Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Six additional countries identified as suspected Paragon spyware customers

Researchers found suspected Graphite deployments in Australia, Canada, Cyprus, Denmark, Israel and Singapore. The post Six additional countries identified as suspected Paragon spyware customers appeared first on CyberScoop.

Published on: March 19, 2025 | Source: CyberScoop favicon CyberScoop

March Madness Requires Vigilance on Both an Individual and Corporate Level

Defending high profile sporting events from adversarial attacks requires a mix of experienced capabilities and a solid threat intelligence program. The post March Madness Requires Vigilance on Both an Individual and Corporate Level appeared first on SecurityWeek.

Published on: March 19, 2025 | Source: SecurityWeek favicon SecurityWeek

Whatโ€™s Behind Googleโ€™s $32 Billion Wiz Acquisition?

News analysis: Google positions itself to compete with Microsoft for enterprise security dollars. How does this deal affect startup ecosystem? The post Whatโ€™s Behind Googleโ€™s $32 Billion Wiz Acquisition? appeared first on SecurityWeek.

Published on: March 19, 2025 | Source: SecurityWeek favicon SecurityWeek

Infosys to Pay $17.5 Million in Settlement Over 2023 Data Breach

Infosys McCamish System has agreed to pay $17.5 million to settle six class action lawsuits filed over a 2023 data breach. The post Infosys to Pay $17.5 Million in Settlement Over 2023 Data Breach appeared first on SecurityWeek.

Published on: March 19, 2025 | Source: SecurityWeek favicon SecurityWeek

Virtual Event Today: Supply Chain & Third-Party Risk Security Summit

Join the virtual event as we explore of the critical nature of software and vendor supply chain security issues. The post Virtual Event Today: Supply Chain & Third-Party Risk Security Summit appeared first on SecurityWeek.

Published on: March 19, 2025 | Source: SecurityWeek favicon SecurityWeek

Why Cybersecurity Needs More Business-Minded Leaders

The question is no longer "Are we compliant?" but "Are we truly resilient?"

Published on: March 19, 2025 | Source: Dark Reading favicon Dark Reading

Leaked Black Basta Chats Suggest Russian Officials Aided Leader's Escape from Armenia

The recently leaked trove of internal chat logs among members of the Black Basta ransomware operation has revealed possible connections between the e-crime gang and Russian authorities. The leak, containing over 200,000 messages from September 2023 to September 2024, was published by a Telegram user @ExploitWhispers last month. According to an analysis of the messages by cybersecurity company

Published on: March 19, 2025 | Source: The Hacker News favicon The Hacker News

Chinese Hacking Group MirrorFace Targeting Europe

Chinese hacking group MirrorFace has targeted a Central European diplomatic institute with the Anel backdoor and AsyncRAT. The post Chinese Hacking Group MirrorFace Targeting Europe appeared first on SecurityWeek.

Published on: March 19, 2025 | Source: SecurityWeek favicon SecurityWeek

Watch This Webinar to Learn How to Eliminate Identity-Based Attacksโ€”Before They Happen

In todayโ€™s digital world, security breaches are all too common. Despite the many security tools and training programs available, identity-based attacksโ€”like phishing, adversary-in-the-middle, and MFA bypassโ€”remain a major challenge. Instead of accepting these risks and pouring resources into fixing problems after they occur, why not prevent attacks from happening in the first place? Our upcoming

Published on: March 19, 2025 | Source: The Hacker News favicon The Hacker News

ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers

The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick users into downloading malware such as Lumma Stealer and Vidar Stealer. ClearFake, first highlighted in July 2023, is the name given to a threat activity cluster that employs fake web browser update baits on compromised WordPress as a malware distribution vector. The

Published on: March 19, 2025 | Source: The Hacker News favicon The Hacker News

5 Identity Threat Detection & Response Must-Haves for Super SaaS Security

Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication methods, and misused privileges. While many threat detection solutions focus on cloud, endpoint, and network threats, they overlook the unique risks posed by SaaS identity ecosystems. This blind spot is wreaking havoc on heavily SaaS-reliant organizations big and small

Published on: March 19, 2025 | Source: The Hacker News favicon The Hacker News

Microsoft Warns of New StilachiRAT Malware

Microsoft has shared details on StilachiRAT, an evasive and persistent piece of malware that facilitates sensitive data theft. The post Microsoft Warns of New StilachiRAT Malware appeared first on SecurityWeek.

Published on: March 19, 2025 | Source: SecurityWeek favicon SecurityWeek

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems

Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data Acquisition (SCADA) system used in operational technology (OT) environments, that could allow malicious actors to take control of susceptible systems. "These vulnerabilities, if exploited, could grant unauthorized access to industrial control networks, potentially

Published on: March 19, 2025 | Source: The Hacker News favicon The Hacker News

CISA Warns of Active Exploitation in GitHub Action Supply Chain Compromise

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a vulnerability linked to the supply chain compromise of the GitHub Action, tj-actions/changed-files, to its Known Exploited Vulnerabilities (KEV) catalog. The high-severity flaw, tracked as CVE-2025-30066 (CVSS score: 8.6), involves the breach of the GitHub Action to inject malicious code that enables a remote

Published on: March 19, 2025 | Source: The Hacker News favicon The Hacker News

Trump moves to fire Democratic FTC commissioners

The move, which critics say is unconstitutional, also potentially threatens numerous agency investigations and enforcement around privacy and cybersecurity. The post Trump moves to fire Democratic FTC commissioners appeared first on CyberScoop.

Published on: March 18, 2025 | Source: CyberScoop favicon CyberScoop

Infostealers fueled cyberattacks and snagged 2.1B credentials last year

Inexpensive information-stealing malware surged in 2024, infecting 23 million hosts, according to Flashpoint. The post Infostealers fueled cyberattacks and snagged 2.1B credentials last year appeared first on CyberScoop.

Published on: March 18, 2025 | Source: CyberScoop favicon CyberScoop

Google to Acquire Wiz for $32B in Multicloud Security Play

The all-cash deal offers a path for Google to better support cloud customers who have assets spread across public environments, including Azure and others.

Published on: March 18, 2025 | Source: Dark Reading favicon Dark Reading

HP Launches Printers With Quantum Resilient Cryptographyย 

Printers can sit in the corner for ten years or more, while quantum decryption is thought by many to be less than 10 years away. The post HP Launches Printers With Quantum Resilient Cryptography appeared first on SecurityWeek.

Published on: March 18, 2025 | Source: SecurityWeek favicon SecurityWeek

HP Launches Printers with Quantum Resilient Cryptographyย 

Printers can sit in the corner for ten years or more, while quantum decryption is thought by many to be less than 10 years away. The post HP Launches Printers with Quantum Resilient Cryptography appeared first on SecurityWeek.

Published on: March 18, 2025 | Source: SecurityWeek favicon SecurityWeek

AI Is Turbocharging Organized Crime, EU Police Agency Warns

AI and other technologies โ€œare a catalyst for crime, and drive criminal operationsโ€™ efficiency by amplifying their speed, reach, and sophistication,โ€ the report said. The post AI Is Turbocharging Organized Crime, EU Police Agency Warns appeared first on SecurityWeek.

Published on: March 18, 2025 | Source: SecurityWeek favicon SecurityWeek

Microsoft Sounds Warning on Multifunctional 'StilachiRAT'

The sneaky malware packs capabilities for system reconnaissance as well as credential and cryptocurrency theft.

Published on: March 18, 2025 | Source: Dark Reading favicon Dark Reading

Black Basta Leader in League With Russian Officials, Chat Logs Show

Though the chat logs were leaked a month ago, analysts are now seeing that Russian officials may have assisted Black Basta members, according to the shared messages.

Published on: March 18, 2025 | Source: Dark Reading favicon Dark Reading

Extortion Reboot: Ransomware Crew Threatens Leak to Snowden

Though the group initially stuck to classic ransomware TTPs before demanding the ransom, it went off script when it began threatening the group and detailing potential consequences the victim would face.

Published on: March 18, 2025 | Source: Dark Reading favicon Dark Reading

Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeoverย 

A critical vulnerability affecting baseboard management controller (BMC) firmware made by AMI could expose many devices to remote attacks. The post Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover appeared first on SecurityWeek.

Published on: March 18, 2025 | Source: SecurityWeek favicon SecurityWeek

Google Releases Major Update for Open Source Vulnerability Scanner

Google has integrated OSV-SCALIBR features into OSV-Scanner, its free vulnerability scanner for open source developers. The post Google Releases Major Update for Open Source Vulnerability Scanner appeared first on SecurityWeek.

Published on: March 18, 2025 | Source: SecurityWeek favicon SecurityWeek

New โ€˜Rules File Backdoorโ€™ Attack Lets Hackers Inject Malicious Code via AI Code Editors

Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub Copilot and Cursor, causing them to inject malicious code. "This technique enables hackers to silently compromise AI-generated code by injecting hidden malicious instructions into seemingly innocent

Published on: March 18, 2025 | Source: The Hacker News favicon The Hacker News

Actively Exploited ChatGPT Bug Puts Organizations at Risk

A server-side request forgery vulnerability in OpenAI's chatbot infrastructure can allow attackers to direct users to malicious URLs, leading to a range of threat activity.

Published on: March 18, 2025 | Source: Dark Reading favicon Dark Reading

Orion Security Startup Tackles Insider Threats With AI

The data loss prevention company emerges from stealth with an AI-powered platform to help organizations distinguish between legitimate and risky activity.

Published on: March 18, 2025 | Source: Dark Reading favicon Dark Reading

Google acquires Wiz for $32 billion

Wiz co-founder Asaaf Rappaport said the company will remain focused on protecting a wide range of cloud services. The post Google acquires Wiz for $32 billion appeared first on CyberScoop.

Published on: March 18, 2025 | Source: CyberScoop favicon CyberScoop

Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017

An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from China, Iran, North Korea, and Russia as part of data theft, espionage, and financially motivated campaigns that date back to 2017. The zero-day vulnerability, tracked by Trend Micro's Zero Day Initiative (ZDI) as ZDI-CAN-25373, refers to an issue that allows bad actors to execute hidden

Published on: March 18, 2025 | Source: The Hacker News favicon The Hacker News