Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
SBOM adoption will drive software supply chain security, decreasing risks and costs, and improving transparency. The post US, Allies Push for SBOMs to Bolster Cybersecurity appeared first on SecurityWeek.
Cybersecurity researchers have flagged a new technique that cybercriminals have adopted to bypass social media platform X's malvertising protections and propagate malicious links using its artificial intelligence (AI) assistant Grok. The findings were highlighted by Nati Tal, head of Guardio Labs, in a series of posts on X. The technique has been codenamed Grokking. The approach is designed to
Story teaser text: Cybersecurity leaders face mounting pressure to stop attacks before they start, and the best defense may come down to the settings you choose on day one. In this piece, Yuriy Tsibere explores how default policies like deny-by-default, MFA enforcement, and application Ringfencing can eliminate entire categories of risk. From disabling Office macros to blocking outbound server
The French data protection authority has fined Google and Chinese e-commerce giant Shein $379 million (325 million) and $175 million (150 million), respectively, for violating cookie rules. Both companies set advertising cookies on users' browsers without securing their consent, the National Commission on Informatics and Liberty (CNIL) said. Shein has since updated its systems to comply with
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting TP-Link wireless routers to its Known Exploited Vulnerabilities (KEV) catalog, noting that there is evidence of them being exploited in the wild. The vulnerabilities in question are listed below - CVE-2023-50224 (CVSS score: 6.5) - An authentication bypass by spoofing vulnerability
Wytecβs website was defaced twice by unknown threat actors more than a week ago and it has yet to be brought back online. The post Wytec Expects Significant Financial Loss Following Website Hack appeared first on SecurityWeek.
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
Google has observed ViewState deserialization attacks leveraging a sample machine key exposed in older deployment guides. The post Hackers Exploit Sitecore Zero-Day for Malware Delivery appeared first on SecurityWeek.
Elevation of privilege flaws in Android Runtime (CVE-2025-48543) and Linux kernel (CVE-2025-38352) have been exploited in targeted attacks. The post Two Exploited Vulnerabilities Patched in Android appeared first on SecurityWeek.
The Homeland Justice APT tried spying on countries and organizations from six continents, using more than 100 hijacked email accounts.
Co-founded by former MITRE experts, the startup will use the funding to accelerate product innovation and fuel company growth. The post Tidal Cyber Raises $10 Million for CTI and Adversary Behavior Platform appeared first on SecurityWeek.
With the continued success of North Korea's IT worker scams, Asia-Pacific nations are working with private firms to blunt the scheme's effectiveness.
This Tech Tip outlines how organizations can make the shift with minimal disruption.
An antipiracy coalition of entertainment companies applauded the takedown. The networkβs two operators were arrested at their residences in Egypt. The post Streameast, worldβs largest pirated live sports network, shut down by Egyptian authorities appeared first on CyberScoop.
The notorious Russian state-sponsored hacking unit, also known as Fancy Bear, is abusing Microsoft Outlook for covert data exfiltration.
It's the equivalent of watching more than 9,350 full-length HD movies or streaming 7,480 hours of high-def video nonstop in less than a minute.
Cato's move comes as the company also extended its Series G funding round with an additional $50 million from Acrew Capital. The post Cato Networks acquires AI security startup Aim Security appeared first on CyberScoop.
Cybersecurity researchers have discovered two new malicious packages on the npm registry that make use of smart contracts for the Ethereum blockchain to carry out malicious actions on compromised systems, signaling the trend of threat actors constantly on the lookout for new ways to distribute malware and fly under the radar. "The two npm packages abused smart contracts to conceal malicious
Produced with other world cyber agencies, the document is a βshared visionβ of SBOMs, or software bill of materials. The post CISA guide seeks a unified approach to software βingredients listsβ appeared first on CyberScoop.
The Homeland Security Committee also voted out bills addressing pipeline cybersecurity and terroristsβ use of AI. The post House panel approves cyber information sharing, grant legislation as expiration deadlines loom appeared first on CyberScoop.
Apitor collected data without informing parents or asking for permission, the FTC said, violating federal parental consent requirements. The post FTC announces settlement with toy robot makers that tracked location of children appeared first on CyberScoop.
The critical, actively exploited zero-day vulnerabilities affect the Linux kernel and Android runtime. The post Google patches two Android zero-days, 120 defects total in September security update appeared first on CyberScoop.
In a 2-1 decision, an appeals court upheld a 1935 Supreme Court precedent restricting the presidentβs ability to fire FTC commissioners. The post Court rules βfiredβ FTC commissioners be reinstated β again appeared first on CyberScoop.
Chrome's latest release addresses a high-severity use-after-free vulnerability in the V8 JavaScript engine that could be exploited for remote code execution. The post Google Patches High-Severity Chrome Vulnerability in Latest Update appeared first on SecurityWeek.
While trawling Internet scan data for signs of compromised infrastructure, researchers found that asset owners may not know for years their devices had been hacked.
Founded in 2022 to help organizations with the secure deployment of generative-AI utilities, Aim emerged from stealth in January 2024. The post Cato Networks Acquires AI Security Firm Aim Security appeared first on SecurityWeek.
A "sophisticated" attack that also exploits an Apple zero-day flaw is targeting a specific group of iPhone users, potentially with spyware.
Threat actors are attempting to leverage a newly released artificial intelligence (AI) offensive security tool called HexStrike AI to exploit recently disclosed security flaws. HexStrike AI, according to its website, is pitched as an AIβdriven security platform to automate reconnaissance and vulnerability discovery with an aim to accelerate authorized red teaming operations, bug bounty hunting,
Varonis plans to integrate SlashNext's advanced phishing, BEC, and social engineering attack protection capabilities into its data security platform.
Known for her seminal book, A Hacker Manifesto, Wark reframes hacking as a cultural force rooted in play, creativity, and human nature. The post Hacker Conversations: McKenzie Wark, Author of A Hacker Manifesto appeared first on SecurityWeek.
In January 2025, cybersecurity experts at Wiz Research found that Chinese AI specialist DeepSeek had suffered a data leak, putting more than 1 million sensitive log streams at risk. According to the Wiz Research team, they identified a publicly accessible ClickHouse database belonging to DeepSeek. This allowed βfull control over database operations, including the ability to access
Attack disrupted email, phones, and websites for weeks, but officials say no ransom was paid. The post Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage appeared first on SecurityWeek.
Google has shipped security updates to address 120 security flaws in its Android operating system as part of its monthly fixes for September 2025, including two issues that it said have been exploited in targeted attacks. The vulnerabilities are listed below - CVE-2025-38352 (CVSS score: 7.4) - A privilege escalation flaw in the Linux Kernel component CVE-2025-48543 (CVSS score: N/A) - A
Really good research on practical attacks against LLM agents. βInvitation Is All You Need! Promptware Attacks Against LLM-Powered Assistants in Production Are Practical and Dangerousβ Abstract: The growing integration of LLMs into applications has introduced new security risks, notably known as Promptwareβmaliciously engineered prompts designed to manipulate LLMs to compromise the CIA triad of these applications. While...
An Iran-nexus group has been linked to a "coordinated" and "multi-wave" spear-phishing campaign targeting the embassies and consulates in Europe and other regions across the world. The activity has been attributed by Israeli cybersecurity company Dream to Iranian-aligned operators connected to broader offensive cyber activity undertaken by a group known as Homeland Justice. "Emails were sent to