Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
Researchers unveil OneFlip, a Rowhammer-based attack that flips a single bit in neural network weights to stealthily backdoor AI systems without degrading performance. The post OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail appeared first on SecurityWeek.
The electronics manufacturer and software vendor serves major automotive suppliers and top tech firms. The post Data I/O reports business disruptions in wake of ransomware attack appeared first on CyberScoop.
Cybersecurity researchers have flagged a new phishing campaign that's using fake voicemails and purchase orders to deliver a malware loader called UpCrypter. The campaign leverages "carefully crafted emails to deliver malicious URLs linked to convincing phishing pages," Fortinet FortiGuard Labs researcher Cara Lin said. "These pages are designed to entice recipients into downloading JavaScript
The Oregon Democrat cited recent news of a major hack and years of βcovering upβ explanations of incidents. The post Blistering Wyden letter seeks review of federal court cybersecurity, citing βincompetence,β βnegligenceβ appeared first on CyberScoop.
Attackers not only steal credentials but also can maintain long-term, persistent access to corporate networks through the global campaign.
As threats intensify and cloud adoption expands, organizations must leave outdated security models behind.
Pakistani state-sponsored hacking group APT36 is targeting Linux systems in a fresh campaign aimed at Indian government entities. The post Pakistani Hackers Back at Targeting Indian Government Entities appeared first on SecurityWeek.
Aspire Rural Health System was targeted last year by the BianLian ransomware group, which claimed to have stolen sensitive data. The post Aspire Rural Health System Data Breach Impacts Nearly 140,000 appeared first on SecurityWeek.
Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage, or shift who holds the upper hand. For leaders, this means defense isnβt just a matter of firewalls and patchesβitβs about strategy. The strongest organizations arenβt the ones with the most tools, but the ones that see how cyber risks connect to business
Data I/O has disclosed a ransomware attack that disrupted the companyβs operations, including communications, shipping and production. The post Chip Programming Firm Data I/O Hit by Ransomware appeared first on SecurityWeek.
Security Information and Event Management (SIEM) systems act as the primary tools for detecting suspicious activity in enterprise networks, helping organizations identify and respond to potential attacks in real time. However, the new Picus Blue Report 2025, based on over 160 million real-world attack simulations, revealed that organizations are only detecting 1 out of 7 simulated attacks,
The Anatsa Android banking trojan has expanded its target list to new countries and more cryptocurrency applications. The post Anatsa Android Banking Trojan Now Targeting 830 Financial Apps appeared first on SecurityWeek.
Look at this: McDonaldβs chose the password β123456β for a major corporate system.
Netskope has an annual recurring revenue of more than $707 million, but itβs still not profitable, reporting a net loss of $170 million in H1. The post SASE Company Netskope Files for IPO appeared first on SecurityWeek.
The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS (Bharat Operating System Solutions) Linux systems with malicious Desktop shortcut files in attacks targeting Indian Government entities. "Initial access is achieved through spear-phishing emails," CYFIRMA said. "Linux BOSS environments are targeted via weaponized .desktop
Farmers New World Life Insurance and Farmers Group have filed separate data breach notifications with state authorities. The post Farmers Insurance Data Breach Impacts Over 1 Million People appeared first on SecurityWeek.
Cybersecurity researchers have discovered a malicious Go module that presents itself as a brute-force tool for SSH but actually contains functionality to discreetly exfiltrate credentials to its creator. "On the first successful login, the package sends the target IP address, username, and password to a hard-coded Telegram bot controlled by the threat actor," Socket researcher Kirill Boychenko
Cybersecurity researchers are calling attention to multiple campaigns that are taking advantage of known security vulnerabilities and exposed Redis servers to various malicious activities, including leveraging the compromised devices as IoT botnets, residential proxies, or cryptocurrency mining infrastructure. The first set of attacks entails the exploitation of CVE-2024-36401 (CVSS score: 9.8),
Nice short article on the bobtail squid. As usual, you can also use this squid post to talk about the security stories in the news that I havenβt covered. Blog moderation policy.
A Chinese APT is going where most APTs don't: deep into the cloud, compromising supply chains and deploying uncommon malware.
A bug in the control board that connects peripheral devices in commonly used Dell laptops allowed malicious access all the way down to the firmware running on the device chip, new research finds.
Music tastes, location information, even encrypted messages β Apple's servers are gathering a "surprising" amount of personal data through Apple Intelligence, Lumia Security's Yoav Magid warns in his new analysis.
This academic year, I am taking a sabbatical from the Kennedy School and Harvard University. (Itβs not a real sabbaticalβIβm just an adjunctβbut itβs the same idea.) I will be spending the Fall 2025 and Spring 2026 semesters at the Munk School at the University of Toronto. I will be organizing a reading group on AI security in the fall. I will be teaching my cybersecurity policy class in the Spring. I will be working...
The operation disrupted countless scams, and authorities seized a significant amount of evidence and recovered nearly $100 million in lost funds.
Operation Serengeti 2.0 dismantled almost 11,500 malicious infrastructures between June and August. Officials arrested more than 1,200 alleged cybercriminals. The post Interpol-led crackdown disrupts cybercrime networks in Africa that caused $485 million in losses appeared first on CyberScoop.
Dubbed Operation Serengeti 2.0, the operation took place between June and August. The post Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects appeared first on SecurityWeek.
Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called VShell. The "Linux-specific malware infection chain that starts with a spam email with a malicious RAR archive file," Trellix researcher Sagar Bade said in a technical write-up. "The payload isn't hidden inside the file content or a macro, it's encoded directly
CVE-2025-43300 is the latest zero-day bug used in cyberattacks against "targeted individuals," which could signify spyware or nation-state hacking.
The growing ecosystem of agents, chatbots, and machine credentials that outnumber human users by an order of magnitude is creating a poorly understood but potentially major security issue.
Noteworthy stories that might have slipped under the radar: cryptojacker sentenced to prison, ECC.fail Rowhammer attack, and Microsoft limits Chinaβs access to MAPP. The post In Other News: McDonaldβs Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M appeared first on SecurityWeek.
Silk Typhoon was seen exploiting n-day and zero-day vulnerabilities for initial access to victim systems. The post Chinese Silk Typhoon Hackers Targeting Multiple Industries in North America appeared first on SecurityWeek.
Some insurers look to limit payouts to companies that don't remediate serious vulnerabilities in a timely manner. Unsurprisingly, most companies don't like those restrictions.
AI-assisted security reviews from Anthropic and others could help level up enterprise application security in the era of vibe coding.
While the furor from CISO prosecutions has died down, worries continue over a lack of liability protections and potential targeting by cybercriminals and hackers for their privileged roles.
While the furor from CISO prosecutions has died down, worries continue over a lack of liability protections and potential targeting by cybercriminals and hackers for their privileged roles.