's deportation crackdown
The U.S. Department of Homeland Security is reassigning hundreds of employees across several of its agencies to assist in the Trump administration's broad immigration crackdown and will dismiss staffers who refuse to comply, according to news reports.
October 10, 2025Source

How bad is the Discord hack? What you need to know.
The government-issued IDs of 70,000 users have been exposed.
October 10, 2025Source

In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware
Other noteworthy stories that might have slipped under the radar: US universities targeted by payroll pirates, Zimbra vulnerability exploited, Mic-E-Mouse attack.
October 10, 2025Source

Investor group led by Hollywood producer to acquire iPhone spyware company NSO
NSO, the Israeli company behind iPhone spyware Pegasus, is being acquired by a group of investors led by Hollywood producer Robert Simonds. Here are the details.
October 10, 2025Source

ISMG Editors: How the US Federal Shutdown Exposes Cyber Gaps
Also: Shutdown's Ripple Effects on Healthcare, Mounting Threats to Aging OT Systems
October 10, 2025Source or Source or Source or Source

Juniper Networks Patches Critical Junos Space Vulnerabilities
Patches were rolled out for more than 200 vulnerabilities in Junos Space and Junos Space Security Director, including nine critical-severity flaws.
October 10, 2025Source

Microsoft Warns US Universities Of Alarming Payroll Pirate Attack Security Threat
A financially-motivated hacking group, tracked by Microsoft as Storm-2657, has so far successfully compromised employee accounts at three U.S. universities to steal their salaries in what campaign experts are deeming "payroll pirate" attacks. The sophisticated scheme targets human resource (HR) platforms, such as Workday, to redirect direct deposit payments to accounts controlled by the attackers.
October 10, 2025Source or Source

Mobilicom rolls out a secured autonomy system powering next-gen AI drones
Mobilicom launched the Secured Autonomy (SA) Compute PRO-AT, which combines Mobilicom's OS3 (Operational Security, Safety, and Standards compliance) cybersecurity software with Aitech's rugged, NVIDIA-based AI Supercomputers, including the A230 Vortex AI GPGPU (general-purpose computing on graphics processing units) supercomputer.
October 10, 2025Source

New malware waits until you watch porn, then secretly films via webcam
The so-called Stealerium malware can detect porn activity and take compromising material for use in blackmail and sextortion attacks.
October 10, 2025Source

New York City sues social media giants over youth mental health crisis
Lawsuit says algorithms keep kids hooked and anxious
October 10, 2025Source

OpenVPN redefines secure connectivity with Access Server 3.0
OpenVPN released Access Server 3.0, a major update to its self-hosted business VPN solution that delivers foundational improvements to performance, flexibility, and system integration.
October 10, 2025Source

Pentera Acquires DevOcean to Streamline Vulnerability Fixes
Pentera-DevOcean Platform to Deliver Unified Attack Simulation and Remediation
October 10, 2025Source or Watch Video or Source

Pro-Russia hacktivist group dies of cringe after falling into researchers' trap
Forescout's phony water plant fooled TwoNet into claiming a fake cyber victory -- then it quietly shut up shop
October 10, 2025Source

Proof launches Certify, the cryptographic answer to AI-generated fraud
Generative AI is enabling the proliferation of fake documents, images, videos, and data at an unprecedented scale, to the point where it's indistinguishable from reality. While fake media and misinformation have garnered the most attention, the real danger in AI lies in its ability to forge signatures, falsify records, impersonate one's voice on the phone or fake a person's likeness on video.
October 10, 2025Source

Ransomware crims that exploited SharePoint 0-days add Velociraptor to their arsenal
And they're likely still abusing the same SharePoint flaws for initial access
October 10, 2025Source

RondoDox Botnet Takes 'Exploit Shotgun' Approach
The botnet packs over 50 exploits targeting unpatched routers, DVRs, NVRs, CCTV systems, servers, and other network devices.
October 10, 2025Source

Securing HTTPS From the Inside Out: Preventing Client-Side Interception Attacks
How to use Instagram anonymously without an account
October 10, 2025Source

SonicWall Warns Cloud Backup Users of Security Risk
Akira Ransomware Hackers Targeting SonicWall Devices
October 10, 2025Source or Source or Source or Source or Source or Source

Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks
Google researchers believe exploitation may have started as early as July 10 and the campaign hit dozens of organizations.
October 10, 2025Source

Spyware maker NSO Group confirms acquisition by US investors
NSO spokesperson Oded Hershowitz told TechCrunch on Friday that "an American investment group has invested tens of millions of dollars in the company and has acquired controlling ownership."
October 10, 2025Source

Take Back Control: 16 Self-Hosted Projects You Need to Try Today
What if you could take back control of your digital life, your data, your tools, your choices, without sacrificing functionality or innovation? In an era where cloud-based services dominate, the trade-off often feels inevitable: convenience at the cost of privacy. But what if it didn't have to be that way? Enter the world of self-hosted projects, where open source ingenuity meets personal empowerment.
October 10, 2025Source

The spy who came in from the Wi-Fi: Beware of radio network surveillance
If you pass by a cafe that operates a Wi-Fi network, you can be identified—even if you do not carry a smartphone with you. Researchers at Karlsruhe Institute of Technology (KIT) have found out that it is possible to identify people solely through Wi-Fi signals. They point out that this constitutes a significant risk to privacy.
October 10, 2025Source

UK slaps 'strategic market status' on Google, unlocking power to pry open search
Competition watchdog can now meddle in how the tech giant runs the biggest wing of its organization
October 10, 2025Source

UK techies' union warns members after breach exposes sensitive personal details
Prospect apologizes for cyber gaffe affecting up to 160K members
October 10, 2025Source

ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities
The unpatched vulnerabilities allow attackers to execute arbitrary code remotely and escalate their privileges.
October 10, 2025Source

Internet — Security Issues — October 8th, 2025

8 red flags of a phishing scam: I insta-delete any email with these tip-offs
Dare to resist phishing scams with these tips.
October 8, 2025Source

AI Security Goes Mainstream as Vendors Spend Heavily on M&A
Platform Vendors Target Runtime Defense, Prompt Flow, Agent Identity and Output
October 8, 2025Source or Source or Source

Arrests Underscore Fears of Teen Cyberespionage Recruitmen
Telegram Used to Lure Teen Recon Recruits
October 8, 2025Source or Source or Source or Source or Watch Video or Source

As real life banks close, network operator starts a Scam School to stop Granny getting mugged online
Broadband biz teams up with Good Things Foundation to teach the digitally doddery how to dodge fraud
October 8, 2025Source

AT&T to Pay Millions After Data Breaches — Here's How to Claim Up to $7,500
AT&T is facing major backlash as millions of customers affected by two data breaches are now eligible for compensation of up to $7,500 under a $177 million class action settlement. While AT&T denies wrongdoing, it agreed to settle to avoid prolonged litigation. A final approval hearing is set for December 3, 2025, and affected customers have until November 18, 2025, to file claims.
October 8, 2025Source

Cyber defense innovation could significantly boost 5G network security
A new framework, FedLLMGuard, integrates large language models and federated learning to enhance 5G network security. It enables real-time, accurate detection of cyber threats while preserving data privacy. Testing shows FedLLMGuard achieves 98.64% threat recognition accuracy in 0.0113 s, outperforming existing models and offering a scalable, efficient solution for 5G cybersecurity.
October 8, 2025Source

Cyber skills gap leads to escalating security risks
A Fortinet report reveals a growing cyber skills gap, leading to escalating security risks and rising breach rates. Organizations are adopting AI, but lack expertise hinders effective implementation.
October 8, 2025Source

CyberArk unveils new capabilities to reduce risk across human and machine identities
CyberArk announced new discovery and context capabilities across its Machine Identity Security portfolio. The enhancements enable security teams to find, understand and secure machine identities, spanning certificates, keys, secrets, workloads and more, reducing risk and simplifying compliance at scale.
October 8, 2025Source

DraftKings Warns Users of Credential Stuffing Attacks
Hackers accessed user accounts and compromised names, addresses, phone numbers, email addresses, and other information.
October 8, 2025Source

EU Unveils AI Tech Sovereignty Plans
AI Strategies Seeks to Bolster Its Position in the Global AI Race
October 8, 2025Source or Source or Source or Source or Source

Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
Hundreds of internet-exposed Oracle E-Business Suite instances may still be vulnerable to attacks.
October 8, 2025Source

Fake itch.io game pages are secretly stealing gamer accounts and planting malware
Malwarebytes has outlined a scam affecting the gaming platform Itch.io that exploits the trust between players and indie developers by impersonating popular games, such as Archimoulin. The scammers begin an attack by sending a direct message from a compromised account on a trusted platform like Discord, which increases the chance that victims will click the link.
October 8, 2025Source

Federal shutdown deals blow to already hobbled cybersecurity agency
A federal shutdown and expired cybersecurity law are crippling the Cybersecurity and Infrastructure Security Agency (CISA), reducing staff and hindering information sharing. This occurs amid increasing cyber threats.
October 8, 2025Source

Free Healthcare 'Toolkit' Ranks and Maps Third-Party Risk
Guide Helps Teams Prioritize, Recognizing Not All Vendors Pose Same Level of Risk
October 8, 2025Source or Source or Source or Source or Source

Germany Under Pressure to Oppose EU Chat Control Proposal
Signal and Rights Groups Urge Berlin to Reject CSAM Proposal Ahead of Key EU Vote
October 8, 2025Source or Source or Source or Source or Source

GitHub Adds Post-Quantum Secure SSH Key Exchange to Protect Git Data in Transit
GitHub is introducing a hybrid post-quantum secure SSH key exchange algorithm, sntrup761x25519-sha512, to protect Git data in transit from future quantum computer threats.
October 8, 2025Source

Google DeepMind's New AI Agent Finds and Fixes Vulnerabilities
The new product is called CodeMender and it can rewrite vulnerable code to prevent future exploits.
October 8, 2025Source

Google Offers Up to $20,000 in New AI Bug Bounty Program
The company has updated the program's scope and has combined the rewards for abuse and security issues into a single table.
October 8, 2025Source

Hackers exploit auth bypass in Service Finder WordPress theme
Threat actors are actively exploiting a critical vulnerability in the Service Finder WordPress theme that allows them to bypass authentication and log in as administrators.
October 8, 2025Source

Hospital Insider Breach Lasted 10 Years, Led to FBI Inquiry
Texas-Based Harris Health Says FBI Just Gave Green Light to Notify 5,000 Patients
October 8, 2025Source or Source or Source or Source or Source

Kaseya Buys Inky to Expand Email Threat Detection for MSPs
Email Security Acquisition Aims to Bring Cross-Platform Data to Phishing Defense
October 8, 2025Source or Source or Source or Source or Source

London police arrests suspects linked to nursery breach, child doxing
The UK Metropolitan Police has arrested two suspects following an investigation into the doxing of children online after a ransomware attack on a chain of London-based nurseries.
October 8, 2025Source

Netskope UZTNA adds policy control by device posture, risk, and role
Netskope has enhanced its Universal Zero Trust Network Access (UZTNA) solution. Comprised of Netskope One Private Access and Netskope Device Intelligence, Netskope's UZTNA solution extends beyond the core use case of delivering fast, consistent, secure access to remote and local users and devices to deliver deeper threat inspection of their diverse device ecosystems and private application traffic.
October 8, 2025Source

North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025
The hackers are believed to have stolen over $6 billion for the Pyongyang regime, financing its military programs.
October 8, 2025Source or Source

Radiflow Unveils New OT Security Platform
Radiflow360 provides enhanced visibility, risk management, and incident response capabilities for mid-sized industrial enterprises.
October 8, 2025Source or Source

Ransomware Group Claims Attack on Beer Giant Asahi
The hackers claim the theft of 27 gigabytes of data, including contracts, employee information, and financial documents.
October 8, 2025Source

Reading the Fine Print When Managing Vendor Risk
Risk and Compliance Review Professionals Can Save Millions and Help Avoid Breaches
October 8, 2025Source or Source or Source or Source or Source

Researchers Out Front Companies for Chinese Intelligence
Beijing-Based Institute Researches Steganography, Forensics, Network Penetration
October 8, 2025Source or Source or Source or Source or Source

Researchers uncover ClickFix-themed phishing kit
Palo Alto Networks researchers have discovered and analyzed "IUAM ClickFix Generator", a phishing kit that allows less skilled attackers to infect unsuspecting users with malware by using the increasingly popular ClickFix social engineering technique.
October 8, 2025Source

Telecoms wholesaler ICUK restores services after two-day DDoS pelting
No idea who's behind it, just happy it's over
October 8, 2025Source

The world's most sensitive computer code is vulnerable to attack. A new encryption method can help
Nowadays data breaches aren't rare shocks—they're a weekly drumbeat. From leaked customer records to stolen source code, our digital lives keep spilling into the open.
October 8, 2025Source

Varonis Interceptor stops AI-evasive email attacks
Varonis Systems announced the availability of Varonis Interceptor, a new approach to email security that uses multi-layered AI to detect and block social engineering attacks, even when they originate from trusted or compromised sources.
October 8, 2025Source

Virtual Event Today: Zero Trust & Identity Strategies Summit
Join the virtual event we dive into the world of digital identity management and the role of zero-trust principles and associated technologies.
October 8, 2025Source

Why CISOs Must Prioritize OT Penetration Testing
Penetration testing has been a well-established practice in IT security for decades, enabling organizations to identify weaknesses before threat actors can exploit them. In operational technology (OT) environments, the stakes are even higher. An attack on OT systems could have potentially disastrous consequences, putting lives and safety at risk. That's why OT penetration testing is rapidly becoming a priority.
October 8, 2025Source or Source

Why Enterprises Continue to Stick With Traditional AI
Explainability, Cost, Compliance Drive AI Choices in Enterprises
October 8, 2025Source or Source or Source or Source or Source

Internet — Security Issues — October 3rd, 2025

A new guide to tackle tech abuse of older people
A new guide addresses the increasing use of digital technology, such as smartphones and smart home devices, to perpetrate abuse against people over 60. Evidence indicates a significant proportion of older victims experience technology-enabled threats, stalking, and financial exploitation. The guide offers practical prevention strategies and aims to support frontline staff in identifying and responding to digital abuse.
October 3, 2025Source

Chrome 141 and Firefox 143 Patches Fix High-Severity Vulnerabilities
High-severity flaws were patched in Chrome's WebGPU and Video components, and in Firefox's Graphics and JavaScript Engine components.
October 3, 2025Source

Cyberattack halts shipments from Japan's biggest brewer
A cyberattack on Asahi Group has halted beverage shipments, including Asahi Super Dry, due to a system failure, though production itself is not directly affected. The disruption has not yet caused major shortages in stores, but concerns remain. Asahi's shares have dropped nearly 7% since the incident, and recovery timing is uncertain.
October 3, 2025Source

ESET releases free resources for Cybersecurity Awareness Month
ESET released a free Cybersecurity Awareness Kit for October, including updated training, a threat report, and a business security trial.
October 3, 2025Source

Hacking group claims theft of 1 billion records from Salesforce customer databases
A notorious predominantly English-speaking hacking group has launched a website to extort its victims, threatening to release about a billion records stolen from companies who store their customers' data in cloud databases hosted by Salesforce.
October 3, 2025Source

In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach
Other noteworthy stories that might have slipped under the radar: cybercriminals offer money to BBC journalist, LinkedIn user data will train AI, Tile tracker vulnerabilities.
October 3, 2025Source

Japanese beer giant Asahi confirms ransomware attack
Asahi, a major Japanese beer producer, confirmed a ransomware attack impacting its factories, leading to IT disruptions and potential data theft.
October 3, 2025Source

MokN Raises $3 Million for Phish-Back Solution
French cybersecurity startup MokN raised €2.6 million (~$3 million) for its deception-based identity protection solution, which uses honeypots to alert security teams.
October 3, 2025Source

Oneleet Raises $33 Million for Security Compliance Platform
Cybersecurity startup Oneleet raised $33 million to expand its security compliance platform, combining attack surface management with code scanning and other security tools.
October 3, 2025Source

Oracle links Clop extortion attacks to July 2025 vulnerabilities
Oracle has linked ongoing Clop ransomware extortion attacks to vulnerabilities patched in July 2025, urging customers to update their software.
October 3, 2025Source

Oracle Says Known Vulnerabilities Possibly Exploited in Recent Extortion Attacks
Oracle confirmed recent extortion emails targeting customers may stem from exploitation of vulnerabilities patched in July 2025 within their E-Business Suite.
October 3, 2025Source

Oracle Sees No Zero-Day Exploits Tied to Customer Extortion
Oracle acknowledges customers are being targeted by data-stealing extortionists, likely linked to Clop, who exploit previously identified vulnerabilities from the July 2025 patch update.
October 3, 2025Source or Source or Source or Source

Oracle tells Clop-targeted EBS users to apply July patch, problem solved
Researchers suggest internet-facing portals are exposing 'thousands' of orgs
October 3, 2025Source

Organizations Warned of Exploited Meteobridge Vulnerability
SecurityWeek reports a recently exploited vulnerability (CVE-2025-4008) in Meteobridge weather station devices allows remote command execution. CISA has added it to their Known Exploited Vulnerabilities catalog.
October 3, 2025Source

Presenting AI to the Board as a CISO? Here's a Template.
As organizations accelerate the adoption of generative AI, boards of directors and AI committees are asking new questions: Where is AI being used? What risks does it create? And how are we governing it?
October 3, 2025Source

Red Hat fesses up to GitLab breach after attackers brag of data theft
Red Hat confirmed attackers accessed and copied data from a dedicated consulting GitLab instance, claiming the incident was limited and notifying authorities.
October 3, 2025Source or Source

Renault and Dacia UK warn of data breach impacting customers
Renault and Dacia UK have warned customers of a data breach impacting personal information, including names, addresses, and vehicle details, due to a third-party cyberattack.
October 3, 2025Source

ShinyHunters launches Salesforce data leak site to extort 39 victims
ShinyHunters, linked to Scattered Lapsus$ Hunters, launched a data leak site extorting 39 companies after Salesforce breaches, threatening to release stolen data.
October 3, 2025Source

Trusted enclaves from Intel and AMD shown vulnerable to physical attacks
Academic teams bypass chip-level enclave protections with low-cost hardware
October 3, 2025Source

Unauthenticated RCE Flaw Patched in DrayTek Routers
The security defect can be exploited remotely via crafted HTTP/S requests to a vulnerable device's web user interface.
October 3, 2025Source

When loading a model means loading an attacker
You probably think twice before downloading a random app or opening an unfamiliar email attachment. But how often do you stop to consider what happens when your team downloads and loads a machine learning model?
October 3, 2025Source

Windows 10 Security Updates Stop Tomorrow, but This Free Program Can Keep Your PC Secure
If you can't upgrade your PC to Windows 11, you should sign up for the Extended Security Updates program ASAP.
October 3, 2025Source

Internet — Security Issues — September 29th, 2025

6 Best Enterprise Antivirus Software Choices
We reviewed the leading enterprise antivirus and EDR tools and found SentinelOne Singularity to be the best overall, followed closely by Microsoft Defender and CrowdStrike Falcon.
September 29, 2025Source

8 Best Enterprise Password Managers
After reviewing the top enterprise password managers in the market, I found Keeper to be the best overall, particularly for its ease of use, and management-focused feature set.
September 29, 2025Source

Akira ransomware: From SonicWall VPN login to encryption in under four hours
Four hours or less: that's how long it takes for Akira affiliates to break into organizations and deploy the ransomware on their systems, Arctic Wolf researchers have warned.
September 29, 2025Source or Source

Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention
The government has announced a support package, but a cybersecurity expert has raised some concerns.
September 29, 2025Source

DHS and CISA Announce Cybersecurity Awareness Month 2025
Secretary Noem has tasked CISA with leading the charge to secure America's cyberspace
September 29, 2025Source

Dutch Teens Arrested for Allegedly Helping Russian Hackers
One of the two 17-year-old boys allegedly walked by law enforcement and embassy offices carrying a Wi-Fi sniffer.
September 29, 2025Source

Forget numbers—your PIN could consist of a shimmy and a shake
In the near future, you may not need to touch a keypad to select a tip or pay for large purchases. All it may take is a swipe, tap or other quick gesture.
September 29, 2025Source

Harrods blames its supplier after crims steal 430k customers' data in fresh attack
Attackers make contact but negotiations fall on deaf ears
September 29, 2025Source

Harrods suffers new data breach exposing 430,000 customer records
UK retail giant Harrods has disclosed a new cybersecurity incident after hackers compromised a third-party supplier and stole 430,000 records with sensitive e-commerce customer information.
September 29, 2025Source

How EU's data protection regulation affected news and media websites
Following the implementation of the GDPR, EU news and media websites reduced online tracking and adopted more consent mechanisms compared to U.S. sites. Despite these changes, there was no statistically significant impact on EU websites' ability to provide content or maintain visitor engagement, indicating that content providers adapted without major negative effects on content availability or user interaction.
September 29, 2025Source

How to set up a passkey for your Microsoft account
Not to be confused with how to set up a passkey in Windows.
September 29, 2025Source

Jaguar Land Rover to partly resume output after cyberattack
Jaguar Land Rover will partially restart production after a damaging cyberattack, with the UK government providing a £1.5 billion loan guarantee to support the firm.
September 29, 2025Source

Japan's largest brewer suspends operations due to cyberattack
Asahi Group Holdings, Ltd (Asahi), the brewer of Japan's top-selling beer, has disclosed a cyberattack that disrupted several of its operations.
September 29, 2025Source

LockBit ransomware returns with a vengeance, affecting multiple OSes
No system is safe anymore. The newest variant of LockBit ransomware targets Windows, Linux, and VMware ESXi systems simultaneously.
September 29, 2025Source

Joint guidance on creating and maintaining a definitive view of your operational technology architecture
The Canadian Centre for Cyber Security (Cyber Centre) has joined the United Kingdom's National Cyber Security Centre (NCSC-UK) and the following international partners in releasing guidance on creating and maintaining a definitive view of operational technology (OT) architecture:
September 29, 2025Source

Lyin' and Cheatin', AI Models Playing a Game
OpenAI, Apollo Research Find Models Hide Misalignment; Training Cuts Deception
September 29, 2025Source or Source or Source or Source or Source

North Korea Fake Job Recruiters Up Their Backdoor Game
Eset: Lazarus Group Shares Backdoor With Newer Pyongyang Threat Actor
September 29, 2025Source or Source or Source or Source or Source

NowSecure Privacy helps organizations protect mobile apps from data leaks
NowSecure announced the release of NowSecure Privacy, a privacy solution for mobile applications. With this launch, developers, security teams, and privacy professionals gain the capabilities needed to identify and fix systemic blind spots that compromise mobile application privacy.
September 29, 2025Source

OneBlood Agrees to Pay $1M Settlement in Ransomware Hack
2024 Cyberattack Was One of Several on Other Blood Suppliers in US, UK
September 29, 2025Source or Source or Source or Source or Source

Phishing training doesn't stop your employees from clicking scam links - here's why
A UC San Diego study found phishing training programs are basically useless, with employees just as likely to click scam emails whether or not they took training.
September 29, 2025Source

Popular Neon app that pays users to share call recordings remains down for now - here's why
The service has been taken down, but the developer promises a relaunch in another one to two weeks.
September 29, 2025Source

Ransomware gang sought BBC reporter's help in hacking media giant
Threat actors claiming to represent the Medusa ransomware gang tempted a BBC correspondent to become an insider threat by offering a significant amount of money.
September 29, 2025Source

Senate Bill Seeks Privacy Protection for Brain Wave Data
MIND Act Asks FTC to Study Exploitation Risks for Neural Data Collected by Devices
September 29, 2025Source or Source or Source or Source or Source

Shutdown Threat Puts Federal Cyber on Edge
Cybersecurity Programs, Workforce Face Disruption If Congress Fails to Act
September 29, 2025Source or Source or Source or Source or Source

Tile exploit could let stalkers follow you with your own tracker — Bluetooth broadcasting flaw is relatively simple to exploit, researchers discover
Long in the Bluetooth.
September 29, 2025Source

UK Government Backs Jaguar Land Rover With 1.5B Pound Loan
The British government will guarantee a 1.5 billion pound loan to Jaguar Land Rover as the embattled carmaker grapples with the fallout of a September cyberattack that froze production and sales across the globe.
September 29, 2025Source or Source

Unpatched Cognex Cameras Expose Industrial Systems
Nearly a dozen serious vulnerabilities in a Cognex industrial smart camera will go without a patch because the company says the model is "too old to merit a fix."
September 29, 2025Source or Source

Who's Minding the Machines? The Identity Crisis Nobody Owns
Machine Identities Outpace Human Ones, But Accountability Lags Behind
September 29, 2025Source or Source or Source

You're likely not as immune to scams as you think—here's why
Recent data shows Australians lost over A$2 billion to scams in 2024, enabled by technology and exploiting human psychology—anyone can be vulnerable.
September 29, 2025Source

Internet — Security Issues — September 26th, 2025

8×8 Omni Shield blocks SMS fraud threats
8×8 has launched 8×8 Omni Shield Self-Service, a no-code SMS fraud protection tool that helps businesses to detect, monitor, and block threats like Artificially Inflated Traffic (AIT) in real time.
September 26, 2025Source

150,000 Records of Home Health Care Firm Exposed on Web
Researcher Finds Database of Sensitive Patient Info With No Password Protection
September 26, 2025Source or Source or Source or Source or Source

Attackers exploited critical Fortra GoAnywhere flaw in zero-day attacks (CVE-2025-10035)
CVE-2025-10035, a perfect CVSS 10.0 vulnerability in the Fortra GoAnywhere managed file transfer solution, has apparently been exploited in zero-day attacks before the patch was released on September 15, 2025.
September 26, 2025Source

Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks
Leading to remote code execution and privilege escalation, the flaws were exploited on Cisco ASA 5500-X series devices that lack secure boot.
September 26, 2025Source

Feds Isolate Cisco Firewalls to Defend Against 'Arcane Door'
CISA Issues Emergency Directive After Cisco Exploits Persist After Reboot
September 26, 2025Source or Source or Source or Source

How the EU Data Act Shifts Control Back to Users
Newly Implemented Rule to Boost Cloud Competition and AI Development
September 26, 2025Source or Source or Source or Source

In Other News: LockBit 5.0, Department of War Cybersecurity Framework, OnePlus Vulnerability
Other noteworthy stories that might have slipped under the radar: Co-op lost £206 million due to cyberattack, South Korean credit card company hacked, Maryland Transit Administration ransomware attack.
September 26, 2025Source

Interpol Says 260 Suspects in Online Romance Scams Have Been Arrested in Africa
The operation took place in July and August and focused on scams in which perpetrators build online romantic relationships to extract money from targets or blackmail them with explicit images, Interpol said.
September 26, 2025Source

New Chinese Espionage Hacking Group Uncovered
'RedNovember' Has Hacked Organizations in the US, Asia and Europe
September 26, 2025Source or Source or Source or Source or Source

New XCSSET macOS Malware Variant Hijacks Cryptocurrency Transactions
The malware now uses a four-stage infection chain, has an additional persistence mechanism, and also targets Firefox browser data.
September 26, 2025Source

No Patches for Vulnerabilities Allowing Cognex Industrial Camera Hacking
Cognex is advising customers to transition to newer versions of its machine vision products.
September 26, 2025Source

North Korea's Fake Recruiters Feed Stolen Data to IT Workers
North Korean threat actors pose as recruiters to steal developers' identities and supply them to fraudulent IT workers.
September 26, 2025Source

Recent Fortra GoAnywhere MFT Vulnerability Exploited as Zero-Day
Eight days before patches, a threat actor exploited CVE-2025-10035 as a zero-day to create a backdoor admin account.
September 26, 2025Source

Trackforce upgrades TrackTik with AI-powered incident reporting capabilities
Trackforce has launched ReportPro AI within its TrackTik platform, an enhancement to incident reporting designed for guards, supervisors, and compliance teams.
September 26, 2025Source

Internet — Security Issues — September 25th, 2025

As many as 2 million Cisco devices affected by actively exploited 0-day
Search shows 2 million vulnerable Cisco SNMP interfaces exposed to the Internet.
September 25, 2025Source

Battered by cyberattacks, Salesforce faces a trust problem - and a potential class action lawsuit
It's been a brutal year for Salesforce customers. ZDNET research reveals the CRM giant could be doing more to secure the parts of its platform exploited in recent attacks.
September 25, 2025Source

Chainguard Libraries for JavaScript provides developers with malware-free dependencies
Chainguard released Chainguard Libraries for JavaScript, a collection of trusted builds of thousands of common JavaScript dependencies that are malware-resistant and built from source on SLSA L2 infrastructure.
September 25, 2025Source

Chinese Cyberspies Hacked US Defense Contractors
RedNovember has been targeting government, defense and aerospace, and legal services organizations worldwide.
September 25, 2025Source

Chinese Hackers Lurked Nearly 400 Days in Networks With Stealthy BrickStorm Malware
Google's Threat Intelligence Group and Mandiant link the BrickStorm campaign to UNC5221, warning that hackers are analyzing stolen code to weaponize zero-day vulnerabilities.
September 25, 2025Source

CISA Issues Emergency Directive Requiring Federal Agencies to Identify and Mitigate Cisco Zero-Day Vulnerabilities
Agency Urges All Affected Organizations to Take Immediate Action to Protect their Devices
September 25, 2025Source

Cisco fixes IOS/IOS XE zero-day exploited by attackers (CVE-2025-20352)
Cisco has fixed 14 vulnerabilities in IOS and IOS XE software, among them CVE-2025-20352, a high-severity vulnerability that has been exploited in zero-day attacks.
September 25, 2025Source

Cisco Patches Zero-Day Flaw Affecting Routers and Switches
The security defect allows remote attackers with administrative privileges to execute arbitrary code as the root user.
September 25, 2025Source

CSA Unveils SaaS Security Controls Framework to Ease Complexity
New framework from the Cloud Security Alliance helps SaaS customers navigate the shared responsibility model with confidence.
September 25, 2025Source

DDoS attack volumes surge 41 percent as threats rapidly evolve
The latest Radar report from Gcore finds DDoS attacks have reached unprecedented scale and disruption in 2025, and businesses need to act fast to protect themselves from this evolving threat.
September 25, 2025Source

Did gambling operator Boyd Gaming pay ransom in cyberattack?
Boyd Gaming Corp. isn't saying whether it paid a ransom to cybercriminals who broke into its internal information technology systems.
September 25, 2025Source

Digital Experience Monitoring and Endpoint Posture Checks Usage in SASE
Learn how digital experience monitoring and endpoint posture checks integrate with SASE to enforce zero trust and ensure secure, reliable performance.
September 25, 2025Source

DOGE might be storing every American's SSN on an insecure cloud server
A report from Senate Democrats says DOGE moved sensitive information to a cloud server despite the risk of "catastrophic" impacts.
September 25, 2025Source

Empty shelves, empty coffers: Co-op pegs cyber hit at £80m
Supermarket says the hack that shut down systems and emptied shelves has turned profits into losses
September 25, 2025Source

How the fraud protection system is wrongly brandishing thousands of innocent banking customers
Hundreds of thousands of unsuspecting banking customers could be unknowingly slapped with a fraud marker without even knowing about it.
September 25, 2025Source

How to get free Windows 10 security updates through October 2026
Don't want to fork over $30 to keep getting Windows 10 security updates? Microsoft is offering a couple of ways to avoid the fee, but customers in Europe get the best deal.
September 25, 2025Source

How to remove yourself from Whitepages in 5 quick steps - and why you should
Is your name, address, and phone number on this popular website? Here's how to request removal and protect your privacy.
September 25, 2025Source

Malicious Rust packages on Crates.io steal crypto wallet keys
Two malicious packages with nearly 8,500 downloads in Rust's official crate repository scanned developers' systems to steal cryptocurrency private keys and other secrets.
September 25, 2025Source

Microsoft spots LLM-obfuscated phishing attack
Cybercriminals are increasingly using AI-powered tools and (malicious) large language models to create convincing, error-free emails, deepfakes, online personas, lookalike/fake websites, and malware.
September 25, 2025Source

Microsoft will offer free Windows 10 extended security updates in Europe
In a follow-up statement after the article was published, Microsoft told BleepingComputer that EEA customers will only be able to get free Windows 10 extended security updates if they log in to Windows and enroll using a Microsoft account.
September 25, 2025Source

New study shows 'massive spike' in fraudulent apps powered by AI
A new study says there has been a dramatic rise in the number of fraudulent mobile apps on both iOS and Android. Many of these appear to have been either generated with, or powered by, AI tools.
September 25, 2025Source

North Korean IT workers use fake profiles to steal crypto
ESET Research has published new findings on DeceptiveDevelopment, also called Contagious Interview. This North Korea-aligned group has become more active in recent years and focuses on stealing cryptocurrency. It targets freelance developers working on Windows, Linux, and macOS systems.
September 25, 2025Source

Onapsis enhances SAP security with latest platform updates
Onapsis announced updates to its Onapsis Platform, including the launch of three new capabilities: the SAP Notes Command Center, Rapid Controls for Dangerous Exploits, and Alert on Anything for SAP Business Technology Platform (BTP). Together, these enhancements provide organizations with insights, visibility, and automation to strengthen their SAP application security posture.
September 25, 2025Source

Perspective: Why Politics in the Workplace is a Cybersecurity Risk
Bringing politics into professional spaces undermines decision-making, collaboration, and ultimately weakens security teams.
September 25, 2025Source

PyPI Warns Users of Fresh Phishing Campaign
Threat actors impersonating PyPI ask users to verify their email for security purposes, directing them to fake websites.
September 25, 2025Source

RTX Confirms Airport Services Hit by Ransomware
The aerospace and defense giant has disclosed the cyberattack in a filing with the SEC.
September 25, 2025Source

Salesforce AI Hack Enabled CRM Data Theft
Prompt injection has been leveraged alongside an expired domain to steal Salesforce data in an attack named ForcedLeak.
September 25, 2025Source

SlimeMoldCrypt relies on gloopy living organism's ever-changing network of tendrils for its dynamic, biological, encryption engine — inventor claims concept is resistant to decryption 'even by quantum machines'
But treat your physarum polycephalum well, or it could die.
September 25, 2025Source

Steam beta helps players prep for games requiring Secure Boot or TPM
Steam Hardware Survey will also start collecting Secure Boot and TPM data
September 25, 2025Source or Source

Teen suspected of Vegas casino cyberattacks released to parents
A 17-year-old hacker who surrendered to face charges over cyberattacks targeting Vegas casinos in 2023 has been released into the custody of his parents, a family court judge ruled.
September 25, 2025Source

The Shai-Hulud Threat: Protecting Against Malicious npm Packages
The recent discovery of malicious JavaScript packages on npm, collectively known as "Shai-Hulud," highlights a critical issue in the open source community that affects not just developers but the broader ecosystem of applications and services relying on npm code.
September 25, 2025Source

Valve adds Secure Boot and TPM checks to Steam on Windows
In 2021, with the initial release of Windows 11, the average PC user got to learn two new terms: Trusted Platform Module, or TPM, and Secure Boot. These features became mandatory for those who want to run Windows 11 officially, but for everyone else, TPM and Secure Boot remained irrelevant.
September 25, 2025Source

Volvo Group Employee Data Stolen in Ransomware Attack
The Miljödata data breach has impacted numerous organizations, education institutions, and Swedish municipalities.
September 25, 2025Source

Zero-day deja vu as another Cisco IOS bug comes under attack
The latest in a run of serious networking bugs gives attackers root if they have SNMP access
September 25, 2025Source

Internet — Security Issues — September 22nd, 2025

Amazon account hacked? Here's what to do
Getting locked out of your Amazon account or seeing strange orders can be scary. Here's how to take back control and keep it safe.
September 22, 2025Source

AT&T And T-Mobile Employees Fooled By 20-Year Old Hacker Noah Urban, Compromising Customer Data Without Coding Skills
07.13.2013
September 22, 2025Source

Banks that identify fraudsters increase loyalty, retain more defrauded customers than others who never were compromised
Financial institutions are constantly fighting off fraudsters who steal money from customer accounts. Banks spend millions each year to figure out who was responsible and keep customers from leaving; however, in most cases it's nearly impossible to figure out who committed the fraud.
September 22, 2025Source

Best VPN services: 8 top picks for every VPN need
There are a lot of VPN options out there; we'll help you cut through the clutter.
September 22, 2025Source

Car giant Stellantis says customer data nicked after partner vendor pwned
Automaker insists only names and emails exposed, no financials
September 22, 2025Source

Data privacy push sparks tech surge in US banks
A new study led by Dr. Sarah Zhang from Alliance Manchester Business School has uncovered how small banks in the United States are reacting to growing concerns about data privacy.
September 22, 2025Source

EU's cyber agency blames ransomware as Euro airport check-in chaos continues
Airport staff revert to manual ops as travellers urged to use self-service check-in where possible
September 22, 2025Source

European Airport Disruptions Caused by Ransomware Attack
Collins Aerospace is reportedly having difficulties recovering from the ransomware attack.
September 22, 2025Source

FOMO? Brit banking biz rolls out AI tools, talks up security
Lloyds Data and AI lead doesn't want devs downloading models from the likes of Hugging Face -- too risky
September 22, 2025Source

HoundBytes Launches Automated Security Analyst
The Romania-based company has launched WorkHorse and is preparing for a funding round to accelerate growth.
September 22, 2025Source

LastPass: Fake password managers infect Mac users with malware
LastPass is warning users of a campaign that targets macOS users with malicious software impersonating popular products delivered through fraudulent GitHub repositories.
September 22, 2025Source

Microsoft patches terrifyingly serious Entra ID privilege elevation vulnerability
Details have emerged about a now-patched flaw in Microsoft Entra ID which could have been exploited to gain access to any tenant of any company in the world.
September 22, 2025Source

Mycroft Raises $3.5 Million for AI-Powered Security and Compliance Platform
The Canada-based company has emerged from stealth with autonomous AI agents designed to manage and operate the security and IT stack.
September 22, 2025Source

Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud
L1TF Reloaded is a vulnerability combining the old L1TF and half-Spectre hardware flaws to bypass deployed software mitigations.
September 22, 2025Source

Robots are prone to privacy leaks despite encryption
A new study from the University of Waterloo has unveiled major privacy weaknesses in collaborative robots—calling for stronger defenses.
September 22, 2025Source

Stellar Cyber 6.1 equips SecOps teams with multi-layer AI
Stellar Cyber announced Stellar Cyber 6.1, designed to help customers and partners advance toward a human-augmented autonomous SOC.
September 22, 2025Source

Sumo Logic brings agentic AI to the enterprise security stack
Enterprises face a growing volume and complexity of cyber threats which means security teams struggle with alert fatigue and managing a spread of tools.
September 22, 2025Source

Teenage Scattered Spider Suspect Arrested in Las Vegas
Juvenile Male Tied to Hack Attacks Against MGM Resorts and Caesars Entertainment
September 22, 2025Source or Source or Source or Source

Twitch streamer raising money for cancer treatment has funds stolen by malware-ridden Steam game — BlockBlasters title stole $150,000 from hundreds of players
Valve has since pulled "BlockBlasters" from its marketplace.
September 22, 2025Source

Why attackers are moving beyond email-based phishing attacks
Attackers are increasingly sending phishing links over non-email delivery channels like social media, instant messaging apps, and malicious search engine ads. In this article, we'll explore why phishing attacks are moving away from exclusively email-based delivery, and what this means for security teams.
September 22, 2025Source

Why the cybersecurity industry needs to be more accessible [Q&A]
The proliferation of different cybersecurity tools has created an operational crisis for organizations, with companies struggling to manage an increasing array of defensive technologies.
September 22, 2025Source

Widespread Infostealer Campaign Targeting macOS Users
Threat actors rely on malicious GitHub repositories to infect LastPass's macOS users with the Atomic infostealer.
September 22, 2025Source

Internet — Security Issues — September 19th, 2025

5 ways to spot software supply chain attacks and stop worms - before it's too late
A Dune-inspired worm recently hit CrowdStrike and npm, infecting hundreds of packages. Here's what happened - and how to protect your code.
September 19, 2025Source

$115 million ransomware hacker arrested over extortion attacks — Scattered Spider alumnus allegedly involved in over 120 computer network intrusions targeting 47 U.S. entities
The British national is accused of hacking over 120 computer networks and attacking close to 50 different U.S. entities.
September 19, 2025Source

Agentic AI and its impact on the healthcare sector [Q&A]
Agentic AI is changing healthcare workflows by moving from passive data analysis to active orchestration of decisions.
September 19, 2025Source

Alleged Scattered Spider teen cuffed after extortion Bitcoin used to buy games, meals
Feds say gift card splurges tied suspect to multimillion-dollar ransomware crew
September 19, 2025Source

Astra API Security Platform secures undocumented and vulnerable APIs
Astra Security has launched its API Security Platform, designed to identify undocumented, zombie, and shadow APIs that threaten infrastructure and expose sensitive PII. Instead of relying on reactive, siloed detection tools, Astra's platform delivers proactive, automated protection against attackers exploiting APIs to compromise systems.
September 19, 2025Source

ChatGPT Tricked Into Solving CAPTCHAs
The AI agent was able to solve different types of CAPTCHAs and adjusted its cursor movements to better mimic human behavior.
September 19, 2025Source or Source

CISA Analyzes Malware From Ivanti EPMM Intrusions
Hackers chained two Ivanti EPMM vulnerabilities to collect system information, dump credentials, and execute malware.
September 19, 2025Source

CISA exposes malware kits deployed in Ivanti EPMM attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published an analysis of the malware deployed in attacks exploiting vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM).
September 19, 2025Source

CNET Survey: 47% of Americans Use VPNs for Privacy. That Number Could Rise as State Internet Bans Increase
As more bans on internet content appear in the US, we reached out to users to see why and how they're adopting VPNs for a privacy fix.
September 19, 2025Source

Ding ding: Fortra rings the perfect-10 bell over latest GoAnywhere MFT bug
Outside experts say the vulnerability has probably already been exploited
September 19, 2025Source

ExpressVPN launches EventVPN, a free VPN service uilt for privacy
Apple users can now enjoy a reliable free VPN without worrying about data privacy.
September 19, 2025Source

Computer scientists are boosting US cybersecurity
As cyber threats grow more sophisticated by the day, UC Riverside researchers are making computing safer thanks to research that targets some of the internet's most pressing security challenges.
September 19, 2025Source

FBI Pushes Back Against Scrutiny Over Cyber Cuts, Vacancies
FBI Director Claims 'Supremely Qualified' Unnamed Leaders Replaced Cyber Officials
September 19, 2025Source or Source or Source or Source

FBI warns of cybercriminals using fake FBI crime reporting portals
The FBI warned today that cybercriminals are impersonating its Internet Crime Complaint Center (IC3) website in what the law enforcement agency described as "possible malicious activity."
September 19, 2025Source

Fortra warns of max severity flaw in GoAnywhere MFT's License Servlet
Fortra has released security updates to patch a maximum severity vulnerability in GoAnywhere MFT's License Servlet that can be exploited in command injection attacks.
September 19, 2025Source

Hackers Steal SonicWall Firewall Configurations
Hackers Accessed Backup Firewall Preference Files
September 19, 2025Source or Source or Source or Source or Source

ImmuniWeb offers free tool to test quantum resilience of TLS stacks
The tool analyzes SSL/TLS configurations and verifies their compliance with the latest quantum-resilient encryption standards from NIST. It also checks for adherence to PCI DSS, HIPAA, and other NIST cryptographic requirements. Available via both web interface and API, the tool is aimed at organizations looking to assess their preparedness for quantum-era threats. The tool is designed to simplify PQC readiness checks for organizations of all sizes, integrating into CI/CD pipelines via API for automated scanning.
September 19, 2025Source

In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek's Coding Bias
Noteworthy stories that might have slipped under the radar: Eve Security seed funding, Claroty report, patches from WatchGuard and Nokia.
September 19, 2025Source

Internal chaos after a cyberattack causes more damage than the attack itself
A new survey from cybersecurity incident response management (CIRM) specialist Cytactic finds 70 percent of cybersecurity leaders say internal misalignment following a cyberattack caused them more chaos than the threat actor itself, leaving many organizations paralyzed by breakdowns in authority, coordination, and clarity.
September 19, 2025Source

Irregular Secures $80M Series A to Combat AI Model Exploits
Startup Simulates Offensive and Defensive AI to Test and Thwart AI-Based Threats
September 19, 2025Source or Source or Source or Source

ISMG Editors: Security Acquisitions Face Cultural Challenges
In this week's update, three ISMG editors discussed Mitsubishi Electric's $883 million purchase plans for Nozomi Networks, the new Sandbox AI bill in Congress that aims to cut perceived red tape limiting AI innovation and takeaways from last week's annual Cybersecurity Summit: London Financial Services.
September 19, 2025Source or Source or Source or Source or Source

Ivanti EPMM holes let miscreants plant shady listeners, CISA says
Unnamed org compromised with two malware sets
September 19, 2025Source

James Bond Wannabes: The UK's Spy Office Says Learn to Use a VPN
A new dark web portal hopes to recruit spies for the UK, and Russians are especially wanted.
September 19, 2025Source

Known. Emerging. Unstoppable? Ransomware Attacks Still Evade Defenses
No, it's not new or particularly exotic, but after years of attacks, ransomware continues to rank among the most destructive threats facing global organizations today.
September 19, 2025Source

Michigan anti-porn law would also block VPNs
The workaround won't work.
September 19, 2025Source

Microsoft Disrupts RaccoonO365 Phishing Platform in Major Domain Takedown
Microsoft reports that it has seized 338 domains tied to RaccoonO365, a phishing-as-a-service operation it described as one of the fastest-growing criminal platforms targeting its users.
September 19, 2025Source

Netskope Raises Over $908 Million in IPO
Netskope has debuted on Nasdaq and its shares soared more than 18%, bringing the company's value to $8.6 billion.
September 19, 2025Source

New Texas Law Targets AI, Health Record Storage
Attorney Rachel Rose on Latest State Regulatory Health Data Considerations
September 19, 2025Source or Source or Source or Source or Source

New Tigera solution protects AI workloads from data ingestion to deployment
Tigera announced a new solution to secure AI workloads running in Kubernetes clusters. Due to the resource-intensive and bursty nature of AI workloads, Kubernetes has become the de facto orchestrator for deploying them. However AI workloads introduce security challenges, throughout the data ingestion and preparation, model training, and deployment stages.
September 19, 2025Source

One token to pwn them all: Entra ID bug could have granted access to every tenant
Until Microsoft lobbed it into a virtual volcano
September 19, 2025Source

Russian Nation-State Hackers Join Forces to Target Ukraine
First-Ever Malware Tie-Up Spotted Between FSB's Turla and Gamaredon Hacking Groups
September 19, 2025Source or Source or Source or Source or Source

Scattered Spider Hackers Charged in Connection Wibth Transport for London Attack
Scattered Spider Hackers Charged in Connection With Transport for London Attack
September 19, 2025Source

Turla and Gamaredon Working Together in Fresh Ukrainian Intrusions
Turla malware was deployed in February on select systems that Gamaredon had compromised in January.
September 19, 2025Source

Two of the Kremlin's most active hack groups are collaborating, ESET says
Turla is getting a helping hand from Gamaredon. Both are units of Russia's FSB.
September 19, 2025Source

Two Scattered Spider Suspects Arrested in UK; One Charged in US
Thalha Jubair and Owen Flowers were charged in the UK and the US with hacking critical infrastructure organizations.
September 19, 2025Source

Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking
Novakon HMIs are affected by remote code execution and information exposure vulnerabilities.
September 19, 2025Source

Vega Secures $65M to Scale SecOps, Take On Traditional SIEMs
Funding Supports Threat Hunting, Natural Language to Replace Legacy Detection
September 19, 2025Source or Source or Source or Source or Source

Internet — Security Issues — September 16th, 2025

ChatGPT's Calendar Integration Can Be Exploited to Steal Emails
Researchers show how a crafted calendar invite can trigger ChatGPT to exfiltrate sensitive emails.
September 16, 2025Source or Watch Video

China slaps 1-hour deadline on reporting serious cyber incidents
Cyberspace watchdog tightens reporting regime, leaving little time to hide incidents
September 16, 2025Source

Credit bureaus keep getting hacked. Protect yourself with 4 steps
Pass this advice on to friends and family, too.
September 16, 2025Source

Digital.ai brings expert-level cryptography to any developer team
Digital.ai released its App Sec White-box Cryptography Agent to simplify application security for developers and help customers ensure that every application requiring protection is secured.
September 16, 2025Source

Endpoint Security Firm Remedio Raises $65 Million in First Funding Round
The bootstrapped company will invest in an AI-powered unified enterprise platform combining configuration, compliance, patching, and vulnerability management.
September 16, 2025Source

ExpressVPN versus NordVPN: Two VPN Titans Battle It Out in a Contest That Goes Down to the Wire
I compared CNET's top two VPNs. Here's how they stack up.
September 16, 2025Source

FileFix attacks use fake Facebook security alerts to trick victims into running infostealers
Tech evolved from PoC to global campaign in under two months
September 16, 2025Source

Fraud Prevention Company SEON Raises $80 Million in Series C Funding
The company will invest in its AI and real-time detection platform, in global expansion, and in strategic partnerships.
September 16, 2025Source

GitHub adds post-quantum protection for SSH access
GitHub is adding post-quantum cryptography to secure SSH connections, a move that signals the company's preparation for a time when current encryption may no longer be safe.
September 16, 2025Source

Jaguar Land Rover extends shutdown after cyberattack by another week
Jaguar Land Rover (JLR) announced today that it will extend the production shutdown for another week, following a devastating cyberattack that impacted its systems at the end of August.
September 16, 2025Source

JLR stuck in neutral as losses skyrocket amid cyberattack cleanup
Latest extension to factory closures takes incident response into fourth week
September 16, 2025Source

Endpoint SecurityRowhammer Attack Demonstrated Against DDR5
Researchers devise Phoenix, a new Rowhammer attack that achieves root on DDR5 systems in less than two minutes.
September 16, 2025Source

N-able strengthens backup threat protection
N-able has enhanced the capabilities of Cove Data Protection with the launch of Anomaly Detection as a Service (ADaaS). Strengthening Cove's defense against cyberthreats, this service is built into Cove's architecture with no additional management overhead or cost impact.
September 16, 2025Source

Neon Cyber exits stealth with Workforce Cybersecurity Platform
Neon Cyber announced its emergence from stealth and unveiled its Workforce Cybersecurity Platform (WCP), delivering protection across browsers, SaaS applications, and enterprise systems in every department.
September 16, 2025Source or Source

New FileFix attack uses steganography to drop StealC malware
A newly discovered FileFix social engineering attack impersonates Meta account suspension warnings to trick users into unknowingly installing the StealC infostealer malware.
September 16, 2025Source

Pixel's Monthly Security Bulletins to List Only High-Risk Security Flaws
Google smartphones previously received an exhaustive bulletin on the first Monday of every month.
September 16, 2025Source

Private Internet Access review: A low-price, high-value VPN
This jack-of-all-trades VPN proves it's still one of the best.
September 16, 2025Source

Protecting Non-Human Identities: Why Workload MFA and Dynamic Identity Matter Now
Secrets can't secure non-human identities at scale. Modern workloads require verifiable identity and contextual trust to operate safely.
September 16, 2025Source

Ransomware attackers used incorrectly stored recovery codes to disable EDR agents
All target organizations are different, but ransomware attackers are highly adaptive and appreciate -- and will exploit -- any mistake you make.
September 16, 2025Source

Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection
Tel Aviv, Israel-based Ray Security emerged from stealth with $11 million seed funding and a desire to change the way corporate data is protected. The funding was co-led by Venture Guides and Ibex Investors.
September 16, 2025Source

Salesforce launches 'Missionforce,' a national security-focused business unit
Salesforce is increasing its focus on national security.
September 16, 2025Source

Security Analytics Firm Vega Emerges From Stealth With $65M in Funding
Vega provides security analytics and operations solutions designed to help organizations detect and respond to threats.
September 16, 2025Source

Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims
The notorious cybercrime groups claim they are going dark, but experts believe they will continue their activities.
September 16, 2025Source

Self-propagating worm fuels latest npm supply chain compromise
Intrusions bear the same hallmarks as recent Nx mess
September 16, 2025Source

Sentra enables organizations to leverage Copilot without compromising security
Sentra launched its solution for securing Microsoft 365 Copilot, enabling organizations to adopt Copilot with confidence while remaining compliant and protecting sensitive enterprise data.
September 16, 2025Source

Team-Wide VMware Certification: Your Secret Weapon for Security
But when your entire team is certified? That's a force multiplier for innovation, retention, and your security posture.
September 16, 2025Source or Source

US-Based Investors Ramp Up Spyware Investments
The international affairs think tank Atlantic Council added 20 US-based investors to its global list.
September 16, 2025Source

Internet — Security Issues — September 9th, 2025

160,000 Impacted by Wayne Memorial Hospital Data Breach
In May 2024, hackers stole names, Social Security numbers, financial information, and protected health information from the hospital's systems.
September 9, 2025Source< or Source

Another Plex data breach sees company urge users to change their password
A Plex data breach in 2022 exposed usernames, email addresses, and encrypted passwords. The company required all users to change their passwords as a precaution, and now history seems to be repeating itself.
September 9, 2025Source

Anti-spam service blocks links in Exchange Online and Teams
Since Friday, September 5, 2025, users of Exchange Online and Microsoft Teams have noticed that links can no longer be opened. The cause is Microsoft's anti-spam service, which blocks these links for individual users and even moves emails into quarantine. Microsoft is currently working to resolve this issue.
September 9, 2025Source or German

Best free antivirus 2025: Keep your PC safe without spending a dime
Many of the big names in antivirus offer a free version of their security suites. Here are our top choices for free antivirus.
September 9, 2025Source

Cisco puts agentic AI at the core of Splunk Enterprise Security
Cisco introduced Splunk Enterprise Security Essentials Edition and Splunk Enterprise Security Premier Edition, providing customers two agentic AI-powered SecOps options that unify security workflows across threat detection, investigation, and response (TDIR).
September 9, 2025Source

Defense Dept didn't protect social media accounts, left stream keys out in public
'The practice... has since been fixed,' Pentagon official tells The Reg
September 9, 2025Source

Download: Cyber defense guide for the financial sector
Data breaches cost more for financial organizations than they do for those in many other industries. In attempting to strengthen your financial organization's cybersecurity, you must contend with evolving regulatory obligations, outdated IT infrastructure, and other challenges.
September 9, 2025Source

Ex-WhatsApp Employee Sues Meta Over Vulnerabilities, Retaliation
Attaullah Baig has filed a lawsuit against Meta and its executives, accusing them of retaliation over critical cybersecurity failures.
September 9, 2025Source

Exposed Docker APIs Likely Exploited to Build Botnet
Hackers mount the host's file system into fresh containers, fetch malicious scripts over the Tor network, and block access to the Docker API.
September 9, 2025Source

Fake npm 2FA reset email led to compromise of popular code packages
Malicious versions of at least 18 widely used npm packages were uploaded to the npm Registry on Monday, following the compromise of their maintainer's account.
September 9, 2025Source

Firmware is the weak link in your PC's security. Here's how to stay safe
Since firmware runs your PC and is deeply integrated into your hardware, it's the perfect vector for cyberattacks.
September 9, 2025Source

Gigamon harnesses agentic AI to deliver guidance for security and IT teams
As cyber adversaries increasingly use AI to move faster and exploit blind spots, security, network, and application teams face mounting challenges, not helped by a global shortage of skilled professionals.
September 9, 2025Source

Hackers Compromise 18 NPM Packages in Supply Chain Attack
Attacker Socially Engineered Developer With Phishing Email
September 9, 2025Source or Source or Source or Source or Source

Hackers hide behind Tor in exposed Docker API breaches
A threat actor targeting exposed Docker APIs has updated its malicious tooling with more dangerous functionality that could lay the foundation for a complex botnet.
September 9, 2025Source

Hand-Tool Maker Says Hack Compromised Medical Info
Breach Affecting 104,000 Underscores Health Data Risks for Non-Healthcare Firms
September 9, 2025Source or Source or Source or Source or Source

Here's What Blocks In-Progress Ransomware Attacks the Best
Tops: Rapidly Acting on Security Software Alerts and Calling in Incident Responders
September 9, 2025Source or Source or Source or Source or Source

Hummingbird's compliance and risk platform helps financial institutions manage risk
Hummingbird announced its unified platform for risk and compliance operations. The expanded platform brings together the full risk and compliance lifecycle with the launch of new solutions for both Transaction & Risk Monitoring and Customer Screening.
September 9, 2025Source

I'm a PC security expert. These are the 5 dumbest mistakes I've made
I've learned a lot about PC security, but I've also made some cringeworthy mistakes. Here are some of the biggest!
September 9, 2025Source

Kosovo hacker pleads guilty to running BlackDB cybercrime marketplace
Kosovo national Liridon Masurica has pleaded guilty to running BlackDB.cc, a cybercrime marketplace that has been active since 2018.
September 9, 2025Source

Microsoft Patches 86 Vulnerabilities
Microsoft has released patches for dozens of flaws in Windows and other products, including ones with 'exploitation more likely' rating.
September 9, 2025Source or Source

Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion
he industrial cybersecurity firm will become a wholly owned subsidiary of Mitsubishi Electric.
September 9, 2025Source or Source or Source or Source or Source or Source

More packages poisoned in npm attack, but would-be crypto thieves left pocket change
Miscreants cost victims time rather than money
September 9, 2025Source

Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal
Nearly 500 scientists and researchers have signed an open letter warning that the latest version of the EU's Chat Control Proposal would weaken digital security while failing to deliver meaningful protection for children.
September 9, 2025Source

NetApp StorageGRID 12.0 powers AI and data-intensive workloads
NetApp has released NetApp StorageGRID 12.0, a scalable, software-defined object storage solution designed for unstructured data. This latest version of StorageGRID introduces new capabilities designed to enhance AI initiatives, improve data security, and modernize organizations' data infrastructure.
September 9, 2025Source

New cybersecurity rules land for Defense Department contractors
Now if only someone would remember to apply those rules inside the DoD
September 9, 2025Source

Ransomware costs jump 17 percent though insurance claims fall
A new report from risk solutions company Resilience shows in the first half of 2025, the average cost of an individual ransomware attack rose by 17 percent, while the volume of incurred claims across Resilience's portfolio dropped by 53 percent, highlighting the persistent and destructive threat of financially motivated cybercrime.
September 9, 2025Source

Ransomware Losses Climb as AI Pushes Phishing to New Heights
Based on real-world insurance claims, Resilience's midyear report shows vendor risk is declining but costly, ransomware is evolving with triple extortion, and social engineering attacks are accelerating through AI.
September 9, 2025Source

Relyance AI Data Defense Engineer secures AI-driven data
Relyance AI has released Data Defense Engineer, an AI-native feature that works 24/7 to understand, monitor, and protect thousands of data journeys, learns from every interaction, and autonomously enforces policies at machine speed.
September 9, 2025Source

SAP fixes maximum severity NetWeaver command execution flaw
SAP has addressed 21 new vulnerabilities affecting its products, including three critical severity issues impacting the NetWeaver software solution.
September 9, 2025Source or Source or Source

SentinelOne to Acquire Observo AI in $225 Million Deal
SentinelOne is buying Observo AI for a combination of cash and stock to boost its SIEM and data offerings.
September 9, 2025Source

Silobreaker Requirements enables teams to improve threat intelligence
Silobreaker has launched Requirements, a new way for threat intelligence (TI) teams to define, operationalize and measure Priority Intelligence Requirements (PIRs).
September 9, 2025Source

Signal adds secure backup option for chat history
Losing a phone can mean losing years of conversations. Signal is rolling out a new secure backup feature to help users keep their messages safe without giving up privacy.
September 9, 2025Source

SOC Agents: The New AI Gamble
In the Rush for AI-Run SOCs, Security Experts Warn of Trust and Governance Issues
September 9, 2025Source or Source or Source or Source or Source

Taking a holistic approach to human risk management
We tend to think of cybersecurity as being a technology problem, but in fact it's often about humans. Attackers exploit our weaknesses with social engineering, phishing and other attacks designed to trick us into giving up valuable information.
September 9, 2025Source

These 18 Popular VPNs Share Parent Companies and Privacy Risks
A new study found several popular VPNs are secretly connected through shared ownership, highlighting the importance of understanding who is behind your chosen VPN.
September 9, 2025Source

This 2FA phishing scam pwned a developer - and endangered billions of npm downloads
'Stay vigilant.' Other maintainers have been targeted, too.
September 9, 2025Source

Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations
The attacker deployed multiple malware families, including two backdoors and a proxy tunneller, and various reconnaissance tools.
September 9, 2025Source

U.S. sanctions cyber scammers who stole billions from Americans
The U.S. Department of the Treasury has sanctioned several large networks of cyber scam operations in Southeast Asia, which stole over $10 billion from Americans last year.
September 9, 2025Source

US Feds Indict LockerGoga and MegaCortex Ransomware Hacker
State Department Offers Up to $10M for Tips on Volodymyr Tymoshchuk
September 9, 2025Source or Source or Source or Source

Vanta embeds agentic AI into policy and evidence workflows
Vanta has unveiled a new set of capabilities that integrates AI across core compliance and risk workflows. These features unify policy management with the Vanta AI Agent, expand first-party risk oversight and continuous monitoring for vendors, and deepen integrations, providing security leaders with a single system of record to act on risk before it escalates.
September 9, 2025Source

What the Plex? Streaming service suffers yet another password spill
For the third time in a decade
September 9, 2025Source

Zero Trust's Next Phase: Agility, Identity, AI Risks
Why CISOs Must Rethink Access, Behavioral Analytics and AI Governance at Scale
September 9, 2025Source or Source or Source or Source or Source

Internet — Security Issues — September 5th, 2025

Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool
Called A2, the framework mimics human analysis to identify vulnerabilities in Android applications and then validates them.
September 5, 2025Source

Another Risk From Agentic AI Payments - First-Party Fraud
ACI Worldwide's Cleber Martins on Why Banks Need to Lead on AI Identity Governance
September 5, 2025Source or Source or Source or Source or Source

Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
A critical vulnerability (CVE-2025-42957) in SAP S/4HANA enterprise resource planning software is being exploited by attackers "to a limited extent", the Dutch National Cyber Security Center (NCSC NL) has warned on Friday.
September 5, 2025Source

Best practices for migrating users to passkeys with Credential Manager
In a world where digital security is becoming increasingly critical, passwords have become a notorious weak link -- they're cumbersome, often insecure, and a source of frustration for users and developers. But there's good news: passkeys are gaining popularity as the most user-friendly, phishing-resistant, and secure authentication mechanism available.
September 5, 2025Source

Breach Roundup: Scattered Lapsus$ Hunters Behind Jaguar Hack
Also, Disney Pays $10M to Settle Child Privacy Case, Spain Scraps Huawei Deal
September 5, 2025Source or Source or Source or Source or Source

FireCompass Raises $20 Million for Offensive Security Platform
The AI-powered automated penetration testing firm will invest the new funds in R&D, team expansion, and global scale.
September 5, 2025Source

HHS Says It's 'Cracking Down' on Health Information Blocking
Feds Ramp Up Enforcement of 21st Cures Act Regs Including Fines up to $1 Million
September 5, 2025Source or Source or Source or Source

Hirsch Velocity 3.9 turns security into business value
Hirsch released Velocity 3.9, the latest advancement in its security management platform. Purpose-built for organizations that demand trust, compliance, and operational efficiency, Velocity 3.9 helps leaders safeguard people, assets, and data while simplifying operations at scale.
September 5, 2025Source

How to Close the AI Governance Gap in Software Development
Widespread adoption of AI coding tools accelerates development—but also introduces critical vulnerabilities that demand stronger governance and oversight.
September 5, 2025Source

In Other News: Scammers Abuse Grok, US Manufacturing Attacks, Gmail Security Claims Debunked
Noteworthy stories that might have slipped under the radar: Google fined €325 million, City of Baltimore sent $1.5 million to scammer, Bridgestone targeted in cyberattack.
September 5, 2025Source

Recent SAP S/4HANA Vulnerability Exploited in Attacks
A critical SAP S/4HANA code injection flaw tracked as CVE-2025-42957 and allowing full system takeover has been exploited in the wild.
September 5, 2025Source

Shift5 Gets $75M for Cyber Push in Defense and Transit
Startup to Expand Dual-Use Tech, Tackle GPS Jamming Threats With Series C Funding
September 5, 2025Source or Source or Source or Source or Source

Stealthy attack serves poisoned web pages only to AI agents
AI agents can be tricked into covertly performing malicious actions by websites that are hidden from regular users' view, JFrog AI architect Shaked Zychlinski has found.
September 5, 2025Source

The Best VPNs for PC
If you're feeling overwhelmed by the many VPNs for PCs that are now available, you're not alone. At times, it can be hard to separate the marketing hype from reality. For example, many VPNs claim to provide the fastest speeds, but it's not fair or entirely realistic for you to try every single one of them out to find out. This is where our many hours of hands-on testing comes in useful.
September 5, 2025Source

Threat detection for SharePoint vulnerabilities
The Canadian Centre for Cyber Security (Cyber Centre) is actively tracking multiple campaigns exploiting recently disclosed critical vulnerabilities in on-premises Microsoft SharePoint servers, including CVE-2025-49704, CVE-2025-49706, CVE-2025-53770 and CVE-2025-53771. These widespread campaigns leverage an exploit chain known as ToolShell.
September 5, 2025Source

Internet — Security Issues — September 4th, 2025

AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
An AI supply chain issue named Model Namespace Reuse can allow attackers to deploy malicious models and achieve code execution.
September 4, 2025Source

Bridging Cybersecurity and Biosecurity With Threat Modeling
Structured Approach to Mitigate Vulnerabilities and Risks in Synthetic Biology Labs
September 4, 2025Source or Source

Cyber security hygiene best practices for your organization - ITSAP.10.102
Cyber security hygiene refers to the best practices your organization can take to maintain the overall health and security of your IT environment. Your cyber security hygiene helps you better defend your networks, systems and data from threat actors.
September 4, 2025Source

CyberFlex: Flexible Pen testing as a Service with EASM
CyberFlex is an Outpost24 solution that combines the strengths of its Pen-testing-as-a-Service (PTaaS) and External Attack Surface Management (EASM) solutions. Customers benefit from continuous coverage of their entire attack application attack surface, while enjoying a flexible consumption model. Outpost24's expert pen testers deliver deep, actionable insights on critical apps, with ongoing management as an extension of your security team.
September 4, 2025Source

Dutch Lab Cancer Screening Hack Balloons to 941,000 Victims
Ransomware Gang Nova Poised to Leak Patient Data, Lab Stays Mum on Negotiations
September 4, 2025Source or Source or Source or Source or Source

EU Court Preserves EU-US Data Privacy Framework
The EU General Court Gives Victory to Backers of Trans-Atlantic Data Flows
September 4, 2025Source or Source or Source or Source

Hackers Exploit Sitecore Zero-Day for Malware Delivery
Google has observed ViewState deserialization attacks leveraging a sample machine key exposed in older deployment guides.
September 4, 2025Source

Here's How ICE Will Use Israeli Spyware
The Immigrations and Customs Enforcement agency has been in the midst of a particularly large crackdown on immigrants.
September 4, 2025Source

Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
Google has provided fixes for over 100 Android vulnerabilities, including CVE-2025-48543 and CVE-2025-38352, which "may be under limited, targeted exploitation."
September 4, 2025Source

I haven't gotten PC malware in a decade. Here are my 7 simple secrets
Tips to keep your PC free of malware!
September 4, 2025Source

Incogni versus DeleteMe: I compared the two best data removal services, and there's a clear winner
Incogni and DeleteMe are data removal services that can help you lock down your data, but they specialize in different areas. Read on to discover which service will suit you best.
September 4, 2025Source

Insider breaches hit 61 percent of enterprises
A new study sponsored by OPSWAT, a specialist in critical infrastructure protection, reveals that organizations face escalating risks from insider activity, legacy tools, and the growing complexity of artificial intelligence (AI).
September 4, 2025Source

LinkedIn expands company verification, mandates workplace checks for certain roles
LinkedIn is rolling out new verification rules to make it easier to confirm that people and companies are who they claim to be. The company will now require workplace verification when someone adds or updates a leadership or recruiter role on their profile. The goal is to cut down on fake accounts and scams while helping businesses, recruiters, and professionals build credibility.
September 4, 2025Source

LinkedIn is cracking down on fake recruiters and executive impersonators - here's how
New verification options are rolling out to protect you from scams.
September 4, 2025Source

macOS Security in 2025: Where Apple Excels—and Where You Still Need Layers
or years, Apple marketed the Mac as "more secure," and the idea stuck because the machines often fit the bill: with a smaller share of targets, attackers turned their attention elsewhere. Since then, the landscape has evolved considerably. From coffee shops and airport lounges, to co-working spaces, Macs can be rather ubiquitous these days. Unfortunately, this means that it's drawing even more attention from a variety of people, including bad actors, criminals and researchers alike.
September 4, 2025Source

macOS vulnerability allowed Keychain and iOS app decryption without a password
Today at Nullcon Berlin, a researcher disclosed a macOS vulnerability (CVE-2025-24204) that allowed attackers to read the memory of any process, even with System Integrity Protection (SIP) enabled.
September 4, 2025Source

Microsoft Backs Sola's $35M Push Into Autonomous AI Security
Series A Fuels Deeper AI, Expanded Integrations and Product-Led Growth Adoption
September 4, 2025Source or Source or Source or Source or Source

New enterprise browser aimed at securing BYOD and third-party devices
Check Point is launching a new Enterprise Browser, extending zero trust security to unmanaged devices like BYOD, contractors, and third-party partners.
September 4, 2025Source

New threat group uses custom tools to hijack search results
ESET Research has identified a new threat group called GhostRedirector. In June 2025, this group broke into at least 65 Windows servers, mostly in Brazil, Thailand, Vietnam, and the United States.
September 4, 2025Source

ODNI Cuts to Threat Sharing Raise Fears of Weakened Defenses
A Trump administration plan to dismantle a cyberthreat intelligence hub could undercut efforts to prevent the next major cyberattack on U.S. critical infrastructure, warn analysts.
September 4, 2025Source or Source or Source or Source

OT Security: When Shutting Down Is Not an Option
Elevate OT Cyber Skills Through Training, Collaboration and Practice
September 4, 2025Source or Source or Source or Source or Source

Researcher Unearths Thousands of Leaked Secrets in GitHub's "Oops Commits"
Security researcher Sharon Brizinov, in collaboration with Truffle Security, has conducted a sweeping investigation of GitHub's "oops commits", force-pushed or deleted commits that remain archived, and uncovered thousands of secrets left behind, including high-value tokens and admin-level credentials. The team also released an open-source tool to help others scan their own repositories for such hidden leakages.
September 4, 2025Source

Researchers discover a GPU vulnerability that could threaten AI models
A team of computer scientists at the University of Toronto recently discovered that a certain type of hardware attack is effective against graphics processing units (GPUs), the core computing engines that power today's artificial intelligence models and cloud-based machine learning services.
September 4, 2025Source

Sitecore zero-day vulnerability exploited by attackers (CVE-2025-53690)
A threat actor is leveraging a zero-day vulnerability (CVE-2025-53690) and an exposed sample ASP.NET machine key to breach internet-facing, on-premises deployments of several Sitecore solutions, Mandiant has revealed.
September 4, 2025Source

Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams
The Israeli startup's AI-powered no-code platform helps security teams design and deploy custom apps in minutes—tackling tool sprawl without heavy engineering.
September 4, 2025Source

Stealerium Malware's Creepy New Trick Is To Snap Webcam Pics Of Victims Watching Adult Content
We have reported several malware campaigns where hackers buy expensive malware programs from various sources across the web. Recently, a cybersecurity firm, Proofpoint, has revealed that hackers are now using a free, open-source malware dubbed Stealerium to launch sophisticated attacks that help them steal data and even snap photos of victims in the act of watching adult content.
September 4, 2025Source

Tire giant Bridgestone confirms cyberattack impacts manufacturing
Car tire giant Bridgestone confirms it is investigating a cyberattack that impacts the operation of some manufacturing facilities in North America.
September 4, 2025Source

Two Exploited Vulnerabilities Patched in Android
Elevation of privilege flaws in Android Runtime (CVE-2025-48543) and Linux kernel (CVE-2025-38352) have been exploited in targeted attacks.
September 4, 2025Source

US Offers $10 Million for Three Russian Energy Firm Hackers
Marat Tyukov, Mikhail Gavrilov, and Pavel Akulov targeted US critical infrastructure and over 500 energy companies in 135 countries.
September 4, 2025Source

US, Allies Push for SBOMs to Bolster Cybersecurity
SBOM adoption will drive software supply chain security, decreasing risks and costs, and improving transparency.
September 4, 2025Source

Why Most AI Pilots Never Take Flight
95% of Enterprise AI Stuck in Pilot Purgatory: How Do the Rest Succeed?
September 4, 2025Source or Source

Wytec Expects Significant Financial Loss Following Website Hack
Wytec's website was defaced twice by unknown threat actors more than a week ago and it has yet to be brought back online.
September 4, 2025Source

Internet — Security Issues — September 1st, 2025

A new attack reshapes the rules of Bitcoin mining
A new study by an SUTD researcher and his collaborators introduces a pooled mining attack that overturns a long-standing assumption about Bitcoin's security economics.
September 1, 2025Source

Amazon disrupts Russian APT29 hackers targeting Microsoft 365
Researchers have disrupted an operation attributed to the Russian state-sponsored threat group Midnight Blizzard, which sought access to Microsoft 365 accounts and data.
September 1, 2025Source

Build Job-Ready IT and Cybersecurity Skills with Hands-On Labs
Tech careers aren't built on theory alone — employers want candidates with real tools, practical skills, and the ability to solve problems in live environments. The 2025 Complete Defensive Cyber Security Bundle delivers exactly that, giving you 12 structured courses designed to be followed at your own pace, all taught by seasoned professionals.
September 1, 2025Source

DDoS is the neglected cybercrime that's getting bigger. Let's kill it off
Don't worry, there's a twist at the end
September 1, 2025Source

Law Enforcement Operation Seizes Fake ID Platform VerifTools
FBI Seizes Domains; Dutch Police Analyzing Seized Data to Identify Admin and Users
September 1, 2025Source or Source or Source or Source or Source

Over 16,000 compromised servers uncovered using Secure Shell key probing method
An international research team from the Max Planck Institute (MPI) for Informatics in Saarbrücken, Germany, and the Delft University of Technology in the Netherlands has developed a method to detect compromised hosts at an internet scale by probing servers with public SSH keys previously observed in attacker operations.
September 1, 2025Source

Palo Alto, Fortinet, Check Point Control Firewall Gartner MQ
Cisco Visionary, HPE Juniper Challenger in Inaugural Hybrid Mesh Firewall Ranking
September 1, 2025Source or Source or Source or Source or Source

Pentagon Probes Microsoft's Use of Chinese Coders
The U.S. Department of Defense is reviewing Microsoft's use of Chinese nationals to write code for military cloud infrastructure following reports that the tech firm used inexperienced U.S. citizens to putatively oversee foreign coders.
September 1, 2025Source or Source or Source or Source

Report on social media age assurance trial says there is not a one-size-fits-all solution
Australia's government trial has found age-assurance for its under-16 social media ban can be done effectively and protect privacy, but there is not a one-size-fits-all model.
September 1, 2025Source

Sneaky New Android Malware Steals PIN Codes And Keystrokes, What To Look Out For
Android users are currently at risk of a scarily advanced malware that reportedly uses Meta's advertising platforms (like Facebook and Instagram) to hunt for users' PINs, messages, and other sensitive data. The malware which has been active since at least July 22, especially targets crypto assets.
September 1, 2025Source

Why one-time security assessments are no longer sufficient [Q&A]
With cyber threats becoming more numerous and ever more sophisticated, it's becoming more critical than ever for organizations to prioritize targeted threats, optimize their existing defensive capabilities and proactively reduce their exposure.
September 1, 2025Source

Zscaler data breach exposes customer info after Salesloft Drift compromise
Cybersecurity company Zscaler warns it suffered a data breach after threat actors gained access to its Salesforce instance and stole customer information, including the contents of support cases.
September 1, 2025Source

Internet — Security Issues — August 29th, 2025

A growing number of states are restricting corporate use of facial recognition
Federal inaction has left biometric data unregulated
August 29, 2025Source

Age checks spread across the US as critics warn of privacy and free speech risks
Technology and legal challenges are complicating how online ages are verified
August 29, 2025Source

Attackers use "Contact Us" forms and fake NDAs to phish industrial manufacturing firms
A recently uncovered phishing campaign -- carefully designed to bypass security defenses and avoid detection by its intended victims -- is targeting firms in industrial manufacturing and other companies critical to various supply chains, Check Point researchers have warned.
August 29, 2025Source

Austrian regulator sides with noyb in data access case against YouTube
Back in January 2019, Austrian privacy group, None of Your Business (Noyb) filed eight strategic complaints against a bunch of streaming services. The list included Netflix, Spotify, and YouTube, which were all accused of failing to comply with the "right to access" guaranteed under Article 15 of the GDPR.
August 29, 2025Source or Source

AWS catches Russia's Cozy Bear clawing at Microsoft credentials
Amazon today said it disrupted an intel-gathering attempt by Russia's APT29 to trick Microsoft users into unwittingly granting the Kremlin-backed cyberspies access to their accounts and data.
August 29, 2025Source

Bridging the IT-OT Security Divide in Manufacturing
CISO Tammy Klotz Discusses the Value of Peer Support in Advance of ManuSec 2025
August 29, 2025Source or Source or Source or Source

Enterprise password management outfit Passwordstate patches Emergency Access bug
Up to 29,000 organizations and potentially 370,000 security and IT pros affected
August 29, 2025Source

Google Confirms Workspace Accounts Also Hit in Salesforce--Salesloft Drift Data Theft Campaign
Google says the same OAuth token compromise that enabled Salesforce data theft also let hackers access a small number of Workspace accounts via the Salesloft Drift integration.
August 29, 2025Source

Hackers chained Apple and WhatsApp flaws in 'advanced spyware campaign'
A few days ago, Apple fixed a vulnerability on iOS and macOS that "may have been exploited in an extremely sophisticated attack against specific targeted individuals." Now, new details have emerged, and it appears that the hacking campaign also leveraged a now-fixed WhatsApp flaw to target its victims.
August 29, 2025Source

Halo Security platform updates give teams better control over exposure data
Halo Security announced platform enhancements designed to give security teams flexibility and control within the platform.
August 29, 2025Source

In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks
SecurityWeek's cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar.
August 29, 2025Source

ISMG Editors: Whistleblower's Social Security Data Bombshell
In this week's update, four ISMG editors discussed explosive whistleblower claims about alleged mishandling of Americans' sensitive U.S. Social Security data, Netskope's push for an initial public offering and the global fight over the geopolitical sovereignty of artificial intelligence platforms.
August 29, 2025Source or Source or Source or Source or Source

Massive TransUnion breach leaks personal data of 4.4 million customers - what to do now
Swiped data includes social security numbers. Even if you're not one of the unlucky 4.4 million, you might want to take these defensive measures anyway.
August 29, 2025Source

Microsoft to enforce MFA for Azure resource management in October
Starting in October, Microsoft will enforce multi-factor authentication (MFA) for all Azure resource management actions to protect Azure clients from unauthorized access attempts.
August 29, 2025Source

Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions
State officials confirm ransomware forced office closures, disrupted services, and led to data theft, as Nevada works with CISA and law enforcement to restore critical systems.
August 29, 2025Source

Nevada Dental Practice Notifying 1.2M of Hack
Absolute Dental Says Breach Involved Third-Party Managed Services Firm
August 29, 2025Source or Source or Source or Source or Source

New 'sophisticated' malware threat may already be hiding on your Mac
JSCoreRunner is malware that spreads through what appears to be a free PDF converter app distributed on thew web.
August 29, 2025Source

OpenAI, Anthropic Swap Safety Reviews
OpenAI and Anthropic swapped artificial intelligence models evaluations over the summer, testing the other company's models for behaviors that could indicate misalignment risks. The companies released their findings simultaneously, finding that no model was severely problematic, but that all demonstrated troubling behaviors in artificial testing scenarios.
August 29, 2025Source or Source or Source or Source or Source

Pentagon Probes Microsoft's Use of Chinese Coders
The U.S. Department of Defense is reviewing Microsoft's use of Chinese nationals to write code for military cloud infrastructure following reports that the tech firm used inexperienced U.S. citizens to putatively oversee foreign coders.
August 29, 2025Source or Source

Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks
Storm-0501 has been leveraging cloud-native capabilities for data exfiltration and deletion, without deploying file-encrypting malware.
August 29, 2025Source

Researcher who found McDonald's free-food hack turns her attention to Chinese restaurant robots
The controls were left wide open on Pudu's robots
August 29, 2025Source or Watch Video

Safeguarding Healthcare With Secure and Smart Hospitals
Oslo University Hospital CSO Torkel Thune on Nordic Threat Landscape
August 29, 2025Source or Source or Source or Source or Source

The passwords most likely to get you hacked
Even as we shift to other forms of authentication, passwords aren't going away anytime soon. New research from Peec AI has analyzed over 100 million leaked passwords to uncover the most common words and phrases used, which also of course are the ones most likely to get your account compromised.
August 29, 2025Source

TransUnion Data Breach Impacts 4.4 Million
The credit reporting firm did not name the third-party application involved in the incident, only noting that it was used for its US consumer support operations.
August 29, 2025Source or Source

UK government dragged for incomplete security reforms after Afghan leak fallout
Senior officials summoned to science and tech committee to explain further
August 29, 2025Source

US Sanctions Russian National, Chinese Firm Aiding North Korean IT Workers
US Treasury sanctions Russian and Chinese entities tied to North Korea's use of fake IT workers, who exploited stolen identities, AI, and malware to funnel millions back to Pyongyang.
August 29, 2025Source

VerifTools Fake ID Operation Dismantled by Law Enforcement
Authorities say VerifTools sold fake driver's licenses and passports worldwide, enabling fraudsters to bypass KYC checks and access online accounts.
August 29, 2025Source

Internet — Security Issues — August 25th, 2025

A free VPN allegedly takes screenshots of Chrome users
A free VPN extension with over 100,000 downloads appears to be recording tons of sensitive user information, including taking screenshots of every visited page.
August 25, 2025Source

A new security flaw in TheTruthSpy phone spyware is putting victims at risk
A stalkerware maker with a history of multiple data leaks and breaches now has a critical security vulnerability that allows anyone to take over any user account and steal their victim's sensitive personal data, TechCrunch has confirmed.
August 25, 2025Source

Agentic AI Browser an Easy Mark for Online Scammers
One Prompt Was Enough for AI Agent to Buy, Click and Expose Sensitive Data
August 25, 2025Source or Source or Source or Source or Source

AI Data Security: Core Concepts, Risks, and Proven Practices
AI boosts threat detection and response, but brings risks like data poisoning, model leaks, and insider threats. Learn how to protect your systems.
August 25, 2025Source

Anatsa Android Banking Trojan Now Targeting 830 Financial Apps
The Anatsa Android banking trojan has expanded its target list to new countries and more cryptocurrency applications.
August 25, 2025Source

Arch Linux Project Responding to Week-Long DDoS Attack
The Arch Linux Project has been targeted in a DDoS attack that disrupted its website, repository, and forums.
August 25, 2025Source

Aspire Rural Health System Data Breach Impacts Nearly 140,000
Aspire Rural Health System was targeted last year by the BianLian ransomware group, which claimed to have stolen sensitive data.
August 25, 2025Source

Auchan retailer data breach impacts hundreds of thousands of customers
French retailer Auchan is informing that some sensitive data associated with loyalty accounts of several hundred thousand of its customers was exposed in a cyberattack.
August 25, 2025Source

Australian Bank Backtracks on AI-Led Job Cuts
A plan by one of Australia's largest employers to cut call center employees and shuffle the work to chatbots backfired after the large language models failed to reduce the volume of calls.
August 25, 2025Source or Source or Source

Chip Programming Firm Data I/O Hit by Ransomware
Data I/O has disclosed a ransomware attack that disrupted the company's operations, including communications, shipping and production.
August 25, 2025Source

CIO made a dangerous mistake and ordered his security team to implement it
Firewall pro enjoyed European travel to fix the fallout
August 25, 2025Source

CISA Requests Public Feedback on Updated SBOM Guidance
CISA has updated the Minimum Elements for a Software Bill of Materials (SBOM) guidance and is seeking public comment.
August 25, 2025Source

ClickFix is Compromising Thousands of Devices Daily -- Red Flags to Watch
Clever hackers are using ClickFix, a new social engineering technique, to deliver malicious payloads to unsuspecting users and devices around the globe.
August 25, 2025Source

Cloudflare secures sensitive data without fully restricting AI usage
With these new features, Cloudflare is giving customers the ability to automatically understand, analyze and set controls on how generative AI is used throughout their organization, enhancing the productivity and innovation of their teams without sacrificing security or privacy standards.
August 25, 2025Source

Critical Docker Desktop flaw lets attackers hijack Windows hosts
A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active.
August 25, 2025Source or Source

Defending against malware persistence techniques with Wazuh
Malware persistence techniques enable attackers to maintain access to compromised endpoints despite system reboots, credential changes, or other disruptions. Common methods include altering configurations, injecting startup code, and hijacking legitimate processes.
August 25, 2025Source

Fake macOS help sites push Shamos infostealer via ClickFix technique
Criminals are taking advantage of macOS users' need to resolve technical issues to get them to infect their machines with the Shamos infostealer, Crowdstrike researchers have warned.
August 25, 2025Source

Farmers Insurance data breach impacts 1.1M people after Salesforce attack
U.S. insurance giant Farmers Insurance has disclosed a data breach impacting 1.1 million customers, with BleepingComputer learning that the data was stolen in the widespread Salesforce attacks.
August 25, 2025Source or Source or Source or Source or Source

Google Cloud Unveils New Data Security Posture Management Offering in Preview
Google Cloud recently announced a new Data Security Posture Management (DSPM) offering, now available in preview, that provides users with end-to-end governance for data security, privacy, and compliance.
August 25, 2025Source

Login system helps spot online hacks without sacrificing privacy
A new system developed by Cornell Tech researchers helps users detect when their online accounts have been compromised—without exposing their personal devices to invasive tracking by web services.
August 25, 2025Source

Malicious Android apps with 19M installs removed from Google Play
Seventy-seven malicious Android apps with more than 19 million installs were delivering multiple malware families to Google Play users.
August 25, 2025Source

Microsoft Details ClickFix Malware Scam That Dupes Victims With Fake CAPTCHAs
As was shown in a recent report about a vicious cyber attack that targeted kidney failure patients, cyber criminals show no mercy. Now a new report from Microsoft has revealed a growing deployment of ClickFix social engineering tactics by threat actors worldwide, which dupe victims through fake CAPTCHAs
August 25, 2025Source

Nevada State Offices Halt Services After Cyber Incident
Nevada Grappling With Statewide IT Disruption, Forcing Suspension of Services
August 25, 2025Source or Source or Source or Source or Source

New AI attack hides data-theft prompts in downscaled images
Researchers have developed a novel attack that steals user data by injecting malicious prompts in images processed by AI systems before delivering them to a large language model.
August 25, 2025Source

OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
Researchers unveil OneFlip, a Rowhammer-based attack that flips a single bit in neural network weights to stealthily backdoor AI systems without degrading performance.
August 25, 2025Source

Ontic Secures $230M to Scale Connected Security Platform
Physical Security Firm Eyes Insider Risk, Federal Growth and AI-Powered Automation
August 25, 2025Source or Source

Pakistani Hackers Back at Targeting Indian Government Entities
Pakistani state-sponsored hacking group APT36 is targeting Linux systems in a fresh campaign aimed at Indian government entities.
August 25, 2025Source

SASE Company Netskope Files for IPO
Netskope has an annual recurring revenue of more than $707 million, but it's still not profitable, reporting a net loss of $170 million in H1.
August 25, 2025Source

ScreenConnect admins targeted with spoofed login alerts
ScreenConnect cloud administrators across all region and industries are being targeted with fake email alerts warning about a potentially suspicious login event.
August 25, 2025Source

Senator castigates federal judiciary for ignoring "basic cybersecurity"
Breaches in 2020 and 2025, reportedly by foreign adversaries, exposed confidential files.
August 25, 2025Source

Senior scams topped $4.8 billion in 2024: What to watch out for
Americans aged 60 and older lost $4.8 billion in 2024 to scammers, according to a report released by the FBI. These figures represent real people, real families, and life-changing financial devastation.
August 25, 2025Source

This 'Lethal Trifecta' Can Trick AI Browsers Into Stealing Your Data
AI browsers have a critical flaw: They can't tell safe commands from malicious text. Patches help, but guardrails are essential to keeping your data safe.
August 25, 2025Source

Up to 2.5 Billion Users Impacted by Google Database Hack
Google insists the compromised database contained 'basic and mostly publicly available business information,' like business names and contact information.
August 25, 2025Source

Internet — Security Issues — August 22nd, 2025

AI Models Resize Photos and Open Door to Hacking
Researchers Show How AI Image Downscaling Can be an Attack Vector
August 22, 2025Source or Source or Source or Source or Source

AWS Trusted Advisor Tricked Into Showing Unprotected S3 Buckets as Secure
AWS has addressed a vulnerability that could have been leveraged to bypass Trusted Advisor's S3 bucket permissions check.
August 22, 2025Source

Boards should bear ultimate responsibility for cybersecurity
A new State of the Security Profession survey from The Chartered Institute of Information Security (CIISec) shows that 91 percent of the profession believe ultimate responsibility for cybersecurity lies with the board and not security managers or CISOs (just 31 percent).
August 22, 2025Source

China-linked Murky Panda targets and moves laterally through cloud services
In its recently released 2025 Threat Hunting Report, Crowdstrike pointed out an interesting trend: a 136% surge in cloud intrusions. A good chunk of this surge is due to "China-nexus adversaries", Murky Panda (aka Silk Typhoon) among them.
August 22, 2025Source

Chinese Silk Typhoon Hackers Targeting Multiple Industries in North America
Silk Typhoon was seen exploiting n-day and zero-day vulnerabilities for initial access to victim systems.
August 22, 2025Source

CISA Issues Draft Software Bill of Materials Guide for Public Comment
Guide Provides Minimum Elements on How Software Components are Documented and Shared
August 22, 2025Source

CISA Seeks Input on SBOM Update to Tackle Real-World Gaps
US Cyber Defense Agency Pushes for Automation and Machine-Readable Data in SBOMs
August 22, 2025Source or Source or Source or Source

Criminal background checker APCS faces data breach
The attack first affected an upstream provider of bespoke software
August 22, 2025Source

DaVita says ransomware gang stole data of nearly 2.7 million people
Kidney dialysis firm DaVita has confirmed that a ransomware gang that breached its network stole the personal and health information of nearly 2.7 million individuals.
August 22, 2025Source

Developer Who Hacked Former Employer's Systems Sentenced to Prison
Davis Lu was sentenced to four years in prison for installing malicious code on employer's systems and for deleting encrypted data.
August 22, 2025Source

Dialysis Chain Tells Feds Hack Affects Nearly 2.7 Million
Stolen DaVita Data Leaked on Dark Web by Ransomware Gang Interlock
August 22, 2025Source or Source or Source or Source or Source

Fake CAPTCHA tests trick users into running malware
Microsoft's security team has published an in-depth report into ClickFix, the social engineering attack which tricks users into executing malicious commands in the guise of proving their humanity.
August 22, 2025Source

Fort Firewall 3.19.3 released
Nodir Temirkhodjaev has announced the release of Fort Firewall 3.19.3, which enables users to incorporate a "Connections" tab, provides alerts regarding save failures, and rectifies statistics by establishing the default current tab.
August 22, 2025Source

Google-Verified Chrome VPN Extension Exposed as Spyware
A popular Chrome VPN extension, FreeVPN, is accused of being spyware. It was reportedly capturing screenshots of every single that that the user would visit. It was then sending those screen grabs to an external source.
August 22, 2025Source

Here's Why Your Google Password Manager Is Not Autofilling
According to a survey by NordPass in 2024, the average person uses over 200 passwords between their personal and business-related accounts. Just imagine having to memorize all those complex combinations of numbers and letters off the top of your head. It's easy to forget them if you don't have a system in place. Thankfully, password managers now exist, and one of the most popular ones out there is operated by Google.
August 22, 2025Source

In Other News: McDonald's Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M
Noteworthy stories that might have slipped under the radar: cryptojacker sentenced to prison, ECC.fail Rowhammer attack, and Microsoft limits China's access to MAPP.
August 22, 2025Source

Interpol operation seizes $97 million in African cybercrime sweep
Authorities in Africa have arrested 1,209 people in an Interpol-led crackdown on cybercrime that targeted nearly 88,000 victims.
August 22, 2025Source or Source

Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
Dubbed Operation Serengeti 2.0, the operation took place between June and August.
August 22, 2025Source

Massive anti-cybercrime operation leads to over 1,200 arrests in Africa
Law enforcement authorities in Africa have arrested over 1,200 suspects as part of 'Operation Serengeti 2.0,' an INTERPOL-led international crackdown targeting cross-border cybercriminal gangs.
August 22, 2025Source

MITRE Updates List of Most Common Hardware Weaknesses
MITRE has updated the list of Most Important Hardware Weaknesses to align it with evolving hardware security challenges.
August 22, 2025Source

Murky Panda hackers exploit cloud trust to hack downstream customers
A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud environments to gain initial access to the networks and data of downstream customers.
August 22, 2025Source

Netskope's IPO Filing Reveals Surging Sales, Improved Losses
Second Cyber IPO Filing of 2025, Netskope Shows Huge Reliance on Channel Partners
August 22, 2025Source or Source or Source or Source

Rural Health System in Michigan Notifying 140,000 of Hack
Threat Actors Accessed, Stole Data for About 2 Months; BianLian Claims Credit
August 22, 2025Source or Source

Short circuit: Electronics supplier to tech giants suffers ransomware shutdown
Amazon, Apple, Google, and Microsoft among major customers
August 22, 2025Source

Internet — Security Issues — August 21st, 2025

AI crawlers and fetchers are blowing up websites, with Meta and OpenAI the worst offenders
One fetcher bot seen smacking a website with 39,000 requests per minute
August 21, 2025Source

Aikido Security Buys AI Code Startup Trag to Outpace Rivals
Trag's Developer-Centric Tools Help Aikido Slash Time to Market by 12 Months
August 21, 2025Source or Source or Source or Source or Source

Anthropic Tests Safeguard for AI 'Model Welfare'
Claude Models May Shut Down Harmful Chats in Some Edge Cases
August 21, 2025Source or Source or Source or Source or Source

Apple Patches Zero-Day Exploited in Targeted Attacks
Apple has rolled out iOS and macOS updates that resolve a zero-day vulnerability exploited in highly targeted attacks.
August 21, 2025Source

AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged
AWS's Trusted Advisor tool, which is supposed to warn customers if their (cloud) S3 storage buckets are publicly exposed, could be "tricked" into reporting them as not exposed when they actually are, Fog Security researchers have found.
August 21, 2025Source

Best password generators 2025: Easily create strong, complex passwords with my favorites
While it's easy to default to common, easy-to-guess passwords, a password generator can help you create complex, secure credentials. We'll help you choose the best password generator to keep your online accounts safe.
August 21, 2025Source

Breach Roundup: Scattered Spider Hacker Gets 10 Years
Also: New 'Quishing' Tactics, Pro-Houthi Hacker Sentenced to 20 Months
August 21, 2025Source or Source or Source or Source or Source

China's Great Firewall blocked all traffic to a common HTTPS port for over an hour, severing connection to the outside world — with no hint as to its intention
The cause of the incident could be intentional or accidental
August 21, 2025Source

Colt changes tune, admits data theft as Warlock gang begins auction
Worried about your data? No probs, says firm, we'll check the dark web crims' list for you! Yes really
August 21, 2025Source or Source

Congressman proposes bringing back letters of marque for cyber privateers
Bill would let US President commission white hat hackers to go after foreign threats, seize assets on the online seas
August 21, 2025Source

Copilot Kept Access Logs Unless You Told It Not To
Copilot Falls for Prompt Injection Yet Again
August 21, 2025Source or Source

Cryptohack Roundup: New York Man, Firm to Pay $228M in Ponzi Scheme
Also: Coinbase's Misconfigured Smart Contract, GMX Repayment Plans
August 21, 2025Source

Doppel Simulation combats social engineering attacks
Doppel announced Doppel Simulation, a new product and expansion to the Doppel Vision Platform that enables organizations to redefine security awareness training and social engineering penetration testing by mirroring today's multi-channel and dynamic attacker behaviors.
August 21, 2025Source

Don't fall for McAfee's tricky antivirus warnings on your laptop
No, you don't need to pay McAfee to secure your new Windows PC.
August 21, 2025Source

Drug R&D Firm's IT, Data Encrypted in Alleged Qilin Attack
Inotiv, a drug research and development firm, told federal regulators that it's been dealing with a cyberattack since Aug. 8 that has encrypted some IT systems and data, and is disrupting certain business operations. Ransomware gang Qilin has listed the company as a victim on its dark website.
August 21, 2025Source

Employee distraction is a bigger risk than attack sophistication
Cybersecurity professionals are sounding the alarm, not about increasingly sophisticated cyber threats, but about something far more human -- distraction.
August 21, 2025Source

Europol confirms $50,000 Qilin ransomware reward is fake
Europol has confirmed that a Telegram channel impersonating the agency and offering a $50,000 reward for information on two Qilin ransomware administrators is fake. The impostor later admitted it was created to troll researchers and journalists.
August 21, 2025Source

Fairness tool catches AI bias early
Machine learning software helps agencies make important decisions, such as who gets a bank loan or what areas police should patrol. But if these systems have biases, even small ones, they can cause real harm. A specific group of people could be underrepresented in a training dataset, for example, and as the machine learning (ML) model learns that bias can multiply and lead to unfair outcomes, such as loan denials or higher risk scores in prescription management systems.
August 21, 2025Source

FBI warns of Russian hackers exploiting 7-year-old Cisco flaw
The Federal Bureau of Investigation (FBI) has warned that hackers linked to Russia's Federal Security Service (FSB) are targeting critical infrastructure organizations in attacks exploiting a 7-year-old vulnerability in Cisco devices.
August 21, 2025Source or Source

From Ladders to Lattices: Redesigning Career Growth
Workers Reject Traditional Advancement for Flexible, Purpose-Driven Career Paths
August 21, 2025Source or Source or Source or Source

Hackers have figured out a new way to steal Microsoft logins
Be careful out there!
August 21, 2025Source

Hackers who exposed North Korean government hacker explain why they did it
Earlier this year, two hackers broke into a computer and soon realized the significance of what this machine was. As it turned out, they had landed on the computer of a hacker who allegedly works for the North Korean government.
August 21, 2025Source

Menlo-Votiro Deal Integrates File Protection With Browsers
CEO Amir Ben-Efraim: Acquisition Adds AI-Powered File Sanitization to Browser Tools
August 21, 2025Source or Source or Source or Source

Microsoft's cybersecurity crackdown is here — A response to Beijing-linked breaches
After zero-day exploits linked to Chinese actors, Microsoft quietly restricts access to its vulnerability-sharing program.
August 21, 2025Source

Nuance Agrees to Pay $8.5M to Settle MOVEit Hack Litigation
Settlement Is Latest Among Scores of Other MOVEit Lawsuits Still Pending
August 21, 2025Source or Source or Source or Source or Source

Orange Belgium discloses data breach impacting 850,000 customers
Orange Belgium, a subsidiary of telecommunications giant Orange Group, disclosed on Wednesday that attackers who breached its systems in July have stolen the data of approximately 850,000 customers.
August 21, 2025Source

Password Managers Vulnerable to Data Theft via Clickjacking
A researcher has tested nearly a dozen password managers and found that they were all vulnerable to clickjacking attacks that could lead to the theft of highly sensitive data.
August 21, 2025Source

Researchers uncover hidden risks of passkeys in abusive relationships
A new study reveals that passkeys—widely promoted as a safer login method compared with passwords—may unintentionally expose users to serious risks in situations involving interpersonal abuse. The research introduces the first framework for analyzing how digital authentication tools can be exploited in contexts such as intimate partner violence, elder abuse and human trafficking.
August 21, 2025Source

Russian APT Exploiting 7-Year-Old Cisco Vulnerability: FBI
Russian state-sponsored hackers tracked as Static Tundra continue to target Cisco devices affected by CVE-2018-0171.
August 21, 2025Source

Russian Hackers Accused in Wave of Water Sector Cyberattacks
Successful Breaches Renew Fears of Operational Vulnerabilities Across Water Sector
August 21, 2025Source or Source or Source or Source or Source

Russian Hackers Hitting Critical Infrastructure, FBI Warns
State-Sponsored Espionage Group Tied to Exploits of No-Longer-Supported Cisco Gear
August 21, 2025Source or Source or Source or Source or Source

Russian threat actors using old Cisco bug to target critical infrastructure orgs
A threat group linked to the Russian Federal Security Service's (FSB) Center 16 unit has been compromising unpatched and end-of-life Cisco networking devices via an old vulnerability (CVE-2018-0171), the FBI and Cisco warned on Wednesday.
August 21, 2025Source

SailPoint Accelerated Application Management simplifies app governance
SailPoint unveiled SailPoint Accelerated Application Management, a solution that redefines how enterprises discover, govern, and secure applications at scale.
August 21, 2025Source

Scattered Spider hacker gets sentenced to 10 years in prison
Noah Michael Urban, a key member of the Scattered Spider cybercrime collective, was sentenced to 10 years in prison on Wednesday after pleading guilty to charges of wire fraud and conspiracy in April.
August 21, 2025Source or Source

Telecom Firm Colt Confirms Data Breach as Ransomware Group Auctions Files
Colt Technology Services is working on restoring systems disrupted by a ransomware attack that involved data theft.
August 21, 2025Source

This low-tech 'fix' for digital hacking is out of date. Stop using it
You should now do the opposite.
August 21, 2025Source

US cops wrap up RapperBot, one of world's biggest DDoS-for-hire rackets
Feds say Mirai-spawned botnet blasted 370K attacks before AWS and pals helped yank its servers
August 21, 2025Source

Your Chats With AI Chatbot Grok May Be Visible to Everyone
Hundreds of thousands of chats are live on the website of Elon Musk's rival to ChatGPT, including photos and other uploaded documents.
August 21, 2025Source

Internet — Security Issues — August 19th, 2025

5 Hidden Microsoft Entra Features to Easily Boost Your Businesses Cybersecurity
Have you ever wondered if your organization's security measures are truly airtight? In an era where cyber threats evolve faster than ever, relying solely on well-known defenses might leave critical gaps in your protection. Microsoft Entra, a cornerstone of modern security frameworks, is packed with features designed to safeguard your digital infrastructure. But here's the catch: some of its most powerful tools often fly under the radar. These lesser-known capabilities can be the difference between a close call and a full-blown breach, offering organizations a chance to outsmart attackers in ways they might not expect.
August 19, 2025Source

96 percent of organizations worry about the impact of shorter certificate life
The radical shortening of SSL/TLS certificate lifespans from 398 days to 47 days by 2029 is shaking up the cybersecurity world. New research shows 96 percent of organizations are concerned about the impact of shorter SSL/TLS certificate lifespans on their business.
August 19, 2025Source

1.1 Million Unique Records Identified in Allianz Life Data Leak
Have I Been Pwned has analyzed the information made public by the hackers who recently targeted Allianz Life.
August 19, 2025Source

Accounting Firm Pays Feds $175K for HIPAA Ransomware Breach
Settlement Includes Corrective Action Plan Focused on Improving Risk Analysis
August 19, 2025Source or Source or Source or Source or Source

AI Under Siege: How Hackers Are Exploiting Vulnerable AI Systems
What if the AI systems we trust to power our lives, our cars, our healthcare, even our financial systems, could be hijacked with just a few cleverly crafted lines of code? It's not just a dystopian fantasy; it's a growing reality. Recent tests on advanced AI models like Gemini 2.0 and Grok 4 reveal unsettling vulnerabilities, exposing how easily these systems can be manipulated or exploited. Despite their sophistication, these models falter when faced with innovative attack methods, raising urgent questions about the safety of AI in critical applications.
August 19, 2025Source

Australia's TPG Telecom Investigating iiNet Hack
TPG Telecom has disclosed a cybersecurity incident after discovering unauthorized access to an iiNet order management system.
August 19, 2025Source

Casino tech outfit Bragg cops to intrusion but says data jackpot untouched
Toronto company says weekend cyber raid hit internal IT, not punters' wallets
August 19, 2025Source

Cisco Patches Maximum-Severity Firewall Flaw
Cisco Secure Firewall Management Centers Connected to RADIUS Left Vulnerable
August 19, 2025Source or Source or Source or Source or Source

Cofense Vision 3.0 identifies user engagement with phishing emails
Cofense launched Vision 3.0, the latest advancement to its Phishing Threat Detection and Response (PDR) platform. Vision 3.0 delivers faster, smarter incident response by giving security teams visibility into exactly how users interacted with phishing emails that slipped past perimeter defenses.
August 19, 2025Source

Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data
Britain abandoned its demand that Apple provide backdoor access to any encrypted user data stored in the cloud.
August 19, 2025Source

Gambling Tech Firm Bragg Discloses Cyberattack
Bragg Gaming Group says hackers accessed its internal systems over the weekend, but did not affect its operations.
August 19, 2025Source

Google unveils new AI and cloud security capabilities at Security Summit
Google used its Cloud Security Summit 2025 today to introduce a wide range of updates aimed at securing AI innovation and strengthening enterprise defenses. The announcements span protections for AI agents, new tools for security operations centers, enhancements in cloud security, and extended safeguards for enterprise browsing.
August 19, 2025Source

Hacktivist Sentenced to 20 Months of Prison in UK
Al-Tahery Al-Mashriky of the Yemen Cyber Army has been accused of hacking into and defacing many websites as part of hacktivist campaigns.
August 19, 2025Source

Massive Allianz Life data breach impacts 1.1 million people
Hackers have stolen the personal information of 1.1 million individuals in a Salesforce data theft attack, which impacted U.S. insurance giant Allianz Life in July.
August 19, 2025Source or Source

Microsoft Dissects PipeMagic Modular Backdoor
PipeMagic, which poses as a ChatGPT application, is a modular malware framework that provides persistent access and flexibility.
August 19, 2025Source

More customers asking for Google's Data Boundary, says Cloud Experience boss
Developer demand for sovereign cloud from tech giant is on the rise, says exec
August 19, 2025Source

Nearly half of Americans still reuse passwords despite phishing risks
Nearly half of Americans admit to reusing passwords across accounts, even as phishing attacks continue to rise. A new survey by Yubico and Talker Research shows that while many people feel confident in their ability to stay secure online, their actual habits reveal a different story.
August 19, 2025Source

New Exploit Poses Threat to SAP NetWeaver Instances
A new public exploit chains two critical flaws in SAP NetWeaver, exposing unpatched instances to code execution attacks.
August 19, 2025Source

New Research Links VPN Apps, Highlights Security Deficiencies
Citizen Lab has identified links between multiple VPN providers, and multiple security weaknesses in their mobile applications.
August 19, 2025Source

New scam uses Google AI search results to trick travelers with fake customer service numbers
"I'm pretty technologically advanced, and I fell for this"
August 19, 2025Source

NY Business Council discloses data breach affecting 47,000 people
As the state's largest statewide employer association, BCNYS represents over 3,000 member organizations, including chambers of commerce, professional and trade associations, and other local and regional business organizations, as well as some of the largest corporations worldwide, which employ more than 1.2 million New Yorkers.
August 19, 2025Source

NY State Fines Dental Plan Firm $2M in Phishing Breach
Healthplex, Part of UnitedHealth Group, Lacked MFA on Compromised Email Account
August 19, 2025Source or Source or Source or Source

OpenAI CEO Sam Altman says that export controls alone won't hold back China's AI ambitions — "My instinct is that doesn't work"
"I'm worried about China." — Sam Altman | Altman is the second major tech company CEO to question the effectiveness of export controls.
August 19, 2025Source

Pharma firm Inotiv says ransomware attack impacted operations
American pharmaceutical company Inotiv has disclosed that some of its systems and data have been encrypted in a ransomware attack, impacting the company's business operations.
August 19, 2025Source

Researcher downloaded the data of all 270,000 Intel employees from an internal business card website — massive data breach dubbed 'Intel Outside' didn't qualify for bug bounty
Eaton Z made sure Intel had closed up all the unearthed security gaps before divulging this research.
August 19, 2025Source

Security researcher driven by free nuggets unearths McDonald's security flaw — changing 'login' to 'register' in URL prompted site to issue plain text password for a new account
"Would you like to access sensitive information?" might be the new "Would you like fries with that?" A security researcher called "BobDaHacker" has just revealed how he went from scoring free McNuggets via the fast food chain's mobile app to repeatedly gaining access to a McDonald's platform meant only for employees and franchisees.
August 19, 2025Source

Simulating wolf pack attacks to strengthen AI collaboration and resilience
In the rapidly advancing fields of drone swarms and cooperative robotics, AI agents embedded in individual drones and robots must collaborate seamlessly—such as drones flying in formation to encircle an enemy or multiple robots working together in smart factories. However, these multi-agent systems are vulnerable to disruptions caused by adverse conditions or malicious attacks, which can compromise their cooperation and operational integrity.
August 19, 2025Source

Supply Chain Security: Provenance Tools Becoming Standard in Developer Platforms
Software provenance is gaining new importance as organizations look for ways to secure their supply chains against tampering and comply with emerging standards like SLSA. In a recent blog post, HashiCorp highlighted how its HCP Packer service captures build metadata and SBOMs to support Supply-chain Levels for Software Artifacts (SLSA) Level 1 compliance.
August 19, 2025Source

UK Has Dropped Apple Backdoor Request, US Spy Chief Says
The UK has withdrawn its demand for Apple to create a backdoor into its Advanced Data Protection (ADP) encryption system. US Director of National Intelligence Tulsi Gabbard confirmed the news on X, saying it came after months of collaboration between the two governments.
August 19, 2025Source or Source or Source

Workday Hit by Social Engineering Attack, Third-Party Data Exposed
Workday's recent data breach might be tied to ShinyHunters, a group accused of exploiting Salesforce CRM at firms like Google, Adidas, Qantas, and Louis Vuitton.
August 19, 2025Source

Why the US Needs New Policies to Fight Scams
Fraud Expert Trace Fooshee on Regulatory Steps Needed to Curb Payment Scams
August 19, 2025Source or Source or Source or Source or Source

Why using a VPN is becoming more important than ever
There's been some controversy around the use of VPNs recently, mostly centering on the UK's Online Safety Act. But despite this August 19th is International VPN Day and NordVPN has issued a timely reminder of the importance of using one.
August 19, 2025Source

Internet — Security Issues — August 17th, 2025

Ransomware Allegations Surface as Colt Outages Continue
Support Portals Offline as Ransomware Gang Claims It Stole Data
August 17, 2025Source or Source or Source or Source or Source

U.S. seizes $2.8 million in crypto from Zeppelin ransomware operator
The U.S. Department of Justice (DoJ) announced the seizure of more than $2.8 million in cryptocurrency from suspected ransomware operator Ianis Aleksandrovich Antropenko.
August 17, 2025Source

Week in review: 2 threat actors exploiting WinRAR 0-day, Microsoft fixes "BadSuccessor" Kerberos flaw
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
August 17, 2025Source

Internet — Security Issues — August 16th, 2025

AI Worker Digital Twins Pose New Insider Threats
Researchers Say AI Bots Blur Lines Between Identity, Consent and Cyber Defense
August 16, 2025Source or Source

Watch Now: CodeSecCon -- Where Software Security's Next Chapter Unfolds (Virtual Event)
CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
August 16, 2025Source

Internet — Security Issues — August 11th, 2025

At least 73% of US adults have experienced online scams—here's how you can avoid the latest con
Online scammers continue to dupe the majority of American adults as they infiltrate virtual calendars and security systems meant to defend users against the poaching of personal information.
August 11, 2025Source

Best antivirus software 2025: These 8 apps keep your PC safe
You need more than just prayer and luck—choose from our top antivirus software picks to stay safe.
August 11, 2025Source

'Chairmen' of $100 million scam operation extradited to US
The U.S. Department of Justice charged four Ghanaian nationals for their roles in a massive fraud ring linked to the theft of over $100 million in romance scams and business email compromise attacks.
August 11, 2025Source

Chrome Sandbox Escape Earns Researcher $250,000
A researcher has been given the highest reward in Google's Chrome bug bounty program for a sandbox escape with remote code execution.
August 11, 2025Source

Columbia University data breach affected 870,000 students, applicants
The recent cyberattack at Columbia University affected close to 870,000 students, applicants and employees, compromising their Social Security numbers, health information and other sensitive data, according to school officials.
August 11, 2025Source

Connex Credit Union data breach impacts 172,000 members
Connex, one of Connecticut's largest credit unions, warned tens of thousands of members that unknown attackers had stolen their personal and financial information after breaching its systems in early June.
August 11, 2025Source or Source

Conversations remotely detected from cell phone vibrations, researchers report
An emerging form of surveillance, wireless tapping, explores the possibility of remotely deciphering conversations from the tiny vibrations produced by a cell phone's earpiece. With the goal of protecting users' privacy from potential bad actors, a team of computer science researchers at Penn State demonstrated that transcriptions of phone calls can be generated from radar measurements taken up to 3 meters, or about 10 feet, from a phone. While accuracy remains limited—around 60% for a vocabulary of up to 10,000—the findings raise important questions about future privacy risks.
August 11, 2025Source

Details emerge on WinRAR zero-day attacks that infected PCs with malware
Researchers have released a report detailing how a recent WinRAR path traversal vulnerability tracked as CVE-2025-8088 was exploited in zero-day attacks by the Russian 'RomCom' hacking group to drop different malware payloads.
August 11, 2025Source

Dutch Investigators Blame Hacks on Multiple Threat Actors
NCSC-NL Says Hack of Citrix NetScaler Flaw Also Targeted Critical Infrastructure
August 11, 2025Source or Source or Source or Source or Source

Flaws in Major Automaker's Dealership Systems Allowed Car Hacking, Personal Data Theft
A researcher has demonstrated how a platform used by over 1,000 dealerships in the US could have been used to hack cars.
August 11, 2025Source

Fort Firewall 3.18.11 released
The new Fort Firewall 3.18.11 release resolves issues related to closed processes handling regression and introduces the capability to adjust row height in UI programs.
August 11, 2025Source

From medieval stronghold to cyber fortress: Shielding Europe's digital future
Czech and Estonian researchers are joining forces to build a cross-border cybersecurity hub that will strengthen Europe's digital defenses in the face of growing cyber threats.
August 11, 2025Source

GPT-5 Launch Meets With Praise, User Pushback and Price Wars
CEO Altman Promises Fixes to 'Way Dumber' Performance, Transparency Amid Glitches
August 11, 2025Source or Source or Source or Source

How agile is your crypto? Interview study explores opportunities and challenges of cryptographic update processes
If you think of software as a building, you might say it's made up of code blocks. Many of these building blocks are custom-built for a specific application. Others are standard components and used in many buildings—cryptographic algorithms and functions are a prime example of this.
August 11, 2025Source

How Insurers Use Threat Intelligence to Reduce Losses
Tokio Marine HCC Targets Vulnerabilities Before They're Exploited
August 11, 2025Source or Source or Source or Source or Source

How ShinyHunters Hacking Group Stole Customer Data from Salesforce
Hackers posed as Salesforce IT staff, using vishing to trick employees into installing malicious software for data theft and extortion.
August 11, 2025Source

Manage Logins, Data Sharing, and Device Syncs from One Secure Vault
FastestPass takes the hassle out of managing logins, so you can stay focused on your work — not your passwords.
August 11, 2025Source

Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike
New physics-based research suggests large language models could predict when their own answers are about to go wrong — a potential game changer for trust, risk, and security in AI-driven systems.
August 11, 2025Source

Microsoft tests cloud-based Windows 365 disaster recovery PCs
Microsoft has announced the limited public preview of Windows 365 Reserve, a service that provides temporary desktop access to pre-configured cloud PCs for employees whose computers have become unavailable due to cyberattacks, hardware issues, or software problems.
August 11, 2025Source

MuddyWater's DarkBit ransomware cracked for free data recovery
Cybersecurity firm Profero cracked the encryption of the DarkBit ransomware gang's encryptors, allowing them to recover a victim's files for free without paying a ransom.
August 11, 2025Source

North Korean Kimsuky hackers exposed in alleged data breach
The North Korean state-sponsored hacking group known as Kimsuky has reportedly suffered a data breach after two hackers, who describe themselves as the opposite of Kimsuky's values, stole the group's data and leaked it publicly online.
August 11, 2025Source

Over 29,000 Exchange servers unpatched against high-severity flaw
Over 29,000 Exchange servers exposed online remain unpatched against a high-severity vulnerability that can let attackers move laterally in Microsoft cloud environments, potentially leading to complete domain compromise.
August 11, 2025Source

OysterVPN review: The new kid on the VPN block
Newcomer OysterVPN stands its ground against some heavy competition.
August 11, 2025Source

Pediatric Practice, IT Vendor Settle $5.15M Breach Suit
At Least 918K Affected in 2024 BianLian Data Theft Attack
August 11, 2025Source or Source or Source or Source or Source

Ransomware attacks up by 41 percent globally
New data from Check Point Research reveals a sharp rise in cyberattacks globally, with business services, healthcare, and manufacturing among the hardest hit sectors.
August 11, 2025Source

Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada
WinRAR has patched CVE-2025-8088, a zero-day exploited by Russia's RomCom in attacks on financial, defense, manufacturing and logistics companies.
August 11, 2025Source or Source

Scattered Spider and ShinyHunters' Next Move: Leaking Data
Extortionists Detail Fresh Victims, Although Sensitivity of Stolen Data Unclear
August 11, 2025Source or Source or Source

SonicWall VPN Cyberattack Linked to Known Access Control Vulnerability
SonicWall identified under 40 security incidents and determined the access control problem was related to a vulnerability published last year.
August 11, 2025Source

Threat actors move to smaller more persistent attacks
Threat actors are favoring smaller, persistent attacks under 100,000 requests per second according to a new report. This shift signals a growing dependence on automated, generative AI-enhanced attack tools, reflecting the democratization of DDoS capabilities among loosely coordinated threat actors and new actors entering the scene.
August 11, 2025Source

UK retail giant M&S restores Click & Collect months after cyber attack, some services still down
Many core offerings now back in action, says retailer
August 11, 2025Source

US government seized $1M from Russian ransomware gang
The U.S. Department of Justice announced on Monday it has seized the servers and $1 million in bitcoin from the prolific Russian ransomware gang behind the BlackSuit and Royal malware.
August 11, 2025Source

What Manufacturing Leaders Are Learning About Cloud Security - from Google's Frontline
Vinod D'Souza, Director of Manufacturing and Industry, and Nick Godfrey. Senior Director, both from the Office of the CISO, Google Cloud, discuss the findings of a recent survey of cybersecurity professionals about Securing Manufacturing's Transition to the Cloud
August 11, 2025Source or Source

What the Matter 1.4.2 update means for smart home security
Matter is built on the idea that smart home devices should be secure, reliable, and easy to use. It is based on Internet Protocol (IP), which allows devices, mobile apps, and cloud services to communicate. Matter also defines a set of IP-based networking technologies for device certification.
August 11, 2025Source or Source

Why AI Security Needs Continuous Red Teaming
NIST's Apostol Vassilev Explains Need for Dynamic Response, Not Static Testing
August 11, 2025Source or Source or Source or Source or Source

Why effective exposure management is key to cybersecurity [Q&A]
Thanks to the rise of hybrid working and SaaS the traditional concept of 'attack surface' -- limited to hardware, software, and network infrastructure -- is dangerously outdated and no longer sufficient to ensure cybersecurity.
August 11, 2025Source

Wikimedia Foundation loses first court battle to swerve Online Safety Act regulation
But it can contest if it lands up in 'Category 1,' and the move hurts operations, says judge
August 11, 2025Source

Win-DDoS: Attackers can turn public domain controllers into DDoS agents
SafeBreach researchers have released details on several vulnerabilities that could be exploited by attackers to crash Windows Active Directory domain controllers (DCs), one one of which (CVE-2025-32724) can also be leveraged to force public DCs to participate in distributed denial-of-service (DDoS) attacks.
August 11, 2025Source

Internet — Security Issues — August 10th, 2025

After researchers unmasked a prolific SMS scammer, a new operation has emerged in its wake
If you, like practically anyone else with a cell phone in the U.S. and beyond, have received a scam text message about an unpaid toll or undelivered mail item, there's a good chance you have been targeted by a prolific scamming operation.
August 10, 2025Source

Salesforce attack exposed Google Ads customer data
Google has revealed more details about an attack on one of its corporate Salesforce instances. The company now says that the attack exposed user data of Google Ads customers.
August 10, 2025Source

Week in review: SonicWall firewalls targeted in ransomware attacks, Black Hat USA 2025
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
August 10, 2025Source

Internet — Security Issues — August 9th, 2025

Encryption made for police and military radios may be easily cracked
An encryption algorithm can have weaknesses that could allow an attacker to listen in.
August 9, 2025Source

Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking
Researchers showed how flaws in a bus' onboard and remote systems can be exploited by hackers for tracking, control and spying.
August 9, 2025Source

Update your WinRAR because hackers are using this flaw to sneak malware onto your PC
Last week, WinRAR 7.13 dropped with a fix for a directory traversal vulnerability tracked as CVE-2025-8088. We now have more details on the exploit, thanks to work by researchers from ESET who discovered that attackers were actively abusing the flaw.
August 9, 2025Source

Internet — Security Issues — August 8th, 2025

Adult sites are stashing exploit code inside racy .svg files
Running JavaScript from inside an image? What could possibly go wrong?
August 8, 2025Source

Australian Privacy Regulator Sues Optus Over 2022 Hack
Telecom May Face Up to $2.22 Million Per Violation in Fines
August 8, 2025Source or Source or Source

Black Hat USA 2025 -- Summary of Vendor Announcements (Part 4)
Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas.
August 8, 2025Source

CodeSecCon 2025: Where Software Security's Next Chapter Unfolds
Taking place August 12-13, CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
August 8, 2025Source

Columbia University Data Breach Impacts 860,000
Columbia University has been targeted in a cyberattack where hackers stole the personal information of students, applicants, and employees.
August 8, 2025Source or Source

Do neurotechnologies threaten our mental privacy?
Consumer devices may soon be able to directly access and interfere with the human brain—but this raises unprecedented ethical and legal questions. How can we leverage the benefits of this technology for therapeutic purposes while preventing its misuse?
August 8, 2025Source

EU Cyber Index Reveals Strengths and Setbacks
ENISA's Laura Heuvinck Shares Index Findings, Implications for EU Cybersecurity
August 8, 2025Source or Source or Source or Source

Ex-White House cyber, counter-terrorism guru: Microsoft considers security an annoyance, not a necessity
Tells The Reg China's ability to p0wn Redmond's wares 'gives me a political aneurysm'
August 8, 2025Source

French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers
Bouygues has been targeted in a cyberattack that resulted in the personal information of millions of customers getting compromised.
August 8, 2025Source

Google suffers a serious data breach at the hands of a ransomware group
The bad actors are using voice phishing to pull off their malicious attacks.
August 8, 2025Source

Hackers found a way around Microsoft Defender to install ransomware on PCs, report says
Hey, no fair.
August 8, 2025Source

Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector
As attackers target help desks and identity systems, traditional security perimeters are proving insufficient against agile, socially-engineered threats.
August 8, 2025Source

In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment
Noteworthy stories that might have slipped under the radar: federal court filing system hack, Chanel data breach, emergency CISA directive.
August 8, 2025Source

Infosec hounds spot prompt injection vuln in Google Gemini apps
Not a very smart home: crims could hijack smart-home boiler, open and close powered windows and more. Now fixed
August 8, 2025Source

Insider threats are getting costlier and harder to detect
A recent study from IBM revealed that insider threats were the costliest data breaches of 2024, averaging $4.99 million per incident.
August 8, 2025Source

Insurance Firm Notifies 156K Victims - 1 Year After the Hack
What Makes Timely and Accurate Breach Reporting So Difficult for Some Organizations?
August 8, 2025Source or Source or Source or Source

ISMG Editors: Voice Phishing Attacks Breach Google and Cisco
Also: US Cyber Grants Are Dwindling; Hybrid Threats Renew Focus on OT Resilience
August 8, 2025Source

McAfee Total Protection review: Top security undermined by a major feature
McAfee Total Protection review: Top security undermined by a major feature
August 8, 2025Source

OpenAI Pitches GPT-5 as Faster, Smarter, More Accurate
Firm Says Latest Model Hallucinates Less, Scores Better on Benchmarks
August 8, 2025Source or Source or Source or Source or Source

Otorio Buy Fuels Armis' OT Security and AI-Driven Growth
CEO Yevgeny Dibrov Says Otorio Acquisition Positions Armis for Strong Growth
August 8, 2025Source

Red Teams Jailbreak GPT-5 With Ease, Warn It's 'Nearly Unusable' for Enterprise
Researchers demonstrate how multi-turn "storytelling" attacks bypass prompt-level filters, exposing systemic weaknesses in GPT-5's defenses.
August 8, 2025Source

Researchers Use Hidden Calendar Invites to Hijack AI, Control Smart Home Devices
Researchers Use Hidden Calendar Invites to Hijack AI, Control Smart Home Devices
August 8, 2025Source

Royal and BlackSuit ransomware gangs hit over 450 US companies
The U.S. Department of Homeland Security (DHS) says the cybercrime gang behind the Royal and BlackSuit ransomware operations had breached hundreds of U.S. companies before being taken down last month.
August 8, 2025Source

This PC security guru fell for a scam. Here are 3 lessons from his mistake
It happens to the best of us.
August 8, 2025Source

UK proxy traffic surges as users consider VPN alternatives amid Online Safety Act
Amid the furor around surging VPN usage in the UK, many users are eyeing proxies as a potential alternative to the technology.
August 8, 2025Source

WinRAR zero-day exploited to plant malware on archive extraction
A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the RomCom malware.
August 8, 2025Source

Internet — Security Issues — August 4th, 2025

AI Guardrails Under Fire: Cisco's Jailbreak Demo Exposes AI Weak Points
Cisco's latest jailbreak method reveals just how easily sensitive data can be extracted from chatbots trained on proprietary or copyrighted content.
August 4, 2025Source

AVG Internet Security review: Reliable, budget-friendly antivirus software
AVG Internet Security rounds out the company's solid antivirus software with additional online protections, while not costing too much.
August 4, 2025Source

Cybersecurity M&A Roundup: 44 Deals Announced in July 2025
Forty-four cybersecurity merger and acquisition (M&A) deals were announced in July 2025.
August 4, 2025Source

Cyera launches AI Guardian to secure all types of AI systems
Cyera launched AI Guardian, a solution built to secure any type of AI. It expands Cyera's platform to meet the needs of enterprises adopting AI at scale, anchored by two core products: AI-SPM, providing inventory on all AI assets at a granular level, and AI Runtime Protection, monitoring and responding to AI data risks in real-time.
August 4, 2025Source

Do We Really Need IT-OT Integration?
Security Experts Call for Coordinated Autonomy Over Complete Integration
August 4, 2025Source or Source or Source or Source

Flashpoint͏͏ Half-Year͏͏ Security͏͏ Report:͏͏ Credential͏͏ Theft͏͏ and͏͏ Breaches͏͏ Surge
Based͏͏ on͏͏ monitoring͏͏ of͏͏ more͏͏ than͏͏ 3.6͏͏ petabytes͏͏ of͏͏ original-source͏͏ data,͏͏ security͏͏ firm͏͏ observed͏͏ growth͏͏ in͏͏ credential͏͏ theft,͏͏ vulnerability͏͏ disclosures͏͏ and͏͏ exploit͏͏ availability,͏͏ as͏͏ well͏͏ as͏͏ a͏͏ rise͏͏ in͏͏ ransomware͏͏ attacks͏͏ and͏͏ large-scale͏͏ data͏͏ breaches.
August 4, 2025Source

Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities
Illumina will pay $9.8 million to settle accusations that products provided to the US government were affected by cybersecurity flaws.
August 4, 2025Source

German phone repair biz collapses following 2023 ransomware attack
The founder of a German mobile phone repair and insurance biz has begun insolvency proceedings for some operations in his company after struggling financially following a costly ransomware attack in 2023.
August 4, 2025Source

Hackers are using link wrapping to steal your Microsoft 365 login
Cybercriminals are using clever tricks like link wrapping to steal Microsoft 365 login info, even bypassing protected email systems.
August 4, 2025Source

Jury Holds Meta Accountable in 'Landmark' Privacy Decision
A federal jury found that Meta violated California privacy laws by eavesdropping and recording confidential communications without the consent of millions of consumers who used Flo Health's fertility app embedded with Meta' software development tools and tracking pixels.
August 4, 2025Source or Source or Source or Source or Source

LastPass unveils SaaS Protect to clamp down on shadow IT, AI risks
Building on the company's existing SaaS Monitoring capabilities, LastPass SaaS Protect introduces a set of policy enforcements that enable organizations to move from passive visibility into proactive access control.
August 4, 2025Source or Source

Malwarebytes vs Norton (2025): Which Antivirus Solution Is Better?
Read this guide to find out which one is better in terms of features, performance, and protection against malware.
August 4, 2025Source

Microsoft's new database migration tool has a temporary security cost
Microsoft has announced that Azure Database Migration Service (DMS) now includes a generally available schema migration feature that simplifies moving data by automatically including schemas, tables, indexes, views and other database objects. With this feature, Microsoft hopes to reduce manual effort and ensure consistency between source and target databases.
August 4, 2025Source

Millions of age checks performed as UK Online Safey Act gets rolling
But it's OK, claims Brit government, no personal data stored 'unless absolutely necessary'
August 4, 2025Source

North Korean spies posing as remote worker4s have infiltrated hundreds of companies, says CrowdStrike
Researchers at security giant CrowdStrike say they have seen hundreds of cases where North Koreans posing as remote IT workers have infiltrated companies to generate money for the regime, marking a sharp increase over previous years.
August 4, 2025Source

Northwest Radiologists Data Breach Impacts 350,000 Washingtonians
Northwest Radiologists says the personal information of 350,000 Washington State residents was stolen in a January 2025 data breach.
August 4, 2025Source

Nvidia Triton Vulnerabilities Pose Big Risk to AI Models
Nvidia has patched over a dozen vulnerabilities in Triton Inference Server, including another set of vulnerabilities that threaten AI systems.
August 4, 2025Source

Perplexity accused of scraping websites that explicitly blocked AI scraping
AI startup Perplexity is crawling and scraping content from websites that have explicitly indicated they don't want to be scraped, according to internet infrastructure provider Cloudflare.
August 4, 2025Source

Python-powered malware snags hundreds of credit cards, 200K passwords, and 4M cookies
PXA Stealer pilfers data from nearly 40 browsers, including Chrome
August 4, 2025Source

Ransomware gangs join attacks targeting Microsoft SharePoint servers
Ransomware gangs have recently joined ongoing attacks targeting a Microsoft SharePoint vulnerability chain, part of a broader exploitation campaign that has already led to the breach of at least 148 organizations worldwide.
August 4, 2025Source

Risks and Rewards for Scaling Up the UK Cybersecurity Market
Orange Cyberdefense's Dominic Trott on Investor Hesitancy, Geopolitical Obstacles
August 4, 2025Source or Source or Source

Russia Uses ISPs to Spy on Diplomats, Warns Microsoft
Russian Intelligence Tied to SSL Stripping Attacks Designed for Eavesdropping
August 4, 2025Source

Sean Cairncross Confirmed by Senate as National Cyber Director
The US Senate voted to confirm Sean Cairncross as the National Cyber Director, five months after nominalization.
August 4, 2025Source

Self-Managed Keycloak for App Connect Dashboard and Designer Authoring
This tutorial explains how to use your Keycloak instance to manage authentication and authorization for App Connect Dashboard and Designer Authoring.
August 4, 2025Source

Senate Confirms Trump's National Cyber Director Nominee
Sean Cairncross Confirmed in 59-35 Senate Vote Despite Lacking Technical Experience
August 4, 2025Source or Source or Source or Source or Source

Several Vulnerabilities Patched in AI Code Editor Cursor
Attackers could silently modify sensitive MCP files to trigger the execution of arbitrary code without requiring user approval.
August 4, 2025Source

SonicWall firewalls targeted in ransomware attacks, possibly via zero-day
Attackers wielding the Akira ransomware and possibly a zero-day exploit have been spotted targeting SonicWall firewalls since July 15, 2025.
August 4, 2025Source

SonicWall investigates 'cyber incidents,' including ransomware targeting suspected 0-day
Bypassing MFA and deploying ransomware...sounds like something that rhymes with 'schmero-day'
August 4, 2025Source

US Announces $100 Million for State, Local and Tribal Cybersecurity
CISA and FEMA announced two grants of more than $100 million for state, local, and tribal governments looking to improve cybersecurity.
August 4, 2025Source

What Is A 'Laptop Farm' & What Is One Used For?
What Is A 'Laptop Farm' & What Is One Used For?
August 4, 2025Source

Internet — Security Issues — August 3rd, 2025

Mystery packages with QR codes spark new wave of scams
73% of Americans scan QR codes without checking their source
August 3, 2025Source

Silent Push CEO on cybercrime takedowns: 'It's an ongoing cat-and-mouse game'
Plus: why takedowns aren't in threat-intel analysts' best interest
August 3, 2025Source

Internet — Security Issues — August 2nd, 2025

CISA roasts unnamed critical national infrastructure body for shoddy security hygiene
Plaintext passwords, shared admin accounts, and insufficient logging rampant at mystery org
August 2, 2025Source

Genomics Gear Firm Pays $9.8M to Settle False Cyber Claims
US Alleged Illumina 'Knowingly' Sold Feds Systems Containing Vulnerabilities
August 2, 2025Source or Source

Hacking and Decoding Hidden Wireless Signals with a Raspberry Pi and SDR Tools
What if you could decode the invisible chatter of wireless networks, uncovering the secrets of off-grid communication systems, all with tools you can build at home? The intersection of software-defined radio (SDR), Raspberry Pi, and GNU Radio offers a gateway into this fascinating world, where signals once reserved for experts can now be analyzed by anyone with curiosity and patience. Imagine tracking airplanes in real-time, optimizing wireless traffic, or even hacking into the mechanics of Meshtastic—a long-range, off-grid messaging system powered by the LoRa protocol.
August 2, 2025Source

Noma Raised $100M to Expand Agentic AI Security Platform
Red-Hot Startup Noma Security to Deepen Protection for AI Models and Agents
August 2, 2025Source or Source or Source

Safe Raises $70M Series C to Scale Cyber Risk Management
New Funding, Platform Expansion Aim for Predictive, Autonomous Threat Defense
August 2, 2025Source or Source or Source or Source or Source

Internet — Security Issues — August 1st, 2025

9 things you shouldn't use AI for at work
AI can boost productivity, but it can also derail your entire operation. From fake legal advice to customer service nightmares, here are nine places AI doesn't belong at work.
August 1, 2025Source

$1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025
Meta is sponsoring ZDI's Pwn2Own hacking competition, where participants can earn big prizes for smartphone, WhatsApp and wearable device exploits.
August 1, 2025Source

AI Agents Can Hack Smart Contracts on Autopilot
AI Tools Can Steal Crypto Autonomously, Even From Audited Code
August 1, 2025Source or Source

AI model enhances diagnosis accuracy of high-risk thyroid nodules
A research team led by Prof. Li Hai from the Hefei Institutes of Physical Science of the Chinese Academy of Sciences has developed a multimodal deep-learning model for predicting the malignancy of TI-RADS 4 thyroid nodules with high-risk characteristics.
August 1, 2025Source

AI Still Writing Vulnerable Code
Artificial intelligence may be writing more of today's code, but it's also writing in vulnerabilities. Large language models introduce vulnerabilities in nearly half of test cases when asked to complete secure code tasks, say researchers.
August 1, 2025Source or Source or Source or Source or Source

AI-powered Cursor IDE vulnerable to prompt-injection attacks
A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges.
August 1, 2025Source

Authorities seize BlackSuit ransomware gang's servers
German prosecutors say a joint U.S.-European operation has seized infrastructure belonging to the BlackSuit ransomware gang, a notorious hacking group blamed for several major cyberattacks in recent years.
August 1, 2025Source

Bill Aims to Create National Strategy for Quantum Cybersecurity Migration
Two US senators introduced a bipartisan bill to help prepare federal government agencies for quantum computing threats.
August 1, 2025Source

Cyber Risk Management Firm Safe Raises $70 Million
Safe has raised $70 million in Series C funding to advance cyber risk management through specialized AI agents.
August 1, 2025Source

Cybercrooks attached Raspberry Pi to bank network and drained ATM cash
Criminals used undocumented techniques and well-placed insiders to remotely withdraw money
August 1, 2025Source

Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images
Echo received funding for creating thousands of container images that are not affected by any CVE, for enterprise-grade software infrastructure.
August 1, 2025Source

Florida prison email blunder exposes visitor contact info to inmates
Victims fear leak at Everglades Correctional Institution could lead to violent extortion
August 1, 2025Source

Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
Should Gen Z to be treated as a separate attack surface within your company?
August 1, 2025Source

Genomics Gear Firm Pays $9.8M to Settle False Cyber Claims
US Alleged Illumina 'Knowingly' Sold Feds Systems Containing Vulnerabilities
August 1, 2025Source or Source

Hackers use hidden Raspberry Pi and custom malware to attack bank ATMs
The heist was stopped before the criminals could do any significant damage
August 1, 2025Source

ISMG Editors: ToolShell Exploit Blurs Crime and Espionage
Also: Rethinking IT-OT Integration; Previewing Black Hat 2025
August 1, 2025Source or Source or Source or Source or Source

Microsoft Boosts .NET Bounty Program Rewards to $40,000
Valid, complete reports detailing remote code execution or elevation of privilege bugs in .NET qualify for the maximum rewards.
August 1, 2025Source

Noma Raised $100M to Expand Agentic AI Security Platform
Red-Hot Startup Noma Security to Deepen Protection for AI Models and Agents
August 1, 2025Source

Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft
Russian state-sponsored APT Secret Blizzard has used ISP-level AitM attacks to infect diplomatic devices with malware.
August 1, 2025Source

Sex toy maker Lovense threatens legal action after fixing security flaws that exposed users' data
Lovense, a maker of internet-connected sex toys, has confirmed it has fixed a pair of security vulnerabilities that exposed users' private email addresses and allowed attackers to remotely take over any user's account.
August 1, 2025Source

SonicWall firewall devices hit in surge of Akira ransomware attacks
SonicWall firewall devices have been increasingly targeted since late July in a surge of Akira ransomware attacks, potentially exploiting a previously unknown security vulnerability, according to cybersecurity company Arctic Wolf.
August 1, 2025Source

View to a Patch: Google Tweaks Its Vulnerability Disclosure
Security Experts Laud Project Zero's Push for Greater Transparency, Faster Patches
August 1, 2025Source or Source or Source or Source

Wallarm Secures $55M to Safeguard API-Driven Business Logic
Series C Funding Supports Evolution to Protecting API-Powered Business Revenue
August 1, 2025Source

What Makes an AI Startup Fundable - From a VC Who Knows
Investor Umesh Padval on Platform Power, Scaling Fast and Global AI Plays
August 1, 2025Source or Source or Source or Source or Source

Why Legal Woes Continue to Mount Over Health Data Trackers
Regulatory Attorney Elizabeth Hodge of Akerman on Ongoing Privacy Worries
August 1, 2025Source or Source or Source or Source or Source

Yes, You Can Bundle Other Cybersecurity Services With Some VPNs. But Is It a Good Idea?
You need more than just a VPN to boost your digital privacy and security. Bundling additional tools with your VPN can be convenient, but be aware of the pitfalls.
August 1, 2025Source

Internet — Security Issues — July 29th, 2025

Allianz Life Breach Tied to CRM Compromise
Attackers Stole US Customer Data Using Social Engineering
July 29, 2025Source or Source or Source or Source or Source

Booz Allen Hamilton launches Vellox Reverser to accelerate AI-powered malware analysis
Booz Allen Hamilton announced Vellox Reverser, an AI-enabled cloud product that protects organizations from malware as cyberattacks grow increasingly insidious. The service uses a network of peer-to-peer nodes that collaboratively deconstruct complex malware binaries and produce actionable defensive recommendations in minutes instead of days or weeks.
July 29, 2025Source

Corelight Uses Gen AI to Power Smarter Threat Detection
SaaS Enhancements Aim to Boost Network Detection, Response for Small Security Teams
July 29, 2025Source or Source

Coyote Trojan Turns Accessibility Into Attack Surface
Brazil-Targeting Malware Exploits Windows UIA to Evade Detection
July 29, 2025Source or Source or Source or Source or Source

Cyware expands Intelligence Suite to streamline CTI program deployment and operations
Cyware expanded its Cyware Intelligence Suite, an enhanced threat intelligence program-in-a-box that consolidates threat management capabilities into a streamlined, logical workflow. The expansion enables security teams to operationalize threat intelligence more easily and improve security posture faster.
July 29, 2025Source

Darwinium launches AI tools to detect and disrupt adversarial threats
Just ahead of Black Hat USA 2025, Darwinium has announced the launch of Beagle and Copilot, two new agentic AI features that simulate adversarial attacks, surface hidden vulnerabilities, and dynamically optimize fraud defenses. As fraudsters increasingly deploy AI agents to evade detection and manipulate digital systems, Darwinium gives defenders their own autonomous AI capabilities, built natively into its behavioral intelligence platform.
July 29, 2025Source or Source

Dropzone AI Raises $37 Million for Autonomous SOC Analyst
Dropzone AI has announced a Series B funding round led by Theory Ventures to boost its AI SOC solution.
July 29, 2025Source

Fable Security launches with $31m to tackle human risk in cybersecurity
Fable Security, a new human risk management platform, has launched with $31 million in funding from Greylock Partners and Redpoint Ventures. It is already working with enterprises across finance, healthcare, logistics, and technology, helping security teams reduce employee-driven risk with targeted, real-time interventions.
July 29, 2025Source or Source

FBI: Watch out for these signs Scattered Spider is spinning its web around your org
The FBI and a host of international cyber and law enforcement agencies on Tuesday warned that Scattered Spider extortionists have changed their tactics and are now breaking into victims' networks using savvier social engineering techniques, searching for organizations' Snowflake database credentials, and deploying a handful of new ransomware variants, most recently DragonForce.
July 29, 2025Source

From Ex Machina to Exfiltration: When AI Gets Too Curious
From prompt injection to emergent behavior, today's curious AI models are quietly breaching trust boundaries.
July 29, 2025Source

Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware
Hackers were spotted exploiting a critical SAP NetWeaver vulnerability tracked as CVE-2025-31324 to deploy the Auto-Color Linux malware in a cyberattack on a U.S.-based chemicals company.
July 29, 2025Source

Health System Settles Web Tracker Lawsuit for up to $9.25M
Lawsuit Claims BJC Health Shared Patient Info From MyChart Portal Without Consent
July 29, 2025Source or Source or Source

How attackers are still phishing "phishing-resistant" authentication
As awareness grows around many MFA methods being "phishable" (i.e. not phishing resistant), passwordless, FIDO2-based authentication methods (aka. passkeys) like YubiKeys, Okta FastPass, and Windows Hello are being increasingly advocated.
July 29, 2025Source

How FinServ Firms Can Navigate Secure Open Finance in 2025 and Beyond
Banks Must Secure APIs, Vet Partners and Prepare for Open Finance Threats in 2025
July 29, 2025Source or Source or Source or Source or Source

Joint cyber security advisory on Scattered Spider
The Canadian Centre for Cyber Security (Cyber Centre) has joined the United States' Federal Bureau of Investigation (FBI) and the following domestic and international partners in issuing a joint advisory on Scattered Spider:
July 29, 2025Source

Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment
Vulnerabilities discovered by Binarly in Lenovo devices allow privilege escalation, code execution, and security bypass.
July 29, 2025Source

Microsoft Authenticator is ending password autofill soon. How to set up a passkey before Aug. 1
If you're a Microsoft Authenticator user, like me, you've probably received at least one notice that the app's password management features are no longer usable and that your stored passwords will be inaccessible starting Aug. 1 unless you have the Edge browser.
July 29, 2025Source

Minnesota activates National Guard after St. Paul cyberattack
Minnesota Governor Tim Walz has activated the National Guard in response to a crippling cyberattack that struck the City of Saint Paul, the state's capital, on Friday.
July 29, 2025Source

Oracle/Cerner EHR Hack: Breach Reports Still Trickling In
At Least 410,000 Patients Reported Affected, But Likely Even More Victims
July 29, 2025Source or Source or Source or Source or Source

Order Out of Chaos -- Using Chaos Theory Encryption to Protect OT and IoT
The need for secure encryption in IoT and IIoT devices is obvious, and potentially critical for OT and, by extension, much of the critical infrastructure.
July 29, 2025Source or Source

Organizations Warned of Exploited PaperCut Flaw
Threat actors are exploiting a two-year-old vulnerability in PaperCut that allows them to execute arbitrary code remotely.
July 29, 2025Source

PCI DSS 4.0.1 Pushes E-Commerce to Secure Apps Fast
New PCI DSS Rules Raise the Bar, Make App Security a Mandate
July 29, 2025Source or Source or Source or Source

Promptfoo Raises $18.4 Million for AI Security Platform
Promptfoo has raised $18.4 million in Series A funding to help organizations secure LLMs and generative AI applications.
July 29, 2025Source

Ransomware Hits Healthcare Through Applications
Healthcare Faces Rising App-Based Ransomware Threats and Urgent Compliance Demands
July 29, 2025Source

Rise of Chaos Ransomware Tied to BlackSuit Group's Exit
Operation Checkmate Disrupts One of the Large Russian-Speaking Ransomware Groups
July 29, 2025Source or Source or Source or Source

Russian airline Aeroflot grounds dozens of flights after cyberattack
Aeroflot, Russia's flag carrier, has suffered a cyberattack that resulted in the cancellation of more than 60 flights and severe delays on additional flights.
July 29, 2025Source

Scammers Are Using Fake Lawyers and Court Dates to Steal Immigrants' Money. Here's What to Look Out For
Criminals will prey on immigration fears to trick people out of their money.
July 29, 2025Source

Seal Security Raises $13 Million to Secure Software Supply Chain
The open source security firm will use the investment to enhance go-to-market efforts and accelerate platform expansion.
July 29, 2025Source

Sex toy maker Lovense caught leaking users' email addresses and exposing accounts to takeovers
A security researcher says sex toy maker Lovense has failed to fully fix two security flaws that expose the private email addresses of its users and allow the takeover of any user's account.
July 29, 2025Source

SharePoint Zero-Days Exploited to Unleash Warlock Ransomware
145 Organizations Compromised by China-Linked Ransomware Hackers and Others
July 29, 2025Source or Source or Source or Source or Source

Sploitlight: macOS Vulnerability Leaks Sensitive Information
The TCC bypass could expose information cached by Apple Intelligence, including geolocation and biometric data.
July 29, 2025Source

Study reveals how mobile apps track users through WiFi and Bluetooth
Researchers from IMDEA Networks, in collaboration with Universidad Carlos III de Madrid, IMDEA Software Institute, and the University of Calgary, have conducted the first large-scale study—"Your Signal, Their Data: An Empirical Privacy Analysis of Wireless-scanning SDKs in Android"—on how certain Android mobile applications use a device's WiFi and Bluetooth connections to track users' movements in their daily lives, thereby violating their privacy.
July 29, 2025Source

Tea app security breaches reveal private chats and photo ID, as it tops App Store
Two major security vulnerabilities in the Tea app -- which claims to make dating safer for women -- have exposed the private chats and personal data of at least tens of thousands of users.
July 29, 2025Source

Tea app takes messaging system offline after second security issue reported
Tea, a dating discussion app that recently suffered a high-profile cybersecurity breach, announced late Monday that some direct messages were also accessed in the incident.
July 29, 2025Source

Telecom giant Orange warns of disruption amid ongoing cyberattack
Orange, a French telecommunications giant and one of the largest phone providers in the world, announced on Monday that it was the victim of an unspecified cyberattack.
July 29, 2025Source

Ukraine strikes back at Russia — launches cyberattack on forces in Crimea as independent hackers target airline Aeroflot, grounding dozens of planes
The first was a sustained distributed denial-of-service attack on Crimean forces; the second was reportedly destructive.
July 29, 2025Source

Varonis unveils Next-Gen Database Activity Monitoring for agentless database security and compliance
Varonis released Next-Gen Database Activity Monitoring (DAM), a new approach to database security that deploys quickly and overcomes the challenges legacy vendors face in preventing data breaches and ensuring regulatory compliance.
July 29, 2025Source

War Games: MoD asks soldiers with 1337 skillz to compete in esports
Troopers to swap radios for Turtle Beaches in preparation for '21st century challenges'
July 29, 2025Source

Why Palo Alto Networks Is Eyeing a $20B+ Buy of CyberArk
Palo Alto Has Always Shied Away From Identity and Expensive M&A. What Changed?
July 29, 2025Source or Source or Source or Source

Why your computer will thank you for choosing Webroot Essentials
Let's be honest -- nobody wants antivirus software that slows down their computer. You know the feeling: you install security software to protect yourself, but suddenly your laptop takes forever to start up, programs freeze, and you're constantly waiting for things to load.
July 29, 2025Source

Your body can be fingerprinted and tracked by Wi-Fi signals
A new system developed by researchers in Rome can identify specific people and their locations with 95% accuracy.
July 29, 2025Source

Internet — Security Issues — July 27th, 2025

Allianz Life confirms data breach affecting majority of 1.4M US customers
Hackers gained access to personal data on the majority of the 1.4 million customers of Allianz Life Insurance Company of North America, the company confirmed Saturday.
July 27, 2025Source

IT provider sued after it simply 'handed the credentials' to hackers — Clorox claims Cognizant gaffe enabled a $380m ransomware attack
Your network security is only as strong as its weakest link.
July 27, 2025Source

Scattered Spider is running a VMware ESXi hacking spree
Scattered Spider hackers have been aggressively targeting virtualized environments by attacking VMware ESXi hypervisors at U.S. companies in the retail, airline, transportation, and insurance sectors.
July 27, 2025Source

Week in review: Microsoft SharePoint servers under attack, landing your first cybersecurity job
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
July 27, 2025Source

Internet — Security Issues — July 26th, 2025

Allianz Life says 'majority' of customers' personal data stolen in cyberattack
U.S. insurance giant Allianz Life has confirmed to TechCrunch that hackers stole the personal information of the "majority" of its customers, financial professionals, and employees during a mid-July data breach.
July 26, 2025Source

Blame a leak for Microsoft SharePoint attacks, researcher insists
A week after Microsoft told the world that its July software updates didn't fully fix a couple of bugs, which allowed miscreants to take over on-premises SharePoint servers and remotely execute code, researchers have assembled much of the puzzle — with one big missing piece.
July 26, 2025Source

How Torq Is Rewiring SOCs With Autonomous Cyber Agents
CEO Ofer Smadari: AI Agents Now Resolving Threat Cases at Scale with Accuracy
July 26, 2025Source or Source or Source

Patients Still Struggle With Full Access to Health Info
Tech Standards, Regulatory Levers Have Removed Barriers. What's Still in the Way?
July 26, 2025Source or Source or Source or Source or Source

The Tea app was intended to help women date safely. Then it got hacked
Tea, a provocative dating app designed to let women anonymously ask or warn each other about men they'd encountered, rocketed to the top spot on the U.S. Apple App Store this week. On Friday, the company behind the app confirmed it had been hacked: Thousands of images, including selfies, were leaked online.
July 26, 2025Source

Internet — Security Issues — July 25th, 2025

Advisor to Brit tech contractors Qdos confirms client data leak
Policy management not affected, but some personal data may have been snaffled
July 25, 2025Source

AI emerges as a cybersecurity teammate
On its own artificial intelligence isn't a solution to cybersecurity issues, but new data from Hack The Box, a platform for building attack-ready teams and organizations, reveals that cybersecurity teams are increasingly beginning to adopt AI as a copilot for solving security challenges.
July 25, 2025Source

Amazon AI coding agent hacked to inject data wiping commands
A hacker planted data wiping code in a version of Amazon's generative AI-powered assistant, the Q Developer Extension for Visual Studio Code.
July 25, 2025Source

Chinese Spies Target Networking and Virtualization Flaws to Breach Isolated Environments
Chinese cyberespionage group Fire Ant is targeting virtualization and networking infrastructure to access isolated environments.
July 25, 2025Source

Critical Infrastructure Leaders: Threat Level Remains High
OT Experts Advocate for Collaboration and "Adversary-Hostile" National Defenses
July 25, 2025Source or Source or Source or Source

Did You Get A Suspicious Text About An Amazon Return? Here's What's Happening
A new scam targeting Amazon users is making the rounds in the form of suspicious text messages, but those who know what to look out for can avoid being taken advantage of. The texts in question were spotted by scam prevention service Guardio, which passed the information along to Forbes. According to the firm, these particular text attacks have spiked by 5,000% in recent weeks.
July 25, 2025Source

Do Website Cookies Pose Legal, Security Risks to Your Firm?
Lawyer Jonathan Armstrong on Legal, Security Trouble Lurking in Cookie Missteps
July 25, 2025Source or Source or Source

Freelance dev shop Toptal caught serving malware after GitHub account break-in
Malicious code lurking in over 5,000 downloads, says Socket researcher
July 25, 2025Source

Hacker Sneaks Data-Deleting Prompt Into Amazon's AI Coding Tool
Thankfully, Amazon reports that no user data has actually been compromised.
July 25, 2025Source

How Torq Is Rewiring SOCs With Autonomous Cyber Agents
CEO Ofer Smadari: AI Agents Now Resolving Threat Cases at Scale with Accuracy
July 25, 2025Source or Source

In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth
Noteworthy stories that might have slipped under the radar: Google Cloud Build vulnerability earns researcher big bounty, more countries hit by Louis Vuitton data breach, organizations' attack surface is increasing.
July 25, 2025Source

Mitel Patches Critical Flaw in Enterprise Communication Platform
An authentication bypass vulnerability in Mitel MiVoice MX-ONE could allow attackers to access user or admin accounts on the system.
July 25, 2025Source

New York Unveils 'Nation-Leading' Water Sector Cyber Rules
State Seeks Public Input on New Reporting Rules and Regulations for Water Sector
July 25, 2025Source or Source or Source or Source or Source

No Patch for Flaw Exposing Hundreds of LG Cameras to Remote Hacking
LG Innotek LNV5110R security cameras are affected by a vulnerability that can be exploited for unauthenticated remote code execution.
July 25, 2025Source

Risk highlighted as Chinese hackers hit Microsoft
Software giant Microsoft is at the center of cybersecurity storm after China-linked hackers exploited flaws in SharePoint servers to target hundreds of organizations.
July 25, 2025Source

Scattered Spider Exploiting VMware vSphere
The loosely connected band of adolescent cybercriminals tracked as Scattered Spider has joined the VMware hypervisor hacking bandwagon, pivoting into virtual servers through corporate instances of Active Directory.
July 25, 2025Source or Source or Source or Source or Source

Sophisticated Koske Linux Malware Developed With AI Aid
The Koske Linux malware shows how cybercriminals can use AI for payload development, persistence, and adaptivity.
July 25, 2025Source

Supply-chain attacks on open source software are getting out of hand
Attacks affected packages, including one with ~2.8 million weekly downloads.
July 25, 2025Source

Swiss-Based Healthcare Network AMEOS Responding to Attack
Systems for 100 Facilities Taken Offline, Patients Warned of Potential Data Breach
July 25, 2025Source or Source or Source or Source or Source

The role of the cybersecurity PM in incident-driven development
Gone are the days when cybersecurity meant stopping annoying viruses like the Love Bug. Today, it's about battling a massive, financially motivated cybercrime industry. Attacks are smarter, faster, and more damaging—and that changes everything for product teams.
July 25, 2025Source

UK Student Sentenced to Prison for Selling Phishing Kits
Ollie Holman was sentenced to prison for selling over 1,000 phishing kits that caused estimated losses of over $134 million.
July 25, 2025Source

US sanctions North Korean firm, nationals behind IT worker schemes
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has sanctioned three North Korean nationals and a company for supporting fraudulent IT worker schemes that generated illicit revenue for the Democratic People's Republic of Korea (DPRK) government.
July 25, 2025Source or Source

Your Microsoft Passwords Will Vanish in a Few Hours. What to Do Right Now
Microsoft's go-to password manager won't be the same after Aug. 1.
July 25, 2025Source

Internet — Security Issues — July 22nd, 2025

83 percent of IT and engineering professionals bypass security controls
A new survey of 1,000 IT, security, and engineering professionals across North America uncovers a fractured landscape of legacy VPNs, slow manual processes, and overlapping tools -- with 99 percent of respondents saying they'd like to redesign their company's access and networking setup from the ground up.
July 22, 2025Source

158-year-old company forced to close after ransomware attack precipitated by a single guessed password — 700 jobs lost after hackers demand unpayable sum
An employee's weak password was the company's Achilles' heel.
July 22, 2025Source or Source

AI moves from optional to essential in cybersecurity, according to new findings
A new report from Abnormal AI shows cybersecurity leaders and frontline analysts agree that artificial intelligence is now central to the future of the security operations center (SOC).
July 22, 2025Source

Apple Alerted Dozens of Iranians Targeted by Sophisticated Spyware Attacks
Apple has quietly been sending threat notifications to users it believes are being targeted by advanced cyberattacks. In the first half of 2025, more than a dozen Iranians received these alerts, including government officials, tech workers, and dissidents, according to new research. These individuals were reportedly targeted with highly sophisticated spyware just months before the Iran-Israel war began.
July 22, 2025Source or Source

BitRaser secures data erasure on macOS devices
BitRaser launched its Integrated Mac Eraser and Diagnostics Tool, a software designed to streamline IT asset disposition (ITAD) processes.
July 22, 2025Source

Chinese Hackers' Evolution From Vandals to Strategists
Early Hacktivists Laid the Blueprint for Chinese Hacking
July 22, 2025Source or Source or Source or Source

Chinese state hackers targeting Microsoft customers
Chinese state-sponsored hackers are actively exploiting critical security vulnerabilities in users of Microsoft's popular SharePoint servers to steal sensitive data and deploy malicious code, the US tech giant warned Tuesday.
July 22, 2025Source

CISA and FBI warn of escalating Interlock ransomware attacks
CISA and the FBI warned on Tuesday of increased Interlock ransomware activity targeting businesses and critical infrastructure organizations in double extortion attacks.
July 22, 2025Source

Cisco: Maximum-severity ISE RCE flaws now exploited in attacks
Cisco is warning that three recently patched critical remote code execution vulnerabilities in Cisco Identity Services Engine (ISE) are now being actively exploited in attacks.
July 22, 2025Source

Coyote malware abuses Windows accessibility framework for data theft
A new variant of the banking trojan 'Coyote' has begun abusing a Windows accessibility feature, Microsoft's UI Automation framework, to identify which banking and cryptocurrency exchange sites are accessed on the device for potential credential theft.
July 22, 2025Source

CrushFTP Zero-Day Exploit Leaves Thousands Of Servers Vulnerable To Hijacking
CrushFTP, a service that provides users with secure file server software, has recently been targeted by hackers. Unfortunately, it seems as if some customers have been compromised, with thousands of servers still vulnerable to being attacked, according to the non-profit Shadowserver Foundation. Although the company says it has remedied the issue with its latest version release.
July 22, 2025Source

CYE AI delivers insights into an organization's cyber risk
CYE launched its new AI Agent, CYE AI. The addition of this conversational AI assistant enables organizations to understand, prioritize, and act on their unique cyber risk from day one.
July 22, 2025Source

Darktrace Buys Network Traffic Visibility Firm Mira Security
Startup Mira Security Will Offer Insights on Encrypted Network Traffic, Decryption
July 22, 2025Source or Source

Dell Confirms Security Breach by Extortion Group, Calls Stolen Data 'Fake'
Cyber extortion group World Leaks released more than 1.3TB of internal Dell data, including scripts and backups. Dell insists no sensitive customer information was exposed.
July 22, 2025Source

Dell Says Data Leaked by Hackers Is Fake
Dell confirms the compromise of a demo environment containing synthetic data after hackers leak allegedly stolen information.
July 22, 2025Source

Dior Says Personal Information Stolen in Cyberattack
Dior says hackers accessed personal information in a January 2025 intrusion. No payment information was compromised.
July 22, 2025Source

DNS embedded malware technique used to create a hacker-inspired version of the popular Mad Libs word game — built on networking infrastructure to provide distributed version
Why use DNS to host malware when you can use it to host Wu-Tang-themed mad-libs instead?
July 22, 2025Source

File Transfer Flaw Blamed in Health Breach Affecting 233,000
Cierant Corp. Says Cleo MFT Zero-Day Exploit Compromised Health Plan Client Data
July 22, 2025Source

Free tool uncovers API vulnerabilities
According to Verizon's 2025 Data Breach Investigations Report, API-related breaches have increased nearly 40 percent year-on-year, with broken authorization cited as one of the most exploited flaws.
July 22, 2025Source

How to Create a Secure Username
Discover how to create a unique and secure username for your online accounts, and find out why it's just as important as having a strong password.
July 22, 2025Source

Humans can be tracked with unique 'fingerprint' based on how their bodies block Wi-Fi signals
Wi-Fi spy with my little eye that same guy I saw at another hotspot
July 22, 2025Source

Identity Threats Target Small Businesses in MFA Workarounds
Huntress's Kyle Hanslovan Warns of MFA Bypass, Rogue Apps, Fake Device Enrollments
July 22, 2025Source or Source or Source or Source

Lumma infostealer malware returns after law enforcement disruption
The Lumma infostealer malware operation is gradually resuming activities following a massive law enforcement operation in May, which resulted in the seizure of 2,300 domains and parts of its infrastructure.
July 22, 2025Source

Malwarebytes introduces security module designed to combat email-based threats
ThreatDown Email Security, powered by IRONSCALES' adaptive AI technology, extends protection beyond the endpoint—enabling users to manage both endpoint and email security from a single, unified console. The new module is available immediately to all customers and will be rolled out to Managed Service Providers (MSPs) in early August.
July 22, 2025Source

Microsoft Accuses Chinese Hackers Of Exploiting Critical SharePoint Zero-Day Vulnerability In Massive Global Cyberattack Targeting Government Agencies, Businesses, And Sensitive Infrastructure
Cyberattacks are becoming alarmingly frequent, particularly those targeting big firms and exploiting their security flaws. Such has been the case recently, as Microsoft now accuses Chinese state-sponsored attackers of finding gaps and exfiltrating SharePoint document management software in a global cyberattack campaign. The tech giant further went on to state that the target of this espionage campaign is mainly businesses and government agencies, as well as their sensitive infrastructure.
July 22, 2025Source

Microsoft grapples with another security breach: The latest on the SharePoint attacks
Microsoft is once again in the cybersecurity spotlight, acknowledging Tuesday morning that hackers linked to China are among those exploiting vulnerabilities in on-premises SharePoint software, the latest in a string of security problems that have plagued the tech giant.
July 22, 2025Source

Microsoft patches critical SharePoint 2016 zero-days amid active exploits
Admins urged to rotate machine keys, restart IIS after emergency fix
July 22, 2025Source

Microsoft pins on-prem SharePoint attacks on Chinese threat actors
Most intriguingly, Check Point Research says that they observed the first exploitation attempts on July 7th, with the target being a major Western government.
July 22, 2025Source or Source

Microsoft says Chinese hacking groups are behind SharePoint attacks
At least 54 organizations have been breached in the attacks.
July 22, 2025Source

Microsoft Traces On-Premises SharePoint Exploits to China
But Hacking Groups of All Stripes Now Have Access to Exploit Code, Researchers Warn
July 22, 2025Source or Source or Source

MSPs put aside dedicated funds for ransomware payments
According to a new report 45 percent of MSPs admit to having a dedicated pool of money set aside for ransomware payments. This is despite increasing pressure from insurers and global governments to avoid paying ransoms to stop fueling criminal enterprises and encourage proactive resilience.
July 22, 2025Source

National security meets next-gen tech at TechCrunch Disrupt 2025's AI Defense panel
TechCrunch Disrupt 2025 is where breakthrough ideas meet the real-world challenges that define the future — and with over 10,000 startup and VC leaders converging, there's no better place to have the hard conversations. One of the most urgent? How artificial intelligence is reshaping national defense, security, and critical infrastructure in real time.
July 22, 2025Source

New AI-driven features set to help security remediation efforts
Security teams today are overwhelmed by fragmented data, inconsistent tagging, and the manual burden of translating findings into fixes.
July 22, 2025Source

Open source's superior security is a matter of eyeballs: Be kind to the brains behind them
The modern art form that redeemed a Windows utility has lessons for all
July 22, 2025Source

Reclaiming Control: How Enterprises Can Fix Broken Security Operations
Once a manageable function, security operations has become a battlefield of complexity.
July 22, 2025Source

Silicon Valley engineer admits theft of US missile tech secrets
Used stolen info to pitch for Chinese tech talent program
July 22, 2025Source

The MFA Illusion: Rethinking Identity for Non-Human Agents
As Agentic AI Takes Over Workflows, Traditional Authentication Practices Fall Short
July 22, 2025Source

ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets
More details emerged on the ToolShell zero-day attacks targeting SharePoint servers, but confusion remains over the vulnerabilities.
July 22, 2025Source

UK government wants ransomware victims to report breaches so it can carry out 'targeted disruptions' against hackers
The U.K. government wants to require victims of ransomware to report if they were breached with the goal of providing law enforcement with information that could help target the cybercriminals responsible.
July 22, 2025Source

UK Sanctions Russian Hackers Tied to Assassination Attempts
The UK government has sanctioned three Russian APTs and 18 individuals for their involvement in cyber operations against Ukraine, NATO allies, and EU.
July 22, 2025Source

UK to ban public sector orgs from paying ransomware gangs
The United Kingdom's government is planning to ban public sector and critical infrastructure organizations from paying ransoms after ransomware attacks.
July 22, 2025Source or Source

Vulnerabilities Expose Helmholz Industrial Routers to Hacking
Eight vulnerabilities, including ones allowing full control over a device, have been discovered and patched in Helmholz REX 100 industrial routers.
July 22, 2025Source

Internet — Security Issues — July 20th, 2025

HPE warns of hardcoded passwords in Aruba access points
Hewlett-Packard Enterprise (HPE) is warning of hardcoded credentials in Aruba Instant On Access Points that allow attackers to bypass normal device authentication and access the web interface.
July 20, 2025Source

Microsoft SharePoint zero-day exploited in RCE attacks, no patch available
Critical zero-day vulnerabilities in Microsoft SharePoint, tracked as CVE-2025-53770 and CVE-2025-53771, have been actively exploited since at least July 18th, with no patch available and at least 85 servers already compromised worldwide.
July 20, 2025Source

SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild -- No Patch Available
Enterprises running SharePoint servers should not wait for a fix for CVE-2025-53770 and should commence threat hunting to search for compromise immediately.
July 20, 2025Source

Singapore military helps battle cyberattack: minister
Units in Singapore's military have been called in to help combat a cyberattack against critical infrastructure, the country's defense minister said Saturday—a hack attempt attributed to an espionage group experts have linked to China.
July 20, 2025Source

UK uncovers novel Microsoft snooping malware, blames and sanctions GRU cyberspies
Fancy Bear can't keep its claws out of Outlook inboxes
July 20, 2025Source

Internet — Security Issues — July 19th, 2025

For privacy and security, think twice before granting AI access to your personal data
AI is being forced on us in pretty much every facet of life, from phones and apps to search engines and even drive-throughs, for some reason. The fact that we're now getting web browsers with baked-in AI assistants and chatbots shows that the way some people are using the internet to seek out and consume information today is very different from even a few years ago.
July 19, 2025Source

Singapore facing 'serious' cyberattack, says minister
Singapore announced it was battling a "serious" cyberattack against its critical infrastructure, attributing the hack to an espionage group that experts have linked to China.
July 19, 2025Source

These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more
In the last 30 years or so, cybersecurity has gone from being a niche specialty within the larger field of computer science, to an industry estimated to be worth more than $170 billion made of a globe-spanning community of hackers. In turn, the industry's growth and high-profile hacks such as the 2015 Sony breach, the 2016 U.S. election hack and leak operations, the Colonial Pipeline ransomware attack, and a seemingly endless list of Chinese government hacks have made cybersecurity and hacking go mainstream.
July 19, 2025Source

Why A VPN Works Better When You Use A Server Closer To Your Location
Virtual private networks (VPNs) are a key way of staying safe online, as they boost privacy and security while you browse the web. They're also convenient tools for a variety of other online activities, as they let you pretend you're browsing from a different location than where you really are. If you're trying to access content that's restricted in your region, then this can be helpful. However, using a VPN server that's far away can cause some connection problems.
July 19, 2025Source

Internet — Security Issues — July 18th, 2025

1.4 Million Affected by Data Breach at Virginia Radiology Practice
Radiology Associates of Richmond has disclosed a data breach impacting protected health and personal information.
July 18, 2025Source

Anne Arundel Dermatology Data Breach Impacts 1.9 Million People
Anne Arundel Dermatology said hackers had access to its systems for three months and may have stolen personal and health information.
July 18, 2025Source

Best VPN for Mac 2025: Trustworthy Mac VPNs tested by experts
Find out what is the best VPN for Mac with our complete guide in which we review and rank the top VPNs for Mac.
July 18, 2025Source

Best VPN services 2025: I've tested the best VPNs to find the fastest, most secure services
After testing dozens of VPNs, I've ranked my favorite VPNs on the market based on security, speed, and safety.
July 18, 2025Source

Botnet Abuses GitHub Repositories to Spread Malware
Hackers Using Amadey Bot to Drops Payloads From Fake GitHub Accounts
July 18, 2025Source

ChatGPT Agent Is Here -- And It's Like Having a Digital Intern on Call
OpenAI has introduced ChatGPT Agent, a powerful new tool that takes the AI beyond simple answers and into full personal assistant territory, capable of handling tasks like booking, planning, and research across the web. This marks a shift toward agentic AI, where tools like ChatGPT don't just respond—they proactively act on your behalf while still giving you full control.
July 18, 2025Source

ChatGPT: Everything you need to know about the AI-powered chatbot
ChatGPT, OpenAI's text-generating AI chatbot, has taken the world by storm since its launch in November 2022. What started as a tool to supercharge productivity through writing essays and code with short text prompts has evolved into a behemoth with 300 million weekly active users.
July 18, 2025Source

China-Backed Hackers Intensify Attacks on Taiwan Chipmakers
3 State-Sponsored Groups Spear-Phish Semiconductor Ecosystem
July 18, 2025Source or Source or Source

Chinese state-sponsored cyberattacks target Taiwan semiconductor industry — security firm says motivation of three separate campaigns 'most likely espionage'
The chip wars intensify.
July 18, 2025Source

CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable
The CitrixBleed 2 vulnerability in NetScaler may expose organizations to compromise even if patches have been applied.
July 18, 2025Source

Cybersecurity insurance market set to be worth $32.19 billion by 2030 as businesses respond to growing cyber threats
The global cybersecurity insurance market is expected to grow to $32.19 billion by 2030, up from $16.54 billion in 2025, according to a MarketsandMarkets report.
July 18, 2025Source

Coro's New CEO Prioritizes Channel-Driven Global Expansion
Joe Sykora Set to Scale Coro's SMB Cybersecurity Platform Globally Via MSP Partners
July 18, 2025Source or Source

Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking
Wiz researchers discovered NVIDIAScape, an Nvidia Container Toolkit flaw that can be exploited for full control of the host machine.
July 18, 2025Source

Crypto ATM Crackdown: British Cops Bust Suspected Operators
As Crypto ATMs Facilitate Scams and Money Laundering, More Governments Take Aim
July 18, 2025Source or Source

Dermatology, Imaging Hacks Expose 3.3 Million Patients' PHI
Incidents Rank Among the Top Five Health Data Breaches in 2025 - So Far
July 18, 2025Source

Email Protection Startup StrongestLayer Emerges From Stealth Mode
AI-native email security firm StrongestLayer has emerged from stealth mode with $5.2 million in seed funding.
July 18, 2025Source

Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication
Dozens of FortiWeb instances have been hacked after PoC targeting a recent critical vulnerability was shared publicly.
July 18, 2025Source

Fraud: A Growth Industry Powered by Gen-AI
With generative AI enabling fraud-as-a-service at scale, legacy defenses are crumbling. The next wave of cybercrime is faster, smarter, and terrifyingly synthetic.
July 18, 2025Source

Golden dMSA Flaw Exposes Firms to Major Credential Theft
Semperis Warns of Flaw in Windows Server 2025 Delegated Managed Service Accounts
July 18, 2025Source or Source

Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet
Google has filed a lawsuit against the Badbox 2.0 botnet operators, after identifying over 10 million infected Android devices.
July 18, 2025Source

Hackers scanning for TeleMessage Signal clone flaw exposing passwords
Researchers are seeing exploitation attempts for the CVE-2025-48927 vulnerability in the TeleMessage SGNL app, which allows retrieving usernames, passwords, and other sensitive data.
July 18, 2025Source

In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass
Noteworthy stories that might have slipped under the radar: powerful US law firm hacked by China, Symantec product flaw, $10,000 Meta AI hack, cryptocurrency thieves attempting to bypass FIDO keys.
July 18, 2025Source

Microsoft announces Extended Security Update programs for Exchange and Skype for Business
Support has ended, or is coming to an end, for a lot of Microsoft products at the moment. Perhaps the most notable or well-publicized is Windows 10, but this is far from being the end of the story.
July 18, 2025Source

NordPass versus Bitwarden: Which password manager is best?
NordPass offers an excellent user experience, while Bitwarden's pricing can't be beat. Here's how to decide between the two.
July 18, 2025Source

Russian alcohol retailer WineLab closes stores after ransomware attack
WineLab, the retail store of the largest alcohol company in Russia, has closed its stores following a cyberattack that is impacting its operations and causing purchase problems to its customers.
July 18, 2025Source

Securing The New Identity: AI Agents In The Enterprise
Steve Toole discusses AI agent challenges and why current controls are not enough
July 18, 2025Source

Security, AI Oversight Are Flashpoints in Draft Defense Bill
House, Senate Versions of 2026 NDAA Offer Competing Approaches to Cyber
July 18, 2025Source or Source or Source

Startup radar: Seattle founders tackle big problems, from childcare to cybersecurity
Our latest startup radar spotlight features a fascinating mix of first-time and repeat founders building off their experience at companies such as Amazon and Box as they pursue ideas in childcare, video metadata, social work, cybersecurity, and local business support.
July 18, 2025Source

Stop The Spread: How To Contain Machine Identity Sprawl
Jeff Bounds discusses how machine identities became today's biggest blind spots
July 18, 2025Source

Texas Drug, Alcohol Testing Firm Hack Affects Nearly 750,000
Cybercrime Group Bian Lian Claimed Responsibility for Attack Last Year
July 18, 2025Source or Source or Source

The best travel VPNs: These tested VPNs are all you need for your next trip abroad
VPNs shield you from spying and can resolve online blocks you may find in other countries. My favorite travel VPNs offer fast speeds, massive server networks, unlimited connections, and more.
July 18, 2025Source

The rise of the machine identity and what it means for cybersecurity [Q&A]
A report earlier this year highlighted the fact that machine identities now vastly outnumber humans.
July 18, 2025Source

Top 10 Malware Q2 2025
By: The Center for Internet Security® (CIS®) Cyber Threat Intelligence (CTI) team
July 18, 2025Source

UK Creative Community, Big Tech Resume AI Copyright Talks
New Working Group Launched After Two Failed Attempts to Resolve AI Training Impasse
July 18, 2025Source or Source

UK ties GRU to stealthy Microsoft 365 credential-stealing malware
The UK National Cyber Security Centre (NCSC) has formally attributed 'Authentic Antics' espionage malware attacks to APT28 (Fancy Bear), a threat actor already linked to Russia's military intelligence service (GRU).
July 18, 2025Source

Internet — Security Issues — July 17th, 2025

11 Best Practices for Developing Secure Web Applications
Follow these 11 best practices to build secure web applications, including input validation, encryption, secure authentication, and regular security updates.
July 17, 2025Source

Application layer comes under threat
A new report from Contrast Security exposes a growing crisis at the application layer as adversaries use AI to easily launch previously sophisticated attacks at scale.
July 17, 2025Source

Armenian Man Extradited to US Over Ryuk Ransomware Attacks
Karen Serobovich Vardanyan pleaded not guilty to charges related to his alleged role in the Ryuk ransomware operation.
July 17, 2025Source

Breach Roundup: Fashion House Louis Vuitton Confirms Breach
Also: CISA Warns of Unpatched Train Brake Vulnerability
July 17, 2025Source or Source or Source or Source

Chinese hackers breached National Guard to steal network configurations
The Chinese state-sponsored hacking group known as Salt Typhoon breached and remained undetected in a U.S. Army National Guard network for nine months in 2024, stealing network configuration files and administrator credentials that could be used to compromise other government networks.
July 17, 2025Source

Cisco Patches Another Critical ISE Vulnerability
Cisco has released patches for multiple vulnerabilities, including a critical flaw in Cisco ISE that leads to remote code execution (RCE).
July 17, 2025Source

Cloaking-as-a-service set to reshape the phishing landscape
Imagine if hackers could give their scam websites a cloak of invisibility, showing one web page to regular people and a harmless page to security scans. Sneaky, huh?
July 17, 2025Source

Cryptohack Roundup: Abacus Market's Suspected Exit Scam
Also: Scammer Gets 12-Year Sentence for Dodging Restitution
July 17, 2025Source

Cybersecurity FundingEmpirical Security Raises $12 Million for AI-Driven Vulnerability Management
Cybersecurity startup Empirical Security has raised $12 million in seed funding for its vulnerability management platform.
July 17, 2025Source

Dermatology, Imaging Hacks Expose 3.3 Million Patients' PHI
Incidents Rank Among the Top Five Health Data Breaches in 2025 - So Far
July 17, 2025Source or Source

Ex-Army Soldier Pleads Guilty To AT&T Cloud Hack, Massive Call Data Breach, And $500K Extortion Threat Targeting High-Level Government Officials
Cyberattackers exploiting system vulnerabilities and extracting sensitive information are becoming more common, especially for telecommunication providers in the United States. Big carriers have fallen prey to these attacks, which have resulted in compromised data and shaken users' trust. This has been the case with AT&T and Verizon, which had a mastermind access their internal systems, got his hands on many users' personal data, and even threatened to leak all the data if his demands were not met.
July 17, 2025Source

Extradited Armenian Tied to Ryuk Ransomware Faces US Trial
FBI Accuses Man of Identifying Exploitable Flaws in Victims' Networks for Group
July 17, 2025Source

Golden dMSA Flaw Exposes Firms to Major Credential Theft
Semperis Warns of Flaw in Windows Server 2025 Delegated Managed Service Accounts
July 17, 2025Source or Source

Hacker steals $27 million in BigONE exchange crypto breach
Cryptocurrency exchange BigONE disclosed that hackers stole various digital assets valued at $27 million in an attack yesterday.
July 17, 2025Source

Hackers are now hiding malware in DNS, and using AI to reassemble it
Exploiting the DNS service to turn malware into a truly invisible threat
July 17, 2025Source

Hackers are trying to steal passwords and sensitive data from users of Signal clone
Hackers are targeting a previously reported bug in the Signal clone app TeleMessage in an effort to steal users' private data, according to security researchers and a U.S. government agency.
July 17, 2025Source

Hackers Can Hide Malicious Code in Gemini's Email Summaries
A recently discovered prompt-injection flaw in Google's Gemini makes it possible for hackers to target unsuspecting users in sophisticated phishing attacks.
July 17, 2025Source

It's Time to Include Geopolitical Risk in Defense Planning
CyXcel's Megha Kumar on Aligning Enterprise Strategy With Geopolitical Realities
July 17, 2025Source or Source or Source or Source or Source

Learn the Next Thing, Not Everything
How Focused Skill Building Solves Real Problems in Cyber Roles
July 17, 2025Source or Source

Legit Security delivers automated security reviews for AppSec and development teams
Legit Security announced enhanced capabilities for significant code change and workflow orchestration within its platform.
July 17, 2025Source

Louis Vuitton Is The Latest Luxury Brand To Suffer A Data Breach
Luxury fashion brand Louis Vuitton is grappling with the fallout from its third cyberattack in as many months, with recent breaches affecting customer data in the UK, South Korea, and Turkey. All of the attacks are so far believed to be linked to a single, pervasive security incident, and have raised alarms across the LVMH Moët Hennessy Louis Vuitton conglomerate, pointing to a potentially coordinated and persistent threat targeting high-end brands
July 17, 2025Source

Matanbuchus 3.0 is a serious malware threat spread via Microsoft Teams
The Matanbuchus malware loader is not new -- it has been around for at least 4 years -- but it has evolved into something incredibly dangerous.
July 17, 2025Source

Max severity Cisco ISE bug allows pre-auth command execution, patch now
A critical vulnerability (CVE-2025-20337) in Cisco's Identity Services Engine (ISE) could be exploited to let an unauthenticated attacker store malicious files, execute arbitrary code, or gain root privileges on vulnerable devices.
July 17, 2025Source

Mobile Forensics Tool Used by Chinese Law Enforcement Dissected
Deployed on mobile devices confiscated by Chinese law enforcement, Massistant can collect user information, files, and location.
July 17, 2025Source

North Korea Floods NPM Registry with Malware
67 Malicious Packages, XORIndex Loader Target JavaScript Code-Sharing Platform
July 17, 2025Source or Source or Source or Source or Source

North Korean hackers blamed for record spike in crypto thefts in 2025
Hackers have stolen more than $2 billion in crypto during the first half of 2025, according to new data from crypto analysis firm Chainalysis, marking the worst year-to-date on record for crypto thefts.
July 17, 2025Source

Oracle Patches 200 Vulnerabilities With July 2025 CPU
Oracle's July 2025 Critical Patch Update contains 309 security patches that address approximately 200 unique CVEs.
July 17, 2025Source

Outdated printer firmware can leave organizations open to attack
In the past the printer has tended to be a pretty dumb device, but as they've gained more features and extra connectivity printers have become a target for attacks and potentially a way of gaining access to networks.
July 17, 2025Source

Overcoming the Myths About 5G and OT Security
5G OT Security Summit Speakers on Delicate Balance Between Innovation, Cyber Risk
July 17, 2025Source or Source

Quantum code breaking? You'd get further with an 8-bit computer, an abacus, and a dog
Computer scientist Peter Gutmann tells The Reg why it's 'bollocks'
July 17, 2025Source

Review: Passwork 7.0, self-hosted password manager for business
Over the years, the number of services we use has exploded, and so has the need to protect our credentials. Back in what I like to call "the age of innocence," we scribbled passwords on paper or reused "password123" across five different accounts. Let's be honest: those days are over. Whether we like it or not, password managers have become essential to good cybersecurity hygiene and one of the first lines of defense against unauthorized access.
July 17, 2025Source

Securing The New Identity: AI Agents In The Enterprise
Steve Toole discusses AI agent challenges and why current controls are not enough
July 17, 2025Source or Source or Source or Source

Socure Workforce Verification detects manipulated or fabricated identities
Socure launched Workforce Verification solution to address the growing threat of employee fraud. Socure's Workforce Verification adapts its enterprise-grade identity verification and fraud prevention specific to hiring workflows, detecting manipulated or fabricated identities before they enter organizations and addressing workforce risk at its source: identity.
July 17, 2025Source

Stellar Cyber enhances identity security with ITDR capabilities
At the upcoming Black Hat USA 2025 in Las Vegas, Stellar Cyber will debut its Identity Threat Detection & Response (ITDR) capabilities, fully embedded into its open, unified, AI-driven SecOps platform.
July 17, 2025Source

Stop The Spread: How To Contain Machine Identity Sprawl
Jeff Bounds discusses how machine identities became today's biggest blind spots
July 17, 2025Source or Source or Source or Source

The FCC wants to ban Chinese tech from the undersea cables that connect the U.S. to the rest of the world — proposed new rules would 'secure cables against foreign adversaries'
FCC chairman Brendan Carr said in a statement that the commission is looking to defend U.S. infrastructure against a variety of threats.
July 17, 2025Source

The future of encryption in a post-quantum world
As quantum computing speeds edge closer to practical use, the 'harvest now, decrypt later' approach is already in motion with adversaries collecting encrypted data today, anticipating they'll be able to crack it tomorrow. But is enough being done to prevent it?
July 17, 2025Source or Source or Source

The Top 7 NordVPN Alternatives
Explore the best NordVPN alternatives for 2025. Compare top VPNs and modern secure access options to find the right solution for your needs.
July 17, 2025Source

Topsy-Turvy Data Breach Reality: Incidents Up, Victims Down
Most Compromises Trace to Financial Services, Healthcare, Professional Services
July 17, 2025Source or Source or Source or Source or Source

Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook Privacy Violations
An $8 billion class action investors' lawsuit against Meta stemming from the 2018 privacy scandal involving the Cambridge Analytica political consulting firm.
July 17, 2025Source

UK NCSC Announces Software Vulnerability Initiative
Agency to Collaborate with External Experts on Vulnerability Research
July 17, 2025Source or Source or Source

VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched
Four CVEs disclosed at the Pwn2Own Berlin 2025 hacking competition have been patched in VMware products.
July 17, 2025Source

Watch on Demand: Cloud & Data Security Summit -- Tackling Exposed Attack Surfaces in the Cloud
Virtual event brings together leading experts, practitioners, and innovators for a full day of insightful discussions and tactical guidance on evolving threats and real-world defense strategies in cloud security.
July 17, 2025Source

Wiz Deal Highlights Google's Multi-Cloud Security Strategy
COO Francis deSouza Explains Google Cloud's Push for Unified Multi-Cloud Security
July 17, 2025Source or Source

Zuckerberg and Meta investors reach settlement in $8B privacy case
Mark Zuckerberg and other current and former Meta executives have settled a lawsuit filed by a group of shareholders, who were seeking $8 billion for the damage the executives caused the company by allowing repeated violations of Facebook users' privacy in relation to the Cambridge Analytica scandal.
July 17, 2025Source

Internet — Security Issues — July 14th, 2025

AI Testing and Evaluation: Learnings from cybersecurity
Generative AI presents a unique challenge and opportunity to reexamine governance practices for the responsible development, deployment, and use of AI. To advance thinking in this space, Microsoft has tapped into the experience and knowledge of experts across domains—from genome editing to cybersecurity—to investigate the role of testing and evaluation as a governance tool.
July 14, 2025Source

APJ Ransomware Demands Drop 50%, Yet 54% Firms Pay Hackers
Experts Say MDR Services and Proactive Defense Can Break the Payment Cycle
July 14, 2025Source or Source or Source or Source or Source

Attackers Now 'Scanning Extensively' for Citrix Bleed 2
Ransomware Group Among Attackers Focused on Exploiting Citrix NetScaler Flaw
July 14, 2025Source or Source or Source or Source or Source or Source

Blumira simplifies compliance reporting for IT teams and MSPs
Blumira launched new features and capabilities designed to help IT teams and managed service providers (MSPs) work smarter, reduce alert fatigue and simplify compliance reporting.
July 14, 2025Source

CitrixBleed 2 Flaw Poses Unacceptable Risk: CISA
CISA considers the recently disclosed CitrixBleed 2 vulnerability an unacceptable risk and has added it to the KEV catalog.
July 14, 2025Source

Elmo's official X account hacked, posts antisemitic tirade
"Elmo's X account was compromised today..."
July 14, 2025Source

Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
With two proof-of-concept (PoC) exploits made public late last week, CVE-2025-25257 -- a critical SQL command injection vulnerability in Fortinet's FortiWeb web application firewall -- is expected to be leveraged by attackers soon.
July 14, 2025Source

France Nabs Russian Basketball Player in Ransomware Probe
US Authorities Say Daniil Kasatkin, 26, Worked as Negotiator for Ransomware Group
July 14, 2025Source or Source or Source or Source or Source

Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls.
July 14, 2025Source or Source

Hackers Inject Malware Into Gravity Forms WordPress Plugin
Two Gravity Forms WordPress plugin versions available on the official download page were injected with malware in a supply chain attack.
July 14, 2025Source

Hackers Just Found a Wild Way to Trick Google Gemini Into Phishing You
Hackers have found a way to use Google Gemini for phishing purposes. A researcher has spotted the flaw and demonstrated how it can be used. Google did respond when asked for a comment, as it tried to reassure users, while also admitting that it found no evidence of Gemini being manipulated in the way a researcher demonstrated.
July 14, 2025Source

How AI Expands SASE's Role in Policy, Operations Efficiency
$359M Funding Round to Support Private POPs, Co-Piloted Policy and Global Reach
July 14, 2025Source or Source or Source or Source

Louis Vuitton Data Breach Hits Customers in Several Countries
Louis Vuitton customers in the UK, South Korea, Turkey and possibly other countries are being notified of a data breach.
July 14, 2025Source

Mapping the minefield: First comprehensive security review of NFTs reveals widespread vulnerabilities
Non-Fungible Tokens (NFTs) have transformed digital ownership by enabling the trade of unique assets through blockchain technology. From art and music to virtual real estate, these tokens have become central to the Web3 economy. Yet, this rapid innovation has outpaced security measures, leaving users vulnerable to sophisticated scams, technical exploits, and project failures.
July 14, 2025Source

New Interlock RAT Variant Distributed via FileFix Attacks
The Interlock ransomware group has partnered with the KongTuke TDS to distribute a new RAT variant via FileFix attacks.
July 14, 2025Source

Nvidia chips become the first GPUs to fall to Rowhammer bit-flip attacks
GPUhammer is the first to flip bits in onboard GPU memory. It likely won't be the last.
July 14, 2025Source

PerfektBlue Bug Chain Exposes Cars to Bluetooth Hacking
Bluetooth Flaws in Car Software Could Enable Hijacking of Infotainment Systems
July 14, 2025Source or Source

Stellar Cyber 6.0.0 enhances automation, workflow intelligence, and user experience
Stellar Cyber released version 6.0.0 of its award-winning open and unified SecOps Platform, introducing new AI-driven capabilities and workflow enhancements designed to propel organizations further along their journey to a human-augmented autonomous SOC.
July 14, 2025Source

Summarizing Emails With Gemini? Beware Prompt Injection Risk
Attackers Can Trick Gemini Into Displaying Deceptive Messages, Researchers Warn
July 14, 2025Source or Source or Source or Source or Source

Top Cyber Struggles of Small, Rural Healthcare Providers
Jennifer Stoll of OCHIN on Overcoming Cyber Obstacles
July 14, 2025Source or Source or Source

Train Brakes Can Be Hacked Over Radio—And the Industry Knew for 20 Years
A vulnerability affecting systems named End-of-Train and Head-of-Train can be exploited by hackers to cause trains to brake.
July 14, 2025Source

UK launches vulnerability research program for external experts
UK's National Cyber Security Centre (NCSC) has announced a new Vulnerability Research Initiative (VRI) that aims to strengthen relations with external cybersecurity experts.
July 14, 2025Source

UK's NCA disputes claim it's nearly three times less efficient than the FBI
Report on serious organized crime fails to account for differences, agency says
July 14, 2025Source

Wing FTP Vulnerability Actively Exploited Globally
Remote Code Execution Flaw Affects More Than 5,000 Servers
July 14, 2025Source or Source

Internet — Security Issues — July 13th, 2025

Google Gemini flaw hijacks email summaries for phishing
Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings that direct users to phishing sites without using attachments or direct links.
July 13, 2025Source

Security vulnerability on U.S. trains that let anyone activate the brakes on the rear car was known for 13 years — operators refused to fix the issue until now
Wireless hardware to seriously disrupt rail transport costs less than $500.
July 13, 2025Source

Time's Almost Up: Microsoft Will Delete Your Passwords on Aug. 1. What to Do ASAP
In a few days, your passwords will no longer work. The tech giant is moving to a login method that CNET experts believe is safer.
July 13, 2025Source

Week in review: Microsoft fixes wormable RCE bug on Windows, check for CitrixBleed 2 exploitation
For July 2025 Patch Tuesday, Microsoft has released patches for 130 vulnerabilities, among them one that's publicly disclosed (CVE-2025-49719) and a wormable RCE bug on Windows and Windows Server (CVE-2025-47981).
July 13, 2025Source

You have a fake North Korean IT worker problem -- here's how to stop it
Thick resumes with thin LinkedIn connections are one sign. Refusing an in-person interview is another
July 13, 2025Source

Internet — Security Issues — July 12th, 2025

Fort Firewall 3.18.8 Test01 released
The initial test release for Fort Firewall 3.18.8 is now available for evaluation, accompanied by a change log that specifies a power resume is required to update the driver's configuration.
July 12, 2025Source

Hackers are exploiting critical RCE flaw in Wing FTP Server
Hackers have started to exploit a critical remote code execution vulnerability in Wing FTP Server just one day after technical details on the flaw became public.
July 12, 2025Source

How To Spot A Fake Account On Facebook Using These Warning Signs
Facebook will always be considered one of the popular social media platforms. The best thing about Facebook is its user interface, which allows anyone to create a new profile without much hassle. However, the smooth account creation process also makes it easier for bad actors to create fake accounts.
July 12, 2025Source

Russian pro basketball player gets the cuffs for allegedly being a member of ransomware gang — lawyer claims client "sucks at computers and is not even able to install an application"
Is he a criminal mastermind or a hapless victim?
July 12, 2025Source

Internet — Security Issues — July 11th, 2025

'123456' password exposed chats for 64 million McDonald's job chatbot applications
Updated title to reflect thats these are not 64 million unique applicants, but rather applications on the job chatbot.
July 11, 2025Source

AI, Sovereign Cloud Propel Cohesity's Post-Veritas Strategy
Cohesity CEO Sanjay Poonen Says Unified Platform Offers Faster, Smarter Recovery
July 11, 2025Source or Source or Source or Source or Source or Source

Artificial IntelligenceEU Unveils AI Code of Practice to Help Businesses Comply With Bloc's Rules
The EU code is voluntary and complements the EU's AI Act, a comprehensive set of regulations that was approved last year and is taking effect in phases.
July 11, 2025Source

Can an 'ethical' spyware maker justify providing its tech to ICE?
Paragon, an Israeli spyware company that claims to operate as an "ethical" surveillance vendor, faced scrutiny when earlier this year Italy was caught using Paragon's tools to spy on the phones of two journalists. Paragon responded by cutting Italy off from its surveillance products, becoming the first spyware company to ever publicly name one of its customers after the misuse of its products.
July 11, 2025Source

Canon Adds Password Protection to 10 cameras for Enhanced Security
Canon listened to their customers, and they are the first camera makers to add password protection to their cameras. Recently, Canon has announced a significant firmware update introducing a password protection feature. This particular improvement enhances the security for photographers and videographers.
July 11, 2025Source

CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
The U.S. Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in Citrix NetScaler ADC and Gateway and is giving federal agencies one day to apply fixes.
July 11, 2025Source

Critical Wing FTP Server Vulnerability Exploited
Wing FTP Server vulnerability CVE-2025-47812 can be exploited for arbitrary command execution with root or system privileges.
July 11, 2025Source

Cyberstarts Launches $300M Liquidity Fund to Help Startups Retain Top Talent
With IPOs taking longer than ever, the venture firm's fund aims to keep startup veterans motivated while staying private.
July 11, 2025Source

Hackers under 18 have extra difficulty cracking the parental control app, Verizon claims
Verizon Family Plus has "tamper-resistant features", but talking to kids is also important.
July 11, 2025Source

Help For Stretching Cyber Resources in Healthcare
Jim Roeder, VP of IT at Lakewood Health System, on Overcoming Cyber Obstacles
July 11, 2025Source or Source or Source or Source or Source or Source or Source or Source or Source

In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware Evolves, DoNot APT Targets Govs
Noteworthy stories that might have slipped under the radar: Microsoft shows attack against AMD processors, SentinelOne details latest ZuRu macOS malware version, Indian APT DoNot targets governments.
July 11, 2025Source

ISMG Editors: Russia's Hacker Arrests or Propaganda Play?
Also: SolarWinds Case Nears Quiet Settlement; Securing Agentic AI Requires Layers
July 11, 2025Source

McDonald's Chatbot Recruitment Platform Exposed 64 Million Job Applications
Two vulnerabilities in an internal API allowed unauthorized access to contacts and chats, exposing the information of 64 million McDonald's applicants.
July 11, 2025Source

Microsoft enables JScript9Legacy scripting engine to improve Windows 11 security
Microsoft has announced that it is moving away from Jscript in Windows 11 24H2 to make scripting more secure, and boost Windows 11 security overall.
July 11, 2025Source

NVIDIA shares guidance to defend GDDR6 GPUs against Rowhammer attacks
NVIDIA is warning users to activate System Level Error-Correcting Code mitigation to protect against Rowhammer attacks on graphical processors with GDDR6 memory.
July 11, 2025Source

Over half of employees fall for mobile phishing scams
A new report shows that security leaders have false confidence in their capabilities and employees when it comes to mobile security. While 96 percent are confident their employees can spot a phishing attempt, 58 percent have reported incidents where employees fell victim to executive impersonation scams via text message.
July 11, 2025Source

Romania and UK Arrest 14 in British Tax Repayment Scam Probe
Britain's Tax Collector HMRC Lost $63 Million to Fraudsters Wielding Taxpayer Data
July 11, 2025Source or Source or Source or Source or Source

Rowhammer Attack Demonstrated Against Nvidia GPU
Researchers demonstrated GPUHammer — a Rowhammer attack against GPUs — by degrading the accuracy of machine learning models.
July 11, 2025Source

Quantum Computers Could Break Encryption: Are We Ready for the Digital Apocalypse?
Imagine a world where the locks protecting your most sensitive information—your financial records, medical history, or even national security secrets—can be effortlessly picked. This is the looming threat posed by quantum computers, machines so powerful they can break the encryption methods we trust today. While quantum computing promises new advancements in fields like artificial intelligence and drug discovery, it also carries a dark side: the potential to render current cryptographic systems obsolete.
July 11, 2025Source

Scammers on Facebook try to ruin Bambu Lab's big 3D printer sale — site has been rife with fake ads for 3D printers
Facebook has been rife with fake ads for 3D printers in an attempt to con you out of money.
July 11, 2025Source

Security company hired a used car salesman to build a website, and it didn't end well
First came the dodgy lawyer, then the explosively angry HR person, leaving a whistleblower techie to save his career
July 11, 2025Source

The Cybersecurity Blind Spot in DevOps Pipelines
DevOps pipelines create massive attack surfaces through leaks and misconfiguration, and trusted tools become attack vectors. Here are the steps on how to prevent them.
July 11, 2025Source

The zero-day that could've compromised every Cursor and Windsurf user
A security researcher from Koi Security stumbled upon a critical zero-day buried deep in the infrastructure powering today's AI coding tools. Had it been exploited, a non-sophisticated attacker could've hijacked over 10 million machines with a single stroke.
July 11, 2025Source

US seeks extradition of Russian basketball player for allegedly aiding ransomware gang
His lawyer says a second-hand computer is to blame
July 11, 2025Source

Virtru Gets $50M at $500M Valuation to Boost Data Governance
Virtru Targets AI-Driven Control of Unstructured Data With Iconiq-Led Funding Round
July 11, 2025Source or Source or Source or Source or Source

Internet — Security Issues — July 10th, 2025

AI malware can now evade Microsoft Defender — open-source LLM outsmarts tool around 8% of the time after three months of training
Researchers plan to show off a model that successfully outsmarts Microsoft's security tooling about 8% of the time at Black Hat 2025.
July 10, 2025Source

AI Rubio Hoax Further Exposes White House Security Gaps
Impersonation Hoax Leverages Top Officials' Known Use of Commercial Messaging App
July 10, 2025Source or Source or Source or Source or Source

Airline Hack Exposes Details Of 5.7M Flyers Including What Some Of Them Ate
Australian airline company, Qantas, has revealed that it suffered a sophisticated cyberattack that affected over 5.7 million of its customers' data. In an update on the incident, the company revealed that of the 5.7 million unique customer records, 4 million contained information related to names, email addresses, and Qantas flyer details.
July 10, 2025Source

AirMDR Raises $15.5 Million for MDR Solution
AI-powered MDR provider AirMDR has raised $15.5 million in funding (seed and infusion investment) to support its R&D efforts.
July 10, 2025Source

Authorities arrest four hackers linked to UK retail hacking spree
U.K. authorities confirmed on Thursday they had arrested four individuals for allegedly carrying out a series of hacks earlier this year targeting the British retail sector, including Marks & Spencer, Harrods, and the Co-op.
July 10, 2025Source

Bitcoin Depot tells 27,000 crypto ATM customers that it leaked their personal information, but waited a year to disclose due to an ongoing investigation
Bitcoin Depot tells 27,000 crypto ATM customers that it leaked their personal information, but waited a year to disclose due to an ongoing investigation
July 10, 2025Source

Booz Allen Invests in Machine Identity Firm Corsha
'Machine identities', often used interchangeably with 'non-human identities' (NHIs), have been increasing rapidly since the start of digital transformation.
July 10, 2025Source

Breach Roundup: I'm Lovin' McDonald's '123456' Password
Also, US Sanctions North Korean IT Worker Scammers and More Paraguay Hacks
July 10, 2025Source or Source or Source

eSIM Hack Allows for Cloning, Spying
Details have been disclosed for an eSIM hacking method that could impact many, but the industry is taking action.
July 10, 2025Source

Fast Food, Weak Passwords: McDonald's AI Hiring Tool Exposed Millions of Applicants' Data
Olivia, the AI chatbot McDonald's uses to streamline job application processes, exposed an estimated 64 million chat logs containing applicants' sensitive data.
July 10, 2025Source

FBI's CJIS demystified: Best practices for passwords, MFA & access control
Imagine your organization has just won a contract to handle sensitive law-enforcement data -- you might be a cloud provider, a software vendor, or an analytics firm. It won't be long before CJIS is top of mind.
July 10, 2025Source

Fighting AI Threats With Behavior-Based Awareness Training
Abnormal AI CEO Evan Reiser on Behavioral Anomalies, Personalized Phishing Training
July 10, 2025Source or Source

Four arrested in connection with M&S, Co-op ransomware attacks
Four individuals suspected of having been involved in the ransomware attacks that hit UK-based retailers earlier this year have been arrested by the UK National Crime Agency.
July 10, 2025Source or Source or Source

How a Former CIO Transformed Treasury IT, Slowly: Part 1
USDT's Ex-CIO Tony Arcadi on Incremental IT, Oversight, Public Sector Modernization
July 10, 2025Source or Source or Source

Ingram Micro Restores Systems Impacted by Ransomware
Ingram Micro has restored operations across all countries and regions after disconnecting systems to contain a ransomware attack.
July 10, 2025Source

Microsoft replaces legacy JavaScript engine to improve security in Windows 11
Legacy JScript transitions to JScript9Legacy with automatic migration in Windows 11 24H2
July 10, 2025Source

Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack
PCA Cyber Security has discovered critical vulnerabilities in the BlueSDK Bluetooth stack that could have allowed remote code execution on car systems.
July 10, 2025Source

NCA arrests four in connection with UK retail ransomware attacks
Crime-fighting agency cagey on details, probes into intrusions at M&S, Harrods, and Co-op continue
July 10, 2025Source

OT security becomes a board priority for enterprises
Operational technology (OT) can often be a cybersecurity weak spot for enterprises, relying as it does on older hardware and operating systems that are hard to update.
July 10, 2025Source

Persistent security gaps found in hybrid identity systems
Organizations are continuing to struggle to identify and address security vulnerabilities in hybrid identity systems such as Active Directory, Entra ID, and Okta.
July 10, 2025Source

Qantas Confirms 5.7 Million Impacted by Data Breach
Hackers compromised names, addresses, email address, phone numbers, and other information pertaining to Qantas customers.
July 10, 2025Source

Ransomware is evolving faster than it's being stopped
The number of active ransomware groups has jumped 45 percent in the past year, according to a new report from GuidePoint Security's GRIT team.
July 10, 2025Source

Ruckus network management solutions riddled with unpatched vulnerabilities
Claroty researcher Noam Moshe has discovered serious vulnerabilities in two Ruckus Networks (formerly Ruckus Wireless) products that may allow attackers to compromise the environments managed by the affected software, Carnegie Mellon University's CERT Coordination Center (CERT/CC) has warned.
July 10, 2025Source

Russia, hotbed of cybercrime, says nyet to ethical hacking bill
Politicians uneasy over potential impact on national security, local reports say
July 10, 2025Source

Russian pro basketball player arrested for alleged role in ransomware attacks
Russian professional basketball player Daniil Kasatkin was arrested in France at the request of the United States for allegedly acting as a negotiator for a ransomware gang.
July 10, 2025Source

Sigma360 AI Investigator Agent reduces manual reviews
Sigma360 launched AI Investigator Agent, an autonomous GenAI agent that transforms how compliance teams handle risk alerts.
July 10, 2025Source

UK authorities arrest four suspected members of hacker group Scattered Spider
The group is reportedly behind the hacking of large UK retailers.
July 10, 2025Source

Vibe Hacking Not Yet Possible
AI Models Mostly Fail in Full Track of Vulnerability Research to Exploit
July 10, 2025Source or Source or Source or Source or Source

What Can Businesses Do About Ethical Dilemmas Posed by AI?
AI-made decisions are in many ways shaping and governing human lives. Companies have a moral, social, and fiduciary duty to responsibly lead its take-up.
July 10, 2025Source

Why Agentic AI in Healthcare Demands Deeper Data Oversight
Attorney Jordan Cohen of Law Firm Akerman LLP on HIPAA Challenges
July 10, 2025Source or Source or Source or Source or Source

Internet — Security Issues — July 7th, 2025

AI is quietly taking over enterprise cybersecurity -- this is what you need to know
Enterprises are building layered cybersecurity defense systems that combine access controls, endpoint monitoring, and data recovery, and artificial intelligence is helping these systems adapt faster and work more effectively.
July 7, 2025Source

Attackers Actively Exploit 'Citrix Bleed 2' Vulnerability
Citrix Issues Patches to Counter Active Attacks Against Two Critical Vulnerabilities
July 7, 2025Source or Source or Source or Source or Source

'Batavia' Windows spyware campaign targets dozens of Russian orgs
A previously undocumented spyware called 'Batavia' has been targeting large industrial enterprises in Russia in a phishing email campaign that uses contract-related lures.
July 7, 2025Source

'Cyber security' behind decision to end defense satellite sharing of hurricane data
Official notice confirms delay to cutoff until the end of July. Not to worry, AI modelling's in the wings
July 7, 2025SourceGenAI Is Making Passkeys More Important Than Ever
Generative AI makes it dangerously easy for attackers to create convincing phishing websites, even with no coding skills—raising the stakes for online security. That's why switching to passkeys, which use biometrics and device-based authentication, is more important than ever to protect against evolving threats.
July 7, 2025Source

Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild
CVE-2025-6554 and three other Chromium vulnerabilities could allow attackers to execute code and corrupt memory remotely.
July 7, 2025Source

Hacker 'turf war' unfolding as Russian DragonForce ransomware gang drama could lead to 'double extortions,' making life even worse for potential victims
Through the fire and flames they saw... a reason to pick a fight with RansomHub.
July 7, 2025Source

Hackers abuse leaked Shellter red team tool to deploy infostealers
Shellter Project, the vendor of a commercial AV/EDR evasion loader for penetration testing, confirmed that hackers used its Shellter Elite product in attacks after a customer leaked a copy of the software.
July 7, 2025Source

Hacks Lead Health Data Breach Trends So Far in 2025
345 Major HIPAA Breaches Reported to Feds So Far This Year, Affecting 29.9 Million
July 7, 2025Source or Source or Source or Source or Source

How Let's Encrypt made the internet safer and HTTPS standard - and free
Over the last ten years, more than 600 million websites have been secured with free certificates from Let's Encrypt. Here's how it all began and why.
July 7, 2025Source

Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks
The notorious Hive successor ceases ransomware operations but pivots to pure data extortion under the new World Leaks brand.
July 7, 2025Source

Infostealers blamed for surge in identity attacks
Advanced phishing kits and info-stealing malware have accounted for a 156 percent jump in cyberattacks targeting user logins.
July 7, 2025Source

Ingram Micro Scrambling to Restore Systems After Ransomware Attack
The IT products and services giant did not say how the intrusion occurred or whether any data was stolen from its systems.
July 7, 2025Source or Source

"No honor among thieves": M&S hacking group starts turf war
A clash between criminal ransomware groups could result in victims being extorted twice.
July 7, 2025Source

Parental controls on children's tech devices are out of touch with child's play
Parenting in the digital age can be stressful and demands a lot from parents.
July 7, 2025Source

Phishing platforms, infostealers blamed as identity attacks soar
Get your creds in order or risk BEC, ransomware attacks, orgs warned
July 7, 2025Source

Ransomware Attack Halts Ingram Micro Operations
SafePay Ransomware Blamed for Prolonged System Outage
July 7, 2025Source or Source or Source or Source or Source

Visa's 24/7 war room takes on global cybercriminals
In the heart of Data Center Alley—a patch of suburban Washington where much of the world's internet traffic flows—Visa operates its global fraud command center.
July 7, 2025Source

Why Active Directory remains a popular target for attackers and what to do about it [Q&A]
Microsoft Active Directory (AD) turned 25 earlier this year -- remarkable longevity in the technology world. It's the identity backbone for more than 80 percent of enterprises, meaning a breach could be catastrophic.
July 7, 2025Source

Why SEC, SolarWinds Agreed to Settle Cyberfraud Lawsuit
Proposed Deal Could End Precedent-Setting SEC Case Over Cybersecurity Misstatements
July 7, 2025Source or Source

Will AI Gut the Cybersecurity Talent Pipeline?
Automation Saves Time But Risks Hollowing Out Critical Early-Career Roles
July 7, 2025Source or Source or Source or Source

Internet — Security Issues — July 5th, 2025

Ingram Micro outage caused by SafePay ransomware attack
An ongoing outage at IT giant Ingram Micro is caused by a SafePay ransomware attack that led to the shutdown of internal systems, BleepingComputer has learned.
July 5, 2025Source

Massive spike in use of .es domains for phishing abuse
¡Cuidado! Time to double-check before entering your Microsoft creds
July 5, 2025Source

Police in Brazil arrest a suspect over $100M banking hack
Police in Brazil arrested a suspect in connection with a cyberattack that diverted more than 540 million Brazilian reais (about $100 million) from the country's banking systems, authorities said Friday.
July 5, 2025Source

Warning: Thanks to AI you must use "phishing-resistant" passkeys to replace vulnerable passwords
GenAI can help attackers create phishing websites that look more legitimate than ever before.
July 5, 2025Source

Internet — Security Issues — July 2nd, 2025

29 North Korean laptop farms busted by U.S. Department of Justice — illicit IT workers across 16 states reportedly obtained employment with more than 100 U.S. companies to help fund regime
IT workers in North Korea are getting jobs at American companies to help fund the country's weapons programs.
July 2, 2025Source

A 13-year-old prodigy helped improve the security of Microsoft products
Cybersecurity is a particularly important avenue for any firm, especially those in tech. It's even more critical for companies like Microsoft, which is not only responsible for managing its security infrastructure, but also the security posture of its clients and over a billion customers. The Redmond firm has a dedicated Microsoft Security Response Team (MSRC) that works with researchers all over the globe to identify security vulnerabilities in products made by the company and then collaborate with relevant teams to patch those issues.
July 2, 2025Source

AI Meets Cybersecurity: Entry Level CIA Hacking Test Taken Using AI Assistance
What if the next generation of cybersecurity experts didn't just rely on their own skills but also leaned on artificial intelligence to crack complex challenges? Imagine a scenario where an aspiring CIA analyst uses AI to unravel hidden clues embedded in a single image—decoding GPS coordinates, uncovering usernames, and even extracting passwords. This isn't the plot of a spy thriller; it's a real-world exercise in using AI to solve entry-level open source intelligence (OSINT) puzzles.
July 2, 2025Source

Data breach reveals Catwatchful 'stalkerware' is spying on thousands of phones
A security vulnerability in a stealthy Android spyware operation called Catwatchful has exposed thousands of its customers, including its administrator.
July 2, 2025Source

Chinese Hackers Exploited Ivanti Flaw in France
Hackers Targeted French Government Entities, ANSSI Said
July 2, 2025Source

CISA warns the Signal clone used by natsec staffers is being attacked, so patch now
Two flaws in TeleMessage are 'frequent attack vectors for malicious cyber actors'
July 2, 2025Source or Source

Cisco warns that Unified CM has hardcoded root SSH credentials
Cisco has removed a backdoor account from its Unified Communications Manager (Unified CM), which would have allowed remote attackers to log in to unpatched devices with root privileges.
July 2, 2025Source

Citrix warns of login issues after NetScaler auth bypass patch
Citrix warns that patching recently disclosed vulnerabilities that can be exploited to bypass authentication and launch denial-of-service attacks may also break login pages on NetScaler ADC and Gateway appliances.
July 2, 2025Source

Court Approves 23andMe Sale to TTAM Research Institute
23andMe's Ex-CEO Anne Wojcicki Made Privacy Pledge With Successful Bid of $305M
July 2, 2025Source or Source or Source or Source

Critical Agentic AI Protocol Is Ripe for Security Attacks
The Model Context Protocol (MCP), introduced by Anthropic in November 2024 to facilitate communication between AI agents and external tools, is now under scrutiny due to significant security vulnerabilities.
July 2, 2025Source

Cyberattack Targets International Criminal Court
The International Criminal Court (ICC) has detected and contained a sophisticated and targeted cyberattack.
July 2, 2025Source

Cybersecurity company CrowdStrike moving its 'strategic technology hub' into new Redmond space
CrowdStrike is moving into new office space in Redmond, Wash., the cybersecurity software company confirmed on Wednesday.
July 2, 2025Source

Cybersecurity M&A Roundup: 41 Deals Announced in June 2025
Forty-one cybersecurity merger and acquisition (Mamp;&A) deals were announced in June 2025.
July 2, 2025Source

DOJ investigates ex-ransomware negotiator over extortion kickbacks
An ex-ransomware negotiator is under criminal investigation by the Department of Justice for allegedly working with ransomware gangs to profit from extortion payment deals.
July 2, 2025Source

Dozens of fake wallet add-ons flood Firefox store to drain crypto
More than 40 fake extensions in Firefox's official add-ons store are impersonating popular cryptocurrency wallets from trusted providers to steal wallet credentials and sensitive data.
July 2, 2025Source

FBI Warns Of Insidious Health Insurance Scam Making The Rounds
You should always be suspicious of unsolicited communications via email, text, and phone calls, especially if you are being asked to provide any kind of personal information. That falls under the category of Safe Computing 101. Lest anyone need reminding, however, the Federal Bureau of Investigation (FBI) is reminding the public at large to be diligent in light of a healthcare scam campaign.
July 2, 2025Source

Feds Identify $14.6 Billion in Healthcare Fraud in Takedown
New Multi-Agency 'Fusion Center' Using AI, Other Tech Will Improve Investigations
July 2, 2025Source or Source or Source or Source

Feds Notify 103,000 Medicare Beneficiaries of Scam, Breach
Agency: Fraudsters Used Valid Beneficiary Info to Create Fake Medicare.gov Accounts
July 2, 2025Source

Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover
A vulnerability in the Forminator WordPress plugin allows attackers to delete arbitrary files and take over impacted websites.
July 2, 2025Source or Source

Google launches new AI security initiatives
Ahead of the summer's round of cybersecurity conferences Google is announcing a range of new initiatives aimed at bolstering cyber defenses with the use of AI.
July 2, 2025Source

Iran's 'Robert' Hack Targets Trump - and Tests US Cyber Gaps
Iranian-Linked Hackers Claim to Have 100GB of Emails From Trump's Inner Circle
July 2, 2025Source or Source or Source or Source or Source

Kelly Benefits Data Breach Impacts 550,000 People
As Kelly Benefits's investigation into a recent data breach progressed, the number of impacted individuals continued to grow.
July 2, 2025Source

Microsoft acknowledges Intune issue that wipes out security customizations
Microsoft has published a warning about a problem in its Intune management software that stops customizations from being saved. Stemming from an issue in the security baseline policy update flow, an update can wipe out settings that have been put in place by administrators.
July 2, 2025Source

Microsoft's youngest security researcher started collaboration with the company at just 13 — high school junior filed 20 vulnerability reports last summer, named MSRC Most Valuable Researcher twice
Dylan was the reason Microsoft updated its Bug Bounty Program terms to allow 13-year-olds to participate
July 2, 2025Source

Northwell deploys new safety and security tech from Motorola
The aim is to build an interconnected ecosystem of tools -- AI-enabled video and analytics, two-way radio comms, mass notification technologies -- to keep staff and patients safe at New York's largest health system.
July 2, 2025Source

Qantas data breach sees up to 6M customer records at risk
A Qantas data breach resulting from a cybersecurity attack has put up to 6M customer records at risk of exposure, with names, email addresses, phone numbers, and dates of birth confirmed to be included. The hack was of a contact center database operated by one of the airline's partners
July 2, 2025Source or Source or Source or Source or Source

Scattered Spider Suspected in Qantas Data Breach
Adolescent Hacking Group Switches Focus to New Sector
July 2, 2025Source or Source or Source

Spain arrests hackers who targeted politicians and journalists
The Spanish police have arrested two individuals in the province of Las Palmas for their alleged involvement in cybercriminal activity, including data theft from the country's government.
July 2, 2025Source

The EU's border security software is reportedly full of holes
A new Bloomberg report found SIS II to be vulnerable to attacks.
July 2, 2025Source

US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a 'Smear Campaign'
The United States has warned of continued Iranian cyberattacks following American strikes on Iran's nuclear facilities.
July 2, 2025Source

Vulnerable Protection Relays Put Power Grid at Risk
Google's Mandiant Warns About Remote Attacks Disrupting Grid Stability
July 2, 2025Source or Source or Source or Source or Source

Your Security Stack Is Only as Secure as Your Sales Team
Cybersecurity Awareness Programs Need Focus on Human Risk and Changing Behaviors
July 2, 2025Source or Source or Source

Internet — Security Issues — June 30th, 2025

Ahold Delhaize Data Breach Impacts 2.2 Million People
The ransomware attack against grocery giant Ahold Delhaize has resulted in the personal information of millions getting stolen.
June 30, 2025Source

AI Beats Top Humans Hackers: How Machines Are Dominating the HackerOne Leaderboard
What if the world's best hacker wasn't human? In a new twist, an AI bot has outperformed top ethical hackers on HackerOne, a platform renowned for its competitive vulnerability detection. This isn't just a technological milestone—it's a paradigm shift in how we approach cybersecurity. Imagine a system that scans millions of lines of code, identifies vulnerabilities, and offers solutions faster than any human could.
June 30, 2025Source

Airlines are directly in hackers' crosshairs, FBI warns
Air travel is the latest industry targeted by Scattered Spider, a teen cybercriminal collective.
June 30, 2025Source

Airoha Chip Vulnerabilities Expose Headphones to Takeover
Vulnerabilities in Airoha Bluetooth SoCs expose headphone and earbud products from multiple vendors to takeover attacks.
June 30, 2025Source

Alleged Verizon data breach sees 61M customer records offered for sale
An alleged Verizon data breach has seen hackers offering for sale a database of 61 million customer records, which includes personal information useful for both phishing attempts and identity theft.
June 30, 2025Source

Another Billing Software Vendor Hacked by Ransomware
Horizon Healthcare RCM Hints at Paying Ransom in Data Theft Incident
June 30, 2025Source or Source or Source or Source or Source

Avira Antivirus Review 2025: Effective Software, But Privacy Protection Is Lacking
Avira is one of the most well-known freemium antivirus tools on the market. I did hands-on tests to see how it works -- and where it fails.
June 30, 2025Source

Blockchain in Healthcare: Enhancing Data Security and Interoperability
Explore how blockchain is reshaping healthcare's digital infrastructure. Learn about its challenges, mechanics, applications, and potential future impact.
June 30, 2025Source

Brave New Kernel: Microsoft Previews Safer Windows Ecosystem
Windows 11 Revamp Means No Kernel Access Required for Third-Party Security Tools
June 30, 2025Source or Source or Source or Source

Canada Gives Hikvision the Boot on National Security Grounds
Canada has ordered Hikvision to cease all operations in the country and prohibited the purchase and use of Hikvision products within government entities.
June 30, 2025Source

Casie Antalis Appointed to Lead CISA Program
Casie Antalis is the new program director of the Joint Cyber Coordination Group at the Cybersecurity and Infrastructure Security Agency.
June 30, 2025Source

Cato Networks Raises $359 Million to Expand SASE Business
Founded in 2015, the Tel Aviv based company has now raised more than $1 billion and claims more than 3,500 customers.
June 30, 2025Source or Source

Cisco Secure Endpoint updates help security teams see and fix misconfigurations
Cisco has announced new enhancements for its Secure Endpoint solution for businesses which focus on two big cybersecurity challenges: misconfigurations and advanced threat detection.
June 30, 2025Source

CitrixBleed 2 might be actively exploited (CVE-2025-5777)
While Citrix has observed some instances where CVE-2025-6543 has been exploited on vulnerable NetScaler networking appliances, the company still says that they don't have evidence of exploitation for CVE-2025-5349 or CVE-2025-5777, both of which have been patched earlier this month.
June 30, 2025Source

Cyberattacks shake voters' trust in elections, regardless of party
Nearly half of Americans, both Democrats and Republicans, question whether elections are conducted fairly. Some voters accept election results only when their side wins. The problem isn't just political polarization—it's a creeping erosion of trust in the machinery of democracy itself.
June 30, 2025Source

DOJ: Cartel Hacked Phones, Cameras to Track FBI Informants
New Report Says Mexican Cartel Hired Hacker to Identify, Track and Kill FBI Sources
June 30, 2025Source or Source or Source

FBI: Cybercriminals steal health data posing as fraud investigators
The Federal Bureau of Investigation (FBI) has warned Americans of cybercriminals impersonating health fraud investigators to steal their sensitive information.
June 30, 2025Source

Forget about Fake Cell Towers and Spying Threats: Android 16 Introduces New Security Features
Mobile security enhancements have become an essential part of OS developments. To make mobile security better, Google has announced that Android 16 will include a feature that detects and warns users about fake or insecure cell towers and an often-overlooked threat that can be used to spy on individuals or steal sensitive data.
June 30, 2025Source

Fraudsters behind €460 million crypto scam arrested in Spain
Spanish authorities arrested five members of a criminal network responsible for laundering €460 million stolen through global cryptocurrency investment fraud schemes.
June 30, 2025Source

Hacker Conversations: Rachel Tobac and the Art of Social Engineering
Rachel Tobac is a cyber social engineer. She is skilled at persuading people to do what she wants, rather than what they know they ought to do.
June 30, 2025Source

Hardware security tech can hide and reveal encryption keys on demand using 3D flash memory
Seoul National University College of Engineering announced that a research team has developed a new hardware security technology based on commercially available 3D NAND flash memory (V-NAND flash memory).
June 30, 2025Source

Hawaiian Airlines Hacked as Aviation Sector Warned of Scattered Spider Attacks
Scattered Spider is targeting airlines and the recent WestJet hack is believed to be the work of the notorious cybercrime group.
June 30, 2025Source

Microsoft warns of Windows update delays due to wrong timestamp
Microsoft warns of Windows update delays due to wrong timestamp
June 30, 2025Source

OnePlus Under Fire in the US -- Lawmakers Demand Security Probe
OnePlus is under fire in the US, as two lawmakers have demanded a security probe of the company. They want the Commerce Department to investigate OnePlus over security concerns.
June 30, 2025Source

Patrick Ware Named Executive Director of US Cyber Command
The NSA's Patrick Ware has taken up the role of Cybercrom executive director after the departure of Morgan Adamski.
June 30, 2025Source

Rethinking IT Risk Assessments for OT Environments
https://www.healthcareinfosecurity.com/rethinking-risk-assessments-for-ot-environments-a-28865
June 30, 2025Source or Source or Source or Source

RIFT: New open-source tool from Microsoft helps analyze Rust malware
Microsoft's Threat Intelligence Center has released a new tool called RIFT to help malware analysts identify malicious code hidden in Rust binaries. While Rust is becoming more popular for its speed and memory safety, those same qualities make malware written in Rust harder to analyze. RIFT is designed to cut through that complexity and make the job easier.
June 30, 2025Source

Scattered Spider crime spree takes flight as focus turns to aviation sector
Time ticking for defenders as social engineering pros weave wider web
June 30, 2025Source

Switzerland says government data stolen in ransomware attack
The government in Switzerland is informing that sensitive information from various federal offices has been impacted by a ransomware attack at the third-party organization Radix.
June 30, 2025Source

Threat Modeling for Developers: Identifying Security Risks in Software Projects
Threat modeling is a proactive security process that helps developers identify and mitigate potential threats early in the software development lifecycle.
June 30, 2025Source

US Announces Crackdown on North Koreans Posing as IT Workers
DOJ Indictments, Enforcement Actions Follow Nationwide Search for 'Laptop Farms'
June 30, 2025Source or Source or Source or Source or Source

Your Brother printer might have a critical security flaw - how to check and what to do next
If your Brother printer is impacted, it's crucial to change the default admin password immediately. Here's how to do it.
June 30, 2025Source or Source

Zero-Trust AI: Applying Cybersecurity Best Practices to AI Model Development
Powerful AI models, such as ChatGPT and Google's Gemini, are transforming technology, but they also pose significant security challenges.
June 30, 2025Source

Internet — Security Issues — June 29th, 2025

Best Internet Providers in Greenville, South Carolina
CNET recommends AT&T Fiber as the best overall internet provider in Greenville thanks to its fast, symmetrical speeds, solid pricing and high customer satisfaction. Plans start at $55 a month and go up to $245 for the speedy 5-gig plan. If fiber isn't available at your address, Spectrum is a strong backup, which also offers the cheapest plan in the area.
June 29, 2025Source

Week in review: Backdoor found in SOHO devices running Linux, high-risk WinRAR RCE flaw patched
SecurityScorecard's STRIKE team has uncovered a network of compromised small office and home office (SOHO) devices they're calling LapDogs.
June 29, 2025Source

Internet — Security Issues — June 28th, 2025

Ex-NATO hacker: 'In the cyber world, there's no such thing as a ceasefire'
Watch out for supply chain hacks especially
June 28, 2025Source

FBI, cybersecurity firms say a prolific hacking crew is now targeting airlines and the transportation sector
The FBI and cybersecurity firms are warning that the prolific hacking group known as Scattered Spider is now targeting airlines and the transportation sector.
June 28, 2025Source

What Does It Mean If Your Email Was Found On The Dark Web?
If you use antivirus software, a VPN, or subscribe to a service like Experian IdentityWorks, you may have received an alert saying your email address was found on the dark web. What this usually means is that your email was included in a data breach, where cybercriminals have gained access to email lists and sometimes other data like passwords or Social Security numbers. This data often ends up on underground marketplaces, where it's traded or sold to cybercriminals looking to carry out phishing attacks, identity theft, account takeovers, and more.
June 28, 2025Source

Internet — Security Issues — June 25th, 2025

AI Agents Are Creating Insider Security Threat Blind Spots, Research Finds
Only 30% of US businesses are actively mapping which AI agents have access to critical systems, creating a security blind spot.
June 25, 2025Source

AI or Data Governance? Gartner Says You Need Both
Gartner Says Leaders Should Balance AI Innovation With Strong Data Governance
June 25, 2025Source< or Source or Source or Source or Source

Best VPN for Georgia: Pornhub workarounds
How to keep your browsing private and still access the website once it's blocked in your state.
June 25, 2025Source

Blocking exports and raising tariffs is a bad defense against industrial cyber espionage, study shows
The United States is trying to decouple its economy from rivals like China. Efforts toward this include policymakers raising tariffs on Chinese goods, blocking exports of advanced technology and offering subsidies to boost American manufacturing. The goal is to reduce reliance on China for critical products in hopes that this will also protect U.S. intellectual property from theft.
June 25, 2025Source

BreachForums hacking forum operators reportedly arrested in France
The French police have reportedly arrested five operators of the BreachForum cybercrime forum, a website used by cybercriminals to leak and sell stolen data that exposed the sensitive information of millions.
June 25, 2025Source

Can Good UX Protect Older Users From Digital Scams?
As online scams become more sophisticated, Carrie Webster explores whether good UX can serve as a frontline defense, particularly for non-tech-savvy older users navigating today's digital world.
June 25, 2025Source

Chrome 138, Firefox 140 Patch Multiple Vulnerabilities
Chrome 138 and Firefox 140 are rolling out with fixes for two dozen vulnerabilities, including high-severity memory safety issues.
June 25, 2025Source

Clearspeed Raises $60M to Scale AI Voice-Based Risk Platform
Voice Analytics Firm to Expand Footprint in Finance, Defense and Insurance
June 25, 2025Source or Source or Source or Source or Source

Code Execution Vulnerability Patched in GitHub Enterprise Server
A high-severity vulnerability in GitHub Enterprise Server could have allowed remote attackers to execute arbitrary code.
June 25, 2025Source

FDA Urges Medical Product Makers to Beef Up OT Security
Agency: Rising Threats Put Manufacturing Supply Chains, Patient Safety at Risk
June 25, 2025Source or Source or Source or Source or Source

Flaw in Notepad++ installer could grant attackers SYSTEM access (CVE-2025-49144)
A high-severity vulnerability (CVE-2025-49144) in the Notepad++ installer could be exploited by unprivileged users to gain SYSTEM-level privileges through insecure executable search paths.
June 25, 2025Source

Fortanix PQC Central boosts post-quantum readiness
Fortanix announced PQC Central, a new feature in the Fortanix Key Insight that reframes how enterprises approach the post-quantum cryptography (PQC) challenge.
June 25, 2025Source

French Police Reportedly Bust Five BreachForums Administrators
Notorious Site Facilitated Buying and Selling of Breached Databases, Hacking Tools
June 25, 2025Source or Source or Source or Source or Source

Hackers Abuse ConnectWise to Hide Malware
G Data has observed a surge in malware infections originating from ConnectWise applications with modified certificate tables.
June 25, 2025Source

Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
A sophisticated malicious campaign that researchers call OneClik has been leveraging Microsoft's ClickOnce software deployment tool and custom Golang backdoors to compromise organizations within the energy, oil, and gas sectors.
June 25, 2025Source

Hackers show how they can fully control your 2020 Nissan Leaf remotely
Attackers can also record in-car conversations and track you using its GPS
June 25, 2025Source

Hackers turn ScreenConnect into malware using Authenticode stuffing
Threat actors are abusing the ConnectWise ScreenConnect installer to build signed remote access malware by modifying hidden settings within the client's Authenticode signature.
June 25, 2025Source

Hackers Using Malicious SonicWall VPN for Credential Theft
Trojanized NetExtender Installer Exfiltrates Data to Hardcoded IP Address
June 25, 2025Source or Source< or Source or Source or Source

Heart disease landscape changes: Fewer heart attacks, but more deaths from failure and arrhythmias
While heart disease has been the leading cause of death in the U.S. for over a century, the past 50 years have seen a substantial decrease (66%) in overall age-adjusted heart disease death rates, including a nearly 90% drop in heart attack deaths, according to new research published in the Journal of the American Heart Association.
June 25, 2025Source

Mainline Health, Select Medical Each Disclose Data Breaches Impacting 100,000 People
Mainline Health and Select Medical Holdings have suffered data breaches that affect more than 100,000 individuals.
June 25, 2025Source

Mastercard adds secure on-chain access to crypto
Mastercard and Chainlink are teaming up to power Swapper Finance, a new way to buy crypto directly from decentralized exchanges (DEXs) using any Mastercard.
June 25, 2025Source

Mitiga Helios AI accelerates alert triage and incident response for SecOps teams
Mitiga launched Helios AI, an AI powered SOC assistant that supercharges SecOps teams with automated triage, augmented investigation, and accelerated threat remediation across complex multi-cloud environments.
June 25, 2025Source

Multiple Vulnerabilities in Cisco ISE and ISE-PIC Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Cisco ISE and ISE-PIC that could allow for remote code execution. Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure access to network resources. Successful exploitation of these vulnerabilities could allow the attacker to obtain root privileges on an affected device.
June 25, 2025Source

New 'CitrixBleed 2' NetScaler flaw let hackers hijack sessions
A recent vulnerability in Citrix NetScaler ADC and Gateway is dubbed "CitrixBleed 2," after its similarity to an older exploited flaw that allowed unauthenticated attackers to hijack authentication session cookies from vulnerable devices.
June 25, 2025Source

New Vulnerabilities Expose Millions of Brother Printers to Hacking
Rapid7 has found several serious vulnerabilities affecting over 700 printer models from Brother and other vendors.
June 25, 2025Source

New wave of 'fake interviews' use 35 npm packages to spread malware
A new wave of North Korea's 'Contagious Interview' campaign is targeting job seekers with malicious npm packages that infect dev's devices with infostealers and backdoors.
June 25, 2025Source

nOAuth Lives on in Cloud App Logins Using Entra ID
Hackers Can Use Unverified Email to Log onto SaaS Apps With Entra ID
June 25, 2025Source or Source or Source or Source or Source

OpenRouter raises $40 million to simplify AI model overload
OpenRouter, a startup helping software developers manage the growing number of AI models, has raised $40 million in venture capital. The company wants to make it easier for developers to choose and use the right AI model for their applications, without having to build their own complex systems.
June 25, 2025Source

Rubrik to Purchase Predibase to Power Generative AI Growth
Predibase Acquisition Adds AI Talent, Cost-Optimization and Fine-Tuning Model Tech
June 25, 2025Source or Source or Source or Source or Source

Russia frees REvil hackers after sentencing
The ransomware group members evaded a five-year prison stint due to time served.
June 25, 2025Source

Russian APT Hits Ukrainian Government With New Malware via Signal
Russia-linked APT28 deployed new malware against Ukrainian government targets through malicious documents sent via Signal chats.
June 25, 2025Source

SonicWall Warns of Trojanized NetExtender Stealing User Information
SonicWall says a modified version of the legitimate NetExtender application contains information-stealing code.
June 25, 2025Source

The Essential 8 Microsoft 365 Cybersecurity Framework Explained
What if a single framework could significantly reduce your organization's risk of cyberattacks while improving resilience against ever-evolving threats? The Essential 8, a cybersecurity framework developed by the Australian Cyber Security Center (ACSC), offers just that—a structured, practical approach to safeguarding your systems. When paired with the powerful tools within Microsoft 365, this framework transforms from a set of guidelines into a dynamic, actionable strategy.
June 25, 2025Source

Thousands of SaaS Apps Could Still Be Susceptible to nOAuth
New research suggests more than 10,000 SaaS apps could remain vulnerable to a nOAuth variant despite the basic issue being disclosed in June 2023.
June 25, 2025Source

Tines allows teams to choose the right AI level for any workflow
Tines announced autonomous AI capabilities within its workflow automation platform via the launch of agents. Agents mark a significant evolution in Tines' platform, enabling customers to automate workflows with maximum control and flexibility, whether with deterministic logic, human-in-the-loop copilots, or full AI autonomy.
June 25, 2025Source

Vibe Coding - a Great Tool if You Know How to Use It
AI Assistants Accelerate Coding But Can Create Huge Risks for the Inexperienced
June 25, 2025Source or Source or Source or Source or Source

Why Sincerity Is a Strategic Asset in Cybersecurity
Strong security doesn't just rely on tools—it starts with trust, clarity, and sincerity from the top down.
June 25, 2025Source

Windows 10: How to get security updates for free until 2026
Users who want to stick with Windows 10 beyond its planned end-of-support date but still receive security updates, can enroll into the Windows 10 Extended Security Updates (ESU) program, Microsoft has confirmed on Tuesday.
June 25, 2025Source

WinRAR exploit enables attackers to run malicious code on your PC — critical vulnerability patched in latest beta update
User interaction is required, but impact could be severe
June 25, 2025Source

XBOW's AI reached the top ranks on HackerOne, and now it has $75M to scale up
XBOW has raised $75 million in Series B funding to grow its AI-driven offensive security platform. The round was led by Altimeter's Apoorv Agrawal, with participation from existing investors Sequoia Capital and Nat Friedman. This brings XBOW's total funding to $117 million.
June 25, 2025Source

Internet — Security Issues — June 23rd, 2025

7 security risks you need to know when using AI for work
AI can be a powerful tool for productivity, but risks come with its rewards.
June 23, 2025Source

743,000 Impacted by McLaren Health Care Data Breach
The personal information of 743,000 individuals was compromised in a 2024 ransomware attack on McLaren Health Care.
June 23, 2025Source

A Journalist Security Checklist: Preparing Devices for Travel Through a US Border
This post was originally published by the Freedom of the Press Foundation (FPF). This checklist complements the recent training module for journalism students in border communities that EFF and FPF developed in partnership with the University of Texas at El Paso Multimedia Journalism Program and Borderzine. We are cross-posting it under FPF's Creative Commons Attribution 4.0 International license. It has been slightly edited for style and consistency.
June 23, 2025Source

Aflac says cyberattack may have exposed customer data: What we know so far
The company warned that cybercriminals are targeting the insurance industry as a whole.
June 23, 2025Source

APT28 hackers use Signal chats to launch new malware attacks on Ukraine
The Russian state-sponsored threat group APT28 is using Signal chats to target government targets in Ukraine with two previously undocumented malware families named BeardShell and SlimAgent.
June 23, 2025Source

Asana Fixes Security Flaw in AI Data Integration Tool
MCP Server Paused for Days After Bug Risked Data Leakage Between Users
June 23, 2025Source or Source or Source or Source or Source or Source

AT&T Settles for $177 Million Payout Over Years of Data Breaches
AT&T has agreed to a $177 million settlement following two major data breaches in 2024, impacting over 70 million current and former customers. While the carrier denies wrongdoing, affected users could receive payouts by early 2026, with those able to prove specific losses eligible for up to $5,000.
June 23, 2025Source

Canadian telecom hacked by suspected China state group
Maximum-security Cisco vulnerability was patched Oct. 2023 and exploited Feb. 2025.
June 23, 2025Source

China's Salt Typhoon Hackers Target Canadian Telecom Firms
Canada's Centre for Cyber Security and the FBI warn of Chinese hackers targeting telecommunications and other companies in Canada.
June 23, 2025Source

Chinese Hackers Turn Unpatched Routers Into ORB Spy Network
ShortLeash Backdoor Hijacks SOHO Linux Devices
June 23, 2025Source or Source or Source or Source or Source

CNCF Graduates in‑toto, Bolstering Software Supply Chain Security
On April 23, 2025, the Cloud Native Computing Foundation (CNCF) announced the graduation of in‑toto, a framework designed to enforce supply chain integrity by ensuring that every step in the software development lifecycle, such as building, signing, and deployment, is properly authorized and verifiable.
June 23, 2025Source

CoinMarketCap, Cointelegraph compromised to serve pop-ups to drain crypto wallets
The CoinMarketCap and CoinTelegraph websites have been compromised over the weekend to serve clever phishing pop-ups to visitors, asking them to verify/connect their crypto wallets.
June 23, 2025Source

Critical Authentication Bypass Flaw Patched in Teleport
A critical-severity vulnerability in Teleport could allow remote attackers to bypass SSH authentication and access managed systems.
June 23, 2025Source

Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777)
The vulnerabilities have been privately disclosed and there is no indication that they are under active exploitation. Nevertheless, the company has urged to install the relevant updated versions as soon as possible and terminate active sessions.
June 23, 2025Source

Cybercriminals use fake GitHub Minecraft mods to target young players
Russian-speaking operators are thought to be behind the Stargazers Ghost Network
June 23, 2025Source

Cybersecurity Innovations in Software Development: How Developers Are Tackling Security Threats
In this blog post, I will discuss the advanced cybersecurity innovations in software development and how software developers are dealing with security problems.
June 23, 2025Source

DHS warns critical sectors about pro-Iranian cyberattacks
Homeland Security is calling for vigilance against state-sponsored CyberAv3ngers and other pro-Iranian hacktivists, who have a history of attacking operational control and IoT systems to steal access and control devices.
June 23, 2025Source

Experts count staggering costs incurred by UK retail amid cyberattack hell
Cyber Monitoring Centre issues first severity assessment since February launch
June 23, 2025Source

Fort Firewall 3.18.3 released
Fort Firewall 3.18.3 has been released with a range of enhancements, featuring timer menu actions, options for copying paths and opening folders, updates to connections and ConfZoneManager, an upgrade to SQLite 3.50.1, and the implementation of GPG signature signing for installers.
June 23, 2025Source

House staffers can't have WhatsApp on their devices
The chief administrative officer claims the messaging app is 'high-risk.'
June 23, 2025Source

How US Cyber Ops May Have Assisted the Midnight Hammer Strike
Analysts Say CYBERCOM Likely Played a Major Role in Strike on Iranian Nuclear Sites
June 23, 2025Source or Source or Source or Source

Iran cyberattacks against US biz more likely following air strikes
Plus 'low-level' hacktivist attempts
June 23, 2025Source

McLaren Health Care says data breach impacts 743,000 patients
McLaren Health Care is warning 743,000 patients that the health system suffered a data breach caused by a July 2024 attack by the INC ransomware gang.
June 23, 2025Source or Source or Source or Source or Source or Source

Microsoft Is Eliminating Passwords in August: Here's What You Need to Do to Prepare
Microsoft Authenticator has already stopped autofilling passwords, but the biggest change comes next month.
June 23, 2025Source

Microsoft will start removing legacy drivers from Windows Update
Microsoft will start removing legacy drivers from Windows Update to improve driver quality for Windows users but, most importantly, to increase security, the company has announced.
June 23, 2025Source

New AI Jailbreak Bypasses Guardrails With Ease
New "Echo Chamber" attack bypasses advanced LLM safeguards by subtly manipulating conversational context, proving highly effective across leading AI models.
June 23, 2025Source

New Journalism Curriculum Module Teaches Digital Security for Border Journalists
Module Developed by EFF, Freedom of the Press Foundation, and University of Texas, El Paso Guides Students Through Threat Modeling and Preparation
June 23, 2025Source

North Korean Hackers Take Over Victims' Systems Using Zoom Meeting
North Korean hackers employ social engineering to trick Zoom Meeting participants into executing system-takeover commands.
June 23, 2025Source

Okta Cross App Access secures AI agents in the enterprise
Okta announced Cross App Access, a new protocol to help secure AI agents. As an extension of OAuth, it brings visibility and control to both agent-driven and app-to-app interactions, allowing IT teams to decide what apps are connecting and what information AI agents can access.
June 23, 2025Source

Revil ransomware members released after time served on carding charges
Four REvil ransomware members arrested in January 2022 were released by Russia on time served after they pleaded guilty to carding and malware distribution charges.
June 23, 2025Source

Stealthy backdoor found hiding in SOHO devices running Linux
SecurityScorecard's STRIKE team has uncovered a network of compromised small office and home office (SOHO) devices they're calling LapDogs. The threat is part of a broader shift in how China-Nexus threat actors are using Operational Relay Box (ORB) networks to hide their operations.
June 23, 2025Source

Steel giant Nucor confirms hackers stole data in recent breach
Nucor, North America's largest steel producer and recycler, has confirmed that attackers behind a recent cybersecurity incident have also stolen data from the company's network.
June 23, 2025Source

Steelmaker Nucor Says Hackers Stole Data in Recent Attack
Nucor has shared an update on the impact of the recent cyberattack and confirmed that some data has been taken from its IT systems.
June 23, 2025Source

Stronger OT Security Starts with OT GRC
Why a risk-based GRC approach is essential for securing industrial OT environments
June 23, 2025Source

The best password managers for families in 2025
The best password managers provide security, privacy, and ease of use for a reasonable price. I tested the best ones to help you find what's best for your family.
June 23, 2025Source

US Braces for Cyberattacks After Bombing Iranian Nuclear Sites
Iranian hackers are expected to intensify cyberattacks against the US after the recent air strikes on Iran's nuclear sites.
June 23, 2025Source

US Homeland Security warns of escalating Iranian cyberattack risks
The U.S. Department of Homeland Security (DHS) warned over the weekend of escalating cyberattack risks by Iran-backed hacking groups and pro-Iranian hacktivists.
June 23, 2025Source

WhatsApp Banned on US House Devices Over Security Concerns
The US House has banned WhatsApp from government devices, citing security and data transparency concerns. Approved alternatives include Microsoft Teams, Signal, iMessage, and more. While Meta slammed the banning decision, it also noted that WhatsApp offers stronger security than many apps approved by the CAO.
June 23, 2025Source or Source

Internet — Security Issues — June 22nd, 2025

Were 16 billion passwords from Apple, Google, and Facebook leaked? How to protect yourself
Wondering if your information is posted online from a data breach? Here's how to check if your accounts are at risk and what to do next.
June 22, 2025Source

Internet — Security Issues — June 21st, 2025

Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data
Aflac said that it's in the early stages of a review of the incident, and so far is unable to determine the total number of affected individuals.
June 21, 2025Source

Billions of login credentials have been leaked online, Cybernews researchers say
Researchers at cybersecurity outlet Cybernews say that billions of login credentials have been leaked and compiled into datasets online, giving criminals "unprecedented access" to accounts consumers use each day.
June 21, 2025Source

Massive DDoS attack delivered 37.4TB in 45 seconds, equivalent to 10,000 HD movies, to one victim IP address — Cloudflare blocks largest cyber assault ever recorded
This is the largest DDoS attack ever on record, so far.
June 21, 2025Source

Teens used encrypted chats to recruit for 'violence as a service' murder ring, Europol says
Skull emoji knife emoji moneybag emoji
June 21, 2025Source

There are only 2 free VPNs I actually recommend. Ignore all the rest.
The best VPNs aren't free. But if you really don't want to pay anything, here's what I use.
June 21, 2025Source

What We Know So Far About the Supposed 'Mother of All Data Breaches'
Some say more than 16.5 billion credentials are involved. One thing is for sure: the dark web is swimming in stolen data.
June 21, 2025Source

Internet — Security Issues — June 20th, 2025

161,000 People Impacted by Krispy Kreme Data Breach
Krispy Kreme is sharing more information on the data breach resulting from the ransomware attack targeting the company in 2024.
June 20, 2025Source

184 million passwords leaked across Facebook, Google, more: What to know about this data breach
The file was left entirely unprotected - no encryption, no password, no safeguards - just a plain text document holding millions of sensitive data entries.
June 20, 2025Source

16 billion accounts suffer "the largest data breach" — Google, Facebook, Telegram, and more are susceptible to malicious attacks
The breach has reportedly leaked credentials for accounts on platforms from Apple, GitHub, and government services.
June 20, 2025Source or Source

A staggering 16 billion passwords just leaked. Here's the real danger
Password managers are still vulnerable to this kind of malware.
June 20, 2025Source

AdaCore Merges With CodeSecure for Unified Developer Tools
Merger Strengthens AdaCore's Reach in C and C++ Static Testing for Embedded Systems
June 20, 2025Source or Source or Source or Source or Source

Aflac: 'Cybercrime Campaign' Is Targeting Insurance Industry
Experts Suspect Scattered Spider Is Behind Rash of Recent Insurer Breaches
June 20, 2025Source or Source or Source or Source or Source or Source

AI can easily impersonate you. This trick helps thwart scammers
A special phrase can keep your friends and family from losing money to scammers.
June 20, 2025Source

Amazon Linux 2023 achieves FIPS 140-3 validation
Amazon Linux 2023 (AL2023) has earned FIPS 140-3 Level 1 validation for several of its cryptographic modules. This means it's now approved for use in systems that need to meet U.S. and Canadian government standards for encryption.
June 20, 2025Source

Are 16 billion compromised passwords really part of a newly discovered data breach?
The mother of all breaches could just be multiple pre-existing archives fused into one
June 20, 2025Source

As medical device attacks increase, providers pay more for premium security features
New research shows that 75% of healthcare leaders increased their device and security budgets over the last 12 months, and they're willing to shell out for advanced protection or built-in exploit prevention.
June 20, 2025Source

BitoPro exchange links Lazarus hackers to $11 million crypto heist
The Taiwanese cryptocurrency exchange BitoPro claims the North Korean hacking group Lazarus is behind a cyberattack that led to the theft of $11,000,000 worth of cryptocurrency on May 8, 2025.
June 20, 2025Source

Can users reset their own passwords without sacrificing security?
Like it or not, passwords aren't going away anytime soon. While many organizations are exploring passwordless authentication, passwords still serve as the main line of defense for most public-facing online services.
June 20, 2025Source

Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider
Cloudflare says it mitigated a record-breaking distributed denial of service (DDoS) attack in May 2025 that peaked at 7.3 Tbps, targeting a hosting provider.
June 20, 2025Source or Source

Cloudflare Tunnels Abused in New Malware Campaign
A threat actor is abusing Cloudflare Tunnels for the delivery of a Python loader as part of a complex infection chain.
June 20, 2025Source

Court Ditches HIPAA Reproductive Health Info Privacy Rule
Ruling: HHS Has No Authority to Distinguish Different Types of PHI for Restrictions
June 20, 2025Source or Source or Source

Cyberattack on grocery supplier reveals fragility of US food supply
Hackers infiltrated one grocery distributor, and within days, there were bare shelves at stores around the country and even some pharmacies unable to fill prescriptions.
June 20, 2025Source

Cybercriminals Breach Aflac, Private Customer Data Could Be at Risk
It's possible that Social Security numbers may have been compromised. It's unclear how many people may have been affected.
June 20, 2025Source

DuckDuckGo's Scam Blocker now blocks more types of scams
Online scams are getting worse and more varied. DuckDuckGo knows that, so they've made changes. Their built-in Scam Blocker now stops more kinds of scam sites, all without tracking you.
June 20, 2025Source

FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks
WhatsApp told SecurityWeek that it linked the exploited FreeType vulnerability CVE-2025-27363 to a Paragon exploit.
June 20, 2025Source

Godfather Android Trojan Creates Sandbox on Infected Devices
The Godfather Android trojan uses on-device virtualization to hijack legitimate applications and steal users' funds.
June 20, 2025Source

Hundreds of Minecraft mods on GitHub are infested with hard-to-spot spyware
Hundreds of GitHub pages are hiding targeted, Java-based malware in Minecraft mod files.
June 20, 2025Source

Hype Alert: 'The Largest Data Breach in History' That Wasn't
Experts Debunk Legitimacy of Data Sets With 16 Billion Credentials Being Circulated
June 20, 2025Source or Source or Source or Source or Source

I tested the best antivirus software for Windows: Here's what I'd use to protect my PC
ZDNET tested the best antivirus software on the market that supports multiple operating systems, VPNS, and robust protection.
June 20, 2025Source

In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer
Noteworthy stories that might have slipped under the radar: China's Salt Typhoon targeted Viasat, Washington Post emails compromised in hack, Rowhammer attack named Crowhammer.
June 20, 2025Source

Iran's government says it shut down internet to protect against cyberattacks
At the time, it was unclear what happened or who was responsible for the shutdown, which has severely limited Iranians' means to get information about the ongoing war with Israel, as well as their ability to communicate with loved ones inside and outside of the country.
June 20, 2025Source

ISMG Editors: Anubis Ransomware's Puzzling New Tactic
Also: CISA's Leadership Crisis; Why AI's Confident Errors Demand Urgent Oversight
June 20, 2025Source or Source or Source or Source or Source

Israel-Iran War: Hacktivist Groups' Claimed Activity Surges
While Exceptions Apply, Such Efforts Often Only Amount to Psychological Operations
June 20, 2025Source or Source or Source or Source

Judge Axes Flight Disruption Suit Tied to CrowdStrike Outage
Passengers' Nuisance Claim Against CrowdStrike Barred by Airline Deregulation Act
June 20, 2025Source or Source

Low-wage tech support workers become a new gateway for cyberattacks
Outsourced call centers emerge as a new cybercrime battleground
June 20, 2025Source

Microsoft boosts default security of Windows 365 Cloud PCs
Windows 365 Cloud PCs now come with new default settings aimed at preventing / minimizing data exfiltration and malicious exploits, Microsoft has announced.
June 20, 2025Source

Microsoft to remove legacy drivers from Windows Update for security boost
Microsoft has announced plans to periodically remove legacy drivers from the Windows Update catalog to mitigate security and compatibility risks.
June 20, 2025Source

Motors Theme Vulnerability Exploited to Hack WordPress Websites
Threat actors are exploiting a critical-severity vulnerability in Motors theme for WordPress to change arbitrary user passwords.
June 20, 2025Source

Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic
Attacker rained down the equivalent of 9,300 full-length HD movies in just 45 seconds.
June 20, 2025Source

Two Insurers Say Ongoing Outages Not Ransomware-Based
Erie Insurance and Philadelphia Insurance Still Recovering From Separate Attacks
June 20, 2025Source or Source or Source or Source

UK Passes Data Use and Access Regulation Bill
Government Says Bill Will 'Pump 10 Billion Pounds' Into Economy
June 20, 2025Source or Source

Yes, 16 billion passwords leaked online. No, it's not what you think.
Think of the leak as a hacker's version of a "Best of" list.
June 20, 2025Source

Your Android phone is getting a big security upgrade for free - these Pixel models included
Google has introduced new enterprise-grade security features for managing Android devices across your organization.
June 20, 2025Source

Internet — Security Issues — June 18th, 2025

Alarming ASUS Armoury Crate Vulnerability Can Give Hackers Admin Access
Security researchers have revealed that the ASUS Armoury Crate software has a serious vulnerability (tracked as CVE-2025-3464) that could allow hackers to gain admin access to computers.
June 18, 2025Source

