Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
China- and North Korea-aligned groups account for more than half of global attacks, and an increasing number of countries look to cyber to balance power in the region.
Published on: May 21, 2025 | Source:Itβs the first public break in the case that might be the largest breach of American schoolchildren's data. The post Massachusetts man will plead guilty in PowerSchool hack case appeared first on CyberScoop.
Published on: May 20, 2025 | Source:KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been a test run for a massive new Internet of Things (IoT) botnet capable of launching crippling digital assaults that few web destinations can withstand. Read on for more about the botnet,...
Published on: May 20, 2025 | Source:Researchers noted that they found several similar websites, two of which are still operating and require the same kind of behavior on behalf of the victim.
Published on: May 20, 2025 | Source:A hacker exploiting the security flaw in the mobile provider's network could have potentially located a call recipient with accuracy of up to 100 square meters.
Published on: May 20, 2025 | Source:Tenable One now pulls in data from AWS, Microsoft, and competitors to provide a holistic security view of an organization's attack surface.
Published on: May 20, 2025 | Source:Regeneron's planned acquisition of 23andMe raises significant privacy concerns as experts warn about the lack of comprehensive federal regulations governing the transfer of genetic information.
Published on: May 20, 2025 | Source:An employee inadvertently downloaded a malicious version of the legitimate RVTools utility, which launched an investigation into an attempted supply chain attack aimed at delivering the recently revived initial-access loader.
Published on: May 20, 2025 | Source:A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, including Amazon S3 buckets and Microsoft Azure endpoints, by leveraging misconfigurations in the Domain Name System (DNS) records. The hijacked domains are then used to host URLs that direct users to scams and malware via traffic distribution systems (TDSes), according to
Published on: May 20, 2025 | Source:The threat group games IT help desks to gain entry into retailer networks, and signs show it has shifted its attention from the UK to US targets.
Published on: May 20, 2025 | Source:An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities but incorporate covert functionality to exfiltrate data, receive commands, and execute arbitrary code. "The actor creates websites that masquerade as legitimate services, productivity tools, ad and media creation or analysis
Published on: May 20, 2025 | Source:Since December 2023, the threat group has preyed on domains belonging to the US Centers for Disease Control and Prevention (CDC) and numerous other reputable organizations worldwide to redirect users to malicious sites.
Published on: May 20, 2025 | Source:Organizations that stay ahead of attacks won't be the most compliant ones β they'll be the ones most honest about what actually works.
Published on: May 20, 2025 | Source:Researchers discovered a phishing attack in the wild that takes multiple well-tread technologies like open source packages and AES encryption and combines them.
Published on: May 20, 2025 | Source:VMware patches flaws that expose users to data leakage, command execution and denial-of-service attacks. No temporary workarounds available. The post NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch appeared first on SecurityWeek.
Published on: May 20, 2025 | Source:Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to escalate privileges, manipulate other AWS services, and, in some cases, even fully compromise AWS accounts. "These roles, often created automatically or recommended during setup, grant overly broad permissions, such as full S3
Published on: May 20, 2025 | Source:The Likely Exploited Vulnerabilities (LEV) equations can help augment KEV- and EPSS-based remediation prioritization. The post Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers appeared first on SecurityWeek.
Published on: May 20, 2025 | Source:SecurityWeekβs 2025 Threat Detection & Incident Response (TDIR) Summit takes place as a virtual summit on Wednesday, May 21st. The post Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit appeared first on SecurityWeek.
Published on: May 20, 2025 | Source:AI-native security assurance firm TrustCloud has raised $15 million in a strategic funding round led by ServiceNow Ventures. The post TrustCloud Raises $15 Million for Security Assurance Platform appeared first on SecurityWeek.
Published on: May 20, 2025 | Source:A DoorDash driver stole over $2.5 million over several months: The driver, Sayee Chaitainya Reddy Devagiri, placed expensive orders from a fraudulent customer account in the DoorDash app. Then, using DoorDash employee credentials, he manually assigned the orders to driver accounts he and the others involved had created. Devagiri would then mark the undelivered orders as complete and prompt DoorDashβs system to pay the...
Published on: May 20, 2025 | Source:In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISOs from global enterprises (200 from within the USA) to understand the strategies, tactics, and tools they use to cope with the thousands of security alerts, the persisting breaches and the growing cyber risks they have to handle. The findings reveal a complex picture of progress, challenges, and a shifting mindset
Published on: May 20, 2025 | Source:Seven sources tell CyberScoop that a lack of coordination and miscommunication between federal agencies and the telecommunications industry left critical networks exposed to the Chinese hacking group. The post βWhatever we did was not enoughβ: How Salt Typhoon slipped through the governmentβs blind spots appeared first on CyberScoop.
Published on: May 20, 2025 | Source:High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged as the target of a new campaign orchestrated by a threat actor known as SideWinder. "The attackers used spear phishing emails paired with geofenced payloads to ensure that only victims in specific countries received the malicious content," Acronis researchers Santiago Pontiroli, Jozsef Gegeny, and Prakas
Published on: May 20, 2025 | Source:Threat protection and intelligence firm CloudSEK raises $19 million in funding from new and existing investors. The post CloudSEK Raises $19 Million for Threat Intelligence Platform appeared first on SecurityWeek.
Published on: May 20, 2025 | Source:A vulnerability in O2βs implementation of the IMS standard resulted in user location data being exposed in network responses. The post O2 Service Vulnerability Exposed User Location appeared first on SecurityWeek.
Published on: May 20, 2025 | Source:New CISA Deputy Director Madhu Gottumukkala has joined the agency from South Dakotaβs Bureau of Information and Technology. The post Madhu Gottumukkala Officially Announced as CISA Deputy Director appeared first on SecurityWeek.
Published on: May 20, 2025 | Source:Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed international organization in Saudi Arabia with a previously undocumented backdoor dubbed MarsSnake. ESET, which first discovered the hacking group's intrusions targeting the entity in March 2023 and again a year later, said the activity leverages spear-phishing emails using
Published on: May 20, 2025 | Source:Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that's targeting publicly accessible Redis servers. The malicious activity has been codenamed RedisRaider by Datadog Security Labs. "RedisRaider aggressively scans randomized portions of the IPv4 space and uses legitimate Redis configuration commands to execute malicious cron jobs on vulnerable systems,"
Published on: May 20, 2025 | Source:Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act as checker tools to validate stolen email addresses against TikTok and Instagram APIs. All three packages are no longer available on PyPI. The names of the Python packages are below - checker-SaGaF (2,605 downloads) steinlurks (1,049 downloads) sinnercore (3,300 downloads)
Published on: May 20, 2025 | Source:A cyber-espionage campaign is targeting Ukrainian government entities with a series of sophisticated spear-phishing attacks that exploit XSS vulnerabilities.
Published on: May 19, 2025 | Source:The addition is an important hire for the No. 2 position at the cyber agency. The main director role remains unfilled post-Easterly, with Bridget Bean taking over acting duties for now.
Published on: May 19, 2025 | Source:The online service has since been shut down as the agency grapples with the cyberattack, though it assures the public that those most in need of legal assistance will still be able to access help.
Published on: May 19, 2025 | Source:ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report
Published on: May 19, 2025 | Source:The legislation comes amid DOGE-fueled cuts to CISA and warnings from lawmakers that Trump administration policies will cripple federal cyber recruiting. The post Federal cyber workforce training institute eyed in bipartisan House bill appeared first on CyberScoop.
Published on: May 19, 2025 | Source:Procoloredβs public website served dozens of software downloads containing information stealer malware and a backdoor. The post Printer Company Procolored Served Infected Software for Months appeared first on SecurityWeek.
Published on: May 19, 2025 | Source: