Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Asia Produces More APT Actors, as Focus Expands Globally

China- and North Korea-aligned groups account for more than half of global attacks, and an increasing number of countries look to cyber to balance power in the region.

Published on: May 21, 2025 | Source: Dark Reading favicon Dark Reading

Massachusetts man will plead guilty in PowerSchool hack case

It’s the first public break in the case that might be the largest breach of American schoolchildren's data. The post Massachusetts man will plead guilty in PowerSchool hack case appeared first on CyberScoop.

Published on: May 20, 2025 | Source: CyberScoop favicon CyberScoop

KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS

KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been a test run for a massive new Internet of Things (IoT) botnet capable of launching crippling digital assaults that few web destinations can withstand. Read on for more about the botnet,...

Published on: May 20, 2025 | Source: Krebs on Security favicon Krebs on Security

Fake Kling AI Malvertisements Lure Victims With False Promises

Researchers noted that they found several similar websites, two of which are still operating and require the same kind of behavior on behalf of the victim.

Published on: May 20, 2025 | Source: Dark Reading favicon Dark Reading

Virgin Media 02 Vuln Exposes Call Recipient Location

A hacker exploiting the security flaw in the mobile provider's network could have potentially located a call recipient with accuracy of up to 100 square meters.

Published on: May 20, 2025 | Source: Dark Reading favicon Dark Reading

Tenable Adds Third-Party Connectors to Exposure Management Platform

Tenable One now pulls in data from AWS, Microsoft, and competitors to provide a holistic security view of an organization's attack surface.

Published on: May 20, 2025 | Source: Dark Reading favicon Dark Reading

Regeneron Pledges Privacy Protection in $256M Bid for 23andMe

Regeneron's planned acquisition of 23andMe raises significant privacy concerns as experts warn about the lack of comprehensive federal regulations governing the transfer of genetic information.

Published on: May 20, 2025 | Source: Dark Reading favicon Dark Reading

Bumblebee Malware Takes Flight via Trojanized VMware Utility

An employee inadvertently downloaded a malicious version of the legitimate RVTools utility, which launched an investigation into an attempted supply chain attack aimed at delivering the recently revived initial-access loader.

Published on: May 20, 2025 | Source: Dark Reading favicon Dark Reading

Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery

A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, including Amazon S3 buckets and Microsoft Azure endpoints, by leveraging misconfigurations in the Domain Name System (DNS) records. The hijacked domains are then used to host URLs that direct users to scams and malware via traffic distribution systems (TDSes), according to

Published on: May 20, 2025 | Source: The Hacker News favicon The Hacker News

Large Retailers Land in Scattered Spider's Ransomware Web

The threat group games IT help desks to gain entry into retailer networks, and signs show it has shifted its attention from the UK to US targets.

Published on: May 20, 2025 | Source: Dark Reading favicon Dark Reading

100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads

An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities but incorporate covert functionality to exfiltrate data, receive commands, and execute arbitrary code. "The actor creates websites that masquerade as legitimate services, productivity tools, ad and media creation or analysis

Published on: May 20, 2025 | Source: The Hacker News favicon The Hacker News

'Hazy Hawk' Cybercrime Gang Swoops In for Cloud Resources

Since December 2023, the threat group has preyed on domains belonging to the US Centers for Disease Control and Prevention (CDC) and numerous other reputable organizations worldwide to redirect users to malicious sites.

Published on: May 20, 2025 | Source: Dark Reading favicon Dark Reading

Why Rigid Security Programs Keep Failing

Organizations that stay ahead of attacks won't be the most compliant ones β€” they'll be the ones most honest about what actually works.

Published on: May 20, 2025 | Source: Dark Reading favicon Dark Reading

Novel Phishing Attack Combines AES With Poisoned npm Packages

Researchers discovered a phishing attack in the wild that takes multiple well-tread technologies like open source packages and AES encryption and combines them.

Published on: May 20, 2025 | Source: Dark Reading favicon Dark Reading

NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch

VMware patches flaws that expose users to data leakage, command execution and denial-of-service attacks. No temporary workarounds available. The post NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch appeared first on SecurityWeek.

Published on: May 20, 2025 | Source: SecurityWeek favicon SecurityWeek

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to escalate privileges, manipulate other AWS services, and, in some cases, even fully compromise AWS accounts. "These roles, often created automatically or recommended during setup, grant overly broad permissions, such as full S3

Published on: May 20, 2025 | Source: The Hacker News favicon The Hacker News

Vulnerability Exploitation Probability Metric Proposed by NIST, CISA ResearchersΒ 

The Likely Exploited Vulnerabilities (LEV) equations can help augment KEV- and EPSS-based remediation prioritization. The post Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers appeared first on SecurityWeek.

Published on: May 20, 2025 | Source: SecurityWeek favicon SecurityWeek

Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit

SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes place as a virtual summit on Wednesday, May 21st. The post Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit appeared first on SecurityWeek.

Published on: May 20, 2025 | Source: SecurityWeek favicon SecurityWeek

TrustCloud Raises $15 Million for Security Assurance Platform

AI-native security assurance firm TrustCloud has raised $15 million in a strategic funding round led by ServiceNow Ventures. The post TrustCloud Raises $15 Million for Security Assurance Platform appeared first on SecurityWeek.

Published on: May 20, 2025 | Source: SecurityWeek favicon SecurityWeek

DoorDash Hack

A DoorDash driver stole over $2.5 million over several months: The driver, Sayee Chaitainya Reddy Devagiri, placed expensive orders from a fraudulent customer account in the DoorDash app. Then, using DoorDash employee credentials, he manually assigned the orders to driver accounts he and the others involved had created. Devagiri would then mark the undelivered orders as complete and prompt DoorDash’s system to pay the...

Published on: May 20, 2025 | Source: Schneier on Security favicon Schneier on Security

The Crowded Battle: Key Insights from the 2025 State of Pentesting Report

In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISOs from global enterprises (200 from within the USA) to understand the strategies, tactics, and tools they use to cope with the thousands of security alerts, the persisting breaches and the growing cyber risks they have to handle. The findings reveal a complex picture of progress, challenges, and a shifting mindset

Published on: May 20, 2025 | Source: The Hacker News favicon The Hacker News

β€˜Whatever we did was not enough’: How Salt Typhoon slipped through the government’s blind spots

Seven sources tell CyberScoop that a lack of coordination and miscommunication between federal agencies and the telecommunications industry left critical networks exposed to the Chinese hacking group. The post β€˜Whatever we did was not enough’: How Salt Typhoon slipped through the government’s blind spots appeared first on CyberScoop.

Published on: May 20, 2025 | Source: CyberScoop favicon CyberScoop

South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware

High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged as the target of a new campaign orchestrated by a threat actor known as SideWinder. "The attackers used spear phishing emails paired with geofenced payloads to ensure that only victims in specific countries received the malicious content," Acronis researchers Santiago Pontiroli, Jozsef Gegeny, and Prakas

Published on: May 20, 2025 | Source: The Hacker News favicon The Hacker News

CloudSEK Raises $19 Million for Threat Intelligence Platform

Threat protection and intelligence firm CloudSEK raises $19 million in funding from new and existing investors. The post CloudSEK Raises $19 Million for Threat Intelligence Platform appeared first on SecurityWeek.

Published on: May 20, 2025 | Source: SecurityWeek favicon SecurityWeek

O2 Service Vulnerability Exposed User Location

A vulnerability in O2’s implementation of the IMS standard resulted in user location data being exposed in network responses. The post O2 Service Vulnerability Exposed User Location appeared first on SecurityWeek.

Published on: May 20, 2025 | Source: SecurityWeek favicon SecurityWeek

Madhu Gottumukkala Officially Announced as CISA Deputy Director

New CISA Deputy Director Madhu Gottumukkala has joined the agency from South Dakota’s Bureau of Information and Technology. The post Madhu Gottumukkala Officially Announced as CISA Deputy Director appeared first on SecurityWeek.

Published on: May 20, 2025 | Source: SecurityWeek favicon SecurityWeek

Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization

Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed international organization in Saudi Arabia with a previously undocumented backdoor dubbed MarsSnake. ESET, which first discovered the hacking group's intrusions targeting the entity in March 2023 and again a year later, said the activity leverages spear-phishing emails using

Published on: May 20, 2025 | Source: The Hacker News favicon The Hacker News

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that's targeting publicly accessible Redis servers. The malicious activity has been codenamed RedisRaider by Datadog Security Labs. "RedisRaider aggressively scans randomized portions of the IPv4 space and uses legitimate Redis configuration commands to execute malicious cron jobs on vulnerable systems,"

Published on: May 20, 2025 | Source: The Hacker News favicon The Hacker News

Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts

Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act as checker tools to validate stolen email addresses against TikTok and Instagram APIs. All three packages are no longer available on PyPI. The names of the Python packages are below - checker-SaGaF (2,605 downloads) steinlurks (1,049 downloads) sinnercore (3,300 downloads)

Published on: May 20, 2025 | Source: The Hacker News favicon The Hacker News

'Operation RoundPress' Targets Ukraine in XSS Webmail Attacks

A cyber-espionage campaign is targeting Ukrainian government entities with a series of sophisticated spear-phishing attacks that exploit XSS vulnerabilities.

Published on: May 19, 2025 | Source: Dark Reading favicon Dark Reading

S. Dakota CIO Gottumukkala Signs on as CISA Deputy Director

The addition is an important hire for the No. 2 position at the cyber agency. The main director role remains unfilled post-Easterly, with Bridget Bean taking over acting duties for now.

Published on: May 19, 2025 | Source: Dark Reading favicon Dark Reading

Legal Aid Agency Warns Lawyers, Defendants on Data Breach

The online service has since been shut down as the agency grapples with the cyberattack, though it assures the public that those most in need of legal assistance will still be able to access help.

Published on: May 19, 2025 | Source: Dark Reading favicon Dark Reading

The who, where, and how of APT attacks in Q4 2024–Q1 2025

ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report

Published on: May 19, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

Federal cyber workforce training institute eyed in bipartisan House bill

The legislation comes amid DOGE-fueled cuts to CISA and warnings from lawmakers that Trump administration policies will cripple federal cyber recruiting. The post Federal cyber workforce training institute eyed in bipartisan House bill appeared first on CyberScoop.

Published on: May 19, 2025 | Source: CyberScoop favicon CyberScoop

Printer Company Procolored Served Infected Software for Months

Procolored’s public website served dozens of software downloads containing information stealer malware and a backdoor. The post Printer Company Procolored Served Infected Software for Months appeared first on SecurityWeek.

Published on: May 19, 2025 | Source: SecurityWeek favicon SecurityWeek