Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
Organizations need to broaden their strategy to manage vulnerabilities more effectively and strengthen network cyber resilience.
Published on: May 27, 2025 | Source:The agencies said that the group, which they called Laundry Bear, is actively trying to steal sensitive data from EU and NATO countries and is โextremely likely Russian state supported.โ The post Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack appeared first on SecurityWeek.
Published on: May 27, 2025 | Source:As cloud security spending surges to $111 billion, new data highlights Microsoft's dominance, the U.S. market's outsized role, and Google's strategic acquisition of Wiz. The post Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next appeared first on SecurityWeek.
Published on: May 27, 2025 | Source:Microsoft has shed light on a previously undocumented cluster of malicious activity originating from a Russia-affiliated threat actor dubbed Void Blizzard (aka Laundry Bear) that it said is attributed to "worldwide cloud abuse." Active since at least April 2024, the hacking group is linked to espionage operations mainly targeting organizations that are important to Russian government objectives,
Published on: May 27, 2025 | Source:One one my biggest worries about VPNs is the amount of trust users need to place in them, and how opaque most of them are about who owns them and what sorts of data they retain. A new study found that many commercials VPNS are (often surreptitiously) owned by Chinese companies. It would be hard for U.S. users to avoid the Chinese VPNs. The ownership of many appeared deliberately opaque, with several concealing their...
Published on: May 27, 2025 | Source:Artificial intelligence is driving a massive shift in enterprise productivity, from GitHubCopilotโs code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to other services, quietly swelling the population of nonโhuman identities (NHIs) across corporate clouds. That population is already overwhelming the enterprise: many companies
Published on: May 27, 2025 | Source:The FBI warns US law firms that the Silent Ransom Group (SRG) has been constantly targeting the legal industry. The post Law Firms Warned of Silent Ransom Group Attacks appeared first on SecurityWeek.
Published on: May 27, 2025 | Source:Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud. The activity, first detected by ReliaQuest in May 2025 targeting an unnamed customer in the manufacturing sector, is characterized by the use of fake login pages to access the employee payroll portal and redirect
Published on: May 27, 2025 | Source:Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data
Published on: May 27, 2025 | Source:The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering attacks mounted by a criminal extortion actor known as Luna Moth targeting law firms over the past two years. The campaign leverages "information technology (IT) themed social engineering calls, and callback phishing emails, to gain remote access to systems or devices and steal sensitive data to extort the victims,"
Published on: May 27, 2025 | Source:The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing campaign targeting Tajikistan using macro-enabled Word templates as an initial payload. The attack chain is a departure from the threat actor's previously documented use of an HTML Application (.HTA) loader dubbed HATVIBE, Recorded Future's Insikt Group said in an analysis. "Given TAG-110's historical
Published on: May 27, 2025 | Source:As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled endpoint. The packages, published under three different accounts, come with an installโtime script that's triggered during npm install, Socket security researcher Kirill Boychenko said in a
Published on: May 26, 2025 | Source:Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISOโs guide provides a practical roadmap for continuous web privacy validation thatโs aligned with real-world practices. โ Download the full guide here. Web Privacy: From Legal Requirement to Business Essential As regulators ramp up enforcement and users grow more privacy-aware, CISOs face a mounting
Published on: May 26, 2025 | Source:Cyber threats don't show up one at a time anymore. Theyโre layered, planned, and often stay hidden until itโs too late. For cybersecurity teams, the key isnโt just reacting to alertsโitโs spotting early signs of trouble before they become real threats. This update is designed to deliver clear, accurate insights based on real patterns and changes we can verify. With todayโs complex systems, we
Published on: May 26, 2025 | Source:Nova Scotia Power has finally admitted that the recent cyberattack was a ransomware attack, but it hasnโt paid the hackers. The post Nova Scotia Power Confirms Ransomware Attack, 280k Notified of Data Breach appeared first on SecurityWeek.
Published on: May 26, 2025 | Source:Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework. The campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena. "Catena uses embedded shellcode and configuration switching logic to stage
Published on: May 25, 2025 | Source:Interesting story: USS Stein was underway when her anti-submarine sonar gear suddenly stopped working. On returning to port and putting the ship in a drydock, engineers observed many deep scratches in the sonar domeโs rubber โNOFOULโ coating. In some areas, the coating was described as being shredded, with rips up to four feet long. Large claws were left embedded at the bottom of most of the scratches. As usual, you...
Published on: May 23, 2025 | Source:Sens. Warner and Lankford reintroduced their VDP bill after a companion version passed the House in March. The post Senators take another swing at vulnerability disclosure policy bill for federal contractors appeared first on CyberScoop.
Published on: May 23, 2025 | Source:The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a distribution vector. "The ClickFix technique is particularly risky because it allows the malware to execute in memory rather than being written to disk," Expel said in a report shared with The Hacker News. "This removes many opportunities for browsers or security
Published on: May 23, 2025 | Source:Encryption, collaboration, and AI can help organizations build up essential protection against ransomware.
Published on: May 23, 2025 | Source:Signal said the privacy feature is on by default for every Windows 11 user to block Microsoft from taking screenshots for Windows Recall. The post Signal Adds Screenshot-Blocker to Thwart โWindows Recallโ appeared first on SecurityWeek.
Published on: May 23, 2025 | Source:A coordinated effort took down seven kinds of malware and targeted initial access brokers. The post Large-scale sting tied to Operation Endgame disrupts ransomware infrastructure appeared first on CyberScoop.
Published on: May 23, 2025 | Source:By automating security policies and threat detection while coaching users on data protection, companies will be better able to take control of and protect their data.
Published on: May 23, 2025 | Source:The key to navigating this new GenAI landscape is a balanced approach โ one that fosters transparency, strengthens regulatory frameworks, and embraces privacy-enhancing technologies.
Published on: May 23, 2025 | Source:Noteworthy stories that might have slipped under the radar: serious vulnerabilities found in a Volkswagen app, Australian hacker DR32 sentenced in the US, and Immersive launches OT security training solution. The post In Other News: Volkswagen App Hacked, DR32 Sentenced, New OT Security Solution appeared first on SecurityWeek.
Published on: May 23, 2025 | Source:Three zero-days could have allowed an attacker to completely compromise the Concerto application and the host system running it.
Published on: May 23, 2025 | Source:As the summer event season kicks off, venue managers and security firms aim to make AI part of the solution for keeping control of crowds and protecting against cyber-physical threats.
Published on: May 23, 2025 | Source:Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge devices across 84 countries and turned them into a honeypot-like network. The threat actor has been observed exploiting a critical security flaw impacting Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers (CVE-2023-20118) to corral them into
Published on: May 23, 2025 | Source:SecurityWeekโs 2025 Threat Detection & Incident Response (TDIR) Summit took place as a virtual summit on May 21st. The post On Demand: Threat Detection & Incident Response (TDIR) Summit appeared first on SecurityWeek.
Published on: May 23, 2025 | Source:ESET Research has been tracking Danabotโs activity since 2018 as part of a global effort that resulted in a major disruption of the malwareโs infrastructure
Published on: May 23, 2025 | Source:Russian national Rustam Gallyamov was indicted in the US for his leading role in the development and distribution of Qakbot malware. The post Russian Qakbot Gang Leader Indicted in US appeared first on SecurityWeek.
Published on: May 23, 2025 | Source:This article gives a good rundown of the security risks of Windows Recall, and the repurposed copyright protection took that Signal used to block the AI feature from scraping Signal data.
Published on: May 23, 2025 | Source:As part of the latest "season" of Operation Endgame, a coalition of law enforcement agencies have taken down about 300 servers worldwide, neutralized 650 domains, and issued arrest warrants against 20 targets. Operation Endgame, first launched in May 2024, is an ongoing law enforcement operation targeting services and infrastructures assisting in or directly providing initial or consolidating
Published on: May 23, 2025 | Source:CISA warns companies of a widespread campaign targeting a Commvault vulnerability to hack Azure environments. The post Companies Warned of Commvault Vulnerability Exploitation appeared first on SecurityWeek.
Published on: May 23, 2025 | Source:From zero-day exploits to large-scale bot attacks โ the demand for a powerful, self-hosted, and user-friendly web application security solution has never been greater. SafeLine is currently the most starred open-source Web Application Firewall (WAF) on GitHub, with over 16.4K stars and a rapidly growing global user base. This walkthrough covers what SafeLine is, how it works, and why itโs
Published on: May 23, 2025 | Source: