Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platform malware called OtterCookie with capabilities to steal credentials from web browsers and other files. NTT Security Holdings, which detailed the new findings, said the attackers have "actively and continuously" updated the malware, introducing versions v3 and v4 in
Published on: May 09, 2025 | Source:Noteworthy stories that might have slipped under the radar: surge in cyberattacks between India and Pakistan, Radware cloud WAF vulnerabilities, xAI key leak. The post In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak appeared first on SecurityWeek.
Published on: May 09, 2025 | Source:Supply chain attack compromises the popular rand-user-agent NPM package to deploy and activate a backdoor. The post Popular Scraping Toolβs NPM Package Compromised in Supply Chain Attack appeared first on SecurityWeek.
Published on: May 09, 2025 | Source:Your ultimate goal shouldn't be security perfection β it should be making exploitation of your organization unprofitable.
Published on: May 09, 2025 | Source:VMS firm Valsoft Corporation says the personal information of over 160,000 people was compromised in a February 2025 data breach. The post 160,000 Impacted by Valsoft Data Breach appeared first on SecurityWeek.
Published on: May 09, 2025 | Source:Three NPM packages posing as developer tools for Cursor AI code editorβs macOS version contain a backdoor. The post Malicious NPM Packages Target Cursor AIβs macOS Users appeared first on SecurityWeek.
Published on: May 09, 2025 | Source:Cybersecurity researchers are warning of a new campaign that's targeting Portuguese-speaking users in Brazil with trial versions of commercial remote monitoring and management (RMM) software since January 2025. "The spam message uses the Brazilian electronic invoice system, NF-e, as a lure to entice users into clicking hyperlinks and accessing malicious content hosted in Dropbox," Cisco Talos
Published on: May 09, 2025 | Source:AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences. But with this power comes new risks β like data leaks, identity theft, and malicious misuse. If your company is exploring or already using AI agents, you need to ask:Are they secure? AI agents work with sensitive data and make real-time decisions. If theyβre not
Published on: May 09, 2025 | Source:Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version of Cursor, a popular artificial intelligence (AI)-powered source code editor. "Disguised as developer tools offering 'the cheapest Cursor API,' these packages steal user credentials, fetch an encrypted payload from threat actor-controlled infrastructure, overwrite Cursor's
Published on: May 09, 2025 | Source:The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security teams. Capacity is limited and patching everything immediately is a struggle. Our Vulnerability Operation Center (VOC) dataset analysis identified 1,337,797 unique findings (security issues) across 68,500 unique customer assets. 32,585 of them were distinct
Published on: May 09, 2025 | Source:Hundreds of SAP NetWeaver instances hacked via a zero-day that allows remote code execution, not only arbitrary file uploads, as initially believed. The post SAP Zero-Day Targeted Since January, Many Sectors Impacted appeared first on SecurityWeek.
Published on: May 09, 2025 | Source:VC firm Insight Partners is informing partners and employees that their information was exposed in the January 2025 cyberattack. The post Company and Personal Data Compromised in Recent Insight Partners Hack appeared first on SecurityWeek.
Published on: May 09, 2025 | Source:Hereβs a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly
Published on: May 09, 2025 | Source:Private messages, Bitcoin addresses, victim data, and attacker information were leaked after someone hacked a LockBit admin panel. The post LockBit Ransomware Admin Panel Hacked, Leaks Reveal Inside Details appeared first on SecurityWeek.
Published on: May 09, 2025 | Source:Google on Thursday announced it's rolling out new artificial intelligence (AI)-powered countermeasures to combat scams across Chrome, Search, and Android. The tech giant said it will begin using Gemini Nano, its on-device large language model (LLM), to improve Safe Browsing in Chrome 137 on desktops. "The on-device approach provides instant insight on risky websites and allows us to offer
Published on: May 09, 2025 | Source:A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver. Forescout Vedere Labs, in a report published Thursday, said it uncovered a malicious infrastructure likely associated with the hacking group weaponizing CVE-2025-31324 (CVSS score: 10.0) since April 29, 2025. CVE-2025-31324 refers to a critical SAP NetWeaver flaw
Published on: May 09, 2025 | Source:Heβs the latest Democrat who sits on an appropriations panel to sharply criticize CISA personnel reductions and proposed funding cuts. The post Sen. Murphy: Trump administration has βillegally gutted funding for cybersecurityβ appeared first on CyberScoop.
Published on: May 08, 2025 | Source:Three vulnerabilities in SMA 100 gateways could facilitate root RCE attacks, and one of the vulnerabilities has already been exploited in the wild.
Published on: May 08, 2025 | Source:Cyber-insurance carrier Coalition said business email compromise and funds transfer fraud accounted for 60% of claims in 2024.
Published on: May 08, 2025 | Source:Four different countries, including the United States and Germany, were included in the latest international operation alongside Europol's support.
Published on: May 08, 2025 | Source:British startup exits stealth with $20 million in seed-stage financing led by US investors Scout Ventures and Artis Ventures. The post Valarian Bags $20M Seed Capital for βIsolation-Firstβ Infrastructure Tech appeared first on SecurityWeek.
Published on: May 08, 2025 | Source:Despite all MITRE has done for cybersecurity, it is clear we should not wait 11 months to discuss the future of the CVE database. It's simply too important for that.
Published on: May 08, 2025 | Source:61% of security leaders reported suffering a breach due to failed or misconfigured controls over the past 12 months. This is despite having an average of 43 cybersecurity tools in place. This massive rate of security failure is clearly not a security investment problem. It is a configuration problem. Organizations are beginning to understand that a security control installed or deployed is not
Published on: May 08, 2025 | Source:SonicWall has released patches to address three security flaws affecting SMA 100 Secure Mobile Access (SMA) appliances that could be fashioned to result in remote code execution. The vulnerabilities are listed below - CVE-2025-32819 (CVSS score: 8.8) - A vulnerability in SMA100 allows a remote authenticated attacker with SSL-VPN user privileges to bypass the path traversal checks and delete an
Published on: May 08, 2025 | Source:Four people have been arrested in Poland and several websites associated with DDoS-for-hire services have been shut down. The post Europol Announces More DDoS Service Takedowns, Arrests appeared first on SecurityWeek.
Published on: May 08, 2025 | Source:Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader codenamed NETXLOADER as part of a campaign observed in November 2024. "NETXLOADER is a new .NET-based loader that plays a critical role in cyber attacks," Trend Micro researchers Jacob Santos, Raymart Yambot, John Rainier Navato, Sarah Pearl
Published on: May 08, 2025 | Source:Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader codenamed NETXLOADER as part of a campaign observed in November 2024. "NETXLOADER is a new .NET-based loader that plays a critical role in cyber attacks," Trend Micro researchers Jacob Santos, Raymart Yambot, John Rainier Navato, Sarah Pearl
Published on: May 08, 2025 | Source:SonicWall patches three SMA 100 vulnerabilities, including a potential zero-day, that could be chained to execute arbitrary code remotely. The post Possible Zero-Day Patched in SonicWall SMA Appliances appeared first on SecurityWeek.
Published on: May 08, 2025 | Source:Russia-linked APT Star Blizzard is using the ClickFix technique in recent attacks distributing the LostKeys malware. The post Russia-Linked APT Star Blizzard Uses ClickFix to Deploy New LostKeys Malware, Google Warns appeared first on SecurityWeek.
Published on: May 08, 2025 | Source:The nation-state threat actor known as MirrorFace has been observed deploying malware dubbed ROAMINGMOUSE as part of a cyber espionage campaign directed against government agencies and public institutions in Japan and Taiwan. The activity, detected by Trend Micro in March 2025, involved the use of spear-phishing lures to deliver an updated version of a backdoor called ANEL. "The ANEL file from
Published on: May 08, 2025 | Source:Cisco releases patches for 26 vulnerabilities in IOS and IOS XE software, including 17 critical- and high-severity bugs. The post Cisco Patches 35 Vulnerabilities Across Several Products appeared first on SecurityWeek.
Published on: May 08, 2025 | Source:SysAid patches IT service management software vulnerabilities that can be chained for unauthenticated remote command execution. The post Dozens of SysAid Instances Vulnerable to Remote Hacking appeared first on SecurityWeek.
Published on: May 08, 2025 | Source:Health technology and consumer electronics firm Masimo detected unauthorized activity on its network in late April. The post Masimo Manufacturing Facilities Hit by Cyberattack appeared first on SecurityWeek.
Published on: May 08, 2025 | Source:The Russia-linked threat actor known as COLDRIVER has been observed distributing a new malware called LOSTKEYS as part of an espionage-focused campaign using ClickFix-like social engineering lures. "LOSTKEYS is capable of stealing files from a hard-coded list of extensions and directories, along with sending system information and running processes to the attacker," the Google Threat
Published on: May 08, 2025 | Source:The Iranian state-backed group targeted the operational technology of a critical national infrastructure (CNI) network and persisted in its network for years, but ultimately failed.
Published on: May 08, 2025 | Source: