Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec

Picture this: Your team rolls out some new code, thinking everything's fine. But hidden in there is a tiny flaw that explodes into a huge problem once it hits the cloud. Next thing you know, hackers are in, and your company is dealing with a mess that costs millions. Scary, right? In 2025, the average data breach hits businesses with a whopping $4.44 million bill globally. And guess what? A big

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

Webinar Today: Ransomware Defense That Meets Evolving Compliance Mandates

Join this live discussion to learn how organizations can strengthen ransomware defenses while staying ahead of tightening compliance requirements. The post Webinar Today: Ransomware Defense That Meets Evolving Compliance Mandates appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ about 2 months ago β€’ 1 min read

The UK May Be Dropping Its Backdoor Mandate

The US Director of National Intelligence is reporting that the UK government is dropping its backdoor mandate against the Apple iPhone. For now, at least, assuming that Tulsi Gabbard is reporting this accurately.

Schneier on Security favicon Schneier on Security β€’ about 2 months ago β€’ 1 min read

Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them

Every day, businesses, teams, and project managers trust platforms like Trello, Asana, etc., to collaborate and manage tasks. But what happens when that trust is broken? According to a recent report by Statista, the average cost of a data breach worldwide was about $4.88 million. Also, in 2024, the private data of over 15 million Trello user profiles was shared on a popular hacker forum. Yet,

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack

With more than 4 million weekly downloads, the Nx build platform became the first known supply chain breach where hackers weaponized AI assistants for data theft. The post Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ about 2 months ago β€’ 1 min read

Malicious Nx Packages in β€˜s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

The maintainers of the nx build system have alerted users to a supply chain attack that allowed attackers to publish malicious versions of the popular npm package and other auxiliary plugins with data-gathering capabilities. "Malicious versions of the nx package, as well as some supporting plugin packages, were published to npm, containing code that scans the file system, collects credentials,

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

This month in security with Tony Anscombe – August 2025 edition

From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news

WeLiveSecurity favicon WeLiveSecurity β€’ about 2 months ago β€’ 1 min read

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) announced a fresh round of sanctions against two individuals and two entities for their role in the North Korean remote information technology (IT) worker scheme to generate illicit revenue for the regime's weapons of mass destruction and ballistic missile programs. "The North Korean regime continues to target American

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

CrowdStrike to Acquire Onum, Boost Falcon Next-Gen SIEM

The acquisition will bring Onum's real-time data pipeline to CrowdStrike's Falcon Next-Gen SIEM platform to deliver autonomous threat detection capabilities.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Treasury sanctions North Korea IT worker scheme facilitators and front organizations

As the sanctions-evading scheme has grown, so too has the U.S. government’s response. The post Treasury sanctions North Korea IT worker scheme facilitators and front organizations appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ about 2 months ago β€’ 1 min read

Anthropic AI Used to Automate Data Extortion Campaign

The company said the threat actor abused its Claude Code service to "an unprecedented degree," automating reconnaissance, intrusions, and credential harvesting.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

'ZipLine' Phishers Flip Script as Victims Email First

"ZipLine" appears to be a sophisticated and carefully planned campaign that has already affected dozens of small, medium, and large organizations across multiple industry sectors.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Salt Typhoon hacking campaign goes beyond previously disclosed targets, world cyber agencies say

The Chinese government-linked hackers were the subject of an alert from U.S. and international partners. The post Salt Typhoon hacking campaign goes beyond previously disclosed targets, world cyber agencies say appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ about 2 months ago β€’ 1 min read

Nevada's State Agencies Shutter in Wake of Cyberattack

In response to a cyberattack that was first detected on Sunday, the governor shut down in-person services for state offices while restoration efforts are underway.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

China Hijacks Captive Portals to Spy on Asian Diplomats

The Mustang Panda APT is hijacking Google Chrome browsers when they attempt to connect to new networks and redirecting them to phishing sites.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Google: Salesforce Attacks Stemmed From Third-Party App

A group tracked as UNC6395 engaged in "widespread data theft" via compromised OAuth tokens from a third-party app called Salesloft Drift.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks

The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion attacks targeting cloud environments. "Unlike traditional on-premises ransomware, where the threat actor typically deploys malware to encrypt critical files across endpoints within the compromised network and then negotiates for a decryption key,

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

Google previews cyber β€˜disruption unit’ as U.S. government, industry weigh going heavier on offense

There are still impediments to overcome before companies and agencies can get more broadly aggressive in cyberspace, both legal and commercial. The post Google previews cyber β€˜disruption unit’ as U.S. government, industry weigh going heavier on offense appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ about 2 months ago β€’ 1 min read

Someone Created First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model

Cybersecurity company ESET has disclosed that it discovered an artificial intelligence (AI)-powered ransomware variant codenamed PromptLock. Written in Golang, the newly identified strain uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts in real-time. The open-weight language model was released by OpenAI earlier this month. "PromptLock

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

Someone Created the First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model

Cybersecurity company ESET has disclosed that it discovered an artificial intelligence (AI)-powered ransomware variant codenamed PromptLock. Written in Golang, the newly identified strain uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts in real-time. The open-weight language model was released by OpenAI earlier this month. "PromptLock

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

Microsoft details Storm-0501’s focus on ransomware in the cloud

The financially motivated threat group demonstrates deep knowledge of hybrid cloud environments, which allows it to rapidly steal sensitive data, destroy backups and encrypt systems for ransomware. The post Microsoft details Storm-0501’s focus on ransomware in the cloud appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ about 2 months ago β€’ 1 min read

Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign

Google says the hackers systematically exported corporate data, focusing on secrets such as AWS and Snowflake keys. The post Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ about 2 months ago β€’ 1 min read

China-Linked Hackers Hijack Web Traffic to Deliver Backdoor

Google researchers say China-linked UNC6384 combined social engineering, signed malware, and adversary-in-the-middle attacks to evade detection. The post China-Linked Hackers Hijack Web Traffic to Deliver Backdoor appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ about 2 months ago β€’ 1 min read

Storm-0501 Hits Enterprise With 'Cloud-Based Ransomware' Attack

The financially motivated threat group used cloud resources to conduct a complex, ransomware-style attack against an enterprise victim.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors

Anthropic on Wednesday revealed that it disrupted a sophisticated operation that weaponized its artificial intelligence (AI)-powered chatbot Claude to conduct large-scale theft and extortion of personal data in July 2025. "The actor targeted at least 17 distinct organizations, including in healthcare, the emergency services, and government, and religious institutions," the company said. "

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

ShadowSilk Hits 35 Organizations in Central Asia and APAC Using Telegram Bots

A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government entities within Central Asia and Asia-Pacific (APAC). According to Group-IB, nearly three dozen victims have been identified, with the intrusions mainly geared towards data exfiltration. The hacking group shares toolset and infrastructural overlaps with campaigns undertaken by threat

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

AI-Powered Ransomware Has Arrived With 'PromptLock'

Researchers raise the alarm that a new, rapidly evolving ransomware strain uses an OpenAI model to render and execute malicious code in real time, ushering in a new era of cyberattacks against enterprises.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Gaps in California Privacy Law: Half of Data Brokers Ignore Requests

Failure to comply with consumer data access and deletion requests highlights the urgent need for standardized verification processes and stronger enforcement mechanisms to protect consumer privacy.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Nevada State Offices Closed Following Disruptive Cyberattack

State websites and phone lines were taken offline, but officials say emergency services and personal data remain unaffected. The post Nevada State Offices Closed Following Disruptive Cyberattack appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ about 2 months ago β€’ 1 min read

The 5 Golden Rules of Safe AI Adoption

Employees are experimenting with AI at record speed. They are drafting emails, analyzing data, and transforming the workplace. The problem is not the pace of AI adoption, but the lack of control and safeguards in place. For CISOs and security leaders like you, the challenge is clear: you don’t want to slow AI adoption down, but you must make it safe. A policy sent company-wide will not cut it.

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

We Are Still Unable to Secure LLMs from Malicious Inputs

Nice indirect prompt injection attack: Bargury’s attack starts with a poisoned document, which is shared to a potential victim’s Google Drive. (Bargury says a victim could have also uploaded a compromised file to their own account.) It looks like an official document on company meeting policies. But inside the document, Bargury hid a 300-word malicious prompt that contains instructions for ChatGPT. The prompt is...

Schneier on Security favicon Schneier on Security β€’ about 2 months ago β€’ 1 min read

Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data

A widespread data theft campaign has allowed hackers to breach sales automation platform Salesloft to steal OAuth and refresh tokens associated with the Drift artificial intelligence (AI) chat agent. The activity, assessed to be opportunistic in nature, has been attributed to a threat actor tracked by Google Threat Intelligence Group (GTIG) and Mandiant, tracked as UNC6395. GTIG told The Hacker

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra

Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind Eagle between May 2024 and July 2025. These attacks, observed by Recorded Future Insikt Group, targeted various victims, but primarily within the Colombian government across local, municipal, and federal levels. The threat intelligence firm is tracking the activity under

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

Don’t let β€œback to school” become β€œback to (cyber)bullying”

Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back

WeLiveSecurity favicon WeLiveSecurity β€’ about 2 months ago β€’ 1 min read

African Law Enforcement Agencies Nab Cybercrime Syndicates

African nations work with Interpol and private-sector partners to disrupt cybercriminal operations on the continent, but more work needs to be done.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read