Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

5 Practical Techniques for Effective Cyber Threat Hunting

Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security approach any company can embrace. Achieving this takes a lot of research and proactive threat hunting. The problem here is that it is easy to get stuck in endless arrays of data and end up with no relevant intel. To avoid this, use these five battle-tested techniques that are

The Hacker News favicon The Hacker News 10 months ago 1 min read

Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection

Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. "Written in Go, CoinLurker employs cutting-edge obfuscation and anti-analysis techniques, making it a highly effective tool in modern cyber attacks," Morphisec researcher Nadav Lorber said in a technical report published Monday. The attacks make use of fake update alerts that employ

The Hacker News favicon The Hacker News 10 months ago 1 min read

The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal

A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an unnamed organization in Latin America twice in 2019 and 2022. "The Mask APT is a legendary threat actor that has been performing highly sophisticated attacks since at least 2007," Kaspersky researchers Georgy Kucherin and Marc Rivero said in an analysis published last week. "Their targets

The Hacker News favicon The Hacker News 10 months ago 1 min read

CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of flaws is below - CVE-2024-20767 (CVSS score: 7.4) - Adobe ColdFusion contains an improper access control vulnerability that could allow an attacker to access or modify restricted

The Hacker News favicon The Hacker News 10 months ago 1 min read

BlackBerry to Sell Cylance to Arctic Wolf

Arctic Wolf plans to integrate Cylance's endpoint detection and response (EDR) technology into its extended detection and response (XDR) platform.

Dark Reading favicon Dark Reading 10 months ago 1 min read

Arctic Wolf acquires Cylance from BlackBerry for $160 million

The once-prominent technology firm bought Cylance for $1.4 billion in 2018. The post Arctic Wolf acquires Cylance from BlackBerry for $160 million appeared first on CyberScoop.

CyberScoop favicon CyberScoop 10 months ago 1 min read

Does Desktop AI Come With a Side of Risk?

Artificial intelligence capabilities are coming to a desktop near you — with Microsoft 365 Copilot, Google Gemini with Project Jarvis, and Apple Intelligence all arriving (or having arrived). But what are the risks?

Dark Reading favicon Dark Reading 10 months ago 1 min read

Citizen Development Moves Too Fast for Its Own Good

While low-code/no-code tools can speed up application development, sometimes it's worth taking a slower approach for a safer product.

Dark Reading favicon Dark Reading 10 months ago 1 min read

CISA pitches updated cyber incident response plan as an ‘agile, actionable’ framework

The agency is seeking public comment on its much-anticipated draft update to 2016’s PPD-41. The post CISA pitches updated cyber incident response plan as an ‘agile, actionable’ framework appeared first on CyberScoop.

CyberScoop favicon CyberScoop 10 months ago 1 min read

PHP backdoor looks to be work of Chinese-linked APT group

Known as Glutton, researchers at QiAnXin’s XLab believe Winnti is responsible for the malware. The post PHP backdoor looks to be work of Chinese-linked APT group appeared first on CyberScoop.

CyberScoop favicon CyberScoop 10 months ago 1 min read

The Education Industry: Why Its Data Must Be Protected

The sector must prioritize comprehensive data protection strategies to safeguard PII in an aggressive threat environment.

Dark Reading favicon Dark Reading 10 months ago 1 min read

ESET Threat Report H2 2024: Key findings

ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for staying secure in 2025

WeLiveSecurity favicon WeLiveSecurity 10 months ago 1 min read

DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages

Cybersecurity researchers have shed light on a previously undocumented aspect associated with ClickFix-style attacks that hinge on taking advantage of a single ad network service as part of a malvertising-driven information stealer campaign dubbed DeceptionAds. "Entirely reliant on a single ad network for propagation, this campaign showcases the core mechanisms of malvertising — delivering over

The Hacker News favicon The Hacker News 10 months ago 1 min read

NoviSpy Spyware Installed on Journalist's Phone After Unlocking It With Cellebrite Tool

A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently compromised by a previously undocumented spyware codenamed NoviSpy, according to a new report published by Amnesty International. "NoviSpy allows for capturing sensitive personal data from a target's phone after infection and provides the ability to turn on the phone's microphone or camera remotely," the

The Hacker News favicon The Hacker News 10 months ago 1 min read

Short-Lived Certificates Coming to Let’s Encrypt

Starting next year: Our longstanding offering won’t fundamentally change next year, but we are going to introduce a new offering that’s a big shift from anything we’ve done before—short-lived certificates. Specifically, certificates with a lifetime of six days. This is a big upgrade for the security of the TLS ecosystem because it minimizes exposure time during a key compromise event. Because we’ve done so much to...

Schneier on Security favicon Schneier on Security 10 months ago 1 min read

Amnesty International exposes Serbian police’s use of spyware on journalists, activists

The comprehensive report showed how Serbian law enforcement combined Cellebrite’s tech with a novel Android-focused spyware program. The post Amnesty International exposes Serbian police’s use of spyware on journalists, activists appeared first on CyberScoop.

CyberScoop favicon CyberScoop 10 months ago 1 min read

Data Governance in DevOps: Ensuring Compliance in the AI Era

With the evolution of modern software development, CI/CD pipeline governance has emerged as a critical factor in maintaining both agility and compliance. As we enter the age of artificial intelligence (AI), the importance of robust pipeline governance has only intensified. With that said, we’ll explore the concept of CI/CD pipeline governance and why it's vital, especially as AI becomes

The Hacker News favicon The Hacker News 10 months ago 1 min read

Microsoft Teams Vishing Spreads DarkGate RAT

A thwarted attack demonstrates that threat actors using yet another delivery method for the malware, which already has been spread using phishing emails, malvertising, hijacking of instant messages, and SEO poisoning.

Dark Reading favicon Dark Reading 10 months ago 1 min read

New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide

Cybersecurity researchers are calling attention to a new kind of investment scam that leverages a combination of social media malvertising, company-branded posts, and artificial intelligence (AI) powered video testimonials featuring famous personalities, ultimately leading to financial and data loss. "The main goal of the fraudsters is to lead victims to phishing websites and forms that harvest

The Hacker News favicon The Hacker News 10 months ago 1 min read

ESET Threat Report H2 2024

A view of the H2 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

WeLiveSecurity favicon WeLiveSecurity 10 months ago 1 min read

New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP

Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber attacks targeting China, the United States, Cambodia, Pakistan, and South Africa. QiAnXin XLab, which discovered the malicious activity in late April 2024, attributed the previously unknown malware with moderate confidence to the prolific Chinese nation-state group tracked Winnti (

The Hacker News favicon The Hacker News 10 months ago 1 min read

Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes

The Security Service of Ukraine (SBU or SSU) has exposed a novel espionage campaign suspected to be orchestrated by Russia's Federal Security Service (FSB) that involves recruiting Ukrainian minors for criminal activities under the guise of "quest games." Law enforcement officials said that it detained two FSB agent groups following a special operation in Kharkiv. These groups, per the agency,

The Hacker News favicon The Hacker News 10 months ago 1 min read

Upcoming Speaking Events

This is a current list of where and when I am scheduled to speak: I’m speaking at a joint meeting of the Boston Chapter of the IEEE Computer Society and GBC/ACM, in Boston, Massachusetts, USA, at 7:00 PM ET on Thursday, January 9, 2025. The event will take place at the Massachusetts Institute of Technology in Room 32-G449 (Kiva), as well as online via Zoom. Please register in advance if you plan to attend (whether...

Schneier on Security favicon Schneier on Security 10 months ago 1 min read

Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action

Germany's Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came preloaded on at least 30,000 internet-connected devices sold across the country. In a statement published earlier this week, authorities said they severed the communications between the devices and their command-and-control (C2) servers by sinkholing the domains

The Hacker News favicon The Hacker News 10 months ago 1 min read

Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques

Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai. "The target of the threat actors were Thailand officials based on the nature of the lures," Nikhil Hegde, senior engineer for Netskope's Security Efficacy team, told The Hacker News. "The Yokai backdoor itself is not

The Hacker News favicon The Hacker News 10 months ago 1 min read

Friday Squid Blogging: Biology and Ecology of the Colossal Squid

Good survey paper. Blog moderation policy.

Schneier on Security favicon Schneier on Security 10 months ago 1 min read

Cleo MFT Zero-Day Exploits Are About to Escalate, Analysts Warn

Defenders running the Cleo managed file transfer are urged to be on the lookout for the Cleopatra backdoor and other indicators of an ongoing ransomware campaign, as patching details remain foggy, and no CVE has been issued.

Dark Reading favicon Dark Reading 10 months ago 1 min read

Cleo MFT Zero-Day Exploits Are About Escalate, Analysts Warn

Defenders running the Cleo managed file transfer are urged to be on the lookout for the Cleopatra backdoor and other indicators of an ongoing ransomware campaign, as patching details remain foggy, and no CVE has been issued.

Dark Reading favicon Dark Reading 10 months ago 1 min read

Generative AI Security Tools Go Open Source

Businesses deploying large language models and other GenAI systems have a growing collection of open source tools for testing AI security.

Dark Reading favicon Dark Reading 10 months ago 1 min read

With 'TPUXtract,' Attackers Can Steal Orgs' AI Models

A new side-channel attack method is a computationally practical way to infer the structure of a convolutional neural network — meaning that cyberattackers or rival companies can plagiarize AI models and take their data for themselves.

Dark Reading favicon Dark Reading 10 months ago 1 min read

Test Your Cyber Skills With the SANS Holiday Hack Challenge

Open to players of all skill levels, the "Snow-mageddon" cybersecurity competition takes place in the world of Santa, elves, and Christmas mayhem.

Dark Reading favicon Dark Reading 10 months ago 1 min read

Arizona man arrested for alleged involvement in violent online terror networks

Baron Martin is linked to extremist online networks 764 and CVLT. The post Arizona man arrested for alleged involvement in violent online terror networks appeared first on CyberScoop.

CyberScoop favicon CyberScoop 11 months ago 1 min read

390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits

A now-removed GitHub repository that advertised a WordPress tool to publish posts to the online content management system (CMS) is estimated to have enabled the exfiltration of over 390,000 credentials. The malicious activity is part of a broader attack campaign undertaken by a threat actor, dubbed MUT-1244 (where MUT refers to "mysterious unattributed threat") by Datadog Security Labs, that

The Hacker News favicon The Hacker News 11 months ago 1 min read