Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting users into executing malicious PowerShell scripts on their machines and infect them with the NetSupport RAT malware. The DomainTools Investigations (DTI) team said it identified "malicious multi-stage downloader Powershell scripts" hosted on lure websites that masquerade as Gitcode and Docusign. "
Published on: June 03, 2025 | Source:Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting users into executing malicious PowerShell scripts on their machines and infect them with the NetSupport RAT malware. The DomainTools Investigations (DTI) team said it identified "malicious multi-stage downloader Powershell scripts" hosted on lure websites that masquerade as Gitcode and DocuSign. "
Published on: June 03, 2025 | Source:Mikko Hypponen has joined the Finnish anti-drone company Sensofusion as Chief Research Officer after three decades of fighting malware. The post Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones appeared first on SecurityWeek.
Published on: June 03, 2025 | Source:With crime-as-a-service lowering the barrier to entry and prosecution lagging behind, enterprise security teams must rethink their strategies to detect and disrupt scams at scale. The post Why Scamming Canโt Be StoppedโBut It Can Be Managed appeared first on SecurityWeek.
Published on: June 03, 2025 | Source:If your CISO isn't wielding influence with the CEO and helping top leaders clearly see the flight path ahead, your company is dangerously exposed.
Published on: June 03, 2025 | Source:Cybersecurity researchers have disclosed details of a critical security flaw in the Roundcube webmail software that has gone unnoticed for a decade and could be exploited to take over susceptible systems and execute arbitrary code. The vulnerability, tracked as CVE-2025-49113, carries a CVSS score of 9.9 out of 10.0. It has been described as a case of post-authenticated remote code execution via
Published on: June 03, 2025 | Source:The incident occurred in March and impacted the personally identifiable information of approximately 4.65% of MainStreet Bancsharesโ customers. The post MainStreet Bank Data Breach Impacts Customer Payment Cards appeared first on SecurityWeek.
Published on: June 03, 2025 | Source:Theyโre interesting: Tracked as CVE-2025-5054 and CVE-2025-4598, both vulnerabilities are race condition bugs that could enable a local attacker to obtain access to access sensitive information. Tools like Apport and systemd-coredump are designed to handle crash reporting and core dumps in Linux systems. [โฆ] โThis means that if a local attacker manages to induce a crash in a privileged process and quickly replaces it...
Published on: June 03, 2025 | Source:In the wake of high-profile attacks on UK retailers Marks & Spencer and Co-op, Scattered Spider has been all over the media, with coverage spilling over into the mainstream news due to the severity of the disruption caused โ currently looking like hundreds of millions in lost profits for M&S alone. This coverage is extremely valuable for the cybersecurity community as it raises
Published on: June 03, 2025 | Source:The 20-year bureau pro wants to see what itโs like to fight ransomware from the private sector. The post Top FBI cyber official Cynthia Kaiser exits for Halcyon appeared first on CyberScoop.
Published on: June 03, 2025 | Source:A growing number of malicious campaigns have leveraged a recently discovered Android banking trojan called Crocodilus to target users in Europe and South America. The malware, according to a new report published by ThreatFabric, has also adopted improved obfuscation techniques to hinder analysis and detection, and includes the ability to create new contacts in the victim's contacts list. "Recent
Published on: June 03, 2025 | Source:Reported by the Google Threat Analysis Group, the vulnerability might have been exploited by commercial spyware. The post Google Researchers Find New Chrome Zero-Day appeared first on SecurityWeek.
Published on: June 03, 2025 | Source:Microsoft and CrowdStrike are running a project that aims to align threat actor names, and Google and Palo Alto Networks will also contribute. The post Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names appeared first on SecurityWeek.
Published on: June 03, 2025 | Source:Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing "patterns of concerning behavior observed over the past year." The changes are expected to be introduced in Chrome 139, which is scheduled for public release in early August 2025. The current major version is 137. The update will affect all Transport Layer Security (TLS)
Published on: June 03, 2025 | Source:Microsoft and CrowdStrike have announced that they are teaming up to align their individual threat actor taxonomies by publishing a new joint threat actor mapping. "By mapping where our knowledge of these actors align, we will provide security professionals with the ability to connect insights faster and make decisions with greater confidence," Vasu Jakkal, corporate vice president at Microsoft
Published on: June 03, 2025 | Source:Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one that it said has come under active exploitation in the wild. The high-severity flaw is being tracked as CVE-2025-5419 (CVSS score: 8.8), and has been flaggedas an out-of-bounds read and write vulnerability in the V8 JavaScript and WebAssembly engine. "Out-of-bounds read and
Published on: June 03, 2025 | Source:Edge computing and stricter regulations could usher in a new era of AI privacy.
Published on: June 02, 2025 | Source:This information-sharing hub provided essential information to the emergency services sector on physical and cyber threats. Some say the timing is concerning.
Published on: June 02, 2025 | Source:New details on the Cisco IOS XE vulnerability could help attackers develop a working exploit soon, researchers say.
Published on: June 02, 2025 | Source:Luxury brand Cartier disclosed a data breach in which an unauthorized party gained access to its systems and obtained some client information. The post Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed appeared first on SecurityWeek.
Published on: June 02, 2025 | Source:An anonymous whistleblower has leaked large amounts of data tied to the alleged operator behind Trickbot and Conti ransomware.
Published on: June 02, 2025 | Source:Cybersecurity researchers have discovered a new cryptojacking campaign that's targeting publicly accessible DevOps web servers such as those associated with Docker, Gitea, and HashiCorp Consul and Nomad to illicitly mine cryptocurrencies. Cloud security firm Wiz, which is tracking the activity under the name JINX-0132, said the attackers are exploiting a wide range of known misconfigurations and
Published on: June 02, 2025 | Source:Cryptocurrency mining operation hits exposed Consul dashboards, Docker Engine APIs and Gitea code-hosting instances to push Monero miner. The post Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure appeared first on SecurityWeek.
Published on: June 02, 2025 | Source:The country will require certain organizations to report ransomware payments and communications within 72 hours after they're made or face potential civil penalties.
Published on: June 02, 2025 | Source:The fate of the fiscal 2026 budget blueprint, which includes a $495 million reduction for the agency, is uncertain. The post Trump budget proposal would slash more than 1,000 CISA jobs appeared first on CyberScoop.
Published on: June 02, 2025 | Source:The unpatched security vulnerabilities in Consilium Safety's CS5000 Fire Panel could create "serious safety issues" in environments where fire suppression and safety are paramount, according to a CISA advisory.
Published on: June 02, 2025 | Source:Three security vulnerabilities have been disclosed in preloaded Android applications on smartphones from Ulefone and Krรผger&Matz that could enable any app installed on the device to perform a factory reset and encrypt an application. A brief description of the three flaws is as follows - CVE-2024-13915 (CVSS score: 6.9) - A pre-installed "com.pri.factorytest" application on Ulefone and
Published on: June 02, 2025 | Source:Chipmaker says there are indications from Google Threat Analysis Group that a trio of flaws โmay be under limited, targeted exploitation.โ The post Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently appeared first on SecurityWeek.
Published on: June 02, 2025 | Source:Qualcomm has shipped security updates to address three zero-day vulnerabilities that it said have been exploited in limited, targeted attacks in the wild. The flaws in question, which were responsibly disclosed to the company by the Google Android Security team, are listed below - CVE-2025-21479 and CVE-2025-21480 (CVSS score: 8.6) - Two incorrect authorization vulnerabilities in the Graphics
Published on: June 02, 2025 | Source:Organizations need to abandon perimeter-based security for data-centric protection strategies in today's distributed IT environments.
Published on: June 02, 2025 | Source:The US needs to establish a clear framework to provide reasonable guardrails to protect its interests โ the quicker, the better.
Published on: June 02, 2025 | Source:Exploitation of the vBulletin vulnerability tracked as CVE-2025-48827 and CVE-2025-48828 started shortly after disclosure. The post vBulletin Vulnerability Exploited in the Wild appeared first on SecurityWeek.
Published on: June 02, 2025 | Source:If this had been a security drill, someone wouldโve said it went too far. But it wasnโt a drillโit was real. The access? Everything looked normal. The tools? Easy to find. The detection? Came too late. This is how attacks happen nowโquiet, convincing, and fast. Defenders arenโt just chasing hackers anymoreโtheyโre struggling to trust what their systems are telling them. The problem isnโt too
Published on: June 02, 2025 | Source:A new Australian law requires larger companies to declare any ransomware payments they have made.
Published on: June 02, 2025 | Source:Patterns of concerning behavior led Google to remove trust in certificates from Chunghwa Telecom and Netlock from Chrome. The post Chrome to Distrust Chunghwa Telecom and Netlock Certificates appeared first on SecurityWeek.
Published on: June 02, 2025 | Source: