Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

How Cyberattacks Affect Your Staff

Businesses have a responsibility to safeguard their workforce, which is best achieved by preparing and equipping the whole organization to better face these worst-case cyber scenarios.

Published on: March 07, 2025 | Source: Dark Reading favicon Dark Reading

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations

Threat hunters have shed light on a "sophisticated and evolving malware toolkit" called Ragnar Loader that's used by various cybercrime and ransomware groups like Ragnar Locker (aka Monstrous Mantis), FIN7, FIN8, and Ruthless Mantis (ex-REvil). "Ragnar Loader plays a key role in keeping access to compromised systems, helping attackers stay in networks for long-term operations," Swiss

Published on: March 07, 2025 | Source: The Hacker News favicon The Hacker News

FBI: Fake Ransomware Attack Claims Sent to US Executives via Snail MailΒ 

An extortion group has been sending physical mail to corporate executives, threatening to leak their data unless a ransom is paid. The post FBI: Fake Ransomware Attack Claims Sent to US Executives via Snail Mail appeared first on SecurityWeek.

Published on: March 07, 2025 | Source: SecurityWeek favicon SecurityWeek

Microsoft Warns of Malvertising Campaign Infecting Over 1 Million Devices Worldwide

Microsoft has disclosed details of a large-scale malvertising campaign that's estimated to have impacted over one million devices globally as part of what it said is an opportunistic attack designed to steal sensitive information. The tech giant, which detected the activity in early December 2024, is tracking it under the broader umbrella Storm-0408, a moniker used for a set of threat actors

Published on: March 07, 2025 | Source: The Hacker News favicon The Hacker News

18,000 Organizations Impacted by NTT Com Data Breach

NTT Communications Corporation has disclosed a data breach impacting the information of nearly 18,000 customer organizations. The post 18,000 Organizations Impacted by NTT Com Data Breach appeared first on SecurityWeek.

Published on: March 07, 2025 | Source: SecurityWeek favicon SecurityWeek

Many Schools Report Data Breach After Retirement Services Firm Hit by Ransomware

Dozens of schools and thousands of individuals are impacted by a data breach resulting from a ransomware attack on Carruth Compliance Consulting. The post Many Schools Report Data Breach After Retirement Services Firm Hit by Ransomware appeared first on SecurityWeek.

Published on: March 07, 2025 | Source: SecurityWeek favicon SecurityWeek

Webinar: Learn How ASPM Transforms Application Security from Reactive to Proactive

Are you tired of dealing with outdated security tools that never seem to give you the full picture? You’re not alone. Many organizations struggle with piecing together scattered information, leaving your apps vulnerable to modern threats. That’s why we’re excited to introduce a smarter, unified approach: Application Security Posture Management (ASPM). ASPM brings together the best of both

Published on: March 07, 2025 | Source: The Hacker News favicon The Hacker News

New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance

Google Cloud’s AI Protection helps discover AI inventory, secure AI assets, and manage threats with detect, investigate, and respond capabilities. The post New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance appeared first on SecurityWeek.

Published on: March 07, 2025 | Source: SecurityWeek favicon SecurityWeek

What PCI DSS v4 Really Means – Lessons from A&F Compliance Journey

Access on-demand webinar here Avoid a $100,000/month Compliance Disaster March 31, 2025: The Clock is Ticking. What if a single overlooked script could cost your business $100,000 per month in non-compliance fines? PCI DSS v4 is coming, and businesses handling payment card data must be prepared. Beyond fines, non-compliance exposes businesses to web skimming, third-party script attacks, and

Published on: March 07, 2025 | Source: The Hacker News favicon The Hacker News

Medusa Ransomware Attacks Increase

The number of Medusa ransomware attacks observed in the first two months of 2025 doubled compared to the same period last year. The post Medusa Ransomware Attacks Increase appeared first on SecurityWeek.

Published on: March 07, 2025 | Source: SecurityWeek favicon SecurityWeek

This Malicious PyPI Package Stole Ethereum Private Keys via Polygon RPC Transactions

Cybersecurity researchers have discovered a malicious Python package on the Python Package Index (PyPI) repository that's equipped to steal a victim's Ethereum private keys by impersonating popular libraries. The package in question is set-utils, which has received 1,077 downloads to date. It's no longer available for download from the official registry. "Disguised as a simple utility for Python

Published on: March 07, 2025 | Source: The Hacker News favicon The Hacker News

U.S. Secret Service Seizes Russian Garantex Crypto Exchange Website

A coalition of international law enforcement agencies has seized the website associated with the cryptocurrency exchange Garantex ("garantex[.]org"), nearly three years after the service was sanctioned by the U.S. Treasury Department in April 2022. "The domain for Garantex has been seized by the United States Secret Service pursuant to a seizure warrant obtained by the United States Attorney's

Published on: March 07, 2025 | Source: The Hacker News favicon The Hacker News

Safe{Wallet} Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist

Safe{Wallet} has revealed that the cybersecurity incident that led to the Bybit $1.5 billion crypto heist is a "highly sophisticated, state-sponsored attack," stating the North Korean threat actors behind the hack took steps to erase traces of the malicious activity in an effort to hamper investigation efforts. The multi-signature (multisig) platform, which has roped in Google Cloud Mandiant to

Published on: March 07, 2025 | Source: The Hacker News favicon The Hacker News

PHP-CGI RCE Flaw Exploited in Attacks on Japan's Tech, Telecom, and E-Commerce Sectors

Threat actors of unknown provenance have been attributed to a malicious campaign predominantly targeting organizations in Japan since January 2025. "The attacker has exploited the vulnerability CVE-2024-4577, a remote code execution (RCE) flaw in the PHP-CGI implementation of PHP on Windows, to gain initial access to victim machines," Cisco Talos researcher Chetan Raghuprasad said in a technical

Published on: March 07, 2025 | Source: The Hacker News favicon The Hacker News

Intel Maps New vPro Chips to MITRE's ATT&CK Framework

The PC Security Stack Mappings project improves the security posture of corporate PCs by aligning each of the security features found in vPro PC and Core Ultra chips with the techniques described in MITRE's ATT&CK.

Published on: March 07, 2025 | Source: Dark Reading favicon Dark Reading

Who is the DOGE and X Technician Branden Spikes?

At 49, Branden Spikes isn't just one of the oldest technologists who has been involved in Elon Musk's Department of Government Efficiency (DOGE). As the current director of information technology at X/Twitter and an early hire at PayPal, Zip2, Tesla and SpaceX, Spikes is also among Musk's most loyal employees. Here's a closer look at this trusted Musk lieutenant, whose Russian ex-wife was once married to Elon's cousin....

Published on: March 07, 2025 | Source: Krebs on Security favicon Krebs on Security

'EncryptHub' OPSEC Failures Reveal TTPs & Big Plans

Is EncryptHub the most prolific cybercriminal in recent history? Or, as new information suggests, a bumbling amateur?

Published on: March 06, 2025 | Source: Dark Reading favicon Dark Reading

Under Pressure: US Charges China's APT-for-Hire Hackers

The US Justice Department on Wednesday announced charges against members of the Chinese-backed i-Soon "secret" APT and APT27, the latter implicated in January's Treasury breach.

Published on: March 06, 2025 | Source: Dark Reading favicon Dark Reading

Women Faced the Brunt of Cybersecurity Cutbacks in 2024

Many women are finding that they are unhappy in their cybersecurity roles, largely due to the layoffs their companies are experiencing, cutbacks, and return to in-office work policies.

Published on: March 06, 2025 | Source: Dark Reading favicon Dark Reading

Enterprise AI Through a Data Security Lens: Balancing Productivity With Safety

Recently, 57 countries signed an agreement pledging an "open" and "inclusive" approach to AI's development. The US and UK were not among them, with the US vice president implying productivity should be the priority over safety. Should the opportunity for AI to drive innovation and productivity be prioritized over safety and security?

Published on: March 06, 2025 | Source: Dark Reading favicon Dark Reading

CISA Cuts: A Dangerous Gamble in a Dangerous World

The Cybersecurity and Infrastructure Security Agency's role in risk management needs to expand, not shrink.

Published on: March 06, 2025 | Source: Dark Reading favicon Dark Reading

Silk Typhoon shifted to specifically targeting IT management companies

The Chinese state-backed espionage group started targeting third-party IT services in late 2024, Microsoft researchers said. The post Silk Typhoon shifted to specifically targeting IT management companies appeared first on CyberScoop.

Published on: March 06, 2025 | Source: CyberScoop favicon CyberScoop

Deepfake Videos of YouTube CEO Phish Creators

YouTube creators are being targeted by scammers seeking out their credentials, using deepfake tactics to lure them in with a false sense of legitimacy.

Published on: March 06, 2025 | Source: Dark Reading favicon Dark Reading

House Passes Bill Requiring Federal Contractors to Implement Vulnerability Disclosure Policies

The House of Representatives has passed a bill aimed at requiring federal contractors to have a Vulnerability Disclosure Policy (VDP). The post House Passes Bill Requiring Federal Contractors to Implement Vulnerability Disclosure Policies appeared first on SecurityWeek.

Published on: March 06, 2025 | Source: SecurityWeek favicon SecurityWeek

Nigerian Accused of Hacking Tax Preparation Firms Extradited to US

Matthew Akande was extradited to the US to face charges for his role in hacking into Massachusetts tax preparation firms’ networks. The post Nigerian Accused of Hacking Tax Preparation Firms Extradited to US appeared first on SecurityWeek.

Published on: March 06, 2025 | Source: SecurityWeek favicon SecurityWeek

Financial Organizations Urge CISA to Revise Proposed CIRCIA Implementation

A group of financial organizations is asking CISA to rescind and reissue its proposed implementation of CIRCIA. The post Financial Organizations Urge CISA to Revise Proposed CIRCIA Implementation appeared first on SecurityWeek.

Published on: March 06, 2025 | Source: SecurityWeek favicon SecurityWeek

Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution

Elastic has rolled out security updates to address a critical security flaw impacting the Kibana data visualization dashboard software for Elasticsearch that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-25015, carries a CVSS score of 9.9 out of a maximum of 10.0. It has been described as a case of prototype pollution. "Prototype pollution in Kibana leads to

Published on: March 06, 2025 | Source: The Hacker News favicon The Hacker News

EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing

The financially motivated threat actor known as EncryptHub has been observed orchestrating sophisticated phishing campaigns to deploy information stealers and ransomware, while also working on a new product called EncryptRAT. "EncryptHub has been observed targeting users of popular applications, by distributing trojanized versions," Outpost24 KrakenLabs said in a new report shared with The

Published on: March 06, 2025 | Source: The Hacker News favicon The Hacker News

Outsmarting Cyber Threats with Attack Graphs

Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations can no longer rely on periodic assessments or static vulnerability lists to stay secure. Instead, they need a dynamic approach that provides real-time insights into how attackers move through their environment. This is where attack graphs come in. By mapping potential attack paths

Published on: March 06, 2025 | Source: The Hacker News favicon The Hacker News

The Combined Cipher Machine

Interesting articleβ€”with photos!β€”of the US/UK β€œCombined Cipher Machine” from WWII.

Published on: March 06, 2025 | Source: Schneier on Security favicon Schneier on Security

Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom

The threat actors behind the Medusa ransomware have claimed nearly 400 victims since it first emerged in January 2023, with the financially motivated attacks witnessing a 42% increase between 2023 and 2024. In the first two months of 2025 alone, the group has claimed over 40 attacks, according to data from the Symantec Threat Hunter Team shared with The Hacker News. The cybersecurity company is

Published on: March 06, 2025 | Source: The Hacker News favicon The Hacker News

AIceberg Gets $10 Million in Seed Funding for AI Security Platform

AIceberg has launched a solution that helps governments and enterprises with the safe, secure and compliant adoption of AI. The post AIceberg Gets $10 Million in Seed Funding for AI Security Platform appeared first on SecurityWeek.

Published on: March 06, 2025 | Source: SecurityWeek favicon SecurityWeek

Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

Over 1,000 websites powered by WordPress have been infected with a third-party JavaScript code that injects four separate backdoors. "Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed," c/side researcher Himanshu Anand said in a Wednesday analysis. The malicious JavaScript code has been found to be served via cdn.csyndication[

Published on: March 06, 2025 | Source: The Hacker News favicon The Hacker News

Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks

Scans show that tens of thousands of VMware ESXi instances are affected by CVE-2025-22224 and other vulnerabilities disclosed recently as zero-days. The post Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks appeared first on SecurityWeek.

Published on: March 06, 2025 | Source: SecurityWeek favicon SecurityWeek

Ransomware Attacks Build Against Saudi Construction Firms

Cybercriminals are ramping up their efforts in the Kingdom and targeting more than just petroleum firms; now, they're aiming for Middle East organizations in the IT, government, construction, and real estate sectors too.

Published on: March 06, 2025 | Source: Dark Reading favicon Dark Reading