Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds

Taking place August 12-13, CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained. The post CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds appeared first on SecurityWeek.

Published on: August 08, 2025 | Source: SecurityWeek favicon SecurityWeek

AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims

Cybersecurity researchers are drawing attention to a new campaign that's using legitimate generative artificial intelligence (AI)-powered website building tools like DeepSite AI and BlackBox AI to create replica phishing pages mimicking Brazilian government agencies as part of a financially motivated campaign. The activity involves the creation of lookalike sites imitating Brazil's State

Published on: August 08, 2025 | Source: The Hacker News favicon The Hacker News

Microsoft: An organization without a response plan will be hit harder by a security incident

Security leaders shared advice gleaned from customer engagements, and reinforced the importance of planning and following fundamentals for defense. The post Microsoft: An organization without a response plan will be hit harder by a security incident appeared first on CyberScoop.

Published on: August 08, 2025 | Source: CyberScoop favicon CyberScoop

860K Compromised in Columbia University Data Breach

While no data has yet to be misused, the university doesn't rule out the possibility of that occurring in the future, prompting it to warn affected individuals to remain vigilant in the wake of the breach.

Published on: August 08, 2025 | Source: Dark Reading favicon Dark Reading

Research reveals possible privacy gaps in Apple Intelligence’s data handling

LAS VEGAS — One of the big worries during the generative AI boom is where exactly data is traveling when users enter queries or commands into the system. According to new research, those worries may also extend to one of the world’s most popular consumer technology companies. Apple’s artificial intelligence ecosystem, known as Apple Intelligence, […] The post Research reveals possible privacy gaps in Apple Intelligence...

Published on: August 08, 2025 | Source: CyberScoop favicon CyberScoop

Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?

A sky-high premium may not always reflect your company’s security posture

Published on: August 08, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

Redefining the Role: What Makes a CISO Great

Security is everyone's responsibility, but as a CISO, it starts with you.

Published on: August 08, 2025 | Source: Dark Reading favicon Dark Reading

Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector

As attackers target help desks and identity systems, traditional security perimeters are proving insufficient against agile, socially-engineered threats. The post Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector appeared first on SecurityWeek.

Published on: August 08, 2025 | Source: SecurityWeek favicon SecurityWeek

Data Dump From APT Actor Yields Clues to Attacker Capabilities

The tranche of information includes data on recent campaigns, attack tools, compromised credentials, and command files used by a threat actor believed to be acting on behalf of China or North Korea.

Published on: August 08, 2025 | Source: Dark Reading favicon Dark Reading

Attackers Target the Foundations of Crypto: Smart Contracts

A whole criminal ecosystem revolves around scamming users out of their cryptocurrency assets, but malicious — or vulnerable — smart contracts could be used against businesses as well.

Published on: August 08, 2025 | Source: Dark Reading favicon Dark Reading

In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment

Noteworthy stories that might have slipped under the radar: federal court filing system hack, Chanel data breach, emergency CISA directive. The post In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment appeared first on SecurityWeek.

Published on: August 08, 2025 | Source: SecurityWeek favicon SecurityWeek

Google Project Zero Changes Its Disclosure Policy

Google’s vulnerability finding team is again pushing the envelope of responsible disclosure: Google’s Project Zero team will retain its existing 90+30 policy regarding vulnerability disclosures, in which it provides vendors with 90 days before full disclosure takes place, with a 30-day period allowed for patch adoption if the bug is fixed before the deadline. However, as of July 29, Project Zero will also release...

Published on: August 08, 2025 | Source: Schneier on Security favicon Schneier on Security

Black Hat USA 2025 – Summary of Vendor Announcements (Part 4)

Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas. The post Black Hat USA 2025 – Summary of Vendor Announcements (Part 4) appeared first on SecurityWeek.

Published on: August 08, 2025 | Source: SecurityWeek favicon SecurityWeek

Leaked Credentials Up 160%: What Attackers Are Doing With Them

When an organization’s credentials are leaked, the immediate consequences are rarely visible—but the long-term impact is far-reaching. Far from the cloak-and-dagger tactics seen in fiction, many real-world cyber breaches begin with something deceptively simple: a username and password. According to Verizon’s 2025 Data Breach Investigations Report, leaked credentials accounted for 22% of breaches

Published on: August 08, 2025 | Source: The Hacker News favicon The Hacker News

RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes

A fresh set of 60 malicious packages has been uncovered targeting the RubyGems ecosystem by posing as seemingly innocuous automation tools for social media, blogging, or messaging services to steal credentials from unsuspecting users and likely resell them on dark web forums like Russian Market. The activity is assessed to be active since at least March 2023, according to the software supply

Published on: August 08, 2025 | Source: The Hacker News favicon The Hacker News

Columbia University Data Breach Impacts 860,000

Columbia University has been targeted in a cyberattack where hackers stole the personal information of students, applicants, and employees. The post Columbia University Data Breach Impacts 860,000 appeared first on SecurityWeek.

Published on: August 08, 2025 | Source: SecurityWeek favicon SecurityWeek

Android adware: What is it, and how do I get it off my device?

Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Here’s what to do.

Published on: August 08, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers

Bouygues has been targeted in a cyberattack that resulted in the personal information of millions of customers getting compromised. The post French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers appeared first on SecurityWeek.

Published on: August 08, 2025 | Source: SecurityWeek favicon SecurityWeek

GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions

A newly discovered campaign dubbed GreedyBear has leveraged over 150 malicious extensions to the Firefox marketplace that are designed to impersonate popular cryptocurrency wallets and steal more than $1 million in digital assets. The published browser add-ons masquerade as MetaMask, TronLink, Exodus, and Rabby Wallet, among others, Koi Security researcher Tuval Admoni said. What makes the

Published on: August 08, 2025 | Source: The Hacker News favicon The Hacker News

Federal courts to ramp up filing system security after ‘recent escalated cyberattacks’

The statement from the U.S. court system follows reports that the judiciary suffered a recent cyber breach. The post Federal courts to ramp up filing system security after ‘recent escalated cyberattacks’ appeared first on CyberScoop.

Published on: August 08, 2025 | Source: CyberScoop favicon CyberScoop

Silver Fox APT Blurs the Line Between Espionage & Cybercrime

Silver Fox is the Hannah Montana of Chinese threat actors, effortlessly swapping between petty criminal and nation-state-type attacks.

Published on: August 08, 2025 | Source: Dark Reading favicon Dark Reading

Air France, KLM Alert Authorities of Data Breach

While no sensitive financial data like credit card information was compromised, the threat actors were able to get away with names, email addresses, phone numbers, and more.

Published on: August 07, 2025 | Source: Dark Reading favicon Dark Reading

Prime Security Wins Black Hat's Startup Spotlight Competition

Security startups of all stripes submitted applications for Black Hat USA's Startup Spotlight. Prime Security won with its AI security architect platform.

Published on: August 07, 2025 | Source: Dark Reading favicon Dark Reading

Privilege Escalation Issue in Amazon ECS Leads to IAM Hijacking

A software developer discovered a way to abuse an undocumented protocol in Amazon's Elastic Container Service to escalate privileges, cross boundaries, and gain access to other cloud resources.

Published on: August 07, 2025 | Source: Dark Reading favicon Dark Reading

BlackSuit, Royal ransomware group hit over 450 US victims before last month’s takedown

The Department of Homeland Security said the Russian cybercrime collective received at least $370 million in ransom payments, based on current cryptocurrency valuations. The post BlackSuit, Royal ransomware group hit over 450 US victims before last month’s takedown appeared first on CyberScoop.

Published on: August 07, 2025 | Source: CyberScoop favicon CyberScoop

'Samourai' Cryptomixer Founders Plead Guilty to Money Laundering

As part of their plea deal, the cybercriminal founders will also have to forfeit more than $200 million.

Published on: August 07, 2025 | Source: Dark Reading favicon Dark Reading

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others

The threat actors behind the SocGholish malware have been observed leveraging Traffic Distribution Systems (TDSs) like Parrot TDS and Keitaro TDS to filter and redirect unsuspecting users to sketchy content. "The core of their operation is a sophisticated Malware-as-a-Service (MaaS) model, where infected systems are sold as initial access points to other cybercriminal organizations," Silent Push

Published on: August 07, 2025 | Source: The Hacker News favicon The Hacker News

Citizen Lab Founder Flags Rise of US Authoritarianism

Citizen Lab director and founder Ron Deibert explained how civil society is locked in "vicious cycle," and human rights are being abused as a result, covering Israeli spyware, the Khashoggi killing, and an erosion of democratic norms in the US.

Published on: August 07, 2025 | Source: Dark Reading favicon Dark Reading

SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability

SonicWall has been investigating reports about a zero-day potentially being exploited in ransomware attacks, but found no evidence of a new vulnerability. The post SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability appeared first on SecurityWeek.

Published on: August 07, 2025 | Source: SecurityWeek favicon SecurityWeek

Payback: 'ShinyHunters' Clocks Google via Salesforce

In 2024, it was Snowflake. In 2025, it's Salesforce. ShinyHunters is back, with low-tech hacks that nonetheless manage to bring down international megaliths like Google, Cisco, and Adidas.

Published on: August 07, 2025 | Source: Dark Reading favicon Dark Reading

Black Hat USA 2025: Policy compliance and the myth of the silver bullet

Who’s to blame when the AI tool managing a company’s compliance status gets it wrong?

Published on: August 07, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

CISA, Microsoft warn organizations of high-severity Microsoft Exchange vulnerability

The public disclosure and advisories came late Wednesday during Black Hat, but Microsoft said the timing was coordinated. The post CISA, Microsoft warn organizations of high-severity Microsoft Exchange vulnerability appeared first on CyberScoop.

Published on: August 07, 2025 | Source: CyberScoop favicon CyberScoop

Webinar: How to Stop Python Supply Chain Attacks—and the Expert Tools You Need

Python is everywhere in modern software. From machine learning models to production microservices, chances are your code—and your business—depends on Python packages you didn’t write. But in 2025, that trust comes with a serious risk. Every few weeks, we’re seeing fresh headlines about malicious packages uploaded to the Python Package Index (PyPI)—many going undetected until after they’ve caused

Published on: August 07, 2025 | Source: The Hacker News favicon The Hacker News

Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?

Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes

Published on: August 07, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity