Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

First known AI-powered ransomware uncovered by ESET Research

The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats

WeLiveSecurity favicon WeLiveSecurity β€’ about 2 months ago β€’ 1 min read

Citrix NetScaler customers hit by third actively exploited zero-day vulnerability since June

The vendor, which has been widely targeted, said the memory-overflow vulnerability can result in remote-code execution or denial of service. The post Citrix NetScaler customers hit by third actively exploited zero-day vulnerability since June appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ about 2 months ago β€’ 1 min read

When One Hospital Gets Ransomware, Others Feel the Pain

Without key security defenses, including backup recovery and multifactor authentication implementation, all parties, including neighboring hospitals and patients, suffer.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

AI Agents in Browsers Light on Cybersecurity, Bypass Controls

Companies looking to benefit from agentic browsers pause: The services can tap into a user's online accounts and automate tasks but also expose organizational data and systems to myriad threats.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Hundreds of Salesforce customers impacted by attack spree linked to third-party AI agent

A threat group Google tracks as UNC6395 systematically stole large amounts of data from Salesforce customer instances by using OAuth tokens stolen from Salesloft Drift, researchers said. The post Hundreds of Salesforce customers impacted by attack spree linked to third-party AI agent appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ about 2 months ago β€’ 1 min read

Researchers flag code that uses AI systems to carry out ransomware attacks

The malware, called PromptLock, essentially functions as a hard-coded prompt injection attack on a large language model, inspecting local filesystems, exfiltrating files and encrypting data. The post Researchers flag code that uses AI systems to carry out ransomware attacks appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ about 2 months ago β€’ 1 min read

1M Farmers Insurance Customers' Data Compromised

Though the company is informing its customers of the breach, Farmers isn't publicly divulging what kinds of personal data were affected.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Philippines Power Election Security With Zero-Knowledge Proofs

While 34 countries worldwide already use some form of e-voting, the Philippines can serve as a model for what a secure online voting operation looks like.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Citrix Gear Under Active Attack Again With Another Zero-Day

The flaw is one of three that the company disclosed affecting its NetScaler ADC and NetScaler Gateway technologies.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Malicious Scanning Waves Slam Remote Desktop Services

Researchers say the huge spike of coordinated scanning for Microsoft RDP services could indicate the existence of a new, as-yet-undisclosed vulnerability.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Data I/O Becomes Latest Ransomware Attack Victim

The "incident" led to outages affecting a variety of the tech company's operations, though the full scope of the breach is unknown.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Court ruling in Epic-Google fight could have β€˜catastrophic’ cyber consequences, former gov’t officials say

The group of experts sided with Google against the makers of Fortnite in the long-running antitrust battle. The post Court ruling in Epic-Google fight could have β€˜catastrophic’ cyber consequences, former gov’t officials say appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ about 2 months ago β€’ 1 min read

Hook Android Trojan Now Delivers Ransomware-Style Attacks

New features to take over smartphones and monitor user activity demonstrate the continued evolution of the malware, which is now being spread on GitHub.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775

Citrix has released fixes to address three security flaws in NetScaler ADC and NetScaler Gateway, including one that it said has been actively exploited in the wild. The vulnerabilities in question are listed below - CVE-2025-7775 (CVSS score: 9.2) - Memory overflow vulnerability leading to Remote Code Execution and/or Denial-of-Service CVE-2025-7776 (CVSS score: 8.8) - Memory overflow

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station

A team of academics has devised a novel attack that can be used to downgrade a 5G connection to a lower generation without relying on a rogue base station (gNB). The attack, per the ASSET (Automated Systems SEcuriTy) Research Group at the Singapore University of Technology and Design (SUTD), relies on a new open-source software toolkit named Sni5Gect (short for "Sniffing 5G Inject") that's

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

Beyond the Prompt: Building Trustworthy Agent Systems

Building secure AI agent systems requires a disciplined engineering approach focused on deliberate architecture and human oversight. The post Beyond the Prompt: Building Trustworthy Agent Systems appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ about 2 months ago β€’ 1 min read

DSLRoot, Proxies, and the Threat of β€˜Legal Botnets’

The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they'd made with company called DSLRoot, which was paying $250 a month to plug a pair of laptops into the Redditor's high-speed Internet connection in the United States. This post examines the history and provenance of DSLRoot, one...

Krebs on Security favicon Krebs on Security β€’ about 2 months ago β€’ 1 min read

The Hidden Risk of Consumer Devices in the Hybrid Workforce

Until businesses begin to account for uncontrolled variables in their threat models, attackers will continue to exploit the weakest link in the chain.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers

Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that's targeting supply chain-critical manufacturing companies with an in-memory malware dubbed MixShell. The activity has been codenamed ZipLine by Check Point Research. "Instead of sending unsolicited phishing emails, attackers initiate contact through a company's public 'Contact Us' form, tricking

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

Docker Desktop Vulnerability Leads to Host Compromise

A critical vulnerability in Docker Desktop allows attackers to modify the filesystem of Windows hosts to become administrators. The post Docker Desktop Vulnerability Leads to Host Compromise appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ about 2 months ago β€’ 1 min read

Encryption Backdoor in Military/Police Radios

I wrote about this in 2023. Here’s the story: Three Dutch security analysts discovered the vulnerabilitiesβ€”five in totalβ€”in a European radio standard called TETRA (Terrestrial Trunked Radio), which is used in radios made by Motorola, Damm, Hytera, and others. The standard has been used in radios since the ’90s, but the flaws remained unknown because encryption algorithms used in TETRA were kept secret until now. There’...

Schneier on Security favicon Schneier on Security β€’ about 2 months ago β€’ 1 min read

ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to fake CAPTCHA verification pages that employ the ClickFix social engineering tactic to deliver information stealers, ransomware, and cryptocurrency miners. The large-scale cybercrime campaign, first detected in August 2025, has been codenamed ShadowCaptcha by the Israel National

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

AI Systems Vulnerable to Prompt Injection via Image Scaling Attack

Researchers show how popular AI systems can be tricked into processing malicious instructions by hiding them in images. The post AI Systems Vulnerable to Prompt Injection via Image Scaling Attack appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ about 2 months ago β€’ 1 min read

Hundreds of Thousands Affected by Auchan Data Breach

Auchan confirms that the personal information of hundreds of thousands of customers was stolen in a data breach. The post Hundreds of Thousands Affected by Auchan Data Breach appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ about 2 months ago β€’ 1 min read

HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay screens to display extortion messages. "A prominent characteristic of the latest variant is its capacity to deploy a full-screen ransomware overlay, which aims to coerce the victim into remitting a ransom payment," Zimperium zLabs researcher Vishnu Pratapagiri

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

Organizations Warned of Exploited Git Vulnerability

CISA urges federal agencies to immediately patch an exploited arbitrary file write vulnerability in Git that leads to remote code execution. The post Organizations Warned of Exploited Git Vulnerability appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ about 2 months ago β€’ 1 min read

FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands

Tech giants have received a letter from the FTC urging them not to weaken security and privacy at the request of foreign governments. The post FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ about 2 months ago β€’ 1 min read

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Google has announced plans to begin verifying the identity of all developers who distribute apps on Android, even for those who distribute their software outside the Play Store. "Android will require all apps to be registered by verified developers in order to be installed by users on certified Android devices," the company said. "This creates crucial accountability, making it much harder for

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws impacting Citrix Session Recording and Git to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2024-8068 (CVSS score: 5.1) - An improper privilege management vulnerability in Citrix Session Recording

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

Hackers Lay in Wait, Then Knocked Out Iran Ship Comms

Lab-Dookhtegen claims major attack on more than 60 cargo ships and oil tankers belonging to two Iranian companies on US sanctions list.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

FTC Chair Tells Tech Giants to Hold the Line on Encryption

The chairman sent letters out to companies like Apple, Meta, and Microsoft, advising them not to adhere to the demands of foreign governments to weaken their encryption.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

ClickFix Attack Tricks AI Summaries Into Pushing Malware

Because instructions appear to come from AI-generated content summaries and not an external source, the victim is more likely to follow them without suspicion.

Dark Reading favicon Dark Reading β€’ about 2 months ago β€’ 1 min read

FCC removes 1,200 voice providers from telephone networks in major robocall crackdown

Attorneys general across the country are also taking action in a program dubbed β€œOperation Robocall Roundup.” The post FCC removes 1,200 voice providers from telephone networks in major robocall crackdown appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ about 2 months ago β€’ 1 min read

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the globe to advance Beijing's strategic interests. "This multi-stage attack chain leverages advanced social engineering including valid code signing certificates, an adversary-in-the-middle (AitM) attack, and indirect execution techniques to evade

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read

Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3

Docker has released fixes to address a critical security flaw affecting the Docker Desktop app for Windows and macOS that could potentially allow an attacker to break out of the confines of a container. The vulnerability, tracked as CVE-2025-9074, carries a CVSS score of 9.3 out of 10.0. It has been addressed in version 4.44.3. "A malicious container running on Docker Desktop could access the

The Hacker News favicon The Hacker News β€’ about 2 months ago β€’ 1 min read