Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service

The Russian nation-state actor tracked as Secret Blizzard has been observed leveraging malware associated with other threat actors to deploy a known backdoor called Kazuar on target devices located in Ukraine. The new findings come from the Microsoft threat intelligence team, which said it observed the adversary leveraging the Amadey bot malware to download custom malware onto "specifically

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Turla living off other cybercriminals’ tools in order to attack Ukrainian targets

A Russian nation-state threat actor has been observed leveraging tools from other cybercriminal groups to compromise targets in Ukraine, a recent report by Microsoft Threat Intelligence disclosed. This clandestine approach, which is the second time in as many weeks that Microsoft has highlighted the group’s effort, shows how Turla uses a wide range of attack […] The post Turla living off other cybercriminals’ tools in...

CyberScoop favicon CyberScoop β€’ 11 months ago β€’ 1 min read

Cybersecurity Lessons From 3 Public Breaches

High-profile security incidents provide examples of how common vulnerabilities can be exploited. If you pay attention, you can learn from others' mistakes.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools

A newly devised technique leverages a Windows accessibility framework called UI Automation (UIA) to perform a wide range of malicious activities without tipping off endpoint detection and response (EDR) solutions. "To exploit this technique, a user must be convinced to run a program that uses UI Automation," Akamai security researcher Tomer Peled said in a report shared with The Hacker News. "

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Tips for Preventing Breaches in 2025

Hackers are constantly evolving, and so too should our security protocols.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Latest round of MITRE ATT&CK evaluations put cybersecurity products through rigors of ransomwareΒ 

The sixth round of tests included two ransomware variants, while also incorporating macOS for the first time. The post Latest round of MITRE ATT&CK evaluations put cybersecurity products through rigors of ransomware appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 11 months ago β€’ 1 min read

Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts

Cybersecurity researchers have flagged a "critical" security vulnerability in Microsoft's multi-factor authentication (MFA) implementation that allows an attacker to trivially sidestep the protection and gain unauthorized access to a victim's account. "The bypass was simple: it took around an hour to execute, required no user interaction and did not generate any notification or provide the

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms

Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domain Name System (DNS) tunnel for command-and-control (C2) communications, indicating that the threat actors are continuing to refine the tool after resurfacing a year ago. "Zloader 2.9.4.0 adds notable improvements including a custom DNS tunnel protocol for C2 communications and an interactive shell

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Why Americans must be prepared for cybersecurity’s worst

A Republican congressman from Texas makes the case for cybersecurity as β€œa cornerstone” of the GOP agenda. The post Why Americans must be prepared for cybersecurity’s worst appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 11 months ago β€’ 1 min read

Jailbreaking LLM-Controlled Robots

Surprising no one, it’s easy to trick an LLM-controlled robot into ignoring its safety instructions.

Schneier on Security favicon Schneier on Security β€’ 11 months ago β€’ 1 min read

Chinese EagleMsgSpy Spyware Found Exploiting Mobile Devices Since 2017

Cybersecurity researchers have discovered a novel surveillance program that's suspected to be used by Chinese police departments as a lawful intercept tool to gather a wide range of information from mobile devices. The Android tool, codenamed EagleMsgSpy by Lookout, has been operational since at least 2017, with artifacts uploaded to the VirusTotal malware scanning platform as recently as

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

What is Nudge Security and How Does it Work?

Regain control of SaaS sprawl with Day One discovery of all SaaS and GenAI accounts along with workflows to help you mitigate security risks, curb rogue app usage, and manage SaaS spend. In today’s highly distributed workplace, every employee has the ability to act as their own CIO, adopting new cloud and SaaS technologies whenever and wherever they need. While this has been a critical boon to

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Researchers Uncover Espionage Tactics of China-Based APT Groups in Southeast Asia

A suspected China-based threat actor has been linked to a series of cyber attacks targeting high-profile organizations in Southeast Asia since at least October 2023. The espionage campaign targeted organizations in various sectors spanning government ministries in two different countries, an air traffic control organization, a telecoms company, and a media outlet, the Symantec Threat Hunter Team

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Microsoft Fixes 72 Flaws, Including Patch for Actively Exploited CLFS Vulnerability

Microsoft closed out its Patch Tuesday updates for 2024 with fixes for a total of 72 security flaws spanning its software portfolio, including one that it said has been exploited in the wild. Of the 72 flaws, 17 are rated Critical, 54 are rated Important, and one is rated Moderate in severity. Thirty-one of the vulnerabilities are remote code execution flaws, and 27 of them allow for the

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Governments, Telcos Ward Off China's Hacking Typhoons

Infiltrating other nations' telecom networks is a cornerstone of China's geopolitical strategy, and it's having the unintended consequence of driving the uptake of encrypted communications.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls

The U.S. government on Tuesday unsealed charges against a Chinese national for allegedly breaking into thousands of Sophos firewall devices globally in 2020. Guan Tianfeng (aka gbigmao and gxiaomao), who is said to have worked at Sichuan Silence Information Technology Company, Limited, has been charged with conspiracy to commit computer fraud and conspiracy to commit wire fraud. Guan has been

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities

Ivanti has released security updates to address multiple critical flaws in its Cloud Services Application (CSA) and Connect Secure products that could lead to privilege escalation and code execution. The list of vulnerabilities is as follows - CVE-2024-11639 (CVSS score: 10.0) - An authentication bypass vulnerability in the admin web console of Ivanti CSA before 5.0.3 that allows a remote

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Patch Tuesday, December 2024 Edition

Microsoft today released updates to plug at least 70 security holes in Windows and Windows software, including one vulnerability that is already being exploited in active attacks. The zero-day seeing exploitation involves CVE-2024-49138, a security weakness in the Windows Common… Read More Β»

Krebs on Security favicon Krebs on Security β€’ 11 months ago β€’ 1 min read

Microsoft closes 2024 with extensive security update

Adobe, too. The post Microsoft closes 2024 with extensive security update appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 11 months ago β€’ 1 min read

Snowflake Rolls Out Mandatory MFA Plan

As part of the commitment to CISA's Secure by Design pledge, Snowflake will begin blocking sign-ins using single-factor authentication next year.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

FCC Proposes New Cybersecurity Rules for Telecoms

FCC Chairwoman Jessica Rosenworcel recommended "urgent action" to safeguard the nation's communications systems from real and present cybersecurity threats.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Actively Exploited Zero-Day, Critical RCEs Lead Microsoft Patch Tuesday

The zero-day (CVE-2024-49138), plus a worryingly critical unauthenticated RCE security vulnerability (CVE-2024-49112), are unwanted gifts for security admins this season.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

'Termite' Ransomware Likely Behind Cleo Zero-Day Attacks

The threat actor group recently took credit for a similar attack on Blue Yonder that affected multiple organizations, including Starbucks.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Wyden legislation would mandate FCC cybersecurity rules for telecoms

It would go beyond the FCC’s own proposal to regulate telecommunications carriers under federal wiretapping law. The post Wyden legislation would mandate FCC cybersecurity rules for telecoms appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 11 months ago β€’ 1 min read

Scottish Parliament TV at Risk From Deepfakes

Because the streaming service website offers no content restrictions, attackers are able to hijack and manipulate live streams.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Treasury sanctions Chinese cyber company, employee for 2020 global firewall attack

The department’s Office of Foreign Assets Control said Guan Tianfeng used a zero-day exploit to deploy malware on 81,000 firewalls. The post Treasury sanctions Chinese cyber company, employee for 2020 global firewall attack appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 11 months ago β€’ 1 min read

Cybercrime Gangs Abscond With Thousands of Orgs' AWS Credentials

The Nemesis and ShinyHunters attackers scanned millions of IP addresses to find exploitable cloud-based flaws, though their operation ironically was discovered due to a cloud misconfiguration of their own doing.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Cybercrime Gangs Abscond With Thousands of AWS Credentials

The Nemesis and ShinyHunters attackers scanned millions of IP addresses to find exploitable cloud-based flaws, though their operation ironically was discovered due to a cloud misconfiguration of their own doing.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged

Users of Cleo-managed file transfer software are being urged to ensure that their instances are not exposed to the internet following reports of mass exploitation of a vulnerability affecting fully patched systems. Cybersecurity company Huntress said it discovered evidence of threat actors exploiting the issue en masse on December 3, 2024. The vulnerability, which impacts Cleo's LexiCom,

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Lessons From the Largest Software Supply Chain Incidents

The software supply chain is a growing target, and organizations need to take special care to safeguard it.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Steady leadership prepares TSA to face evolving cyber threats

New presidents bring new policies. But amid rapidly expanding cyber threats, steady leadership at the federal agencies charged with securing critical infrastructure is, well, critical. David Pekoske, a retired U.S. Coast Guard vice admiral and administrator of the Transportation Security Administration, is uniquely positioned to provide that leadership. Congress showed foresight in 2018 by creating […] The post Steady...

CyberScoop favicon CyberScoop β€’ 11 months ago β€’ 1 min read

Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam

Cybersecurity researchers have shed light on a sophisticated mobile phishing (aka mishing) campaign that's designed to distribute an updated version of the Antidot banking trojan. "The attackers presented themselves as recruiters, luring unsuspecting victims with job offers," Zimperium zLabs Vishnu Pratapagiri researcher said in a new report. "As part of their fraudulent hiring process, the

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Full-Face Masks to Frustrate Identification

This is going to be interesting. It’s a video of someone trying on a variety of printed full-face masks. They won’t fool anyone for long, but will survive casual scrutiny. And they’re cheap and easy to swap.

Schneier on Security favicon Schneier on Security β€’ 11 months ago β€’ 1 min read

The Future of Network Security: Automated Internal and External Pentesting

In today’s rapidly evolving threat landscape, safeguarding your organization against cyberattacks is more critical than ever. Traditional penetration testing (pentesting), while effective, often falls short due to its high costs, resource requirements, and infrequent implementation. Automated internal and external network pentesting is a game-changing solution, empowering organizations to stay

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization's security strategy keep pace with today’s rapidly evolving threats?

WeLiveSecurity favicon WeLiveSecurity β€’ 11 months ago β€’ 1 min read