Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Elon Musk Claims X Being Targeted in ‘Massive Cyberattack’ as Service Goes Down

Elon Musk claimed that the social media platform X was being targeted in a “massive cyberattack" that impacted availability. The post Elon Musk Claims X Being Targeted in ‘Massive Cyberattack’ as Service Goes Down appeared first on SecurityWeek.

Published on: March 10, 2025 | Source: SecurityWeek favicon SecurityWeek

'SideWinder' Intensifies Attacks on Maritime Sector

The likely India-based threat group is also targeting logistics companies in a continued expansion of its activities.

Published on: March 10, 2025 | Source: Dark Reading favicon Dark Reading

Google Pays Out Nearly $12M in 2024 Bug Bounty Program

The program underwent a series of changes in the past year, including richer maximum rewards in a variety of bug categories.

Published on: March 10, 2025 | Source: Dark Reading favicon Dark Reading

Multiple vulnerabilities found in ICONICS industrial SCADA software

The since-patched vulnerabilities allowed for privilege escalation, DLL hijacking, file modification and even total system compromise. The post Multiple vulnerabilities found in ICONICS industrial SCADA software appeared first on CyberScoop.

Published on: March 10, 2025 | Source: CyberScoop favicon CyberScoop

APT 'Blind Eagle' Targets Colombian Government

The South American-based advanced persistent threat group is using an exploit with a "high infection rate," according to research from Check Point.

Published on: March 10, 2025 | Source: Dark Reading favicon Dark Reading

Trump Coins Used as Lure in Malware Campaign

Binance is being spoofed in an email campaign using free TRUMP Coins as a lure leading to the installation of the ConnectWise RAT. The post Trump Coins Used as Lure in Malware Campaign appeared first on SecurityWeek.

Published on: March 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Ex-Employee Found Guilty in Revenge Kill-Switch Scheme

Clandestine kill switch was designed to lock out other users if the developer's account in the company's Windows Active Directory was ever disabled.

Published on: March 10, 2025 | Source: Dark Reading favicon Dark Reading

Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks

Palo Alto Networks has shared details on several high-severity Mitsubishi Electric and Iconics SCADA vulnerabilities. The post Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks appeared first on SecurityWeek.

Published on: March 10, 2025 | Source: SecurityWeek favicon SecurityWeek

When Seconds Count: How to Survive Fast-and-Furious DDoS Microbursts

In the battle against two-minute micro-attacks that can knock out critical communication services, the difference between success and failure can literally come down to seconds.

Published on: March 10, 2025 | Source: Dark Reading favicon Dark Reading

Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials

Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on. "The polymorphic extensions create a pixel perfect replica of the target's icon, HTML popup, workflows and even temporarily disables the legitimate extension, making it extremely convincing for victims to believe that they are providing credentials to

Published on: March 10, 2025 | Source: The Hacker News favicon The Hacker News

Cobalt Strike Abuse Dropped 80% in Two Years

Fortra has shared an update on the effects of actions taken to reduce the abuse of Cobalt Strike by threat actors. The post Cobalt Strike Abuse Dropped 80% in Two Years appeared first on SecurityWeek.

Published on: March 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Desert Dexter Targets 900 Victims Using Facebook Ads and Telegram Malware Links

The Middle East and North Africa have become the target of a new campaign that delivers a modified version of a known malware called AsyncRAT since September 2024. "The campaign, which leverages social media to distribute malware, is tied to the region's current geopolitical climate," Positive Technologies researchers Klimentiy Galkin and Stanislav Pyzhov said in an analysis published last week.

Published on: March 10, 2025 | Source: The Hacker News favicon The Hacker News

Developer Convicted for Hacking Former Employer’s Systems

Davis Lu was convicted of sabotaging his employer’s systems through malicious code, and deleting encrypted data. The post Developer Convicted for Hacking Former Employer’s Systems appeared first on SecurityWeek.

Published on: March 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Mass Exploitation of Critical PHP Vulnerability Begins

GreyNoise warns of mass exploitation of a critical vulnerability in PHP leading to remote code execution on vulnerable servers. The post Mass Exploitation of Critical PHP Vulnerability Begins appeared first on SecurityWeek.

Published on: March 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Thousands of WordPress Websites Infected with Malware

The malware includes four separate backdoors: Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed. A unique case we haven’t seen before. Which introduces another type of attack made possibly by abusing websites that don’t monitor 3rd party dependencies in the browser of their users. The four backdoors: The functions of the four backdoors are explained...

Published on: March 10, 2025 | Source: Schneier on Security favicon Schneier on Security

Why The Modern Google Workspace Needs Unified Security

The Need For Unified Security Google Workspace is where teams collaborate, share ideas, and get work done. But while it makes work easier, it also creates new security challenges. Cybercriminals are constantly evolving, finding ways to exploit misconfigurations, steal sensitive data, and hijack user accounts. Many organizations try to secure their environment by piecing together different

Published on: March 10, 2025 | Source: The Hacker News favicon The Hacker News

560,000 People Impacted Across Four Healthcare Data Breaches

Several healthcare organizations in different US states have disclosed data breaches affecting 100,000-200,000 individuals. The post 560,000 People Impacted Across Four Healthcare Data Breaches appeared first on SecurityWeek.

Published on: March 10, 2025 | Source: SecurityWeek favicon SecurityWeek

GitHub-Hosted Malware Infects 1M Windows Users

Microsoft has identified a complex, malvertising-based attack chain that delivered Lumma and other infostealers to enterprise and consumer PC users; the campaign is unlikely the last of its kind.

Published on: March 10, 2025 | Source: Dark Reading favicon Dark Reading

AI-driven deception: A new face of corporate fraud

Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses

Published on: March 10, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

Cyber threats today don't just evolve—they mutate rapidly, testing the resilience of everything from global financial systems to critical infrastructure. As cybersecurity confronts new battlegrounds—ranging from nation-state espionage and ransomware to manipulated AI chatbots—the landscape becomes increasingly complex, prompting vital questions: How secure are our cloud environments? Can our

Published on: March 10, 2025 | Source: The Hacker News favicon The Hacker News

SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools

A new mass malware campaign is infecting users with a cryptocurrency miner named SilentCryptoMiner by masquerading it as a tool designed to circumvent internet blocks and restrictions around online services. Russian cybersecurity company Kaspersky said the activity is part of a larger trend where cybercriminals are increasingly leveraging Windows Packet Divert (WPD) tools to distribute malware

Published on: March 10, 2025 | Source: The Hacker News favicon The Hacker News

Feds Link $150M Cyberheist to 2022 LastPass Hacks

In September 2023, KrebsOnSecurity published findings from security researchers who concluded that a series of six-figure cyberheists across dozens of victims resulted from thieves cracking master passwords stolen from the password manager service LastPass in 2022. In a court filing this week, U.S. federal agents investigating a spectacular $150 million cryptocurrency heist said they had reached the same conclusion.

Published on: March 08, 2025 | Source: Krebs on Security favicon Krebs on Security

Friday Squid Blogging: Squid Loyalty Cards

Squid is a loyalty card platform in Ireland. Blog moderation policy.

Published on: March 07, 2025 | Source: Schneier on Security favicon Schneier on Security

'Spearwing' RaaS Group Ruffles Feathers in Cyber Threat Scene

The group is using the Medusa malware and taking up space once held by other notable ransomware groups like LockBot, increasing its victim list to 400 and demanding astoundingly high ransoms.

Published on: March 07, 2025 | Source: Dark Reading favicon Dark Reading

'Spearwing' RaaS Group Ruffles Feathers in Cyber-Threat Scene

The group is using the Medusa malware and taking up space once held by other notable ransomware groups like LockBot, increasing its victim list to 400 and demanding astoundingly high ransoms.

Published on: March 07, 2025 | Source: Dark Reading favicon Dark Reading

MITRE EMB3D for OT & ICS Threat Modeling Takes Flight

Manufacturers and infrastructure providers are gaining options to satisfy regulations and boost cyber safety for embedded and industrial control systems, as EMB3D, STRIDE, and ATT&CK for ICS gain traction.

Published on: March 07, 2025 | Source: Dark Reading favicon Dark Reading

Static Scans, Red Teams, and Frameworks Aim to Find Bad AI Models

With hundreds of artificial intelligence models found harboring malicious code, cybersecurity firms are releasing technology to help companies manage their AI development and deployment efforts.

Published on: March 07, 2025 | Source: Dark Reading favicon Dark Reading

Cybercrime's Cobalt Strike Use Plummets 80% Worldwide

Fortra, Microsoft, and Health-ISAC have combined forces to claw back one of hackers' most prized attack tools, with massive takedowns.

Published on: March 07, 2025 | Source: Dark Reading favicon Dark Reading

Zero-Days Put Tens of 1,000s of Orgs at Risk for VM Escape Attacks

More than 41,000 ESXi instances remain vulnerable to a critical VMware vulnerability, one of three that Broadcom disclosed earlier this week.

Published on: March 07, 2025 | Source: Dark Reading favicon Dark Reading

CISA completed its election security review. It won’t make the results public

Critics said the decision creates broad uncertainty among other stakeholders who work to protect elections. The post CISA completed its election security review. It won’t make the results public appeared first on CyberScoop.

Published on: March 07, 2025 | Source: CyberScoop favicon CyberScoop

Taylor Swift Ticket Thieves Charged in Court for Resale Operation

The pair found a loophole through StubHub's services, allowing them to steal tickets and resell them for personal profit, amassing hundreds of thousands of dollars.

Published on: March 07, 2025 | Source: Dark Reading favicon Dark Reading

Rayhunter: Device to Detect Cellular Surveillance

The EFF has created an open-source hardware tool to detect IMSI catchers: fake cell phone towers that are used for mass surveillance of an area. It runs on a $20 mobile hotspot.

Published on: March 07, 2025 | Source: Schneier on Security favicon Schneier on Security

In Other News: EntrySign AMD Flaw, Massive Attack Targets ISPs, ENISA Report

Noteworthy stories that might have slipped under the radar: Google discloses AMD CPU flaw named EntrySign, ISPs in the US and China targeted in massive attack, ENISA report on NIS2 Directive. The post In Other News: EntrySign AMD Flaw, Massive Attack Targets ISPs, ENISA Report appeared first on SecurityWeek.

Published on: March 07, 2025 | Source: SecurityWeek favicon SecurityWeek

Ransomware poseurs are trying to extort businesses through physical letters

The FBI is warning business leaders about the scam perpetrated by an unidentified threat group. The post Ransomware poseurs are trying to extort businesses through physical letters appeared first on CyberScoop.

Published on: March 07, 2025 | Source: CyberScoop favicon CyberScoop

Russian crypto exchange Garantex seized in international law enforcement operation

The Department of Justice also indicted two men tied to the exchange. The post Russian crypto exchange Garantex seized in international law enforcement operation appeared first on CyberScoop.

Published on: March 07, 2025 | Source: CyberScoop favicon CyberScoop