Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
A new threat vector exploits how modern browsers save HTML files, bypassing Mark of the Web and giving attackers another social-engineering attack for delivering malware.
Published on: July 02, 2025 | Source:Brett Leatherman told CyberScoop in an interview that while the group still poses a threat, the bureau is focused on resilience and victim support, and going on offense could be in the future. The post Top FBI cyber official: Salt Typhoon โlargely containedโ in telecom networks appeared first on CyberScoop.
Published on: July 02, 2025 | Source:Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written in the Nim programming language, underscoring a constant evolution of their tactics. "Unusually for macOS malware, the threat actors employ a process injection technique and remote communications via wss, the TLS-encrypted version of the WebSocket protocol,"
Published on: July 02, 2025 | Source:The ever-growing volume of vulnerabilities and threats requires organizations to remain resilient and anti-fragile โ that is, to be able to proactively respond to issues and continuously improve.
Published on: July 02, 2025 | Source:Ransomware is a major threat to the enterprise. Tools and training help, but survival depends on one thing: your organizationโs muscle memory to respond fast and recover stronger. The post Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response appeared first on SecurityWeek.
Published on: July 02, 2025 | Source:The United States has warned of continued Iranian cyberattacks following American strikes on Iranโs nuclear facilities. The post US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a โSmear Campaignโ appeared first on SecurityWeek.
Published on: July 02, 2025 | Source:By using social engineering tactics, threat actors are able to manipulate their victims into saving and renaming files that will backfire against them.
Published on: July 02, 2025 | Source:As Kelly Benefitsโs investigation into a recent data breach progressed, the number of impacted individuals continued to grow. The post Kelly Benefits Data Breach Impacts 550,000 People appeared first on SecurityWeek.
Published on: July 02, 2025 | Source:A whole class of speculative execution attacks against CPUs were published in 2018. They seemed pretty catastrophic at the time. But the fixes were as well. Speculative execution was a way to speed up CPUs, and removing those enhancements resulted in significant performance drops. Now, people are rethinking the trade-off. Ubuntu has disabled some protections, resulting in 20% performance boost. After discussion between...
Published on: July 02, 2025 | Source:With nearly 80% of cyber threats now mimicking legitimate user behavior, how are top SOCs determining whatโs legitimate traffic and what is potentially dangerous? Where do you turn when firewalls and endpoint detection and response (EDR) fall short at detecting the most important threats to your organization? Breaches at edge devices and VPN gateways have risen from 3% to 22%, according to
Published on: July 02, 2025 | Source:Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling phone numbers operated by threat actors. "A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, displaying another popular social engineering technique known as Telephone-Oriented Attack Delivery (TOAD
Published on: July 02, 2025 | Source:The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has levied sanctions against Russia-based bulletproof hosting (BPH) service provider Aeza Group for assisting threat actors in their malicious activities and targeting victims in the country and across the world. The sanctions also extend to its subsidiaries Aeza International Ltd., the U.K. branch of Aeza Group, as
Published on: July 02, 2025 | Source:CISA says two more vulnerabilities in the messaging application TeleMessage TM SGNL have been exploited in the wild. The post CISA Warns of Two Exploited TeleMessage Vulnerabilities appeared first on SecurityWeek.
Published on: July 02, 2025 | Source:Australian airline Qantas says personal information stolen from systems hosting the service records of 6 million customers. The post Qantas Data Breach Impacts Up to 6 Million Customers appeared first on SecurityWeek.
Published on: July 02, 2025 | Source:Unknown threat actors have been observed weaponizing v0, a generative artificial intelligence (AI) tool from Vercel, to design fake sign-in pages that impersonate their legitimate counterparts. "This observation signals a new evolution in the weaponization of Generative AI by threat actors who have demonstrated an ability to generate a functional phishing site from simple text prompts," Okta
Published on: July 02, 2025 | Source:The attack uses sideloading to deliver a variant of the popular Gh0stRAT malware and lures victims by posing โ among other things โ as a purported installer for DeepSeek's LLM.
Published on: July 02, 2025 | Source:Just as attackers have used SEO techniques to poison search engine results, they could rinse and repeat with artificial intelligence and the responses LLMs generate from user prompts.
Published on: July 01, 2025 | Source:As the largest managed security services provider, the combined entity will offer cyber consulting, managed detection and response, and incident response services.
Published on: July 01, 2025 | Source:Microsoft warns thousands of North Korean workers have infiltrated tech, manufacturing, and transportation sectors to steal money and data.
Published on: July 01, 2025 | Source:Cyber-insurance companies were forced to adapt once ransomware skyrocketed and highlighted crucial security weaknesses among organizations in all sectors.
Published on: July 01, 2025 | Source:The move is the result customer feedback, since they neither wanted to grant AI web crawlers unrestricted access to their data nor block the practice entirely. The post Cloudflare rolls out โpay-per-crawlโ feature to constrain AIโs limitless hunger for data appeared first on CyberScoop.
Published on: July 01, 2025 | Source:The US also conducted searches of 29 "laptop farms" across 16 states and seized 29 financial accounts used to launder funds.
Published on: July 01, 2025 | Source:Russia-based Aeza Group allegedly provided infrastructure to BianLian ransomware and the Meduza, RedLine and Lumma infostealer operators. The post US sanctions bulletproof hosting provider for supporting ransomware, infostealer operations appeared first on CyberScoop.
Published on: July 01, 2025 | Source:The feature is available for both consumer and business accounts. The post AT&T deploys new account lock feature to counter SIM swapping appeared first on CyberScoop.
Published on: July 01, 2025 | Source:Cybersecurity researchers have discovered a critical security vulnerability in artificial intelligence (AI) company Anthropic's Model Context Protocol (MCP) Inspector project that could result in remote code execution (RCE) and allow an attacker to gain complete access to the hosts. The vulnerability, tracked as CVE-2025-49596, carries a CVSS score of 9.4 out of a maximum of 10.0. "This is one
Published on: July 01, 2025 | Source:Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed TransferLoader. Enterprise security firm Proofpoint is tracking the activity associated with TransferLoader to a group dubbed UNK_GreenSec and the RomCom RAT actors under the moniker TA829. The latter is also known by the
Published on: July 01, 2025 | Source:Separate threats to popular browsers highlight the growing security risk for enterprises presented by the original gateway to the Web, which remains an integral tool for corporate users.
Published on: July 01, 2025 | Source:Companies that understand the motivations of their attackers and position themselves ahead of the competition will be in the best place to protect their business operations, brand reputation, and their bottom line.
Published on: July 01, 2025 | Source:A new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle the extension verification process, ultimately enabling attackers to execute malicious code on developer machines. "We discovered that flawed verification checks in Visual Studio Code allow publishers to add functionality
Published on: July 01, 2025 | Source:CISA has informed organizations about critical authentication bypass and remote code execution vulnerabilities in Microsens NMP Web+. The post Critical Microsens Product Flaws Allow Hackers to Go โFrom Zero to Heroโ appeared first on SecurityWeek.
Published on: July 01, 2025 | Source:The move could reshape how LLM developers gather information โ and force new deals between creators and AI companies. The post Cloudflare Puts a Default Block on AI Web Scraping appeared first on SecurityWeek.
Published on: July 01, 2025 | Source:LevelBlue has announced plans to acquire Trustwave to create the largest pure-play managed security services provider (MSSP). The post LevelBlue to Acquire Trustwave to Create Major MSSP appeared first on SecurityWeek.
Published on: July 01, 2025 | Source:ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for organizations in 2025
Published on: July 01, 2025 | Source:Dozens of accounts on X that promoted Scottish independence went dark during an internet blackout in Iran. Well, thatโs one way to identify fake accounts and misinformation campaigns.
Published on: July 01, 2025 | Source:Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still leaving one critical layer exposed: the browser. Itโs where 85% of modern work now happens. Itโs also where copy/paste actions, unsanctioned GenAI usage, rogue extensions, and personal devices create a risk surface that most security stacks werenโt designed to handle. For security leaders who know
Published on: July 01, 2025 | Source: