Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Why It's So Hard to Stop Rising Malicious TDS Traffic

Cybersecurity vendors say threat actors' abuse of traffic distribution systems (TDS) is becoming more complex and sophisticated β€” and much harder to detect and block.

Published on: March 20, 2025 | Source: Dark Reading favicon Dark Reading

Browser Security Under Siege: The Alarming Rise of AI-Powered Phishing

Analysis reveals a 140% increase in browser phishing, including a 130% increase in zero-hour phishing attacks. The post Browser Security Under Siege: The Alarming Rise of AI-Powered Phishing appeared first on SecurityWeek.

Published on: March 20, 2025 | Source: SecurityWeek favicon SecurityWeek

Ukraine Defense Sector Under Attack via Dark Crystal RAT

The UNC-200 threat group, active since last summer, has been utilizing the Signal messaging app to social engineer targets into downloading an infostealing remote access Trojan.

Published on: March 20, 2025 | Source: Dark Reading favicon Dark Reading

Ukraine Defense Sector Under Attack Via Dark Crystal RAT

The UNC-200 threat group, active since last summer, has been utilizing the Signal messaging app to social engineer targets into downloading an infostealing remote access Trojan.

Published on: March 20, 2025 | Source: Dark Reading favicon Dark Reading

Dataminr Raises $85 Million for AI-Powered Information Platform

Real-time event and risk detection firm Dataminr has raised $85 million from NightDragon and HSBC to accelerate AI development. The post Dataminr Raises $85 Million for AI-Powered Information Platform appeared first on SecurityWeek.

Published on: March 20, 2025 | Source: SecurityWeek favicon SecurityWeek

YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users

YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russian-speaking users. "What's intriguing about this malware is how much it collects," Kaspersky said in an analysis. "It grabs account information from VPN and gaming clients, and all kinds of network utilities like ngrok, Playit, Cyberduck, FileZilla, and

Published on: March 20, 2025 | Source: The Hacker News favicon The Hacker News

CISA Warns of Exploited Nakivo Vulnerability

CISA has added an absolute path traversal bug in Nakivo Backup and Replication to its Known Exploited Vulnerabilities list. The post CISA Warns of Exploited Nakivo Vulnerability appeared first on SecurityWeek.

Published on: March 20, 2025 | Source: SecurityWeek favicon SecurityWeek

Critical GitHub Attack

This is serious: A sophisticated cascading supply chain attack has compromised multiple GitHub Actions, exposing critical CI/CD secrets across tens of thousands of repositories. The attack, which originally targeted the widely used β€œtj-actions/changed-files” utility, is now believed to have originated from an earlier breach of the β€œreviewdog/action-setup@v1” GitHub Action, according to a report. […] CISA confirmed the...

Published on: March 20, 2025 | Source: Schneier on Security favicon Schneier on Security

Are We Closing the Gender Gap in Cybersecurity?

Answer: Nope. But let's look at the trends β€” because they matter for security.

Published on: March 20, 2025 | Source: Dark Reading favicon Dark Reading

HP Brings Quantum-Safe Encryption to Printers

HP's 8000 Series enterprise and commercial printers, which include Color LaserJet Enterprise MFP 8801, Mono MFP 8601, and LaserJet Pro Mono SFP 8501, will feature new quantum ASICs and endpoint controllers to protect them from future quantum attacks.

Published on: March 20, 2025 | Source: Dark Reading favicon Dark Reading

Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems

Veeam has released security updates to address a critical security flaw impacting its Backup & Replication software that could lead to remote code execution. The vulnerability, tracked as CVE-2025-23120, carries a CVSS score of 9.9 out of 10.0. It affects 12.3.0.310 and all earlier version 12 builds. "A vulnerability allowing remote code execution (RCE) by authenticated domain users," the

Published on: March 20, 2025 | Source: The Hacker News favicon The Hacker News

Mobile Jailbreaks Exponentially Increase Corporate Risk

Both Android devices and iPhones are 3.5 times more likely to be infected with malware once "broken" and 250 times more likely to be totally compromised, recent research shows.

Published on: March 20, 2025 | Source: Dark Reading favicon Dark Reading

500,000 Impacted by Pennsylvania Teachers Union Data Breach

Pennsylvania State Education Association says the personal information of over 500,000 individuals was stolen in a data breach. The post 500,000 Impacted by Pennsylvania Teachers Union Data Breach appeared first on SecurityWeek.

Published on: March 20, 2025 | Source: SecurityWeek favicon SecurityWeek

Hackers Target Cisco Smart Licensing Utility Vulnerabilities

SANS is seeing attempts to exploit two critical Cisco Smart Licensing Utility vulnerabilities tracked as CVE-2024-20439 and CVE-2024-20440. The post Hackers Target Cisco Smart Licensing Utility Vulnerabilities appeared first on SecurityWeek.

Published on: March 20, 2025 | Source: SecurityWeek favicon SecurityWeek

How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model

Cybersecurity isn't just another checkbox on your business agenda. It's a fundamental pillar of survival. As organizations increasingly migrate their operations to the cloud, understanding how to protect your digital assets becomes crucial. The shared responsibility model, exemplified through Microsoft 365's approach, offers a framework for comprehending and implementing effective cybersecurity

Published on: March 20, 2025 | Source: The Hacker News favicon The Hacker News

Amazon Ends Little-Used Privacy Feature That Let Echo Users Opt Out of Sending Recordings to Company

Amazon is ending a little-used privacy feature that let some users of its Echo smart speaker prevent their voice commands from going to the company’s cloud. The post Amazon Ends Little-Used Privacy Feature That Let Echo Users Opt Out of Sending Recordings to Company appeared first on SecurityWeek.

Published on: March 20, 2025 | Source: SecurityWeek favicon SecurityWeek

Six Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest Data

The governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore are likely customers of spyware developed by Israeli company Paragon Solutions, according to a new report from The Citizen Lab. Paragon, founded in 2019 by Ehud Barak and Ehud Schneorson, is the maker of a surveillance tool called Graphite that's capable of harvesting sensitive data from instant messaging applications

Published on: March 20, 2025 | Source: The Hacker News favicon The Hacker News

Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers

Regulatory compliance is no longer just a concern for large enterprises. Small and mid-sized businesses (SMBs) are increasingly subject to strict data protection and security regulations, such as HIPAA, PCI-DSS, CMMC, GDPR, and the FTC Safeguards Rule. However, many SMBs struggle to maintain compliance due to limited IT resources, evolving regulatory requirements, and complex security challenges

Published on: March 20, 2025 | Source: The Hacker News favicon The Hacker News

Operation FishMedley

ESET researchers detail a global espionage operation by FishMonger, the APT group run by I‑SOON

Published on: March 20, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw impacting NAKIVO Backup & Replication software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability in question is CVE-2024-48248 (CVSS score: 8.6), an absolute path traversal bug that could allow an unauthenticated attacker to

Published on: March 20, 2025 | Source: The Hacker News favicon The Hacker News

CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a new campaign that targets the defense sectors with Dark Crystal RAT (aka DCRat). The campaign, detected earlier this month, has been found to target both employees of enterprises of the defense-industrial complex and individual representatives of the Defense Forces of Ukraine. The activity involves

Published on: March 20, 2025 | Source: The Hacker News favicon The Hacker News

India Is Top Global Target for Hacktivists, Regional APTs

Global politics and a growing economy draw the wrong kind of attention to India, with denial-of-service and application attacks both on the rise.

Published on: March 20, 2025 | Source: Dark Reading favicon Dark Reading

DOGE to Fired CISA Staff: Email Us Your Personal Data

A message posted on Monday to the homepage of the U.S. Cybersecurity & Infrastructure Security Agency (CISA) is the latest exhibit in the Trump administration's continued disregard for basic cybersecurity protections. The message instructed recently-fired CISA employees to get in touch so they can be rehired and then immediately placed on leave, asking employees to send their Social Security number or date of birth...

Published on: March 20, 2025 | Source: Krebs on Security favicon Krebs on Security

Capital One hacker Paige Thompson got too light a sentence, appeals court rules

Two of the three judges said five years’ probation and time served didn’t match the severity of the crime, among other reasons for overturning the sentence. The post Capital One hacker Paige Thompson got too light a sentence, appeals court rules appeared first on CyberScoop.

Published on: March 19, 2025 | Source: CyberScoop favicon CyberScoop

Critical Fortinet Vulnerability Draws Fresh Attention

CISA this week added CVE-2025-24472 to its catalog of known exploited vulnerabilities, citing ransomware activity targeting the authentication bypass flaw.

Published on: March 19, 2025 | Source: Dark Reading favicon Dark Reading

How DHS is working to continually improve the Continuous Diagnostics and Mitigation program

Two CISA officials detailed the way agencies are leveraging the program to get the best CDM can offer. The post How DHS is working to continually improve the Continuous Diagnostics and Mitigation program appeared first on CyberScoop.

Published on: March 19, 2025 | Source: CyberScoop favicon CyberScoop

Nation-State Groups Abuse Microsoft Windows Shortcut Exploit

Trend Micro uncovered a method that nation-state threat actors are using to target victims via the Windows .Ink shortcut file extension.

Published on: March 19, 2025 | Source: Dark Reading favicon Dark Reading

Infosys Settles $17.5M Class Action Lawsuit After Sprawling Third-Party Breach

Several major companies in the finance sector were impacted by the third-party breach, prompting them to notify thousands of customers of their compromised data.

Published on: March 19, 2025 | Source: Dark Reading favicon Dark Reading

AI Cloud Adoption Is Rife With Cyber Mistakes

Research finds that organizations are granting root access by default and making other big missteps, including a Jenga-like building concept, in deploying and configuring AI services in cloud deployments.

Published on: March 19, 2025 | Source: Dark Reading favicon Dark Reading

Orion Security Raises $6 Million to Tackle Insider Threats and Data Leaks with AI-Driven DLP

Orion protects against data exfiltration by using AI to compare actual data flows against permitted and expected data flows. The post Orion Security Raises $6 Million to Tackle Insider Threats and Data Leaks with AI-Driven DLP appeared first on SecurityWeek.

Published on: March 19, 2025 | Source: SecurityWeek favicon SecurityWeek

Congress should re-up 2015 information-sharing law, top Hill staffer says

Lawmakers also need to take action on legislation to better harmonize federal cybersecurity regulations, Democrats’ staff director on a key Senate committee said. The post Congress should re-up 2015 information-sharing law, top Hill staffer says appeared first on CyberScoop.

Published on: March 19, 2025 | Source: CyberScoop favicon CyberScoop

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners

Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access trojans (RATs) like Quasar RAT. The vulnerability, assigned the CVE identifier CVE-2024-4577, refers to an argument injection vulnerability in PHP affecting Windows-based systems running in CGI mode that could allow remote attackers to run arbitrary code. Cybersecurity company

Published on: March 19, 2025 | Source: The Hacker News favicon The Hacker News

Cybercriminals Taking Advantage of 'Shadow' Alliances, AI

A Europol report says nation-state actors are increasingly working with organized crime networks to achieve geopolitical goals, including the destabilization of the EU.

Published on: March 19, 2025 | Source: Dark Reading favicon Dark Reading