Amazon CISO: Iranian hacking crews 'on high alert' since Israel attack
Meanwhile, next-gen script kiddies are levelling up faster thanks to agentic AI
June 18, 2025Source

AVG Antivirus Review 2025: Robust Free Version but Middling Premium Plans
AVG performed well in my test, but poor customer service and some privacy concerns dragged down its score.
June 18, 2025Source

AWS launches new cloud security features
Amazon Web Services has announced new and improved security features at its annual AWS re:Inforce cloud security conference.
June 18, 2025Source

Best VPS hosting services 2025: Choose the right private server host for you
I researched and tested the best virtual private server hosting services to help you find the right solution, ranking scalability, security, virtual features, and customer support.
June 18, 2025Source

BeyondTrust warns of pre-auth RCE in Remote Support software
BeyondTrust has released security updates to fix a high-severity flaw in its Remote Support (RS) and Privileged Remote Access (PRA) solutions that can let unauthenticated attackers gain remote code execution on vulnerable servers.
June 18, 2025Source

Big Risk: Google, Apple & Microsoft Caught in Huge Data Breach
A security researcher has uncovered an unsecured database containing 184 million records with login credentials linked to Apple, Google, Microsoft, and Facebook accounts—likely compiled from past phishing and identity theft campaigns. The discovery underscores the urgent need to move beyond passwords, with tech giants increasingly adopting passkeys and biometric authentication for better security.
June 18, 2025Source

Bitdefender acquires Mesh to boost email protection for businesses and MSPs
Bitdefender announced it has agreed to acquire Mesh Security Limited (Mesh), a provider of email security solutions. Through the acquisition, Mesh's email security technology and capabilities will be integrated into Bitdefender's extended detection and response (XDR) platform and managed detection and response (MDR) services.
June 18, 2025Source or Source or Source or Source or Source or Source

Can a foreign government hack WhatsApp? A cybersecurity expert explains how that might work
Earlier today, Iranian officials urged the country's citizens to remove the messaging platform WhatsApp from their smartphones. Without providing any supporting evidence, they alleged the app gathers user information to send to Israel.
June 18, 2025Source

ChainLink Phishing: How Trusted Domains Become Threat Vectors
Phishing remains one of cybersecurity's most enduring threats, not because defenders aren't evolving, but because attackers are adapting even faster.
June 18, 2025Source

Cloudflare Log Explorer detects security and performance issues
Cloudflare announced Cloudflare Log Explorer to help give businesses instant access to critical security and performance insights across their IT environments.
June 18, 2025Source

Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products
Veeam and BeyondTrust have resolved several vulnerabilities that could be exploited for remote code execution.
June 18, 2025Source

Computer tracking, an 'electronic collar': Gilles Deleuze's 1990 postscript on the societies of control
Gilles Deleuze was one of the most original and imaginative thinkers of postwar France. A lifelong teacher, he spent most of his career at the University of Paris VIII, influencing generations of students but largely shunning the mantle of public intellectual.
June 18, 2025Source

Critical Vulnerability Patched in Citrix NetScaler
Citrix has released patches for critical- and high-severity vulnerabilities in NetScaler and Secure Access Client and Workspace for Windows.
June 18, 2025Source

Cyber Centre advice on securing operational technology systems
The Canadian Centre for Cyber Security (Cyber Centre) is warning Canadian organizations to defend their operational technology (OT) and industrial control systems (ICS) from malicious cyber actors.
June 18, 2025Source

Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection
Misconfigured permissions in Google's Gerrit code collaboration platform could have led to the compromise of ChromiumOS and other Google projects.
June 18, 2025Source

Getting email you didn't sign up for? Don't unsubscribe—it might be a scam
Use these two alternative tricks to clear your inbox.
June 18, 2025Source

Hackers steal and destroy millions from Iran's largest crypto exchange
Iran's largest crypto exchange, Nobitex, said Wednesday that it was hacked and funds have been drained from its hot wallet.
June 18, 2025Source

Healthcare SaaS firm says data breach impacts 5.4 million patients
Episource warns of a data breach after hackers stole health information of over 5 million people in the United States in a January cyberattack.
June 18, 2025Source

Iran Shuts Down Internet Access Amid Escalating Conflict
Iranian Officials Call Internet Outages Intentional to Disrupt Israeli Operations
June 18, 2025Source or Source or Source or Source or Source

Jumio Liveness Premium combats deepfakes and injection attacks
Jumio launched Jumio Liveness Premium with advanced deepfake detection, the company's most advanced biometric liveness detection solution to date.
June 18, 2025Source

Likely Exploited Vulnerabilities (LEV): Breaking Down the New Metric from NIST
Shortly after posting our recent blog on CISA's KEV Catalog, the National Institute of Standards and Technology (NIST) proposed a new metric for Vulnerability Exploitation Probability: Likely Exploited Vulnerabilities (LEV).
June 18, 2025Source

Master UniFi's Zone-Based Firewall Rules for Ultimate Network Security
Have you ever wondered how to strike the perfect balance between network security and ease of management? For many, configuring firewalls can feel like navigating a maze of technical jargon and endless rule sets. But UniFi's new zone-based firewall rules aim to change that. By introducing a more intuitive and granular approach to managing traffic, this system enables users to create secure, organized networks without the headache of overly complex setups.
June 18, 2025Source

Microsoft 365 to block file access via legacy auth protocols by default
Microsoft has announced that it will start updating security defaults for all Microsoft 365 tenants in July to block access to SharePoint, OneDrive, and Office files via legacy authentication protocols.
June 18, 2025Source

Minecraft cheaters never win ... but they may get malware
Infostealers posing as popular cheat tools are cropping up on GitHub
June 18, 2025Source

MiniMax M1 Aims to Rival AI Giants on Cost, Performance
Shanghai Firm Bets on Open-Source Strategy, Efficiency Claims
June 18, 2025Source or Source or Source

00 or Source< or Source

Mitigating AI Threats: Bridging the Gap Between AI and Legacy Security
Adopting a layered defense strategy that includes human-centric tools and updating security components.
June 18, 2025Source

Neovera Boosts Bank Fraud Defense With Greenway Acquisition
Deal Adds Live Fraud Red Teaming, Adversarial Testing to Neovera's Cyber Portfolio
June 18, 2025Source or Source or Source or Source or Source

North Korean hackers deepfake execs in Zoom call to spread Mac malware
The North Korean BlueNoroff hacking group is deepfaking company executives during Zoom calls to trick employees into installing custom malware on their macOS devices.
June 18, 2025Source

Pro-Israel hackers hit Iran's Nobitex exchange, burn $90M in crypto
The pro-Israel "Predatory Sparrow" hacking group claims to have stolen over $90 million in cryptocurrency from Nobitex, Iran's largest crypto exchange, and burned the funds in a politically motivated cyberattack.
June 18, 2025Source

Russian Hackers Bypass Gmail MFA With App-Specific Password Ruse
Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords.
June 18, 2025Source

Shocking security breach of 16 billion logins includes Apple IDs
Exposed records are being made available to threat agents on a massive scale.
June 18, 2025Source

'Stargazers' use fake Minecraft mods to steal player passwords
A large-scale malware campaign specifically targets Minecraft players with malicious mods and cheats that infect Windows devices with infostealers that steal credentials, authentication tokens, and cryptocurrency wallets.
June 18, 2025Source

Websites are tracking you via browser fingerprinting, researchers show
Clearing your cookies is not enough to protect your privacy online. New research led by Texas A&M University has found that websites are covertly using browser fingerprinting—a method to uniquely identify a web browser—to track people across browser sessions and sites.
June 18, 2025Source

World Leaks Claims Data Theft from State Agency Contractor
Crime Gang Begins Leaking Stolen Freedman HealthCare Data
June 18, 2025Source or Source or Source or Source or Source

Internet — Security Issues — June 16th, 2025

23andMe's Co-Founder to Buy Company; Makes Privacy Pledge
Anne Wojcicki's New Company Wins Bid for Bankrupt Genomics Testing Firm
June 16, 2025Source or Source or Source or Source or Source

240,000 Impacted by Data Breach at Eyecare Tech Firm Ocuco
The KillSec ransomware group has stolen hundreds of gigabytes of data from Ireland-based eyecare technology company Ocuco.
June 16, 2025Source

Anubis Ransomware Packs a Wiper to Permanently Delete Files
The emerging Anubis ransomware becomes a major threat, permanently deleting user files and making recovery impossible.
June 16, 2025Source

Archetyp Dark Web Market Shut Down by Law Enforcement
The Archetyp Market drug marketplace has been targeted by law enforcement in an operation involving takedowns and arrests.
June 16, 2025Source or Source or Source

Asheville Eye Associates Says 147,000 Impacted by Data Breach
Asheville Eye Associates says the personal information of 147,000 individuals was stolen in a November 2024 data breach.
June 16, 2025Source

Canadian Airline WestJet Hit by Cyberattack
A cybersecurity incident at WestJet resulted in users experiencing interruptions when accessing the company's application and website.
June 16, 2025Source

Canada's WestJet says 'expect interruptions' online as it navigates cybersecurity turbulence
Flights still flying - just don't count on the app or website working smoothly
June 16, 2025Source

Copilot AI Bug Could Leak Sensitive Data via Email Prompts
Microsoft Patched Flaw Allowing Attackers to Hijack Copilot Responses
June 16, 2025Source or Source or Source or Source

Cyolo expands remote access coverage for OT and cyber-physical systems
Cyolo announced several major new capabilities, headlined by Cyolo Third-Party VPN Control. This capability within the company's Cyolo PRO (Privileged Remote Operations) solution delivers visibility and access control for enforced third-party VPN and direct connections without requiring changes to production infrastructure or vendor workflows.
June 16, 2025Source

Eurocops arrest suspected Archetyp admin, shut down mega dark web drug shop
Marketplace as big as Silk Road had more than 600k users and turnover of 'at least' €250M
June 16, 2025Source

Google's $32 Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report
According to reports, the US Department of Justice will assess whether the deal would harm competition in the cybersecurity market.
June 16, 2025Source

Got a new password manager? Don't leave your old logins exposed in the cloud - do this next
Every major browser on every platform offers a way to save passwords and passkeys. If you use a third-party password manager, those built-in features can create a big mess. Here's how to clean things up.
June 16, 2025Source

Hackers Say T-Mobile's Been Hit Again—Company Says "Not Us"
Hackers are claiming to have stolen 64 million T-Mobile customer records, including sensitive personal data, and are selling it online—though T-Mobile denies any breach occurred. While some leaked information appears recycled from past hacks, the presence of new data raises serious concerns about the carrier's ongoing security practices.
June 16, 2025Source

Hackers switch to targeting U.S. insurance companies
Threat intelligence researchers are warning of hackers breaching multiple U.S. companies in the insurance industry using all the tactics observed with Scattered Spider activity.
June 16, 2025Source

High-Severity Vulnerabilities Patched in Tenable Nessus Agent
Three high-severity Tenable Agent vulnerabilities could allow users to overwrite and delete files, or execute arbitrary code, with System privileges.
June 16, 2025Source

History made as MI6 appoints first female Chief
The UK government has appointed Blaise Florence Metreweli as the next Chief of the Secret Intelligence Service (SIS), also known as MI6. Metreweli will take up the role, traditionally referred to by the codename "C," succeeding Sir Richard Moore, who is stepping down after five years in the post.
June 16, 2025Source

How Autonomous Security for Cloud May Redefine Risk Response
IBM's Souvik Khamaru on Moving SecOps from Reactive to Proactive Posture
June 16, 2025Source

Legacy Systems and Policies Expose West to Cyber Disruption
Adversaries' ability to monitor and disrupt Western critical infrastructure demands a major shift in cybersecurity priorities as well as thinking, said Ciaran Martin, an Oxford professor who's also the director of SANS Institute's CISO Network.
June 16, 2025Source or Source

Microsoft 365 security in the spotlight after Washington Post hack
The Washington Post has come under cyberattack which saw Microsoft email accounts of several journalists get compromised. The attack, which was discovered last Thursday, is believed to have been conducted by a foreign government due to the topics the journalists cover, including national security, economic policy, and China. Following the hack, the passwords on the affected accounts were reset to prevent access.
June 16, 2025Source

Microsoft: June Windows Server security updates cause DHCP issues
Microsoft acknowledged a new issue caused by the June 2025 security updates, causing the DHCP service to freeze on some Windows Server systems.
June 16, 2025Source

New Anubis ransomware can encrypt and destroy data, making file recovery impossible
The RaaS operation poses a double threat to corporate data thanks to its wiper feature
June 16, 2025Source

Red Teaming AI: The Build Vs Buy Debate
A strong AI deployment starts with asking the right questions, mapping your risks, and thinking like an adversary — before it's too late.
June 16, 2025Source

Scattered Spider has moved from retail to insurance
Google threat analysts warn the team behind the Marks & Spencer break-in has moved on
June 16, 2025Source

SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
Vulnerabilities affecting the SinoTrack GPS tracking platform may allow attackers to keep tabs on vehicles' location and even perform actions such as disconnecting power to vehicles' fuel pump (if the tracker can interact with a car's system).
June 16, 2025Source

Spy school dropout: GCHQ intern jailed for swiping classified data
Student 'believed he could finish' software dev 'project alone and therefore that the rules did not apply to him'
June 16, 2025Source

Suspected Chinese Hackers Targeted the Washington Post
Publication Tells Staff to Reset Passwords After Email Breach
June 16, 2025Source or Source or Source or Source or Source

Trump's Pick to Lead CISA is Stuck in Confirmation Limbo
Sean Plankey Has Support, But His CISA Nomination is Blocked and Delayed
June 16, 2025Source or Source

Washington Post's email system hacked, journalists' accounts compromised
Email accounts of several Washington Post journalists were compromised in a cyberattack believed to have been carried out by a foreign government.
June 16, 2025Source

Why 99% Accuracy Isn't Good Enough: The Reality of ML Malware Detection
ML models need to be complemented with traditional detection techniques for malware detection to work in real enterprise environments, due to the "base rate problem."
June 16, 2025Source

Why the $32B Google-Wiz Deal Caught the Eye of US Regulators
Justice Officials Will Reportedly Probe the Google-Wiz Deal on Antitrust Grounds
June 16, 2025Source or Source or Source or Source

Your Android Notifications Could Be a Security Nightmare in Waiting
A newly discovered flaw in Android's notification system could let attackers manipulate the "Open Link" button to redirect users to malicious websites. While Google is working on a fix, users are advised to avoid clicking links directly from notifications and instead open them manually from within the app.
June 16, 2025Source

Zoomcar discloses security breach impacting 8.4 million users
Zoomcar Holdings (Zoomcar) has disclosed that unauthorized accessed its system led to a data breach impacting 8.4 million users.
June 16, 2025Source or Source

Internet — Security Issues — June 13th, 2025

Agentic AI Won't Save the SOC, Yet
Opaque Decision-Making, Lack of Guardrails, Poor Auditability are Risks
June 13, 2025Source or Source or Source or Source

Cloudflare: Outage not caused by security incident, data is safe
Cloudflare has confirmed that the massive service outage yesterday was not caused by a security incident and no data has been lost.
June 13, 2025Source

Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption
Trend Micro patches critical-severity Apex Central and Endpoint Encryption PolicyServer flaws leading to remote code execution.
June 13, 2025Source

Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking
Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication.
June 13, 2025Source

Cybersecurity Strategy Shifts Amid Global Political Tensions
NCC Group's Katharina Sommer on Why Nations Are Turning Inward on Cyber Defense
June 13, 2025Source

Discord flaw lets hackers reuse expired invites in malware campaign
Hackers are hijacking expired or deleted Discord invite links to redirect users to malicious sites that deliver remote access trojans and information-stealing malware.
June 13, 2025Source

Fog Ransomware Attack Employs Unusual Tools
Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41.
June 13, 2025Source

Huione's 'Shutdown' Fails to Halt Its Laundering Network
Huione-Linked Crypto Activity Continues Despite Takedown Efforts
June 13, 2025Source or Source or Source or Source or Source

In Other News: Cloudflare Outage, Cracked.io Users Identified, Victoria's Secret Cyberattack Cost
Noteworthy stories that might have slipped under the radar: Cloudflare outage not caused by cyberattack, Dutch police identified 126 users of Cracked.io, the Victoria's Secret cyberattack has cost $10 million.
June 13, 2025Source

Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday
Industry professionals comment on the Trump administration's new executive order on cybersecurity.
June 13, 2025Source

INTERPOL-Led Effort Dismantles Infostealer Malware Network in 26 Countries Across Asia-Pacific Region
INTERPOL partnered with Group-IB, Kaspersky, and Trend Micro to take down a cybercrime network. They alerted more than 216,000 individuals and organizations that were possible victims.
June 13, 2025Source

iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
A zero-click attack leveraging a freshly disclosed Messages vulnerability (CVE-2025-43200) has infected the iPhones of two European journalists with Paragon's Graphite mercenary spyware, Citizen Lab researchers have revealed on Thursday.
June 13, 2025Source

ISMG Editors: Gartner Security & Risk Management Summit Recap
Security Leadership in Focus - From AI Risks to Cloud Responsibility
June 13, 2025Source or Source or Source or Source or Source

ISMG Editors: Supply Chain Attacks Are Spiking - Here's Why
Also: Trump's Rollback of Cyber Rules, 23andMe's Privacy Backlash
June 13, 2025Source or Source or Source or Source or Source

Israeli Strikes Raise Fears of Cyberattacks and Retaliation
Analysts Warn US Infrastructure May Be Next as Iran Plans Missile Strike Response
June 13, 2025Source or Source or Source or Source

Microsoft Copilot's own default configuration exposed users to the first-ever "zero-click" AI attack, but there was no data breach
Research firm uncovers the first zero-click attack on Microsoft 365 Copilot, but Microsoft has since patched the issue and states that bad actors did not access sensitive user data.
June 13, 2025Source

Paid proxy servers vs free proxies: Is paying for a proxy service worth it?
Debating between a paid or free proxy service? These are the benefits and potential issues you should be aware of.
June 13, 2025Source

Redefining thermosensing plants: New model could enable climate-tailored crops for food security
An advance by Monash University scientists could transform agriculture with designer crops suited to the climate of individual regions.
June 13, 2025Source

Security Bite: Apple's new iOS 26 spam tools will make scammers cry
Earlier this week, during its annual WWDC keynote, Apple unveiled a slew of headline features like Liquid Glass, a new Games app, and Visual Intelligence, as well as two major spam protection tools coming to iOS 26 this fall. While I was a little disappointed in the lack of new security or even privacy features, these new tools will change the game for users who receive annoying spam calls and messages on the daily.
June 13, 2025Source

SimpleHelp Vulnerability Exploited Against Utility Billing Software Users
CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider's customers.
June 13, 2025Source

StackHawk Sensitive Data Identification provides visibility into high-risk APIs
StackHawk announced Sensitive Data Identification to give security teams visibility into high-risk APIs across thousands of code repositories within an organization.
June 13, 2025Source

TeamFiltration Abused in Entra ID Account Takeover Campaign
Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts.
June 13, 2025Source

Understanding the Fundamentals of Cryptography
Cryptography protects data using encryption, ensuring only intended users can access it. This article explains its basics with simple examples.
June 13, 2025Source

University researchers tout using smartwatches to steal data from air-gapped systems — SmartAttack paper proposes using wearable as a covert ultrasonic signal receiver
The attack sounds unbelievably hard to pull off.
June 13, 2025Source

Urban aquaponics as a sustainable solution for food security and environmental conservation
Researchers explore how aquaponics - a system that integrates fish farming with soilless plant cultivation - can enhance urban food security while reducing environmental impacts.
June 13, 2025Source

Victoria's Secret restores critical systems after cyberattack
Victoria's Secret has restored all critical systems impacted by a May 24 security incident that forced it to shut down corporate systems and the e-commerce website.
June 13, 2025Source

VirtualMacOSX.com user data exposed in breach
Ten thousand user records that included sensitive data were revealed online.
June 13, 2025Source

Wanted: Junior cybersecurity staff with 10 years' experience and a PhD
Infosec employers demanding too much from early-career recruits, says ISC2
June 13, 2025Source

WhatsApp Backs Apple Over Encryption Fight With UK
WhatsApp CEO Says UK Request Sets "Dangerous Precedent"
June 13, 2025Source or Source

ZeroRISC Raises $10 Million for Open Source Silicon Security Solutions
ZeroRISC has raised $10 million in seed funding for production-grade open source silicon security, built on OpenTitan designs.
June 13, 2025Source

Internet — Security Issues — June 9th, 2025

184 million major passwords leaked! Avoid these 2 dangers
A few simple steps will protect your PC and your online accounts.
June 9, 2025Source

Apple, Google, and Microsoft offer free password managers - but should you use them?
The three dominant computing platforms have each tried to build features that help you manage passwords without paying for third-party software. Are any of them worth your time and effort?
June 9, 2025Source

Best free password managers 2025: Online security doesn't have to cost a thing
Shore up your defenses, stat.
June 9, 2025Source

Boards Leave CISOs Exposed to Legal Risks
Attorney Jonathan Armstrong Says Board Diversity Must Include Cybersecurity Skills
June 9, 2025Source or Source or Source or Source or Source

Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign
Anti-malware vendor said it spent the past twelve months deflecting a stream of network reconnaissance probes from China-nexus threat actors
June 9, 2025Source

Chinese Hackers and User Lapses Turn Smartphones Into a 'Mobile Security Crisis'
Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in U.S. cyberdefenses.
June 9, 2025Source

Chinese spy crew appears to be preparing for conflict by backdooring 75+ critical orgs
SentinelOne discovered the campaign when they tried to hit the security vendor's own servers
June 9, 2025Source

Designing Blue Team playbooks with Wazuh for proactive cyber defense
In cybersecurity, Blue Teams are responsible for defending an organization's IT environment, including networks, endpoints, applications, and data against various types of threats. Their role goes beyond protecting IT assets; they also ensure operational continuity, monitor for malicious activity, and respond to incidents in real-time. To operate effectively, these teams rely on structured processes known as playbooks.
June 9, 2025Source

DOGE wins at Supreme Court; conservative majority ends limits on data access
Jackson dissent says majority bends legal standards for Trump administration.
June 9, 2025Source

EU launches EU-based, privacy-focused DNS resolution service
DNS4EU, an EU-based DNS resolution service created to strengthen European Union's digital sovereignty, has become reality.
June 9, 2025Source

Grocery wholesale giant United Natural Foods hit by cyberattack
United Natural Foods (UNFI), North America's largest publicly traded wholesale distributor, was forced to shut down some systems following a recent cyberattack.
June 9, 2025Source

Guardz Banks $56M Series B for All-in-One SMB Security
The Israeli company said the Series B raise was led by ClearSky and included equity stakes for new backer Phoenix Financial.
June 9, 2025Source

How To Tell If A Social Security Text Is Real Or A Scam
The digital age has brought with it a seemingly endless stream of legitimately game-changing technologies. It has also opened up new avenues for scammers to take advantage of those who may not be savvy enough to spot a scam or cyberattack when they see one. While there are several different types of cyberattacks for folks to be wary of these days, the goal of each is essentially the same: to acquire personally identifiable information (often shortened to PII) and use it to gain access to otherwise private financial accounts and essentially loot them.
June 9, 2025Source

iMessage Zero-Click Attacks Suspected in Targeting of High-Value Individuals
iVerify links iPhone crashes to sophisticated zero-click attacks via iMessage targeting individuals involved in politics in the EU and US.
June 9, 2025Source

Malicious NPM Packages Disguised as Express Utilities Allow Attackers to Wipe Systems
Two malicious NPM packages contain code that would delete production systems when triggered with the right credentials.
June 9, 2025Source

Mirai Botnet Variant Exploits DVR Flaw to Build Swarm
A Mirai Offshoot Uses DVR Command Injection Bug to Spread, Hitting 50,000 Devices
June 9, 2025Source or Source or Source

Mirai Botnets Exploit Flaw in Unpatched Wazuh Servers
No fewer than two separate Mirai botnets are on the hunt for unpatched servers hosting open source SIEM solution Wazuh, an unusual variation on hackers' typical focus on Internet of Things devices for stringing together infected computers.
June 9, 2025Source or Source or Source or Source or Source

Mirai Botnets Exploiting Wazuh Security Platform Vulnerability
CVE-2025-24016, a critical remote code execution vulnerability affecting Wazuh servers, has been exploited by Mirai botnets.
June 9, 2025Source

NHS: Blood Supply Still Affected by June 2024 Vendor Attack
NHS in England Urging One Million People to Donate Blood to 'Secure' Supply
June 9, 2025Source or Source or Source or Source or Source

Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison
Kingsley Uchelue Utulu has been sentenced to more than 5 years in prison for his role in a scheme that involved hacking, fraud and identity theft.
June 9, 2025Source

Online Developer Tools a Backdoor to Security Threat
Using online developer utilities like a JSON Viewer can be incredibly convenient for parsing and visualizing JSON data, but they also come with significant risks.
June 9, 2025Source

Over 84,000 Roundcube instances vulnerable to actively exploited flaw
Over 84,000 Roundcube webmail installations are vulnerable to CVE-2025-49113, a critical remote code execution (RCE) flaw with a public exploit.
June 9, 2025Source

Privacy Victory! Judge Grants Preliminary Injunction in OPM/DOGE Lawsuit
Court to Decide Scope of Injunction Later This Week
June 9, 2025Source

React Native Aria Packages Backdoored in Supply Chain Attack
A threat actor published backdoored versions of 17 NPM packages from GlueStack in a fresh supply chain attack.
June 9, 2025Source

Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113)
With an exploit for a critical Roundcube vulnerability (CVE-2025-49113) being offered for sale on underground forums and a PoC exploit having been made public, attacks exploiting the flaw are incoming and possibly already happening.
June 9, 2025Source

SentinelOne Sees No Breach After Hardware Supplier Hacked
Intrusion Involved ShadowPad Malware, Wielded in Attacks Tied to Chinese APT Groups
June 9, 2025Source or Source or Source or Source or Source

Sensata Technologies says personal data stolen by ransomware gang
Sensata Technologies is warning former and current employees it suffered a data breach after concluding an investigation into an April ransomware attack.
June 9, 2025Source

Serverless IAM: Implementing IAM in Serverless Architectures with Lessons from the Security Trenches
Serverless IAM combines managed identity services with fine-grained authorization for secure FaaS across major cloud providers.
June 9, 2025Source

Trump Cybersecurity Executive Order Targets Digital Identity, Sanctions Policies
President Trump says his new cybersecurity executive order amends problematic elements of Biden- and Obama-era executive orders.
June 9, 2025Source

US Seeks Forfeiture of $7.74M in Cryptocurrency Tied to North Korean IT Workers
The US is seeking the forfeiture of $7.74 million in cryptocurrency in frozen wallets tied to North Korean fake IT workers schemes.
June 9, 2025Source

Whole Foods Supplier Faces Cyberattack Disrupting Operations
United Natural Foods Inc. Launches Investigation, Confirms IT Systems Breach
June 9, 2025Source or Source or Source or Source or Source

Internet — Security Issues — June 6th, 2025

145 criminal domains linked to BidenCash Marketplace seized
Approximately 145 darknet and conventional internet domains, along with cryptocurrency funds linked to the BidenCash marketplace, have been seized by the U.S. Attorney's Office for the Eastern District of Virginia. The operators of the BidenCash marketplace use the platform to simplify the process of buying and selling stolen credit cards and associated personal information.
June 6, 2025Source

Bitdefender Antivirus Review 2025: I Found This Top-Rated Security Software Effective and Efficient
I spent several days testing Bitdefender's antivirus and online security tools. Here's what I thought of it.
June 6, 2025Source

Cisco Patches Critical ISE Vulnerability With Public PoC
Cisco has released patches for a critical vulnerability impacting cloud deployments of Identity Services Engine (ISE).
June 6, 2025Source

Critical Fortinet flaws now exploited in Qilin ransomware attacks
The Qilin ransomware operation has recently joined attacks exploiting two Fortinet vulnerabilities that allow bypassing authentication on vulnerable devices and executing malicious code remotely.
June 6, 2025Source

Cybersecurity M&A Roundup: 42 Deals Announced in May 2025
The number of cybersecurity-related merger and acquisition (M&A) announcements surged in May 2025.
June 6, 2025Source

DA: Sleep Center Worker Installed Secret Camera in Bathrooms
Ex-Employee Faces Criminal Charges; Hospital Reports Incident as Big HIPAA Breach
June 6, 2025Source or Source or Source or Source or Source

Destructive 'PathWiper' Targeting Ukraine's Critical Infrastructure
A Russia-linked threat actor has used the destructive malware dubbed PathWiper against a critical infrastructure organization in Ukraine.
June 6, 2025Source

EU Prepares for Transnational Cyberattacks
Cyber Blueprint Spells Out Measures to Coordinate Against Disruptive Hacks
June 6, 2025Source or Source or Source or Source or Source

Fastest VPN 2025: Top 5 fastest VPNs ranked
If you have the need, the need for VPN speed, we've got recommendations about the best choices for you.
June 6, 2025Source

FBI Issues Play Ransomware Security Advisory & Mitigation Steps to Take Now
The Play ransomware group has hit about 900 organizations globally so far and uses "double extortion" after data theft.
June 6, 2025Source

Fresh strain of pro-Russian wiper flushes Ukrainian critical infrastructure
Destructive malware has been a hallmark of Putin's multi-modal war
June 6, 2025Source

Hackers leak 86 million AT&T customer records with 44 million social security numbers, report says
Plus, AT&T responds.
June 6, 2025Source

HPE Patches Critical Vulnerability in StoreOnce
An HPE StoreOnce vulnerability allows attackers to bypass authentication, potentially leading to remote code execution.
June 6, 2025Source

In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA
Noteworthy stories that might have slipped under the radar: FBI issues an alert on BadBox 2 botnet, NSO disputing the $168 million WhatsApp fine, 1,000 people left CISA since Trump took office.
June 6, 2025Source

ISMG Editors: Infosecurity Europe Conference 2025 Wrap-Up
Also: AI's Promise and Pitfalls and Why Community, Communication, and Basics Matter
June 6, 2025Source or Source or Source or Source or Source

Italian lawmakers say Italy used spyware to target phones of immigration activists, but not against journalist
An Italian parliamentary committee confirmed that the Italian government used spyware made by the Israeli company Paragon to hack several activists working to save immigrants at sea. The committee, however, said its investigation concluded that a prominent Italian journalist was not among the victims, leaving key questions about the spyware attacks unanswered.
June 6, 2025Source

Kettering Health confirms Interlock ransomware behind cyberattack
Healthcare giant Kettering Health, which manages 14 medical centers in Ohio, confirmed that the Interlock ransomware group breached its network and stole data in a May cyberattack.
June 6, 2025Source

Microsoft, Indian police bust AI-powered tech support scam ring targeting elderly in Japan
Working with India's Central Bureau of Investigation (CBI), Microsoft recently assisted in busting a scam network that was targeting the elderly in Japan. The CBI raided 19 locations on May 28, leading to the arrest of six key operatives and the taking down of two call centers. The scammers were impersonating Microsoft specifically and using tech support scams against Japanese seniors.
June 6, 2025Source

Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
Millions of Internet-of-Things (IoT) devices running the open-source version of the Android operating system are part of the Badbox 2.0 botnet, the FBI has warned.
June 6, 2025Source

Millions of AT&T customer records repackaged for sale on the dark web
Originally released on the dark web in 2024, the repackaged data includes names, dates of birth, phone numbers, email addresses, street addresses, and social security numbers.
June 6, 2025Source

Millions of low-cost Android devices turn home networks into crime platforms
BadBox malware has been menacing low-cost Android devices for nearly a decade.
June 6, 2025Source

MIND Raises $30 Million for Data Loss Prevention
Data security firm MIND has raised $30 million in Series A funding to expand its R&D and go-to-market teams.
June 6, 2025Source

New PathWiper data wiper malware hits critical infrastructure in Ukraine
A new data wiper malware named 'PathWiper' is being used in targeted attacks against critical infrastructure in Ukraine, aimed at disrupting operations in the country.
June 6, 2025Source

One Single GitHub User Was Responsible For Over A Hundred Backdoored Malware Repos
Thanks to the curiosity of a Sophos customer about a specific remote access trojan they read about in the news, 100+ poisoned GitHub repos were not just taken down, but tracked back to a single email address. Of the 141 repos associated with that email address 133 were backdoored in some way or another.
June 6, 2025Source

Police arrests 20 suspects for distributing child sexual abuse content
Law enforcement authorities from over a dozen countries have arrested 20 suspects in an international operation targeting the production and distribution of child sexual abuse material.
June 6, 2025Source

Your ransomware nightmare just came true -- now what?
Don't negotiate unless you must, and if so, drag it out as long as you can
June 6, 2025Source

Sinister BADBOX Malware Infected Over 1M Android Devices, Is Yours One?
A new variant of the BADBOX malware campaign has taken root in over a million Android-based devices worldwide, and if you've picked up a cheap smart TV box or projector off Amazon or AliExpress lately, you might be part of the problem. BADBOX 2.0 is a sprawling botnet targeting Android Open Source Project (AOSP) devices—not certified Android TV gear—and it's converting them into residential proxies for cybercrime.
June 6, 2025Source

Tax resolution firm Optima Tax Relief hit by ransomware, data leaked
U.S. tax resolution firm Optima Tax Relief suffered a Chaos ransomware attack, with the threat actors now leaking data stolen from the company.
June 6, 2025Source

'There Will Be Pain': CISA Cuts Spark Bipartisan Concerns
Analysis of Proposed Budget, Workforce Cuts Reveal Risks to Cyber Readiness
June 6, 2025Source or Source or Source or Source or Source

This radical suggestion is simplifying my digital security
File this idea under things I should have thought of sooner.
June 6, 2025Source

Uncle Sam moves to seize $7.7M laundered by North Korean IT worker ring
The cash has been frozen for more than two years
June 6, 2025Source

US Offering $10 Million Reward for RedLine Malware Developer
A reward is being offered for Maxim Alexandrovich Rudometov, who is accused of developing and managing the RedLine malware.
June 6, 2025Source

Why Passkeys Are Better than Passwords (And How to Use Them)
No one likes passwords. Users find managing them annoying, and website managers worry about login credentials being stolen in a data breach. The industry has developed a better solution: passkeys.
June 6, 2025Source

Internet — Security Issues — June 3rd, 2025

84 percent of attacks now use legitimate tools
New research from Bitdefender shows that 84 percent of high severity attacks are using Living off the Land (LOTL) techniques, exploiting legitimate tools used by administrators.
June 3, 2025Source

1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking
A critical command execution vulnerability has been found by a researcher in Instantel Micromate monitoring units.
June 3, 2025Source

Akamai launches DNS Posture Management for real-time monitoring and guided remediation
Akamai Technologies has introduced Akamai DNS Posture Management, a solution that offers unified, multicloud visibility over all DNS assets. The agentless solution provides real-time monitoring and guided remediation across all major DNS providers. Security teams can quickly detect and respond to DNS-based attacks, certificate security risks, vulnerabilities, and misconfigurations that weaken an organization's security posture.
June 3, 2025Source

Android chipmaker Qualcomm fixes three zero-days exploited by hackers
Chipmaker giant Qualcomm released patches on Monday fixing a series of vulnerabilities in dozens of chips, including three zero-days that the company said may be in use as part of hacking campaigns.
June 3, 2025Source

Android malware Crocodilus adds fake contacts to spoof trusted callers
The latest version of the 'Crocodilus' Android malware has introduced a new mechanism that adds a fake contact to an infected device's contact list to deceive victims when they receive calls from the threat actors.
June 3, 2025Source

AttackIQ Ready3 identifies which vulnerabilities are truly exposed
AttackIQ releaseed AttackIQ Ready3. With expanded discovery capabilities, Ready3 maps both internal and external attack surfaces. By correlating asset discovery with vulnerability context, attack paths and compensating controls, the platform helps security teams identify which vulnerabilities are truly exposed because existing defenses are failing to stop them.
June 3, 2025Source

Australia Enforces Ransomware Payment Reporting
Covered organizations in Australia are now required to report ransomware and other cyber extortion payments within three days.
June 3, 2025Source

Australian Scam Losses Increase 28% in 2025
Number of Reports Is Down, But Citizens Lost AU$60 Million to Investment Scams
June 3, 2025Source or Source

Bling slinger Cartier tells customers to be wary of phishing attacks after intrusion
Nothing terribly valuable taken in data heist, though privacy a little tarnished
June 3, 2025Source

CISA warns of ConnectWise ScreenConnect bug exploited in attacks
CISA is alerting federal agencies in the U.S. of hackers exploiting a recently patched ScreenConnect vulnerability that could lead to executing remote code on the server.
June 3, 2025Source

Cyber Attacks Are Up 47% in 2025 -- AI is One Key Factor
Cyber attacks on businesses continue to escalate in 2025, with global organisations experiencing an average of 1,925 incidents per week in Q1, which is a 47% increase compared to the same period last year, according to new research from Check Point.
June 3, 2025Source

Game Changer: AI Discovers Its First Real Zero-Day Vulnerability
OpenAI's o3 AI model has achieved a cybersecurity first: discovering a zero-day vulnerability (CVE-2025-37899) in the Linux kernel's SMB implementation. This critical "use-after-free" bug was verified and patched, marking the first time AI completed the full cycle of finding and resolving a previously unknown flaw, highlighting AI's growing power in security.
June 3, 2025Source

Goodbye CVE? European Vulnerability Database EUVD Now Live
The European Union Agency for Cybersecurity (ENISA) has recently launched the beta of the European Vulnerability Database (EUVD), a new public platform operating alongside, but independently from, the widely used Common Vulnerabilities and Exposures (CVE) system. The new platform aims to improve coordination and transparency in vulnerability handling within the EU.
June 3, 2025Source

Google patches new Chrome zero-day bug exploited in attacks
Google has released an emergency security update to fix the third Chrome zero-day vulnerability exploited in attacks since the start of the year.
June 3, 2025Source or Source

How to Spot Scam Tech Sites: What We Learned the Hard Way
A little while ago, we almost got burned by a website selling wireless earbuds at crazy low prices. The checkout looked legit, but after we ordered, the shipping info never updated. We tried contacting them-no luck.
June 3, 2025Source

Illicit crypto-miners pouncing on lazy DevOps configs that leave clouds vulnerable
To stop the JINX-0132 gang behind these attacks, pay attention to HashiCorp, Docker, and Gitea security settings
June 3, 2025Source

Is a quantum-cryptography apocalypse imminent?
Will quantum computers crack cryptographic codes and cause a global security disaster? You might certainly get that impression from a lot of news coverage, the latest of which reports new estimates that it might be 20 times easier to crack such codes than previously thought.
June 3, 2025Source

Lumma Stealer Malware Resurgence Challenges Global Takedown
Malware Operation Shows Signs of Regrouping
June 3, 2025Source or Source

MainStreet Bank Data Breach Impacts Customer Payment Cards
The incident occurred in March and impacted the personally identifiable information of approximately 4.65% of MainStreet Bancshares' customers.
June 3, 2025Source

Malwarebytes Scam Guard spots and avoids potential scams
Malwarebytes launched Scam Guard, an AI-powered digital safety companion that provides real-time feedback on scams, threats and malware alongside digital safety recommendations.
June 3, 2025Source

Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names
Microsoft and CrowdStrike are running a project that aims to align threat actor names, and Google and Palo Alto Networks will also contribute.
June 3, 2025Source

Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones
Mikko Hypponen has joined the Finnish anti-drone company Sensofusion as Chief Research Officer after three decades of fighting malware.
June 3, 2025Source

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
June 3, 2025Source

New Android malware adds fake contacts to make scam calls look legit
A newly-spotted Trojan app steals crypto and banking info, but goes one step further to make social engineering attacks easier.
June 3, 2025Source

Over 30 Vulnerabilities Patched in Android
The latest Android updates fix vulnerabilities in Runtime, Framework, System, and third-party components of the mobile OS.
June 3, 2025Source

Privacy abuse involving Meta and Yandex discovered
An international research collaboration has recently uncovered a potential privacy abuse involving Meta and the Russian tech giant Yandex. They found that native Android apps—including Facebook, Instagram, and several Yandex apps such as Maps, Navi, Browser, and Search—silently listen on fixed local ports on mobile devices to de-anonymize users' browsing habits without consent.
June 3, 2025Source

Researchers: Meta and Yandex Broke Android Privacy
Web-to-App Pipeline Uses Meta Pixel and Yandex Metrica
June 3, 2025Source or Source or Source or Source or Source

RSA enhances passwordless identity platform
RSA announced a new Identity Security Posture Management (ISPM) and enhancements to its passwordless identity platform.
June 3, 2025Source

Scattered Spider: Three things the news doesn't tell you
With the recent attacks on UK retailers Marks & Spencer and Co-op, so-called Scattered Spider has been all over the media, with coverage spilling over into the mainstream news due to the severity of the disruption — currently looking like hundreds of millions in lost profits for M&S alone.
June 3, 2025Source

Securing Software Created by AI Agents: The Next Security Paradigm
Agentic AI can autonomously write and deploy code, creating new security risks that demand human oversight and robust safeguards.
June 3, 2025Source

Silence, Security, Speed — This Antivirus Checks Every Box
ESET NOD32 2025's AI and cloud-powered scanning detect threats faster — and more accurately — than legacy tools.
June 3, 2025Source

The UK Brings Cyberwarfare Out of the Closet
The UK's 2025 Strategic Defence Review outlines a unified approach to modern warfare, integrating cyber, AI, and electromagnetic capabilities across military domains.
June 3, 2025Securing Software Created by AI Agents: The Next Security Paradigm
Agentic AI can autonomously write and deploy code, creating new security risks that demand human oversight and robust safeguards.
June 3, 2025
Source

" target="new" class="RM1">Source

Vendor email compromise attacks get more effective in large enterprises
Drawing on behavioral data from over 1,400 organizations worldwide, the report reveals the extent to which employees are actively engaging with advanced text-based threats like vendor email compromise (VEC) and explores the blind spots attackers are exploiting with highly targeted, socially engineered attacks.
June 3, 2025Source

Why Scamming Can't Be Stopped—But It Can Be Managed
With crime-as-a-service lowering the barrier to entry and prosecution lagging behind, enterprise security teams must rethink their strategies to detect and disrupt scams at scale.
June 3, 2025Source

Zero Networks Lands $55M Series C to Drive Zero Trust Growth
Florida Vendor Set to Reach $100M ARR by 2027 With Identity Segmentation, ZTNA Push
June 3, 2025Source or Source

Internet — Security Issues — May 30th, 2025

Autonomous Payment or Anarchy? AI Gets Purchasing Power
As Visa and Mastercard Deploy AI Agents, Experts Ask: Who Holds the Receipt?
May 30, 2025Source or Source

Best VPNs for Android: 5 top picks for phones and tablets
There are tons of VPNs available for Android, but which ones are worth the subscription? Here are our top five picks.
May 30, 2025Source

Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments
China-linked hackers used a compromised government site to target other government entities with the ToughProgress malware that uses an attacker-controlled Google Calendar for C&C.
May 30, 2025Source

CISA Releases Guidance on SIEM and SOAR Implementation
The guidance outlines the benefits and challenges or SIEM and SOAR platforms, and shares implementation recommendations.
May 30, 2025Source

ConnectWise Discloses Suspected State-Sponsored Hack
The IT software provider says ScreenConnect users were impacted by the attack, which exploited a high-severity ASP.NET vulnerability.
May 30, 2025Source

Cybersecurity Firm SentinelOne Suffers Major Outage
After Hours-Long Disruption, XDR Vendor Promises Full Root Cause Analysis of Outage
May 30, 2025Source or Source or Source or Source or Source

Eight things we learned from WhatsApp versus NSO Group spyware lawsuit
On May 6, WhatsApp scored a major victory against NSO Group when a jury ordered the infamous spyware maker to pay more than $167 million in damages to the Meta-owned company.
May 30, 2025Source

ExpressVPN review 2025: Fast speeds and a low learning curve
Simple, undemanding apps make ExpressVPN near-ideal for everyday use.
May 30, 2025Source

Firebase, Google Apps Script Abused in Fresh Phishing Campaigns
Security researchers flag two phishing campaigns abusing Firebase and Google Apps Script to host malware and fake login pages.
May 30, 2025Source

Genetic Data: Emerging Cyberthreats and Privacy Concerns
Nicholas Morris of Optiv on the Potential for DNA Data Exploits by Cybercriminals
May 30, 2025Source or Source or Source or Source or Source

Germany doxxes Conti ransomware and TrickBot ring leader
The Federal Criminal Police Office of Germany (Bundeskriminalamt or BKA) claims that Stern, the leader of the Trickbot and Conti cybercrime gangs, is a 36-year-old Russian named Vitaly Nikolaevich Kovalev.
May 30, 2025Source

How we test VPNs
They all say they're the best — here's how we find out who's telling the truth.
May 30, 2025Source

ISMG Editors: Are We Less Secure Despite the AI Buzz?
Also: Deepfake Dangers with Veo 3; Claude Opus 4's Manipulative Edge
May 30, 2025Source or Source or Source

Linux Crash Dump Flaws Expose Passwords, Encryption Keys
Race-Condition Bugs in Ubuntu and Red Hat Tools Could Leak Sensitive Memory Data
May 30, 2025Source or Source or Source or Source or Source

Linux Zero-Day Vulnerability Discovered Using Frontier AI
Vulnerability Researchers: Start Tracking LLM Capabilities, Says Veteran Bug Hunter
May 30, 2025Source or Source or Source

MITRE Publishes Post-Quantum Cryptography Migration Roadmap
The roadmap provides an overview of four key stages of the migration process, namely preparation, baseline understanding, planning and execution, and monitoring and evaluation.
May 30, 2025Source

Preview: Hot Sessions at Infosecurity Europe 2025 in London
Ransomware, Quantum Computing, Geopolitics, Gen AI and More on the Agenda
May 30, 2025Source or Source or Source or Source

The best VPN service for 2025
These are the best virtual private networks out there, as reviewed and tested by experts.
May 30, 2025Source

US Sanctions Philippine Company for Supporting Crypto Scams
The US Treasury Department US has slapped sanctions on Funnull Technology for providing support to cryptocurrency investment scams.
May 30, 2025Source or Source or Source or Source or Source

Watch Now: Why Context is a Secret Weapon in Application Security Posture Management
Join the live webinar to understand why data in itself is not enough to make informed decisions for prioritization.
May 30, 2025Source

Zscaler, Netskope, Palo Alto Top SSE Gartner Magic Quadrant
Gartner0th, 2025

Internet — Security Issues — May 28th, 2025

364,000 Impacted by Data Breach at LexisNexis Risk Solutions
Data broker giant LexisNexis Risk Solutions says personal information was stolen from 364,000 people in a December 2024 data breach.
May 28, 2025Source

$223 Million Stolen in Cetus Protocol Hack
Hackers exploited a vulnerability in Cetus Protocol, a liquidity provider on the SUI blockchain.
May 28, 2025Source

A Peek Behind the Claude Curtain
Researcher Analyzes System Prompts to Show How New Claude Models Work
May 28, 2025Source or Source

Attack on LexisNexis Risk Solutions exposes data on 300k +
Data analytics and risk management biz says software dev platform breached, not itself
May 28, 2025Source

Attackers hit MSP, use its RMM software to deliver ransomware to clients
A threat actor wielding the DragonForce ransomware has compromised an unnamed managed service provider (MSP) and pushed the malware onto its client organizations via SimpleHelp, a legitimate remote monitoring and management (RMM) tool.
May 28, 2025Source

BalkanID IGA Lite reduces identity risk and ensures compliance
BalkanID has unveiled its self-service Identity Governance and Administration (IGA) Lite Platform, offering flexibility and transparent pricing.
May 28, 2025Source

Bitdefender versus McAfee: Which Antivirus Is Right for You?
Compare Bitdefender and McAfee to find the best antivirus for your needs. Discover features and make an informed choice.
May 28, 2025Source

Building a Security Portfolio Even When You're a Blue Teamer
Things to Include on Your CV When Your Job Focuses on Keeping Systems Running
May 28, 2025Source

Cerby Raises $40 Million for Identity Automation Platform
Identity security automation platform Cerby has raised $40 million in Series B funding to scale operations.
May 28, 2025Source

CISA's Leadership Exodus Continues, Shaking Local Offices
'It's Just Totally Destabilizing,' Staffers Say Amid CISA's Leadership Exodus
May 28, 2025Source or Source or Source or Source

Source

Czech Government Attributes Foreign Ministry Hack to China
APT31 Compromised the Czech Foreign Affairs Ministry in 2022
May 28, 2025SourceSource or Source or Source or Source or Source

Data broker giant LexisNexis says breach exposed personal information of over 364,000 people
LexisNexis Risk Solutions, a data broker that collects and uses consumers' personal data to help its paying corporate customers detect possible risk and fraud, has disclosed a data breach affecting more than 364,000 people.
May 28, 2025Source

Interlock ransomware gang deploys new NodeSnake RAT on universities
The Interlock ransomware gang is deploying a previously undocumented remote access trojan (RAT) named NodeSnake against educational institutes for persistent access to corporate networks.
May 28, 2025Source

MATLAB Maker MathWorks Recovering From Ransomware Attack
The incident impacted multiple web and mobile applications, licensing services, downloads and online store, website, wiki, MathWorks accounts, and other services.
May 28, 2025Source

New PumaBot botnet brute forces SSH credentials to breach devices
A newly discovered Go-based Linux botnet malware named PumaBot is brute-forcing SSH credentials on embedded IoT devices to deploy malicious payloads.
May 28, 2025Source

OneDrive Gives Web Apps Full Read Access to All Files
Security researchers warn that OneDrive's file sharing tool may grant third-party web apps access to all your files—not just the one you choose to upload.
May 28, 2025Source

PlainID announces Policy Management for Agentic AI
PlainID introduced Policy Management for Agentic AI. Securing the future with a solution that brings identity-aware, policy-based access control to the next generation of AI systems.
May 28, 2025Source

PumaBot Malware Targets Linux IoT Devices
Stealthy Malware Installs Cryptomining Software
May 28, 2025Source or Source< or Source or Source or Source

Quantum computers may crack RSA encryption with fewer qubits than expected
A team of researchers at AI Google Quantum AI, led by Craig Gidney, has outlined advances in quantum computer algorithms and error correction methods that could allow such computers to crack Rivest--Shamir--Adleman (RSA) encryption keys with far fewer resources than previously thought. The development, the team notes, suggests encryption experts need to begin work toward developing next-generation encryption techniques.
May 28, 2025Source

RadiantOne platform enhancements prevent identity-based attacks
Radiant Logic announced its new Identity Observability features as part of the RadiantOne platform.
May 28, 2025Source

Researchers find billions of browser cookies for sale on the dark web
Cybercriminals exploiting traditional web standards to commit fraud -- or worse
May 28, 2025Source

Revenue Cycle Management Firm's Data Breach Total Soars
ALN Medical Management Now Says 1.82 Million Affected in 2024 Hacking Incident
May 28, 2025Source or Source or Source

Russian IT pro sentenced to 14 years forced labor for sharing medical data with Ukraine
The latest in a long line of techies to face Putin's wrath
May 28, 2025Source

Security startup Horizon3.ai is raising $100M in new round
Horizon3.ai, a cybersecurity startup that provides tools like autonomous penetration testing, is seeking to raise $100 million in a new funding round and has locked down at least $73 million, the company revealed in an SEC filing this week.
May 28, 2025Source

Setting Up A PIN? Security Experts Warn To Avoid These 4-Digit Codes At All Costs
As tempting as it might be, avoid using 0000 as your four-digit PIN code. Same goes for 1010, 1111, 1122, and 1212, which comprises the top five worst PIN codes, according to a list compiled by security experts. Just like a password, you should avoid using PIN codes that are commonly used.
May 28, 2025Source

The Root of AI Hallucinations: Physics Theory Digs Into the 'Attention' Flaw
Physicist Neil Johnson explores how fundamental laws of nature could explain why AI sometimes fails—and what to do about it.
May 28, 2025Source

Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites
Mandiant warns that a Vietnamese hacking group tracked as UNC6032 is distributing malware via fake AI video generator websites.
May 28, 2025Source

Vulnerabilities in CISA KEV Are Not Equally Critical: Report
New report says organizations should always consider environmental context when assessing the impact of vulnerabilities in CISA KEV catalog.
May 28, 2025Source

Internet — Security Issues — May 27th, 2025

Adidas warns of data breach after customer service provider hack
German sportswear giant Adidas disclosed a data breach after attackers hacked a customer service provider and stole some customers' data.
May 27, 2025Source or Source

Almost half of enterprise apps don't handle credentials securely
A new report from Orchid Security shows nearly half of enterprise applications violate basic credential-handling guidance, with 44 percent undermining centralized identity provider (IdP) policies and 40 percent falling short of widely accepted identity-control standards.
May 27, 2025Source

Cancer Center Pays Patients $11.5M in Double-Extortion Hack
Some Patients Threatened Directly by Hackers; Center to Spend $13.5M on Security
May 27, 2025Source or Source or Source

Check Point Buys Startup Veriti to Advance Threat Management
Open Garden Strategy, Automated Risk Remediation to Get a Boost With Veriti Buy
May 27, 2025Source or Source or Source or Source

DragonForce ransomware abuses SimpleHelp in MSP supply chain attack
The DragonForce ransomware operation successfully breached a managed service provider and used its SimpleHelp remote monitoring and management (RMM) platform to steal data and deploy encryptors on downstream customers' systems.
May 27, 2025Source or Source

Dutch intelligence agencies say Russian hackers stole police data in cyberattack
A previously unknown Russian hacker group with suspected ties to the Kremlin was responsible for a cyberattack last year on the Dutch police and has also targeted other Western nations that deliver military support to Ukraine, intelligence agencies announced Tuesday.
May 27, 2025Source or Source

Fake AI Tools Lure Users in Year-Long Malware Campaign
Mandiant Says Malware Spread Through Fake AI Video Ads Seen by Millions
May 27, 2025Source

FrodoKEM: A conservative quantum-safe cryptographic algorithm
In this post, we describe FrodoKEM, a key encapsulation protocol that offers a simple design and provides strong security guarantees even in a future with powerful quantum computers.
May 27, 2025Source

How Threat Modeling, Actor Attribution Grow Cyber Defenses
As cyber threats continue to grow and evolve, U.S. State, Local, Tribal, and Territorial (SLTT) government organizations must implement proactive steps to secure systems, data, and infrastructure before cyber threat actors (CTAs) strike. Two important components of proactive defense are threat modeling and threat actor attribution. Understanding an organization's attack surface and anticipating how CTAs will exploit vulnerabilities or conduct cyber attacks can help organizations align their security practices with real-world attack scenarios.
May 27, 2025Source

Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack
Sina Gholinejad pleaded guilty to computer-fraud and wire-fraud-conspiracy charges linked to the Robbinhood ransomware hit on Baltimore.
May 27, 2025Source

Iranian pleads guilty to RobbinHood ransomware attacks, faces 30 years
An Iranian national has pleaded guilty to participating in the Robbinhood ransomware operation, which was used to breach the networks, steal data, and encrypt devices of U.S. cities and organizations in an attempt to extort millions of dollars over a five-year span.
May 27, 2025Source

Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next
As cloud security spending surges to $111 billion, new data highlights Microsoft's dominance, the U.S. market's outsized role, and Google's strategic acquisition of Wiz.
May 27, 2025Source

Kettering Health says radiation oncology is back online after ransomware attack
Less than a week after a cyberattack caused the Ohio-based health system to shut down some of its care offerings, cancer patients again have access to radiotherapy treatments.
May 27, 2025Source

'Kisses from Prague': The fall of a Russian ransomware giant
The sudden fall of a ransomware supplier once described as the world's most harmful cybercrime group has raised questions about Moscow's role in its development and the fate of its founder.
May 27, 2025Source

Law Firms Warned of Silent Ransom Group Attacks
The FBI warns US law firms that the Silent Ransom Group (SRG) has been constantly targeting the legal industry.
May 27, 2025Source

MATLAB dev confirms ransomware attack behind service outage
MathWorks, a leading developer of mathematical computing and simulation software, has revealed that a recent ransomware attack is behind an ongoing service outage.
May 27, 2025Source

Meta Begins AI Training Using EU Personal Data
German Court Rebuffs Consumer Group Bid for Injunction
May 27, 2025Source

Microsoft releases Defender update to improve the security of your Windows installation images
Having Windows installation images is handy; they can be used to reinstall your operating system, but they are also useful when creating virtual machines. Microsoft is concerned about their safety, however.
May 27, 2025Source

Microsoft, Dutch security agencies lift veil on Laundry Bear cyber espionage group
The Dutch intelligence and security services have identified a new Russia-affiliated threat group that has been breaching government organizations and commercial entities in Europe and North America, and they dubbed it Laundry Bear.
May 27, 2025Source

New MCP server from groundcover redefines LLM observability
A new MCP server, faster than any other on the market, is launching today from groundcover, the eBPF-driven observability platform. Developers can now enhance their AI-driven workflows with deep system context, powered by groundcover's granular access to logs, metrics, and traces via eBPF.
May 27, 2025Source

Ongoing Campaign Uses 60 NPM Packages to Steal Data
Security firm Socket warns flags a campaign targeting NPM users with tens of malicious packages that can hijack system information.
May 27, 2025Source

Patched GitLab Duo Flaws Risked Code Leak, Malicious Content
Prompt Injection, HTML Output Rendering Could Be Used for Exploit
May 27, 2025Source

Record-breaking performance in data security achieved with quantum mechanics
A joint team of researchers led by scientists at King Abdullah University of Science and Technology (KAUST) and King Abdulaziz City for Science and Technology (KACST) has reported the fastest quantum random number generator (QRNG) to date based on international benchmarks. The QRNG, which passed the required randomness tests of the National Institute of Standards and Technology, could produce random numbers at a rate nearly a thousand times faster than other QRNG.
May 27, 2025Source

RobbinHood Ransomware Hacker Pleads Guilty in US Court
A RobbinHood Attack Against Baltimore Cost City $19 Million
May 27, 2025Source or Source or Source or Source

Russian Government Hackers Caught Buying Passwords from Cybercriminals
Microsoft flags a new Kremlin hacking team buying stolen usernames and passwords from infostealer markets for use in cyberespionage attacks.
May 27, 2025Source

Russian Laundry Bear cyberspies linked to Dutch Police hack
​A previously unknown Russian-backed cyberespionage group tracked as Laundry Bear has been linked to a September 2024 Dutch police security breach.
May 27, 2025Source

Salt Typhoon Believed to Be Behind Commvault Data Breach
CISA Advisory Says Threat Actors Stole App Secrets in Azure-Hosted Backup Platform
May 27, 2025Source or Source or Source or Source

Secure encryption and decryption with luminescent perovskites
To guarantee high data security, encryption must be unbreakable while the data remains rapidly and easily readable. A novel strategy for optical encryption/decryption of information has now been introduced in the journal Angewandte Chemie by a Chinese research team. It is based on compounds with carefully modulated luminescent properties that change in response to external stimuli.
May 27, 2025Source

Summer Is Almost Here. Here's How to Check for Skin Cancer Signs
Who doesn't love spending more time in the summer sun? However, it's important to protect your skin and check for signs of skin cancer.
May 27, 2025Source

The Seven Pillars of a Secure AI Strategy
Framework for Moving From Scattered Tools to Unified AI Security Strategies
May 27, 2025Source or Source or Source

Wilms tumors: How genes and imprinting pave the way for cancer
A research team at the University of Würzburg has gained new insights into the development of kidney tumors in young children. These enable a better risk assessment and could form the basis for targeted screening and improved early detection.
May 27, 2025Source

Zscaler to Acquire MDR Specialist Red Canary
Zscaler signals a big push into the security-operations market with the announcement of plans to buy Denver-based Red Canary.
May 27, 2025Source

Internet — Security Issues — May 23rd, 2025

3AM Ransomware Gang Hacks Networks With Spoofed IT Calls And Email Bombing
A recent campaign by 3AM ransomware actors found the team using more proactive techniques rather than simple opportunistic hacks by pretending to be IT support. Using a combination of email bombing and spoof IT support calls, unwitting employees dropped their guards, giving the attackers access to their terminals (and thus, corporate systems). From there, the actors were free to deploy whatever nefarious payload they desired.
May 23, 2025Source

Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
CVE-2025-4427 and CVE-2025-4428 -- the two Ivanti Endpoint Manager Mobile (EPMM) vulnerabilities that have been exploited in the wild as zero-days and patched by Ivanti last week -- are being leveraged by a Chinese cyber espionage group that has been exploiting zero-days in edge network appliances since at least 2023, EcleticIQ researchers have shared.
May 23, 2025Source

Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors
A Chinese espionage group has been chaining two recent Ivanti EPMM vulnerabilities in attacks against organizations in multiple critical sectors.
May 23, 2025Source

Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks
A Chinese threat actor exploited a zero-day vulnerability in Trimble Cityworks to hack local government entities in the US.
May 23, 2025Source

Cognyte Adds GroupSense in $4M Threat Intelligence Deal
Buyout Targets Deeper US Penetration, Digital Risk Intel, Ransomware Defense
May 23, 2025Source or Source or Source or Source or Source

Companies Warned of Commvault Vulnerability Exploitation
CISA warns companies of a widespread campaign targeting a Commvault vulnerability to hack Azure environments.
May 23, 2025Source

DanaBot Botnet Disrupted, 16 Suspects Charged
The DanaBot botnet ensnared over 300,000 devices and caused more than $50 million in damages before being disrupted
May 23, 2025Source or Source

Disaster or digital spectacle? The dangers of using floods to create social media content
Amid the chaos, videos posted on social media show people deliberately entering or standing above swollen rivers and flooded roads. It is a pattern of dangerous behavior that occurs frequently during natural disasters in Australia.
May 23, 2025Source

Dozens of malicious packages on NPM collect host and network data
60 packages have been discovered in the NPM index that attempt to collect sensitive host and network data and send it to a Discord webhook controlled by the threat actor.
May 23, 2025Source

Editors' Panel: CrowdStrike Legal Storm Signals Bigger Risks
Also: Privacy on the Line in 23andMe Sale; Google Leads Cyber Aid Charge
May 23, 2025Source or Source or Source or Source or Source

FBI warns of Luna Moth extortion attacks targeting law firms
The FBI warned that an extortion gang known as the Silent Ransom Group has been targeting U.S. law firms over the last two years in callback phishing and social engineering attacks.
May 23, 2025Source

Feds charge 16 Russians allegedly tied to botnets used in cyberattacks and spying
An example of how a single malware operation can enable both criminal and state-sponsored hacking.
May 23, 2025Source

Hacker steals $223 million in Cetus Protocol cryptocurrency heist
The decentralized exchange Cetus Protocol announced that hackers have stolen $223 million in cryptocurrency and is offering a deal to stop all legal action if the funds are returned.
May 23, 2025Source

In Other News: Volkswagen App Hacked, DR32 Sentenced, New OT Security Solution
Noteworthy stories that might have slipped under the radar: serious vulnerabilities found in a Volkswagen app, Australian hacker DR32 sentenced in the US, and Immersive launches OT security training solution.
May 23, 2025Source

Malware-as-a-Service (MaaS) Hits 390K+ PCs in 3 Months as Microsoft Fights Back
Lumma Stealer is software made to secretly steal personal and organizational information from computers.
May 23, 2025Source

Massive data breach exposes 184 million passwords for Google, Microsoft, Facebook, and more
The file was unencrypted. No password protection. No security. Just a plain text file with millions of sensitive pieces of data.
May 23, 2025Source

NC Pathology Practice Notifying 236,000 of Data Theft Hack
Did Marlboro-Chesterfield Pathology Pay Cybercrime Gang Safepay a Ransom?
May 23, 2025Source or Source or Source or Source or Source

NordVPN Review 2025: Fast, Private and Excellent for Streaming
Whether you just want to stream Netflix or have serious privacy needs, NordVPN is a fast, user-friendly and full-featured virtual private network.
May 23, 2025Source

On Demand: Threat Detection & Incident Response (TDIR) Summit
SecurityWeek's 2025 Threat Detection & Incident Response (TDIR) Summit took place as a virtual summit on May 21st.
May 23, 2025Source

Oversharing online? 5 ways it makes you an easy target for cybercriminals
Here's why scammers and other malicious actors love when you share details about your life on social media.
May 23, 2025Source

Police Tout Darknet Global Takedown 'Operation RapTor'
Global Collaboration Leads to Drug, Firearm Bust
May 23, 2025Source

Preventing cybersecurity stagnation through breach containment
In cybersecurity, this saying has never been more fitting. We've seen years of increased investment, a figure Gartner estimates will reach $212 billion this year, yet the cost of breaches continues to rise, reaching $4.8 million in 2024. That's 10 percent higher than 2023, according to IBM.
May 23, 2025Source

Proactive Security in Distributed Systems: A Developer's Approach
Distributed systems require early security focus to avoid reworks. This article explores trends and developer defense approaches.
May 23, 2025Source

Proof of Concept: Rethinking Identity for the Age of AI Agents
Identity Experts Adam Preis and Troy Leach
May 23, 2025Source or Source or Source or Source or Source

Ransomware scum leaked Nova Scotia Power customers' info
Bank accounts, personal details all hoovered up in the attack
May 23, 2025Source

Russian Qakbot Gang Leader Indicted in US
Russian national Rustam Gallyamov was indicted in the US for his leading role in the development and distribution of Qakbot malware.
May 23, 2025Source

Signal Adds Screenshot-Blocker to Thwart 'Windows Recall'
Signal said the privacy feature is on by default for every Windows 11 user to block Microsoft from taking screenshots for Windows Recall.
May 23, 2025Source

TikTok videos + ClickFix tactic = Malware infection
Malware peddlers are using TikTok videos and the ClickFix tactic to trick users into installing infostealer malware on their computers, Trend Micro researchers have warned.
May 23, 2025Source

TikTok's DIY Malware Trend Is Peak Internet Stupidity
TikTok is known for viral dances and quirky challenges, but now it might be known for spreading malware. According to recent reports, some TikTok videos are being used to distribute information-stealing malware, through tactic called "ClickFix".
May 23, 2025Source

Token Security unveils MCP Server for non-human identity security
Token Security launched Model Context Protocol (MCP) Server for non-human identity (NHI).
May 23, 2025Source

UK Legal Aid Agency Hack Imperils Representation
British law firms representing low-income criminal defendants and civil litigants are having to work for free for weeks or decline new cases as the fallout of a cyberattack against the U.K. Legal Aid Agency forced the agency to yank its online portal offline.
May 23, 2025Source

Internet — Security Issues — May 22nd, 2025

7 warning signs your computer was hacked — and what to do
If something doesn't seem right, it's time to run some scans.
May 22, 2025Source

A huge unsecured credential database discovery is a great reminder to change your passwords
It may not have literally exposed 184 million people, but it's still a threat.
May 22, 2025Source

Akamai, Microsoft Disagree on Severity of Unpatched 'BadSuccessor' Flaw
Akamai documents a privilege escalation flaw in Windows Server 2025 after Redmond declines to ship an immediate patch.
May 22, 2025Source

Analyzing Techniques to Provision Access via IDAM Models During Emergency and Disaster Response
Exploring and analyzing the scope, benefits, and use cases of different access control models during emergency and disaster response.
May 22, 2025Source

Apple logins with plain text passwords found in massive database of 184M records
Apple login credentials were among a massive database of 184 million records found sitting unprotected on a web server. Other logins included Facebook, Google, Instagram, Microsoft, and PayPal.
May 22, 2025Source

Authorities carry out global takedown of infostealer used by cybercriminals
Authorities, along with tech companies including Microsoft and Cloudflare, say they've disrupted Lumma.
May 22, 2025Source

BadSuccessor: Abusing dMSA to elevate privileges in Active Directory
Delegated Managed Service Accounts (dMSAs) have been introduced in Windows Server 2025. These are service accounts for the Active Directory (AD) that are intended to enable new functions. Security researchers have now discovered that by misusing dMSAs, attackers can take over any principal in the domain.
May 22, 2025Source

Breach Roundup: US Indicts Qakbot Malware Leader
Also: Signal Blocks Recall, Europe Sanctions Stark Industries
May 22, 2025Source or Source or Source or Source

Bribery-Led Coinbase Hack Affects 70,000 Crypto Customers
Hacker Demanded $20M Ransom to Delete Stolen Personal, Financial Information
May 22, 2025Source or Source

Chinese snoops tried to break into US city utilities, says Talos
Intrusions began weeks before Trimble patched the Cityworks hole
May 22, 2025Source or Source

Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities
Cisco published 10 security advisories detailing over a dozen vulnerabilities, including two high-severity flaws in its Identity Services Engine (ISE) and Unified Intelligence Center.
May 22, 2025Source

Coinbase Reveals Over 69,000 People Had Their Data Exposed in a Breach. Take These Steps Now
Coinbase refused to pay the $20M ransom for data that included names, emails and partial Social Security numbers. However, the company will cover any losses incurred.
May 22, 2025Source

Credit Washing and Synthetic ID Fraud Hit All-Time High
Auto Lending Sector Is Hardest Hit by Scammers Using Synthetic Identities
May 22, 2025Source

Cryptohack Roundup: 12 Charged in $263M Theft Case
Also: Charges in Unicoin Case, Jury Convicts SafeMoon Ex-CEO
May 22, 2025Source or Source or Source or Source or Source

DDoS and IP transit: Why integration is the smart choice for modern connectivity
As Distributed Denial of Service (DDoS) attacks grow in both frequency and sophistication, organizations are being forced to re-evaluate their defensive strategies. Gone are the days when a standalone DDoS mitigation service tacked onto your infrastructure was enough for peace of mind.
May 22, 2025Source

Destructive malware available in NPM repo went unnoticed for 2 years
Payloads were set to spontaneously detonate on specific dates with no warning.
May 22, 2025Source

FTC finalizes order requiring GoDaddy to secure hosting services
The U.S. Federal Trade Commission (FTC) has finalized an order requiring web hosting giant GoDaddy to secure its services to settle charges of data security failures that led to several data breaches since 2018.
May 22, 2025Source

German Cyber Agency Sounds Warning on Grid Vulnerabilities
BSI Cites New Technologies, Geopolitical Tensions as Key Risk Factors
May 22, 2025Source or Source or Source or Source or Source

Hackers use fake Ledger apps to steal Mac users' seed phrases
Cybercriminal campaigns are using fake Ledger apps to target macOS users and their digital assets by deploying malware that attempts to steal seed phrases that protect access to digital cryptocurrency wallets.
May 22, 2025Source

How to safeguard your small business in the hybrid work era: 5 top cybersecurity solutions
Your best cybersecurity strategy is all about balancing risk and affordability. Keep these five solutions in mind.
May 22, 2025Source

How a global malware operation was taken down from a federal court in Georgia
The messages seemed innocuous, mundane even. Someone posing as a prospective guest emailed a hotel questions about a purported comment left on Booking.com. Another message was supposedly from that third-party booking site to review negative guest feedback.
May 22, 2025Source

Marks & Spencer Expects Ransomware Attack to Cost $400 Million
UK retailer Marks & Spencer expects the disruptions caused by the recent cyberattack to continue through July.
May 22, 2025Source

Marlboro-Chesterfield Pathology Data Breach Impacts 235,000 People
Marlboro-Chesterfield Pathology has been targeted by the SafePay ransomware group, which stole personal information from its systems.
May 22, 2025Source

Scammers Troll DNS Records for Abandoned Cloud Accounts
'Hazy Hawk' Behind a Rash of Domain Hijackings
May 22, 2025Source or Source

Shields Health to Pay $15.35M to Settle Lawsuit in 2022 Hack
Medical Imaging Provider's Data Theft Incident Affected Nearly 2.4M Individuals
May 22, 2025Source or Source or Source

StackHawk raises $12 million to help security teams tackle AI-powered dev cycles
StackHawk, the shift-left API security platform, announced it has taken on $12 million in additional funding from Sapphire and Costanoa Ventures to help security teams keep up with the pace of AI-driven development.
May 22, 2025Source

Unpatched Windows Server vulnerability allows full domain compromise
A privilege escalation vulnerability in Windows Server 2025 can be used by attackers to compromise any user in Active Directory (AD), including Domain Admins.
May 22, 2025Source

Unsecured Database Exposes 184 Million Login Credentials, Including From Multiple Governments
It's been found that hundreds of credentials from Facebook, Google, Instagram, Roblox, Discord, Microsoft, Netflix, PayPal, and other major platforms have been compromised.
May 22, 2025Source

What the AI Boom Reveals About Cybersecurity Careers
Cyber Education Needs to Go Beyond the Checklist to Prepare Future Professionals
May 22, 2025Source or Source or Source or Source or Source

Internet — Security Issues — May 13th, 2025

Adobe Patches Big Batch of Critical-Severity Software Flaws
Adobe Patch Tuesday headlined by a major Adobe ColdFusion update patching a wide swatch of code execution and privilege escalation attacks.
May 13, 2025Source

AI agents can be manipulated into giving away your crypto, according to Princeton researchers
The attackers plant false memories to override security defenses.
May 13, 2025Source

AI Drives Smarter Zero-Trust Rollouts
Two Experts Discuss Pros and Cons of Using AI in a Zero-Trust Framework
May 13, 2025Source or Source or Source or Source or Source

Ascension: Software Exploit Breach Affects Nearly 440,000
Former Business Partner's Third-Party Software at Center of Hospital Chain's Incident
May 13, 2025Source or Source or Source or Source

Best VPN services: 8 top picks for every VPN need
There are a lot of VPN options out there; we'll help you cut through the clutter.
May 13, 2025Source

CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor
An information exposure flaw in TeleMessage has been added to CISA's Known Exploited Vulnerabilities catalog.
May 13, 2025Source

Commvault fixes critical Command Center issue after flaw finder alert
Pay-to-play security on CVSS 10 issue is now fixed
May 13, 2025Source

Customer data stolen in Marks & Spencer cyberattack
British retailer Marks & Spencer said on Tuesday that some personal data of its customers was stolen in a cyberattack that has crippled its online services for weeks.
May 13, 2025Source

Customers shocked as VPN firm axes lifetime subscriptions, says it had no idea they existed
For years, customers looking for a one-time purchase for lasting online security saw "lifetime" deals for VPN services pop up on various tech platforms, often promoted through deal partners. This included widespread offers for a VPNSecure subscription, presented at the time as a reliable service with features like "no logging, ever!" and strong encryption.
May 13, 2025Source

Cyberhaven Taps Product Chief Nishant Doshi as Interim CEO
CEO Howard Ting's Resignation Comes as Data Protection Company Hits $1B Valuation
May 13, 2025Source or Source or Source or Source or Source

How we think about protecting data: Game-based study reveals how context shapes decisions
How should personal data be protected? What are the best uses of it? In our networked world, questions about data privacy are ubiquitous and matter for companies, policymakers, and the public.
May 13, 2025Source

Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)
Attackers have exploited vulnerabilities in open-source libraries to compromise on-prem Ivanti Endpoint Manager Mobile (EPMM) instances of a "very limited" number of customers, Ivanti has confirmed on Tuesday, and urged customers to install a patch as soon as possible.
May 13, 2025Source or Source or Source

Keyfactor Bolsters Quantum Readiness With Dual Acquisitions
Real-Time, Deep Cryptographic Discovery Added to Certificate Automation Portfolio
May 13, 2025Source or Source or Source or Source

Kosovar Man in Tampa Jail for Running Online Illicit Bazaar
Prosecutors Say Liridon Masurica Ran BlackDB.cc
May 13, 2025Source or Source or Source or Source or Source

Lenovo introduces ThinkShield Solutions to secure organizations with limited IT resources
Lenovo introduced ThinkShield Solutions, security offerings tailored to protect small and medium sized business (SMBs), schools, and other organizations with limited IT resources facing significant risks.
May 13, 2025Source

Orca Snaps Up Opus in Cloud Security Automation Push
Orca positioned the deal as an expansion of its capabilities into the realm of AI-based autonomous remediation and prevention.
May 13, 2025Source

Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying
A Turkey-affiliated espionage group has exploited a zero-day vulnerability in Output Messenger since April 2024.
May 13, 2025Source

Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
On May 2025 Patch Tuesday, Microsoft has released security fixes for 70+ vulnerabilities, among them five actively exploited zero-days and two publicly disclosed (but not exploited) vulnerabilities.
May 13, 2025Source

Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023
The Radware Cloud WAF product vulnerabilities disclosed by CERT/CC were addressed two years ago.
May 13, 2025Source

Ransomware attacks up over 120 percent in two years
Between April 2024 and March 2025, ransomware attacks escalated with unpredictable campaigns across a wide range of industries. The number of publicly disclosed victims also saw a 24 percent increase from the previous year.
May 13, 2025Source

SAP Patches Another Exploited NetWeaver Vulnerability
SAP has released 16 new security notes on its May 2025 Security Patch Day, including a note dealing with another critical NetWeaver vulnerability exploited in attacks.
May 13, 2025Source or Source

Security awareness training programs fall short of business needs
Although 99 percent of organizations responding to a new survey suffered a security incident tied to human error in the past year, the majority state that they struggle to implement effective, scalable security awareness training (SAT) programs that reduce this risk.
May 13, 2025Source

Security flaw found in GIMP! Avoid opening this file type until it's fixed
A security vulnerability involving one image file type can allow malicious code to be executed on your system.
May 13, 2025Source

Seven things we learned from WhatsApp versus NSO Group spyware lawsuit
On Tuesday, WhatsApp scored a major victory against NSO Group when a jury ordered the infamous spyware maker to pay more than $167 million in damages to the Meta-owned company.
May 13, 2025Source

Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments
CTI, digital brand protection and other cyber risk initiatives shouldn't only be utilized by security and cyber teams.
May 13, 2025Source

Suspected DoppelPaymer Ransomware Group Member Arrested
A 45-year-old individual was arrested in Moldova for his suspected involvement in DoppelPaymer ransomware attacks.
May 13, 2025Source

Tracking Bugs: European Vulnerability Database Goes Live
EU Cybersecurity Agency-Run EUVD Tracks Mitigation Measures, Exploitation Status
May 13, 2025Source or Source or Source or Source or Source

Trump Ousts Copyright Chief Amid AI Fair Use Clash
Perlmutter Out After Draft Report Calls Fair Use Into Question for AI Training
May 13, 2025Source or Source or Source or Source or Source

Tufin TOS Discovery automates device discovery and onboarding
Tufin launched Tufin Orchestration Suite (TOS) Discovery, a new solution that helps security teams ensure their network topology is always accurate and up-to-date.
May 13, 2025Source

Turkish Group Hacks Zero-Day Flaw to Spy on Kurdish Forces
Microsoft Researchers Link Turkish Spy Group to Output Messenger Zero-Day Hack
May 13, 2025Source or Source or Source or Source or Source

Twilio denies breach following leak of alleged Steam 2FA codes
Twilio has denied in a statement for BleepingComputer that it was breached after a threat actor claimed to be holding over 89 million Steam user records with one-time access codes.
May 13, 2025Source

VPN company cancels 'lifetime' plans for customers who already paid for the service
A perfect encapsulation of the danger of so-called "lifetime deals."
May 13, 2025Source or Source

Welcome to the age of paranoia as deepfakes and scams abound
AI-driven fraud is leading people to verify every online interaction they have.
May 13, 2025Source

Why conventional disaster recovery won't save you from ransomware
The conventional formula for maintaining business continuity in the face of unexpected IT disruptions is as follows: Back up your data. Make a recovery plan. Test the recovery plan periodically.
May 13, 2025Source

Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday
Patch Tuesday: Microsoft patches at least 70 security bugs and flagged five zero-days in the "exploitation detected" category.
May 13, 2025Source

Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)
Fortinet has patched a critical vulnerability (CVE-2025-32756) that has been exploited in the wild to compromise FortiVoice phone / conferencing systems, the company's product security incident response team has revealed on Tuesday.
May 13, 2025Source

Internet — Security Issues — May 9th, 2025

160,000 Impacted by Valsoft Data Breach
VMS firm Valsoft Corporation says the personal information of over 160,000 people was compromised in a February 2025 data breach.
May 9, 2025Source

A DOGE Engineer Was Hacked and His Login Details Are Online
Not just once either. His details have been freely available online for years.
May 9, 2025Source

Ascension says recent data breach affects over 430,000 patients
Ascension, one of the largest private healthcare systems in the United States, has revealed that the personal and healthcare information of over 430,000 patients was exposed in a data breach disclosed last month.
May 9, 2025Source

AWS Pushes AI-Powered Threat Detection With Key Partners
Partners Use Bedrock, SageMaker for Threat Detection, Response, Vital to Innovation
May 9, 2025Source or Source or Source or Source or Source

Chinese hackers behind attacks targeting SAP NetWeaver servers
Forescout Vedere Labs security researchers have linked ongoing attacks targeting a maximum severity vulnerability impacting SAP NetWeaver instances to a Chinese threat actor.
May 9, 2025Source

CIS Benchmarks May 2025 Update
The following CIS Benchmarks® and CIS Build Kits have been updated or recently released. We've highlighted the major updates below. Each Benchmark and Build Kit includes a full changelog that references all changes.
May 9, 2025Source

Company and Personal Data Compromised in Recent Insight Partners Hack
VC firm Insight Partners is informing partners and employees that their information was exposed in the January 2025 cyberattack.
May 9, 2025Source

Cybersecurity readiness stays low as AI attacks increase
Only four percent of organizations worldwide have achieved the 'mature' level of readiness required to effectively withstand today's cybersecurity threats, even as hyperconnectivity and AI introduce new complexities for security practitioners.
May 9, 2025Source

CyberUK 2025: Resilience and APT Threats Loom Large
Government Officials Sound 'Wake Up' Alarms
May 9, 2025Source or Source or Source or Source

Does Antivirus Software Collect Your Data? Yes, But Here's Why You Shouldn't Worry
Are antivirus software applications spying on you? Here's what the researchers have to say about potential security concerns.
May 9, 2025Source

Fake AI platforms deliver malware diguised as video content
A clever malware campaign delivering the novel Noodlophile malware is targeting creators and small businesses looking to enhance their productivity with AI tools.
May 9, 2025Source

FBI and Dutch police seize and shut down botnet of hacked routers
A joint international law enforcement action shut down two services accused of providing a botnet of hacked internet-connected devices, including routers, to cybercriminals. U.S. prosecutors also indicted four people accused of hacking into the devices and running the botnet.
May 9, 2025Source

Feds Seize Domains in Global Proxy Botnet Crackdown
Russian, Kazakh Hackers Charged in $46 Million Proxy Botnet Scheme
May 9, 2025Source or Source or Source or Source or Source

Germany takes down eXch cryptocurrency exchange, seizes servers
The Federal police in Germany (BKA) seized the server infrastructure and shut down the 'eXch' cryptocurrency exchange platform for alleged money laundering cybercrime proceeds.
May 9, 2025Source

Google just gave Chrome and Android a secret weapon against online scams
Scammers are using AI to trick you, but Google is using AI to stop them first.
May 9, 2025Source

Google Password Manager for Android Will Automatically Upgrade Your Passwords to Passkeys
It's not crazy: According to Microsoft, 98% of passkey login attempts are successful, compared with only 32% for passwords.
May 9, 2025Source

Immutable Secrets Management: A Zero-Trust Approach to Sensitive Data in Containers
Immutable secrets and Zero-Trust on Amazon Web Services boost container security, delivery, and resilience, aligning with ChaosSecOps for DevOps awards.
May 9, 2025Source

In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak
Noteworthy stories that might have slipped under the radar: surge in cyberattacks between India and Pakistan, Radware cloud WAF vulnerabilities, xAI key leak.
May 9, 2025Source

India Tells Financial Sector to Strengthen Cyber Defenses
Old Visuals, AI Deepfakes and Fake Claims Go Viral Amid Escalating Conflict
May 9, 2025Source or Source or Source or Source

ISMG Editors: CISA Cuts and US Cyber Plan Raise Alarms
Also: Cyber IPOs and the Investment Climate, the Urgency of AI Explainability
May 9, 2025Source or Source or Source or Source or Source

Leaked document reveals more about Eufy's first smart display
Here's what to expect from the 8-inch tablet-like touchscreen device, which has a battery for added portability.
May 9, 2025Source

LockBit hacked: What does the leaked data show?
The affiliate panel of the infamous LockBit Ransomware-as-a-Service (RaaS) group has been hacked and defaced, showing a link to a MySQL database dump ostensibly containing leaked data relating to the group's operations:
May 9, 2025Source or Source

Malicious NPM Packages Target Cursor AI's macOS Users
Three NPM packages posing as developer tools for Cursor AI code editor's macOS version contain a backdoor.
May 9, 2025Source

Mature But Vulnerable: Pharmaceutical Sector's Cyber Reality
Joshua Mullen of Booz Allen Hamilton on Industry's Top Cyber Challenges
May 9, 2025Source or Source or Source or Source or Source

Mistral AI Models Fail Key Safety Tests, Report Finds
Pixtral Models 60 Times More Likely to Generate Harmful Content Than Rivals
May 9, 2025Source or Source or Source or Source or Source

Mobile security matters: Protecting your phone from text scams
It all starts so innocently. You get a text saying "Your package couldn't be delivered. Click here to reschedule." Little do you know, clicking that link could open the door for scammers to steal your identity, empty your bank account, or even plant malicious software (malware) on your device. Unless you know what to look out for, one little tap on the wrong text could cost you money and peace of mind.
May 9, 2025Source

New KnowBe4 CEO Bryan Palma Combats Human Risk Via AI Agents
Strategic Plan Includes Human Risk Management Platform Expansion, IPO Preparation
May 9, 2025Source or Source or Source or Source or Source

Police dismantles botnet selling hacked routers as residential proxies
Law enforcement authorities have dismantled a botnet that infected thousands of routers over the last 20 years to build two networks of residential proxies known as Anyproxy and 5socks.
May 9, 2025Source

Popular Scraping Tool's NPM Package Compromised in Supply Chain Attack
Supply chain attack compromises the popular rand-user-agent NPM package to deploy and activate a backdoor.
May 9, 2025Source

Rising Tides: Kelley Misata on Bringing Cybersecurity to Nonprofits
Sightline Security's founder explains why nonprofits need cybersecurity solutions tailored to their unique missions — and why vendors need to listen.
May 9, 2025Source

SAP Zero-Day Targeted Since January, Many Sectors Impacted
Hundreds of SAP NetWeaver instances hacked via a zero-day that allows remote code execution, not only arbitrary file uploads, as initially believed.
May 9, 2025Source

Significant Gap Exists in UK Cyber Resilience Efforts
Threat Outpaces Government's Ability to Keep Pace, Says Parliamentary Committee
May 9, 2025Source

The best no-log VPNs of 2025: These VPNs provide security, safety, and collect minimal user data
Trust is fragile, especially when it comes to security software. I've tested the best no-log VPNs, which claim not to keep records of their customers' online activities to protect their privacy.
May 9, 2025Source

The Geek Squad scam is back. Here's what you need to know.
No, that Geek Squad bill that you received in your email isn't real. It's a scam.
May 9, 2025Source

VicOne xAurient accelerates threat response for automakers
VicOne announced xAurient, a new automotive threat intelligence platform that enables streamlined threat response by delivering early threat intelligence tailored to the particular manufacturing environment of an original equipment manufacturer (OEM) or Tier 1 supplier.
May 9, 2025Source

What your browser knows about you, from contacts to card numbers
Chrome and Safari are the most popular browser apps, accounting for 90% of the mobile browsers market share, according to Surfshark. They also collect the most data.
May 9, 2025Source

Your password manager is under attack: How to defend yourself against a new threat
Heard of polymorphic browser extensions yet? These savage impostors threaten the very future of credential management. Here's what you need to know - and do.
May 9, 2025Source

Internet — Security Issues — May 6th, 2025

AI and Infrastructure Resilience Are Keys to US Security
Ex-Deputy NSA Anne Neuberger on Preparing for AI-Driven Threats
May 6, 2025Source or Source or Source or Source

Android Update Patches FreeType Vulnerability Exploited as Zero-Day
Android's May 2025 security update includes patches for an exploited vulnerability in the FreeType open source rendering engine.
May 6, 2025Source

Apache Parquet exploit tool detect servers vulnerable to critical flaw
A proof-of-concept exploit tool has been publicly released for a maximum severity Apache Parquet vulnerability, tracked as CVE-2025-30065, making it easy to find vulnerable servers.
May 6, 2025Source

App Used by Trump Adviser Suspends Services After Hack Taking '15-20 Minutes'
TeleMessage, a messaging app used by Trump adviser Mike Waltz, has suspended services after a hacker accessed sensitive government and corporate data.
May 6, 2025Source

Applying AI Agents in Cybersecurity With Trust, Transparency
Salesforce's Brad Arkin on How Agents Are Transforming Security Ops
May 6, 2025Source or Source or Source or Source or Source

Applying the OODA Loop to Solve the Shadow AI Problem
By taking immediate actions, organizations can ensure that shadow AI is prevented and used constructively where possible.
May 6, 2025Source

Bridging Cyber and Physical Threats
CISO Sean Atkinson on Proactive, Integrated Approach to Hybrid Threat Defense
May 6, 2025Source or Source or Source

Businesses Are Turning to This Because Hackers Don't Take Days Off
One code protects each employee's PC with antivirus, VPN, firewall, real-time threat detection, and more.
May 6, 2025Source

CISOs Transform Into Business-Critical Digital Risk Leaders
Google's Phil Venables on How AI Creates Structural Advantage in Security
May 6, 2025Source

Critical Vulnerability in AI Builder Langflow Under Attack
CISA warns organizations that threat actors are exploiting a critical-severity vulnerability in low-code AI builder Langflow.
May 6, 2025Source

Culture comes first in cybersecurity. That puts cybersecurity on the front line in the culture wars
'Trust us, we're from Trumpland' may not help Microsoft as much as it hopes
May 6, 2025Source

Cyber Resilience Demands Rethinking Risk, Identity, AI Trust
RSA CEO Rohit Ghai on Security Amid Evolving Threats, Tech Disruption
May 6, 2025Source or Source or Source or Source or Source

Don't get hacked! I open dubious PC files in a sandbox. You should too
Files and links that you receive could be infected with viruses. If you are ever unsure whether a file is harmless or whether a link leads to a safe website, check it in an online sandbox.
May 6, 2025Source

Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)
An easily and remotely exploitable vulnerability (CVE-2024-7399) affecting Samsung MagicINFO, a platform for managing content on Samsung commercial displays, is being leveraged by attackers.
May 6, 2025Source

E-ZPass and toll scam texts are everywhere. What to do if you're targeted.
Be careful with your messages.
May 6, 2025Source

Hacker Conversations: John Kindervag, a Making not Breaking Hacker
John Kindervag is best known for developing the Zero Trust Model. He is a hacker, but not within our common definition of a hacker today.
May 6, 2025Source

Human Ingenuity Still Crucial in Cybersecurity Defense
HackerOne CEO Warns AI Can't Replace Creativity, Intuition in Cyber Defense Efforts
May 6, 2025Source or Source or Source or Source or Source

Immersive delivers a team-based approach to application security training
Immersive launched AppSec Range Exercises, expanding its AppSec solution beyond hands-on labs to help cyber leaders and practitioners prove and improve their capabilities as part of a holistic cyber readiness program.
May 6, 2025Source

Kelly Benefits Hack Victim Count Jumps Significantly, Again
Breach Tally Keeps Growing Since Firm Filed Initial Breach Reports Last Month
May 6, 2025Source or Source or Source or Source

Microsoft Warns of Attackers Exploiting Misconfigured Apache Pinot Installations
Misconfigured Apache Pinot instances can and have enabled threat actors to gain access to sensitive information.
May 6, 2025Source

Minimus Launches With $51M to Tackle Application Protection
Startup Says It Cuts Software Vulnerability Volume, Helps Developers Avoid Overload
May 6, 2025Source

Mozilla VPN Review (2025): Features, Pricing, and Security
Mozilla is most famous for its web browser, Mozilla Firefox. So, when the brand launched Mozilla VPN in 2020, expectations were high.
May 6, 2025Source

NSO Group must pay more than $167 million in damages to WhatsApp for spyware campaign
Spyware maker NSO Group will have to pay more than $167 million in damages to WhatsApp for a 2019 hacking campaign against more than 1,400 users.
May 6, 2025Source

RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248)
A missing authentication vulnerability (CVE-2025-3248) in Langflow, a web application for building AI-driven agents, is being exploited by attackers in the wild, CISA has confirmed by adding it to its Known Exploited Vulnerabilities (KEV) catalog
May 6, 2025Source

Retail Sector in Scattered Spider Crosshairs
Don't Fall for Easy Social Engineering Traps, Advises Mandiant
May 6, 2025Source or Source or Source or Source

RSA helps organizations secure passwordless environments
RSA announced cybersecurity innovations that defend organizations against the next wave of AI powered identity attacks, including IT Help Desk bypasses, malware, social engineering, and other threats.
May 6, 2025Source

Samsung MagicINFO 9 Server RCE flaw now exploited in attacks
Hackers are exploiting an unauthenticated remote code execution (RCE) vulnerability in the Samsung MagicINFO 9 Server to hijack devices and deploy malware.
May 6, 2025Source or Source

Second Wave of Attacks Hitting SAP NetWeaver After Zero-Day Compromise
Threat actors are revisiting SAP NetWeaver instances to leverage webshells deployed via a recent zero-day vulnerability.
May 6, 2025Source

Supply-chain attack lies dormant for six years before striking hundreds of e-commerce sites
Cybercriminals waited years before activating massive e-commerce backdoor in Magento software
May 6, 2025Source

TeleMessage Goes Dark After Trump Adviser Photo Fallout
Hacker Breaches Government-Approved Messaging App Used by Top Trump Officials
May 6, 2025Source or Source or Source

The AI Arms Race in Cybersecurity
AllegisCyber Capital's Bob Ackerman Examines Machine-Speed Defense Requirements
May 6, 2025Source or Source or Source or Source or Source

Trump's 'Grand Cyber Plan' Coming Soon, Noem Tells Lawmakers
Homeland Security Secretary Accuses Cyber Agency of Failing to Stop China Hacks
May 6, 2025Source

US Charges Yemeni Man for Black Kingdom Ransomware Attacks
Rami Khaled Ahmed, a 36-year-old from Yemen, has been charged for launching ransomware attacks between 2021 and 2023.
May 6, 2025Source

US Readies Huione Group Ban Over Cybercrime Links
Huione Group Helped Criminals Launder Over $4 Billion Worth of Cybercrime Proceeds
May 6, 2025Source or Source

Use of Agentic AI in Cybersecurity Needs More Transparency
Elastic CISO Mandy Andress on Deploying More AI Agents for Cybersecurity Tasks
May 6, 2025Source or Source or Source or Source or Source

What a future without CVEs means for cyber defense
The importance of the MITRE-run Common Vulnerabilities and Exposures (CVE) Program shouldn't be understated. For 25 years, it has acted as the point of reference for cybersecurity professionals to understand and mitigate security flaws. By providing a standardized method for naming and cataloguing known vulnerabilities, it offers defenders a shared language for understanding, prioritizing, and responding to real-world threats.
May 6, 2025Source

Internet — Security Issues — May 5th, 2025

10 passkey survival tips: Prepare for your passwordless future now
Although passkeys remain an evolving ecosystem, we'd be wise to embrace tomorrow's authentication standard today. Here are ZDNET's 10 recommendations for reaching passkey paradise.
May 5, 2025Source

AI-Enabled App Development Outpacing Cybersecurity Controls
Wiz's Ami Luttwak on Managing the 'Speed of AI' Trade-Off in Security Control
May 5, 2025Source or Source or Source or Source

ANZ Bank to Eliminate Passwords for Digital Banking Services
Hackers Bypass MFA to Steal Australians' Banking Credentials
May 5, 2025Source or Source or Source or Source

Are IoT Devices the New Attack Vector for Ransomware Groups?
Phosphorus Cybersecurity's Phillip Wylie on Asset Inventory, Password Hygiene
May 5, 2025Source or Source or Source or Source or Source

Critical Commvault Vulnerability in Attacker Crosshairs
CISA has flagged a critical-severity Commvault vulnerability as exploited one week after technical details were released.
May 5, 2025Source

Cybercrime Cooperation Has Become More Regional
Ex-Interpol Director Craig Jones on How Geopolitics Affects Global Cybercrime
May 5, 2025Source or Source or Source or Source or Source

Cybersecurity M&A Roundup: 31 Deals Announced in April 2025
Thirty-one cybersecurity merger and acquisition (M&A) deals were announced in April 2025.
May 5, 2025Source

Developing privacy-aware building automation
Researchers at the University of Tokyo developed a framework to enable decentralized artificial intelligence-based building automation with a focus on privacy. The system enables AI-powered devices like cameras and interfaces to cooperate directly, using a new form of device-to-device communication.
May 5, 2025Source

Doppel Banks $35M for AI-Based Digital Risk Protection
The new investment values Doppel at $205 million and provides runway to meet enterprise demand for AI-powered threat detection tools.
May 5, 2025Source

GlobalX, airline used for Trump deportations, gets hacked: Report
GlobalX, an airline used by the Trump administration as part of its massive deportation campaign, has reportedly been hacked.
May 5, 2025Source

Hack on Infusion Center Software Supplier Affects 118,000
Maine-Based Firm Already Facing Several Proposed Class Action Lawsuits in Breach
May 5, 2025Source or Source or Source

Hacker breaches TeleMessage system used by US officials, raising security concerns
The dangers of archiving encrypted messaging for compliance
May 5, 2025Source

Hundreds of e-commerce sites hacked in supply-chain attack
Attack that started in April and remains ongoing runs malicious code on visitors' devices.
May 5, 2025Source

Is Windows antivirus software still necessary in 2025?
Why Microsoft's built-in virus scanner is probably good enough (and why you might still look elsewhere).
May 5, 2025Source

Kelly Benefits Data Breach Impact Grows to 400,000 Individuals
Kelly Benefits has determined that the impact of the recently disclosed data breach is much bigger than initially believed.
May 5, 2025Source

Man Admits Hacking Disney and Leaking Data Disguised as Hacktivist
A 25-year-old has admitted hacking Disney systems and leaking data under the guise of a hacktivist collective named NullBulge.
May 5, 2025Source

Multiple Vulnerabilities in SonicWall Secure Mobile Access (SMA) 100 Series Management Interface Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in SonicWall Secure Mobile Access (SMA) 100 Management Interface, which could allow for remote code execution. SonicWall Secure Mobile Access (SMA) is a unified secure access gateway used by organizations to provide employees access to applications from anywhere. Successful exploitation of these vulnerabilities when chained together could allow for remote code execution, potentially leading to session hijacking and full system compromise.
May 5, 2025Source

NCSC Recommends Security Measures Amid UK Retailer Hacks
Urges Companies to Enable MFA, Track Atypical Login Attempts
May 5, 2025Source or Source or Source

Open-Source Platforms Are More Secure Than Proprietary Ones
Elastic CEO Ash Kulkarni on How AI Transforms Security Data Analysis
May 5, 2025Source or Source or Source or Source

OpenAI to Retain Nonprofit Oversight Amid For-Profit Shift
Critics Say Public Benefit Corporation Model May Undermine AI Safety and Oversight
May 5, 2025Source or Source

OpenAI Vows Guardrails After ChatGPT's Yes-Man Moment
Flattery Glitch Forces Rollback, Potential Procedural Overhaul
May 5, 2025Source or Source or Source

Passkeys for Normal People
Let me start by very simply explaining the problem we're trying to solve with passkeys. Imagine you're logging on to a website like this:
May 5, 2025Source

PoC Published for Exploited SonicWall Vulnerabilities
PoC code targeting two exploited SonicWall flaws was published just CISA added them to the KEV catalog.
May 5, 2025Source

Ransomware Group Claims Attacks on UK Retailers
The DragonForce ransomware group has claimed responsibility for the recent cyberattacks on UK retailers Co-op, Harrods, and M&S.
May 5, 2025Source

Raw Dating App Left User Data Unprotected, Exposing Private Details For All To See
Data breaches, whether due to the nefarious activities of hackers or inadequate security measures, are a major concern due to the harm they can cause to affected users. In this latest breach, a report claims that the dating app Raw left user data unprotected, exposing private details for all to see.
May 5, 2025Source

Spy versus spy: Researchers work to secure messaging
When you send a message through WhatsApp or iMessage, you might think only you and the recipient can read it. Thanks to end-to-end encryption (E2EE), that's usually true, but it's not the whole story, says Dr. Nitesh Saxena, a cybersecurity expert at Texas A&M University.
May 5, 2025Source

TeleMessage Goes Dark After Trump Adviser Photo Fallout
Hacker Breaches Government-Approved Messaging App Used by Top Trump Officials
May 5, 2025Source or Source or Source

TikTok Fined $600 Million for China Data Transfers That Broke EU Privacy Rules
EU privacy watchdog fined TikTok $600 million after a four-year investigation found that data transfers to China put users at risk of spying, in breach of strict EU data privacy rules.
May 5, 2025Source

UK retailers under cyber attack: Co-op member data compromised
UK-based retailers Marks & Spencer, Co-op, and Harrods have been targeted by cyber attackers in the last few weeks.
May 5, 2025Source

UK shares security tips after major retail cyberattacks
Following three high-profile cyberattacks impacting major UK retailers, the country's National Cyber Security Centre (NCSC) has published guidance that all companies are advised to follow to strengthen their cybersecurity defenses.
May 5, 2025Source

US Readies Huione Group Ban Over Cybercrime Links
Huione Group Helped Criminals Launder Over $4 Billion Worth of Cybercrime Proceeds
May 5, 2025Source or Source

White House Proposal Slashes Half-Billion From CISA Budget
The proposed $491 million cut is being positioned as a "refocusing"of CISA on its core mission "while eliminating weaponization and waste."
May 5, 2025Source

Internet — Security Issues — May 2nd, 2025

5 signs a hacker is watching through your PC's webcam
Know the tell-tale signs that you're being spied on!
May 2, 2025Source

A review of 19 billion passwords reveals people are still bad at them
You probably have bad passwords.
May 2, 2025Source

Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
Attackers have been using two previously known vulnerabilities (CVE-2024-38475, CVE-2023-44221) to compromise SonicWall secure mobile access devices, the vendor has confirmed by updating the associated advisories.
May 2, 2025Source

Best free password managers 2025: Online security doesn't have to cost a thing
Shore up your defenses, stat.
May 2, 2025Source

British govt agents step in as Harrods becomes third mega retailer under cyberattack
Experts suggest the obvious: There is an ongoing coordinated attack on UK retail sector
May 2, 2025Source

Co-op confirms data theft after DragonForce ransomware claims attack
The Co-op cyberattack is far worse than initially reported, with the company now confirming that data was stolen for a significant number of current and past customers.
May 2, 2025Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
Attackers have been using two previously known vulnerabilities (CVE-2024-38475, CVE-2023-44221) to compromise SonicWall secure mobile access devices, the vendor has confirmed by updating the
associated advisories.
May 2, 2025Source or Source

Cost-effective testing method bolsters US election security amid federal cutbacks
As federal support for election security faces major cutbacks, a study in the journal Operations Research introduces a scientifically backed, low-cost solution to strengthen the integrity of U.S. elections.
May 2, 2025Source

Disney Slack Channel Hacker Pleads Guilty
Hacker Who Feigned Russian Hacktivist Persona Faces Up to a Decade in Prison
May 2, 2025Source or Source or Source or Source or Source

Hackers have gained access to the membership data of UK retailer Co-op
Customer passwords and payment information weren't accessed, according to Co-op.
May 2, 2025Source

I saw how an "evil" AI chatbot finds vulnerabilities. It's as scary as you think
The good guys are trailing behind, too.
May 2, 2025Source

Microsoft Accounts Go Passwordless by Default
Microsoft is prioritizing passwordless sign-in and sign-up methods, and is making new accounts passwordless by default.
May 2, 2025Source or Source or Source or Source or Source

Nova Scotia Power Says Hackers Stole Customer Information
Nova Scotia Power's investigation has shown that the recent cyberattack resulted in the theft of some customer information.
May 2, 2025Source

Opsera improves GitHub security management
Opsera announced new Advanced Security Dashboard capabilities that, available as an extension of Opsera's Unified Insights for GitHub Copilot, help enterprises maximize the benefits of GitHub Advanced Security (GHAS).
May 2, 2025Source

Ransomware attacks against government agencies on the rise
Of the 39 confirmed attacks -- where the organization publicly acknowledges what's happened -- in April, 21 were on businesses, nine on government entities, six on healthcare companies and three on educational institutions.
May 2, 2025Source

Raytheon, Nightwing to Pay $8.4 Million in Settlement Over Cybersecurity Failures
The US government says defense contractor Raytheon and Nightwing agreed to pay $8.4 million to settle False Claims Act allegations.
May 2, 2025Source

RSA Conference 2025 Announcement Summary (Day 3)
Hundreds of companies showcased their products and services this week at the 2025 edition of the RSA Conference in San Francisco.
May 2, 2025Source

Stopping Attacks Fast: AI in Cybersecurity Today
AI's Capability to Process at Scale Will Be Promising, IBM's Jeff Crume
May 2, 2025Source

UK NCSC: Cyberattacks impacting UK retailers are a wake-up call
The United Kingdom's National Cyber Security Centre warned that ongoing cyberattacks impacting multiple UK retail chains should be taken as a "wake-up call."
May 2, 2025Source

UK Retailers Co-op, Harrods and M&S Struggle With Cyberattacks
Major UK retailers Co-op, Harrods, and M&S are scrambling to restore services that were affected by cyberattacks.
May 2, 2025Source

Ukrainian Nefilim Ransomware Affiliate Extradited to US
Ukrainian national Artem Stryzhak was extradited to the US and charged with using Nefilim ransomware in attacks on large businesses.
May 2, 2025Source

US Indicts Black Kingdom Hacker for Exchange Hacking Tear
Suspected Hacker, Rami Khaled Ahmed, 36, Thought to Be in Yemen
May 2, 2025Source or Source or Source or Source or Source or Source

White House Cyber Chief Urges Offensive Response to Threats
National Security Council's Bulazel to Reset Cyber Norms With Offensive Strategy
May 2, 2025Source or Source or Source or Source or Source

Why Many Fraud Victims Don't Report Attacks
ITRC's James Lee on Shame, Fatigue and Precision Targeting
May 2, 2025Source

Why Simplicity is the Future of Cybersecurity
Fastly CEO Todd Nightingale Makes the Case for Security Without Compromise
May 2, 2025Source or Source or Source or Source

Internet — Security Issues — April 28th, 2025

4 Different Types of VPNs & When to Use Them
Learn about the different types of VPNs and when to use them. Find out which type of VPN suits your needs with this comprehensive guide.
April 28, 2025Source

4 Million Affected by VeriSource Data Breach
VeriSource Services says the personal information of 4 million people was compromised in a February 2024 cyberattack.
April 28, 2025Source

Almost a quarter of HTML email attachments are malicious
When used legitimately, HTML attachments in emails enable organizations to share content, such as newsletters or invitations, that display properly when opened in an email client or web browser.
April 28, 2025Source

ArmorCode Anya accelerates critical security decisions
ArmorCode launched Anya, an agentic AI champion purpose-built for AppSec and product security teams. Following a successful early access program, Anya is now available to all ArmorCode enterprise customers, delivering intelligent, conversation-driven security insights that close the expertise gap and accelerate critical security decisions.
April 28, 2025Source

Back online after 'catastrophic' attack, 4chan says it's too broke for good IT
Image board hints that rumors of a poorly maintained back end may be true
April 28, 2025Source or Source

Censys enables security teams to be more proactive in their threat hunting
Censys is launching a new solution specifically designed to enable threat hunting teams to track adversary infrastructure. The Censys' Threat Hunting solution is part of Censys' recently released Internet Intelligence platform, which provides security teams across the enterprise with the Internet visibility that they need to protect themselves from today's adversaries.
April 28, 2025Source

Cloudflare mitigates record number of DDoS attacks in 2025
Internet services giant Cloudflare says it mitigated a record number of DDoS attacks in 2024, recording a massive 358% year-over-year jump and a 198% quarter-over-quarter increase.
April 28, 2025Source

Craft CMS Zero-Day Exploited to Compromise Hundreds of Websites
Threat actors have exploited a zero-day vulnerability in Craft CMS to execute PHP code on hundreds of websites.
April 28, 2025Source

DragonForce ransomware group announces its forming a hacking cartel
Malware for everyone!
April 28, 2025Source

EFF Leads Prominent Security Experts in Urging Trump Administration to Leave Chris Krebs Alone
Political Retribution for Telling the Truth Weakens the Entire Infosec Community and Threatens Our Democracy; Letter Remains Open for Further Sign-Ons
April 28, 2025Source

FBI offers $10M bounty for information on Salt Typhoon hackers
The FBI has announced that it is offering a bounty of $10 million to those who help identify the individuals behind the Salt Typhoon hacking group. People behind the group were responsible for hacking major US telecom operators, as well as the US Treasury. The FBI investigation has found that the hacking group breached US networks, stole call data logs, and more under court-ordered US law enforcement requests.
April 28, 2025Source

Flashpoint Ignite enhancements improve threat intelligence
Flashpoint announced new capabilities to its flagship platform, Flashpoint Ignite. These innovations are designed to deliver insights that align with customers' threat intelligence needs, enabling organizations to make informed decisions and protect their most critical assets.
April 28, 2025Source

From 112K to 4M folks' data -- HR biz attack goes from bad to mega bad
It took a 1 year+ probe, plenty of client calls for VeriSource to understand just how much of a yikes it has on its hands
April 28, 2025Source

ICS/OTCritical Vulnerabilities Found in Planet Technology Industrial Networking Products
Planet Technology industrial switches and network management products are affected by several critical vulnerabilities.
April 28, 2025Source

Hitachi Vantara takes servers offline after Akira ransomware attack
Hitachi Vantara, a subsidiary of Japanese multinational conglomerate Hitachi, was forced to take servers offline over the weekend to contain an Akira ransomware attack.
April 28, 2025Source

How Malwarebytes' security tools can help companies stop online scams before it's too late
Online fraud is costing billions - but Malwarebytes' security tools could be the secret weapon companies need to protect themselves and fight back.
April 28, 2025Source

JPMorgan Chase CISO Fires Warning Shot Ahead of RSA Conference
This tension between hard-edged risk realism and breathless AI evangelism sets an unmistakable tone for a bellwether conference where 40,000-plus gather to do business.
April 28, 2025Source

Marks & Spencer breach linked to Scattered Spider ransomware attack
Ongoing outages at British retail giant Marks & Spencer are caused by a ransomware attack believed to be conducted by threat actors known as "Scattered Spider" BleepingComputer has learned from multiple sources.
April 28, 2025Source

Mobile becomes the preferred route for attacks on enterprises
Mobile threats are no longer an emerging issue, they're here, rapidly evolving, and targeting the devices organizations depend on every day.
April 28, 2025Source

NetFoundry Raises $12 Million for Network Security Solutions
Zero-trust network security solutions provider NetFoundry has raised $12 million in funding from SYN Ventures.
April 28, 2025Source

Oregon Agency Won't Say If Hackers Stole Data in Cyberattack
Oregon's environmental agency won't say if a group of hackers stole data in a cyberattack that was first announced earlier this month.
April 28, 2025Source

Palo Alto Networks Prisma AIRS safeguards the enterprise AI ecosystem
Palo Alto Networks announced Prisma AIRS, an AI security platform that serves as the cornerstone for AI protection, designed to protect the entire enterprise AI ecosystem -- AI apps, agents, models, and data -- at every step.
April 28, 2025Source

Palo Alto Networks to Acquire AI Security Firm Protect AI
Palo Alto Networks is acquiring AI security company Protect AI in a deal previously estimated at $650-700 million.
April 28, 2025Source or Source

RSA Conference 2025 -- Pre-Event Announcements Summary (Part 3)
Hundreds of companies are showcasing their products and services this week at the 2025 edition of the RSA Conference in San Francisco.
April 28, 2025Source

Sentra Data Security for AI Agents protects AI-powered assistants
Sentra launched Data Security for AI Agents solution, specifically designed to address the emerging challenges associated with proliferating AI assistants and empower large enterprises to embrace AI innovation securely and responsibly
April 28, 2025Source

South Korea's SK Telecom begins SIM card replacement after data breach
South Korea's largest carrier SK Telecom started on Monday to replace mobile SIM chips for its 23 million users following a data breach, prompting alarmed customers to form long lines for the replacements.
April 28, 2025Source

The new role of behavioral biometrics in fraud prevention
Digital security is undergoing profound transformations catalyzed by the shortcomings of traditional authentication methods. Security strategies often force businesses to choose between robust defenses that frustrate users and seamless experiences that heighten vulnerability. Recently, behavioral biometrics -- using unique users' digital interaction patterns -- has emerged to offer a compelling resolution to this longstanding challenge by providing continuous, invisible authentication based on unique human behaviors.
April 28, 2025Source

Trend Micro helps organizations secure AI-driven workloads
Trend Micro announced new AI-powered threat detection capabilities designed specifically for enterprises embracing AI at scale. This effort brings together Trend's security expertise with NVIDIA accelerated computing and NVIDIA AI Enterprise software, leveraging AWS infrastructure to support scalable, enterprise-ready deployment.
April 28, 2025Source

UK regulator wants to ban apps that can make deepfake nude images of children
'There is no positive reason for these to exist.'
April 28, 2025Source

Verizon's Data Breach Report Findings 'Underscore the Importance of a Multi-Layered Defense Strategy'
Verizon surveyed about 22,000 security incidents and 12,000 data breaches. Ransomware incidents increased, while the median ransom payment dropped.
April 28, 2025Source

Veza Banks $108 Million Series D at $808 Million Valuation
San Francisco identity security play Veza closes a Series D fund round led by New Enterprise Associates (NEA).
April 28, 2025Source

WorkComposer employee monitoring app leak exposes 21 million screenshots online
A misconfigured Amazon S3 storage bucket was the culprit
April 28, 2025Source

Internet — Security Issues — April 25th, 2025

AI Experts Urge Regulators to Block OpenAI's Profit Pivot
Challengers Include Ex-OpenAI Staff, Geoffrey Hinton, Margaret Mitchell
April 25, 2025Source or Source or Source or Source

Baltimore City Public Schools data breach affects over 31,000 people
​Baltimore City Public Schools notified tens of thousands of employees and students of a data breach following an incident in February when unknown attackers hacked into its network.
April 25, 2025Source

BreachLock AEV simulates real attacks to validate and prioritize exposures
BreachLock AEV automates multistep, threat-intelligence-led attack scenarios—helping security teams uncover real exposures and prioritize what matters most.
April 25, 2025Source

Browser Security Firm SquareX Raises $20 Million
SquareX offers what it has dubbed a "Browser Detection and Response (BDR)" solution.
April 25, 2025Source

CISA Grapples With Growing Exodus, Workforce Buyout Turmoil
US Cyber Agency Denies Looming Deadlines Amid Reports of Expanded Workforce Buyouts
April 25, 2025Source or Source or Source or Source or Source

Dashlane introduces Omnix for AI-powered credential protection
Dashlane unveiled a new approach to addressing human risk in response to the rise of AI-driven phishing attacks and shadow IT in corporate environments. Built on innovation that pushes beyond vault-based password management, Dashlane Omnix is the AI-accelerated credential security platform that unifies proactive intelligence, real-time response, and protected access to provide businesses complete credential security across their workforce -- all in one intuitive experience.
April 25, 2025Source

Data breach at Connecticut's Yale New Haven Health affects over 5 million
A data breach at Connecticut's largest healthcare system Yale New Haven Health affects more than 5.5 million people, according to a legally required notice with the U.S. government's health department.
April 25, 2025Source

Detectify Asset Classification and Scan Recommendations improves vulnerability testing
Detectify announced new Asset Classification and Scan Recommendations capabilities. This innovation directly addresses a critical challenge for security teams: knowing what else, beyond their core applications, requires in-depth testing. The new features automatically classify discovered web assets based on attacker reconnaissance techniques and deliver recommendations on where to run DAST, helping organizations bridge the gap between broad and deep vulnerability testing across their entire attack surface.
April 25, 2025Source

Emergency patch for potential SAP zero-day that could grant full system control
German software giant paywalls details, but experts piece together the clues
April 25, 2025Source

Endor Labs Raises $93M to Expand AI Code Protection Platform
Company Eyes Product Innovation and Strategic M&A After Rapid 30x ARR Growth
April 25, 2025Source or Source or Source

Enterprises struggle with serious gaps in cyber response plans
A new survey of 1,000 businesses across the UK, UK, Europe and the Asia-Pacific region reveals a worrying disconnect between organizations' perceived readiness and actual performance in cyber crisis response.
April 25, 2025Source

FBI offers $10 million for information about Salt Typhoon members
FBI accepts tips by TOR in likely attempt to woo China-based informants.
April 25, 2025Source

FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches
The FBI has asked the public for information on Chinese Salt Typhoon hackers behind widespread breaches of telecommunications providers in the United States and worldwide.
April 25, 2025Source

Former Google Cloud CISO Phil Venables Joins Ballistic Ventures
Venables has served as CISO and security executive across several large organizations, including Google Cloud, Goldman Sachs, Deutsche Bank.
April 25, 2025Source

From compliance to culture: Making security part of our daily routines
Every organization, sooner or later, writes itself a policy. It gets stapled into onboarding packs and waved about during training, and then quietly forgotten. It's not that people mean to ignore it. It's just that rules don't always make themselves felt when the Wi-Fi's down or the finance team's in a rush. But culture -- that's different. Culture settles into the way people think and work and react. It turns guidelines into instincts. That's when you know security has taken root.
April 25, 2025Source

GPT-4.1 May Have a Safety Problem
Tests Suggest OpenAI's Latest Model May Not Meet Alignment Expectations
April 25, 2025Source or Source

Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy
With over 12,000 breaches analyzed, this year's DBIR reveals a landscape shaped by not just individual threats, but by entire economies of compromise.
April 25, 2025Source

ISMG Editors: Top 2025 Breach Trends From Verizon
Also: Supply Chain Security in Wake of US Tariffs, AI's Role in the SOC
April 25, 2025Source or Source or Source or Source or Source

LastPass Secure Access Experiences simplifies access management
As cloud app adoption continues to rise, and the modern workplace continues to evolve, LastPass will introduce a new approach to democratize access management. Built with the needs of small-to-mid-sized businesses in mind, Secure Access Experiences represents a more unified, intuitive way to manage identity and access in a changing world — without the complexity, cost, or confusion that too often defines the category.
April 25, 2025Source

Lattica Emerges From Stealth With FHE Platform for AI
Lattica has raised $3.25 million in pre-seed funding for a platform that uses FHE to enable AI models to process encrypted data.
April 25, 2025Source

M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat
Mandiant's latest threat report shows how attackers adapt faster than defenses, shifting strategies toward credential theft and insider threats.
April 25, 2025Source

Manifest Raises $15 Million for SBOM Management Platform
Software and AI supply chain transparency firm Manifest has raised $15 million in a Series A funding round led by Ensemble VC.
April 25, 2025Source

Marks & Spencer pauses online orders after cyberattack
British retailer giant Marks & Spencer (M&S) has suspended online orders while working to recover from a recently disclosed cyberattack.
April 25, 2025Source

Mobile provider MTN says cyberattack compromised customer data
African mobile giant MTN Group announced that a cybersecurity incident has compromised the personal information of some of its subscribers in certain countries.
April 25, 2025Source

Navigating data privacy and security challenges in AI [Q&A]
As artificial intelligence (AI) continues to reshape industries, data privacy and security concerns are escalating. The rapid growth of AI applications presents new challenges for companies in safeguarding sensitive information.
April 25, 2025Source

Privacy Nightmare: Employee Monitoring App Leaks Millions Of Screenshots
A recent report has revealed that an employee surveillance app has been leaking sensitive information about employees and companies in a public storage resource, which raises the question as to the extent to which employers should be allowed to access employees' private data.
April 25, 2025Source

Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
Researchers have uncovered three serious vulnerabilities in Rack, a server interface used by most Ruby web app frameworks (Ruby on Rails, Sinatra, Hanami, Roda, and others).
April 25, 2025Source

RSA Conference 2025 -- Pre-Event Announcements Summary (Part 2)
Hundreds of companies are showcasing their products and services next week at the 2025 edition of the RSA Conference in San Francisco.
April 25, 2025Source

Rubrik Identity Resilience protects vulnerable authentication infrastructure
Rubrik announced its upcoming solution, Identity Resilience, designed to secure the entire identity landscape alongside data.
April 25, 2025Source

Security Bite: FBI releases 2024 Internet Crime Report, 'new record for losses'
This year marks the 25th anniversary of the FBI's Internet Crime Complaint Center, or IC3 for short. Since its inception in 2000, the organization has released an annual report detailing trends based on the thousands of cybercrime complaints it receives daily from victims. This week, the FBI released its 2024 Internet Crime Report (PDF), revealing a record $16.6 billion in reported losses—a 33% increase and "a new record for losses reported to IC3."
April 25, 2025Source

SAP fixes suspected NetWeaver zero-day exploited in attacks
SAP has released out-of-band emergency NetWeaver updates to fix a suspected remote code execution (RCE) zero-day flaw actively exploited to hijack servers.
April 25, 2025Source

SAP Zero-Day Possibly Exploited by Initial Access Broker
A zero-day vulnerability in SAP NetWeaver potentially affects more than 10,000 internet-facing applications.
April 25, 2025Source

Scamnetic Raises $13 Million to Prevent Scams in Real Time
AI-powered threat protection startup Scamnetic has raised $13 million in a Series A funding round led by Roo Capital.
April 25, 2025Source

So long, passwords: 5 easy ways to use passkeys
There's nothing to memorize—unless you count where you've stored your passkeys.
April 25, 2025Source

South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days
Multiple South Korean organizations across industries have been targeted in a recent Lazarus campaign dubbed Operation SyncHole
April 25, 2025Source

Spy versus spy: A new automated removal tool can stop most remote-controlled malware
Cyberattacks can snare workflows, put vulnerable client information at risk, and cost corporations and governments millions of dollars. A botnet—a network infected by malware—can be particularly catastrophic. A new Georgia Tech tool automates the malware removal process, saving engineers hours of work and companies money.
April 25, 2025Source

Suspected Scattered Spider Head Extradited From Spain
Tyler Buchanan, a 23-year-old Scottish Man Extradited to the US on Wednesday
April 25, 2025Source or Source or Source or Source or Source

The TechCrunch Cyber Glossary
The cybersecurity world is full of jargon and lingo. At TechCrunch, we have been writing about cybersecurity for years, and we frequently use technical terms and expressions to describe the nature of what is happening in the world. That's why we have created this glossary, which includes some of the most common — and not so common — words and expressions that we use in our articles, and explanations of how, and why, we use them.
April 25, 2025Source

Two Ransomware Hacks Affect 1.1 Million Patients
Hackers Hit Maryland Medical Group and California Hospital, Claim 480 GB Data Theft
April 25, 2025Source or Source or Source or Source or Source or Source

WhatsApp, Signal scam leads to Microsoft account hacks. How to spot it.
Be careful what you click.
April 25, 2025Source

Windows "inetpub" security fix can be abused to block future updates
A recent Windows security update that creates an 'inetpub' folder has introduced a new weakness allowing attackers to prevent the installation of future updates.
April 25, 2025Source

Internet — Security Issues — April 22nd, 2025

1Password adds protection for agentic AI in the enterprise
Current AI models can perform many tasks such as generating text, but these are 'prompted' -- that is the AI isn't acting by itself. But this is about to change with the arrival of agentic AI.
April 22, 2025Source

54% of tech hiring managers expect layoffs in 2025
54% of tech hiring managers say their companies are likely to conduct layoffs within the next year, and 45% say employees whose roles can be replaced by AI are most likely to be let go, according to a new study by General Assembly.
April 22, 2025Source

A pot of $250K is now available to ransomware researchers, but it feeds a commercial product
Security bods can earn up to $10K per report
April 22, 2025Source

AI's Phantom Packages Invite Slopsquatting Supply Chain Risk
Open-Source Models Hallucinate More Than Commercial Ones, Found Study
April 22, 2025Source or Source or Source or Source

Australian Businesses Gear Up for Ransom Reporting Deadline
Ransom Threats to Be Reported Under New Australian Legislation
April 22, 2025Source or Source or Source or Source or Source

BigID unveils AI Privacy Risk Posture Management
BigID launched AI Privacy Risk Posture Management to help organizations manage data privacy risks across the AI lifecycle. With automated assessments and actionable privacy controls, BigID empowers enterprises to govern AI responsibly while staying ahead of fast-evolving regulations.
April 22, 2025Source

Cloud Data Security Play Sentra Raises $50 Million Series B
Sentra has now raised north of $100 million for controls technology to keep sensitive data out of misconfigured AI workflows.
April 22, 2025Source

Cookie-Bite attack PoC uses Chrome extension to steal session tokens
A proof-of-concept attack called "Cookie-Bite" uses a browser extension to steal browser session cookies from Azure Entra ID to bypass multi-factor authentication (MFA) protections and maintain access to cloud services like Microsoft 365, Outlook, and Teams.
April 22, 2025Source

Cyber Firm CEO Accused of Placing Malware on Hospital Device
Faces Two Counts of Oklahoma Computer Crime Act Violations
April 22, 2025Source or Source or Source or Source or Source

Cyberattack Knocks Texas City's Systems Offline
The city of Abilene, Texas, is scrambling to restore systems that have been taken offline in response to a cyberattack.
April 22, 2025Source

DataKrypto Launches Homomorphic Encryption Framework to Secure Enterprise AI Models
DataKrypto's FHEnom for AI combines real-time homomorphic encryption with trusted execution environments to protect enterprise data and models from leakage, exposure, and tampering.
April 22, 2025Source

Email still the main channel for cyberattacks and disinformation
Malicious actors are increasingly exploiting email to impersonate brands, launch phishing campaigns, and spread false information -- often using sophisticated methods made simpler by emerging technologies.
April 22, 2025Source

Embedded smart trackers boost security for radioactive shipments
Every day, cancer patients visit medical facilities for treatments to lessen or alleviate the destructive illness. Treatments often include radioisotopes and other radioactive materials that target and destroy cancer cells effectively.
April 22, 2025Source

FBI Claims It Lost Records About Its Mysterious Hacking Abilities
The bureau isn't being forthcoming when it comes to recently procured cyber tools.
April 22, 2025Source

Fog ransomware channels Musk with demands for work recaps or a trillion bucks
In effect: 'Ha ha -- the government is borked and so are you'
April 22, 2025Source

Google's Costly Strategy to Secure Default Status on Samsung Devices Revealed
It was just revealed that Google is paying Samsung an "enormous sum" to Samsung in order to keep Gemini pre-installed on the company's devices. This is not first such deal with Samsung, this is in addition to its multi-billion deal for Google Search.
April 22, 2025Source

Google's email spoofed by cunning phisherfolk who re-used DKIM creds
PLUS: Malware developers adopt Node.js; US disinformation warriors disbanded; Gig worker accounts for sale; and more
April 22, 2025Source

Hackers abuse Zoom remote control feature for crypto-theft attacks
A hacking group dubbed 'Elusive Comet' targets cryptocurrency users in social engineering attacks that exploit Zoom's remote control feature to trick users into granting them access to their machines.
April 22, 2025Source

Ketch Data Sentry uncovers hidden privacy risks
Ketch launched Data Sentry, a frontend data map for detecting website privacy risks. Designed for privacy and security teams, Data Sentry provides real-time visibility into website data flows—pinpointing hidden vulnerabilities before they lead to lawsuits or regulatory action.
April 22, 2025Source

Legacy Google Service Abused in Phishing Attacks
A sophisticated phishing campaign abuses weakness in Google Sites to spoof Google no-reply addresses and bypass protections.
April 22, 2025Source

Many Malware Campaigns Linked to Proton66 Network
Security researchers detail various malware campaigns that use bulletproof services linked to Proton66 ASN.
April 22, 2025Source

Marks & Spencer confirms cybersecurity incident amid ongoing disruption
Retail giant Marks & Spencer has confirmed a cybersecurity incident, as customers report ongoing disruption and outages.
April 22, 2025Source

New Google email scams are alarmingly convincing - how to spot them
Until Google rolls out a fix, you'll have to be on the lookout for this particularly convincing phishing scam.
April 22, 2025Source

New study reveals cybersecurity threats in next-gen DNA sequencing
Researchers have identified multiple cyberthreats in every stage of the DNA sequencing process
April 22, 2025Source

Not if, but when -- Why every organization needs a cyber resilience strategy
Because of AI, data has become the most valuable competitive asset for organizations regardless of industry. However, cyber-attacks are continuing to escalate, so the need for robust security measures is more important than ever. It is no longer enough to focus solely on prevention, so organizations must shift their mindset and resources toward rapid recovery and resilience.
April 22, 2025Source

NymVPN: Introducing a security-first decentralized VPN with a Mixnet flair
It's not often we see a VPN developed as more than just a way to hide your IP address and give you some online protection against tracking. So how does the open-source, Mixnet-based NymVPN project stack up?
April 22, 2025Source

Open Source Security Firm Hopper Emerges From Stealth With $7.6M in Funding
Hopper has emerged from stealth mode with a solution designed to help organizations manage open source software risk.
April 22, 2025Source

Perforce Puppet update accelerates vulnerability remediation
Perforce Software announced its latest platform update for Puppet Enterprise Advanced, designed to streamline DevSecOps practices and fortify enterprise security postures.
April 22, 2025Source

PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)
There are now several public proof-of-concept (PoC) exploits for a maximum-severity vulnerability in the Erlang/OTP SSH server (CVE-2025-32433) unveiled last week.
April 22, 2025Source

Proofpoint Prime unifies multistage attack protection across digital channels
Proofpoint has unveiled the global availability of Proofpoint Prime Threat Protection, the human-centric cybersecurity solution that brings together previously disparate critical threat defense capabilities—protection against multistage attacks across digital channels, impersonation protection, and risk-based employee guidance and education—in a single integrated solution.
April 22, 2025Source

Russian, Chinese Hackers Targeted Dutch Government
Hackers Targeted Critical Infrastructure for Sabotage, Data Theft
April 22, 2025Source or Source or Source or Source

SaaS security needs a more unified approach
New research commissioned by Valence Security from the Cloud Security Alliance looks at the current state of SaaS security to uncover key challenges and explore how organizations are securing and managing their SaaS environments.
April 22, 2025Source

Senior CISA Advisers Announce Exits Amid Federal Downsizing
Senior Advisers Behind 'Secure by Design' Step Down From CISA Amid Workforce Cuts
April 22, 2025Source or Source or Source or Source

SK Telecom warns customer USIM data exposed in malware attack
South Korea's largest mobile operator, SK Telecom, is warning that a malware infection allowed threat actors to access sensitive USIM-related information for customers.
April 22, 2025Source

Software Bill of Materials (SBOM): Enhancing Software Transparency and Security
Explore key concepts of SBOMs and how they are an essential tool in modern software development and cybersecurity frameworks.
April 22, 2025Source

SSL.com Scrambles to Patch Certificate Issuance Vulnerability
A vulnerability in SSL.com has resulted in nearly a dozen certificates for legitimate domains being wrongly issued.
April 22, 2025Source

Startup Sentra Nabs $50M to Boost AI-Powered Data Protection
Series B Investment to Boost AI, Expand Coverage Across IaaS, PaaS, SaaS, On-Prem
April 22, 2025Source or Source or Source or Source or Source

Stellar Cyber boosts security operations with human-augmented Autonomous SOC
At the upcoming RSAC 2025 Conference in San Francisco, Stellar Cyber will unveil the next evolution of modern SecOps: the human-augmented Autonomous SOC, powered by its breakthrough Agentic AI framework.
April 22, 2025Source

StrikeReady Security Command Center v2 accelerates threat response
For years, security teams have operated in reactive mode, contending with siloed tools, fragmented intelligence, and a never-ending backlog of alerts. Traditional Security Operations platforms were supposed to unify data and streamline response—but they often introduced their own complexity, requiring heavy customization and manual oversight.
April 22, 2025Source

The danger of data breaches — what you really need to know
In today's digital world, your personal data is like cold hard cash, and that's why cyberthieves are always looking for ways to steal it. Whether it's an email address, a credit card number, or even medical records, your personal information is incredibly valuable in the wrong hands.
April 22, 2025Source

Two CISA officials jump ship, both proud of pushing for Secure by Design software
As cyber-agency faces cuts, makes noises about switching up program
April 22, 2025Source

Two Healthcare Orgs Hit by Ransomware Confirm Data Breaches Impacting Over 100,000
Bell Ambulance and Alabama Ophthalmology Associates have suffered data breaches affecting over 100,000 people after being targeted in ransomware attacks.
April 22, 2025Source

UN Researchers Warn That Asian Scam Operations Are Spreading Across the Rest of the World
Transnational organized crime groups in East and Southeast Asia are spreading their lucrative scam operations across the globe, according to a UN report.
April 22, 2025Source

UN says Asian scam call center epidemic expanding globally amid political heat
What used to be a serious issue mainly in Southeast Asia is now the world's problem
April 22, 2025Source

Internet — Security Issues — April 20th, 2025

Week in review: LLM package hallucinations harm supply chains, Nagios Log Server flaws fixed
Here's an overview of some of last week's most interesting news, articles, interviews and videos:
April 20, 2025Source

Internet — Security Issues — April 17th, 2025

Ahold Delhaize confirms data theft after INC ransomware claims attack
Food retail giant Ahold Delhaize confirms that data was stolen from its U.S. business systems during a November 2024 cyberattack.
April 17, 2025Source

Breach Roundup: Cyber Insurance Market Set to Double by 2030
Also, a 'Perfect Tool' for Cyberespionage and EU Stocks Up on Burner Phones
April 17, 2025Source or Source or Source or Source or Source

Canada Warns Cyberdefenders to Buttress Edge Devices
Canadian Cyber Agency Warns of Rising Chinese Cyberthreats
April 17, 2025Source or Source or Source or Source or Source

Chinese APT Mustang Panda Updates, Expands Arsenal
The Chinese state-sponsored group Mustang Panda has used new and updated malicious tools in a recent attack.
April 17, 2025Source

CISA tags SonicWall VPN flaw as actively exploited in attacks
On Wednesday, CISA warned federal agencies to secure their SonicWall Secure Mobile Access (SMA) 100 series appliances against attacks exploiting a high-severity remote code execution vulnerability.
April 17, 2025Source

CISA Issues Guidance After Oracle Cloud Hack
CISA is making recommendations for organizations and users in light of the recent Oracle legacy cloud environment hack.
April 17, 2025Source

CISA warns of increased breach risks following Oracle Cloud leak
On Wednesday, CISA warned of heightened breach risks after the compromise of legacy Oracle Cloud servers earlier this year and highlighted the significant threat to enterprise networks.
April 17, 2025Source

Credential theft escalates as threat actors use stealthier tactics
Cybercriminals are pivoting to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises have declined.
April 17, 2025Source

Critical Erlang/OTP SSH Flaw Exposes Many Devices to Remote Hacking
Servers exposed to complete takeover due to CVE-2025-32433, an unauthenticated remote code execution flaw in Erlang/OTP SSH.
April 17, 2025Source

CTM360 Tracks Global Surge in SMS-Based Reward and Toll Scams
CTM360 has observed a notable surge in two SMS-based phishing campaigns: PointyPhish (reward scams) and TollShark (toll payment scams).
April 17, 2025Source

Cyber threats against energy sector surge as global tensions mount
Cyberattacks targeting the energy sector are increasing, driven by a host of geopolitical and technological factors. A report published by Sophos in July 2024, and which surveyed 275 cybersecurity and IT leaders from the energy, oil/gas, and utilities sector across 14 countries, found 67% of respondents who said their organizations had suffered a ransomware attack in the last year.
April 17, 2025Source

Data-stealing cyberattacks are surging - 7 ways to protect yourself and your business
The number of infostealers sent through phishing emails jumped by 84% last year. IBM X-Force offers these recommendations for defending yourself from all manner of malware.
April 17, 2025Source

Demystifying Security Posture Management
While the Security Posture Management buzz is real, its long-term viability depends on whether it can deliver measurable outcomes without adding more complexity.
April 17, 2025Source

DNA sequencing at risk: Hackers could exploit genomic data vulnerabilities
Next-generation DNA sequencing (NGS)—the same technology which is powering the development of tailor-made medicines, cancer diagnostics, infectious disease tracking, and gene research—could become a prime target for hackers.
April 17, 2025Source or Source

Lawsuit: Therapist Accessed Nude Breast Photos of 425 Women
Kansas Plastic Surgeon's Patients Allege Privacy Abuses Over Worker's EHR Access
April 17, 2025Source or Source or Source or Source or Source

MITRE Hackers' Backdoor Has Targeted Windows for Years
Windows versions of the BrickStorm backdoor that the Chinese APT used in the MITRE hack last year have been active for years.
April 17, 2025Source

Most enterprise hybrid Active Directory environments have critical vulnerabilities
A new survey of more than 1,000 IT and security professionals carried out for Cayosoft finds that 88 percent of enterprise hybrid Active Directory environments have critical vulnerabilities.
April 17, 2025Source

Network Security at the Edge for AI-ready Enterprise
The widespread use of AI, particularly generative AI, in modern businesses creates new network security risks for complex enterprise workloads across various locations
April 17, 2025Source

Report Warns US Allies Are Using Chinese-Owned Mobile Routes
Researchers Say Chinese Mobile Route Firms Dominate Global Interconnect Industry
April 17, 2025Source or Source or Source or Source or Source

SafeLine Bot Management: Self-hosted alternative to Cloudflare
Modern websites are under constant pressure from automated traffic: scraping, credential stuffing, inventory hoarding, and other malicious bot behaviors.
April 17, 2025Source

SonicWall Flags Old Vulnerability as Actively Exploited
A SonicWall SMA 100 series vulnerability patched in 2021, which went unnoticed at the time of patching, is being exploited in the wild.
April 17, 2025Source

Startup Exaforce Nabs $75M to Grow AI-Powered SOC Automation
Exaforce's AI-Powered Automation Aims to Streamline Security Ops for Enterprises
April 17, 2025Source or Source or Source or Source or Source

Symbiotic Security v1 empowers developers to write secure code
Symbiotic Security launched Symbiotic Security version 1 that ensures code security keeps pace with development speed, by using AI to secure code in real-time through remediation and training integrated within their workflows.
April 17, 2025Source

Targeted by Trump, Chris Krebs Resigns Job to Fight Probe
Cybersecurity Expert Sees Retribution for Stating 2020 Election Results Legitimate
April 17, 2025Source or Source or Source or Source or Source

The Hidden Breach: Secrets Leaked Outside the Codebase Pose a Serious Threat
Secrets aren't just in code. Recent reports show major leaks in collaboration tools like Slack, Jira, and Confluence. Here's what security teams need to know.
April 17, 2025Source

The best VPN service for 2025
These are the best virtual private networks out there, as reviewed and tested by experts.
April 17, 2025Source

The US almost let the CVE system die - the cybersecurity world's universal bug tracker
A last-minute funding extension saved the system--but only for 11 months
April 17, 2025Source

Vulnerabilities Patched in Atlassian, Cisco Products
Atlassian and Cisco have released patches for multiple high-severity vulnerabilities, including remote code execution bugs.
April 17, 2025Source

Warning! Don't Fall For This Clever Gmail Phishing Scam That Looks Legit
A recent report of a highly sophisticated phishing attack exploiting Google services targeting a lead developer at Ethereum Foundation, Nick Johnson, proves that internet users need to take more precautions to protect themselves from social engineering tactics like phishing.
April 17, 2025Source

Why 'One Community' Resonates in Cybersecurity
Our collective voices and one community will provide the intelligence we need to safeguard our businesses in today's modern digital environment.
April 17, 2025Source

Windows NTLM hash leak flaw exploited in phishing attacks on governments
A Windows vulnerability that exposes NTLM hashes using .library-ms files is now actively exploited by hackers in phishing campaigns targeting government entities and private companies.
April 17, 2025Source or Source

Internet — Security Issues — April 11th, 2025

Best free VPN of 2025: It's important to choose wisely
VPNs are best when they're paid for, but if a premium account isn't in the cards then here are our top recommendations for a free service.
April 11, 2025Source

Cybersecurity Community Must Not Remain Silent On Executive Order Attacking Former CISA Director
Cybersecurity professionals and the infosec community have essential roles to play in protecting our democracy, securing our elections, and building, testing, and safeguarding government infrastructure. It is critically important for us to speak up to ensure that essential work continues and that those engaged in these good faith efforts are not maligned by an administration that has tried to make examples of its enemies in many other fields.
April 11, 2025Source

Fortinet: Hackers retain access to patched FortiGate VPNs using symlinks
Fortinet warns that threat actors use a post-exploitation technique that helps them maintain read-only access to previously compromised FortiGate VPN devices even after the original attack vector was patched.
April 11, 2025Source

Hacked documents reveal guide to serving Elon Musk on private jets
A recent breach of Berkshire Hathaway-owned private jet company NetJets has revealed a guide for flight attendants serving Elon Musk, per a Bloomberg report. The memo offers an interesting glimpse into the personal preferences of the world's richest man.
April 11, 2025Source

Hackers Breach Morocco's Social Security Database
The hackers who posted the documents on Telegram said the attack was in response to alleged Moroccan "harassment" of Algeria on social media platforms.
April 11, 2025Source

Hackers exploit old FortiGate vulnerabilities, use symlink trick to retain limited access to patched devices
A threat actor that has been using known old FortiOS vulnerabilities to breach FortiGate devices for years has also been leveraging a clever trick to maintain undetected read-only access to them after the original access vector was locked down, Fortinet has revealed on Thursday.
April 11, 2025Source

In Other News: Scattered Spider Still Active, EncryptHub Unmasked, Rydox Extraditions
Noteworthy stories that might have slipped under the radar: Scattered Spider still active despite arrests, hacker known as EncryptHub unmasked, Rydox admins extradited to US.
April 11, 2025Source

Initial access brokers target mid-sized businesses for ransomware
Initial access brokers (IABs) are the invisible engine of modern cybercrime. They don't execute ransomware attacks, but they do enable them.
April 11, 2025Source

Interior Department Ousts Key Cyber Leaders Amid DOGE Spat
Senior Technology, Cybersecurity Officials Removed From Interior Department
April 11, 2025Source or Source or Source or Source or Source

KELA Digital Cyber Analysts improves security teams' efficiency
KELA unveiled Digital Cyber Analysts, next-generation AI-powered digital employees designed to transform how security teams consume, prioritize, and act on threat intelligence.
April 11, 2025Source

Medical Lab Hack Affects Planned Parenthood Patients
Laboratory Services Cooperative Says 1.6 Million Patients, Workers, Others Affected
April 11, 2025Source or Source or Source or Source or Source

Microsoft is rolling out its controversial Recall feature to Windows Insiders
Its release has been relayed several times in the past.
April 11, 2025Source

Microsoft: Windows 'inetpub' folder created by security fix, don't delete
Microsoft has now confirmed that an April 2025 Windows security update is creating a new empty "inetpub" folder and warned users not to delete it.
April 11, 2025Source

Nation-StateChina Admitted to Volt Typhoon Cyberattacks on US Critical Infrastructure: Report
In a secret meeting between Chinese and US officials, the former confirmed conducting cyberattacks on US infrastructure.
April 11, 2025Source

Radiology Practice Pays Feds $350,000 in HIPAA Settlement
HHS Cites Security Risk Analysis Failures in Hack That Affected Nearly 300,000
April 11, 2025Source or Source or Source

Source or Source

Ransomware attack cost IKEA operator in Eastern Europe $23 million
Fourlis Group, the operator of IKEA stores in Greece, Cyprus, Romania, and Bulgaria, has informed that the ransomware attack it suffered just before Black Friday on November 27, 2024, caused losses estimated to €20 million ($22.8 million).
April 11, 2025Source

Ransomware crims hammering UK more than ever as British techies complain the board just doesn't get it
Issues at the very top continue to worsen
April 11, 2025Source

Ransomware Hackers Target Active Directory Domain Controllers
Domain Controllers Commandeered to Distribute Malware, Warns Microsoft
April 11, 2025Source or Source or Source or Source or Source

Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle
The CVE-2025-22457 has already been exploited by a China-nexus hacking gang notorious for breaking into edge network devices.
April 11, 2025Source

Researcher uncovers dozens of sketchy Chrome extensions with 4 million installs
Even weirder: Why would Google give so many the "Featured" stamp for trustworthiness?
April 11, 2025Source

Rising Tides: Bryson Bort on Cyber Entrepreneurship and the Needed Focus on Critical Infrastructure
Very few people in the cybersecurity industry do not know, or know of, Bryson Bort, CEO/Founder of SCYTHE and the co-founder of ICS Village.
April 11, 2025Source

Security Bite: Down the rabbit hole of neat, lesser-known Terminal commands (Pt. 1)
You might be wondering, "What does this have to do with security?" Fair question—this is a 9to5Mac Apple security column, after all. While not all commands below aren't explicitly security-focused, they could help you work smarter, increase your efficiency, and allow you to show off some genuinely useful tricks.
April 11, 2025Source

SonicWall Patches High-Severity Vulnerability in NetExtender
SonicWall has released fixes for three vulnerabilities in NetExtender for Windows, including a high-severity bug.
April 11, 2025Source

Span Cyber Security Arena 2025: Infosec leaders to discuss the future of digital defense
Today, in the age of quantum threats, AI and sophisticated digital manipulations, the question is: where does the human factor end, and where does technology begin?
April 11, 2025Source

US lab testing provider exposed health data of 1.6 million people
Laboratory Services Cooperative (LSC) has released a statement informing it suffered a data breach where hackers stole sensitive information of roughly 1.6 million people from its systems.
April 11, 2025Source

Vulnerability in OttoKit WordPress Plugin Exploited in the Wild
A vulnerability in the OttoKit WordPress plugin with over 100,000 active installations has been exploited in the wild.
April 11, 2025Source

Western Sydney University discloses security breaches, data leak
Western Sydney University (WSU) announced two security incidents that exposed personal information belonging to members of its community.
April 11, 2025Source

Internet — Security Issues — April 7th, 2025

8 simple ways to teach your friends and family about cybersecurity - before it's too late
Your friends and family members are sitting ducks for online attackers. They need your help.
April 7, 2025Source

AI Outsmarts Human Red Teams in Phishing Tests
Hoxhunt Predicts Phishing-as-a-Service Will Adopt AI Spear-Phishing Agents
April 7, 2025Source or Source

CRM, Bulk Email Providers Targeted in Crypto Phishing Campaign
'PoisonSeed' phishing campaign targets CRM and bulk email providers to distribute "crypto seed phrase" messages.
April 7, 2025Source

Cyber security advice for political candidates
Threat actors target Canadian elections to influence decisions on key global issues or to exploit data and disrupt the democratic process.
April 7, 2025Source

Dental Practice Support Firm Notifying 173,400 of Email Hack
Breach Affects Pediatric, Orthodontic and Dental Surgery Practices in 6 States
April 7, 2025Source

Encryption method for key exchange enables tap-proof communication to fend off future quantum tech threats
Quantum computers are a specter for future data security because they might break many of today's encryption methods. Among other things, this will affect encrypted emails, messenger services, or online banking. Together with partners, researchers from Karlsruhe Institute of Technology (KIT) have developed a method that can reliably protect today's Internet communication from tomorrow's quantum technology threats.
April 7, 2025Source

Everest ransomware's dark web leak site defaced, now offline
The dark web leak site of the Everest ransomware gang has apparently been hacked over the weekend by an unknown attacker and is now offline.
April 7, 2025Source

FedRAMP's Automation Goal Brings Major Promises - and Risks
Analysts Praise FedRAMP's Speed Goals, but Worry About Unclear Execution Details
April 7, 2025Source or Source

Food giant WK Kellogg discloses data breach linked to Clop ransomware
US food giant WK Kellogg Co is warning employees and vendors that company data was stolen during the 2024 Cleo data theft attacks.
April 7, 2025Source

Google's Sec-Gemini v1 Takes on Hackers & Outperforms Rivals by 11%
Sec-Gemini v1 has access to real-time cybersecurity data from trusted sources including Google Threat Intelligence, Mandiant's attack reports, and the Open Source Vulnerabilities database.
April 7, 2025Source

Immuta Data Marketplace enhancements accelerate data provisioning
Immuta announced enhancements to its Data Marketplace solution to help organizations that are increasingly focusing on data-driven decision making and artificial intelligence address the increase in volume of data access requests while minimizing data risk.
April 7, 2025Source

Lazarus Expands NPM Campaign With Trojan Loaders
North Korea's Lazarus Deploys Malicious NPM Packages to Steal Data
April 7, 2025Source or Source or Source or Source

NIST Puts Pre-2018 CVEs on Back Burner as It Works to Clear Backlog
NIST has marked pre-2018 CVEs in NVD as 'Deferred' and will no longer spend resources on enriching them.
April 7, 2025Source

PCI DSS 4.0.1: A Cybersecurity Blueprint by the Industry, for the Industry
As PCI DSS 4.0.1 comes into force, it shows the power of industry collaboration in cybersecurity.
April 7, 2025Source

Port of Seattle Says 90,000 People Impacted by Ransomware Attack
The Port of Seattle says the personal information of 90,000 individuals was stolen in an August 2024 ransomware attack.
April 7, 2025Source

Ransomware Underground Faces Declining Relevance
Rising Attacks Mask Lowering Profits, Attention Economy Competition
April 7, 2025Source or Source or Source or Source

RunSafe Risk Reduction Analysis offers insights into memory-based CVEs
RunSafe Security launched the RunSafe Risk Reduction Analysis, which analyzes total exposure to Common Vulnerabilities and Exposures (CVEs) and memory-based zero days in software.
April 7, 2025Source

Scammers are exploiting tax season panic with convincing new email traps
"Surely the IRS can't ask for my credit card details?"
April 7, 2025Source

Someone hacked ransomware gang Everest's leak site
A leak site used by the Everest ransomware gang was hacked and defaced this weekend, TechCrunch has learned.
April 7, 2025Source

Suspected Scattered Spider Hacker Pleads Guilty
A 20-year-old arrested last year and charged alongside others believed to be members of Scattered Spider has pleaded guilty.
April 7, 2025Source

Tariff Wars: The Technology Impact
How CIOs and CISOs Can Navigate With Balance
April 7, 2025Source or Source or Source or Source

The Convergence of IAM, Cybersecurity, Fraud and Compliance
Gartner's Pete Redshaw on Why the CISO or CRO Should Take the Lead
April 7, 2025Source or Source or Source or Source

UK's demand for Apple backdoor should not be heard in secret, says court
The U.K. government has lost its bid to keep secret the details of a surveillance order it brought against Apple, according to a newly released decision by the U.K. surveillance powers' court.
April 7, 2025Source

WinRAR MotW bypass flaw fixed, update ASAP (CVE-2025-31334)
WinRAR users, upgrade your software as soon as possible: a vulnerability (CVE-2025-31334) that could allow attackers to bypass Windows' Mark of the Web (MotW) security warning and execute arbitrary code on your machine has been fixed in version 7.11.
April 7, 2025Source

Internet — Security Issues — April 4th, 2025

7 password rules security experts live by in 2025 - the last one might surprise you
What makes a password strong in 2025? How long should it be, and how often should you update it? Here's the latest recommendations from top cybersecurity experts.
April 4, 2025Source

23andMe Bankruptcy: Should DNA Data Go to the Top Bidder?
Lawyer Jonathan Armstrong on Legal, Ethical Fallout From Looming 23andMe Auction
April 4, 2025Source

Attackers Abuse Remote Desktop Protocol, Microsoft Binaries
Investigators See Ongoing Use of Living-Off-the-Land Binaries, Frequent RDP Abuse
April 4, 2025Source or Source or Source or Source

CaaStle CEO Accused of a Major Fraud Faux Pas
Company Says Misleading Revenue and Liquidity Numbers Provided to Key Stakeholders
April 4, 2025Source

Call Records of Millions Exposed by Verizon App Vulnerability
A patch has been released for a serious information disclosure vulnerability affecting a Verizon call filtering application.
April 4, 2025Source

Chinese Espionage Group Targeting Legacy Ivanti VPN Devices
More Evidence Surfaces of Chinese Hackers Targeting Ivanti Products
April 4, 2025Source

Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack
Evidence shows a SpotBugs token compromised in December 2024 was used in the March 2025 GitHub Actions supply chain attack.
April 4, 2025Source

Critical Apache Parquet Vulnerability Leads to Remote Code Execution
A critical vulnerability in Apache Parquet can be exploited to execute arbitrary code remotely, leading to complete system compromise.
April 4, 2025Source

DDoS Attacks Now Key Weapons in Geopolitical Conflicts, NETSCOUT Warns
Hackers now use AI and botnets to launch powerful DDoS attacks, bypassing security and overwhelming servers as law enforcement struggles to keep up.
April 4, 2025Source

EU may "make an example of X" by issuing $1 billion fine to Musk's social network
Regulators discuss size of penalty as X calls punishment "political censorship."
April 4, 2025Source

Gamers beware! This new malware hides in your GPU
Malware that targets gamers is so uncool!
April 4, 2025Source

In Other News: Apple Improving Malware Detection, Cybersecurity Funding, Cyber Command Chief Fired
Noteworthy stories that might have slipped under the radar: Apple adding TCC events to Endpoint Security, cybersecurity funding report for Q1 2025, Trump fires the head of NSA and Cyber Command.
April 4, 2025Source

ISMG Editors: Who Will Shore Up Trump's Federal Cyber Cuts?
Also: 23andMe's Privacy Meltdown, Investors' $500M AI Bet on ReliaQuest
April 4, 2025Source or Source or Source or Source

Mullvad VPN review: Fast speeds and low prices, with a focus on privacy and anonymity
Mullvad VPN may be one of the more obscure VPN services, but its no-frills subscription model and advanced security features make it ideal for people interested in strong online security and privacy.
April 4, 2025Source

North Korean Hackers Disguised as IT Workers Targeting UK, European Companies, Google Finds
The attackers pose as legitimate remote IT workers, looking to both generate revenue and access sensitive company data through employment. "Europe needs to wake up fast," according to Google's Jamie Collier.
April 4, 2025Source

NSA warns "fast flux" threatens national security. What is fast flux anyway?
Used by nation-states and crime groups, fast flux bypasses many common defenses.
April 4, 2025Source

Oracle Confirms Cloud Hack
Oracle has confirmed suffering a data breach but the tech giant is apparently trying to downplay the impact of the incident.
April 4, 2025Source

PoisonSeed phishing campaign behind emails with wallet seed phrases
A large-scale phishing campaign dubbed 'PoisonSeed' compromises corporate email marketing accounts to distribute emails containing crypto seed phrases used to drain cryptocurrency wallets.
April 4, 2025Source

Port of Seattle says ransomware breach impacts 90,000 people
​Port of Seattle, the U.S. government agency overseeing Seattle's seaport and airport, is notifying roughly 90,000 individuals of a data breach after their personal information was stolen in an August 2024 ransomware attack.
April 4, 2025Source

State Bar of Texas Says Personal Information Stolen in Ransomware Attack
The State Bar of Texas is notifying thousands of individuals that their personal information was stolen in a February ransomware attack.
April 4, 2025Source

The best password managers for businesses: Expert tested
A secure password management system is a must for businesses of all sizes. Whether you want an enterprise-grade solution or a simple setup for a small business, these are the best options on the market.
April 4, 2025Source

The best travel VPNs: Expert tested
When you travel, it's important to protect your privacy with VPNs that shield you from spying and online tracking. Our top picks include features like fast speeds, expansive server networks, unlimited connections, and more.
April 4, 2025Source

Trump Fires NSA, Cyber Command Chief, Fueling Security Fears
Officials Warn Trump's Abrupt Firings Severely Weaken National Cyber Defenses
April 4, 2025Source or Source or Source or Source or Source

UK Home Office Ransom Ban Proposal Needs More Clarity
Cybersecurity Wonks Find Fault With Home Office Ransomware Proposals
April 4, 2025Source or Source or Source or Source or Source

US, Allies Warn of Threat Actors Using 'Fast Flux' to Hide Server Locations
US and allied countries warn of threat actors using the "fast flux" technique to change DNS records and hide malicious servers' locations.
April 4, 2025Source

What last year's biggest data breaches have taught us about authentication [Q&A]
According to the Identity Theft Resource Center (ITRC) there were 1.1 billion breaches in the first half of 2024 -- a 490 percent increase over the first half of the year before.
April 4, 2025Source

Internet — Security Issues — April 2nd, 2025

Apple Removes VPN Apps from App Store After Links to Chinese Military Are Found
Apple has removed two VPN applications, Thunder VPN and Snap VPN, from the App Store after reports surfaced regarding their links to a Chinese company with alleged military ties. The reports, conducted by the Tech Transparency Project and the Financial Times, say that these apps, along with three others, Turbo VPN, VPN Proxy Master, and Signal Secure VPN (unrelated to the Signal messaging app), are connected to Qihoo 360, a company sanctioned by the United States in 2020.
April 2, 2025Source

AVG Internet Security review: Reliable, budget-friendly antivirus software
AVG Internet Security rounds out the company's solid antivirus software with additional online protections, while not costing too much.
April 2, 2025Source

Best antivirus software 2025: Keep your PC safe from malware, spyware, and more
You need more than just prayer and luck—choose from our top antivirus software picks to stay safe.
April 2, 2025Source

Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities
Chrome 135 and Firefox 137 were released on Tuesday with fixes for several high-severity memory safety vulnerabilities.
April 2, 2025Source

Cisco warns of CSLU backdoor admin account used in attacks
Cisco has warned admins to patch a critical Cisco Smart Licensing Utility (CSLU) vulnerability, which exposes a built-in backdoor admin account now used in attacks.
April 2, 2025Source

Clicked on a phishing link? 7 steps to take immediately to protect your accounts
Phishing scams are becoming brutally effective, and even technically sophisticated people can be fooled. Here's how to limit the damage immediately and what to do next.
April 2, 2025Source

Counterfeit Android devices found preloaded with Triada malware
A new version of the Triada trojan has been discovered preinstalled on thousands of new Android devices, allowing threat actors to steal data as soon as they are set up.
April 2, 2025Source

Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion
Cyberhaven bags $100 million in funding at a billion-dollar valuation, a sign that investors remain bullish on data security startups.
April 2, 2025Source

Does a VPN really provide 100% privacy? Here's what you need to know
VPNs can help keep you private, but they won't make you disappear.
April 2, 2025Source

Elon Musk's X might have a mole problem: "How could someone enumerate all Twitter user IDs, unless they were an employee?"
X was hit by two major data breaches in 2023 and 2025, with the data belonging to over 200 million users, including 2.8 billion unique Twitter IDs, released to the public for free.
April 2, 2025Source

Email SecurityGoogle Brings End-to-End Encrypted Emails to All Enterprise Gmail Users
Gmail now allows enterprise users to send end-to-end encrypted emails to colleagues, and will soon allow sending to any inbox.
April 2, 2025Source

Exabeam Nova accelerates threat detection and response
Exabeam unveiled Exabeam Nova, an autonomous AI agent delivering actionable intelligence that enables security teams to respond faster to incidents, reduce investigation times by over 50%, and mitigate threats more effectively.
April 2, 2025Source

Google DeepMind Unveils Framework to Exploit AI's Cyber Weaknesses
DeepMind found that current AI frameworks are ad hoc, not systematic, and fail to provide defenders with useful insights.
April 2, 2025Source

How to map and manage your cyber attack surface with EASM
In today's digital landscape, understanding your organization's attack surface is crucial for maintaining robust cybersecurity. To effectively manage and mitigate the cyber-risks hiding in modern attack surfaces, it's important to adopt an attacker-centric approach.
April 2, 2025Source

ImageRunner Flaw Exposed Sensitive Information in Google Cloud
Google has patched a Cloud Run vulnerability dubbed ImageRunner that could have been exploited to gain access to sensitive data.
April 2, 2025Source

Microsoft's 'ultimate goal is to remove passwords completely' — this overhaul could make it happen
The new interface for logging into a Microsoft account is optimized for a passwordless setup and using passkeys.
April 2, 2025Source

Nation-StateLazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks
North Korea's Lazarus hackers are using the ClickFix technique for malware deployment in fresh attacks targeting the cryptocurrency ecosystem.
April 2, 2025Source

North Korea's IT Operatives Are Exploiting Remote Work Globally
The global rise of North Korean IT worker infiltration poses a serious cybersecurity risk—using fake identities, remote access, and extortion to compromise organizations.
April 2, 2025Source

North Korean IT workers set their sights on European organizations
North Korean IT workers are expanding their efforts beyond the US, and are seeking to fraudulently gain employment with organizations around the world, but most especially in Europe.
April 2, 2025Source

Oracle's masterclass in breach comms: Deny, deflect, repeat
Fallout shows how what you say must be central to disaster planning
April 2, 2025Source

Police shuts down KidFlix child sexual exploitation platform
Kidflix, one of the largest platforms used to host, share, and stream child sexual abuse material (CSAM) on the dark web, was shut down on March 11 following a joint action coordinated by German law enforcement.
April 2, 2025Source

Politically motivated DDoS attacks target critical infrastructure
Distributed Denial of Service (DDoS) attacks have become a dominant means of waging cyberwarfare linked to socio-political events such as elections, civil protests and policy disputes, according to the latest DDoS Threat Intelligence Report from NetScout.
April 2, 2025Source

Questions Remain Over Attacks Causing DrayTek Router Reboots
DrayTek has shared some clarifications regarding the recent attacks causing router reboots, but some questions remain unanswered.
April 2, 2025Source

Should You Use an Identity Theft Protection Service? 3 Things to Consider
Knowledge is your greatest weapon against fraud, and these services could help to provide the tools you need.
April 2, 2025Source

Strengthening Our App Ecosystem: Enhanced Tools for Secure & Efficient Development
Knowing that you're building on a safe, secure ecosystem is essential for any app developer. We continuously invest in protecting Android and Google Play, so millions of users around the world can trust the apps they download and you can build thriving businesses. And we're dedicated to continually improving our developer tools to make world--class security even easier to implement.
April 2, 2025Source

The core pillars of cyber resiliency
As we enter a new era of cybersecurity threats, which has prompted the evolution of new vulnerabilities, organizations are challenged on how to best respond to these evolving attacks. The threat landscape is more complex than ever causing organizations to grapple with new tactics to safeguard their critical data.
April 2, 2025Source

The rise of the 'gray bots' targeting websites for data
We all know about good bots like search engine crawler bots, SEO bots, and customer service bots. And we know about bad bots, designed for malicious or harmful online activities like breaching accounts to steal personal data or commit fraud.
April 2, 2025Source

Travelers Cyber Risk Services reduces the risk of a cyberattack
The Travelers Companies announced Travelers Cyber Risk Services, a suite of capabilities added to all cyber liability policies designed to help lower both the risk of a cyberattack and the cost to recover from one.
April 2, 2025Source

Watch out! Don't fall victim to these fake CAPTCHA scams on the web
Fake CAPTCHA tests are increasingly being used by hackers to spread malware. Here's what you need to know.
April 2, 2025Source

What NIS2 implementation means for enterprises [Q&A]
As cyberattacks across sectors continue to rise, businesses face pressure to enhance their security postures amid budget restraints and operational challenges.
April 2, 2025Source

X Breach: Here's what hackers can do with the leaked information
Don't fall for phishing emails related to the leak.
April 2, 2025Source

Internet — Security Issues — March 31st, 2025

6 Best Password Recovery Tools
Looking for a trustworthy password recovery tool? Use our guide to review our editorial picks and compare pricing, features, pros and cons.
March 31, 2025Source

A Peek Into How AI 'Thinks' - and Why It Hallucinates
Researchers Try to Determine What Happens Between Input and Output
March 31, 2025Source or Source or Source or Source or Source

Are Passwords Dead? What Are Passkeys, and Why Everyone's Talking About Them
Passkeys Explained
March 31, 2025Source

Best free antivirus 2025: Keep your PC safe without spending a dime
Many of the big names in antivirus offer a free version of their security suites. Here are our top choices for free antivirus.
March 31, 2025Source

Canada launches breach risk self-assessment online tool
Privacy Commissioner of Canada Philippe Dufresne has launched a new online tool that will help businesses and federal institutions that experience a privacy breach to assess whether the breach is likely to create a real risk of significant harm to individuals.
March 31, 2025Source

Check Point Breach 'Very Pinpointed Event'
Hackers Claim on BreachForums to Have Stolen 'Highly Sensitive' Data
March 31, 2025Source or Source

CISA Analyzes Malware Used in Ivanti Zero-Day Attacks
CISA has published its analysis of Resurge, a SpawnChimera malware variant used in attacks targeting a recent Ivanti Connect Secure zero-day.
March 31, 2025Source

CISA reveals new malware variant used on compromised Ivanti Connect Secure devices
CISA has released indicators of compromise, detection signatures, and updated mitigation advice for rooting out a newly identified malware variant used by the attackers who breached Ivanti Connect Secure VPN appliances in December 2024 by exploiting the CVE-2025-0282 zero-day.
March 31, 2025Source

'Crocodilus' Android Banking Trojan Allows Device Takeover, Data Theft
The newly identified Android banking trojan Crocodilus takes over devices, enabling overlay attacks, remote control, and keylogging.
March 31, 2025Source

EU invests €1.3 billion in AI and cybersecurity
The European Commission has approved the 2025-2027 Digital Europe Programme (DIGITAL) work program, allocating €1.3 billion to advance key technologies essential for the EU's future and technological sovereignty.
March 31, 2025Source

FTC: 23andMe's Buyer Must Uphold Co.'s Data Privacy Pledge
Letter to Bankruptcy Trustee Says 23andMe's Privacy Promises Must Carry Over
March 31, 2025Source or Source or Source or Source

GovernmentPart of EU's New €1.3 Billion Investment Going to Cybersecurity
The European Commission plans on investing €1.3 billion ($1.4 billion) in cybersecurity, artificial intelligence and digital skills.
March 31, 2025Source

Hackers abuse WordPress MU-Plugins to hide malicious code
Hackers are utilizing the WordPress mu-plugins ("Must-Use Plugins") directory to stealthily run malicious code on every page while evading detection.
March 31, 2025Source

Hacker Leaks Samsung Customer Data
Hacker leaks 270,000 customer tickets allegedly stolen from Samsung Germany using long-compromised credentials.
March 31, 2025Source

North Korean hackers adopt ClickFix attacks to target crypto firms
The notorious North Korean Lazarus hacking group has reportedly adopted 'ClickFix' tactics to deploy malware targeting job seekers in the cryptocurrency industry, particularly centralized finance (CeFi).
March 31, 2025Source

Oracle Health Responding to Hack of Legacy Cerner EHR Data
Customer Credentials Possibly Compromised at EHR Vendor Acquired by Oracle in 2022
March 31, 2025Source or Source or Source or Source or Source

Privacy died last century, the only way to go is off-grid
From smartphones to surveillance cameras to security snafus, there's no escape
March 31, 2025Source

Ransomware crews add 'EDR killers' to their arsenal -- and some aren't even malware
Crims are disabling security tools early in attacks, Talos says
March 31, 2025Source

Rootkit, Backdoor and Tunneler: Ivanti Malware Does It All
CISA Publishes Anatomy of Advanced Ivanti VPN Malware
March 31, 2025Source or Source

senhasegura rebrands as Segura, marking a new chapter in identity security
senhasegura, a globally recognized leader in Privileged Access Management (PAM), announces its evolution into Segura, marking a new chapter for the company and its mission to deliver futureproof identity security.
March 31, 2025Source

Speed versus Security: The Digital Bank Dilemma
Jason Costain on Ways Traditional and Digital Banks Could Learn from Each Other
March 31, 2025Source or Source or Source

Standardized security playbooks can improve protection against cyberattacks
One attack, many responses—organizations use various solutions to ward off online attacks. The playbooks that outline countermeasures also vary in their specifics. In the CyberGuard project, Fraunhofer researchers are working on standardized playbooks to help companies optimize their security strategies and align them with each other. The playbooks are generated by large language models and support the automation of IT security.
March 31, 2025Source

Threat Actors Deploy WordPress Malware in 'mu-plugins' Directory
Sucuri has discovered multiple malware families deployed in the WordPress mu-plugins directory to evade routine security checks.
March 31, 2025Source

What users need to know about privacy and data after 23andMe's bankruptcy filing
23andMe, one of the first companies to provide direct-to-consumer genetic testing kits, has filed for bankruptcy. Since its founding in 2006, it has sold over 12 million DNA kits, with high-profile users including Oprah Winfrey and Warren Buffett.
March 31, 2025Source

Windows 11 quick machine recovery: Restoring devices with boot issues
Microsoft has rolled out quick machine recovery, a new Windows feature aimed at preventing prolonged widespread outages like the one caused by a faulty CrowdStrike update in July 2024.
March 31, 2025Source

Zero to Hero -- A "Measured" Approach to Building a World-Class Offensive Security Program
A strong security program will sometimes require substantial organizational and cultural changes around security practices, and inevitably, a higher cost.
March 31, 2025Source

Internet — Security Issues — March 28th, 2025

Again and again, NSO Group's customers keep getting their spyware operations caught
The two journalists, who work for the Serbia-based Balkan Investigative Reporting Network (BIRN), received suspicious text messages including a link — basically a phishing attack, according to the nonprofit. In one case, Amnesty said its researchers were able to click on the link in a safe environment and see that it led to a domain that they had previously identified as belonging to NSO Group's infrastructure.
March 28, 2025Source

Already using random passwords? Great. It's still not enough
Times are changing.
March 28, 2025Source

Cardiff's children's chief confirms data leak 2 months after cyber risk was 'escalated'
Department director admits Welsh capital's council still trying to get heads around threat of dark web leaks
March 28, 2025Source

Cloudflare open sources OPKSSH to bring Single Sign-On to SSH
OPKSSH (OpenPubkey SSH) makes it easy to authenticate to servers over SSH using OpenID Connect (OIDC), allowing developers to ditch manually configured SSH keys in favor of identity provider-based access.
March 28, 2025Source

Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware
Analysis found that 99% of healthcare organizations are vulnerable to publicly available exploits.
March 28, 2025Source

Critical Firefox, Tor Browser sandbox escape flaw fixed (CVE-2025-2857)
Google's fixing of CVE-2025-2783, a Chrome zero-day vulnerability exploited by state-sponsored attackers, has spurred Firefox developers to check whether the browser might have a similar flaw -- and they found it.
March 28, 2025Source

Cyber threats to elections
Cyber threat activity targeting democratic processes is on the rise worldwide. Leading up to and during an election, cyber threat actors may launch cyber attacks to:
March 28, 2025Source

Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia
Firefox developers have determined that their browser is affected by a vulnerability similar to the recent Chrome sandbox escape zero-day.
March 28, 2025Source

Fresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europe
The Grandoreiro banking trojan has reemerged in new campaigns targeting users in Latin America and Europe.
March 28, 2025Source

How Enterprises Can Mitigate the Quiet Threat of Shadow AI
C-Suite Strategies for AI Risk Management, Data Protection
March 28, 2025Source or Source

How the FBI Tracked, and Froze, Millions Sent to Criminals in Massive Caesars Casino Hack
A new court document shows the FBI raced to stop hackers moving the ransom Caesars paid, with authorities freezing much of the extortion payment.
March 28, 2025Source

In Other News: Hellcat Hackers Unmasked, CrushFTP Bug Controversy, NYU Hacked
Noteworthy stories that might have slipped under the radar: Key members of Hellcat ransomware group identified, controversy around CrushFTP flaw CVE, NYU website hacked and defaced.
March 28, 2025Source

ISMG Editors: Ransomware's Stealth versus Spectacle Tactics
Also: Rapid7's Boardroom Shake-Up, China's Tactical Cyber Shift
March 28, 2025Source or Source or Source or Source or Source

Microsoft Makes A Big Security Change Impacting Over 1 Billion Users
We've reported a number of sophisticated cyberattacks where threat actors circumvent 2FA restrictions. In response to the increased vulnerability of passwords, Microsoft has announced a major change in its authentication requirements that will affect over a billion users. This change will see a significant shift from passwords to passkeys. Microsoft believes that by the end of April, it will have made a passwordless sign-in experience possible for most users worldwide.
March 28, 2025Source

Microsoft's passwordless future is here for Outlook, Xbox, 365, and more
Microsoft's new sign-in screens push you to finally ditch passwords - here's how.
March 28, 2025Source

New banking trojan targets 750+ finance & crypto Android apps
Downloading apps from outside the Play Store without being 100% sure of their legitimacy or that they come from a reliable source isn't the best idea. This is the starting point for many malware attacks. Bad actors take advantage of the ignorance or naivety of internet users. A new banking trojan targeting Android devices has emerged as a reminder.
March 28, 2025Source

New Issuance Requirements Improve HTTPS Certificate Validation
HTTPS certificate issuance now requires Multi-Perspective Issuance Corroboration and linting to improve validation.
March 28, 2025Source

Nir Zuk: Google's Multi-Cloud Security Strategy Won't Work
Palo Alto Networks Founder Says Customers Prefer Independent Multi-Cloud Solutions
March 28, 2025Source or Source or Watch Video or Source

Oracle Health breach compromises patient data at US hospitals
A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from legacy servers.
March 28, 2025Source

Over 60 percent of malicious traffic targets retailers ahead of PCI DSS 4.0 deadline
As we approach the 31st March deadline for compliance with the new PCI DSS 4.0 payment security standard, new data from Cequence Security shows automated fraud is increasing with retailers facing 66.5 percent of all malicious traffic.
March 28, 2025Source

Report: Top Trump Officials' Private Data Leaked
Private Details of Top Trump Officials Found Online Amid Growing Security Scandal
March 28, 2025Source or Source or Source

Retail giant Sam's Club investigates Clop ransomware breach claims
​Sam's Club, an American warehouse supermarket chain owned by U.S. retail giant Walmart, is investigating claims of a Clop ransomware breach.
March 28, 2025Source

Revenue Cycle Management Firm Hack Affects Patients, Clients
Incident Spotted in March 2024 Is Yet Another Attack Against Medical Billing Firms
March 28, 2025Source or Source or Source

SourceSource

Security in the CI/CD Pipeline
Secure CI/CD pipelines with integrated security checks, static analysis, dependency scanning, and container security to prevent vulnerabilities in production.
March 28, 2025Source

Speed versus Security: The Digital Bank Dilemma
Jason Costain on Ways Traditional and Digital Banks Could Learn from Each Other
March 28, 2025Source or Source or Source or Source or Source

Top firewall management challenges for large enterprises
Network security issues are among the most significant challenges for larger enterprises. In fact, a UK government Cyber Security Breach Survey revealed that 50% of all businesses in the United Kingdom were targeted by cyberattacks between 2023 and 2024.
March 28, 2025Source

U.S. officials in Signal chat left their Venmo data exposed online
The tech security breaches involving U.S. officials show no signs of slowing.
March 28, 2025Source

Internet — Security Issues — March 24th, 2025

23andMe faces an uncertain future — so does your genetic data
DNA and genetic testing firm 23andMe is in turmoil following a 2023 data breach and its ongoing financial decline. The once-pioneering giant now faces an uncertain future as bankruptcy looms over the company, intensifying concerns about what might happen to the genetic data of 23andMe's some 15 million customers.
March 24, 2025Source

AI-driven phishing scams exploded last year. The trend continues in 2025
Phishing scams are already hard to spot, but AI is making them more deceptive and more dangerous than ever.
March 24, 2025Source

Albabat Ransomware Expands Targets, Abuses GitHub
New versions of the Albabat ransomware target Windows, Linux, and macOS, and retrieve configuration files from GitHub.
March 24, 2025Source

Alleged Snowflake hacker agrees to be extradited to the US
Connor Moucka faces 20 federal charges connected to data breaches that hit companies like Ticketmaster and AT&T.
March 24, 2025Source

API Security: Another Critical Asset Under Threat
Adam Arellano of Traceable by Harness on Creating Multi-Layered Defense
March 24, 2025Source or Source or Source or Source

As nation-state hacking becomes 'more in your face,' are supply chains secure?
Ex-US Air Force officer says companies shouldn't wait for govt mandates
March 24, 2025Source

Chinese Weaver Ant hackers spied on telco network for 4 years
A China-linked advanced threat group named Weaver Ant spent more than four years in the network of a telecommunications services provider, hiding traffic and infrastructure with the help of compromised Zyxel CPE routers.
March 24, 2025Source

Critical Next.js auth bypass vulnerability opens web apps to compromise (CVE-2025-29927)
A critical vulnerability (CVE-2025-29927) in the open source Next.js framework can be exploited by attackers to bypass authorization checks and gain unauthorized access to web pages they should no have access to (e.g., the web app's admin panel).
March 24, 2025Source or Source

Cyberattack disrupts train ticket sales in Ukraine
Ukraine's state-owned railway operator Ukrzaliznytsia said Monday that it was hit by a large-scale cyberattack.
March 24, 2025Source or Source

'Delete your data': Genetic testing firm 23andMe files for bankruptcy
Pioneering US genetic testing company 23andMe has filed for bankruptcy and is looking for a buyer two years after hackers gained access to millions of profiles.
March 24, 2025Source

Despite Rip-and-Replace Efforts, FCC Suspects Banned Chinese Telecom Providers Still Active in US
The FCC is investigating whether Chinese firms such as Huawei, ZTE and China Telecom are still operating in the US.
March 24, 2025Source

Encrypted Messaging Apps Promise Privacy. Government Transparency Is Often the Price
Public officials and private citizens are consistently warned about hacking and data leaks, but technologies designed to increase privacy often decrease government transparency.
March 24, 2025Source

FBI Reveals the Dark Side of Free Online File Conversion Tools
We often find ourselves needing to convert or merge files. However, not all of us have software installed on our PCs to perform that task. In this case, many of us turn to the internet to search for free online file converter tools. While these file converter tools do the job we need, they could be stealing our info or injecting malware on our devices, warns the FBI.
March 24, 2025Source

FBI Warns Millions Of Drivers To Beware Of Unpaid Toll Road SMS Scam
In today's high-tech world, some toll roads keep the traffic moving by using transponders and cameras, rather than requiring that every driver come to a full stop to shove money into a machine (or into the hands of a gatekeeper). Mistakes can happen, though, and the FBI issued a warning to hundreds of millions of commuters to be on the lookout for fraudulent text messages claiming an unpaid toll is owed.
March 24, 2025Source

Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks
As businesses continue to migrate their operations to the cloud, maintaining and managing the security of these environments has become mission-critical. Microsoft 365 is a widely adopted suite of productivity tools, but relying solely on its built-in security features may leave organizations vulnerable to significant risks.
March 24, 2025Source

How AI, corruption and digital tools fuel Europe's criminal underworld
Europol has released its 2025 report on serious and organized crime in the EU. The EU Serious and Organised Crime Threat Assessment (EU-SOCTA) is based on intelligence from EU countries and global law enforcement. The findings are stark. Organized crime is becoming more complex and harmful, with deeper roots across Europe.
March 24, 2025Source

I'm watching out for personalized scams. You should, too
A strong first line of defense is awareness.
March 24, 2025Source

iProov Workforce MFA mitigates risk of account takeovers
iProov launched iProov Workforce MFA. This device-independent, FIDO Alliance-certified, biometric authentication solution helps organizations mitigate the risk of one of workforce security's most crucial concerns: account takeover.
March 24, 2025Source

Is your Windows PC's security firewall good enough? An explainer
Does the Windows firewall protect your computer sufficiently? What contribution does your router make -- and who needs additional security software? This article explains.
March 24, 2025Source

Malware strikes again. I'm starting to worry about Steam's lax security
For the second time in two months, a new Steam game listing has been used to spread malware.
March 24, 2025Source

Medusa Ransomware Brings Its Own Vulnerable Driver
Hackers Use Stolen Certificates to Bypass Endpoint Detection and Response
March 24, 2025Source or Source or Source or Source or Source

NetSfere Launches Quantum-Resilient Messaging Platform for Enterprise and Government Use
NetSfere Integrates ML-KEM and AES into its text, voice and video messaging platform to meet 2027 NSA Quantum Security mandates.
March 24, 2025Source

New VanHelsing ransomware targets Windows, ARM, ESXi systems
A new multi-platform ransomware-as-a-service (RaaS) operation named VanHelsing has emerged, targeting Windows, Linux, BSD, ARM, and ESXi systems.
March 24, 2025Source

NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD
The effects of the backlog are already being felt in vulnerability management circles where NVD data promises an enriched source of truth.
March 24, 2025Source

Oracle Denies Cloud Breach After Hacker Offers to Sell Data
Oracle has denied that Cloud systems have been breached after a hacker claimed to have stolen millions of records.
March 24, 2025Source or Microsoft announces security AI agents to help overwhelmed humans
Microsoft has six new security agents that can do things like process phishing and data loss alerts
March 24, 2025
Source or Source

Proof of Concept: Is the US Losing Its Cyber Grip?
Cunningham and Daniel Warn That Poor Leadership, Cuts Are Hurting US Cyber Posture
March 24, 2025Source or Source

Report: Fortune 500 employee-linked account exposure
A backbone of our economy, Fortune 500 companies employ more than 31 million people worldwide.
March 24, 2025Source

Rethinking risk -- are you taking the right path around security?
In the film Sliding Doors, a split second choice leads to two branching stories -- yet while the two stories are very different, they both lead to hospital trips and potential tragedy. The world of cyber security is similar. Whatever decisions we make, we are still under pressure and we will -- eventually, whatever we do -- end up facing significant risk.
March 24, 2025Source

Russian Firm Offers $4 Million for Telegram Exploits
A Russian exploit acquisition firm is offering up to $4 million for a full-chain exploit targeting messaging service Telegram.
March 24, 2025Source

Secure by Design Must Lead Software Development
Crossley of Schneider Electric Urges Supplier Scrutiny and Continuous Risk Review
March 24, 2025Source or Source or Source or Source or Source

Tencent Says It Does More in AI With Fewer GPUs
Not Every New Generation of LLM Needs Exponentially More Chips, Says Tencent Exec
March 24, 2025Source or Source or Source or Source

US Lifts Sanctions Against Crypto Mixer Tornado Cash
The US Department of the Treasury has removed sanctions against the fully decentralized cryptocurrency mixer service Tornado Cash.
March 24, 2025Source or Source

Using security information and event management tools to manage cyber security risks (ITSM.80.024)
This publication provides large organizations and enterprises with advice and guidance related to security information and event management (SIEM) solutions. SIEM solutions are sets of tools and services that collect, aggregate and analyze volumes of data from multiple sources in real time. SIEMs are an important enterprise security solution to incorporate in a defence-in-depth approach to cyber security and risk management.
March 24, 2025Source

Wheelchair Firm Ramps Up Notices to 500,000 for Email Hack
Large Health Data Breach Started With Phishing Lure in Employees' Email
March 24, 2025Source or Source or Source or Source or Source

Why we need to focus on mobile device security [Q&A]
When getting a new smartphone most people focus on features and pricing, while security tends to be overlooked. But as we access the internet more using mobile devices, protecting users' personal information, transactions, and digital identities is vital.
March 24, 2025Source

Internet — Security Issues — March 21st, 2025

A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
March 21, 2025Source

A Win for Encryption: France Rejects Backdoor Mandate
In a moment of clarity after initially moving forward a deeply flawed piece of legislation, the French National Assembly has done the right thing: it rejected a dangerous proposal that would have gutted end-to-end encryption in the name of fighting drug trafficking. Despite heavy pressure from the Interior Ministry, lawmakers voted Thursday night (article in French) to strike down a provision that would have forced messaging platforms like Signal and WhatsApp to allow hidden access to private conversations.
March 21, 2025Source

AI-driven phishing scams exploded last year. The trend continues in 2025
Phishing scams are already hard to spot, but AI is making them more deceptive and more dangerous than ever.
March 21, 2025Source

China Borrows From Feds' Anti-Hacker Psychological Playbook
Supposed Taiwanese State Hackers Unmasked by China's Ministry of State Security
March 21, 2025Source or Source or Source or Source

Chinese Hackers Exploit Unpatched Servers in Taiwan
UAT-5918 Breaches Taiwan's Critical Sectors Using N-Day Flaws for Cyberespionage
March 21, 2025Source or Source or Source

Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley
The FishMonger APT group, a subdivision of Chinese cybersecurity firm I-Soon, compromised seven organizations in a 2022 campaign.
March 21, 2025Source

Enterprise AI usage surges but security worries remain
A new report from Zscaler reveals a 3,000 percent year-on-year growth in enterprise use of AI/ML tools, highlighting the rapid adoption of AI technologies across industries to unlock new levels of productivity, efficiency, and innovation.
March 21, 2025Source

Fake Out: Babuk2 Ransomware Group Claims Bogus Victims
What Do You Mean, Hospital-Targeting Sociopath Ransomware Wielders Continue to Lie?
March 21, 2025Source or Source or Source or Source or Source

Former NFL, Michigan Assistant Coach Matt Weiss Charged With Hacking for Athletes' Intimate Photos
Former NFL and University of Michigan assistant football coach Matt Weiss hacked into the computer accounts of thousands of college athletes seeking intimate photos and videos.
March 21, 2025Source

Fortinet-Targeting Ransomware Attacks Leave Devices Patched
'Wave of Ransomware Attacks' Hitting FortiOS and FortiProxy Devices, Warn Experts
March 21, 2025Source or Source or Source or Source

Google Maps yanks over 10,000 fake business listings - how to spot the scam
The fake listings were part of a scam that used the old bait-and-switch tactic to prey on people - and there may be more lurking out there.
March 21, 2025Source

Google search might be sharing your home address. Here's how to stop it
Fully restoring your anonymity is a two-step process.
March 21, 2025Source

How cyber security experts are fighting AI-generated threats
AI-powered cyber security is critical to staying ahead of attackers
March 21, 2025Source

How Google-Wiz Deal Counters Microsoft Defender's Dominance
Google Aims to Match Microsoft Defender With $32B Buy of Wiz's Cloud Security Tech
March 21, 2025Source or Source or Source or Source or Source

Impact, Root Cause of GitHub Actions Supply Chain Hack Revealed
More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.
March 21, 2025Source

In Other News: Critical Chrome Bug, Capital One Hacker Resententencing, Story of Expat Flaw
Noteworthy stories that might have slipped under the radar: Capital One hacker's sentence reversed, Google patches critical Chrome vulnerability, the story of an Expat flaw.
March 21, 2025Source

ISMG Editors: Impact of Google's $32B Buy on Cloud Security
Also: Trump's Cybersecurity Shake-Up, IBM's X-Force Event Highlights
March 21, 2025Source or Source or Source or Source or Source

Malicious ads target Semrush users to steal Google account credentials
Cyber crooks are exploiting users' interest in Semrush, a popular SEO, advertising, and market research SaaS platform, to steal their Google account credentials.
March 21, 2025Source

NAKIVO Backup & Replication vulnerability exploited by attackers (CVE-2024-48248)
A vulnerability (CVE-2024-48248) in NAKIVO Backup and Replication, a backup, ransomware protection and disaster recovery solution designed for organizations of all sizes and managed service providers (MSPs), is being actively exploited.
March 21, 2025Source

New Jailbreak Technique Uses Fictional World to Manipulate AI
Cato Networks discovers a new LLM jailbreak technique that relies on creating a fictional world to bypass a model's security controls.
March 21, 2025Source

Ransomware Group Claims Attack on Virginia Attorney General's Office
The Cloak ransomware group has claimed responsibility for a February cyberattack on Virginia Attorney General's Office
March 21, 2025Source

Ransomware readiness -- how boards can lead the charge against cyber threats [Q&A]
Ransomware attacks are increasingly targeting organizations across industries, with the potential to cause devastating financial, operational, and reputational damage.
March 21, 2025Source

Russian zero-day seller is offering up to $4 million for Telegram exploits
Operation Zero, a company that acquires and sells zero-days exclusively to the Russian government and local Russian companies, announced on Thursday that it's looking for exploits for the popular messaging app Telegram, and is willing to offer up to $4 million for them.
March 21, 2025Source

Shifting the Mindset from Cost Center to Revenue Generator
How Strong AML and Fraud Prevention Controls Can Differentiate Your Fintech and Help You Scale
March 21, 2025Source or Source

Software Firm Notifying Patients, Practices of Data Exposure
Researcher Found Unsecured Database Server Containing 1,864 GB of OrthoMinds' Data
March 21, 2025Source or Source or Source or Source or Source

Steam pulls game demo infecting Windows with info-stealing malware
Valve has removed from its Steam store the game title 'Sniper: Phantom's Resolution' following multiple users reporting that the demo installer infected their systems with information stealing malware.
March 21, 2025Source

Tech Giants, Utility Firms Form AI Consortium
Open Power AI Consortium Members Include Nvidia and Microsoft
March 21, 2025Source or Source or Source or Source or Source or Source

US removes sanctions against Tornado Cash crypto mixer
The U.S. Department of Treasury announced today that it has removed sanctions against Tornado Cash, a cryptocurrency mixer used by North Korean Lazarus hackers to launder hundreds of millions stolen in multiple crypto heists.
March 21, 2025Source

Watch on Demand: Supply Chain & Third-Party Risk Security Summit
Join the virtual event as we explore of the critical nature of software and vendor supply chain security issues.
March 21, 2025Source

Internet — Security Issues — March 17th, 2025

100 Car Dealerships Hit by Supply Chain Attack
The websites of over 100 auto dealerships were found serving malicious ClickFix code in a supply chain compromise.
March 17, 2025Source

8,000 New WordPress Vulnerabilities Reported in 2024
Nearly 8,000 new vulnerabilities affecting the WordPress ecosystem were reported last year, nearly all in plugins and themes.
March 17, 2025Source

Accounting Firm Notifying 217,000 of Health Data Hack
CPA Says Clients' Employee Benefit Plan Information Compromised in 2024 Incident
March 17, 2025Source or Source or Source or Source or Source

Amazon Will Listen to All Your Voice Recordings If You Use Alexa+
Amazon is nixing one of the few privacy protections against accessing users' voice data, and you can blame AI for the change.
March 17, 2025Source

Bedrock Security's metadata lake technology strengthens data security
Bedrock Security is declaring an end to data security without data visibility with the launch of its metadata lake technology — a centralized repository powering the patented Bedrock Platform.
March 17, 2025Source

Cloudflare boosts defenses against future quantum threats
Cloudflare announced that it is expanding end-to-end support for post-quantum cryptography to its Zero Trust Network Access solution.
March 17, 2025Source

Critical RCE flaw in Apache Tomcat actively exploited in attacks
A critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild, enabling attackers to take over servers with a simple PUT request.
March 17, 2025Source

Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum
Exploits swirling for remote code execution vulnerability (CVE-2025-24813) in open-source Apache Tomcat web server.
March 17, 2025Source

GitHub project maintainers targeted with fake security alert
A phishing campaign targeting GitHub account owners has been trying to scare them with a fake security alert into allowing a malicious OAuth app access to their account and repositories.
March 17, 2025Source

GitHub supply chain attack spills secrets from 23,000 projects
Large organizations among those cleaning up the mess
March 17, 2025Source

Google, OpenAI Push Urges Trump to Ease AI Export Controls
AI Giants Also Like 'Fair Use' Exemptions for Copyrighted Material
March 17, 2025Source or Source or Source or Source or Source

Hackers are exploiting Fortinet firewall bugs to plant ransomware
Security researchers have observed hackers linked to the notorious LockBit gang exploiting a pair of Fortinet firewall vulnerabilities to deploy ransomware on several company networks.
March 17, 2025Source

How to encrypt and secure sensitive files on macOS
Encrypting files keeps sensitive data like personal details, finances, and passwords safe from attackers by making them unreadable to unauthorized users. Encryption also safeguards data in case of device loss or theft, preventing malicious actors from accessing or misusing the information even if the drive is removed.
March 17, 2025Source

How to take back control after your data was breached
5 things to do when your personal information is at risk following a data leak.
March 17, 2025Source

Medusa Ransomware Strikes 300+ Targets: FBI & CISA Urge Immediate Action to #StopRansomware
Medusa ransomware now operates as a RaaS model, recruiting affiliates from criminal forums to launch attacks, encrypt data, and extort victims worldwide.
March 17, 2025Source

Microsoft 365 Targeted in New Phishing, Account Takeover Attacks
Threat actors are abusing Microsoft 365 infrastructure in a BEC campaign, and target its users in two brand impersonation campaigns.
March 17, 2025Source

NIST Announces HQC as Fifth Standardized Post Quantum Algorithm
First choices for both KEMs and DSAs are already standardized, and organizations should not wait for the backups to be available before migrating to PQC.
March 17, 2025Source

NordPass versus Bitwarden: Which Is Safer and Easier to Use in 2025?
Which is better, NordPass or Bitwarden? This guide provides a detailed comparison of their features, security and pricing to help you choose your best fit.
March 17, 2025Source

Nvidia Patches Vulnerabilities That Could Let Hackers Exploit AI Services
Vulnerabilities in Nvidia Riva could allow hackers to abuse speech and translation AI services that are typically expensive.
March 17, 2025Source

Popular GitHub Action Targeted in Supply Chain Attack
The tj-actions/changed-files GitHub Action, which is used in 23,000 repositories, has been targeted in a supply chain attack.
March 17, 2025Source

Rethinking Insider Risk in an AI-Driven Workplace
Carnegie Mellon CERT's Dan Costa on Addressing Root Causes of Insider Risk
March 17, 2025Source or Source or Source or Source or Source

Supply chain attack on popular GitHub Action exposes CI/CD secrets
A supply chain attack on the widely used 'tj-actions/changed-files' GitHub Action, used by 23,000 repositories, potentially allowed threat actors to steal CI/CD secrets from GitHub Actions build logs.
March 17, 2025Source

Supply Chain Attack Targets GitHub Repositories and Secrets
Over 23,000 Code Repositories at Risk After Malicious Code Added to GitHub Actions
March 17, 2025Source or Source or Source or Source

TikTok's New Security Dashboard Makes It Easier to Lock Down Your Account
TikTok wants to give people greater visibility and control over their accounts.
March 17, 2025Source

Top Security Automation Tools for Auto-Remediation
Speed is vital in cybersecurity, and auto-remediation tools help by quickly detecting and mitigating risks, boosting response efficiency
March 17, 2025Source

Internet — Security Issues — March 14th, 2025

Accused LockBit ransomware developer extradited to the US
Rostislav Panev, a 51-year-old dual Russian and Israeli national who is accused of being a key developer for the notorious LockBit ransomware gang, has been extradited from Israel to the United States, the Department of Justice announced on Thursday.
March 14, 2025Source

AdGuard brings full-system ad blocking to Linux with new standalone app
For many years now, Linux users looking to block ads have needed to piece together a mixture of browser extensions, DNS-based filtering, and network-wide tools (such as Pi-hole). While these solutions certainly help, none of them offer complete system-wide protection.
March 14, 2025Source

ClickFix Widely Adopted by Cybercriminals, APT Groups
The ClickFix technique has been employed by cybercrime and APT groups for information stealer and other malware deployment.
March 14, 2025Source

Corero Network Security expands AI capabilities across its portfolio
Corero Network Security announced the strategic advancement of AI capabilities across its product portfolio and operations—building on a long-standing legacy of intelligent, adaptive security solutions.
March 14, 2025Source

DeepSeek-R1 Can Almost Generate Malware
DeepSeek Comes Very Close to Producing a Keylogger and Ransomware
March 14, 2025Source or Source or Source or Source or Source

In Other News: Swiss Breach Disclosure Rules, ESP32 Chip Backdoor Disputed, MassJacker
Noteworthy stories that might have slipped under the radar: Switzerland requires disclosure of critical infrastructure attacks, ESP32 chips don't contain a backdoor, MassJacker cryptojacking malware.
March 14, 2025Source

Insurer Notifying 335,500 Customers, Agents, Others of Hack
Texas Incident Is the Largest Breach Reported by a Health Plan So Far in 2025
March 14, 2025Source or Source or Source or Source or Source

ISMG Editors: The X Outage - When DDoS and Politics Converge
Also: Gartner's Sydney Summit Highlights, Rising OT Security Risks
March 14, 2025Source or Source or Source or Source or Source

LockBit Ransomware Developer Extradited to US
Russian-Israeli LockBit ransomware developer Rostislav Panev has been extradited from Israel to the United States.
March 14, 2025Source

New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI Models
Measure the different level of risk inherent to all gen-AI foundational models and use that to fine-tune the operation of in-house AI deployments.
March 14, 2025Source or Source or Source or Source or Source

Quantifying cyber risk strategies to resonate with CFOs and boards
In this Help Net Security interview, Mir Kashifuddin, Data Risk & Privacy Leader at PwC, discusses how CISOs can translate cyber risk into business value and secure a more strategic role within their organizations. He explains that aligning cybersecurity with business objectives and leveraging data governance, AI, and financial risk quantification drives resilience and growth.
March 14, 2025Source

Recent Fortinet Vulnerabilities Exploited in 'SuperBlack' Ransomware Attacks
The newly discovered SuperBlack ransomware has been exploiting two vulnerabilities in Fortinet firewalls.
March 14, 2025Source

RSA Conference Playbook: Smart Strategies from Seasoned Attendees
Your guide on how to get through the conference with your sanity, energy, and key performance indicators (KPIs) intact.
March 14, 2025Source

Suspected LockBit ransomware dev extradited to United States
A dual Russian-Israeli national, suspected of being a key developer for the LockBit ransomware operation, has been extradited to the United States to face charges.
March 14, 2025Source

The poor the bad and the terrible -- popular passwords around the world
Passwords are an essential part of our digital lives, yet many people still use weak or simple combinations of letters and numbers that can be cracked in just a few seconds.
March 14, 2025Source

US lawmakers urge UK spy court to hold Apple 'backdoor' secret hearing in public
A group of bipartisan U.S. lawmakers are urging the head of the U.K.'s surveillance court to hold an open hearing into Apple's anticipated challenge of an alleged secret U.K. government legal demand.
March 14, 2025Source

What Do You Get When You Hire a Ransomware Negotiator?
Negotiators Can Buy Time and Lower Ransoms, But Do They Just Encourage Cyber Gangs?
March 14, 2025Source or Source

Workplace Chaos and Uncertainty Stoke Insider Risk Warnings
Expect Malicious Insiders to Pose 'Big Challenge' This Year for CISOs, Expert Warns
March 14, 2025Source or Source or Source or Source or Source

Internet — Security Issues — March 13th, 2025

5 Ways Docker Can Improve Security in Mobile App Development
Docker enhances mobile app security with dependency isolation, consistent environments, secure images, and proactive vulnerability scanning.
March 13, 2025Source

Are you PCI compliant yet?
The transition from PCI DSS 3.2.1 to 4.0 is a heavy lift for many businesses
March 13, 2025Source

CISA: We didn't fire red teams, we just unhired a bunch of them
Agency tries to save face as it also pulls essential funding for election security initiatives
March 13, 2025Source

Cisco Patches 10 Vulnerabilities in IOS XR
Cisco has released patches for 10 vulnerabilities in IOS XR, including five denial-of-service (DoS) bugs.
March 13, 2025Source

ClickFix attack delivers infostealers, RATs in fake Booking.com emails
Microsoft is warning that an ongoing phishing campaign impersonating Booking.com is using ClickFix social engineering attacks to infect hospitality workers with various malware, including infostealers and RATs.
March 13, 2025Source

DeepSeek's Malware-Generation Capabilities Put to Test
Researchers have analyzed the ability of the Chinese gen-AI DeepSeek to create malware such as ransomware and keyloggers.
March 13, 2025Source or Source

Developing an ontology for smart city infrastructure threats, cybercrime and digital investigation
With technological advancements and a growing awareness about the United Nations (UN) Sustainable Development Goals (SDGs), interconnected systems within cities that capture real-time data indicators reflecting chosen SDGs are a way forward. Known as smart city infrastructure (SCI), these systems are vital to nations in assessing their alignment with the UN SDGs. As the role of smart city infrastructure becomes apparent, it inevitably becomes a prime target for adversaries and cyber criminals.
March 13, 2025Source

Don't click on those road toll texts. Officials issue warnings about the smishing scam
State officials are warning Americans not to respond to a surge of scam road toll collection texts.
March 13, 2025Source

EFF Thanks Fastly for Donated Tools to Help Keep Our Website Secure
EFF's most important platform for welcoming everyone to join us in our fight for a better digital future is our website, eff.org. We thank Fastly for their generous in-kind contribution of services helping keep EFF's website online.
March 13, 2025Source

EU Seeks US Assurances on Trans-Atlantic Data Flows
Worries Grow Over Data Privacy Framework Stability
March 13, 2025Source or Source or Source or Source or Source

FreeType Zero-Day Being Exploited in the Wild
Meta's Facebook security team warns of live exploitation of a zero-day vulnerability in the open-source FreeType library.
March 13, 2025Source

Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign
Threat actors are likely targeting Grafana path traversal bugs for reconnaissance in a SSRF exploitation campaign targeting popular platforms.
March 13, 2025Source

Groups From China, Russia, Iran Hitting OT Systems Worldwide
Threat Groups Are Mapping OT Networks for Future Targeting, Warns Dragos
March 13, 2025Source or Source or Source or Source

Hackers from North Korea deploy spyware through Google Play
Cybersecurity researchers at Lookout have discovered KoSpy, a sophisticated Android spyware linked to North Korea that has managed to infiltrate the Google Play Store. The malware is attributed to ScarCruft (APT37), a North Korean hacking group, and disguises itself as legitimate apps. It targets Korean and English-speaking users and can steal sensitive data while remaining undetected for months.
March 13, 2025Source

How to secure your personal metadata from online trackers
When it comes to safeguarding your privacy online, most people focus on securing passwords, encrypting communications, and clearing browsing history. While these practices are essential, they overlook one important element—metadata. This data, which is collected about your digital interactions, can often reveal more about you than you think.
March 13, 2025Source

How to set up Bitwarden for personal and work use - and why you should keep them separate
Don't let work invade your personal life. Separate your passwords with two Bitwarden accounts for better security and peace of mind.
March 13, 2025Source

Juniper patches bug that let Chinese cyberspies backdoor routers
uniper Networks has released emergency security updates to patch a Junos OS vulnerability exploited by Chinese hackers to backdoor routers for stealthy access.
March 13, 2025Source

Malware compromised bank data from 26 million devices
Remember that game cheat file you downloaded from a suspicious-looking website? It might not have been a legitimate file. You may have infected your computer with an infostealer malware. According to a report from Kaspersky, you are not alone in this. The cybersecurity company has revealed about 26 million devices worldwide whose bank data might have been compromised by this malware.
March 13, 2025Source

Medusa Ransomware Made 300 Critical Infrastructure Victims
CISA, FBI, and MS-ISAC warn of Medusa ransomware attacks targeting critical infrastructure organizations.
March 13, 2025Source

Microsoft Warns of Hospitality Sector Attacks Involving ClickFix
A cybercrime group named Storm-1865 has targeted hospitality organizations via fake Booking.com emails and the use of social engineering.
March 13, 2025Source

Navigating AI-powered cyber threats in 2025: 4 expert security tips for businesses
AI-powered cyber threats are reshaping security landscapes. Businesses that don't evolve will be vulnerable to increasingly sophisticated attacks - here's how to stay ahead.
March 13, 2025Source

New SuperBlack ransomware exploits Fortinet auth bypass flaws
A new ransomware operator named 'Mora_001' is exploiting two Fortinet vulnerabilities to gain unauthorized access to firewall appliances and deploy a custom ransomware strain dubbed SuperBlack.
March 13, 2025Source

Nextcloud puts out fire after data leak panic
Community calls for off-by-default data sharing setting
March 13, 2025Source

QuamCore Emerges From Stealth With $9 Million to Build a Quantum Computer
QuamCore's secret sauce is a patented architecture that will allow the integration of 1 million qubits in a single cryostat.
March 13, 2025Source

Radiology Clinic, Hospital Among Latest Rural Cyber Victims
IT Outages Are Affecting Patient Services, NC Practice Is 'Temporarily Closed'
March 13, 2025Source or Source or Source or Source

Red Report 2025: Unmasking a 3X Spike in Credential Theft and Debunking the AI Hype
Cybercriminals have turned password theft into a booming enterprise, malware targeting credential stores jumped from 8% of samples in 2023 to 25% in 2024, a threefold increase​.
March 13, 2025Source

Security is just a side quest: Insights from the video game industry
The video game industry is a constantly changing market worth billions. In a qualitative interview study with industry experts, CISPA researcher Philip Klostermeyer from the team of CISPA Faculty Prof. Dr. Sascha Fahl investigated the challenges involved in incorporating security considerations into game development.
March 13, 2025Source

Security Maturity Models: Leveraging Executive Risk Appetite for Your Secure Development Evolution
Organizations can align their processes with one of two global industry standards for self-assessment and security maturity—BSIMM and OWASP SAMM.
March 13, 2025Source

Sola Security Debuts AI-Powered SOAR Product with $30M Boost
Funds Will Support Next-Gen Security Orchestration and Response, Eliminate Complexity
March 13, 2025Source or Source or Source or Source or Source

That 'angry guest' email from Booking.com? It's a scam, not a 1-star review
Phishers check in, your credentials check out, Microsoft warns
March 13, 2025Source

The FCC is creating a new Council for National Security within the agency
The group, which has goals related to China, will include representatives from eight FCC Bureaus and Offices.
March 13, 2025Source

Understaffed but still delivering -- the reality of cybersecurity teams
A new survey of over 900 security decision makers across the US, Europe and Australia, finds 60 percent of security teams are small, with fewer than 10 members. But despite their size, 72 percent report taking on more work over the past year, and an impressive 88 percent are meeting or exceeding their goals.
March 13, 2025Source

Unofficial parental control apps put children's safety and privacy at risk
Some "unofficial" parental control apps have excessive access to personal data and hide their presence, raising concerns about their potential for unethical surveillance as well as domestic abuse, according to new research from UCL and St. Pölten UAS, Austria.
March 13, 2025Source

Unpatched Edimax Camera Flaw Exploited Since at Least May 2024
A recently disclosed Edimax zero-day vulnerability has been exploited in the wild by Mirai botnets for nearly a year.
March 13, 2025Source

Why AI-powered security tools are your secret weapon against tomorrow's attacks
In the cybersecurity arms race, you have access to the same weapons as the bad guys. Just how well-armed are you now?
March 13, 2025Source

Internet — Security Issues — March 12th, 2025

360 Privacy Raises $36 Million for Digital Executive Protection Platform
360 Privacy has raised $36 million in equity investment to scour the surface and dark web for leaked PII and remove it.
March 12, 2025Source

A Guide to Security Investments: The Anatomy of a Cyberattack
Organizations must recognize that security is not about the number of tools deployed, it is about ensuring those tools effectively disrupt the attack chain at every stage.
March 12, 2025Source

Apple patches security flaw that would allow an 'extremely sophisticated' attack
There's a myth that Apple devices are more secure compared to Android. This comes from the misconception that just because Apple doesn't allow sideloading and extensive customizations, it is safe. In fact, Apple recently issued an update to iOS and iPadOS, bringing them up to version 18.3.2. This update isn't about flashy new features.
March 12, 2025Source

Attackers Can Manipulate AI Memory to Spread Lies
Tested on Three OpenAI Models, 'Minja' Has High Injection and Attack Rates
March 12, 2025Source or Source or Source or Source or Source

Beware of DeepSeek Hype: It's a Breeding Ground for Scammers
Exploiting trust in the DeepSeek brand, scammers attempt to harvest personal information or steal user credentials.
March 12, 2025Source

Beyond calls: How your Android phone helps build and strengthen relationships
In today's fast-paced world, your Android phone has become more than just a device for making calls and sending texts. It has evolved into a powerful tool that helps users build, nurture, and maintain relationships, whether with family, friends, or colleagues. With an array of apps and features designed to foster communication, your Android phone can deepen your connections, bridge gaps across long distances, and even introduce you to new people.
March 12, 2025Source

Big March patch fixes dozens of security flaws in Windows and Office
Microsoft fixed 58 security vulnerabilities on Patch Tuesday, including several that are already being exploited in the wild.
March 12, 2025Source

Browser-Based Data Leaks: 3 Biggest Data Security Challenges Today
For years, Data Loss Prevention (DLP) solutions focused on email, endpoints, and network traffic, where security teams could enforce clear policies with predictable outcomes.
March 12, 2025Source

China's Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days
Dragos case study reveals that Volt Typhoon hacked the US electric grid and stole information on OT systems.
March 12, 2025Source

Chinese Cyberespionage Group Tied to Juniper MX Router Hacks
Juniper Networks Urges Immediate Updating and Malware Scans to Block Attackers
March 12, 2025Source or Source or Source or Source or Source

Chinese cyberspies backdoor Juniper routers for stealthy access
Chinese hackers are deploying custom backdoors on Juniper Networks Junos OS MX routers that have reached end-of-life (EoL) and no longer receive security updates.
March 12, 2025Source

CISA Defunds Threat-Sharing Hubs for States and Elections
Cyber Defense Agency Axes Funding for Key ISACs as Trump Shifts Federal Priorities
March 12, 2025Source or Source or Source or Source or Source

Criminals stole $12.5B through online scams in the US last year
Online scam attempts have been present practically since the dawn of the internet. After all, it's simply a matter of transferring practices carried out in the real world to the digital environment, taking advantage of additional tech tools to boost their effectiveness. According to the FTC, 2024 was an especially fruitful year for cybercriminals in the US, with significant involvement of AI and crypto.
March 12, 2025Source

Criminology scholar connects Cambodian temple trafficking to white-collar crime
Professor Simon Mackenzie from the School of Social and Cultural Studies recently published a paper in Crime, Law and Social Change about the dynamics of transnational crime and illegal global markets, exploring the movement of cultural and natural collectibles from economically-poor to wealthy countries.
March 12, 2025Source

Expired Juniper routers find new life -- as Chinese spy hubs
Fewer than 10 known victims, but Mandiant suspects others compromised, too
March 12, 2025Source

Fortinet Patches 18 Vulnerabilities
Fortinet has published 17 new advisories to inform customers about 18 vulnerabilities patched in its products.
March 12, 2025Source

Four Chinese firms looking to shake up the tech world in the wake of DeepSeek
The success of the Chinese AI firm DeepSeek shocked financial markets and major US tech firms in January 2025. But it shouldn't have come as such a surprise.
March 12, 2025Source

Fraud Losses Reached $12.5 Billion in 2024: FTC
FTC says reported losses to fraud exceeded $12.5 billion in 2024, with $5.7 billion lost to investment scams.
March 12, 2025Source

Free95 claims to be a GPL 3 Windows clone, but it's giving vaporware vibes
Don't, don't, DON'T believe the hype
March 12, 2025Source

Garantex administrator arrested in India at request of US authorities
Indian police have arrested the co-founder of Garantex, a Russian cryptocurrency exchange sanctioned by the European Union and the U.S. government, under India's extradition law, TechCrunch has exclusively learned and confirmed with state authorities.
March 12, 2025Source

Goodbye passwords? Enterprises ramping up passkey adoption
87% of companies have, or are in the midst of, rolling out passkeys with goals tied to improved user experience, enhanced security, and compliance, according to the FIDO Alliance.
March 12, 2025Source

How to Use Zero Trust to Help Protect Cloud Workloads
AI-Enabled Security Offers Continuous Monitoring for Distributed Enterprise Apps
March 12, 2025Source or Source or Source or Source or Source

Keeper versus LastPass: Best Password Manager for 2025
Keeper and LastPass are some of the best password managers on the market, each offering advanced data protection and security features. Compare the two with our in-depth comparison guide before you buy.
March 12, 2025Source

Lawmakers Take Another Stab to Improve Patient ID Matching
Bipartisan 'Match IT Act' Aims to Reduce Risk of Medical Mistakes, Privacy Mishaps
March 12, 2025Source or Source or Source or Source or Source

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers
China-nexus cyberespionage group caught planting custom backdoors on end-of-life Juniper Networks Junos OS routers.
March 12, 2025Source

Microsoft patches Windows Kernel zero-day exploited since 2023
Slovak cybersecurity company ESET says a newly patched zero-day vulnerability in the Windows Win32 Kernel Subsystem has been exploited in attacks since March 2023.
March 12, 2025Source

New partnership simplifies zero trust access for enterprises
The shift to hybrid working means that managing enterprise networks has become more complicated, but legacy remote access solutions fall short in meeting the needs of supporting both managed and unmanaged users and devices.
March 12, 2025Source

Newly Patched Windows Zero-Day Exploited for Two Years
Microsoft on Tuesday patched a zero-day vulnerability in the Windows Win32 kernel that has been exploited since March 2023.
March 12, 2025Source

NIST selects HQC as backup algorithm for post-quantum encryption
Last year, NIST standardized a set of encryption algorithms that can keep data secure from a cyberattack by a future quantum computer. Now, NIST has selected a backup algorithm that can provide a second line of defense for the task of general encryption, which safeguards internet traffic and stored data alike.
March 12, 2025Source

North Korean government hackers snuck spyware on Android app store
A group of hackers with links to the North Korean regime uploaded Android spyware onto the Google Play app store and were able to trick some people into downloading it, according to cybersecurity firm Lookout.
March 12, 2025Source or Source

Pentera Secures $60M to Boost AI-Powered Security Validation
Series D Funding to Drive U.S. Growth and AI Advancements in Cybersecurity
March 12, 2025Source or Source or Source or Source or Source

PowerSchool Portal Compromised Months Before Massive Data Breach
Hackers used compromised credentials to access PowerSchool's PowerSource portal months before the December 2024 data breach.
March 12, 2025Source

Protecting controlled information in non-Government of Canada systems and organizations (ITSP.10.171)
This publication provides recommended security requirements for protecting the confidentiality of controlled information when residing in non-Government of Canada (GC) systems and organizations.
March 12, 2025Source

Research reveals 'major vulnerabilities' in deepfake detectors
An international team of researchers is calling for urgent improvements in deepfake detection technologies after uncovering critical flaws in widely used detection tools.
March 12, 2025Source

Security Validation Firm Pentera Banks $60M Series D
Israeli startup in the automated security validation space secures a $60 million round led by Evolution Equity Partners.
March 12, 2025Source

Starlink internet inches closer to India as it gets Jio as new partner after Airtel
Not a day has passed since Bharti Airtel announced a new partnership with SpaceX to bring Starlink satellite internet services to India. The Elon Musk-owned company has another Indian partner, Jio Platforms, as the space technology giant gears for a potential launch.
March 12, 2025Source

Study finds public security disclosures may aid adversaries
When security and defense agencies publicly announce the deployment of new technologies—such as enhanced baggage scanners at airports—they may inadvertently help malicious actors identify which locations are defended and how, according to new research from the University at Buffalo School of Management.
March 12, 2025Source

That weird CAPTCHA could be a malware trap - here's how to protect yourself
Follow the 'I'm not a robot' CAPTCHA, and you might just end up with malware on your PC.
March 12, 2025Source or Source

This is the FBI, open up. China's Volt Typhoon is on your network
Power utility GM talks to El Reg about getting that call and what happened next
March 12, 2025Source

Trump Administration Halts Funding for Two Cybersecurity Efforts, Including One for Elections
The Trump administration has cut millions of dollars in federal funding from two cybersecurity initiatives, including one dedicated to helping state and local election officials.
March 12, 2025Source

US Hasn't Determined Who Was Behind Cyberattack That Caused Outage on Musk's X
US officials have not determined who was behind an apparent cyberattack on the social media site X that limited access to the platform for thousands of users.
March 12, 2025Source

Why Browser-Based Security Is Vital to Zero Trust Operations
Browser Isolation Protects Access Points as Remote Work Expands Attack Surface
March 12, 2025Source or Source or Source or Source or Source

Zoom Patches 4 High-Severity Vulnerabilities
Zoom has patched five vulnerabilities in its applications, including four high-severity flaws.
March 12, 2025Source

Zut Alors! Cyberattacks Targeting France Surged in 2024
The Edge Device Hacking Wave Hasn't Spared French Companies
March 12, 2025Source or Source or Source or Source or Source

Internet — Security Issues — March 11th, 2025

70 percent of leaked credentials remain active two years on
A new report shows 70 percent of secrets leaked in 2022 remain active today, creating an expanding attack surface that grows more dangerous with each passing day.
March 11, 2025Source

1,600 Victims Hit by South American APT's Malware
South American cyberespionage group Blind Eagle has infected over 1,600 organizations in Colombia in a recent campaign.
March 11, 2025Source

Alloy Fraud Attack Radar provides intelligence on fraud threats
Alloy launched Fraud Attack Radar, a machine learning-powered solution that provides financial institutions (FIs) and fintechs with actionable intelligence on fraud threats targeting new account creation.
March 11, 2025Source

Americans lost a record $12.5 billion to fraud in 2024, with investment scams leading the losses
If it seems too good to be true, it usually is
March 11, 2025Source

Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw
Apple warns that the WebKIt bug "may have been exploited in an extremely sophisticated attack against specific targeted individuals."
March 11, 2025Source

AuditBoard unveils AI-powered audit capabilities
AuditBoard announced new AI-powered audit capabilities, further integrating AI into the product, boosting efficiency, and enabling auditors to focus on more strategic tasks.
March 11, 2025Source

Beware this sneaky new 'CAPTCHA' that tricks you into installing malware
It's both stupid yet brilliant, relying on knee-jerk CAPTCHA reactions to get users to manually install malware.
March 11, 2025Source

CISA tags critical Ivanti EPM flaws as actively exploited in attacks
CISA warned U.S. federal agencies to secure their networks against attacks exploiting three critical vulnerabilities affecting Ivanti Endpoint Manager (EPM) appliances.
March 11, 2025Source

CISA Warns of Ivanti EPM Vulnerability Exploitation
CISA has added three critical-severity flaws in Ivanti EPM to its Known Exploited Vulnerabilities catalog.
March 11, 2025Source

Critical PHP RCE vulnerability mass exploited in new attacks
Threat intelligence company GreyNoise warns that a critical PHP remote code execution vulnerability that impacts Windows systems is now under mass exploitation.
March 11, 2025Source

Cybercriminals are cloning DeepSeek AI website to ship malware
Cybercriminals are using a variety of methods to compromise the private data or credentials of potential victims online. One of the most popular methods is cloning legitimate services. Malicious actors are no strangers to the huge popularity of DeepSeek, the new artificial intelligence that is on everyone's lips. Researchers have discovered a malware campaign where attackers impersonate DeepSeek AI.
March 11, 2025Source

Developer faces decade in prison for installing kill switch in former employer's network
The switch was designed to trigger upon his termination
March 11, 2025Source

Edimax Says No Patches Coming for Zero-Day Exploited by Botnets
Edimax is aware that CVE-2025-1316 has been exploited in the wild, but the impacted devices were discontinued over a decade ago.
March 11, 2025Source

EFF Sends Letter to the Senate Judiciary Committee Opposing the STOP CSAM Act
On Monday, March 10, EFF sent a letter to the Senate Judiciary Committee opposing the Strengthening Transparency and Obligation to Protect Children Suffering from Abuse and Mistreatment Act (STOP CSAM Act) ahead of a committee hearing on the bill.
March 11, 2025Source

Elon Musk claims bad actors in Ukraine are behind "massive" X cyberattack
Will users ever abandon the Twitter brand? X outages suggest the answer is no.
March 11, 2025Source

False confidence leaves businesses at risk of phishing scams
While 86 percent of employees believe they can confidently identify phishing emails, nearly half have fallen for scams according to new research from security awareness training company KnowBe4.
March 11, 2025Source

Federal agents confirm LastPass breach linked to massive cryptocurrency heists
The LastPass breach is tied to a $150 million crypto theft
March 11, 2025Source

Forcepoint to Enhance Data Security With Getvisibility Buy
Getvisibility's AI Mesh Integration to Bolster Data Classification, Risk Management
March 11, 2025Source or Source or Source or Source or Source

Hackers Take Credit for X Cyberattack
Information is coming to light on the cyberattack that caused X outages, but it should be taken with a pinch of salt.
March 11, 2025Source

HHS Investigators Get New Mission Under Trump: Root Out DEI
Stretched Agency Must Balance HIPAA Enforcement With Policing DEI in Healthcare
March 11, 2025Source or Source or Source or Source or Source

How to protect operational technology from targeted cyber attacks
Cyber attacks against operational technology are becoming increasingly sophisticated and frequent
March 11, 2025Source

How to spot and avoid AI-generated scams
As AI technology advances, cybercriminals create more personalized and convincing scams. This includes mimicking voices, deepfake videos, and highly convincing phishing emails that are difficult to spot.
March 11, 2025Source

Knockout of X Tied to Pro-Palestinian Hacktivists' Botnet
Experts Express Surprise Over Major Social Platform Falling Victim to DDoS Attacks
March 11, 2025Source or Source or Source or Source or Source

Lawsuit Says DOGE Is Ignoring Key Social Security Data Rules
Ousted Social Security Official Accuses DOGE of Bypassing Critical Data Protections
March 11, 2025Source or Source or Source or Source or Source

MassJacker malware uses 778,000 wallets to steal cryptocurrency
A newly discovered clipboard hijacking operation dubbed 'MassJacker' uses at least 778,531 cryptocurrency wallet addresses to steal digital assets from compromised computers.
March 11, 2025Source

Microsoft Flags Six Active Zero-Days, Patches 57 Flaws: Patch Tuesday
Redmond ships major security updates with warnings that a half-dozen Windows vulnerabilities have already been exploited in the wild.
March 11, 2025Source

Most ransomware incidents start with compromised perimeter security
A new report from cyber insurance provider Coalition shows 58 percent of ransomware claims in 2024 started with threat actors compromising perimeter security appliances like virtual private networks (VPNs) or firewalls.
March 11, 2025Source

New Ballista IoT Botnet Linked to Italian Threat Actor
Cato Networks has analyzed a new IoT botnet named Ballista, which targets TP-Link Archer routers.
March 11, 2025Source

New cybersecurity product seeks to safeguard executives and their families
You might not often feel sorry for executives and entrepreneurs but research from Deloitte shows that their 'family offices' are prime targets for cybercriminals looking to exploit their personal networks, private data, and home devices which represent a weak security link.
March 11, 2025Source

New York Sues Insurance Giant Over Data Breaches
The New York Attorney General sued National General and its parent company Allstate over two data breaches.
March 11, 2025Source

North Korean Lazarus hackers infect hundreds via npm packages
Six malicious packages have been identified on npm (Node package manager) linked to the notorious North Korean hacking group Lazarus.
March 11, 2025Source

Patch Tuesday: Critical Code Execution Bugs in Adobe Acrobat and Reader
Adobe documents 35 security flaws in a wide range of products, including code-execution issues in the Acrobat and Reader applications.
March 11, 2025Source

PowerSchool previously hacked in August, months before data breach
PowerSchool has published a long-awaited CrowdStrike investigation into its massive December 2024 data breach, which determined that the company was previously hacked over 4 months earlier, in August, and then again in September.
March 11, 2025Source

Popular Voice Cloning Tools Lack Safeguards
Abuse Can Lead to Fraud, Impersonation Scams
March 11, 2025Source or Source or Source or Source

Rambus introduces CryptoManager Security IP solutions
Rambus announced its next-generation CryptoManager Security IP solutions including Root of Trust, Hub and Core families.
March 11, 2025Source

Report warns of 'cyberwashing' in digital security claims
A new Monash University report highlights the growing problem of organizations resorting to "cyberwashing" to mislead the public about their data privacy practices and recommends measures to build a genuine culture of cybersecurity.
March 11, 2025Source

SAP Patches High-Severity Vulnerabilities in Commerce, NetWeaver
SAP released 21 new security notes and updated three security notes on March 2025 security patch day.
March 11, 2025Source

Security researchers aren't buying Musk's spin on the cyberattack that took down X
A new report in Wired suggests X may have left some of its servers unsecured.
March 11, 2025Source

Sola Security Deposits Hefty $30M Seed Funding
The financing was provided by S Capital and investor Mike Moritz, S32, Glilot Capital Partners, and several angel investors.
March 11, 2025Source

Some say passkeys are clunky — this startup wants to change that
Passwords are ubiquitous, despite not being foolproof and cannot alone protect your online identity. Almost one-third of data breaches reported over the past decade happened due to stolen credentials, per Verizon, including some of the biggest breaches of all time.
March 11, 2025Source

TikTok's mood music will tell teens to 'wind down' after 10PM
Now TikTok's Family Pairing feature will enable parents to lock the app during certain times.
March 11, 2025Source

Trump nominates Sean Plankey as new CISA director
President Donald Trump nominated Sean Plankey to head the Cybersecurity and Infrastructure Security Agency (CISA), according to a White House email sent to journalists on Tuesday.
March 11, 2025Source

Trump Taps Ex-DOE, NSC Leader Sean Plankey as CISA Director
Plankey Led Efforts to Engage Energy Sector in Cyber Prep During Trump's First Term
March 11, 2025Source or Source or Source or Source or Source

UK Government Report Calls for Stronger Open Source Supply Chain Security Practices
Report from the Department for Science, Innovation & Technology (DSIT) finds weaknesses in current practices.
March 11, 2025Source

UK 'Extremely Worried' About Cyberthreats
Risk of Espionage and Disruption Key Risks, Lawmakers Warned
March 11, 2025Source or Source or Source or Source or Source

When you should use a VPN - and when you shouldn't
Using a VPN 24/7 isn't always the best idea. Here's why.
March 11, 2025Source

X was hacked and disruptions continue, with inaccessible feeds and more
Since yesterday, users have been reporting problems with X (formerly Twitter).
March 11, 2025Source

Yoel Roth pushes for action on online scams amid scrutiny of Match Group
At SXSW, experts warn that online scams are reaching new levels of sophistication and that platforms must adapt.
March 11, 2025Source

Internet — Security Issues — March 10th, 2025

560,000 People Impacted Across Four Healthcare Data Breaches
Several healthcare organizations in different US states have disclosed data breaches affecting 100,000-200,000 individuals.
March 10, 2025Source

Attackers can use undocumented commands to hijack Chinese-made Bluetooth chips
Security researchers have shared details of newly discovered, undocumented commands in ESP32 Bluetooth firmware that can be exploited by an attacker. The Chinese-made chip is found in millions of devices, meaning the findings are significant.
March 10, 2025Source

Beware! Fake parking ticket SMS scams are on the rise
A new wave of scam text messages is hitting major cities across the US.
March 10, 2025Source

Cobalt Strike Abuse Dropped 80% in Two Years
Fortra has shared an update on the effects of actions taken to reduce the abuse of Cobalt Strike by threat actors.
March 10, 2025Source

Countering a flaw in anti-censorship tools to improve global internet freedom
A newly identified time-based vulnerability exposes a widely used technique to evade internet censorship, University of Michigan researchers have found. The findings emphasize the need to develop more robust countermeasures for the millions of people in heavily censored regions who rely on evasion techniques.
March 10, 2025Source

Critical PHP Vulnerability Under Mass Exploitation
GreyNoise warns of mass exploitation of a critical vulnerability in PHP leading to remote code execution on vulnerable servers.
March 10, 2025Source

Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks
Palo Alto Networks has shared details on several high-severity Mitsubishi Electric and Iconics SCADA vulnerabilities.
March 10, 2025Source

Detectify Alfred helps security teams collect threat intelligence
Detectify announced Alfred, a system that uses AI to completely autonomously source, prioritize, and generate high-fidelity security tests for the CVEs that are most likely to be exploited.
March 10, 2025Source

Developer Convicted for Hacking Former Employer's Systems
Davis Lu was convicted of sabotaging his employer's systems through malicious code, and deleting encrypted data.
March 10, 2025Source

Downgraded: Alert Over IoT Wireless Chip 'Backdoor'
Cybersecurity Firm Warns of 'Hidden Features' in the Widely Used ESP32 Chip
March 10, 2025Source or Source or Source or Source or Source

EFF's 'Rayhunter' Device Shines a Light On Cellular Spying
The organization hopes journalists, researchers, activists, and others will use the open-source device to catch sneaky forms of digital surveillance.
March 10, 2025Source

Elon Musk claims X being targeted in 'massive cyberattack' as service goes down
Hours after a series of outages Monday that left X unavailable to thousands of users, Elon Musk claimed that the social media platform was being targeted in a "massive cyberattack."
March 10, 2025Source or Source or Source

Following takedown operation, Garantex invites customers to 'face-to-face' Moscow meeting
It has not been a good week for Russian crypto exchange Garantex.
March 10, 2025Source

Forcepoint to Enhance Data Security With Getvisibility Buy
Getvisibility's AI Mesh Integration to Bolster Data Classification, Risk Management
March 10, 2025Source or Source or Source or Source or Source

Google paid $12 million in bug bounties last year to security researchers
Google paid almost $12 million in bug bounty rewards to 660 security researchers who reported security bugs through the company's Vulnerability Reward Program (VRP) in 2024.
March 10, 2025Source or Source

Google researchers uncover critical security flaw in all AMD Zen processors
Google has released an open-source jailbreak toolkit to deploy custom microcode patches on vulnerable CPUs
March 10, 2025Source

Lawsuit Says DOGE Is Ignoring Key Social Security Data Rules
Ousted Social Security Official Accuses DOGE of Bypassing Critical Data Protections
March 10, 2025Source or Source or Source or Source

Manus AI: Hype or a True Leap in Autonomous Intelligence?
Chinese AI Developer Says Model Is Potentially a 'Glimpse Into AGI'
March 10, 2025Source or Source or Source or Source or Source

NHS patient data could have been exposed due to misconfigured APIs
A company called Medefer, which works with the UK's NHS, has been potentially exposing NHS patient data publicly for up to six years due to a misconfigured API that was discovered in November last year.
March 10, 2025Source

Pondurance Platform 2.0 identifies data breach risks
Pondurance announced a major new version of its cybersecurity platform. Pondurance Platform 2.0 provides the foundation for Pondurance's risk-based MDR service specifically designed to eliminate breach risks.
March 10, 2025Source

Protect Sensitive Data with Data Shredder Stick's Unrecoverable File Deletion
Permanently delete files, folders, and even drives with military-grade data overwriting to prevent recovery.
March 10, 2025Source

Quantum leap: Passwords in the new era of computing security
Last August, the National Institute of Standards and Technology (NIST) released its first three finalized post-quantum encryption standards, designed to withstand attacks from quantum computers. It was the latest sign of a changing security world -- but what does it all mean for passwords?
March 10, 2025Source

Review: The Cybersecurity Trinity
The Cybersecurity Trinity provides a comprehensive approach to modern cybersecurity by integrating AI, automation, and active cyber defense (ACD) into a unified strategy. Instead of addressing these elements in isolation, the author demonstrates how they work together to enhance security effectiveness, offering a practical and actionable framework grounded in the NIST Cybersecurity Framework.
March 10, 2025Source

Rhysida Hacking Group Strikes More Healthcare Providers
Mental Health Provider, Kansas Clinics Are Latest Victims of Cybercriminal Gang
March 10, 2025Source or Source or Source

Russian disinformation 'infects' AI chatbots, researchers warn
A sprawling Russian disinformation network is manipulating Western AI chatbots to spew pro-Kremlin propaganda, researchers say, at a time when the United States is reported to have paused its cyber operations against Moscow.
March 10, 2025Source

SimSpace Stack Optimizer allows organizations to measure their security technologies
SimSpace launched Stack Optimizer, designed to help organizations evaluate, test, and optimize their security and IT infrastructure.
March 10, 2025Source

Swiss critical sector faces new 24-hour cyberattack reporting rule
Switzerland's National Cybersecurity Centre (NCSC) has announced a new reporting obligation for critical infrastructure organizations in the country, requiring them to report cyberattacks to the agency within 24 hours of their discovery.
March 10, 2025Source

The NHS security culture problem is a crisis years in the making
Insiders say board members must be held accountable and drive positive change from the top down
March 10, 2025Source

Trump Coins Used as Lure in Malware Campaign
Binance is being spoofed in an email campaign using free TRUMP Coins as a lure leading to the installation of the ConnectWise RAT.
March 10, 2025Source

What Is a Password Manager and How Does It Work?
Learn how password managers work, their benefits and why your organization needs one to secure sensitive data and prevent security breaches.
March 10, 2025Source

Why you should never, ever delete spam email
Unsubscribing can also potentially trigger ransomware attacks.
March 10, 2025Source

X Social Media Platform Hit by Apparent DDoS Attack
'Dark Storm Team' Takes Responsibility for 4 Major Outages on Monday
March 10, 2025Source or Source or Source or Source or Source

Internet — Security Issues — March 9th, 2025

Microsoft and Amazon quantum advancements spark questions about the future of encryption
Microsoft's new "Majorana 1" processor is the first quantum chip powered by a topological core based on a new class of materials.
March 9, 2025Source

Researchers uncover hidden 'backdoor' in widely used ESP32 microchip
Over a billion devices worldwide contain this chip
March 9, 2025Source

US cities warn of wave of unpaid parking phishing texts
US cities are warning of an ongoing mobile phishing campaign pretending to be texts from the city's parking violation departments about unpaid parking invoices, that if unpaid, will incur an additional $35 fine per day.
March 9, 2025Source

Internet — Security Issues — March 8th, 2025

Developer guilty of using kill switch to sabotage employer's systems
Developer guilty of using kill switch to sabotage employer's systems
March 8, 2025Source

YouTubers extorted via copyright strikes to spread malware
Cybercriminals are sending bogus copyright claims to YouTubers to coerce them into promoting malware and cryptocurrency miners on their videos.
March 8, 2025Source

Internet — Security Issues — February 28th, 2025

$1.5B Bybit Hack is Linked to North Korea, FBI Says, in Potentially the Largest Crypto Heist Ever
The U.S. Federal Bureau of Investigation has confirmed that North Korea was behind the theft of $1.5 billion worth of digital tokens from cryptocurrency exchange firm Bybit last week. This is thought to be the biggest crypto heist of all time.
February 28, 2025Source

Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist
Amnesty International publishes technical details on zero-day vulnerabilities exploited by Cellebrite's mobile forensic tools to spy on a Serbian student activist.
February 28, 2025Source

Claroty, Nozomi, Armis Top Cyber-Physical Security Rankings
Gartner MQ for Cyber-Physical Security Details Pros, Cons of Pure-Play Approach
February 28, 2025Source or Source or Source or Source or Source

Evidence-Based Investment a Growing Priority for Enterprises
Findings From KPMG Report Show Shifting Attitude to Digital Transformation
February 28, 2025Source or Source or Source or Source or Source

Gabbard Decries Britain's Reported Demand for Apple to Provide Backdoor Access to Users' Cloud Data
The Director of National Intelligence said such a demand would violate Americans' rights and raise concerns about a foreign government pressuring a U.S.-based technology company.
February 28, 2025Source

GPT-4.5 Scores EQ Points, but Not Much Else
Model Appears to Be a Way Station on the Road to Something Greater
February 28, 2025Source or Source or Source or Source

How to Protect Your Mac from the Latest Parallels Desktop Vulnerability
Two Mac exploits are live in the wild, including a Parallels Desktop vulnerability. Inside, I teach you how to protect yourself.
February 28, 2025Source

In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story
Noteworthy stories that might have slipped under the radar: Krispy Kreme data breach costs $11M, Pwn2Own moves to Berlin, the story of the 2024 Disney hack.
February 28, 2025Source

ISMG Editors: Black Basta Falls, Is Ransomware on the Ropes?
Also: U.S. Health Data Privacy Crackdowns, Reality versus Hype of LLMs in Security
February 28, 2025Source or Source or Source or Source or Source

Leaked Chat Logs Reveal Black Basta's Dark Night of the Soul
After Disrupting Ascension Health, Black Basta Forecast Reprisals From FBI, Moscow
February 28, 2025Source or Source or Source or Source or Source

Microsoft Names Suspects in Lawsuit Against AI Hackers
In a lawsuit targeting cybercriminals who abuse AI services, Microsoft has named individuals from Iran, the UK, China and Vietnam.
February 28, 2025Source or Source or Source or Source or Source

OSPS Baseline: Practical security best practices for open source software projects
The Open Source Security Foundation (OpenSSF), a cross-industry initiative by the Linux Foundation, has announced the initial release of the Open Source Project Security Baseline (OSPS Baseline), a tiered framework of security practices that evolve with the maturity of open source projects.
February 28, 2025Source

OT/ICS cyber threats escalate as geopolitical conflicts intensify
Ransomware attacks against industrial organizations surged by 87% over the past year, while new malware families designed specifically for OT environments emerged. These findings highlight a troubling trend: OT systems are increasingly becoming mainstream targets, and even sophisticated threat actors use relatively unsophisticated tactics to infiltrate and disrupt industrial operations.
February 28, 2025Source

Police arrests suspects tied to AI-generated CSAM distribution ring
Law enforcement agencies from 19 countries have arrested 25 suspects linked to a criminal ring that was distributing child sexual abuse material (CSAM) generated using artificial intelligence (AI).
February 28, 2025Source

Qilin ransomware claims attack at Lee Enterprises, leaks stolen data
The Qilin ransomware gang has claimed responsibility for the attack at Lee Enterprises that disrupted operations on February 3, leaking samples of data they claim was stolen from the company.
February 28, 2025Source

Ransomware criminals love CISA's KEV list -- and that's a bug, not a feature
1 in 3 entries are used to extort civilians, says new paper
February 28, 2025Source

Ransomware Group Takes Credit for Lee Enterprises Attack
The Qilin ransomware gang claims to have stolen 350 Gb of files from Lee Enterprises in the attack that caused newspaper disruptions.
February 28, 2025Source

Serbian police used Cellebrite zero-day hack to unlock Android phones
Serbian authorities have reportedly used an Android zero-day exploit chain developed by Cellebrite to unlock the device of a student activist in the country and attempt to install spyware.
February 28, 2025Source or Source

'Termite' Gang Leaks Australian Fertility Clinic Records
Researchers: Ransomware Group Emerged Last Fall; Variant of Babuk Malware
February 28, 2025Source or Source or Source or Source or Source

Trump's Staffing Overhauls Hit Nation's Cyber Defense Agency
Current and Former Officials Express Optimism, Concerns Over Cyber Leadership Picks
February 28, 2025Source or Source or Source or Source or Source or Source

Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes
The Vo1d botnet is now powered by 1.6 million Android TV devices, up from 1.3 million half a year ago.
February 28, 2025Source

Internet — Security Issues — February 18th, 2025

A third of people would like to delete themselves from the internet
Around a third of web users say they would like to delete themselves from the internet, with people in the US and Canada being at the top of the list.
February 18, 2025Source

Addresses, earnings, medical records of Americans could be in DOGE's hands soon
The Department of Government Efficiency just ousted the head of the Social Security Administration and is now trying to access the agency's records.
February 18, 2025Source

AI and VBC go mainstream in 2025 amid cybersecurity gains, expert predicts
Robert Connely of Pega says patching legacy systems will give way to true health IT modernization, a security breakthrough will lead artificial intelligence into routine use -- and AI will make value-based care the industry standard.
February 18, 2025Source

As US newspaper outages drag on, Lee Enterprises blames cyberattack for encrypting critical systems
Newspaper publishing giant Lee Enterprises said an ongoing cyberattack is causing disruptions across its business, and is now in its third week of outages.
February 18, 2025Source

Chinese hackers abuse Microsoft APP-v tool to evade antivirus
The Chinese APT hacking group "Mustang Panda" has been spotted abusing the Microsoft Application Virtualization Injector utility as a LOLBIN to inject malicious payloads into legitimate processes to evade detection by antivirus software.
February 18, 2025Source

Compliance Isn't Security: Why a Checklist Won't Stop Cyberattacks
Think you're safe because you're compliant? Think again. Recent studies continue to highlight the concerning trend that compliance with major security frameworks does not necessarily prevent data breaches. For instance, in 2024, the average cost of a data breach reached an all-time high of $4.88 million, a 10% increase from the previous year.
February 18, 2025Source

Critical Vulnerability Patched in Juniper Session Smart Router
A critical vulnerability tracked as CVE-2025-21589 has been patched in Juniper Networks' Session Smart Router.
February 18, 2025Source

CSE calls on Canadian organizations and critical infrastructure providers to strengthen defences on third anniversary of Russia's invasion of Ukraine
The Communications Security Establishment Canada (CSE) and its Canadian Centre for Cyber Security (Cyber Centre) are urging Canadian organizations to remain vigilant and strengthen their protection against malicious cyber threats as the three-year mark of Russia's full-scale invasion of Ukraine approaches.
February 18, 2025Source

Data Privacy and Governance in Real-Time Data Streaming
Real-time data streaming delivers fast insights but raises privacy and compliance risks. Use encryption, tokenization, and policy enforcement for secure streaming.
February 18, 2025Source

Don't want to be hacked? These 10 simple security tweaks keep you safe
These everyday online security tips are simple, fast, easy, and free.
February 18, 2025Source

Ex-NSO Group CEO's Security Firm Dream Raises $100M at $1.1B Valuation
Israeli cybersecurity startup Dream has raised $100 million in Series B funding and is now valued at $1.1 billion.
February 18, 2025Source

Exploit Approaches Published for 2 New OpenSSH Bugs
Rapid Patching Urged: Flaws Pose Man-in-the-Middle Attack, Denial of Service Risks
February 18, 2025Source

ExpressVPN unveils massive upgrade to its Lightway Protocol
Lightway now promises to be "the VPN protocol of the future".
February 18, 2025Source

Finastra Starts Notifying People Impacted by Recent Data Breach
Financial software firm Finastra is notifying individuals whose personal information was stolen in a recent data breach.
February 18, 2025Source

FreSSH bugs undiscovered for years threaten OpenSSH security
Exploit code now available for MitM and DoS attacks
February 18, 2025Source

Golang Backdoor Abuses Telegram for C&C Communication
A newly discovered Golang backdoor is abusing Telegram for communication with its command-and-control (C&C) server.
February 18, 2025Source

Hacker group releases updated tool to activate almost all modern Microsoft software
The MAS project is donation-free because "profiting from piracy is not good," the pirates say
February 18, 2025Source

Healthcare outfit that served military personnel settles allegations it faked infosec compliance for $11M
If this makes you feel sick, knowing this happened before ransomware actors started targeting medical info may help
February 18, 2025Source

HIMSS25 Healthcare Cybersecurity Forum: Beyond tips and best practices
The day-long preconference symposium will offer real-world lessons on building safer and more resilient IT systems while creating organizational culture where cybersecurity is fundamental.
February 18, 2025Source

Juniper patches critical auth bypass in Session Smart routers
​Juniper Networks has patched a critical vulnerability that allows attackers to bypass authentication and take over Session Smart Router (SSR) devices.
February 18, 2025Source

Lee Enterprises newspaper disruptions caused by ransomware attack
Newspaper publishing giant Lee Enterprises has confirmed that a ransomware attack is behind ongoing disruptions impacting the group's operations for over two weeks.
February 18, 2025Source

Microsoft Warns of Improved XCSSET macOS Malware
Microsoft has observed a new variant of the XCSSET malware being used in limited attacks against macOS users.
February 18, 2025Source or Source

MirrorTab Raises $8.5M Seed Round to Take on Browser-Based Attacks
San Francisco startup secures $8.5 million in seed funding led by Valley Capital Partners to tackle browser-based malware attacks.
February 18, 2025Source

New Mac Malware Poses as Browser Updates
Researchers warn of rising macOS-targeted attacks as hackers exploit fake updates to bypass security. FrigidStealer malware highlights growing enterprise risks.
February 18, 2025Source

New OpenSSH flaws expose SSH servers to MiTM and DoS attacks
OpenSSH has released security updates addressing two vulnerabilities, a man-in-the-middle (MitM) and a denial of service flaw, with one of the flaws introduced over a decade ago.
February 18, 2025Source

New WinRAR version strips Windows metadata to increase privacy
WinRAR 7.10 was released yesterday with numerous features, such as larger memory pages, a dark mode, and the ability to fine-tune how Windows Mark-of-the-Web flags are propagated when extracting files.
February 18, 2025Source

Palo Alto firewalls under attack as miscreants chain flaws for root access
If you want to avoid urgent patches, stop exposing management consoles to the public internet
February 18, 2025Source

Palo Alto Networks Confirms Exploitation of Firewall Vulnerability
Palo Alto Networks has confirmed that a recently patched firewall vulnerability tracked as CVE-2025-0108 is being actively exploited.
February 18, 2025Source

Pangea Launches AI Guard and Prompt Guard to Combat Gen-AI Security Risks
Guardrail specialist releases new products to aid the development and use of secure gen-AI apps.
February 18, 2025Source

PowerSchool's simple security error was avoidable. You can do better
This easy security upgrade could have protected millions of kids.
February 18, 2025Source

Singulr Launches With $10M in Funding for AI Security and Governance Platform
Singulr AI announced its launch with $10 million in seed funding raised for an enterprise AI security and governance platform.
February 18, 2025Source

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload
Because stealing your credentials, banking info, and IP just wasn't enough
February 18, 2025Source

This new Android 16 feature shows that Google is serious about security
Security is one of the most important subjects in tech nowadays. A major gateway into our private data happens to be our phones. We keep a ton of sensitive information on these devices, and there are always people who want it. Well, Android 16 has a new API that tells apps when you have Advanced Protection activated. It can make your phone much more secure.
February 18, 2025Source

US newspaper publisher uses linguistic gymnastics to avoid saying its outage was due to ransomware
Called it an 'incident' in SEC filing, but encrypted apps and data exfiltration suggest Lee just can't say the R word
February 18, 2025Source

Venture capital giant Insight Partners hit by cyberattack
New York-based venture capital and private equity firm Insight Partners has disclosed that its systems were breached in January following a social engineering attack.
February 18, 2025Source

Internet — Security Issues — February 18th, 2025

6 considerations for 2025 cybersecurity investment decisions
Cybersecurity professionals may be concerned about the constantly shifting threat landscape. From the increased use of artificial intelligence (AI) by malicious actors to the expanding attack surface, cybersecurity risks evolve, and defenders need to mitigate them.
February 18, 2025Source

BlackLock ransomware onslaught: What to expect and how to fight it
BlackLock is on track to become the most active ransomware-as-a-service (RaaS) outfit in 2025, according to ReliaQuest.
February 18, 2025Source

Clinical Trial Database Exposes 1.6M Records to Web
Researcher Says Firm Failed to Secure Sensitive Health Data From Survey Forms
February 18, 2025Source or Source or Source or Source or Source

Cybercriminals shift focus to social media as attacks reach historic highs
A new report from Gen highlights a sharp rise in online threats, capping off a record-breaking 2024. Between October and December alone, 2.55 billion cyber threats were blocked -- an astonishing rate of 321 per second.
February 18, 2025Source

Deepwatch Buys Dassana for Agentic AI, Exposure Management
Acquisition Boosts Speed With Agentic AI for Analysts and Automated Risk Reporting
February 18, 2025Source or Source or Source or Source or Source

DOGE Team Wins Legal Battle, Retains Access to Federal Data
Court Clears Way for Musk's DOGE Team to Continue Accessing Sensitive Federal Data
February 18, 2025Source or Source or Source or Source or Source

Dream Raises $100M to Strengthen AI-Driven National Security
Investment Led by Bain Capital to Enhance Predictive Threat Detection Capabilities
February 18, 2025Source or Source or Source or Source or Source

Exploit Approaches Published for 2 New OpenSSH Bugs
Rapid Patching Urged: Flaws Pose Man-in-the-Middle Attack, Denial of Service Risks
February 18, 2025Source or Source or Source or Source

Is Russia Reining In Ransomware-Wielding Criminals?
Flurry of Arrests a Potential Prelude to Russia-Ukraine Peace Negotiations
February 18, 2025Source or Source or Source or Source or Source

Italian Privacy Agency Warns Against Unlawful Spyware Use
Use Other Than for Police Purposes Can Invoke Fine Up to 20 Million Euros
February 18, 2025Source or Source or Source or Source or Source

North Korea Stealing Cryptocurrency With JavaScript Implant
'Marstech1' Malware Targets Developers Through GitHub Repository
February 18, 2025Source or Source or Source or Source

Privacy Constraints Are Keeping Banks From Tackling Scams
M&T Bank's Karen Boyer on Need for Shared Responsibility with Telecoms, Tech Firms
February 18, 2025Source or Source or Source or Source or Source

ProcessUnity accelerates third-party assessments
ProcessUnity announced the next generation of the Global Risk Exchange. This platform transforms the third-party assessment process, reducing friction for both organizations and their third parties while streamlining vendor onboarding and accelerating assessment cycles.
February 18, 2025Source

Unit21 empowers financial institutions to detect and stop scams
Unit21 launched its new scams solution that helps financial institutions and fintechs detect and stop scams before they cause financial harm.
February 18, 2025Source

Internet — Security Issues — February 17th, 2025

6 LastPass Alternatives and Competitors for 2025
Looking for LastPass alternatives? Check out our list of the top password managers that offer secure and convenient options for managing your passwords.
February 17, 2025Source

127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police
After governments announced sanctions against the Zservers/XHost bulletproof hosting service, Dutch police took 127 servers offline.
February 17, 2025Source

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)
The suspected Chinese state-sponsored hackers who breached workstations of several US Treasury employees in December 2024 did so by leveraging not one, but two zero-days, according to Rapid7 researchers.
February 17, 2025Source

Attackers Exploit Palo Alto Zero-Day Authentication Bypass
Surge in Attack Attempts Spotted After Palo Alto Networks Details and Patches Flaw
February 17, 2025Source or Source or Source or Source

Downloads of DeepSeek's AI Apps Paused in South Korea Over Privacy Concerns
DeepSeek has temporarily paused downloads of its chatbot apps in South Korea while it works with local authorities to address privacy concerns.
February 17, 2025Source

ExpressVPN Rolls Out Major Upgrade to Its Already Impressive Lightway Protocol
By recoding its Lightway protocol in Rust, ExpressVPN claims it has beefed up its speed, security and performance.
February 17, 2025Source

Is Russia Reining In Ransomware-Wielding Criminals?
Flurry of Arrests a Potential Prelude to Russia-Ukraine Peace Negotiations
February 17, 2025Source or Source or Source

McAfee+ Ultimate review: Comprehensive security that needs more polish
More polish would make this flagship security suite shine.
February 17, 2025Source

Microsoft spots XCSSET macOS malware variant used for crypto theft
A new variant of the XCSSET macOS modular malware has emerged in attacks that target users' sensitive information, including digital wallets and data from the legitimate Notes app.
February 17, 2025Source or Source

New FinalDraft Malware Spotted in Espionage Campaign
A newly identified malware family abuses the Outlook mail service for communication, via the Microsoft Graph API.
February 17, 2025Source

Researchers Caution AI Benchmark Score Reliability
Leaderboard Race May Be More Marketing Than Merit
February 17, 2025Source or Source or Source or Source or Source

Russian State Hackers Target Organizations With Device Code Phishing
Russian hackers have been targeting government, defense, telecoms, and other organizations in a device code phishing campaign.
February 17, 2025Source

The XCSSET info-stealing malware is back, targeting macOS users and devs
A new, improved variant of the XCSSET macOS malware has been spotted "in limited attacks" by Microsoft's threat researchers.
February 17, 2025Source

Two Estonians plead guilty in $577M cryptocurrency Ponzi scheme
Two Estonian nationals may spend the next 20 years in prison for stealing hundreds of millions of dollars through a massive cryptocurrency Ponzi scheme, the US Department of Justice announced last week.
February 17, 2025Source

Unlocking OSINT: Top books to learn from
Discover the top Open-Source Intelligence (OSINT) books in this curated list. From investigative techniques to digital footprint analysis, these titles offer insights for security professionals, journalists, and researchers looking to master the art of gathering and analyzing publicly available data.
February 17, 2025Source

Why Some States Are Beefing Up Their Health Cyber Regs
Attorney Amy Magnano of Morgan Lewis on What's Next From Feds, States
February 17, 2025Source or Source or Source or Source or Source

Xerox Versalink Printer Vulnerabilities Enable Lateral Movement
Xerox released security updates to resolve pass-back attack vulnerabilities in Versalink multifunction printers.
February 17, 2025Source

Internet — Secuirty Issues — Miscellaneous

Adaptive Research & Design Co.
data recovery from crashes, viruses, electrical surges, and sabotage, on hard and floppy drives under any operating system.
Provides a ServiceSource

Anti-Phishing Working Group
Committed to wiping out Internet scams and fruad.
An ArticleSource

Catapult Integrated Systems
is a premier systems integrator and commercial managed Internet services provider serving northern California since 1992.
Provides a ServiceSource

Data Security
Seclore is an information rights management company which helps to protect documents and information by preserving enterprise rights management.
Provides a ServiceSource

European Institute for Computer Anti-Virus Research (EICAR)
leads task forces, organizes conferences, and publishes documents.
Provides InformationSource

Leprechaun Software
develops VirusBUSTER, an anti-virus software that protects PCs from boot, program, macro, and email based viruses.
Provides InformationSource

Packet Analytics
Net/FSE, Packet Analytics' network data search engine, puts the power of real time searches over terabytes of NetFlow data in the hands of security analysts. Employing sophisticated algorithms, Net/FSE reduces exposure to significant business risk by enabling security specialists to quickly and determine the extent of a network alert.
Provides a ServiceSource

PhishTank
Out of the Net, into the Tank.
Provides a ServiceSource

Remove Windows Script Hosting
completely from your system.
Provides InformationSource

SecureList
Kaspersky Lab presents Lab Matters, a series of webcasts that get right to the heart of some of the IT security industry's hottest topics. in the first program, two of the company's leading antimalware experts, Costin Raiu and Magnus Kalkuhl, will be giving viewers the complete lowdown on targeted attacks and discussing a host of other fascinating topics.
Provides InformationSource

Stiller Research
We provide current anti-virus news, a list of myths regarding viruses, a virus information list and a list of in-the-wild viruses.
Provides InformationSource

Symantec Security Updates
library of documents on computer viruses including the top ten list of most common viruses and new viruses to be on the alert for, as well as general virus Q&Amp;A.
Provides InformationSource

Virus Alert
for GOOD TIMES, read about these fake viruses.
Provides InformationSource

VirusTotal
VirusTotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.
Provides a ServiceSource

The MerchantStore © 1997 — 2026