Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks

OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware development. This includes a Russian‑language threat actor, who is said to have used the chatbot to help develop and refine a remote access trojan (RAT), a credential stealer with an aim to evade detection. The operator also used several ChatGPT accounts to

The Hacker News favicon The Hacker News β€’ 14 days ago β€’ 1 min read

Cyberattack Leads to Beer Shortage as Asahi Recovers

A ransomware last week left the Asahi brewery in Japan struggling to take orders and deliver its products domestically, as manufacturers become a favored target.

Dark Reading favicon Dark Reading β€’ 14 days ago β€’ 1 min read

ShinyHunters Wage Broad Corporate Extortion Spree

A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has launched a website that threatens to publish data stolen from dozens of Fortune 500 firms if they refuse to pay a ransom. The group also claimed responsibility for a recent breach involving Discord user data, and for stealing terabytes of sensitive files from thousands of...

Krebs on Security favicon Krebs on Security β€’ 14 days ago β€’ 1 min read

Attackers Season Spam With a Touch of 'Salt'

Researchers report an increase in the use of hidden content in spam and malicious email to confuse filters and other security mechanisms.

Dark Reading favicon Dark Reading β€’ 14 days ago β€’ 1 min read

Microsoft pins GoAnywhere zero-day attacks to ransomware affiliate Storm-1175

Multiple researchers and CISA have confirmed active exploitation of the maximum-severity defect. Fortra, the company behind the file-transfer service, remains silent. The post Microsoft pins GoAnywhere zero-day attacks to ransomware affiliate Storm-1175 appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 14 days ago β€’ 1 min read

OpenAI: Threat actors use us to be efficient, not make new tools

A new report from the leader in the generative AI boom says AI is being used in existing workflows, instead of to create new ones dedicated to malicious hacking. The post OpenAI: Threat actors use us to be efficient, not make new tools appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 14 days ago β€’ 1 min read

Security Concerns Shadow Vibe Coding Adoption

In a recent poll, readers shared how they're using vibe coding in AppDev (if they are at all). While some found success, others found the risks too great.

Dark Reading favicon Dark Reading β€’ 14 days ago β€’ 1 min read

BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers

A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive job seekers and digital marketing professionals to deliver a previously undocumented malware called Vampire Bot. "The attackers pose as recruiters, distributing malicious files disguised as job descriptions and corporate documents," Aryaka Threat Research Labs

The Hacker News favicon The Hacker News β€’ 14 days ago β€’ 1 min read

Medusa Ransomware Actors Exploit Critical Fortra GoAnywhere Flaw

Researchers say exploitation of CVE-2025-10035 requires a private key, and it's unclear how Storm-1175 threat actors pulled this off.

Dark Reading favicon Dark Reading β€’ 14 days ago β€’ 1 min read

Google's New AI Doesn't Just Find Vulnerabilities β€” It Rewrites Code to Patch Them

Google's DeepMind division on Monday announced an artificial intelligence (AI)-powered agent called CodeMender that automatically detects, patches, and rewrites vulnerable code to prevent future exploits. The efforts add to the company's ongoing efforts to improve AI-powered vulnerability discovery, such as Big Sleep and OSS-Fuzz. DeepMind said the AI agent is designed to be both reactive and

The Hacker News favicon The Hacker News β€’ 14 days ago β€’ 1 min read

Hackers Stole Data From Public Safety Comms Firm BK Technologies

BK Technologies has informed the SEC that it discovered an IT intrusion on September 20. The post Hackers Stole Data From Public Safety Comms Firm BK Technologies appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 14 days ago β€’ 1 min read

Filigran Raises $58 Million in Series C Funding

The company plans to expand to new markets, fuel the development of a new module for its platform, and accelerate AI integration. The post Filigran Raises $58 Million in Series C Funding appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 14 days ago β€’ 1 min read

AI-Enabled Influence Operation Against Iran

Citizen Lab has uncovered a coordinated AI-enabled influence operation against the Iranian government, probably conducted by Israel. Key Findings A coordinated network of more than 50 inauthentic X profiles is conducting an AI-enabled influence operation. The network, which we refer to as β€œPRISONBREAK,” is spreading narratives inciting Iranian audiences to revolt against the Islamic Republic of Iran. While the network...

Schneier on Security favicon Schneier on Security β€’ 14 days ago β€’ 1 min read

New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise

For years, security leaders have treated artificial intelligence as an β€œemerging” technology, something to keep an eye on but not yet mission-critical. A new Enterprise AI and SaaS Data Security Report by AI & Browser Security company LayerX proves just how outdated that mindset has become. Far from a future concern, AI is already the single largest uncontrolled channel for corporate data

The Hacker News favicon The Hacker News β€’ 15 days ago β€’ 1 min read

XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities

Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting a wide range of malicious actions on compromised hosts. "XWorm's modular design is built around a core client and an array of specialized components known as plugins," Trellix researchers Niranjan Hegde and Sijo Jacob said in an analysis published last week. "These plugins are

The Hacker News favicon The Hacker News β€’ 15 days ago β€’ 1 min read

Patch Now: 'RediShell' Threatens Cloud Via Redis RCE

A 13-year-old flaw with a CVSS score of 10 in the popular data storage service allows for full host takeover, and more than 300k instances are currently exposed.

Dark Reading favicon Dark Reading β€’ 15 days ago β€’ 1 min read

Security Firm Exposes Role of Beijing Research Institute in China’s Cyber Operations

BIETA and its subsidiary CIII research develop and sell technologies supporting China’s intelligence, counterintelligence, and military operations. The post Security Firm Exposes Role of Beijing Research Institute in China’s Cyber Operations appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 15 days ago β€’ 1 min read

The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn

The Year 2036/2038 problem is a bug that will be triggered in more than a decade, but hackers could exploit it today against ICS and consumer devices. The post The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 15 days ago β€’ 1 min read

13-Year-Old Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely

Redis has disclosed details of a maximum-severity security flaw in its in-memory database software that could result in remote code execution under certain circumstances. The vulnerability, tracked as CVE-2025-49844 (aka RediShell), has been assigned a CVSS score of 10.0. "An authenticated user may use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free,

The Hacker News favicon The Hacker News β€’ 15 days ago β€’ 1 min read

Critical Vulnerability Puts 60,000 Redis Servers at Risk of Exploitation

Authenticated attackers can exploit the security flaw to trigger a use-after-free and potentially execute arbitrary code. The post Critical Vulnerability Puts 60,000 Redis Servers at Risk of Exploitation appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 15 days ago β€’ 1 min read

Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware

Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere software to facilitate the deployment of Medusa ransomware. The vulnerability is CVE-2025-10035 (CVSS score: 10.0), a critical deserialization bug that could result in command injection without authentication. It was addressed in version 7.8.4, or the Sustain

The Hacker News favicon The Hacker News β€’ 15 days ago β€’ 1 min read

Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks

CrowdStrike on Monday said it's attributing the exploitation of a recently disclosed security flaw in Oracle E-Business Suite with moderate confidence to a threat actor it tracks as Graceful Spider (aka Cl0p), and that the first known exploitation occurred on August 9, 2025. The malicious activity involves the exploitation of CVE-2025-61882 (CVSS score: 9.8), a critical vulnerability that

The Hacker News favicon The Hacker News β€’ 15 days ago β€’ 1 min read

Oracle zero-day defect amplifies panic over Clop’s data theft attack spree

The notorious ransomware group exploited multiple vulnerabilities, including a zero-day, for at least eight weeks before alleged victims received extortion demands. The post Oracle zero-day defect amplifies panic over Clop’s data theft attack spree appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 15 days ago β€’ 1 min read

Cyberattackers Exploit Zimbra Zero-Day Via ICS

A threat actor purporting to be from the Libyan Navy's Office of Protocol targeted Brazil's military earlier this year using the rare tactic.

Dark Reading favicon Dark Reading β€’ 15 days ago β€’ 1 min read

Clop Ransomware Hits Oracle Customers Via Zero-Day Flaw

The infamous Clop gang has targeted a wide range of Oracle E-Business Suite customers using a newly disclosed zero-day vulnerability.

Dark Reading favicon Dark Reading β€’ 15 days ago β€’ 1 min read

House Dems seek info about ICE spyware contract, wary of potential abuses

The three lawmakers said the reported lifting of a stop-work order on a $2 million Paragon Solutions contract threatens Americans’ fundamental rights. The post House Dems seek info about ICE spyware contract, wary of potential abuses appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 15 days ago β€’ 1 min read

Potential EU law sparks global concerns over end-to-end encryption for messaging appsΒ 

The EU will vote Oct. 14 on a proposal that would use AI or humans to detect child sexual abuse material on their devices. The post Potential EU law sparks global concerns over end-to-end encryption for messaging apps appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 15 days ago β€’ 1 min read

Chinese Gov't Fronts Trick the West to Obtain Cyber Tech

Outwardly neutral Chinese institutions have been collaborating with Western orgs and researchers for the benefit of PRC state intelligence.

Dark Reading favicon Dark Reading β€’ 15 days ago β€’ 1 min read

New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations

A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to be likely led by the Ministry of State Security (MSS). The assessment comes from evidence that at least four BIETA personnel have clear or possible links to MSS officers and their relationship with the University of International Relations, which is known to share links with the

The Hacker News favicon The Hacker News β€’ 15 days ago β€’ 1 min read

Microsoft and Steam Take Action as Unity Vulnerability Puts Games at Risk

The flaw could lead to local code execution, allowing attackers to access confidential information on devices running Unity-built applications. The post Microsoft and Steam Take Action as Unity Vulnerability Puts Games at Risk appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 15 days ago β€’ 1 min read

⚑ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons from the field. This recap cuts through the noise to share what really mattersβ€”key trends, warning signs, and stories shaping today’s security landscape. Whether you’re defending systems or just keeping up, these highlights help you spot what’s coming

The Hacker News favicon The Hacker News β€’ 15 days ago β€’ 1 min read

5 Critical Questions For Adopting an AI Security Solution

In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security measures to protect sensitive data and ensure regulatory compliance. Among these measures, AI-SPM (AI Security Posture Management) solutions have gained traction to secure AI pipelines, sensitive data assets, and the overall AI ecosystem. These solutions help

The Hacker News favicon The Hacker News β€’ 15 days ago β€’ 1 min read

Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks

Oracle has released an emergency update to address a critical security flaw in its E-Business Suite software that it said has been exploited in the recent wave of Cl0p data theft attacks. The vulnerability, tracked as CVE-2025-61882 (CVSS score: 9.8), concerns an unspecified bug that could allow an unauthenticated attacker with network access via HTTP to compromise and take control of the Oracle

The Hacker News favicon The Hacker News β€’ 15 days ago β€’ 1 min read

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers

Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that has been attributed to search engine optimization (SEO) fraud and theft of high-value credentials, configuration files, and certificate data. The attacks are designed to target Microsoft Internet Information Services (IIS) servers, with most of the infections reported in India, Thailand

The Hacker News favicon The Hacker News β€’ 15 days ago β€’ 1 min read

Hackers Extorting Salesforce After Stealing Data From Dozens of Customers

Salesforce says the extortion attempts are related to past or unsubstantiated incidents, and not to fresh intrusions. The post Hackers Extorting Salesforce After Stealing Data From Dozens of Customers appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 15 days ago β€’ 1 min read