Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platform malware called OtterCookie with capabilities to steal credentials from web browsers and other files. NTT Security Holdings, which detailed the new findings, said the attackers have "actively and continuously" updated the malware, introducing versions v3 and v4 in

Published on: May 09, 2025 | Source: The Hacker News favicon The Hacker News

In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak

Noteworthy stories that might have slipped under the radar: surge in cyberattacks between India and Pakistan, Radware cloud WAF vulnerabilities, xAI key leak. The post In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak appeared first on SecurityWeek.

Published on: May 09, 2025 | Source: SecurityWeek favicon SecurityWeek

Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack

Supply chain attack compromises the popular rand-user-agent NPM package to deploy and activate a backdoor. The post Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack appeared first on SecurityWeek.

Published on: May 09, 2025 | Source: SecurityWeek favicon SecurityWeek

How Security Has Changed the Hacker Marketplace

Your ultimate goal shouldn't be security perfection β€” it should be making exploitation of your organization unprofitable.

Published on: May 09, 2025 | Source: Dark Reading favicon Dark Reading

160,000 Impacted by Valsoft Data Breach

VMS firm Valsoft Corporation says the personal information of over 160,000 people was compromised in a February 2025 data breach. The post 160,000 Impacted by Valsoft Data Breach appeared first on SecurityWeek.

Published on: May 09, 2025 | Source: SecurityWeek favicon SecurityWeek

Malicious NPM Packages Target Cursor AI’s macOS Users

Three NPM packages posing as developer tools for Cursor AI code editor’s macOS version contain a backdoor. The post Malicious NPM Packages Target Cursor AI’s macOS Users appeared first on SecurityWeek.

Published on: May 09, 2025 | Source: SecurityWeek favicon SecurityWeek

Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials

Cybersecurity researchers are warning of a new campaign that's targeting Portuguese-speaking users in Brazil with trial versions of commercial remote monitoring and management (RMM) software since January 2025. "The spam message uses the Brazilian electronic invoice system, NF-e, as a lure to entice users into clicking hyperlinks and accessing malicious content hosted in Dropbox," Cisco Talos

Published on: May 09, 2025 | Source: The Hacker News favicon The Hacker News

Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business

AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences. But with this power comes new risks β€” like data leaks, identity theft, and malicious misuse. If your company is exploring or already using AI agents, you need to ask:Are they secure? AI agents work with sensitive data and make real-time decisions. If they’re not

Published on: May 09, 2025 | Source: The Hacker News favicon The Hacker News

Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials

Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version of Cursor, a popular artificial intelligence (AI)-powered source code editor. "Disguised as developer tools offering 'the cheapest Cursor API,' these packages steal user credentials, fetch an encrypted payload from threat actor-controlled infrastructure, overwrite Cursor's

Published on: May 09, 2025 | Source: The Hacker News favicon The Hacker News

Beyond Vulnerability Management – Can You CVE What I CVE?

The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security teams. Capacity is limited and patching everything immediately is a struggle. Our Vulnerability Operation Center (VOC) dataset analysis identified 1,337,797 unique findings (security issues) across 68,500 unique customer assets. 32,585 of them were distinct

Published on: May 09, 2025 | Source: The Hacker News favicon The Hacker News

SAP Zero-Day Targeted Since January, Many Sectors ImpactedΒ 

Hundreds of SAP NetWeaver instances hacked via a zero-day that allows remote code execution, not only arbitrary file uploads, as initially believed. The post SAP Zero-Day Targeted Since January, Many Sectors Impacted appeared first on SecurityWeek.

Published on: May 09, 2025 | Source: SecurityWeek favicon SecurityWeek

Company and Personal Data Compromised in Recent Insight Partners HackΒ 

VC firm Insight Partners is informing partners and employees that their information was exposed in the January 2025 cyberattack. The post Company and Personal Data Compromised in Recent Insight Partners Hack appeared first on SecurityWeek.

Published on: May 09, 2025 | Source: SecurityWeek favicon SecurityWeek

Catching a phish with many faces

Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly

Published on: May 09, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

LockBit Ransomware Admin Panel Hacked, Leaks Reveal Inside Details

Private messages, Bitcoin addresses, victim data, and attacker information were leaked after someone hacked a LockBit admin panel. The post LockBit Ransomware Admin Panel Hacked, Leaks Reveal Inside Details appeared first on SecurityWeek.

Published on: May 09, 2025 | Source: SecurityWeek favicon SecurityWeek

Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android

Google on Thursday announced it's rolling out new artificial intelligence (AI)-powered countermeasures to combat scams across Chrome, Search, and Android. The tech giant said it will begin using Gemini Nano, its on-device large language model (LLM), to improve Safe Browsing in Chrome 137 on desktops. "The on-device approach provides instant insight on risky websites and allows us to offer

Published on: May 09, 2025 | Source: The Hacker News favicon The Hacker News

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver. Forescout Vedere Labs, in a report published Thursday, said it uncovered a malicious infrastructure likely associated with the hacking group weaponizing CVE-2025-31324 (CVSS score: 10.0) since April 29, 2025. CVE-2025-31324 refers to a critical SAP NetWeaver flaw

Published on: May 09, 2025 | Source: The Hacker News favicon The Hacker News

Sen. Murphy: Trump administration has β€˜illegally gutted funding for cybersecurity’

He’s the latest Democrat who sits on an appropriations panel to sharply criticize CISA personnel reductions and proposed funding cuts. The post Sen. Murphy: Trump administration has β€˜illegally gutted funding for cybersecurity’ appeared first on CyberScoop.

Published on: May 08, 2025 | Source: CyberScoop favicon CyberScoop

SonicWall Issues Patch for Exploit Chain in SMA Devices

Three vulnerabilities in SMA 100 gateways could facilitate root RCE attacks, and one of the vulnerabilities has already been exploited in the wild.

Published on: May 08, 2025 | Source: Dark Reading favicon Dark Reading

Email-Based Attacks Top Cyber-Insurance Claims

Cyber-insurance carrier Coalition said business email compromise and funds transfer fraud accounted for 60% of claims in 2024.

Published on: May 08, 2025 | Source: Dark Reading favicon Dark Reading

Operation PowerOFF Takes Down 9 DDoS-for-Hire Domains

Four different countries, including the United States and Germany, were included in the latest international operation alongside Europol's support.

Published on: May 08, 2025 | Source: Dark Reading favicon Dark Reading

Valarian Bags $20M Seed Capital for β€˜Isolation-First’ Infrastructure Tech

British startup exits stealth with $20 million in seed-stage financing led by US investors Scout Ventures and Artis Ventures. The post Valarian Bags $20M Seed Capital for β€˜Isolation-First’ Infrastructure Tech appeared first on SecurityWeek.

Published on: May 08, 2025 | Source: SecurityWeek favicon SecurityWeek

Life Without CVEs? It's Time to Act

Despite all MITRE has done for cybersecurity, it is clear we should not wait 11 months to discuss the future of the CVE database. It's simply too important for that.

Published on: May 08, 2025 | Source: Dark Reading favicon Dark Reading

Security Tools Alone Don't Protect You β€” Control Effectiveness Does

61% of security leaders reported suffering a breach due to failed or misconfigured controls over the past 12 months. This is despite having an average of 43 cybersecurity tools in place. This massive rate of security failure is clearly not a security investment problem. It is a configuration problem. Organizations are beginning to understand that a security control installed or deployed is not

Published on: May 08, 2025 | Source: The Hacker News favicon The Hacker News

SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

SonicWall has released patches to address three security flaws affecting SMA 100 Secure Mobile Access (SMA) appliances that could be fashioned to result in remote code execution. The vulnerabilities are listed below - CVE-2025-32819 (CVSS score: 8.8) - A vulnerability in SMA100 allows a remote authenticated attacker with SSL-VPN user privileges to bypass the path traversal checks and delete an

Published on: May 08, 2025 | Source: The Hacker News favicon The Hacker News

Europol Announces More DDoS Service Takedowns, Arrests

Four people have been arrested in Poland and several websites associated with DDoS-for-hire services have been shut down. The post Europol Announces More DDoS Service Takedowns, Arrests appeared first on SecurityWeek.

Published on: May 08, 2025 | Source: SecurityWeek favicon SecurityWeek

Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures

Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader codenamed NETXLOADER as part of a campaign observed in November 2024. "NETXLOADER is a new .NET-based loader that plays a critical role in cyber attacks," Trend Micro researchers Jacob Santos, Raymart Yambot, John Rainier Navato, Sarah Pearl

Published on: May 08, 2025 | Source: The Hacker News favicon The Hacker News

Qilin Ransomware Ranked Highest in April 2025 with 72 Data Leak Disclosures

Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader codenamed NETXLOADER as part of a campaign observed in November 2024. "NETXLOADER is a new .NET-based loader that plays a critical role in cyber attacks," Trend Micro researchers Jacob Santos, Raymart Yambot, John Rainier Navato, Sarah Pearl

Published on: May 08, 2025 | Source: The Hacker News favicon The Hacker News

Possible Zero-Day Patched in SonicWall SMA Appliances

SonicWall patches three SMA 100 vulnerabilities, including a potential zero-day, that could be chained to execute arbitrary code remotely. The post Possible Zero-Day Patched in SonicWall SMA Appliances appeared first on SecurityWeek.

Published on: May 08, 2025 | Source: SecurityWeek favicon SecurityWeek

Russia-Linked APT Star Blizzard Uses ClickFix to Deploy New LostKeys Malware, Google Warns

Russia-linked APT Star Blizzard is using the ClickFix technique in recent attacks distributing the LostKeys malware. The post Russia-Linked APT Star Blizzard Uses ClickFix to Deploy New LostKeys Malware, Google Warns appeared first on SecurityWeek.

Published on: May 08, 2025 | Source: SecurityWeek favicon SecurityWeek

MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware

The nation-state threat actor known as MirrorFace has been observed deploying malware dubbed ROAMINGMOUSE as part of a cyber espionage campaign directed against government agencies and public institutions in Japan and Taiwan. The activity, detected by Trend Micro in March 2025, involved the use of spear-phishing lures to deliver an updated version of a backdoor called ANEL. "The ANEL file from

Published on: May 08, 2025 | Source: The Hacker News favicon The Hacker News

Cisco Patches 35 Vulnerabilities Across Several Products

Cisco releases patches for 26 vulnerabilities in IOS and IOS XE software, including 17 critical- and high-severity bugs. The post Cisco Patches 35 Vulnerabilities Across Several Products appeared first on SecurityWeek.

Published on: May 08, 2025 | Source: SecurityWeek favicon SecurityWeek

Dozens of SysAid Instances Vulnerable to Remote Hacking

SysAid patches IT service management software vulnerabilities that can be chained for unauthenticated remote command execution. The post Dozens of SysAid Instances Vulnerable to Remote Hacking appeared first on SecurityWeek.

Published on: May 08, 2025 | Source: SecurityWeek favicon SecurityWeek

Masimo Manufacturing Facilities Hit by Cyberattack

Health technology and consumer electronics firm Masimo detected unauthorized activity on its network in late April. The post Masimo Manufacturing Facilities Hit by Cyberattack appeared first on SecurityWeek.

Published on: May 08, 2025 | Source: SecurityWeek favicon SecurityWeek

Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware

The Russia-linked threat actor known as COLDRIVER has been observed distributing a new malware called LOSTKEYS as part of an espionage-focused campaign using ClickFix-like social engineering lures. "LOSTKEYS is capable of stealing files from a hard-coded list of extensions and directories, along with sending system information and running processes to the attacker," the Google Threat

Published on: May 08, 2025 | Source: The Hacker News favicon The Hacker News

'Lemon Sandstorm' Underscores Risks to Middle East Infrastructure

The Iranian state-backed group targeted the operational technology of a critical national infrastructure (CNI) network and persisted in its network for years, but ultimately failed.

Published on: May 08, 2025 | Source: Dark Reading favicon Dark Reading