Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Trump's DoJ Targets Krebs, Revokes SentinelOne Security Clearance

An executive order is targeting former Trump appointees, including former CISA director Chris Krebs and his current coworkers, in the latest in a series of directives against those who dissented against the president and his associates.

Published on: April 10, 2025 | Source: Dark Reading favicon Dark Reading

Judges strike skeptical note of NSO Group’s argument to dismiss case from El Salvadoran journos

Dada et al v. NSO Group has been one of many cases where alleged spyware victims have run into jurisdictional hurdles. The post Judges strike skeptical note of NSO Group’s argument to dismiss case from El Salvadoran journos appeared first on CyberScoop.

Published on: April 10, 2025 | Source: CyberScoop favicon CyberScoop

What Should the US Do About Salt Typhoon?

Security experts weigh in on the problem Salt Typhoon and its hacking of telecoms poses against the United States, including what the US should do and how defenders can protect themselves.

Published on: April 10, 2025 | Source: Dark Reading favicon Dark Reading

Open Source Poisoned Patches Infect Local Software

Malicious packages lurking on open source repositories like npm have become less effective, so cyberattackers are using a new strategy: offering "patches" for locally installed programs.

Published on: April 10, 2025 | Source: Dark Reading favicon Dark Reading

China-based SMS Phishing Triad Pivots to Banks

China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently, the so-called β€œSmishing Triad” mainly impersonated toll road operators and shipping companies. But experts say these groups are now directly targeting customers of international financial institutions, while dramatically expanding their cybercrime...

Published on: April 10, 2025 | Source: Krebs on Security favicon Krebs on Security

Europol Targets Customers of Smokeloader Pay-Per-Install Botnet

Law enforcement agencies in multiple countries have announced the arrests of users of the malicious Smokeloader botnet. The post Europol Targets Customers of Smokeloader Pay-Per-Install Botnet appeared first on SecurityWeek.

Published on: April 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Trump Revokes Security Clearance for Ex-CISA Director Chris Krebs

Trump orders a termination of any active security clearances held by Krebs and a suspension of clearances held by individuals at SentinelOne. The post Trump Revokes Security Clearance for Ex-CISA Director Chris Krebs appeared first on SecurityWeek.

Published on: April 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes

Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE-2024-0132 (CVSS score: 9.0) is a Time-of-Check Time-of-Use (TOCTOU) vulnerability that could lead to a container escape attack and allow for

Published on: April 10, 2025 | Source: The Hacker News favicon The Hacker News

Why Data Privacy Isn't the Same as Data Security

Failing to distinguish between data privacy and data security leaves businesses vulnerable to regulatory scrutiny and the kinds of breaches that erode consumer trust overnight.

Published on: April 10, 2025 | Source: Dark Reading favicon Dark Reading

Cyber experts offer lukewarm praise for voluntary code governing use of commercial hacking tools

The Pall Mall Process guidelines for nations could be useful, they said, but have obvious limitations. The post Cyber experts offer lukewarm praise for voluntary code governing use of commercial hacking tools appeared first on CyberScoop.

Published on: April 10, 2025 | Source: CyberScoop favicon CyberScoop

Threat Actors Use 'Spam Bombing' Technique to Hide Malicious Motives

Darktrace researchers detailed "spam bombing," a technique in which threat actors bombard targets with spam emails as a pretense for activity like social engineering campaigns.

Published on: April 10, 2025 | Source: Dark Reading favicon Dark Reading

Malicious npm Package Targets Atomic Wallet, Exodus Users by Swapping Crypto Addresses

Threat actors are continuing to upload malicious packages to the npm registry so as to tamper with already-installed local versions of legitimate libraries and execute malicious code in what's seen as a sneakier attempt to stage a software supply chain attack. The newly discovered package, named pdf-to-office, masquerades as a utility for converting PDF files to Microsoft Word documents. But, in

Published on: April 10, 2025 | Source: The Hacker News favicon The Hacker News

Study Identifies 20 Most Vulnerable Connected Devices of 2025

Routers are the riskiest devices in enterprise networks as they contain the most critical vulnerabilities, a new Forescout report shows. The post Study Identifies 20 Most Vulnerable Connected Devices of 2025 appeared first on SecurityWeek.

Published on: April 10, 2025 | Source: SecurityWeek favicon SecurityWeek

PlayPraetor Reloaded: CTM360 Uncovers a Play Masquerading Party

Overview of the PlayPraetor Masquerading Party Variants CTM360 has now identified a much larger extent of the ongoing Play Praetor campaign. What started with 6000+ URLs of a very specific banking attack has now grown to 16,000+ with multiple variants. This research is ongoing, and much more is expected to be discovered in the coming days. As before, all the newly discovered play

Published on: April 10, 2025 | Source: The Hacker News favicon The Hacker News

GitHub Announces General Availability of Security Campaigns

GitHub security campaigns make it easier for developers and security teams to collaborate on fixing vulnerabilities in their applications. The post GitHub Announces General Availability of Security Campaigns appeared first on SecurityWeek.

Published on: April 10, 2025 | Source: SecurityWeek favicon SecurityWeek

The Identities Behind AI Agents: A Deep Dive Into AI & NHI

AI agents have rapidly evolved from experimental technology to essential business tools. The OWASP framework explicitly recognizes that Non-Human Identities play a key role in agentic AI security. Their analysis highlights how these autonomous software entities can make decisions, chain complex actions together, and operate continuously without human intervention. They're no longer just tools,

Published on: April 10, 2025 | Source: The Hacker News favicon The Hacker News

Gamaredon Uses Infected Removable Drives to Breach Western Military Mission in Ukraine

The Russia-linked threat actor known as Gamaredon (aka Shuckworm) has been attributed to a cyber attack targeting a foreign military mission based in Ukraine with an aim to deliver an updated version of a known malware called GammaSteel. The group targeted the military mission of a Western country, per the Symantec Threat Hunter team, with first signs of the malicious activity detected on

Published on: April 10, 2025 | Source: The Hacker News favicon The Hacker News

Nissan Leaf Hacked for Remote Spying, Physical Takeover

Researchers find vulnerabilities that can be exploited to remotely take control of a Nissan Leaf’s functions, including physical controls. The post Nissan Leaf Hacked for Remote Spying, Physical Takeover appeared first on SecurityWeek.

Published on: April 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Operations of Sensor Giant Sensata Disrupted by Ransomware Attack

Sensata has informed the SEC that shipping, manufacturing and other operations have been impacted by a ransomware attack. The post Operations of Sensor Giant Sensata Disrupted by Ransomware Attack appeared first on SecurityWeek.

Published on: April 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Europol Arrests Five SmokeLoader Clients Linked by Seized Database Evidence

Law enforcement authorities have announced that they tracked down the customers of the SmokeLoader malware and detained at least five individuals. "In a coordinated series of actions, customers of the Smokeloader pay-per-install botnet, operated by the actor known as 'Superstar,' faced consequences such as arrests, house searches, arrest warrants or 'knock and talks,'" Europol said in a

Published on: April 10, 2025 | Source: The Hacker News favicon The Hacker News

Watch out for these traps lurking in search results

Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results

Published on: April 10, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

AkiraBot Targets 420,000 Sites with OpenAI-Generated Spam, Bypassing CAPTCHA Protections

Cybersecurity researchers have disclosed details of an artificial intelligence (AI) powered platform called AkiraBot that's used to spam website chats, comment sections, and contact forms to promote dubious search engine optimization (SEO) services such as Akira and ServicewrapGO. "AkiraBot has targeted more than 400,000 websites and successfully spammed at least 80,000 websites since September

Published on: April 10, 2025 | Source: The Hacker News favicon The Hacker News

Google Merges Security Offerings Into a Cohesive Suite

Google Unified Security brings together threat detection, AI-powered security, secure browser features, and Mandiant services, the company said at its Cloud Next conference.

Published on: April 09, 2025 | Source: Dark Reading favicon Dark Reading

Trump signs order stripping Chris Krebs of security clearance

The executive order also eliminates security clearances for SentinelOne employees. The post Trump signs order stripping Chris Krebs of security clearance appeared first on CyberScoop.

Published on: April 09, 2025 | Source: CyberScoop favicon CyberScoop

Advanced Preparation Was Key to a Secure Paris Olympics

The security teams associated with the 2024 Olympic Games in Paris focused on in-depth penetration testing, crisis management exercises, and collaboration to defend against potential cyberattacks.

Published on: April 09, 2025 | Source: Dark Reading favicon Dark Reading

US Comptroller Cyber 'Incident' Compromises Org's Emails

A review of the emails involved in the breach is still ongoing, but what has been discovered is enough for the Treasury Department to label it a "major cyber incident."

Published on: April 09, 2025 | Source: Dark Reading favicon Dark Reading

CrushFTP Exploitation Continues Amid Disclosure Dispute

Attacks on a critical authentication bypass flaw in CrushFTP's file transfer product continue this week after duplicate CVEs sparked confusion.

Published on: April 09, 2025 | Source: Dark Reading favicon Dark Reading

Tariffs May Prompt Increase in Global Cyberattacks

Cybersecurity and policy experts worry that if tariffs give way to a global recession, organizations will reduce their spending on cybersecurity.

Published on: April 09, 2025 | Source: Dark Reading favicon Dark Reading

Oracle Appears to Admit Breach of 2 'Obsolete' Servers

The database company said its Oracle Cloud Infrastructure (OCI) was not involved in the breach. And at least one law firm seeking damages is already on the case.

Published on: April 09, 2025 | Source: Dark Reading favicon Dark Reading

China-Linked Hackers Continue Harassing Ethnic Groups With Spyware

Threat actors are trolling online forums and spreading malicious apps to target Uyghurs, Taiwanese, Tibetans, and other individuals aligned with interests that China sees as a threat to its authority.

Published on: April 09, 2025 | Source: Dark Reading favicon Dark Reading

BadBazaar and Moonshine malware targets Taiwanese, Tibetan and Uyghur groups, U.K. warns

In a joint advisory with Western allies, the National Cyber Security Centre sounded the alarm about variants of BADBAZAAR and MOONSHINE. The post BadBazaar and Moonshine malware targets Taiwanese, Tibetan and Uyghur groups, U.K. warns appeared first on CyberScoop.

Published on: April 09, 2025 | Source: CyberScoop favicon CyberScoop

Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools

Google plans to unleash automated AI agents into overtaxed SOCs to reduce the manual workload for cybersecurity investigators. The post Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools appeared first on SecurityWeek.

Published on: April 09, 2025 | Source: SecurityWeek favicon SecurityWeek

Groucho’s Wit, Cloud Complexity, and the Case for Consistent Security Policy

The greatest security policies in the world are useless if enterprises don’t have a reasonable, consistent, and reliable way to implement them. The post Groucho’s Wit, Cloud Complexity, and the Case for Consistent Security Policy appeared first on SecurityWeek.

Published on: April 09, 2025 | Source: SecurityWeek favicon SecurityWeek

Treasury bureau notifies Congress that email hack was a β€˜major’ cybersecurity incident

The OCC said the February incident resulted in the theft of β€œhighly sensitive information" tied to the financial conditions of federally regulated institutions. The post Treasury bureau notifies Congress that email hack was a β€˜major’ cybersecurity incident appeared first on CyberScoop.

Published on: April 09, 2025 | Source: CyberScoop favicon CyberScoop