Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to Fault-Tolerant Qubits

Amazon claims its researchers have combined cat qubit technology and additional quantum error correction components onto a microchip that can be manufactured in a scalable fashion. The post Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to Fault-Tolerant Qubits appeared first on SecurityWeek.

Published on: March 03, 2025 | Source: SecurityWeek favicon SecurityWeek

Mimic Raises $50 Million to Stop Ransomware Attacks

Ransomware defense startup Mimic has raised $50 million in a Series A funding round led by Google Ventures and Menlo Ventures. The post Mimic Raises $50 Million to Stop Ransomware Attacks appeared first on SecurityWeek.

Published on: March 03, 2025 | Source: SecurityWeek favicon SecurityWeek

US Seizes $31 Million Worth of Crypto Stolen in Uranium Finance Hack

The US government has seized roughly $31 million in cryptocurrency stolen in 2021 from Uranium Finance. The post US Seizes $31 Million Worth of Crypto Stolen in Uranium Finance Hack appeared first on SecurityWeek.

Published on: March 03, 2025 | Source: SecurityWeek favicon SecurityWeek

⚑ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists

This week, a 23-year-old Serbian activist found themselves at the crossroads of digital danger when a sneaky zero-day exploit turned their Android device into a target. Meanwhile, Microsoft pulled back the curtain on a scheme where cybercriminals used AI tools for harmful pranks, and a massive trove of live secrets was discovered, reminding us that even the tools we rely on can hide risky

Published on: March 03, 2025 | Source: The Hacker News favicon The Hacker News

Indian Stock Broker Angel One Discloses Data Breach

Angel One says client information was compromised in a data breach involving its AWS account. The post Indian Stock Broker Angel One Discloses Data Breach appeared first on SecurityWeek.

Published on: March 03, 2025 | Source: SecurityWeek favicon SecurityWeek

The New Ransomware Groups Shaking Up 2025

In 2024, global ransomware attacks hit 5,414, an 11% increase from 2023. After a slow start, attacks spiked in Q2 and surged in Q4, with 1,827 incidents (33% of the year's total). Law enforcement actions against major groups like LockBit caused fragmentation, leading to more competition and a rise in smaller gangs. The number of active ransomware groups jumped 40%, from 68 in 2023 to 95

Published on: March 03, 2025 | Source: The Hacker News favicon The Hacker News

Black Basta Leak Offers Glimpse Into Group’s Inner WorkingsΒ 

A massive hoard of internal chats has been leaked from Black Basta, rivalling the Conti leaks of late February 2022. The post Black Basta Leak Offers Glimpse Into Group’s Inner Workings appeared first on SecurityWeek.

Published on: March 03, 2025 | Source: SecurityWeek favicon SecurityWeek

Martin Rees: Post-human intelligence – a cosmic perspective | Starmus highlights

Take a moment to think beyond our current capabilities and consider what might come next in the grand story of evolution

Published on: March 03, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

Vo1d Botnet's Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries

Brazil, South Africa, Indonesia, Argentina, and Thailand have become the targets of a campaign that has infected Android TV devices with a botnet malware dubbed Vo1d. The improved variant of Vo1d has been found to encompass 800,000 daily active IP addresses, with the botnet scaling a peak of 1,590,299 on January 19, 2025, spanning 226 countries and regions. As of February 25, 2025, India has

Published on: March 03, 2025 | Source: The Hacker News favicon The Hacker News

Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language

Firefox browser maker Mozilla on Friday updated its Terms of Use a second time within a week following criticism overbroad language that appeared to give the company the rights to all information uploaded by users. The revised Terms of Use now states - You give Mozilla the rights necessary to operate Firefox. This includes processing your data as we describe in the Firefox Privacy Notice. It

Published on: March 01, 2025 | Source: The Hacker News favicon The Hacker News

SolarWinds CISO says security execs are β€˜nervous’ about individual liability for data breachesΒ 

Tim Brown didn’t call for indemnification laws, but suggested that CISOs dealing with legal implications for cyberattacks is stressful and a distraction from their core work. The post SolarWinds CISO says security execs are β€˜nervous’ about individual liability for data breaches appeared first on CyberScoop.

Published on: February 28, 2025 | Source: CyberScoop favicon CyberScoop

Cisco's SnapAttack Deal Expands Splunk's Capabilities

The addition of SnapAttack, a startup incubated by Booz Allen Hamilton’s Darklabs, will enhance Splunk with accelerated SIEM migration and proactive threat hunting.

Published on: February 28, 2025 | Source: Dark Reading favicon Dark Reading

Friday Squid Blogging: Eating Bioluminescent Squid

Firefly squid is now a delicacy in New York. Blog moderation policy.

Published on: February 28, 2025 | Source: Schneier on Security favicon Schneier on Security

Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist

Amnesty International publishes technical details on zero-day vulnerabilities exploited by Cellebrite’s mobile forensic tools to spy on a Serbian student activist. The post Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist appeared first on SecurityWeek.

Published on: February 28, 2025 | Source: SecurityWeek favicon SecurityWeek

Notorious Malware, Spam Host β€œProspero” Moves to Kaspersky Lab

One of the most notorious providers of abuse-friendly "bulletproof" web hosting for cybercriminals has started routing its operations through networks run by the Russian antivirus and security firm Kaspersky Lab, KrebsOnSecurity has learned.

Published on: February 28, 2025 | Source: Krebs on Security favicon Krebs on Security

Microsoft Busts Hackers Selling Illegal Azure AI Access

LLMjacking operation leveraged illicit access GenAI services to produce explicit celebrity images and other harmful content, Microsoft's digital crimes unit says.

Published on: February 28, 2025 | Source: Dark Reading favicon Dark Reading

US Soldier Intends to Admit Hacking 15 Telecom Carriers

The federal government views the defendant as a flight risk and danger to the community due to his ability to access sensitive and private information.

Published on: February 28, 2025 | Source: Dark Reading favicon Dark Reading

Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone

A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International. "The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite," the international non-governmental

Published on: February 28, 2025 | Source: The Hacker News favicon The Hacker News

Third-Party Risk Tops Cybersecurity Claims

Data collected by cyber insurers shows that ransomware accounts for the majority of insurance claims, but much of the losses stem from third-party breaches affecting policyholders.

Published on: February 28, 2025 | Source: Dark Reading favicon Dark Reading

Third-Party Risk Top Cybersecurity Claims

Data collected by cyber-insurers show that ransomware accounts for the majority of insurance claims, but that much of the losses stem from third-party breaches affecting policyholders.

Published on: February 28, 2025 | Source: Dark Reading favicon Dark Reading

Top 10 Most Probable Ways a Company Can Be Hacked

How to win the battle with root cause analysis and a data-driven approach.

Published on: February 28, 2025 | Source: Dark Reading favicon Dark Reading

Gabbard Decries Britain’s Reported Demand for Apple to Provide Backdoor Access to Users’ Cloud Data

The Director of National Intelligence said such a demand would violate Americans’ rights and raise concerns about a foreign government pressuring a U.S.-based technology company. The post Gabbard Decries Britain’s Reported Demand for Apple to Provide Backdoor Access to Users’ Cloud Data appeared first on SecurityWeek.

Published on: February 28, 2025 | Source: SecurityWeek favicon SecurityWeek

RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable

Remote Desktop Protocol (RDP) is an amazing technology developed by Microsoft that lets you access and control another computer over a network. It’s like having your office computer with you wherever you go. For businesses, this means IT staff can manage systems remotely, and employees can work from home or anywhere, making RDP a true game-changer in today’s work environment. But here’s the

Published on: February 28, 2025 | Source: The Hacker News favicon The Hacker News

Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains

Cybersecurity researchers have uncovered a widespread phishing campaign that uses fake CAPTCHA images shared via PDF documents hosted on Webflow's content delivery network (CDN) to deliver the Lumma stealer malware. Netskope Threat Labs said it discovered 260 unique domains hosting 5,000 phishing PDF files that redirect victims to malicious websites. "The attacker uses SEO to trick victims into

Published on: February 28, 2025 | Source: The Hacker News favicon The Hacker News

In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story

Noteworthy stories that might have slipped under the radar: Krispy Kreme data breach costs $11M, Pwn2Own moves to Berlin, the story of the 2024 Disney hack. The post In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story appeared first on SecurityWeek.

Published on: February 28, 2025 | Source: SecurityWeek favicon SecurityWeek

Ransomware Group Takes Credit for Lee Enterprises Attack

The Qilin ransomware gang claims to have stolen 350 Gb of files from Lee Enterprises in the attack that caused newspaper disruptions. The post Ransomware Group Takes Credit for Lee Enterprises Attack appeared first on SecurityWeek.

Published on: February 28, 2025 | Source: SecurityWeek favicon SecurityWeek

Microsoft Names Suspects in Lawsuit Against AI Hackers

In a lawsuit targeting cybercriminals who abuse AI services, Microsoft has named individuals from Iran, the UK, China and Vietnam. The post Microsoft Names Suspects in Lawsuit Against AI Hackers appeared first on SecurityWeek.

Published on: February 28, 2025 | Source: SecurityWeek favicon SecurityWeek

Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme

Microsoft on Thursday unmasked four of the individuals that it said were behind an Azure Abuse Enterprise scheme that involves leveraging unauthorized access to generative artificial intelligence (GenAI) services in order to produce offensive and harmful content. The campaign, called LLMjacking, has targeted various AI offerings, including Microsoft's Azure OpenAI Service. The tech giant is

Published on: February 28, 2025 | Source: The Hacker News favicon The Hacker News

12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training

A dataset used to train large language models (LLMs) has been found to contain nearly 12,000 live secrets, which allow for successful authentication. The findings once again highlight how hard-coded credentials pose a severe security risk to users and organizations alike, not to mention compounding the problem when LLMs end up suggesting insecure coding practices to their users. Truffle

Published on: February 28, 2025 | Source: The Hacker News favicon The Hacker News

Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani

Big shifts in the infostealer scene, novel attack vector against iOS and Android, and a massive surge in investment scams on social media

Published on: February 28, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus

The threat actor known as Sticky Werewolf has been linked to targeted attacks primarily in Russia and Belarus with the aim of delivering the Lumma Stealer malware by means of a previously undocumented implant. Cybersecurity company Kaspersky is tracking the activity under the name Angry Likho, which it said bears a "strong resemblance" to Awaken Likho (aka Core Werewolf, GamaCopy, and

Published on: February 28, 2025 | Source: The Hacker News favicon The Hacker News

Targeted by Ransomware, Middle East Banks Shore Up Security

As the UAE financial sector finished up its annual cyberattack exercise, its worries about ransomware compromises and geopolitical attacks are on the rise.

Published on: February 28, 2025 | Source: Dark Reading favicon Dark Reading

Army soldier linked to Snowflake attack spree allegedly tried to sell data to foreign spies

Federal prosecutors accuse Cameron Wagenius of searching how to defect to Russia before he tried to sell stolen data to a foreign intelligence service. The post Army soldier linked to Snowflake attack spree allegedly tried to sell data to foreign spies appeared first on CyberScoop.

Published on: February 27, 2025 | Source: CyberScoop favicon CyberScoop

Here’s what Google is (and isn’t) planning with SMS account verification

The company wants its users to move away from using SMS in two-step verification. The post Here’s what Google is (and isn’t) planning with SMS account verification appeared first on CyberScoop.

Published on: February 27, 2025 | Source: CyberScoop favicon CyberScoop

CFPB nominee signals openness to continuing data-broker work

Jonathan McKernan spoke positively about Rohit Chopra’s rule-making targeting data brokers during a Senate Banking Committee nomination hearing. The post CFPB nominee signals openness to continuing data-broker work appeared first on CyberScoop.

Published on: February 27, 2025 | Source: CyberScoop favicon CyberScoop