Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Stop AI Bot Traffic: Protecting Your Organization's Website

As crawlers and bots bog down websites in the era of AI, some researchers say that the solution for the Internet's most vulnerable websites is already here.

Published on: July 23, 2025 | Source: Dark Reading favicon Dark Reading

Trump AI plan pushes critical infrastructure to use AI for cyber defense

It also builds on previous efforts to promote β€œsecure by design” principles in AI systems and tools. The post Trump AI plan pushes critical infrastructure to use AI for cyber defense appeared first on CyberScoop.

Published on: July 23, 2025 | Source: CyberScoop favicon CyberScoop

Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware

The threat actor behind the exploitation of vulnerable Craft Content Management System (CMS) instances has shifted its tactics to target Magento CMS and misconfigured Docker instances. The activity has been attributed to a threat actor tracked as Mimo (aka Hezb), which has a long history of leveraging N-day security flaws in various web applications to deploy cryptocurrency miners. "Although

Published on: July 23, 2025 | Source: The Hacker News favicon The Hacker News

US Nuclear Agency Hacked in Microsoft SharePoint Frenzy

Threat actors are piling on the zero-day vulnerabilities in SharePoint, including at least three Chinese nation-state cyber-espionage groups.

Published on: July 23, 2025 | Source: Dark Reading favicon Dark Reading

Authorities in Ukraine nab alleged admin of Russian-language cybercrime forum

Officials accuse the unnamed suspect of running XSS.is, a key and long-running marketplace with more than 50,000 registered users. The suspect allegedly made more than $8.2 million. The post Authorities in Ukraine nab alleged admin of Russian-language cybercrime forum appeared first on CyberScoop.

Published on: July 23, 2025 | Source: CyberScoop favicon CyberScoop

Cisco network access security platform vulnerabilities under active exploitation

The software defects, which have a maximum-severity rating, do not require authentication and allow remote attackers to execute code arbitrarily on the underlying system. The post Cisco network access security platform vulnerabilities under active exploitation appeared first on CyberScoop.

Published on: July 23, 2025 | Source: CyberScoop favicon CyberScoop

Lumma Stealer Is Back & Stealthier Than Ever

The operators of the popular and prolific malware wasted no time in regrouping after an FBI takedown in May, and they're back to their old tricks.

Published on: July 23, 2025 | Source: Dark Reading favicon Dark Reading

Why ISO 42001 Matters for AI Governance at Scale

How a new international standard is shaping the future of responsible AI development and deployment.

Published on: July 23, 2025 | Source: Dark Reading favicon Dark Reading

OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking

AI voice clones can impersonate people in a way that Altman said is increasingly β€œindistinguishable from reality” and will require new methods for verification. The post OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking appeared first on SecurityWeek.

Published on: July 23, 2025 | Source: SecurityWeek favicon SecurityWeek

New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials

The Windows banking trojan known as Coyote has become the first known malware strain to exploit the Windows accessibility framework called UI Automation (UIA) to harvest sensitive information. "The new Coyote variant is targeting Brazilian users, and uses UIA to extract credentials linked to 75 banking institutes' web addresses and cryptocurrency exchanges," Akamai security researcher Tomer

Published on: July 23, 2025 | Source: The Hacker News favicon The Hacker News

Should We Trust AI? Three Approaches to AI Fallibility

Experts unpack the risks of trusting agentic AI, arguing that fallibility, hype, and a lack of transparency demand cautionβ€”before automation outpaces our understanding. The post Should We Trust AI? Three Approaches to AI Fallibility appeared first on SecurityWeek.

Published on: July 23, 2025 | Source: SecurityWeek favicon SecurityWeek

France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine

French authorities announced that an alleged admin of XSS.is, one of the longest-running cybercrime forums, has been arrested in Ukraine. The post France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine appeared first on SecurityWeek.

Published on: July 23, 2025 | Source: SecurityWeek favicon SecurityWeek

UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble?

Critics warn that a ban on ransomware payments may lead to dangerous unintended consequences, including forcing victims into secrecy or incentivizing attackers to shift tactics. The post UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble? appeared first on SecurityWeek.

Published on: July 23, 2025 | Source: SecurityWeek favicon SecurityWeek

Coyote Banking Trojan First to Abuse Microsoft UIA

Akamai’s analysis of the Coyote malware revealed that it abuses Microsoft’s UIA accessibility framework to obtain data. The post Coyote Banking Trojan First to Abuse Microsoft UIA appeared first on SecurityWeek.

Published on: July 23, 2025 | Source: SecurityWeek favicon SecurityWeek

Organizations Warned of Interlock Ransomware Attacks

The US government has issued an alert on the Interlock ransomware, which targets organizations via drive-by download attacks. The post Organizations Warned of Interlock Ransomware Attacks appeared first on SecurityWeek.

Published on: July 23, 2025 | Source: SecurityWeek favicon SecurityWeek

Google Sues the Badbox Botnet Operators

It will be interesting to watch what will come of this private lawsuit: Google on Thursday announced filing a lawsuit against the operators of the Badbox 2.0 botnet, which has ensnared more than 10 million devices running Android open source software. These devices lack Google’s security protections, and the perpetrators pre-installed the Badbox 2.0 malware on them, to create a backdoor and abuse them for large-scale...

Published on: July 23, 2025 | Source: Schneier on Security favicon Schneier on Security

Kerberoasting Detections: A New Approach to a Decade-Old Challenge

Security experts have been talking about Kerberoasting for over a decade, yet this attack continues to evade typical defense methods. Why? It’s because existing detections rely on brittle heuristics and static rules, which don’t hold up for detecting potential attack patterns in highly variable Kerberos traffic. They frequently generate false positives or miss β€œlow-and-slow” attacks altogether.&

Published on: July 23, 2025 | Source: The Hacker News favicon The Hacker News

Critical Vulnerabilities Patched in Sophos Firewall

Sophos has patched five vulnerabilities in Sophos Firewall that could allow remote attackers to execute arbitrary code. The post Critical Vulnerabilities Patched in Sophos Firewall appeared first on SecurityWeek.

Published on: July 23, 2025 | Source: SecurityWeek favicon SecurityWeek

Lumma Stealer Malware Returns After Takedown Attempt

The Lumma Stealer is back after Microsoft and law enforcement took action to significantly disrupt the malware’s infrastructure. The post Lumma Stealer Malware Returns After Takedown Attempt appeared first on SecurityWeek.

Published on: July 23, 2025 | Source: SecurityWeek favicon SecurityWeek

Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages

Google has announced the launch of a new initiative called OSS Rebuild to bolster the security of the open-source package ecosystems and prevent software supply chain attacks. "As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers," Matthew Suozzo, Google Open Source Security

Published on: July 23, 2025 | Source: The Hacker News favicon The Hacker News

Hackers Start Exploiting Critical Cisco ISE Vulnerabilities

Cisco says it is aware of attempted exploitation of critical ISE vulnerabilities leading to unauthenticated remote code execution. The post Hackers Start Exploiting Critical Cisco ISE Vulnerabilities appeared first on SecurityWeek.

Published on: July 23, 2025 | Source: SecurityWeek favicon SecurityWeek

CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), on July 22, 2025, added two Microsoft SharePoint flaws, CVE-2025-49704 and CVE-2025-49706, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. To that end, Federal Civilian Executive Branch (FCEB) agencies are required to remediate identified vulnerabilities by July 23, 2025. "CISA is

Published on: July 23, 2025 | Source: The Hacker News favicon The Hacker News

CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security flaws impacting SysAid IT support software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities in question are listed below - CVE-2025-2775 (CVSS score: 9.3) - An improper restriction of XML external entity (XXE) reference vulnerability in the

Published on: July 23, 2025 | Source: The Hacker News favicon The Hacker News

China Introduces National Cyber ID Amid Privacy Concerns

China officially rolled out a voluntary Internet identity system to protect citizens' online identities and personal information, but critics worry about privacy and surveillance.

Published on: July 23, 2025 | Source: Dark Reading favicon Dark Reading

Microsoft Integrates Data Lake With Sentinel SIEM

Microsoft Sentinel Data Lake aims to provide inexpensive storage for large volumes of telemetry, while threat intelligence will be included with Defender XDR at no extra cost.

Published on: July 22, 2025 | Source: Dark Reading favicon Dark Reading

3 China Nation-State Actors Target SharePoint Bugs

Hackers and cybercrime groups are part of a virtual feeding frenzy, after Microsoft's recent disclosure of new vulnerabilities in on-premises editions of SharePoint Server.

Published on: July 22, 2025 | Source: Dark Reading favicon Dark Reading

Contract lapse leaves critical infrastructure cybersecurity sensor data unanalyzed at national labΒ 

A program manager at Lawrence Livermore National Laboratory told lawmakers Tuesday that the recent contract expiration puts OT security at risk. The post Contract lapse leaves critical infrastructure cybersecurity sensor data unanalyzed at national lab appeared first on CyberScoop.

Published on: July 22, 2025 | Source: CyberScoop favicon CyberScoop

CISO Conversations: How IT and OT Security Worlds Are Converging

Dark Reading's Kelly Jackson Higgins interviews Carmine Valente, deputy CISO at Con Edison, about his role at the New York-based electric utility and the state of IT and OT security. Valente highlights current threats, including ransomware and supply chain attacks, as well as the impact of AI on both defense and threats.

Published on: July 22, 2025 | Source: Dark Reading favicon Dark Reading

House Republicans endorse stricter state and federal-led voter roll purges despite dearth of evidence on fraud

GOP lawmakers say they’re committed to altering national voting laws to make it easier for states to purge potentially eligible voters. The post House Republicans endorse stricter state and federal-led voter roll purges despite dearth of evidence on fraud appeared first on CyberScoop.

Published on: July 22, 2025 | Source: CyberScoop favicon CyberScoop

Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch

Microsoft says the Chinese threat actors Linen Typhoon, Violet Typhoon, and Storm-2603 have been exploiting the ToolShell zero-days. The post Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch appeared first on SecurityWeek.

Published on: July 22, 2025 | Source: SecurityWeek favicon SecurityWeek

Reclaiming Control: How Enterprises Can Fix Broken Security Operations

Once a manageable function, security operations has become a battlefield of complexity. The post Reclaiming Control: How Enterprises Can Fix Broken Security Operations appeared first on SecurityWeek.

Published on: July 22, 2025 | Source: SecurityWeek favicon SecurityWeek

Microsoft SharePoint zero-day attacks pinned on China-linked β€˜Typhoon’ threat groups

Linen Typhoon, Violet Typhoon and Storm-2603 are behind the initial attack spree that erupted over the weekend. Other threat groups are now following suit. The post Microsoft SharePoint zero-day attacks pinned on China-linked β€˜Typhoon’ threat groups appeared first on CyberScoop.

Published on: July 22, 2025 | Source: CyberScoop favicon CyberScoop

Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups

Microsoft has formally tied the exploitation of security flaws in internet-facing SharePoint Server instances to two Chinese hacking groups called Linen Typhoon and Violet Typhoon as early as July 7, 2025, corroborating earlier reports. The tech giant said it also observed a third China-based threat actor, which it tracks as Storm-2603, weaponizing the flaws as well to obtain initial access to

Published on: July 22, 2025 | Source: The Hacker News favicon The Hacker News

Dell Says Data Leaked by Hackers Is Fake

Dell confirms the compromise of a demo environment containing synthetic data after hackers leak allegedly stolen information. The post Dell Says Data Leaked by Hackers Is Fake appeared first on SecurityWeek.

Published on: July 22, 2025 | Source: SecurityWeek favicon SecurityWeek

UK moves to ban public sector organizations from making ransom payments

Private companies would also have to report to the government if they plan to pay off cybercriminals. The post UK moves to ban public sector organizations from making ransom payments appeared first on CyberScoop.

Published on: July 22, 2025 | Source: CyberScoop favicon CyberScoop