Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

Apple to Pay Siri Users $20 Per Device in Settlement Over Accidental Siri Privacy Violations

Apple has agreed to pay $95 million to settle a proposed class action lawsuit that accused the iPhone maker of invading users' privacy using its voice-activated Siri assistant. The development was first reported by Reuters. The settlement applies to U.S.-based individuals current or former owners or purchasers of a Siri-enabled device who had their confidential voice communications with the

The Hacker News favicon The Hacker News β€’ 10 months ago β€’ 1 min read

Proposed HIPAA Amendments Will Close Healthcare Security Gaps

Changes to the healthcare privacy regulation, including technical controls for network segmentation, multifactor authentication, and encryption, would strengthen cybersecurity protections for electronic health information and address evolving threats against healthcare entities.

Dark Reading favicon Dark Reading β€’ 10 months ago β€’ 1 min read

Unpatched Active Directory Flaw Can Crash Any Microsoft Server

Windows servers are vulnerable to a dangerous LDAP vulnerability that could be used to crash multiple servers at once and should be patched immediately.

Dark Reading favicon Dark Reading β€’ 10 months ago β€’ 1 min read

Google Is Allowing Device Fingerprinting

Lukasz Olejnik writes about device fingerprinting, and why Google’s policy change to allow it in 2025 is a major privacy setback. EDITED TO ADD (1/12): Shashdot thread.

Schneier on Security favicon Schneier on Security β€’ 10 months ago β€’ 1 min read

US Soldier Arrested in Verizon, AT&T Hacks

Wagenius posted about hacking more than 15 telecom providers on the Telegram messaging service.

Dark Reading favicon Dark Reading β€’ 10 months ago β€’ 1 min read

Hackers release files stolen in cyberattack on Rhode Island benefits system

The post Hackers release files stolen in cyberattack on Rhode Island benefits system appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 10 months ago β€’ 1 min read

Volkswagen Breach Exposes Data of 800K EV Customers

Ethical hacking group Chaos Computer Club uncovered exposed data of electrical vehicle owners across the company's VW, Audi, Seat, and Skoda brands.

Dark Reading favicon Dark Reading β€’ 10 months ago β€’ 1 min read

'Bad Likert Judge' Jailbreak Bypasses Guardrails of OpenAI, Other Top LLMs

A novel technique to stump artificial intelligence (AI) text-based systems increases the likelihood of a successful cyberattack by 60%.

Dark Reading favicon Dark Reading β€’ 10 months ago β€’ 1 min read

Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API

Details have emerged about three now-patched security vulnerabilities in Dynamics 365 and Power Apps Web API that could result in data exposure. The flaws, discovered by Melbourne-based cybersecurity company Stratus Security, have been addressed as of May 2024. Two of the three shortcomings reside in Power Platform's OData Web API Filter, while the third vulnerability is rooted in the FetchXML

The Hacker News favicon The Hacker News β€’ 10 months ago β€’ 1 min read

Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them

In the past year, cross-domain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit weak points across multiple domains – including endpoints, identity systems and cloud environments – so the adversary can infiltrate organizations, move laterally and evade detection. eCrime groups like SCATTERED SPIDER and North Korea-nexus adversaries such as FAMOUS

The Hacker News favicon The Hacker News β€’ 10 months ago β€’ 1 min read

Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT

Cybersecurity researchers have discovered a malicious package on the npm package registry that masquerades as a library for detecting vulnerabilities in Ethereum smart contracts but, in reality, drops an open-source remote access trojan called Quasar RAT onto developer systems. The heavily obfuscated package, named ethereumvulncontracthandler, was published to npm on December 18, 2024, by a user

The Hacker News favicon The Hacker News β€’ 10 months ago β€’ 1 min read

Three Russian-German Nationals Charged with Espionage for Russian Secret Service

German prosecutors have charged three Russian-German nationals for acting as secret service agents for Russia. The individuals, named Dieter S., Alexander J., and Alex D., have been accused of working for a foreign secret service. Dieter S. is also alleged to have participated in sabotage operations as well as taking pictures of military installations with an aim to endanger national security.

The Hacker News favicon The Hacker News β€’ 10 months ago β€’ 1 min read

New "DoubleClickjacking" Exploit Bypasses Clickjacking Protections on Major Websites

Threat hunters have disclosed a new "widespread timing-based vulnerability class" that leverages a double-click sequence to facilitate clickjacking attacks and account takeovers in almost all major websites. The technique has been codenamed DoubleClickjacking by security researcher Paulos Yibelo. "Instead of relying on a single click, it takes advantage of a double-click sequence," Yibelo said.

The Hacker News favicon The Hacker News β€’ 10 months ago β€’ 1 min read

Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics

The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Tuesday leveled sanctions against two entities in Iran and Russia for their attempts to interfere with the November 2024 presidential election. The federal agency said the entities – a subordinate organization of Iran's Islamic Revolutionary Guard Corps and a Moscow-based affiliate of Russia's Main Intelligence

The Hacker News favicon The Hacker News β€’ 10 months ago β€’ 1 min read

Managing Cloud Risks Gave Security Teams a Big Headache in 2024

The results of Dark Reading's 2024 Strategic Security Survey suggest that security teams continue to grapple with the challenges that come with increased cloud adoption, such as data visibility and loss of controls. Managing cloud risks will be a focus for security teams in 2025.

Dark Reading favicon Dark Reading β€’ 10 months ago β€’ 1 min read

Cybersecurity Lags in Middle East Business Development

The fast growing region has its own unique cyber issues β€” and it needs its own talent to fight them.

Dark Reading favicon Dark Reading β€’ 10 months ago β€’ 1 min read

US sanctions Russian, Iranian groups for election interference

The two entities are accused of partnering with intelligence agencies using artificial intelligence to conduct information operations against U.S. audiences. The post US sanctions Russian, Iranian groups for election interference appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 10 months ago β€’ 1 min read

After UN adoption, controversial cybercrime treaty’s next steps could prove vital

Forty nations have to ratify the treaty for it to enter into force, and they have some leeway on how to implement it. The post After UN adoption, controversial cybercrime treaty’s next steps could prove vital appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 10 months ago β€’ 1 min read

6 AI-Related Security Trends to Watch in 2025

AI tools will enable significant productivity and efficiency benefits for organizations in the coming year, but they also will exacerbate privacy, governance, and security risks.

Dark Reading favicon Dark Reading β€’ 10 months ago β€’ 1 min read

Gift Card Fraud

It’s becoming an organized crime tactic: Card draining is when criminals remove gift cards from a store display, open them in a separate location, and either record the card numbers and PINs or replace them with a new barcode. The crooks then repair the packaging, return to a store and place the cards back on a rack. When a customer unwittingly selects and loads money onto a tampered card, the criminal is able to...

Schneier on Security favicon Schneier on Security β€’ 10 months ago β€’ 1 min read

New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy

The U.S. Department of Justice (DoJ) has issued a final rule carrying out Executive Order (EO) 14117, which prevents mass transfer of citizens' personal data to countries of concern such as China (including Hong Kong and Macau), Cuba, Iran, North Korea, Russia, and Venezuela. "This final rule is a crucial step forward in addressing the extraordinary national security threat posed of our

The Hacker News favicon The Hacker News β€’ 10 months ago β€’ 1 min read

Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents

The United States Treasury Department said it suffered a "major cybersecurity incident" that allowed suspected Chinese threat actors to remotely access some computers and unclassified documents. "On December 8, 2024, Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to a key used by the vendor to secure a cloud-based

The Hacker News favicon The Hacker News β€’ 10 months ago β€’ 1 min read

Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation

Cybersecurity researchers have uncovered three security weaknesses in Microsoft's Azure Data Factory Apache Airflow integration that, if successfully exploited, could have allowed an attacker to gain the ability to conduct various covert actions, including data exfiltration and malware deployment. "Exploiting these flaws could allow attackers to gain persistent access as shadow administrators

The Hacker News favicon The Hacker News β€’ 10 months ago β€’ 1 min read

U.S. Army Soldier Arrested in AT&T, Verizon Extortions

Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has been selling and leaking sensitive customer call records stolen earlier this year from AT&T and Verizon. As first reported by KrebsOnSecurity last month, the accused is a communications specialist who was recently stationed in South Korea.

Krebs on Security favicon Krebs on Security β€’ 10 months ago β€’ 1 min read

Chinese State Hackers Breach US Treasury Department

In what's being called a "major cybersecurity incident," Beijing-backed adversaries broke into cyber vendor BeyondTrust to access the US Department of the Treasury workstations and steal unclassified data, according to a letter sent to lawmakers.

Dark Reading favicon Dark Reading β€’ 10 months ago β€’ 1 min read

Treasury workstations hacked by China-linked threat actors

According to a letter sent to Senate leaders and obtained by CyberScoop, the compromises occurred through third-party software provider BeyondTrust, which provides identity and access management security solutions. The post Treasury workstations hacked by China-linked threat actors appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 10 months ago β€’ 1 min read

Thousands of industrial routers vulnerable to command injection flawΒ 

The vulnerability, found in versions of Four-Faith routers, appears to have been exploited in the wild and has been connected to attempted infections of Mirai. The post Thousands of industrial routers vulnerable to command injection flaw appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 10 months ago β€’ 1 min read

How to Get the Most Out of Cyber Insurance

Cyber insurance should augment your cybersecurity strategy β€” not replace it.

Dark Reading favicon Dark Reading β€’ 10 months ago β€’ 1 min read

What Security Lessons Did We Learn in 2024?

Proactive defenses, cross-sector collaboration, and resilience are key to combating increasingly sophisticated threats.

Dark Reading favicon Dark Reading β€’ 10 months ago β€’ 1 min read

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits

The United States Department of Health and Human Services' (HHS) Office for Civil Rights (OCR) has proposed new cybersecurity requirements for healthcare organizations with an aim to safeguard patients' data against potential cyber attacks. The proposal, which seeks to modify the Health Insurance Portability and Accountability Act (HIPAA) of 1996, is part of a broader initiative to bolster the

The Hacker News favicon The Hacker News β€’ 10 months ago β€’ 1 min read

⚑ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [30 Dec]

Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while defenders work hard to keep our data safe. Whether it's a hidden flaw in popular software or a clever new attack method, staying informed is key to protecting yourself and your organization. In this week's update, we'll cover the most important developments in

The Hacker News favicon The Hacker News β€’ 10 months ago β€’ 1 min read

Salt Typhoon’s Reach Continues to Grow

The US government has identified a ninth telecom that was successfully hacked by Salt Typhoon.

Schneier on Security favicon Schneier on Security β€’ 10 months ago β€’ 1 min read