Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

ClickFix Spin-Off Attack Bypasses Key Browser Safeguards

A new threat vector exploits how modern browsers save HTML files, bypassing Mark of the Web and giving attackers another social-engineering attack for delivering malware.

Published on: July 02, 2025 | Source: Dark Reading favicon Dark Reading

Top FBI cyber official: Salt Typhoon โ€˜largely containedโ€™ in telecom networks

Brett Leatherman told CyberScoop in an interview that while the group still poses a threat, the bureau is focused on resilience and victim support, and going on offense could be in the future. The post Top FBI cyber official: Salt Typhoon โ€˜largely containedโ€™ in telecom networks appeared first on CyberScoop.

Published on: July 02, 2025 | Source: CyberScoop favicon CyberScoop

North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written in the Nim programming language, underscoring a constant evolution of their tactics. "Unusually for macOS malware, the threat actors employ a process injection technique and remote communications via wss, the TLS-encrypted version of the WebSocket protocol,"

Published on: July 02, 2025 | Source: The Hacker News favicon The Hacker News

1 Year Later: Lessons Learned From the CrowdStrike Outage

The ever-growing volume of vulnerabilities and threats requires organizations to remain resilient and anti-fragile โ€” that is, to be able to proactively respond to issues and continuously improve.

Published on: July 02, 2025 | Source: Dark Reading favicon Dark Reading

Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response

Ransomware is a major threat to the enterprise. Tools and training help, but survival depends on one thing: your organizationโ€™s muscle memory to respond fast and recover stronger. The post Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response appeared first on SecurityWeek.

Published on: July 02, 2025 | Source: SecurityWeek favicon SecurityWeek

US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a โ€˜Smear Campaignโ€™

The United States has warned of continued Iranian cyberattacks following American strikes on Iranโ€™s nuclear facilities. The post US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a โ€˜Smear Campaignโ€™ appeared first on SecurityWeek.

Published on: July 02, 2025 | Source: SecurityWeek favicon SecurityWeek

FileFix Attack Chain Enables Malicious Script Execution

By using social engineering tactics, threat actors are able to manipulate their victims into saving and renaming files that will backfire against them.

Published on: July 02, 2025 | Source: Dark Reading favicon Dark Reading

Kelly Benefits Data Breach Impacts 550,000 People

As Kelly Benefitsโ€™s investigation into a recent data breach progressed, the number of impacted individuals continued to grow. The post Kelly Benefits Data Breach Impacts 550,000 People appeared first on SecurityWeek.

Published on: July 02, 2025 | Source: SecurityWeek favicon SecurityWeek

Ubuntu Disables Spectre/Meltdown Protections

A whole class of speculative execution attacks against CPUs were published in 2018. They seemed pretty catastrophic at the time. But the fixes were as well. Speculative execution was a way to speed up CPUs, and removing those enhancements resulted in significant performance drops. Now, people are rethinking the trade-off. Ubuntu has disabled some protections, resulting in 20% performance boost. After discussion between...

Published on: July 02, 2025 | Source: Schneier on Security favicon Schneier on Security

That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat

With nearly 80% of cyber threats now mimicking legitimate user behavior, how are top SOCs determining whatโ€™s legitimate traffic and what is potentially dangerous? Where do you turn when firewalls and endpoint detection and response (EDR) fall short at detecting the most important threats to your organization? Breaches at edge devices and VPN gateways have risen from 3% to 22%, according to

Published on: July 02, 2025 | Source: The Hacker News favicon The Hacker News

Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns

Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling phone numbers operated by threat actors. "A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, displaying another popular social engineering technique known as Telephone-Oriented Attack Delivery (TOAD

Published on: July 02, 2025 | Source: The Hacker News favicon The Hacker News

U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has levied sanctions against Russia-based bulletproof hosting (BPH) service provider Aeza Group for assisting threat actors in their malicious activities and targeting victims in the country and across the world. The sanctions also extend to its subsidiaries Aeza International Ltd., the U.K. branch of Aeza Group, as

Published on: July 02, 2025 | Source: The Hacker News favicon The Hacker News

CISA Warns of Two Exploited TeleMessage Vulnerabilitiesย 

CISA says two more vulnerabilities in the messaging application TeleMessage TM SGNL have been exploited in the wild. The post CISA Warns of Two Exploited TeleMessage Vulnerabilities appeared first on SecurityWeek.

Published on: July 02, 2025 | Source: SecurityWeek favicon SecurityWeek

Qantas Data Breach Impacts Up to 6 Million Customersย 

Australian airline Qantas says personal information stolen from systems hosting the service records of 6 million customers. The post Qantas Data Breach Impacts Up to 6 Million Customers appeared first on SecurityWeek.

Published on: July 02, 2025 | Source: SecurityWeek favicon SecurityWeek

Vercel's v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale

Unknown threat actors have been observed weaponizing v0, a generative artificial intelligence (AI) tool from Vercel, to design fake sign-in pages that impersonate their legitimate counterparts. "This observation signals a new evolution in the weaponization of Generative AI by threat actors who have demonstrated an ability to generate a functional phishing site from simple text prompts," Okta

Published on: July 02, 2025 | Source: The Hacker News favicon The Hacker News

Silver Fox Suspected in Taiwanese Campaign Using DeepSeek Lure

The attack uses sideloading to deliver a variant of the popular Gh0stRAT malware and lures victims by posing โ€” among other things โ€” as a purported installer for DeepSeek's LLM.

Published on: July 02, 2025 | Source: Dark Reading favicon Dark Reading

Like SEO, LLMs May Soon Fall Prey to Phishing Scams

Just as attackers have used SEO techniques to poison search engine results, they could rinse and repeat with artificial intelligence and the responses LLMs generate from user prompts.

Published on: July 01, 2025 | Source: Dark Reading favicon Dark Reading

LevelBlue Acquires Trustwave, Forms World's Largest Independent MSSP

As the largest managed security services provider, the combined entity will offer cyber consulting, managed detection and response, and incident response services.

Published on: July 01, 2025 | Source: Dark Reading favicon Dark Reading

Scope, Scale of Spurious North Korean IT Workers Emerges

Microsoft warns thousands of North Korean workers have infiltrated tech, manufacturing, and transportation sectors to steal money and data.

Published on: July 01, 2025 | Source: Dark Reading favicon Dark Reading

Ransomware Reshaped How Cyber Insurers Perform Security Assessments

Cyber-insurance companies were forced to adapt once ransomware skyrocketed and highlighted crucial security weaknesses among organizations in all sectors.

Published on: July 01, 2025 | Source: Dark Reading favicon Dark Reading

Cloudflare rolls out โ€˜pay-per-crawlโ€™ feature to constrain AIโ€™s limitless hunger for dataย 

The move is the result customer feedback, since they neither wanted to grant AI web crawlers unrestricted access to their data nor block the practice entirely. The post Cloudflare rolls out โ€˜pay-per-crawlโ€™ feature to constrain AIโ€™s limitless hunger for data appeared first on CyberScoop.

Published on: July 01, 2025 | Source: CyberScoop favicon CyberScoop

DoJ Disrupts North Korean IT Worker Scheme Across Multiple US States

The US also conducted searches of 29 "laptop farms" across 16 states and seized 29 financial accounts used to launder funds.

Published on: July 01, 2025 | Source: Dark Reading favicon Dark Reading

US sanctions bulletproof hosting provider for supporting ransomware, infostealer operations

Russia-based Aeza Group allegedly provided infrastructure to BianLian ransomware and the Meduza, RedLine and Lumma infostealer operators. The post US sanctions bulletproof hosting provider for supporting ransomware, infostealer operations appeared first on CyberScoop.

Published on: July 01, 2025 | Source: CyberScoop favicon CyberScoop

AT&T deploys new account lock feature to counter SIM swapping

The feature is available for both consumer and business accounts. The post AT&T deploys new account lock feature to counter SIM swapping appeared first on CyberScoop.

Published on: July 01, 2025 | Source: CyberScoop favicon CyberScoop

Critical Vulnerability in Anthropic's MCP Exposes Developer Machines to Remote Exploits

Cybersecurity researchers have discovered a critical security vulnerability in artificial intelligence (AI) company Anthropic's Model Context Protocol (MCP) Inspector project that could result in remote code execution (RCE) and allow an attacker to gain complete access to the hosts. The vulnerability, tracked as CVE-2025-49596, carries a CVSS score of 9.4 out of a maximum of 10.0. "This is one

Published on: July 01, 2025 | Source: The Hacker News favicon The Hacker News

TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns

Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed TransferLoader. Enterprise security firm Proofpoint is tracking the activity associated with TransferLoader to a group dubbed UNK_GreenSec and the RomCom RAT actors under the moniker TA829. The latter is also known by the

Published on: July 01, 2025 | Source: The Hacker News favicon The Hacker News

Chrome Zero-Day, 'FoxyWallet' Firefox Attacks Threaten Browsers

Separate threats to popular browsers highlight the growing security risk for enterprises presented by the original gateway to the Web, which remains an integral tool for corporate users.

Published on: July 01, 2025 | Source: Dark Reading favicon Dark Reading

How Businesses Can Align Cyber Defenses With Real Threats

Companies that understand the motivations of their attackers and position themselves ahead of the competition will be in the best place to protect their business operations, brand reputation, and their bottom line.

Published on: July 01, 2025 | Source: Dark Reading favicon Dark Reading

New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status

A new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle the extension verification process, ultimately enabling attackers to execute malicious code on developer machines. "We discovered that flawed verification checks in Visual Studio Code allow publishers to add functionality

Published on: July 01, 2025 | Source: The Hacker News favicon The Hacker News

Critical Microsens Product Flaws Allow Hackers to Go โ€˜From Zero to Heroโ€™

CISA has informed organizations about critical authentication bypass and remote code execution vulnerabilities in Microsens NMP Web+. The post Critical Microsens Product Flaws Allow Hackers to Go โ€˜From Zero to Heroโ€™ appeared first on SecurityWeek.

Published on: July 01, 2025 | Source: SecurityWeek favicon SecurityWeek

Cloudflare Puts a Default Block on AI Web Scraping

The move could reshape how LLM developers gather information โ€” and force new deals between creators and AI companies. The post Cloudflare Puts a Default Block on AI Web Scraping appeared first on SecurityWeek.

Published on: July 01, 2025 | Source: SecurityWeek favicon SecurityWeek

LevelBlue to Acquire Trustwave to Create Major MSSP

LevelBlue has announced plans to acquire Trustwave to create the largest pure-play managed security services provider (MSSP). The post LevelBlue to Acquire Trustwave to Create Major MSSP appeared first on SecurityWeek.

Published on: July 01, 2025 | Source: SecurityWeek favicon SecurityWeek

ESET Threat Report H1 2025: Key findings

ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for organizations in 2025

Published on: July 01, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

Iranian Blackout Affected Misinformation Campaigns

Dozens of accounts on X that promoted Scottish independence went dark during an internet blackout in Iran. Well, thatโ€™s one way to identify fake accounts and misinformation campaigns.

Published on: July 01, 2025 | Source: Schneier on Security favicon Schneier on Security

A New Maturity Model for Browser Security: Closing the Last-Mile Risk

Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still leaving one critical layer exposed: the browser. Itโ€™s where 85% of modern work now happens. Itโ€™s also where copy/paste actions, unsanctioned GenAI usage, rogue extensions, and personal devices create a risk surface that most security stacks werenโ€™t designed to handle. For security leaders who know

Published on: July 01, 2025 | Source: The Hacker News favicon The Hacker News