Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

263,000 Impacted by Esse Health Data Breach

Esse Health says the personal information of over 263,000 individuals was stolen in an April 2025 cyberattack. The post 263,000 Impacted by Esse Health Data Breach appeared first on SecurityWeek.

Published on: July 01, 2025 | Source: SecurityWeek favicon SecurityWeek

Iranian Hackers’ Preferred ICS Targets Left Open Amid Fresh US Attack Warning

The US government is again warning about potential Iranian cyberattacks as researchers find that hackers’ favorite ICS targets remain exposed. The post Iranian Hackers’ Preferred ICS Targets Left Open Amid Fresh US Attack Warning appeared first on SecurityWeek.

Published on: July 01, 2025 | Source: SecurityWeek favicon SecurityWeek

ESET APT Activity Report Q4 2024–Q1 2025: Malware sharing, wipers and exploits

ESET experts discuss Sandworm’s new data wiper, relentless campaigns by UnsolicitedBooker, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report

Published on: July 01, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

Chrome Zero-Day CVE-2025-6554 Under Active Attack β€” Google Issues Security Update

Google has released security updates to address a vulnerability in its Chrome browser for which an exploit exists in the wild. The zero-day vulnerability, tracked as CVE-2025-6554 (CVSS score: N/A), has been described as a type confusion flaw in the V8 JavaScript and WebAssembly engine. "Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary

Published on: July 01, 2025 | Source: The Hacker News favicon The Hacker News

US Storms 29 Laptop Farms in Crackdown on North Korean IT Worker Schemes

The US has made 29 searches of known or suspected laptop farms supporting North Korean individuals posing as US IT workers. The post US Storms 29 Laptop Farms in Crackdown on North Korean IT Worker Schemes appeared first on SecurityWeek.

Published on: July 01, 2025 | Source: SecurityWeek favicon SecurityWeek

U.S. Arrests Facilitator in North Korean IT Worker Scheme; Seizes 29 Domains and Raids 21 Laptop Farms

The U.S. Department of Justice (DoJ) on Monday announced sweeping actions targeting the North Korean information technology (IT) worker scheme, leading to the arrest of one individual and the seizure of 29 financial accounts, 21 fraudulent websites, and nearly 200 computers. The coordinated action saw searches of 21 known or suspected "laptop farms" between June 10 and 17, 2025, across 14 states

Published on: July 01, 2025 | Source: The Hacker News favicon The Hacker News

Chrome 138 Update Patches Zero-Day Vulnerability

Google has released a Chrome 138 update that patches a high-severity vulnerability with an exploit in the wild. The post Chrome 138 Update Patches Zero-Day Vulnerability appeared first on SecurityWeek.

Published on: July 01, 2025 | Source: SecurityWeek favicon SecurityWeek

Microsoft Removes Password Management from Authenticator App Starting August 2025

Microsoft has said that it's ending support for passwords in its Authenticator app starting August 1, 2025. Microsoft’s move is part of a much larger shift away from traditional password-based logins. The company said the changes are also meant to streamline autofill within its two-factor authentication (2FA) app, making the experience simpler and more secure.Over the past few years, Microsoft

Published on: July 01, 2025 | Source: The Hacker News favicon The Hacker News

Scattered Spider Hacking Spree Continues With Airline Sector Attacks

Microsoft has called the hacker collective one of the most dangerous current cyber threats.

Published on: June 30, 2025 | Source: Dark Reading favicon Dark Reading

Hired Hacker Assists Drug Cartel in Finding, Killing FBI Sources

According to a government report, El Chapo's Sinaloa drug cartel used a hacker to spy on people connected to the FBI's 2018 investigation against the kingpin, which led to deadly consequences.

Published on: June 30, 2025 | Source: Dark Reading favicon Dark Reading

Chinese Company Hikvision Banned By Canadian Government

Though the company's video surveillance products will be prohibited for government use, individuals and private businesses can still buy the vendor's products.

Published on: June 30, 2025 | Source: Dark Reading favicon Dark Reading

Rethinking Cyber-Risk as Traditional Models Fall Short

Systemic cyber-risk models are not accounting for rapidly evolving threats β€” and a time when organizations are more interconnected than ever.

