Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More

From unpatched cars to hijacked clouds, this week’s Threatsday headlines remind us of one thing — no corner of technology is safe. Attackers are scanning firewalls for critical flaws, bending vulnerable SQL servers into powerful command centers, and even finding ways to poison Chrome’s settings to sneak in malicious extensions. On the defense side, AI is stepping up to block ransomware in real

The Hacker News favicon The Hacker News 20 days ago 1 min read

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware

Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster of activity possibly linked to a financially motivated threat actor known as Cl0p. The malicious activity involves sending extortion emails to executives at various organizations and claiming to have stolen sensitive data from their Oracle E-Business Suite. "This activity began on or

The Hacker News favicon The Hacker News 20 days ago 1 min read

WireTap Attack Breaks Intel SGX Security

The attack uses a passive interposer to control the SGX enclave and extract the DCAP attestation key, breaking the mechanism. The post WireTap Attack Breaks Intel SGX Security appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek 20 days ago 1 min read

How to Close Threat Detection Gaps: Your SOC's Action Plan

Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of signals; some urgent, many irrelevant. The job is to find the real threats fast enough to keep cases from piling up, prevent analyst burnout, and maintain client or leadership confidence. The toughest challenges, however, aren’t the alerts that can be dismissed quickly, but the ones that hide

The Hacker News favicon The Hacker News 20 days ago 1 min read

Hackers Launch Extortion Campaign Targeting Oracle E-Business Suite Customers

Executives at major firms received extortion threats alleging theft of sensitive data from Oracle EBS, with possible ties to Cl0p and FIN11. The post Hackers Launch Extortion Campaign Targeting Oracle E-Business Suite Customers appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek 20 days ago 1 min read

Zania Raises $18 Million for AI-Powered GRC Platform

The company plans to triple its engineering and go‑to‑market teams and to accelerate its agentic AI platform. The post Zania Raises $18 Million for AI-Powered GRC Platform appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek 20 days ago 1 min read

Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to target users in the United Arab Emirates (U.A.E.). Slovak cybersecurity company ESET said the malicious apps are distributed via fake websites and social engineering to trick unsuspecting users into downloading them. Once installed, both the spyware

The Hacker News favicon The Hacker News 20 days ago 1 min read

Android Spyware in the UAE Masquerades as ... Spyware

In a clever, messed-up twist on brand impersonation, attackers are passing off their spyware as a notorious UAE government surveillance app.

Dark Reading favicon Dark Reading 20 days ago 1 min read

1.5 Million Impacted by Allianz Life Data Breach

In July, hackers stole files containing names, addresses, dates of birth, and Social Security numbers from a cloud-based CRM. The post 1.5 Million Impacted by Allianz Life Data Breach appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek 20 days ago 1 min read

Oracle customers being bombarded with emails claiming widespread data theft

Researchers tell CyberScoop that notorious ransomware group Clop may be behind the email barrage. The post Oracle customers being bombarded with emails claiming widespread data theft appeared first on CyberScoop.

CyberScoop favicon CyberScoop 20 days ago 1 min read

Google Sheds Light on ShinyHunters' Salesforce Tactics

Mandiant provided proactive defenses against UNC6040's social engineering attacks that have led to several Salesforce breaches.

Dark Reading favicon Dark Reading 20 days ago 1 min read

Shutdown Threatens US Intel Sharing, Cyber Defense

Lapse of critical information sharing and mass furloughs at CISA are just some of the concerns.

Dark Reading favicon Dark Reading 20 days ago 1 min read

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel's Software Guard eXtensions (SGX) can be bypassed on DDR4 systems to passively decrypt sensitive data. SGX is designed as a hardware feature in Intel server processors that allows applications to be run in a Trusted Execution

The Hacker News favicon The Hacker News 21 days ago 1 min read

GOP senator confirms pending White House quantum push, touts legislative alternatives

Sen. Marsha Blackburn did not provide a timeline for any formal rollout by the administration, and also pointed to her proposed bill with Michigan Sen. Gary Peters. The post GOP senator confirms pending White House quantum push, touts legislative alternatives appeared first on CyberScoop.

CyberScoop favicon CyberScoop 21 days ago 1 min read

A $50 'Battering RAM' Can Bust Confidential Computing

Researchers have demonstrated an attack that can break through modern Intel and AMD processor technologies that protect encrypted data stored in memory.

Dark Reading favicon Dark Reading 21 days ago 1 min read

OpenSSL Vulnerabilities Allow Private Key Recovery, Code Execution, DoS Attacks

Three vulnerabilities have been patched with the release of OpenSSL updates. The post OpenSSL Vulnerabilities Allow Private Key Recovery, Code Execution, DoS Attacks appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek 21 days ago 1 min read

Undead Operating Systems Haunt Enterprise Security Networks

Windows 10 reaches end-of-life on Oct. 14, which will triple the number of vulnerable enterprise systems and create a massive attack surface for cybercriminals.

Dark Reading favicon Dark Reading 21 days ago 1 min read

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if successfully exploited, could expose sensitive OpenID Connect (OIDC) application client secrets under certain circumstances. The vulnerability, tracked as CVE-2025-59363, has been assigned a CVSS score of 7.7 out of 10.0. It has been described as a case of

The Hacker News favicon The Hacker News 21 days ago 1 min read

Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar)

AI is changing automation—but not always for the better. That’s why we’re hosting a new webinar, "Workflow Clarity: Where AI Fits in Modern Automation," with Thomas Kinsella, Co-founder & Chief Customer Officer at Tines, to explore how leading teams are cutting through the hype and building workflows that actually deliver.The rise of AI has changed how organizations think about automation.

The Hacker News favicon The Hacker News 21 days ago 1 min read

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover

A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain conditions. OpenShift AI is a platform for managing the lifecycle of predictive and generative artificial intelligence (GenAI) models at scale and across hybrid cloud environments. It also facilitates data

The Hacker News favicon The Hacker News 21 days ago 1 min read

Canadian Airline WestJet Says Hackers Stole Customer Data

The company says names, contact details, and ID documents provided in connection with reservations and travel were stolen from its systems. The post Canadian Airline WestJet Says Hackers Stole Customer Data appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek 21 days ago 1 min read

NIST Publishes Guide for Protecting ICS Against USB-Borne Threats

NIST Special Publication 1334 focuses on reducing cybersecurity risks associated with the use of removable media devices in OT environments. The post NIST Publishes Guide for Protecting ICS Against USB-Borne Threats appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek 21 days ago 1 min read

Use of Generative AI in Scams

New report: “Scam GPT: GenAI and the Automation of Fraud.” This primer maps what we currently know about generative AI’s role in scams, the communities most at risk, and the broader economic and cultural shifts that are making people more willing to take risks, more vulnerable to deception, and more likely to either perpetuate scams or fall victim to them. AI-enhanced scams are not merely financial or technological...

Schneier on Security favicon Schneier on Security 21 days ago 1 min read

Hackers Exploit Milesight Routers to Send Phishing SMS to European Users

Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in European countries since at least February 2022. French cybersecurity company SEKOIA said the attackers are exploiting the cellular router's API to send malicious SMS messages containing phishing URLs, with the campaigns primarily targeting Sweden, Italy,

The Hacker News favicon The Hacker News 21 days ago 1 min read

2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising

Bitdefender’s 2025 Cybersecurity Assessment Report paints a sobering picture of today’s cyber defense landscape: mounting pressure to remain silent after breaches, a gap between leadership and frontline teams, and a growing urgency to shrink the enterprise attack surface. The annual research combines insights from over 1,200 IT and security professionals across six countries, along with an

The Hacker News favicon The Hacker News 21 days ago 1 min read

Descope Raises $35 Million in Seed Round Extension

The identity and access management provider will invest in agentic identity R&D, expand to new regions, and hire new talent. The post Descope Raises $35 Million in Seed Round Extension appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek 21 days ago 1 min read

Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure

This year’s theme focuses on government entities and small and medium-sized businesses that are vital to protecting the systems and services that keep our communities running. The post Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek 21 days ago 1 min read

Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability

Impacting VMware Aria Operations and VMware Tools, the flaw can be exploited to elevate privileges on the VM. The post Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek 21 days ago 1 min read

New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones

A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections reported in Spain and Italy. Italian fraud prevention firm Cleafy, which discovered the sophisticated malware and remote access trojan (RAT) in late August 2025, said it leverages Hidden Virtual Network Computing (VNC) for remote control of infected devices and

The Hacker News favicon The Hacker News 21 days ago 1 min read

Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device

Intel and AMD say the research is not in scope of their threat model because the attack requires physical access to a device. The post Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek 21 days ago 1 min read

Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a backdoor called CABINETRAT. The activity, observed in September 2025, has been attributed to a threat cluster it tracks as UAC-0245. The agency said it spotted the attack following the discovery of software tools taking the form of XLL files, which refer to Microsoft Excel

The Hacker News favicon The Hacker News 21 days ago 1 min read

China Imposes One-Hour Reporting Rule for Major Cyber Incidents

The sweeping new regulations show that China's serious about hardening its own networks after launching widespread attacks on global networks.

Dark Reading favicon Dark Reading 21 days ago 1 min read

Palo Alto Networks spots new China espionage group showcasing advanced skills

Phantom Taurus has stolen sensitive data from ministries of foreign affairs, embassies, diplomats and telecom networks in the Middle East, Africa and Asia, researchers said. The post Palo Alto Networks spots new China espionage group showcasing advanced skills appeared first on CyberScoop.

CyberScoop favicon CyberScoop 21 days ago 1 min read

New China APT Strikes With Precision and Persistence

Phantom Taurus demonstrates a deep understanding of Windows environments, including advanced components like IIServerCore, a fileless backdoor that executes in memory to evade detection.

Dark Reading favicon Dark Reading 21 days ago 1 min read

'Klopatra' Trojan Makes Bank Transfers While You Sleep

A sophisticated new banking malware is hard to detect, capable of stealing lots of money, and infecting thousands of people in Italy and Spain.

Dark Reading favicon Dark Reading 21 days ago 1 min read