Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

DeepTempo Launches AI-Based Security App for Snowflake

DeepTempo's Tempo is a deep learning-based Snowflake native app that allows organizations to detect and respond to evolving threats directly within their Snowflake environments.

Dark Reading favicon Dark Reading 11 months ago 1 min read

Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities

Apple has released security updates for iOS, iPadOS, macOS, visionOS, and its Safari web browser to address two zero-day flaws that have come under active exploitation in the wild. The flaws are listed below - CVE-2024-44308 (CVSS score: 8.8)- A vulnerability in JavaScriptCore that could lead to arbitrary code execution when processing malicious web content CVE-2024-44309 (CVSS score: 6.1

The Hacker News favicon The Hacker News 11 months ago 1 min read

Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation

Oracle is warning that a high-severity security flaw impacting the Agile Product Lifecycle Management (PLM) Framework has been exploited in the wild. The vulnerability, tracked as CVE-2024-21287 (CVSS score: 7.5), could be exploited sans authentication to leak sensitive information. "This vulnerability is remotely exploitable without authentication, i.e., it may be exploited over a network

The Hacker News favicon The Hacker News 11 months ago 1 min read

Fintech Giant Finastra Investigating Data Breach

The financial technology firm Finastra is investigating the alleged large-scale theft of information from its internal file transfer platform, KrebsOnSecurity has learned. Finastra, which provides software and services to 45 of the world's top 50 banks, notified customers of a potential breach after a cybercriminal began selling more than 400 gigabytes of data purportedly stolen from the company.

Krebs on Security favicon Krebs on Security 11 months ago 1 min read

RIIG Launches With Risk Intelligence Solutions

RIIG is a risk intelligence and cybersecurity solutions provider offering open source intelligence solutions designed for zero-trust environments.

Dark Reading favicon Dark Reading 11 months ago 1 min read

SWEEPS Educational Initiative Offers Application Security Training

The secure coding curriculum, funded by a $2.5 million grant, is available for students and professionals at all stages of their careers.

Dark Reading favicon Dark Reading 11 months ago 1 min read

Sen. Blumenthal wants FCC to get busy on telecom wiretap security rules

The subcommittee chair said the FCC has the ability to act now in response to Salt Typhoon targeting the 2024 presidential campaigns. The post Sen. Blumenthal wants FCC to get busy on telecom wiretap security rules appeared first on CyberScoop.

CyberScoop favicon CyberScoop 11 months ago 1 min read

Linux Variant of Helldown Ransomware Targets VMware ESXi Systems

Since surfacing in August, the likely LockBit variant has claimed more than two dozen victims and appears poised to strike many more.

Dark Reading favicon Dark Reading 11 months ago 1 min read

Microsoft launches ‘Zero Day Quest’ competition to enhance cloud and AI security

The tech giant is upping the bounties attached to several popular systems. The post Microsoft launches ‘Zero Day Quest’ competition to enhance cloud and AI security appeared first on CyberScoop.

CyberScoop favicon CyberScoop 11 months ago 1 min read

Bipartisan Senate bill targets supply chain threats from foreign adversaries

The bill would strengthen oversight powers for the body charged with investigating IT products from China and other foes. The post Bipartisan Senate bill targets supply chain threats from foreign adversaries appeared first on CyberScoop.

CyberScoop favicon CyberScoop 11 months ago 1 min read

Rail and pipeline representatives push to dial back TSA’s cyber mandates

House Republicans during a Tuesday hearing were sympathetic to industry calls for shaving down cyber regulations. The post Rail and pipeline representatives push to dial back TSA’s cyber mandates appeared first on CyberScoop.

CyberScoop favicon CyberScoop 11 months ago 1 min read

Russian Ransomware Gangs on the Hunt for Pen Testers

In further proof of the professionalization of Russian cybercriminal groups, ransomware gangs have been posting job ads for security positions such as pen testers, looking to boost their ransomware deployment operations.

Dark Reading favicon Dark Reading 11 months ago 1 min read

Russian-Speaking Ransomware Gangs on the Hunt for Pen Testers

In further proof of the professionalization of Russian cybercriminal groups, ransomware gangs have been posting job ads for security positions such as pen testers, looking to boost their ransomware deployment operations.

Dark Reading favicon Dark Reading 11 months ago 1 min read

'Phobos' Ransomware Cybercriminal Extradited From South Korea

According to the unsealed criminal charges, the operation is believed to have running for nearly four years.

Dark Reading favicon Dark Reading 11 months ago 1 min read

Salt Typhoon Hits T-Mobile as Part of Telecom Attack Spree

The company says no sensitive data was stolen, but federal agencies claim otherwise. CISA and FBI sources said attackers accessed all records of specific customers and the private communications of targeted individuals.

Dark Reading favicon Dark Reading 11 months ago 1 min read

We Can Do Better Than Free Credit Monitoring After a Breach

Individual companies and entire industries alike must take responsibility for protecting customer data — and doing the right thing when they fail.

Dark Reading favicon Dark Reading 11 months ago 1 min read

Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices

The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCKS, as well as by other services such as VN5Socks and Shopsocks5, new findings from Lumen Technologies reveal. "At least 80% of NSOCKS bots in our telemetry originate from the Ngioweb botnet, mainly utilizing small office/home office (SOHO) routers and IoT devices," the Black Lotus Labs team at

The Hacker News favicon The Hacker News 11 months ago 1 min read

Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts

Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and enable sports piracy using live streaming capture tools. The attacks involve the hijack of unauthenticated Jupyter Notebooks to establish initial access, and perform a series of actions designed to facilitate illegal live streaming of sports events, Aqua said in a report shared with The

The Hacker News favicon The Hacker News 11 months ago 1 min read

Why Italy Sells So Much Spyware

Interesting analysis: Although much attention is given to sophisticated, zero-click spyware developed by companies like Israel’s NSO Group, the Italian spyware marketplace has been able to operate relatively under the radar by specializing in cheaper tools. According to an Italian Ministry of Justice document, as of December 2022 law enforcement in the country could rent spyware for 150 a day, regardless of which...

Schneier on Security favicon Schneier on Security 11 months ago 1 min read

Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority

Privileged accounts are well-known gateways for potential security threats. However, many organizations focus solely on managing privileged access—rather than securing the accounts and users entrusted with it. This emphasis is perhaps due to the persistent challenges of Privileged Access Management (PAM) deployments. Yet, as the threat landscape evolves, so must organizational priorities. To

The Hacker News favicon The Hacker News 11 months ago 1 min read

My information was stolen. Now what?

The slow and painful recovery process

WeLiveSecurity favicon WeLiveSecurity 11 months ago 1 min read

New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems

Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are broadening their attack focus. "Helldown deploys Windows ransomware derived from the LockBit 3.0 code," Sekoia said in a report shared with The Hacker News. "Given the recent development of ransomware targeting ESX, it appears that the group

The Hacker News favicon The Hacker News 11 months ago 1 min read

Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign

U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access to valuable information. The adversaries, tracked as Salt Typhoon, breached the company as part of a "monthslong campaign" designed to harvest cellphone communications of "high-value intelligence targets." It's not clear what information was taken, if any,

The Hacker News favicon The Hacker News 11 months ago 1 min read

Warning: VMware vCenter and Kemp LoadMaster Flaws Under Active Exploitation

Now-patched security flaws impacting Progress Kemp LoadMaster and VMware vCenter Server have come under active exploitation in the wild, it has emerged. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added CVE-2024-1212 (CVSS score: 10.0), a maximum-severity security vulnerability in Progress Kemp LoadMaster to its Known Exploited Vulnerabilities (KEV) catalog. It was

The Hacker News favicon The Hacker News 11 months ago 1 min read

WhatsApp: NSO Group Operates Pegasus Spyware for Customers

Freshly released court documents reveal new details on controversial Israeli spyware firm's operations.

Dark Reading favicon Dark Reading 11 months ago 1 min read

AI About-Face: 'Mantis' Turns LLM Attackers Into Prey

Experimental counter-offensive system responds to malicious AI probes with their own surreptitious prompt-injection commands.

Dark Reading favicon Dark Reading 11 months ago 1 min read

Jen Easterly, CISA Director, to Step Down on Inauguration Day

Other Biden administration appointees at CISA will also submit their resignations on Jan. 20, as the cyber-defense agency prepares for President-elect Trump's new DHS director.

Dark Reading favicon Dark Reading 11 months ago 1 min read

Critical WordPress Plug-in Flaw Exposes 4M Sites to Takeover

A vulnerability found in the Really Simple Security plug-in allows an attacker to remotely gain access to any account on an affected website, including the administrator, when 2FA is enabled.

Dark Reading favicon Dark Reading 11 months ago 1 min read

Akira Ransomware Racks Up 30+ Victims in a Single Day

Of the numerous victims, at least three refused to pay the demanded ransom, with the rest seemingly in talks with the cybercriminal group.

Dark Reading favicon Dark Reading 11 months ago 1 min read

Name That Toon: Meeting of Minds

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 gift card.

Dark Reading favicon Dark Reading 11 months ago 1 min read

To Map Shadow IT, Follow Citizen Developers

The tangle of user-built tools is formidable to manage, but it can lead to a greater understanding of real-world business needs.

Dark Reading favicon Dark Reading 11 months ago 1 min read