Published on: June 30, 2025 | Source: Dark Reading favicon Dark Reading

Scammers have a new tactic: impersonating DOGE

An email reviewed by Scoop News Group and analyzed by Proofpoint reveals the latest attempt by fraudsters to capitalize on confusion over the Elon Musk-created group. The post Scammers have a new tactic: impersonating DOGE appeared first on CyberScoop.

Published on: June 30, 2025 | Source: CyberScoop favicon CyberScoop

Airoha Chip Vulns Put Sony, Bose Earbuds & Headphones at Risk

The vulnerabilities, which have yet to be published, could allow a threat actor to hijack not only Bluetooth earbuds and headphones but also the devices connected to them.

Published on: June 30, 2025 | Source: Dark Reading favicon Dark Reading

Arrest, seizures in latest U.S. operation against North Korean IT workers

The coordinated steps included searches spanning 16 states involving workers who obtained employment at more than 100 U.S. companies. The post Arrest, seizures in latest U.S. operation against North Korean IT workers appeared first on CyberScoop.

Published on: June 30, 2025 | Source: CyberScoop favicon CyberScoop

Senator Chides FBI for Weak Advice on Mobile Security

Agents with the Federal Bureau of Investigation (FBI) briefed Capitol Hill staff recently on hardening the security of their mobile devices, after a contacts list stolen from the personal phone of the White House Chief of Staff Susie Wiles was reportedly used to fuel a series of text messages and phone calls impersonating her to U.S. lawmakers. But in a letter this week to the FBI, one of the Senate's most tech-savvy...

Published on: June 30, 2025 | Source: Krebs on Security favicon Krebs on Security

U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure

U.S. cybersecurity and intelligence agencies have issued a joint advisory warning of potential cyber-attacks from Iranian state-sponsored or affiliated threat actors. "Over the past several months, there has been increasing activity from hacktivists and Iranian government-affiliated actors, which is expected to escalate due to recent events," the agencies said. "These cyber actors often

Published on: June 30, 2025 | Source: The Hacker News favicon The Hacker News

U.S. Agencies Warn of Rising Iranian Cyber Attacks on Defense, OT Networks, and Critical Infrastructure

U.S. cybersecurity and intelligence agencies have issued a joint advisory warning of potential cyber attacks from Iranian state-sponsored or affiliated threat actors. "Over the past several months, there has been increasing activity from hacktivists and Iranian government-affiliated actors, which is expected to escalate due to recent events," the agencies said. "These cyber actors often

Published on: June 30, 2025 | Source: The Hacker News favicon The Hacker News

Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects

Europol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered 460 million ($540 million) from more than 5,000 victims across the world. The international effort, codenamed Operation Borrelli, was carried out by the Spanish Guardia Civil, along with support from law enforcement authorities from Estonia, France, and the United States. Europol said the

Published on: June 30, 2025 | Source: The Hacker News favicon The Hacker News

Why Cybersecurity Should Come Before AI in Schools

The sooner we integrate cybersecurity basics into school curriculum, the stronger and more resilient our children β€” and their futures β€” will be.

Published on: June 30, 2025 | Source: Dark Reading favicon Dark Reading

Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks

The threat actor known as Blind Eagle has been attributed with high confidence to the use of the Russian bulletproof hosting service Proton66. Trustwave SpiderLabs, in a report published last week, said it was able to make this connection by pivoting from Proton66-linked digital assets, leading to the discovery of an active threat cluster that leverages Visual Basic Script (VBS) files as its

Published on: June 30, 2025 | Source: The Hacker News favicon The Hacker News

Hacker Conversations: Rachel Tobac and the Art of Social Engineering

Rachel Tobac is a cyber social engineer. She is skilled at persuading people to do what she wants, rather than what they know they ought to do. The post Hacker Conversations: Rachel Tobac and the Art of Social Engineering appeared first on SecurityWeek.

Published on: June 30, 2025 | Source: SecurityWeek favicon SecurityWeek

Casie Antalis Named Executive Director of CISA

Casie Antalis is the new executive director of the Cybersecurity and Infrastructure Security Agency after the departure of Bridget Bean. The post Casie Antalis Named Executive Director of CISA appeared first on SecurityWeek.

Published on: June 30, 2025 | Source: SecurityWeek favicon SecurityWeek

How Cybersecurity Fears Affect Confidence in Voting Systems

American democracy runs on trust, and that trust is cracking. Nearly half of Americans, both Democrats and Republicans, question whether elections are conducted fairly. Some voters accept election results only when their side wins. The problem isn’t just political polarizationβ€”it’s a creeping erosion of trust in the machinery of democracy itself. Commentators blame ideological tribalism, misinformation campaigns and...

Published on: June 30, 2025 | Source: Schneier on Security favicon Schneier on Security

Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI InventoriesΒ 

Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain access to resources and sensitive data have been increasing in number and frequency over the last few years. Some recent reports estimate that 83% of attacks involve compromised secrets. According to reports such as the Verizon DBIR, attackers are more commonly using stolen

Published on: June 30, 2025 | Source: The Hacker News favicon The Hacker News

⚑ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more

Ever wonder what happens when attackers don’t break the rulesβ€”they just follow them better than we do? When systems work exactly as they’re built to, but that β€œby design” behavior quietly opens the door to risk? This week brings stories that make you stop and rethink what’s truly under control. It’s not always about a broken firewall or missed patchβ€”it’s about the small choices, default settings

Published on: June 30, 2025 | Source: The Hacker News favicon The Hacker News

Canada Gives Hikvision the Boot on National Security Grounds

Canada has ordered Hikvision to cease all operations in the country and prohibited the purchase and use of Hikvision products within government entities. The post Canada Gives Hikvision the Boot on National Security Grounds appeared first on SecurityWeek.

Published on: June 30, 2025 | Source: SecurityWeek favicon SecurityWeek

Patrick Ware Named Executive Director of US Cyber Command

The NSA’s Patrick Ware has taken up the role of Cybercrom executive director after the departure of Morgan Adamski. The post Patrick Ware Named Executive Director of US Cyber Command appeared first on SecurityWeek.

Published on: June 30, 2025 | Source: SecurityWeek favicon SecurityWeek

Hawaiian Airlines Hacked as Aviation Sector Warned of Scattered Spider Attacks

Scattered Spider is targeting airlines and the recent WestJet hack is believed to be the work of the notorious cybercrime group. The post Hawaiian Airlines Hacked as Aviation Sector Warned of Scattered Spider Attacks appeared first on SecurityWeek.

Published on: June 30, 2025 | Source: SecurityWeek favicon SecurityWeek

Ahold Delhaize Data Breach Impacts 2.2 Million People

The ransomware attack against grocery giant Ahold Delhaize has resulted in the personal information of millions getting stolen. The post Ahold Delhaize Data Breach Impacts 2.2 Million People appeared first on SecurityWeek.

Published on: June 30, 2025 | Source: SecurityWeek favicon SecurityWeek

Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report

A cartel affiliate notified an FBI agent about a hacker who infiltrated cameras and phones to track an FBI official’s meetings, the DOJ inspector general said. The post Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report appeared first on CyberScoop.

Published on: June 28, 2025 | Source: CyberScoop favicon CyberScoop

FBI Warns of Scattered Spider's Expanding Attacks on Airlines Using Social Engineering

The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cybercrime group Scattered Spider broadening its targeting footprint to strike the airline sector. To that end, the agency said it's actively working with aviation and industry partners to combat the activity and help victims. "These actors rely on social engineering techniques, often impersonating

Published on: June 28, 2025 | Source: The Hacker News favicon The Hacker News

GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool

The threat actor behind the GIFTEDCROOK malware has made significant updates to turn the malicious program from a basic browser data stealer to a potent intelligence-gathering tool. "Recent campaigns in June 2025 demonstrate GIFTEDCROOK's enhanced ability to exfiltrate a broad range of sensitive documents from the devices of targeted individuals, including potentially proprietary files and

Published on: June 28, 2025 | Source: The Hacker News favicon The Hacker News

This month in security with Tony Anscombe – June 2025 edition

From Australia's new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity news

Published on: June 28, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns

Facebook, the social network platform owned by Meta, is asking for users to upload pictures from their phones to suggest collages, recaps, and other ideas using artificial intelligence (AI), including those that have not been directly uploaded to the service. According to TechCrunch, which first reported the feature, users are being served a new pop-up message asking for permission to "allow

Published on: June 28, 2025 | Source: The Hacker News favicon The Hacker News