Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security

Google is making the biggest ever acquisition in its history by purchasing cloud security company Wiz in an all-cash deal worth $32 billion. "This acquisition represents an investment by Google Cloud to accelerate two large and growing trends in the AI era: improved cloud security and the ability to use multiple clouds (multicloud)," the tech giant said today. It added the acquisition, which is

Published on: March 18, 2025 | Source: The Hacker News favicon The Hacker News

3 AI-Driven Roles in Cybersecurity

For candidates with a cybersecurity background who want to stay competitive, now is the time to invest in obtaining AI skills.

Published on: March 18, 2025 | Source: Dark Reading favicon Dark Reading

New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking

A critical security vulnerability has been disclosed in AMI's MegaRAC Baseboard Management Controller (BMC) software that could allow an attacker to bypass authentication and carry out post-exploitation actions. The vulnerability, tracked as CVE-2024-54085, carries a CVSS v4 score of 10.0, indicating maximum severity. "A local or remote attacker can exploit the vulnerability by accessing the

Published on: March 18, 2025 | Source: The Hacker News favicon The Hacker News

How to Improve Okta Security in Four Steps

While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts. Okta serves as the cornerstone of identity governance and security for organizations worldwide. However, this

Published on: March 18, 2025 | Source: The Hacker News favicon The Hacker News

Google to Acquire Cloud Security Giant Wiz for $32 Billion in Cash

Google has confirmed reports that it’s buying cloud security giant Wiz and says it’s prepared to pay $32 billion in cash. The post Google to Acquire Cloud Security Giant Wiz for $32 Billion in Cash appeared first on SecurityWeek.

Published on: March 18, 2025 | Source: SecurityWeek favicon SecurityWeek

New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads

Cybersecurity researchers have warned about a large-scale ad fraud campaign that has leveraged hundreds of malicious apps published on the Google Play Store to serve full-screen ads and conduct phishing attacks. "The apps display out-of-context ads and even try to persuade victims to give away credentials and credit card information in phishing attacks," Bitdefender said in a report shared with

Published on: March 18, 2025 | Source: The Hacker News favicon The Hacker News

New Cloudflare Service Provides Real-Time Threat Intelligence

Cloudflare launches Cloudforce Threat Events Feed, a service designed to provide security teams with real-time threat intelligence. The post New Cloudflare Service Provides Real-Time Threat Intelligence appeared first on SecurityWeek.

Published on: March 18, 2025 | Source: SecurityWeek favicon SecurityWeek

VulnCheck Raises $12 Million for Vulnerability Intelligence Platform

Exploit and vulnerability intelligence provider VulnCheck has raised $12 million in a Series A funding round. The post VulnCheck Raises $12 Million for Vulnerability Intelligence Platform appeared first on SecurityWeek.

Published on: March 18, 2025 | Source: SecurityWeek favicon SecurityWeek

Western Alliance Bank Discloses Data Breach Linked to Cleo Hack

The personal information of 22,000 Western Alliance Bank customers was stolen in a data breach linked to Cl0p’s hacking of the Cleo file transfer tool. The post Western Alliance Bank Discloses Data Breach Linked to Cleo Hack appeared first on SecurityWeek.

Published on: March 18, 2025 | Source: SecurityWeek favicon SecurityWeek

US Lawmakers Reintroduce Bill to Boost Rural Water Cybersecurity

US representatives and senators have reintroduced a bipartisan bill to support the cybersecurity of small water and wastewater utilities. The post US Lawmakers Reintroduce Bill to Boost Rural Water Cybersecurity appeared first on SecurityWeek.

Published on: March 18, 2025 | Source: SecurityWeek favicon SecurityWeek

Is Security Human Factors Research Skewed Towards Western Ideas and Habits?

Really interesting research: β€œHow WEIRD is Usable Privacy and Security Research?” by Ayako A. Hasegawa Daisuke Inoue, and Mitsuaki Akiyama: Abstract: In human factor fields such as human-computer interaction (HCI) and psychology, researchers have been concerned that participants mostly come from WEIRD (Western, Educated, Industrialized, Rich, and Democratic) countries. This WEIRD skew may hinder understanding of...

Published on: March 18, 2025 | Source: Schneier on Security favicon Schneier on Security

China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation

Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the China-aligned MirrorFace threat actor that targeted a diplomatic organization in the European Union with a backdoor known as ANEL. The attack, detected by ESET in late August 2024, singled out a Central European diplomatic institute with lures related to Word Expo, which is scheduled to kick off in

Published on: March 18, 2025 | Source: The Hacker News favicon The Hacker News

BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse

At least four different threat actors have been identified as involved in an updated version of a massive ad fraud and residential proxy scheme called BADBOX, painting a picture of an interconnected cybercrime ecosystem. This includes SalesTracker Group, MoYu Group, Lemon Group, and LongTV, according to new findings from the HUMAN Satori Threat Intelligence and Research team, published in

Published on: March 18, 2025 | Source: The Hacker News favicon The Hacker News

Operation AkaiRyΕ«: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor

ESET researchers uncovered MirrorFace activity that expanded beyond its usual focus on Japan and targeted a Central European diplomatic institute with the ANEL backdoor

Published on: March 18, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets

Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data. The malware contains capabilities to "steal information from the target system, such as credentials stored in the browser, digital wallet information, data stored

Published on: March 18, 2025 | Source: The Hacker News favicon The Hacker News

OAuth Attacks Target Microsoft 365, GitHub

In a cyber twist, attackers behind two of the campaigns are using the apps to redirect users to phishing and malware distribution sites.

Published on: March 17, 2025 | Source: Dark Reading favicon Dark Reading

ClickFix Attack Compromises 100+ Car Dealership Sites

The ClickFix attack tactic seems to be gaining traction among threat actors.

Published on: March 17, 2025 | Source: Dark Reading favicon Dark Reading

Denmark Warns of Increased Cyber Espionage Against Telecom Sector

A new threat assessment from the Danish Civil Protection Authority (SAMSIK) warned of cyberattacks targeting the telecommunications sector after citing a wave of incidents hitting European organizations the past few years.

Published on: March 17, 2025 | Source: Dark Reading favicon Dark Reading

Who is sending those scammy text messages about unpaid tolls?

The latest smishing scam follows a familiar process as ones the industry has seen over the past decade. The post Who is sending those scammy text messages about unpaid tolls? appeared first on CyberScoop.

Published on: March 17, 2025 | Source: CyberScoop favicon CyberScoop

Apache Tomcat RCE Vulnerability Under Fire With 2-Step Exploit

The researchers who discovered the initial assault warned that the simple, staged attack is just the beginning for advanced exploit sequences that will test cyber defenses in new and more difficult ways.

Published on: March 17, 2025 | Source: Dark Reading favicon Dark Reading

Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum

Exploits swirling for remote code execution vulnerability (CVE-2025-24813) in open-source Apache Tomcat web server. The post Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum appeared first on SecurityWeek.

Published on: March 17, 2025 | Source: SecurityWeek favicon SecurityWeek

NIST Announces HQC as Fifth Standardized Post Quantum Algorithm

First choices for both KEMs and DSAs are already standardized, and organizations should not wait for the backups to be available before migrating to PQC. The post NIST Announces HQC as Fifth Standardized Post Quantum Algorithm appeared first on SecurityWeek.

Published on: March 17, 2025 | Source: SecurityWeek favicon SecurityWeek

DOGE staffer violated security policies at Treasury Department, court filing shows

The filing was part of a case brought by state attorneys general seeking to block DOGE access to sensitive information. The post DOGE staffer violated security policies at Treasury Department, court filing shows appeared first on CyberScoop.

Published on: March 17, 2025 | Source: CyberScoop favicon CyberScoop

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure

A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the releaseof a public proof-of-concept (PoC) a mere 30 hours after public disclosure. The vulnerability, tracked as CVE-2025-24813, affects the below versions - Apache Tomcat 11.0.0-M1 to 11.0.2 Apache Tomcat 10.1.0-M1 to 10.1.34 Apache Tomcat 9.0.0-M1 to 9.0.98 It

Published on: March 17, 2025 | Source: The Hacker News favicon The Hacker News

8,000 New WordPress Vulnerabilities Reported in 2024

Nearly 8,000 new vulnerabilities affecting the WordPress ecosystem were reported last year, nearly all in plugins and themes. The post 8,000 New WordPress Vulnerabilities Reported in 2024 appeared first on SecurityWeek.

Published on: March 17, 2025 | Source: SecurityWeek favicon SecurityWeek

RansomHub Taps FakeUpdates to Target US Government Sector

A ransomware activity wave using the SocGholish MaaS framework for initial access also has affected banking and consulting firms in the US, Taiwan, and Japan since the beginning of the year.

Published on: March 17, 2025 | Source: Dark Reading favicon Dark Reading

Improvements in Brute Force Attacks

New paper: β€œGPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.” Abstract: Key lengths in symmetric cryptography are determined with respect to the brute force attacks with current technology. While nowadays at least 128-bit keys are recommended, there are many standards and real-world applications that use shorter keys. In order to estimate the...

Published on: March 17, 2025 | Source: Schneier on Security favicon Schneier on Security

How 'Open Innovation' Can Help Solve Problems Faster, Better & Cheaper

Cybersecurity is not just a technical challenge but also a very human one. The more humans that organizations can get involved, the more diverse perspectives and experiences that can be tapped into.

Published on: March 17, 2025 | Source: Dark Reading favicon Dark Reading

Cloudflare rolls out post-quantum encryption for enterprise users

The initiative is part of a long-term plan to update all its encryption services to newer algorithms designed to protect against quantum computers. The post Cloudflare rolls out post-quantum encryption for enterprise users appeared first on CyberScoop.

Published on: March 17, 2025 | Source: CyberScoop favicon CyberScoop

Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year

An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by threat actors to deliver Mirat botnet malware variants since at least May 2024. The vulnerability in question is CVE-2025-1316 (CVSS v4 score: 9.3), a critical operating system command injection flaw that an attacker could exploit to achieve remote code execution on susceptible devices by means of a

Published on: March 17, 2025 | Source: The Hacker News favicon The Hacker News

How Economic Headwinds Influence the Ransomware Ecosystem

Inflation, cryptocurrency market volatility, and the ability to invest in defenses all influence the impact and severity of a ransomware attack, according to incident response efforts and ransomware negotiators.

Published on: March 17, 2025 | Source: Dark Reading favicon Dark Reading

Microsoft 365 Targeted in New Phishing, Account Takeover Attacks

Threat actors are abusing Microsoft 365 infrastructure in a BEC campaign, and target its users in two brand impersonation campaigns. The post Microsoft 365 Targeted in New Phishing, Account Takeover Attacks appeared first on SecurityWeek.

Published on: March 17, 2025 | Source: SecurityWeek favicon SecurityWeek

100 Car Dealerships Hit by Supply Chain Attack

The websites of over 100 auto dealerships were found serving malicious ClickFix code in a supply chain compromise. The post 100 Car Dealerships Hit by Supply Chain Attack appeared first on SecurityWeek.

Published on: March 17, 2025 | Source: SecurityWeek favicon SecurityWeek

Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users' Actions

Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format the layout of web pages, to bypass spam filters and track users' actions. That's according to new findings from Cisco Talos, which said such malicious activities can compromise a victim's security and privacy. "The features available in CSS allow attackers and spammers to track users' actions and

Published on: March 17, 2025 | Source: The Hacker News favicon The Hacker News

⚑ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More

From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week’s cybersecurity landscape is a reminder that attackers are always evolving. Advanced threat groups are exploiting outdated hardware, abusing legitimate tools for financial fraud, and finding new ways to bypass security defenses. Meanwhile, supply chain threats are on the rise, with open-source

Published on: March 17, 2025 | Source: The Hacker News favicon The Hacker News