Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
A Chinese threat actor exploited a zero-day vulnerability in Trimble Cityworks to hack local government entities in the US. The post Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks appeared first on SecurityWeek.
Published on: May 23, 2025 | Source:A Chinese espionage group has been chaining two recent Ivanti EPMM vulnerabilities in attacks against organizations in multiple critical sectors. The post Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors appeared first on SecurityWeek.
Published on: May 23, 2025 | Source:The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with DanaBot (aka DanaTools) and unsealed charges against 16 individuals for their alleged involvement in the development and deployment of the malware, which it said was controlled by a Russia-based cybercrime organization. The malware, the DoJ said, infected more than 300,000
Published on: May 23, 2025 | Source:Cybersecurity researchers have discovered an indirect prompt injection flaw in GitLab's artificial intelligence (AI) assistant Duo that could have allowed attackers to steal source code and inject untrusted HTML into its responses, which could then be used to direct victims to malicious websites. GitLab Duo is an artificial intelligence (AI)-powered coding assistant that enables users to write,
Published on: May 23, 2025 | Source:The successful break-up of DanaBot marks the second high-profile law enforcement disruption of a widespread malware operation in as many days. The post DanaBot malware operation seized in global takedown appeared first on CyberScoop.
Published on: May 22, 2025 | Source:The U.S. government today unsealed criminal charges against 16 individuals accused of operating and selling DanaBot, a prolific strain of information-stealing malware that has been sold on Russian cybercrime forums since 2018. The FBI says a newer version of DanaBot was used for espionage, and that many of the defendants exposed their real-life identities after accidentally infecting their own systems with the malware....
Published on: May 22, 2025 | Source:Published on: May 22, 2025 | Source:
The same easily exploitable vulnerability was found in three of the apps that led to the compromise of victims' data.
Published on: May 22, 2025 | Source:While Ukraine remains Russia's major target for cyberattacks, TAG-110 is part of a strategy to preserve "a post-Soviet sphere of influence" by embedding itself in other countries' infrastructures.
Published on: May 22, 2025 | Source:ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation
Published on: May 22, 2025 | Source:The emerging threat group is the latest to adopt the combo attack tactic, which Black Basta and other groups already are using to gain initial access for ransomware deployment.
Published on: May 22, 2025 | Source:The emerging threat group is the latest to adopt the combo attack tactic, which Black Basta and other groups already are using to gain initial access for ransomware deployment.
Published on: May 22, 2025 | Source:Insurance experts weigh in on how the recent barrage of attacks against UK retailers could affect premium rates and policy requirements, as well as how to work toward improving risk assessment.
Published on: May 22, 2025 | Source:The mission is to gather information that could help Russia in its war against Ukraine.
Published on: May 22, 2025 | Source:Akamai documents a privilege escalation flaw in Windows Server 2025 after Redmond declines to ship an immediate patch. The post Akamai, Microsoft Disagree on Severity of Unpatched βBadSuccessorβ Flaw appeared first on SecurityWeek.
Published on: May 22, 2025 | Source:The loosely affiliated hacking group has shifted closer to ransomware gangs, raising questions about Scattered Spider's ties to the Russian cybercrime underground.
Published on: May 22, 2025 | Source:A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the exploitation of a now-patched remote-code-execution vulnerability in Trimble Cityworks to deliver Cobalt Strike and VShell. "UAT-6382 successfully exploited CVE-2025-0944, conducted reconnaissance, and rapidly deployed a variety of web shells and custom-made malware to maintain long-term access," Cisco Talos researchers
Published on: May 22, 2025 | Source:The legislation Sens. Gary Peters and James Lankford would create an executive branch panel to align federal cyber rules. The post Senators revive bill to harmonize conflicting cybersecurity regulations appeared first on CyberScoop.
Published on: May 22, 2025 | Source:The bustling cybercrime enterprise has been dealt a significant blow in a global operation that relied on the expertise of ESET and other technology companies
Published on: May 22, 2025 | Source:DeepSeek's risks must be carefully considered, and ultimately mitigated, in order to enjoy the many benefits of generative AI in a manner that is safe and secure for all organizations and users.
Published on: May 22, 2025 | Source:Despite adding alignment training, guardrails, and filters, large language models continue to give up secrets, make unfiltered statements, and provide dangerous information.
Published on: May 22, 2025 | Source:A privilege escalation flaw has been demonstrated in Windows Server 2025 that makes it possible for attackers to compromise any user in Active Directory (AD). "The attack exploits the delegated Managed Service Account (dMSA) feature that was introduced in Windows Server 2025, works with the default configuration, and is trivial to implement," Akamai security researcher Yuval Gordon said in a
Published on: May 22, 2025 | Source:A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM) software has been exploited by a China-nexus threat actor to target a wide range of sectors across Europe, North America, and the Asia-Pacific region. The vulnerabilities, tracked as CVE-2025-4427 (CVSS score: 5.3) and CVE-2025-4428 (CVSS score: 7.2), could be chained to execute arbitrary code on a
Published on: May 22, 2025 | Source:Marlboro-Chesterfield Pathology has been targeted by the SafePay ransomware group, which stole personal information from its systems. The post Marlboro-Chesterfield Pathology Data Breach Impacts 235,000 People appeared first on SecurityWeek.
Published on: May 22, 2025 | Source:Itβs not enough to be secure. In todayβs legal climate, you need to prove it. Whether youβre protecting a small company or managing compliance across a global enterprise, one thing is clear: cybersecurity can no longer be left to guesswork, vague frameworks, or best-effort intentions. Regulators and courts are now holding organizations accountable for how βreasonableβ their security programs are
Published on: May 22, 2025 | Source:For many organizations, identity security appears to be under control. On paper, everything checks out. But new research from Cerby, based on insights from over 500 IT and security leaders, reveals a different reality: too much still depends on peopleβnot systemsβto function. In fact, fewer than 4% of security teams have fully automated their core identity workflows. Core workflows, like
Published on: May 22, 2025 | Source:Technology and innovation have transformed every part of society, including our electoral experiences. Campaigns are spending and doing more than at any other time in history. Ever-growing war chests fuel billions of voter contacts every cycle. Campaigns now have better ways of scaling outreach methods and offer volunteers and donors more efficient ways to contribute time and money. Campaign staff have adapted to vast...
Published on: May 22, 2025 | Source:Cybersecurity researchers have uncovered multiple critical security vulnerabilities impacting the Versa Concerto network security and SD-WAN orchestration platform that could be exploited to take control of susceptible instances. It's worth noting that the identified shortcomings remain unpatched despite responsible disclosure on February 13, 2025, prompting a public release of the issues
Published on: May 22, 2025 | Source:Cybersecurity researchers have uncovered multiple critical security vulnerabilities impacting the Versa Concerto network security and SD-WAN orchestration platform that could be exploited to take control of susceptible instances. It's worth noting that the identified shortcomings remain unpatched despite responsible disclosure on February 13, 2025, prompting a public release of the issues
Published on: May 22, 2025 | Source:In the end, cybersecurity isnβt just about collecting data. Itβs about proving that your defenses actually work. The post Security Theater or Real Defense? The KPIs That Tell the Truth appeared first on SecurityWeek.
Published on: May 22, 2025 | Source:Despite massive investment, the explosion of sophisticated malware and deepfake attacks persists because organizations struggle to verify digital identities and establish fundamental trust. The post Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isnβt Enough appeared first on SecurityWeek.
Published on: May 22, 2025 | Source:Prompt injection risks in GitLab's AI assistant could have allowed attackers to steal source code, or indirectly deliver developers malware, dirty links, and more.
Published on: May 22, 2025 | Source:Cisco published 10 security advisories detailing over a dozen vulnerabilities, including two high-severity flaws in its Identity Services Engine (ISE) and Unified Intelligence Center. The post Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities appeared first on SecurityWeek.
Published on: May 22, 2025 | Source:A sprawling operation undertaken by global law enforcement agencies and a consortium of private sector firms has disrupted the online infrastructure associated with a commodity information stealer known as Lumma (aka LummaC or LummaC2), seizing 2,300 domains that acted as the command-and-control (C2) backbone to commandeer infected Windows systems. "Malware like LummaC2 is deployed to steal
Published on: May 22, 2025 | Source:A recent spear-phishing campaign against countries in South Asia aligns with broader political tensions in the region.
Published on: May 22, 2025 | Source: