Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Fake Docusign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack

Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting users into executing malicious PowerShell scripts on their machines and infect them with the NetSupport RAT malware. The DomainTools Investigations (DTI) team said it identified "malicious multi-stage downloader Powershell scripts" hosted on lure websites that masquerade as Gitcode and Docusign. "

Published on: June 03, 2025 | Source: The Hacker News favicon The Hacker News

Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack

Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting users into executing malicious PowerShell scripts on their machines and infect them with the NetSupport RAT malware. The DomainTools Investigations (DTI) team said it identified "malicious multi-stage downloader Powershell scripts" hosted on lure websites that masquerade as Gitcode and DocuSign. "

Published on: June 03, 2025 | Source: The Hacker News favicon The Hacker News

Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones

Mikko Hypponen has joined the Finnish anti-drone company Sensofusion as Chief Research Officer after three decades of fighting malware. The post Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones appeared first on SecurityWeek.

Published on: June 03, 2025 | Source: SecurityWeek favicon SecurityWeek

Why Scamming Canโ€™t Be Stoppedโ€”But It Can Be Managed

With crime-as-a-service lowering the barrier to entry and prosecution lagging behind, enterprise security teams must rethink their strategies to detect and disrupt scams at scale. The post Why Scamming Canโ€™t Be Stoppedโ€”But It Can Be Managed appeared first on SecurityWeek.

Published on: June 03, 2025 | Source: SecurityWeek favicon SecurityWeek

Is Your CISO Navigating Your Flight Path?

If your CISO isn't wielding influence with the CEO and helping top leaders clearly see the flight path ahead, your company is dangerously exposed.

Published on: June 03, 2025 | Source: Dark Reading favicon Dark Reading

Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code

Cybersecurity researchers have disclosed details of a critical security flaw in the Roundcube webmail software that has gone unnoticed for a decade and could be exploited to take over susceptible systems and execute arbitrary code. The vulnerability, tracked as CVE-2025-49113, carries a CVSS score of 9.9 out of 10.0. It has been described as a case of post-authenticated remote code execution via

Published on: June 03, 2025 | Source: The Hacker News favicon The Hacker News

MainStreet Bank Data Breach Impacts Customer Payment Cardsย 

The incident occurred in March and impacted the personally identifiable information of approximately 4.65% of MainStreet Bancsharesโ€™ customers. The post MainStreet Bank Data Breach Impacts Customer Payment Cards appeared first on SecurityWeek.

Published on: June 03, 2025 | Source: SecurityWeek favicon SecurityWeek

New Linux Vulnerabilities

Theyโ€™re interesting: Tracked as CVE-2025-5054 and CVE-2025-4598, both vulnerabilities are race condition bugs that could enable a local attacker to obtain access to access sensitive information. Tools like Apport and systemd-coredump are designed to handle crash reporting and core dumps in Linux systems. [โ€ฆ] โ€œThis means that if a local attacker manages to induce a crash in a privileged process and quickly replaces it...

Published on: June 03, 2025 | Source: Schneier on Security favicon Schneier on Security

Scattered Spider: Understanding Help Desk Scams and How to Defend Your Organization

In the wake of high-profile attacks on UK retailers Marks & Spencer and Co-op, Scattered Spider has been all over the media, with coverage spilling over into the mainstream news due to the severity of the disruption caused โ€” currently looking like hundreds of millions in lost profits for M&S alone. This coverage is extremely valuable for the cybersecurity community as it raises

Published on: June 03, 2025 | Source: The Hacker News favicon The Hacker News

Top FBI cyber official Cynthia Kaiser exits for Halcyon

The 20-year bureau pro wants to see what itโ€™s like to fight ransomware from the private sector. The post Top FBI cyber official Cynthia Kaiser exits for Halcyon appeared first on CyberScoop.

Published on: June 03, 2025 | Source: CyberScoop favicon CyberScoop

Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets

A growing number of malicious campaigns have leveraged a recently discovered Android banking trojan called Crocodilus to target users in Europe and South America. The malware, according to a new report published by ThreatFabric, has also adopted improved obfuscation techniques to hinder analysis and detection, and includes the ability to create new contacts in the victim's contacts list. "Recent

Published on: June 03, 2025 | Source: The Hacker News favicon The Hacker News

Google Researchers Find New Chrome Zero-Day

Reported by the Google Threat Analysis Group, the vulnerability might have been exploited by commercial spyware. The post Google Researchers Find New Chrome Zero-Day appeared first on SecurityWeek.

Published on: June 03, 2025 | Source: SecurityWeek favicon SecurityWeek

Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names

Microsoft and CrowdStrike are running a project that aims to align threat actor names, and Google and Palo Alto Networks will also contribute. The post Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names appeared first on SecurityWeek.

Published on: June 03, 2025 | Source: SecurityWeek favicon SecurityWeek

Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues

Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing "patterns of concerning behavior observed over the past year." The changes are expected to be introduced in Chrome 139, which is scheduled for public release in early August 2025. The current major version is 137. The update will affect all Transport Layer Security (TLS)

Published on: June 03, 2025 | Source: The Hacker News favicon The Hacker News

Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion

Microsoft and CrowdStrike have announced that they are teaming up to align their individual threat actor taxonomies by publishing a new joint threat actor mapping. "By mapping where our knowledge of these actors align, we will provide security professionals with the ability to connect insights faster and make decisions with greater confidence," Vasu Jakkal, corporate vice president at Microsoft

Published on: June 03, 2025 | Source: The Hacker News favicon The Hacker News

New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch

Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one that it said has come under active exploitation in the wild. The high-severity flaw is being tracked as CVE-2025-5419 (CVSS score: 8.8), and has been flaggedas an out-of-bounds read and write vulnerability in the V8 JavaScript and WebAssembly engine. "Out-of-bounds read and

Published on: June 03, 2025 | Source: The Hacker News favicon The Hacker News

Open-Weight Chinese AI Models Drive Privacy Innovation in LLMs

Edge computing and stricter regulations could usher in a new era of AI privacy.

Published on: June 02, 2025 | Source: Dark Reading favicon Dark Reading

EMR-ISAC Shuts Down: What Happens Now?

This information-sharing hub provided essential information to the emergency services sector on physical and cyber threats. Some say the timing is concerning.

Published on: June 02, 2025 | Source: Dark Reading favicon Dark Reading

Exploitation Risk Grows for Critical Cisco Bug

New details on the Cisco IOS XE vulnerability could help attackers develop a working exploit soon, researchers say.

Published on: June 02, 2025 | Source: Dark Reading favicon Dark Reading

Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed

Luxury brand Cartier disclosed a data breach in which an unauthorized party gained access to its systems and obtained some client information. The post Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed appeared first on SecurityWeek.

Published on: June 02, 2025 | Source: SecurityWeek favicon SecurityWeek

Trickbot, Conti Ransomware Operator Unmasked Amid Huge Ops Leak

An anonymous whistleblower has leaked large amounts of data tied to the alleged operator behind Trickbot and Conti ransomware.

Published on: June 02, 2025 | Source: Dark Reading favicon Dark Reading

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

Cybersecurity researchers have discovered a new cryptojacking campaign that's targeting publicly accessible DevOps web servers such as those associated with Docker, Gitea, and HashiCorp Consul and Nomad to illicitly mine cryptocurrencies. Cloud security firm Wiz, which is tracking the activity under the name JINX-0132, said the attackers are exploiting a wide range of known misconfigurations and

Published on: June 02, 2025 | Source: The Hacker News favicon The Hacker News

Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure

Cryptocurrency mining operation hits exposed Consul dashboards, Docker Engine APIs and Gitea code-hosting instances to push Monero miner. The post Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure appeared first on SecurityWeek.

Published on: June 02, 2025 | Source: SecurityWeek favicon SecurityWeek

Australia Begins New Ransomware Payment Disclosure Rules

The country will require certain organizations to report ransomware payments and communications within 72 hours after they're made or face potential civil penalties.

Published on: June 02, 2025 | Source: Dark Reading favicon Dark Reading

Trump budget proposal would slash more than 1,000 CISA jobs

The fate of the fiscal 2026 budget blueprint, which includes a $495 million reduction for the agency, is uncertain. The post Trump budget proposal would slash more than 1,000 CISA jobs appeared first on CyberScoop.

Published on: June 02, 2025 | Source: CyberScoop favicon CyberScoop

Critical Bugs Could Spark Takeover of Widely Used Fire Safety OT/ICS Platform

The unpatched security vulnerabilities in Consilium Safety's CS5000 Fire Panel could create "serious safety issues" in environments where fire suppression and safety are paramount, according to a CISA advisory.

Published on: June 02, 2025 | Source: Dark Reading favicon Dark Reading

Preinstalled Apps on Ulefone, Krรผger&Matz Phones Let Any App Reset Device, Steal PIN

Three security vulnerabilities have been disclosed in preloaded Android applications on smartphones from Ulefone and Krรผger&Matz that could enable any app installed on the device to perform a factory reset and encrypt an application. A brief description of the three flaws is as follows - CVE-2024-13915 (CVSS score: 6.9) - A pre-installed "com.pri.factorytest" application on Ulefone and

Published on: June 02, 2025 | Source: The Hacker News favicon The Hacker News

Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently

Chipmaker says there are indications from Google Threat Analysis Group that a trio of flaws โ€œmay be under limited, targeted exploitation.โ€ The post Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently appeared first on SecurityWeek.

Published on: June 02, 2025 | Source: SecurityWeek favicon SecurityWeek

Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU

Qualcomm has shipped security updates to address three zero-day vulnerabilities that it said have been exploited in limited, targeted attacks in the wild. The flaws in question, which were responsibly disclosed to the company by the Google Android Security team, are listed below - CVE-2025-21479 and CVE-2025-21480 (CVSS score: 8.6) - Two incorrect authorization vulnerabilities in the Graphics

Published on: June 02, 2025 | Source: The Hacker News favicon The Hacker News

Beyond the Broken Wall: Why the Security Perimeter Is Not Enough

Organizations need to abandon perimeter-based security for data-centric protection strategies in today's distributed IT environments.

Published on: June 02, 2025 | Source: Dark Reading favicon Dark Reading

In the AI Race With China, Don't Forget About Security

The US needs to establish a clear framework to provide reasonable guardrails to protect its interests โ€” the quicker, the better.

Published on: June 02, 2025 | Source: Dark Reading favicon Dark Reading

vBulletin Vulnerability Exploited in the Wild

Exploitation of the vBulletin vulnerability tracked as CVE-2025-48827 and CVE-2025-48828 started shortly after disclosure. The post vBulletin Vulnerability Exploited in the Wild appeared first on SecurityWeek.

Published on: June 02, 2025 | Source: SecurityWeek favicon SecurityWeek

โšก Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

If this had been a security drill, someone wouldโ€™ve said it went too far. But it wasnโ€™t a drillโ€”it was real. The access? Everything looked normal. The tools? Easy to find. The detection? Came too late. This is how attacks happen nowโ€”quiet, convincing, and fast. Defenders arenโ€™t just chasing hackers anymoreโ€”theyโ€™re struggling to trust what their systems are telling them. The problem isnโ€™t too

Published on: June 02, 2025 | Source: The Hacker News favicon The Hacker News

Australia Requires Ransomware Victims to Declare Payments

A new Australian law requires larger companies to declare any ransomware payments they have made.

Published on: June 02, 2025 | Source: Schneier on Security favicon Schneier on Security

Chrome to Distrust Chunghwa Telecom and Netlock Certificates

Patterns of concerning behavior led Google to remove trust in certificates from Chunghwa Telecom and Netlock from Chrome. The post Chrome to Distrust Chunghwa Telecom and Netlock Certificates appeared first on SecurityWeek.

Published on: June 02, 2025 | Source: SecurityWeek favicon SecurityWeek