Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Cleveland Municipal Court Remains Closed After Cyber Incident

No details yet on what forced the court to shut down affected systems and halt operations as of late Feb. 23.

Published on: February 27, 2025 | Source: Dark Reading favicon Dark Reading

Nakivo Fixes Critical Flaw in Backup & Replication Tool

The vendor's products fall in a category that ransomware operators like to target to circumvent victims' ability to recover from a successful attack.

Published on: February 27, 2025 | Source: Dark Reading favicon Dark Reading

Microsoft Rolls Out Fresh Outlook Fix After Faulty Windows Update

Windows 11 users can deploy a workaround or await the update rollout.

Published on: February 27, 2025 | Source: Dark Reading favicon Dark Reading

3 Things to Know About AI Data Poisoning

Data poisoning represents the next big existential cybersecurity threat β€” unless organizations can ensure their AI systems are safe and trustworthy.

Published on: February 27, 2025 | Source: Dark Reading favicon Dark Reading

26 New Threat Groups Spotted in 2024: CrowdStrike

CrowdStrike has published its 2025 GlobalThreat Report, which warns of faster breakout time and an increase in Chinese activity. The post 26 New Threat Groups Spotted in 2024: CrowdStrike appeared first on SecurityWeek.

Published on: February 27, 2025 | Source: SecurityWeek favicon SecurityWeek

Microsoft IDs developers behind alleged generative AI hacking-for-hire scheme

An amended complaint identifies a number of overseas individuals as key players β€œat the center of a global cybercrime network” that sold access to jailbroken generative AI tools. The post Microsoft IDs developers behind alleged generative AI hacking-for-hire scheme appeared first on CyberScoop.

Published on: February 27, 2025 | Source: CyberScoop favicon CyberScoop

β€œEmergent Misalignment” in LLMs

Interesting research: β€œEmergent Misalignment: Narrow finetuning can produce broadly misaligned LLMsβ€œ: Abstract: We present a surprising result regarding LLMs and alignment. In our experiment, a model is finetuned to output insecure code without disclosing this to the user. The resulting model acts misaligned on a broad range of prompts that are unrelated to coding: it asserts that humans should be enslaved by AI, gives...

Published on: February 27, 2025 | Source: Schneier on Security favicon Schneier on Security

Hacker Behind Over 90 Data Leaks Arrested in Thailand

A Singaporean man accused of being a hacker responsible for over 90 data leaks has been arrested in Thailand. The post Hacker Behind Over 90 Data Leaks Arrested in Thailand appeared first on SecurityWeek.

Published on: February 27, 2025 | Source: SecurityWeek favicon SecurityWeek

Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations

A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 as part of phishing emails masquerading as the country's National Taxation Bureau. The campaign, detected last month by Fortinet FortiGuard Labs, marks a departure from previous attack chains that have leveraged malicious game-related applications. "The sender claimed that the malicious file attached was a list of

Published on: February 27, 2025 | Source: The Hacker News favicon The Hacker News

Watch Now: Ransomware Resilience & Recovery Summit – All Sessions Available on Demand

SecurityWeek's 2025 Ransomware Resilience & Recovery Summit tool place on February 26th as a fully immersive virtual event. The post Watch Now: Ransomware Resilience & Recovery Summit – All Sessions Available on Demand appeared first on SecurityWeek.

Published on: February 27, 2025 | Source: SecurityWeek favicon SecurityWeek

Chinese APT Uses VPN Bug to Exploit Worldwide OT Orgs

Companies critical to the aviation and aerospace supply chains didn't patch a known CVE, providing opportunity for foreign espionage.

Published on: February 27, 2025 | Source: Dark Reading favicon Dark Reading

Generative AI Shows Promise for Faster Triage of Vulnerabilities

A host of automated approaches identifies and remediates potential vulns while still retaining a role for security analysts to filter for context and business criticality.

Published on: February 27, 2025 | Source: Dark Reading favicon Dark Reading

Hackers Can Crack Into Car Cameras in Minutes Flat

It's shockingly simple to turn a car dashcam into a powerful reconnaissance tool for gathering everyday routine and location data, researchers warn.

Published on: February 27, 2025 | Source: Dark Reading favicon Dark Reading

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

The threat actor known as Space Pirates has been linked to a malicious campaign targeting Russian information technology (IT) organizations with a previously undocumented malware called LuckyStrike Agent. The activity was detected in November 2024 by Solar, the cybersecurity arm of Russian state-owned telecom company Rostelecom. It's tracking the activity under the name Erudite Mogwai. The

Published on: February 27, 2025 | Source: The Hacker News favicon The Hacker News

The Hidden Cost of Compliance: When Regulations Weaken Security

The current state of regulation and the overwhelming burden it brings to most enterprises is a discussion worth having The post The Hidden Cost of Compliance: When Regulations Weaken Security appeared first on SecurityWeek.

Published on: February 27, 2025 | Source: SecurityWeek favicon SecurityWeek

89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals

Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their business plans, or both. To drive informed decision-making and effective planning, the availability of hard data is essentialβ€”yet such data remains surprisingly scarce. The β€œEnterprise GenAI Data Security Report 2025” by LayerX delivers unprecedented insights

Published on: February 27, 2025 | Source: The Hacker News favicon The Hacker News

New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

Cybersecurity researchers have discovered an updated version of an Android malware called TgToxic (aka ToxicPanda), indicating that the threat actors behind it are continuously making changes in response to public reporting. "The modifications seen in the TgToxic payloads reflect the actors' ongoing surveillance of open source intelligence and demonstrate their commitment to enhancing the

Published on: February 27, 2025 | Source: The Hacker News favicon The Hacker News

Failure, Rinse, Repeat: Why do Both History and Security Seem Doomed to Repeat Themselves? Β Β Β Β 

Let’s examine, through the lens of some historic breaches, the five most common mistakes that still serve as a catalyst to compromise. The post Failure, Rinse, Repeat: Why do Both History and Security Seem Doomed to Repeat Themselves? appeared first on SecurityWeek.

Published on: February 27, 2025 | Source: SecurityWeek favicon SecurityWeek

Bernhard Schölkopf: Is AI intelligent? | Starmus highlights

With AI's pattern recognition capabilities well-established, Mr. SchΓΆlkopf's talk shifts the focus to a pressing question: what will be the next great leap for AI?

Published on: February 27, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices

A new malware campaign has been observed targeting edge devices from Cisco, ASUS, QNAP, and Synology to rope them into a botnet named PolarEdge since at least the end of 2023. French cybersecurity company Sekoia said it observed the unknown threat actors deploying a backdoor by leveraging CVE-2023-20118 (CVSS score: 6.5), a critical security flaw impacting Cisco Small Business RV016, RV042,

Published on: February 27, 2025 | Source: The Hacker News favicon The Hacker News

It’s not just Salt Typhoon: All China-backed attack groups are showcasing specialized offensive skills

CrowdStrike observed significant growth in China’s offensive cyber capabilities last year as more groups used sector-specific skills to target critical industries and technologies. The post It’s not just Salt Typhoon: All China-backed attack groups are showcasing specialized offensive skills appeared first on CyberScoop.

Published on: February 27, 2025 | Source: CyberScoop favicon CyberScoop

Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers

The U.S. Federal Bureau of Investigation (FBI) formally linked the record-breaking $1.5 billion Bybit hack to North Korean threat actors, as the company's CEO Ben Zhou declared a "war against Lazarus." The agency said the Democratic People's Republic of Korea (North Korea) was responsible for the theft of the virtual assets from the cryptocurrency exchange, attributing it to a specific cluster

Published on: February 27, 2025 | Source: The Hacker News favicon The Hacker News

U.S. Soldier Charged in AT&T Hack Searched β€œCan Hacking Be Treason”

A U.S. Army soldier who pleaded guilty last week to leaking phone records for high-ranking U.S. government officials searched online for non-extradition countries and for an answer to the question "can hacking be treason?" prosecutors in the case said Wednesday. The government disclosed the details in a court motion to keep the defendant in custody until he is discharged from the military.

Published on: February 27, 2025 | Source: Krebs on Security favicon Krebs on Security

OpenSSF Sets Minimum Security Baselines for Open Source Projects

OSPS Baseline provides a starting point for project owners and adopters to understand an open source project's security posture by outlining all the controls that have been applied.

Published on: February 26, 2025 | Source: Dark Reading favicon Dark Reading

AI-Fueled Tax Scams on the Rise

Published on: February 26, 2025 | Source: Dark Reading favicon Dark Reading

Anubis Threat Group Seeks Out Critical Industry Victims

The threat group has a variety of tactics in its toolbox, including double extortion and ransomware-as-a-service.

Published on: February 26, 2025 | Source: Dark Reading favicon Dark Reading

Cyber workforce legislation vote gives rise to partisan rift on House Homeland Security Committee

Democrats voted against a bill they once supported, citing President Trump’s actions on cyber personnel. The post Cyber workforce legislation vote gives rise to partisan rift on House Homeland Security Committee appeared first on CyberScoop.

Published on: February 26, 2025 | Source: CyberScoop favicon CyberScoop

Water Utility Co. Still Paying the Breach Price a Year Later

The UK's Southern Water has been forced to shell out millions due to a Black Basta cyberattack, and it has come to light that the total could include a ransom payment.

Published on: February 26, 2025 | Source: Dark Reading favicon Dark Reading

'Silver Fox' APT Skirts Windows Blocklist in BYOVD Attack

There's an untapped universe of exploitable drivers in the wild today. By exploiting just one of them, attackers were able to defeat security tools and infect Asian citizens with Gh0stRAT.

Published on: February 26, 2025 | Source: Dark Reading favicon Dark Reading

Karen Evans steps into a leading federal cyber position: executive assistant director for cybersecurity at CISA

The experienced cyber and IT government hand takes on a role leading the cybersecurity half of the agency. The post Karen Evans steps into a leading federal cyber position: executive assistant director for cybersecurity at CISA appeared first on CyberScoop.

Published on: February 26, 2025 | Source: CyberScoop favicon CyberScoop

Now Live: Ransomware Resilience & Recovery Summit – Join the Virtual Event In-Progress

SecurityWeek's 2025 Ransomware Resilience & Recovery Summit takes place today, February 26th, as a fully immersive virtual event. The post Now Live: Ransomware Resilience & Recovery Summit – Join the Virtual Event In-Progress appeared first on SecurityWeek.

Published on: February 26, 2025 | Source: SecurityWeek favicon SecurityWeek

Name That Toon: Ka-Ching!

Feeling creative? Have something to say about cybersecurity? Submit your caption and our panel of experts will reward the winner with a $25 gift card.

Published on: February 26, 2025 | Source: Dark Reading favicon Dark Reading

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites

A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts across hundreds of websites with the goal of manipulating search results and fueling a spam ads campaign at scale. Security researcher Oleg Zaytsev, in a report shared with The Hacker News, said the campaign – dubbed 360XSS – affected over 350 websites,

Published on: February 26, 2025 | Source: The Hacker News favicon The Hacker News