Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Experts Chart Path to Creating Safer Online Spaces for Women

Gaps in laws, technology, and corporate accountability continue to put women's safety and privacy online at risk.

Published on: May 21, 2025 | Source: Dark Reading favicon Dark Reading

Lumma Stealer Takedown Reveals Sprawling Operation

The FBI and partners have disrupted "the world's most popular malware," a sleek enterprise with thousands of moving parts, responsible for millions of cyberattacks in every part of the world.

Published on: May 21, 2025 | Source: Dark Reading favicon Dark Reading

Ivanti EPMM Exploitation Tied to Previous Zero-Day Attacks

Wiz researchers found an opportunistic threat actor has been targeting vulnerable edge devices, including Ivanti VPNs and Palo Alto firewalls.

Published on: May 21, 2025 | Source: Dark Reading favicon Dark Reading

Marks & Spencer Projects Cyberattack Cost of $400M

The company expects it will continue to struggle with online disruptions until at least July, due to the attack.

Published on: May 21, 2025 | Source: Dark Reading favicon Dark Reading

Marks & Spencer Projects $400M Loss After Cyberattack

The company expects it will continue to struggle with online disruptions until at least July, due to the attack.

Published on: May 21, 2025 | Source: Dark Reading favicon Dark Reading

Appeals court rejects attempt by Khashoggi widow to renew suit against NSO Group

Hanan Elatr Khashoggi has alleged that the spyware vendor played a role in the death of her husband. The post Appeals court rejects attempt by Khashoggi widow to renew suit against NSO Group appeared first on CyberScoop.

Published on: May 21, 2025 | Source: CyberScoop favicon CyberScoop

Pandas Galore: Chinese Hackers Boost Attacks in Latin America

Vixen Panda, Aquatic Panda β€” both Beijing-sponsored APTs and financially motivated criminal groups continued to pose the biggest threat to organizations in Central and South America last year, says CrowdStrike.

Published on: May 21, 2025 | Source: Dark Reading favicon Dark Reading

Lumma infostealer infected about 10 million systems before global disruption

Cybercriminals used the prolific malware to target individuals and businesses, including Fortune 500 companies, according to the FBI. The post Lumma infostealer infected about 10 million systems before global disruption appeared first on CyberScoop.

Published on: May 21, 2025 | Source: CyberScoop favicon CyberScoop

Unimicron, Presto Attacks Mark Industrial Ransomware Surge

A number of major industrial organizations suffered ransomware attacks last quarter, such as PCB manufacturer Unimicron, appliance maker Presto, and more β€” a harbinger of a rapidly developing and diversifying threat landscape.

Published on: May 21, 2025 | Source: Dark Reading favicon Dark Reading

Multi-national warning issued over Russia’s targeting of logistics, tech firms

The campaign traces back at least to early 2022, coinciding with the start of Russia’s full-scale invasion of Ukraine. The post Multi-national warning issued over Russia’s targeting of logistics, tech firms appeared first on CyberScoop.

Published on: May 21, 2025 | Source: CyberScoop favicon CyberScoop

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics

Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 2022. The activity has been assessed to be orchestrated by APT28 (aka BlueDelta, Fancy Bear, or Forest Blizzard), which is linked to the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center, Military Unit 26165.

Published on: May 21, 2025 | Source: The Hacker News favicon The Hacker News

Coinbase Breach Compromises Nearly 70K Customers' Information

Coinbase asserts that this number is only a small fraction of the number of its verified users, though it's still offering a $20 million reward to catch the criminals.

Published on: May 21, 2025 | Source: Dark Reading favicon Dark Reading

ESET takes part in global operation to disrupt Lumma Stealer

Our intense monitoring of tens of thousands of malicious samples helped this global disruption operation

Published on: May 21, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

Unpatched Windows Server Flaw Threatens Active Directory Users

Attackers can exploit a vulnerability present in the delegated Managed Service Account (dMSA) feature that fumbles permission handling and is present by default.

Published on: May 21, 2025 | Source: Dark Reading favicon Dark Reading

Lumma Stealer toppled by globally coordinated takedown

Global law enforcement authorities and Microsoft seized or disrupted the prolific infostealer’s central command infrastructure, malicious domains and marketplaces where the malware was sold. The post Lumma Stealer toppled by globally coordinated takedown appeared first on CyberScoop.

Published on: May 21, 2025 | Source: CyberScoop favicon CyberScoop

Critical Flaw Allows Remote Hacking of AutomationDirect Industrial Gateway

More than 100 AutomationDirect MB-Gateway devices may be vulnerable to attacks from the internet due to CVE-2025-36535. The post Critical Flaw Allows Remote Hacking of AutomationDirect Industrial Gateway appeared first on SecurityWeek.

Published on: May 21, 2025 | Source: SecurityWeek favicon SecurityWeek

NIST's 'LEV' Equation to Determine Likelihood a Bug Was Exploited

The new 'Likely Exploited Vulnerabilities' metric could be a game-changer for SecOps teams and vulnerability patch prioritization.

Published on: May 21, 2025 | Source: Dark Reading favicon Dark Reading

Now Live: Threat Detection & Incident Response (TDIR) Summit

SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes place as a virtual summit on Wednesday, May 21st. The post Now Live: Threat Detection & Incident Response (TDIR) Summit appeared first on SecurityWeek.

Published on: May 21, 2025 | Source: SecurityWeek favicon SecurityWeek

The Hidden Cybersecurity Risks of M&A

Merger and acquisition due diligence typically focuses on financials, legal risks, and operational efficiencies. Cybersecurity is often an afterthought β€” and that's a problem.

Published on: May 21, 2025 | Source: Dark Reading favicon Dark Reading

Dark Reading Confidential: The Day I Found an APT Group in the Most Unlikely Place

Dark Reading Confidential Episode 6: Threat hunters Ismael Valenzuela and Vitor Ventura share stories about the tricks they used to track down advanced persistent threat groups, and the surprises they discovered along the way.

Published on: May 21, 2025 | Source: Dark Reading favicon Dark Reading

Coinbase Says Rogue Contractor Data Breach Affects 69,461 Users

A mandatory filing to the Maine Attorney General says 69,461 customers nationwide were affected and dates the breach back to last December. The post Coinbase Says Rogue Contractor Data Breach Affects 69,461 Users appeared first on SecurityWeek.

Published on: May 21, 2025 | Source: SecurityWeek favicon SecurityWeek

PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms

Russian organizations have become the target of a phishing campaign that distributes malware called PureRAT, according to new findings from Kaspersky. "The campaign aimed at Russian business began back in March 2023, but in the first third of 2025 the number of attacks quadrupled compared to the same period in 2024," the cybersecurity vendor said. The attack chains, which have not been

Published on: May 21, 2025 | Source: The Hacker News favicon The Hacker News

Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims

Counterfeit Facebook pages and sponsored ads on the social media platform are being employed to direct users to fake websites masquerading as Kling AI with the goal of tricking victims into downloading malware. Kling AI is an artificial intelligence (AI)-powered platform to synthesize images and videos from text and image prompts. Launched in June 2024, it's developed by Kuaishou Technology,

Published on: May 21, 2025 | Source: The Hacker News favicon The Hacker News

Securing CI/CD workflows with Wazuh

Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released to different environments. CI/CD pipelines are fundamental in modern software development, ensuring code is consistently tested, built, and deployed quickly and efficiently. While CI/CD automation accelerates software delivery, it can also introduce security

Published on: May 21, 2025 | Source: The Hacker News favicon The Hacker News

More AIs Are Taking Polls and Surveys

I already knew about the declining response rate for polls and surveys. The percentage of AI bots that respond to surveys is also increasing. Solutions are hard: 1. Make surveys less boring. We need to move past bland, grid-filled surveys and start designing experiences people actually want to complete. That means mobile-first layouts, shorter runtimes, and maybe even a dash of storytelling. TikTok or dating app style...

Published on: May 21, 2025 | Source: Schneier on Security favicon Schneier on Security

A house full of open windows: Why telecoms may never purge their networks of Salt Typhoon

Experts tell CyberScoop that the U.S. telecom system is just too technologically fragmented to gather a clear picture of threats, and too big to ever fully eject all espionage efforts. The post A house full of open windows: Why telecoms may never purge their networks of Salt Typhoon appeared first on CyberScoop.

Published on: May 21, 2025 | Source: CyberScoop favicon CyberScoop

US Student to Plead Guilty Over PowerSchool Hack

Matthew Lane allegedly hacked PowerSchool using stolen credentials and admitted to extorting a telecoms provider. The post US Student to Plead Guilty Over PowerSchool Hack appeared first on SecurityWeek.

Published on: May 21, 2025 | Source: SecurityWeek favicon SecurityWeek

How to Detect Phishing Attacks Faster: Tycoon2FA Example

It takes just one email to compromise an entire system. A single well-crafted message can bypass filters, trick employees, and give attackers the access they need. Left undetected, these threats can lead to credential theft, unauthorized access, and even full-scale breaches. As phishing techniques become more evasive, they can no longer be reliably caught by automated solutions alone. Let’s take

Published on: May 21, 2025 | Source: The Hacker News favicon The Hacker News

Cellcom Service Disruption Caused by Cyberattack

Wireless carrier Cellcom has confirmed that a week-long widespread service outage is the result of a cyberattack. The post Cellcom Service Disruption Caused by Cyberattack appeared first on SecurityWeek.

Published on: May 21, 2025 | Source: SecurityWeek favicon SecurityWeek

Google DeepMind Unveils Defense Against Indirect Prompt Injection Attacks

Google DeepMind has developed an ongoing process to counter the continuously evolving threatIndirect prompt injection (IPI) attacks. The post Google DeepMind Unveils Defense Against Indirect Prompt Injection Attacks appeared first on SecurityWeek.

Published on: May 21, 2025 | Source: SecurityWeek favicon SecurityWeek

Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities

Wiz warns that threat actors are chaining two recent Ivanti vulnerabilities to achieve unauthenticated remote code execution. The post Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities appeared first on SecurityWeek.

Published on: May 21, 2025 | Source: SecurityWeek favicon SecurityWeek

Up to 25% of Internet-Exposed ICS Are Honeypots: Researchers

Many of the industrial control system (ICS) instances seen in internet scanning are likely or possibly honeypots, not real devices. The post Up to 25% of Internet-Exposed ICS Are Honeypots: Researchers appeared first on SecurityWeek.

Published on: May 21, 2025 | Source: SecurityWeek favicon SecurityWeek

Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps

Cybersecurity researchers have discovered a new campaign that employs malicious JavaScript injections to redirect site visitors on mobile devices to a Chinese adult-content Progressive Web App (PWA) scam. "While the payload itself is nothing new (yet another adult gambling scam), the delivery method stands out," c/side researcher Himanshu Anand said in a Tuesday analysis. "The malicious landing

Published on: May 21, 2025 | Source: The Hacker News favicon The Hacker News

Google Chrome's Built-in Manager Lets Users Update Breached Passwords with One Click

Google has announced a new feature in its Chrome browser that lets its built-in Password Manager automatically change a user's password when it detects the credentials to be compromised. "When Chrome detects a compromised password during sign in, Google Password Manager prompts the user with an option to fix it automatically," Google's Ashima Arora, Chirag Desai, and Eiji Kitamura said. "On

Published on: May 21, 2025 | Source: The Hacker News favicon The Hacker News

Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager

Google has announced a new feature in its Chrome browser that lets its built-in Password Manager automatically change a user's password when it detects the credentials to be compromised. "When Chrome detects a compromised password during sign in, Google Password Manager prompts the user with an option to fix it automatically," Google's Ashima Arora, Chirag Desai, and Eiji Kitamura said. "On

Published on: May 21, 2025 | Source: The Hacker News favicon The Hacker News