Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
SentinelLabs connects the dots between prolific Chinese state-sponsored hackers and companies developing intrusion tools. The post Report Links Chinese Companies to Tools Used by State-Sponsored Hackers appeared first on SecurityWeek.
Published on: July 31, 2025 | Source:The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM) infrastructure using a 4G-equipped Raspberry Pi as part of a covert attack. The cyber-physical attack involved the adversary leveraging their physical access to install the Raspberry Pi device and have it connected directly to the same network switch as the ATM, effectively placing
Published on: July 31, 2025 | Source:Security Operations Centers (SOCs) are stretched to their limits. Log volumes are surging, threat landscapes are growing more complex, and security teams are chronically understaffed. Analysts face a daily battle with alert noise, fragmented tools, and incomplete data visibility. At the same time, more vendors are phasing out their on-premises SIEM solutions, encouraging migration to SaaS
Published on: July 31, 2025 | Source:Honeywell has patched several critical and high-severity vulnerabilities in its Experion PKS industrial process control and automation product. The post Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes appeared first on SecurityWeek.
Published on: July 31, 2025 | Source:Google Project Zero now publicly shares the discovery of a vulnerability and when its 90-day disclosure deadline expires. The post Google Project Zero Tackles Upstream Patch Gap With New Policy appeared first on SecurityWeek.
Published on: July 31, 2025 | Source:Here's a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025
Published on: July 31, 2025 | Source:Threat actors are actively exploiting a critical security flaw in "Alone β Charity Multipurpose Non-profit WordPress Theme" to take over susceptible sites. The vulnerability, tracked as CVE-2025-5394, carries a CVSS score of 9.8. Security researcher ThΓ‘i An has been credited with discovering and reporting the bug. According to Wordfence, the shortcoming relates to an arbitrary file upload
Published on: July 31, 2025 | Source:A swath of copycat Korean apps are hiding spyware, occasionally leading to highly personal, disturbing extortions.
Published on: July 31, 2025 | Source:Google wants to shorten delays in the vulnerability lifecycle by sharing limited details about newly discovered defects within a week of reporting to the affected vendor. The post Project Zero disclosure policy change puts vendors on early notice appeared first on CyberScoop.
Published on: July 30, 2025 | Source:Attackers are becoming faster at exploiting vulnerabilities, but this startup seeks to stop threats before they lead to breaches.
Published on: July 30, 2025 | Source:The deal shakes up the identity and access management landscape and expands Palo Alto Networks' footprint in the cybersecurity market.
Published on: July 30, 2025 | Source:Sen. Alex Padilla and other Democrats say the GOP is pressing inflated concerns about noncitizen voting to justify legal and legislative challenges to eligible voters. The post Senate Democrats call Trump adminβs focus on state voter rolls a pretext for disenfranchisement appeared first on CyberScoop.
Published on: July 30, 2025 | Source:The US government is throwing the book at even midlevel cybercriminals. Is it just β and is it working?
Published on: July 30, 2025 | Source:An unsealed indictment associated with the Chinese threat group shows its members worked for companies closely aligned with the PRC as part of a larger contractor ecosystem.
Published on: July 30, 2025 | Source:Committee Members voted to recommend Sean Plankey for director of the Cybersecurity and Infrastructure Security Agency. The post Senate Committee Advances Trump Nominee to Lead CISA appeared first on SecurityWeek.
Published on: July 30, 2025 | Source:Fraudsters are flooding Discord and other social media platforms with ads for hundreds of polished online gaming and wagering websites that lure people with free credits and eventually abscond with any cryptocurrency funds deposited by players. Here's a closer look at the social engineering tactics and remarkable traits of this sprawling network of more than 1,200 scam sites.
Published on: July 30, 2025 | Source:The U.S. Military Academy announced Tuesday that the former CISA head would join the Department of Social Sciences. Secretary Dan Driscoll pulled the offer Wednesday. The post Army Secretary forces West Point to rescind appointment given to Easterly appeared first on CyberScoop.
Published on: July 30, 2025 | Source:Cybersecurity researchers are calling attention to an ongoing campaign that distributes fake cryptocurrency trading apps to deploy a compiled V8 JavaScript (JSC) malware called JSCEAL that can capture data such as credentials and wallets. The activity leverages thousands of malicious advertisements posted on Facebook in an attempt to redirect unsuspecting victims to counterfeit sites that
Published on: July 30, 2025 | Source:Cybersecurity experts have released a decryptor for a ransomware strain called FunkSec, allowing victims to recover access to their files for free. "Because the ransomware is now considered dead, we released the decryptor for public download," Gen Digital researcher Ladislav Zezula said. FunkSec, which emerged towards the end of 2024, has claimed 172 victims, according to data from
Published on: July 30, 2025 | Source:BlinkOps has announced a Series B funding round that brings the total raised by the company for its micro-agents builder to $90 million. The post BlinkOps Raises $50 Million for Agentic Security Automation Platform appeared first on SecurityWeek.
Published on: July 30, 2025 | Source:The deal is a further example of tech market consolidation and positioning to guard against threats to enterprise AI systems. The post Palo Alto Networks to acquire CyberArk for $25 billion appeared first on CyberScoop.
Published on: July 30, 2025 | Source:A year after the largest outage in IT history, organizations need to make an active effort to diversify their technology and software vendors and create a more resilient cyber ecosystem moving forward.
Published on: July 30, 2025 | Source:Legion has raised $38 million in seed and Series A funding for its browser-native AI Security Operations Center (SOC) platform. The post Legion Emerges From Stealth With $38 Million in Funding appeared first on SecurityWeek.
Published on: July 30, 2025 | Source:Strategic acquisitions marks Palo Alto Networks' formal entry into the identity security space and accelerates its platform strategy. The post Palo Alto Networks to Acquire CyberArk for $25 Billion appeared first on SecurityWeek.
Published on: July 30, 2025 | Source:In this article, we will provide a brief overview of Pillar Security's platform to better understand how they are tackling AI security challenges. Pillar Security is building a platform to cover the entire software development and deployment lifecycle with the goal of providing trust in AI systems. Using its holistic approach, the platform introduces new ways of detecting AI threats, beginning
Published on: July 30, 2025 | Source:Apple on Tuesday released security updates for its entire software portfolio, including a fix for a vulnerability that Google said was exploited as a zero-day in the Chrome web browser earlier this month. The vulnerability, tracked as CVE-2025-6558 (CVSS score: 8.8), is an incorrect validation of untrusted input in the browser's ANGLE and GPU components that could result in a sandbox escape via
Published on: July 30, 2025 | Source:Cybersecurity researchers have disclosed now-patched critical security flaws in the firmware of Dahua smart cameras that, if left unaddressed, could allow attackers to hijack control of susceptible devices. "The flaws, affecting the device's ONVIF protocol and file upload handlers, allow unauthenticated attackers to execute arbitrary commands remotely, effectively taking over the device,"
Published on: July 30, 2025 | Source:A brand-new cyberattack vector allows threat actors to use a poisoned browser extension to inject malicious prompts into all of the top generative AI tools on the market, including ChatGPT, Gemini, and others.
Published on: July 30, 2025 | Source:Orange was targeted by hackers in an attack that resulted in the disruption of services offered to corporate and individual customers. The post Telecom Giant Orange Hit by Cyberattack appeared first on SecurityWeek.
Published on: July 30, 2025 | Source:The Israeli startup helps organizations identify, monitor, and control AI agents across their environments. The post Cyata Emerges From Stealth With $8.5 Million in Funding appeared first on SecurityWeek.
Published on: July 30, 2025 | Source:Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon (aka Hafnium) have been identified as behind over a dozen technology patents, shedding light on the shadowy cyber contracting ecosystem and its offensive capabilities. The patents cover forensics and intrusion tools that enable encrypted endpoint data collection, Apple device forensics, and remote access to
Published on: July 30, 2025 | Source:The global average cost of a breach fell to $4.44 million (the first decline in five years), but the average US cost rose to a record $10.22 million. The post Cost of Data Breach in US Rises to $10.22 Million, Says Latest IBM Report appeared first on SecurityWeek.
Published on: July 30, 2025 | Source:Base44 owner Wix quickly patched a critical authentication bypass vulnerability discovered by researchers at Wiz. The post Flaw in Vibe Coding Platform Base44 Exposed Private Enterprise Applications appeared first on SecurityWeek.
Published on: July 30, 2025 | Source:βWhoβs winning on the internet, the attackers or the defenders?β Iβm asked this all the time, and I can only ever give a qualitative hand-wavy answer. But Jason Healey and Tarang Jainβs latest Lawfare piece has amassed data. The essay provides the first framework for metrics about how we are all doing collectivelyβand not just how an individual network is doing. Healey wrote to me in email: The work rests on three key...
Published on: July 30, 2025 | Source:Minnesota Governor Tim Walz called in the National Guard to assist the City of Saint Paul in responding to a cyberattack. The post Minnesota Activates National Guard in Response to Cyberattack appeared first on SecurityWeek.
Published on: July 30, 2025 | Source: