Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

⚡ Weekly Recap: Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and More

Attackers aren’t waiting for patches anymore — they are breaking in before defenses are ready. Trusted security tools are being hijacked to deliver malware. Even after a breach is detected and patched, some attackers stay hidden. This week’s events show a hard truth: it’s not enough to react after an attack. You have to assume that any system you trust today could fail tomorrow. In a world

Published on: April 14, 2025 | Source: The Hacker News favicon The Hacker News

China Sort of Admits to Being Behind Volt Typhoon

The Wall Street Journal has the story: Chinese officials acknowledged in a secret December meeting that Beijing was behind a widespread series of alarming cyberattacks on U.S. infrastructure, according to people familiar with the matter, underscoring how hostilities between the two superpowers are continuing to escalate. The Chinese delegation linked years of intrusions into computer networks at U.S. ports, water...

Published on: April 14, 2025 | Source: Schneier on Security favicon Schneier on Security

Malicious NPM Packages Target Cryptocurrency, PayPal Users

Threat actors are publishing malicious NPM packages to steal PayPal credentials and hijack cryptocurrency transfers. The post Malicious NPM Packages Target Cryptocurrency, PayPal Users appeared first on SecurityWeek.

Published on: April 14, 2025 | Source: SecurityWeek favicon SecurityWeek

Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind

AI is changing cybersecurity faster than many defenders realize. Attackers are already using AI to automate reconnaissance, generate sophisticated phishing lures, and exploit vulnerabilities before security teams can react. Meanwhile, defenders are overwhelmed by massive amounts of data and alerts, struggling to process information quickly enough to identify real threats. AI offers a way to

Published on: April 14, 2025 | Source: The Hacker News favicon The Hacker News

Is Ivanti the problem or a symptom of a systemic issue with network devices?

Exploited vulnerabilities have turned up in Ivanti products 16 times since 2024. That’s more than any other vendor in the network edge device space. The post Is Ivanti the problem or a symptom of a systemic issue with network devices? appeared first on CyberScoop.

Published on: April 14, 2025 | Source: CyberScoop favicon CyberScoop

Attacks on the education sector are surging: How can cyber-defenders respond?

Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What's the right antidote to cyber-risk?

Published on: April 14, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT

A threat actor with ties to Pakistan has been observed targeting various sectors in India with various remote access trojans like Xeno RAT, Spark RAT, and a previously undocumented malware family called CurlBack RAT. The activity, detected by SEQRITE in December 2024, targeted Indian entities under railway, oil and gas, and external affairs ministries, marking an expansion of the hacking crew's

Published on: April 14, 2025 | Source: The Hacker News favicon The Hacker News

Morocco Investigates Social Security Agency Data Leak

A threat actor has claimed responsibility for the alleged politically motivated attack and has uploaded the stolen data to a Dark Web forum.

Published on: April 14, 2025 | Source: Dark Reading favicon Dark Reading

Rep. Swalwell demands Hill briefing on planned CISA personnel cuts

The top Democrat on a cybersecurity subcommittee says the “drastic reorganization” obligates CISA’s acting director to discuss its plans with lawmakers. The post Rep. Swalwell demands Hill briefing on planned CISA personnel cuts appeared first on CyberScoop.

Published on: April 11, 2025 | Source: CyberScoop favicon CyberScoop

Pall Mall Process Progresses but Leads to More Questions

Nations continue to sign the Code of Practice for States in an effort to curb commercial spyware, yet implementation and enforcement concerns have yet to be figured out.

Published on: April 11, 2025 | Source: Dark Reading favicon Dark Reading

Paper Werewolf Threat Actor Targets Flash Drives With New Malware

The threat actor, also known as Goffee, has been active since at least 2022 and has changed its tactics and techniques over the years while targeting Russian organizations.

Published on: April 11, 2025 | Source: Dark Reading favicon Dark Reading

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used to breach the devices was patched. The attackers are believed to have leveraged known and now-patched security flaws, including, but not limited to, CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762. "A threat actor used a known

Published on: April 11, 2025 | Source: The Hacker News favicon The Hacker News

Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle

The CVE-2025-22457 has already been exploited by a China-nexus hacking gang notorious for breaking into edge network devices. The post Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle appeared first on SecurityWeek.

Published on: April 11, 2025 | Source: SecurityWeek favicon SecurityWeek

Financial Fraud, With a Third-Party Twist, Dominates Cyber Claims

The most damaging attacks continue to be ransomware, but financial fraud claims are more numerous — and both are driven by increasing third-party breaches.

Published on: April 11, 2025 | Source: Dark Reading favicon Dark Reading

Hackers Breach Morocco’s Social Security Database

The hackers who posted the documents on Telegram said the attack was in response to alleged Moroccan “harassment” of Algeria on social media platforms. The post Hackers Breach Morocco’s Social Security Database appeared first on SecurityWeek.

Published on: April 11, 2025 | Source: SecurityWeek favicon SecurityWeek

Using Third-Party ID Providers Without Losing Zero Trust

With $4.4 billion in worldwide data breach fines in 2024, the cost of not knowing who's walking into your systems is devastating.

Published on: April 11, 2025 | Source: Dark Reading favicon Dark Reading

Organizations Lack Incident Response Plans, but Answers Are on the Way

Developing strong incident response plans remains an area that requires significant improvement. Here are some shortcomings and how to address them.

Published on: April 11, 2025 | Source: Dark Reading favicon Dark Reading

Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors

The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul. The activity, which took place between July and December 2024, singled out organizations in the mass media, telecommunications, construction, government entities, and energy sectors, Kaspersky said in a new report published Thursday. Paper Werewolf, also known

Published on: April 11, 2025 | Source: The Hacker News favicon The Hacker News

10 Bugs Found in Perplexity AI's Chatbot Android App

Researchers characterize the company's artificial intelligence chatbot as less secure than ChatGPT and even DeepSeek.

Published on: April 11, 2025 | Source: Dark Reading favicon Dark Reading

Vulnerability in OttoKit WordPress Plugin Exploited in the Wild

A vulnerability in the OttoKit WordPress plugin with over 100,000 active installations has been exploited in the wild. The post Vulnerability in OttoKit WordPress Plugin Exploited in the Wild appeared first on SecurityWeek.

Published on: April 11, 2025 | Source: SecurityWeek favicon SecurityWeek

In Other News: Scattered Spider Still Active, EncryptHub Unmasked, Rydox Extraditions

Noteworthy stories that might have slipped under the radar: Scattered Spider still active despite arrests, hacker known as EncryptHub unmasked, Rydox admins extradited to US. The post In Other News: Scattered Spider Still Active, EncryptHub Unmasked, Rydox Extraditions appeared first on SecurityWeek.

Published on: April 11, 2025 | Source: SecurityWeek favicon SecurityWeek

Friday Squid Blogging: Squid and Efficient Solar Tech

Researchers are trying to use squid color-changing biochemistry for solar tech. This appears to be new and related research to a 2019 squid post. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Published on: April 11, 2025 | Source: Schneier on Security favicon Schneier on Security

AI Vulnerability Finding

Microsoft is reporting that its AI systems are able to find new vulnerabilities in source code: Microsoft discovered eleven vulnerabilities in GRUB2, including integer and buffer overflows in filesystem parsers, command flaws, and a side-channel in cryptographic comparison. Additionally, 9 buffer overflows in parsing SquashFS, EXT4, CramFS, JFFS2, and symlinks were discovered in U-Boot and Barebox, which require...

Published on: April 11, 2025 | Source: Schneier on Security favicon Schneier on Security

1.6 Million People Impacted by Data Breach at Laboratory Services Cooperative

Laboratory Services Cooperative says the personal and medical information of 1.6 million was stolen in an October 2024 data breach. The post 1.6 Million People Impacted by Data Breach at Laboratory Services Cooperative appeared first on SecurityWeek.

Published on: April 11, 2025 | Source: SecurityWeek favicon SecurityWeek

Initial Access Brokers Shift Tactics, Selling More for Less

What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that access to other cybercriminals. This division of labor allows IABs to concentrate on their core expertise: exploiting vulnerabilities through methods like social engineering and brute-force attacks. By selling access, they significantly mitigate the

Published on: April 11, 2025 | Source: The Hacker News favicon The Hacker News

China Admitted to Volt Typhoon Cyberattacks on US Critical Infrastructure: Report

In a secret meeting between Chinese and US officials, the former confirmed conducting cyberattacks on US infrastructure. The post China Admitted to Volt Typhoon Cyberattacks on US Critical Infrastructure: Report appeared first on SecurityWeek.

Published on: April 11, 2025 | Source: SecurityWeek favicon SecurityWeek

Rising Tides: Bryson Bort on Cyber Entrepreneurship and the Needed Focus on Critical Infrastructure

Very few people in the cybersecurity industry do not know, or know of, Bryson Bort, CEO/Founder of SCYTHE and the co-founder of ICS Village. The post Rising Tides: Bryson Bort on Cyber Entrepreneurship and the Needed Focus on Critical Infrastructure appeared first on SecurityWeek.

Published on: April 11, 2025 | Source: SecurityWeek favicon SecurityWeek

Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways

Palo Alto Networks has revealed that it's observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after threat hunters warned of a surge in suspicious login scanning activity targeting its appliances. "Our teams are observing evidence of activity consistent with password-related attacks, such as brute-force login attempts, which does not indicate exploitation of a

Published on: April 11, 2025 | Source: The Hacker News favicon The Hacker News

SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps

Cybersecurity researchers have found that threat actors are setting up deceptive websites hosted on newly registered domains to deliver a known Android malware called SpyNote. These bogus websites masquerade as Google Play Store install pages for apps like the Chrome web browser, indicating an attempt to deceive unsuspecting users into installing the malware instead. "The threat actor utilized a

Published on: April 11, 2025 | Source: The Hacker News favicon The Hacker News

OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation

A newly disclosed high-severity security flaw impacting OttoKit (formerly SureTriggers) has come under active exploitation within a few hours of public disclosure. The vulnerability, tracked as CVE-2025-3102 (CVSS score: 8.1), is an authorization bypass bug that could permit an attacker to create administrator accounts under certain conditions and take control of susceptible websites. "The

Published on: April 11, 2025 | Source: The Hacker News favicon The Hacker News

Reimagining Democracy

Imagine that all of us—all of society—have landed on some alien planet and need to form a government: clean slate. We do not have any legacy systems from the United States or any other country. We do not have any special or unique interests to perturb our thinking. How would we govern ourselves? It is unlikely that we would use the systems we have today. Modern representative democracy was the best form of government...

Published on: April 11, 2025 | Source: Schneier on Security favicon Schneier on Security

Zero-Day in CentreStack File-Sharing Platform Under Attack

Gladinet's platform is widely used among managed service providers, and a critical deserialization flaw could put MSP customers in jeopardy.

Published on: April 10, 2025 | Source: Dark Reading favicon Dark Reading

Zero-Day in CentreStack File Sharing Platform Under Attack

Gladinet's platform is widely used among managed service providers, and a critical deserialization flaw could put MSP customers in jeopardy.

Published on: April 10, 2025 | Source: Dark Reading favicon Dark Reading

AuthZEN Aims to Harmonize Fractured Authorization Controls

Managing permissions and authorizations across dozens or hundreds of cloud services and platforms poses significant headaches for companies. An open specification aims to change that.

Published on: April 10, 2025 | Source: Dark Reading favicon Dark Reading