Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

NVIDIA Patches Critical RCE Vulnerability Chain

The flaws in the company's Triton Inference Server enables model theft, data leaks, and response manipulation.

Published on: August 04, 2025 | Source: Dark Reading favicon Dark Reading

Nvidia Patches Critical RCE Vulnerability Chain

The flaws in the company's Triton Inference Server enables model theft, data leaks, and response manipulation.

Published on: August 04, 2025 | Source: Dark Reading favicon Dark Reading

AI company Perplexity is sneaking to get around blocks on crawlers, Cloudflare alleges

Cloudflare said it received complaints from customers about Perplexity using stealthy tactics to evade network blocks against systematic browsing and scraping of web pages. The post AI company Perplexity is sneaking to get around blocks on crawlers, Cloudflare alleges appeared first on CyberScoop.

Published on: August 04, 2025 | Source: CyberScoop favicon CyberScoop

CISA & FEMA Announce $100M+ in Community Cybersecurity Grants

The grants are intended to help states, tribes, and localities enhance their cybersecurity resilience by providing them with monetary resources to reduce risks and implement new procedures.

Published on: August 04, 2025 | Source: Dark Reading favicon Dark Reading

MacOS Under Attack: How Organizations Can Counter Rising Threats

Not only are attacks against macOS users ramping up, but threat actors have proved to be advanced with deepfake technology. Security awareness training may be the best defense.

Published on: August 04, 2025 | Source: Dark Reading favicon Dark Reading

Threat Actors Increasingly Leaning on GenAI Tools

From "eCrime" actors to fake IT tech workers, CrowdStrike researchers found that adversaries are using AI to enhance their offensive cyber operations.

Published on: August 04, 2025 | Source: Dark Reading favicon Dark Reading

Darktrace Acquires Mira Security

Published on: August 04, 2025 | Source: Dark Reading favicon Dark Reading

β€˜Highly evasive’ Vietnamese-speaking hackers stealing data from thousands of victims in 62+ nations

SentinelOne and Beazley Security say the group has been evolving its techniques of late, all with the goal of making money off stolen data. The post β€˜Highly evasive’ Vietnamese-speaking hackers stealing data from thousands of victims in 62+ nations appeared first on CyberScoop.

Published on: August 04, 2025 | Source: CyberScoop favicon CyberScoop

Details emerge on BlackSuit ransomware takedown

The Russian cybercrime group attacked more than 180 organizations before members abandoned the brand and dispersed to new ransomware groups earlier this year. The post Details emerge on BlackSuit ransomware takedown appeared first on CyberScoop.

Published on: August 04, 2025 | Source: CyberScoop favicon CyberScoop

Nvidia Triton Vulnerabilities Pose Big Risk to AI Models

Nvidia has patched over a dozen vulnerabilities in Triton Inference Server, including another set of vulnerabilities that threaten AI systems. The post Nvidia Triton Vulnerabilities Pose Big Risk to AI Models appeared first on SecurityWeek.

Published on: August 04, 2025 | Source: SecurityWeek favicon SecurityWeek

NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers

A newly disclosed set of security flaws in NVIDIA's Triton Inference Server for Windows and Linux, an open-source platform for running artificial intelligence (AI) models at scale, could be exploited to take over susceptible servers. "When chained together, these flaws can potentially allow a remote, unauthenticated attacker to gain complete control of the server, achieving remote code execution

Published on: August 04, 2025 | Source: The Hacker News favicon The Hacker News

Akira Ramps Up Assault on SonicWall Firewalls, Suggesting Zero-Day

An uptick of ransomware activity by the group in late July that uses the vendor's SSL VPN devices for initial intrusion shows evidence of an as-yet-undisclosed flaw under exploitation.

Published on: August 04, 2025 | Source: Dark Reading favicon Dark Reading

Turning Human Vulnerability Into Organizational Strength

Investing in building a human-centric defense involves a combination of adaptive security awareness training, a vigilant and skeptical culture, and the deployment of layered technical controls.

Published on: August 04, 2025 | Source: Dark Reading favicon Dark Reading

Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally

Cybersecurity researchers are calling attention to a new wave of campaigns distributing a Python-based information stealer called PXA Stealer. The malicious activity has been assessed to be the work of Vietnamese-speaking cybercriminals who monetize the stolen data through a subscription-based underground ecosystem that automates the resale and reuse via Telegram APIs, according to a joint

Published on: August 04, 2025 | Source: The Hacker News favicon The Hacker News

US Announces $100 Million for State, Local and Tribal Cybersecurity

CISA and FEMA announced two grants of more than $100 million for state, local, and tribal governments looking to improve cybersecurity. The post US Announces $100 Million for State, Local and Tribal Cybersecurity appeared first on SecurityWeek.

Published on: August 04, 2025 | Source: SecurityWeek favicon SecurityWeek

AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points

Cisco’s latest jailbreak method reveals just how easily sensitive data can be extracted from chatbots trained on proprietary or copyrighted content. The post AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points appeared first on SecurityWeek.

Published on: August 04, 2025 | Source: SecurityWeek favicon SecurityWeek

Sean Cairncross Confirmed by Senate as National Cyber Director

The US Senate voted to confirm Sean Cairncross as the National Cyber Director, five months after nominalization. The post Sean Cairncross Confirmed by Senate as National Cyber Director appeared first on SecurityWeek.

Published on: August 04, 2025 | Source: SecurityWeek favicon SecurityWeek

⚑ Weekly Recap: VPN 0-Day, Encryption Backdoor, AI Malware, macOS Flaw, ATM Hack & More

Malware isn’t just trying to hide anymoreβ€”it’s trying to belong. We’re seeing code that talks like us, logs like us, even documents itself like a helpful teammate. Some threats now look more like developer tools than exploits. Others borrow trust from open-source platforms, or quietly build themselves out of AI-written snippets. It’s not just about being maliciousβ€”it’s about being believable.

Published on: August 04, 2025 | Source: The Hacker News favicon The Hacker News

First Sentencing in Scheme to Help North Koreans Infiltrate US Companies

An Arizona woman was sentenced to eight-and-a-half years in prison for her role helping North Korean workers infiltrate US companies by pretending to be US workers. From an article: According to court documents, Chapman hosted the North Korean IT workers’ computers in her own home between October 2020 and October 2023, creating a so-called β€œlaptop farm” which was used to make it appear as though the devices were...

Published on: August 04, 2025 | Source: Schneier on Security favicon Schneier on Security

Man-in-the-Middle Attack Prevention Guide

Some of the most devastating cyberattacks don’t rely on brute force, but instead succeed through stealth. These quiet intrusions often go unnoticed until long after the attacker has disappeared. Among the most insidious are man-in-the-middle (MITM) attacks, where criminals exploit weaknesses in communication protocols to silently position themselves between two unsuspecting parties

Published on: August 04, 2025 | Source: The Hacker News favicon The Hacker News

New β€˜Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft

Cybersecurity researchers have flagged a previously undocumented Linux backdoor dubbed Plague that has managed to evade detection for a year. "The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system authentication and gain persistent SSH access," Nextron Systems researcher Pierre-Henri Pezier said. Pluggable Authentication Modules

Published on: August 04, 2025 | Source: The Hacker News favicon The Hacker News

Northwest Radiologists Data Breach Impacts 350,000 Washingtonians

Northwest Radiologists says the personal information of 350,000 Washington State residents was stolen in a January 2025 data breach. The post Northwest Radiologists Data Breach Impacts 350,000 Washingtonians appeared first on SecurityWeek.

Published on: August 04, 2025 | Source: SecurityWeek favicon SecurityWeek

The Wild West of Shadow IT

Everyone’s an IT decision-maker now. The employees in your organization can install a plugin with just one click, and they don’t need to clear it with your team first. It’s great for productivity, but it’s a serious problem for your security posture. When the floodgates of SaaS and AI opened, IT didn’t just get democratized, its security got outpaced. Employees are onboarding apps faster than

Published on: August 04, 2025 | Source: The Hacker News favicon The Hacker News

Several Vulnerabilities Patched in AI Code Editor CursorΒ 

Attackers could silently modify sensitive MCP files to trigger the execution of arbitrary code without requiring user approval. The post Several Vulnerabilities Patched in AI Code Editor Cursor appeared first on SecurityWeek.

Published on: August 04, 2025 | Source: SecurityWeek favicon SecurityWeek

Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities

Illumina will pay $9.8 million to settle accusations that products provided to the US government were affected by cybersecurity flaws. The post Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities appeared first on SecurityWeek.

Published on: August 04, 2025 | Source: SecurityWeek favicon SecurityWeek

CrowdStrike investigated 320 North Korean IT worker cases in the past year

Threat hunters saw North Korean operatives almost daily, reflecting a 220% year-over-year increase in activity, CrowdStrike said in a new report. The post CrowdStrike investigated 320 North Korean IT worker cases in the past year appeared first on CyberScoop.

Published on: August 04, 2025 | Source: CyberScoop favicon CyberScoop

PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads

Cybersecurity researchers have discovered a nascent Android remote access trojan (RAT) called PlayPraetor that has infected more than 11,000 devices, primarily across Portugal, Spain, France, Morocco, Peru, and Hong Kong. "The botnet's rapid growth, which now exceeds 2,000 new infections per week, is driven by aggressive campaigns focusing on Spanish and French speakers, indicating a strategic

Published on: August 04, 2025 | Source: The Hacker News favicon The Hacker News

Senate confirms national cyber director pick Sean Cairncross

The president selected the former RNC, White House and Millennium Challenge Corporation official for the job in February. The post Senate confirms national cyber director pick Sean Cairncross appeared first on CyberScoop.

Published on: August 03, 2025 | Source: CyberScoop favicon CyberScoop

CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign

Telecommunications organizations in Southeast Asia have been targeted by a state-sponsored threat actor known as CL-STA-0969 to facilitate remote control over compromised networks. Palo Alto Networks Unit 42 said it observed multiple incidents in the region, including one aimed at critical telecommunications infrastructure between February and November 2024. The attacks are characterized by the

Published on: August 02, 2025 | Source: The Hacker News favicon The Hacker News

What Is the Role of Provable Randomness in Cybersecurity?

Random numbers are the cornerstone of cryptographic security. As organizations adopt quantum-resistant algorithms, it's equally important to examine the randomness underpinning them.

Published on: August 01, 2025 | Source: Dark Reading favicon Dark Reading

Friday Squid Blogging: A Case of Squid Fossil Misidentification

What scientists thought were squid fossils were actually arrow worms.

Published on: August 01, 2025 | Source: Schneier on Security favicon Schneier on Security

Cursor’s AI coding agent morphed β€˜into local shell’ with one-line prompt attack

The flaw, disclosed a month after it was patched, provided an attacker with remote code execution privileges by poisoning the data ingested by the model. The post Cursor’s AI coding agent morphed β€˜into local shell’ with one-line prompt attack appeared first on CyberScoop.

Published on: August 01, 2025 | Source: CyberScoop favicon CyberScoop

Social engineering attacks surged this past year, Palo Alto Networks report finds

Unit 42 said social engineering β€” the method of choice for groups as diverse as Scattered Spider and North Korean tech workers β€” was the top initial attack vector over the past year. The post Social engineering attacks surged this past year, Palo Alto Networks report finds appeared first on CyberScoop.

Published on: August 01, 2025 | Source: CyberScoop favicon CyberScoop

Dark Reading News Desk Turns 10, Back at Black Hat USA for 2025

Dark Reading's 2025 News Desk marks a decade of Black Hat USA memories. We're making our return with a slate of interviews that help you stay up on the latest research from Black Hat β€” no trip to Las Vegas required.

Published on: August 01, 2025 | Source: Dark Reading favicon Dark Reading