Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

CVE Uncertainty Underlines Importance of Cyber Resilience

Organizations need to broaden their strategy to manage vulnerabilities more effectively and strengthen network cyber resilience.

Published on: May 27, 2025 | Source: Dark Reading favicon Dark Reading

Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack

The agencies said that the group, which they called Laundry Bear, is actively trying to steal sensitive data from EU and NATO countries and is โ€œextremely likely Russian state supported.โ€ The post Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack appeared first on SecurityWeek.

Published on: May 27, 2025 | Source: SecurityWeek favicon SecurityWeek

Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next

As cloud security spending surges to $111 billion, new data highlights Microsoft's dominance, the U.S. market's outsized role, and Google's strategic acquisition of Wiz. The post Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next appeared first on SecurityWeek.

Published on: May 27, 2025 | Source: SecurityWeek favicon SecurityWeek

Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages

Microsoft has shed light on a previously undocumented cluster of malicious activity originating from a Russia-affiliated threat actor dubbed Void Blizzard (aka Laundry Bear) that it said is attributed to "worldwide cloud abuse." Active since at least April 2024, the hacking group is linked to espionage operations mainly targeting organizations that are important to Russian government objectives,

Published on: May 27, 2025 | Source: The Hacker News favicon The Hacker News

Chinese-Owned VPNs

One one my biggest worries about VPNs is the amount of trust users need to place in them, and how opaque most of them are about who owns them and what sorts of data they retain. A new study found that many commercials VPNS are (often surreptitiously) owned by Chinese companies. It would be hard for U.S. users to avoid the Chinese VPNs. The ownership of many appeared deliberately opaque, with several concealing their...

Published on: May 27, 2025 | Source: Schneier on Security favicon Schneier on Security

AI Agents and the Nonโ€‘Human Identity Crisis: How to Deploy AIโ€ฏMore Securelyโ€ฏatโ€ฏScale

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHubCopilotโ€™s code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to other services, quietly swelling the population of nonโ€‘human identities (NHIs) across corporate clouds. That population is already overwhelming the enterprise: many companies

Published on: May 27, 2025 | Source: The Hacker News favicon The Hacker News

Law Firms Warned of Silent Ransom Group Attacks

The FBI warns US law firms that the Silent Ransom Group (SRG) has been constantly targeting the legal industry. The post Law Firms Warned of Silent Ransom Group Attacks appeared first on SecurityWeek.

Published on: May 27, 2025 | Source: SecurityWeek favicon SecurityWeek

Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud. The activity, first detected by ReliaQuest in May 2025 targeting an unnamed customer in the manufacturing sector, is characterized by the use of fake login pages to access the employee payroll portal and redirect

Published on: May 27, 2025 | Source: The Hacker News favicon The Hacker News

Word to the wise: Beware of fake Docusign emails

Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data

Published on: May 27, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Mothโ€™s Stealth Phishing Campaign

The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering attacks mounted by a criminal extortion actor known as Luna Moth targeting law firms over the past two years. The campaign leverages "information technology (IT) themed social engineering calls, and callback phishing emails, to gain remote access to systems or devices and steal sensitive data to extort the victims,"

Published on: May 27, 2025 | Source: The Hacker News favicon The Hacker News

Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents

The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing campaign targeting Tajikistan using macro-enabled Word templates as an initial payload. The attack chain is a departure from the threat actor's previously documented use of an HTML Application (.HTA) loader dubbed HATVIBE, Recorded Future's Insikt Group said in an analysis. "Given TAG-110's historical

Published on: May 27, 2025 | Source: The Hacker News favicon The Hacker News

Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled endpoint. The packages, published under three different accounts, come with an installโ€‘time script that's triggered during npm install, Socket security researcher Kirill Boychenko said in a

Published on: May 26, 2025 | Source: The Hacker News favicon The Hacker News

CISO's Guide To Web Privacy Validation And Why It's Important

Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISOโ€™s guide provides a practical roadmap for continuous web privacy validation thatโ€™s aligned with real-world practices. โ€“ Download the full guide here. Web Privacy: From Legal Requirement to Business Essential As regulators ramp up enforcement and users grow more privacy-aware, CISOs face a mounting

Published on: May 26, 2025 | Source: The Hacker News favicon The Hacker News

โšก Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs

Cyber threats don't show up one at a time anymore. Theyโ€™re layered, planned, and often stay hidden until itโ€™s too late. For cybersecurity teams, the key isnโ€™t just reacting to alertsโ€”itโ€™s spotting early signs of trouble before they become real threats. This update is designed to deliver clear, accurate insights based on real patterns and changes we can verify. With todayโ€™s complex systems, we

Published on: May 26, 2025 | Source: The Hacker News favicon The Hacker News

Nova Scotia Power Confirms Ransomware Attack, 280k Notified of Data Breach

Nova Scotia Power has finally admitted that the recent cyberattack was a ransomware attack, but it hasnโ€™t paid the hackers. The post Nova Scotia Power Confirms Ransomware Attack, 280k Notified of Data Breach appeared first on SecurityWeek.

Published on: May 26, 2025 | Source: SecurityWeek favicon SecurityWeek

Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware

Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework. The campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena. "Catena uses embedded shellcode and configuration switching logic to stage

Published on: May 25, 2025 | Source: The Hacker News favicon The Hacker News

Friday Squid Blogging: US Naval Ship Attacked by Squid in 1978

Interesting story: USS Stein was underway when her anti-submarine sonar gear suddenly stopped working. On returning to port and putting the ship in a drydock, engineers observed many deep scratches in the sonar domeโ€™s rubber โ€œNOFOULโ€ coating. In some areas, the coating was described as being shredded, with rips up to four feet long. Large claws were left embedded at the bottom of most of the scratches. As usual, you...

Published on: May 23, 2025 | Source: Schneier on Security favicon Schneier on Security

Senators take another swing at vulnerability disclosure policy bill for federal contractors

Sens. Warner and Lankford reintroduced their VDP bill after a companion version passed the House in March. The post Senators take another swing at vulnerability disclosure policy bill for federal contractors appeared first on CyberScoop.

Published on: May 23, 2025 | Source: CyberScoop favicon CyberScoop

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a distribution vector. "The ClickFix technique is particularly risky because it allows the malware to execute in memory rather than being written to disk," Expel said in a report shared with The Hacker News. "This removes many opportunities for browsers or security

Published on: May 23, 2025 | Source: The Hacker News favicon The Hacker News

3 Critical Pillars of Cyber-Resilience

Encryption, collaboration, and AI can help organizations build up essential protection against ransomware.

Published on: May 23, 2025 | Source: Dark Reading favicon Dark Reading

Signal Adds Screenshot-Blocker to Thwart โ€˜Windows Recallโ€™ย 

Signal said the privacy feature is on by default for every Windows 11 user to block Microsoft from taking screenshots for Windows Recall. The post Signal Adds Screenshot-Blocker to Thwart โ€˜Windows Recallโ€™ appeared first on SecurityWeek.

Published on: May 23, 2025 | Source: SecurityWeek favicon SecurityWeek

Large-scale sting tied to Operation Endgame disrupts ransomware infrastructure

A coordinated effort took down seven kinds of malware and targeted initial access brokers. The post Large-scale sting tied to Operation Endgame disrupts ransomware infrastructure appeared first on CyberScoop.

Published on: May 23, 2025 | Source: CyberScoop favicon CyberScoop

How AI Is Transforming SASE, Zero Trust for Modern Enterprises

By automating security policies and threat detection while coaching users on data protection, companies will be better able to take control of and protect their data.

Published on: May 23, 2025 | Source: Dark Reading favicon Dark Reading

Rethinking Data Privacy in the Age of Generative AI

The key to navigating this new GenAI landscape is a balanced approach โ€” one that fosters transparency, strengthens regulatory frameworks, and embraces privacy-enhancing technologies.

Published on: May 23, 2025 | Source: Dark Reading favicon Dark Reading

In Other News: Volkswagen App Hacked, DR32 Sentenced, New OT Security Solution

Noteworthy stories that might have slipped under the radar: serious vulnerabilities found in a Volkswagen app, Australian hacker DR32 sentenced in the US, and Immersive launches OT security training solution. The post In Other News: Volkswagen App Hacked, DR32 Sentenced, New OT Security Solution appeared first on SecurityWeek.

Published on: May 23, 2025 | Source: SecurityWeek favicon SecurityWeek

3 Severe Bugs Patched in Versa's Concerto Orchestrator

Three zero-days could have allowed an attacker to completely compromise the Concerto application and the host system running it.

Published on: May 23, 2025 | Source: Dark Reading favicon Dark Reading

Companies Look to AI to Tame the Chaos of Event Security, Operations

As the summer event season kicks off, venue managers and security firms aim to make AI part of the solution for keeping control of crowds and protecting against cyber-physical threats.

Published on: May 23, 2025 | Source: Dark Reading favicon Dark Reading

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge devices across 84 countries and turned them into a honeypot-like network. The threat actor has been observed exploiting a critical security flaw impacting Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers (CVE-2023-20118) to corral them into

Published on: May 23, 2025 | Source: The Hacker News favicon The Hacker News

On Demand: Threat Detection & Incident Response (TDIR) Summit

SecurityWeekโ€™s 2025 Threat Detection & Incident Response (TDIR) Summit took place as a virtual summit on May 21st. The post On Demand: Threat Detection & Incident Response (TDIR) Summit appeared first on SecurityWeek.

Published on: May 23, 2025 | Source: SecurityWeek favicon SecurityWeek

Danabot under the microscope

ESET Research has been tracking Danabotโ€™s activity since 2018 as part of a global effort that resulted in a major disruption of the malwareโ€™s infrastructure

Published on: May 23, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

Russian Qakbot Gang Leader Indicted in US

Russian national Rustam Gallyamov was indicted in the US for his leading role in the development and distribution of Qakbot malware. The post Russian Qakbot Gang Leader Indicted in US appeared first on SecurityWeek.

Published on: May 23, 2025 | Source: SecurityWeek favicon SecurityWeek

Signal Blocks Windows Recall

This article gives a good rundown of the security risks of Windows Recall, and the repurposed copyright protection took that Signal used to block the AI feature from scraping Signal data.

Published on: May 23, 2025 | Source: Schneier on Security favicon Schneier on Security

300 Servers and โ‚ฌ3.5M Seized as Europol Strikes Ransomware Networks Worldwide

As part of the latest "season" of Operation Endgame, a coalition of law enforcement agencies have taken down about 300 servers worldwide, neutralized 650 domains, and issued arrest warrants against 20 targets. Operation Endgame, first launched in May 2024, is an ongoing law enforcement operation targeting services and infrastructures assisting in or directly providing initial or consolidating

Published on: May 23, 2025 | Source: The Hacker News favicon The Hacker News

Companies Warned of Commvault Vulnerability Exploitation

CISA warns companies of a widespread campaign targeting a Commvault vulnerability to hack Azure environments. The post Companies Warned of Commvault Vulnerability Exploitation appeared first on SecurityWeek.

Published on: May 23, 2025 | Source: SecurityWeek favicon SecurityWeek

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

From zero-day exploits to large-scale bot attacks โ€” the demand for a powerful, self-hosted, and user-friendly web application security solution has never been greater. SafeLine is currently the most starred open-source Web Application Firewall (WAF) on GitHub, with over 16.4K stars and a rapidly growing global user base. This walkthrough covers what SafeLine is, how it works, and why itโ€™s

Published on: May 23, 2025 | Source: The Hacker News favicon The Hacker News