Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

DHS Warns of Rise in Cyberattacks in Light of US-Iran Conflict

After President's Trump decision to enter the US into the conflict in the Middle East, the Department of Homeland Security expects there to be an uptick in Iranian hacktivists and state-sponsored actors targeting US systems.

Published on: June 23, 2025 | Source: Dark Reading favicon Dark Reading

North Korean Hackers Take Over Victimsโ€™ Systems Using Zoom Meeting

North Korean hackers employ social engineering to trick Zoom Meeting participants into executing system-takeover commands. The post North Korean Hackers Take Over Victimsโ€™ Systems Using Zoom Meeting appeared first on SecurityWeek.

Published on: June 23, 2025 | Source: SecurityWeek favicon SecurityWeek

Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content

Cybersecurity researchers are calling attention to a new jailbreaking method called Echo Chamber that could be leveraged to trick popular large language models (LLMs) into generating undesirable responses, irrespective of the safeguards put in place. "Unlike traditional jailbreaks that rely on adversarial phrasing or character obfuscation, Echo Chamber weaponizes indirect references, semantic

Published on: June 23, 2025 | Source: The Hacker News favicon The Hacker News

The SAVE database was already a headache for states. Now itโ€™s fueling Trumpโ€™s voter fraud allegations.

Experts believe lawsuits are first steps in a larger plan by the White House to create new metrics that lend support to the presidentโ€™s unproven claims that noncitizens are voting en masse for Democratic politicians. The post The SAVE database was already a headache for states. Now itโ€™s fueling Trumpโ€™s voter fraud allegations. appeared first on CyberScoop.

Published on: June 23, 2025 | Source: CyberScoop favicon CyberScoop

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

The United States government has warned of cyber attacks mounted by pro-Iranian groups after it launched airstrikes on Iranian nuclear sites as part of the Iranโ€“Israel war that commenced on June 13, 2025. Stating that the ongoing conflict has created a "heightened threat environment" in the country, the Department of Homeland Security (DHS) said in a bulletin that cyber actors are likely to

Published on: June 23, 2025 | Source: The Hacker News favicon The Hacker News

Attackers Use Docker APIs, Tor Anonymity in Stealthy Crypto Heist

The attack is similar to previous campaigns by an actor called Commando Cat to use misconfigured APIs to compromise containers and deploy cryptocurrency miners.

Published on: June 23, 2025 | Source: Dark Reading favicon Dark Reading

Chinaโ€™s Salt Typhoon Hackers Target Canadian Telecom Firms

Canadaโ€™s Centre for Cyber Security and the FBI warn of Chinese hackers targeting telecommunications and other companies in Canada. The post Chinaโ€™s Salt Typhoon Hackers Target Canadian Telecom Firms appeared first on SecurityWeek.

Published on: June 23, 2025 | Source: SecurityWeek favicon SecurityWeek

A CISO's AI Playbook

In a market where security budgets flatten while threats accelerate, improving analyst throughput is fiscal stewardship.

Published on: June 23, 2025 | Source: Dark Reading favicon Dark Reading

XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks

Cybersecurity researchers have uncovered a Go-based malware called XDigo that has been used in attacks targeting Eastern European governmental entities in March 2025. The attack chains are said to have leveraged a collection of Windows shortcut (LNK) files as part of a multi-stage procedure to deploy the malware, French cybersecurity company HarfangLab said. XDSpy is the name assigned to a cyber

Published on: June 23, 2025 | Source: The Hacker News favicon The Hacker News

Critical Authentication Bypass Flaw Patched in Teleport

A critical-severity vulnerability in Teleport could allow remote attackers to bypass SSH authentication and access managed systems. The post Critical Authentication Bypass Flaw Patched in Teleport appeared first on SecurityWeek.

Published on: June 23, 2025 | Source: SecurityWeek favicon SecurityWeek

743,000 Impacted by McLaren Health Care Data Breach

The personal information of 743,000 individuals was compromised in a 2024 ransomware attack on McLaren Health Care. The post 743,000 Impacted by McLaren Health Care Data Breach appeared first on SecurityWeek.

Published on: June 23, 2025 | Source: SecurityWeek favicon SecurityWeek

How AI-Enabled Workflow Automation Can Help SOCs Reduce Burnout

It sure is a hard time to be a SOC analyst. Every day, they are expected to solve high-consequence problems with half the data and twice the pressure. Analysts are overwhelmedโ€”not just by threats, but by the systems and processes in place that are meant to help them respond. Tooling is fragmented. Workflows are heavy. Context lives in five places, and alerts never slow down. What started as a

Published on: June 23, 2025 | Source: The Hacker News favicon The Hacker News

Largest DDoS Attack to Date

It was a recently unimaginable 7.3 Tbps: The vast majority of the attack was delivered in the form of User Datagram Protocol packets. Legitimate UDP-based transmissions are used in especially time-sensitive communications, such as those for video playback, gaming applications, and DNS lookups. It speeds up communications by not formally establishing a connection before data is transferred. Unlike the more common...

Published on: June 23, 2025 | Source: Schneier on Security favicon Schneier on Security

Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks

Google has revealed the various safety measures that are being incorporated into its generative artificial intelligence (AI) systems to mitigate emerging attack vectors like indirect prompt injections and improve the overall security posture for agentic AI systems. "Unlike direct prompt injections, where an attacker directly inputs malicious commands into a prompt, indirect prompt injections

Published on: June 23, 2025 | Source: The Hacker News favicon The Hacker News

US Braces for Cyberattacks After Bombing Iranian Nuclear Sites

Iranian hackers are expected to intensify cyberattacks against the US after the recent air strikes on Iranโ€™s nuclear sites. The post US Braces for Cyberattacks After Bombing Iranian Nuclear Sites appeared first on SecurityWeek.

Published on: June 23, 2025 | Source: SecurityWeek favicon SecurityWeek

โšก Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More

Not every risk looks like an attack. Some problems start as small glitches, strange logs, or quiet delays that donโ€™t seem urgentโ€”until they are. What if your environment is already being tested, just not in ways you expected? Some of the most dangerous moves are hidden in plain sight. Itโ€™s worth asking: what patterns are we missing, and what signals are we ignoring because they donโ€™t match old

Published on: June 23, 2025 | Source: The Hacker News favicon The Hacker News

Steelmaker Nucor Says Hackers Stole Data in Recent Attack

Nucor has shared an update on the impact of the recent cyberattack and confirmed that some data has been taken from its IT systems. The post Steelmaker Nucor Says Hackers Stole Data in Recent Attack appeared first on SecurityWeek.

Published on: June 23, 2025 | Source: SecurityWeek favicon SecurityWeek

Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages

The April 2025 cyber attacks targeting U.K. retailers Marks & Spencer and Co-op have been classified as a "single combined cyber event." That's according to an assessment from the Cyber Monitoring Centre (CMC), a U.K.-based independent, non-profit body set up by the insurance industry to categorize major cyber events. "Given that one threat actor claimed responsibility for both M&S and

Published on: June 21, 2025 | Source: The Hacker News favicon The Hacker News

Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data

Aflac said that itโ€™s in the early stages of a review of the incident, and so far is unable to determine the total number of affected individuals. The post Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data appeared first on SecurityWeek.

Published on: June 21, 2025 | Source: SecurityWeek favicon SecurityWeek

AWS Enhances Cloud Security With Better Visibility Features

At this week's re:Inforce 2025 conference, the cloud giant introduced new capabilities to several core security products to provide customers with better visibility and more context on potential threats.

Published on: June 21, 2025 | Source: Dark Reading favicon Dark Reading

Friday Squid Blogging: Gonate Squid Video

This is the first ever video of the Antarctic Gonate Squid. As usual, you can also use this squid post to talk about the security stories in the news that I havenโ€™t covered.

Published on: June 20, 2025 | Source: Schneier on Security favicon Schneier on Security

Hackers Post Dozens of Malicious Copycat Repos to GitHub

As package registries find better ways to combat cyberattacks, threat actors are finding other methods for spreading their malware to developers.

Published on: June 20, 2025 | Source: Dark Reading favicon Dark Reading

Financial deepfake scams targeted in bipartisan Senate bill

New legislation seeks the creation of a Treasury-led task force to examine and combat AI-fueled scams that trick Americans out of their money. The post Financial deepfake scams targeted in bipartisan Senate bill appeared first on CyberScoop.

Published on: June 20, 2025 | Source: CyberScoop favicon CyberScoop

Qilin Ransomware Adds "Call Lawyer" Feature to Pressure Victims for Larger Ransoms

The threat actors behind the Qilin ransomware-as-a-service (RaaS) scheme are now offering legal counsel for affiliates to put more pressure on victims to pay up, as the cybercrime group intensifies its activity and tries to fill the void left by its rivals. The new feature takes the form of a "Call Lawyer" feature on the affiliate panel, per Israeli cybersecurity company Cybereason. The

Published on: June 20, 2025 | Source: The Hacker News favicon The Hacker News

Aflac duped by social-engineering attack, marking another hit on insurance industry

Three insurance companies have publicly disclosed cyberattacks in the past week. Scattered Spider, an amorphous band of cybercriminals, has been actively targeting the sector. The post Aflac duped by social-engineering attack, marking another hit on insurance industry appeared first on CyberScoop.

Published on: June 20, 2025 | Source: CyberScoop favicon CyberScoop

Telecom Giant Viasat Is Latest Salt Typhoon Victim

The communications company shared the discoveries of its investigation with government partners, but there is little information they can publicly disclose other than that there seems to be no impact on customers.

Published on: June 20, 2025 | Source: Dark Reading favicon Dark Reading

How Cyber Warfare Changes the Face of Geopolitical Conflict

As geopolitical tensions rise, the use of cyber operations and hacktivists continues to grow, with the current conflict between Israel and Iran showing the new face of cyber-augmented war.

Published on: June 20, 2025 | Source: Dark Reading favicon Dark Reading

How to Lock Down the No-Code Supply Chain Attack Surface

Securing the no-code supply chain isn't just about mitigating risks โ€” it's about enabling the business to innovate with confidence.

Published on: June 20, 2025 | Source: Dark Reading favicon Dark Reading

In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer

Noteworthy stories that might have slipped under the radar: Chinaโ€™s Salt Typhoon targeted Viasat, Washington Post emails compromised in hack, Rowhammer attack named Crowhammer. The post In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer appeared first on SecurityWeek.

Published on: June 20, 2025 | Source: SecurityWeek favicon SecurityWeek

Iran's State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist

Iran's state-owned TV broadcaster was hacked Wednesday night to interrupt regular programming and air videos calling for street protests against the Iranian government, according to multiple reports. It's currently not known who is behind the attack, although Iran pointed fingers at Israel, per Iran International. "If you experience disruptions or irrelevant messages while watching various TV

Published on: June 20, 2025 | Source: The Hacker News favicon The Hacker News

Godfather Android Trojan Creates Sandbox on Infected Devices

The Godfather Android trojan uses on-device virtualization to hijack legitimate applications and steal usersโ€™ funds. The post Godfather Android Trojan Creates Sandbox on Infected Devices appeared first on SecurityWeek.

Published on: June 20, 2025 | Source: SecurityWeek favicon SecurityWeek

Surveillance in the US

Good article from 404 Media on the cozy surveillance relationship between local Oregon police and ICE: In the email thread, crime analysts from several local police departments and the FBI introduced themselves to each other and made lists of surveillance tools and tactics they have access to and felt comfortable using, and in some cases offered to perform surveillance for their colleagues in other departments. The...

Published on: June 20, 2025 | Source: Schneier on Security favicon Schneier on Security

FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks

WhatsApp told SecurityWeek that it linked the exploited FreeType vulnerability CVE-2025-27363 to a Paragon exploit. The post FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks appeared first on SecurityWeek.

Published on: June 20, 2025 | Source: SecurityWeek favicon SecurityWeek

6 Steps to 24/7 In-House SOC Success

Hackers never sleep, so why should enterprise defenses? Threat actors prefer to target businesses during off-hours. Thatโ€™s when they can count on fewer security personnel monitoring systems, delaying response and remediation. When retail giant Marks & Spencer experienced a security event over Easter weekend, they were forced to shut down their online operations, which account for

Published on: June 20, 2025 | Source: The Hacker News favicon The Hacker News

Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider

Cloudflare on Thursday said it autonomously blocked the largest distributed denial-of-service (DDoS) attack ever recorded, which hit a peak of 7.3 terabits per second (Tbps). The attack, which was detected in mid-May 2025, targeted an unnamed hosting provider. "Hosting providers and critical Internet infrastructure have increasingly become targets of DDoS attacks," Cloudflare's Omer Yoachimik

Published on: June 20, 2025 | Source: The Hacker News favicon The Hacker News