Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

There Are More CVEs, But Cyber Insurers Aren't Altering Policies

With nearly 47,000 CVEs expected by the end of the year, organizations must balance comprehensive vulnerability management with strategic cyber insurance policy selection to effectively navigate this rapidly evolving threat landscape.

Dark Reading favicon Dark Reading β€’ 19 days ago β€’ 1 min read

For One NFL Team, Tackling Cyber Threats Is Basic Defense

The NFL's cyberattack surface is expanding at an unprecedented rate. To find out more, we spoke with a cyber-defense coordinator from the Cleveland Browns.

Dark Reading favicon Dark Reading β€’ 19 days ago β€’ 1 min read

Daniel Miessler on the AI Attack/Defense Balance

His conclusion: Context wins Basically whoever can see the most about the target, and can hold that picture in their mind the best, will be best at finding the vulnerabilities the fastest and taking advantage of them. Or, as the defender, applying patches or mitigations the fastest. And if you’re on the inside you know what the applications do. You know what’s important and what isn’t. And you can use all that internal...

Schneier on Security favicon Schneier on Security β€’ 19 days ago β€’ 1 min read

Red Hat Investigates Widespread Breach of Private GitLab Repositories

A threat actor claimed 28,000 private repositories had been compromised, and the Linux software maker said it had "initiated necessary remediation steps."

Dark Reading favicon Dark Reading β€’ 19 days ago β€’ 1 min read

Android spyware disguised as legitimate messaging apps targets UAE victims, researchers reveal

The campaign involves apps posing as Signal and the defunct ToTok, according to ESET. The post Android spyware disguised as legitimate messaging apps targets UAE victims, researchers reveal appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 19 days ago β€’ 1 min read

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware

The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan with malware families like WooperStealer and Anondoor. "Over the past decade, Confucius has repeatedly targeted government agencies, military organizations, defense contractors, and critical industries -- especially in Pakistan – using spear-phishing and malicious documents as initial

The Hacker News favicon The Hacker News β€’ 19 days ago β€’ 1 min read

North Korea IT worker scheme swells beyond US companies

Okta Threat Intelligence uncovered a large-scale and sustained operation, reflecting the North Korean regime’s pursuit of any opportunity that allows for remote employment. The post North Korea IT worker scheme swells beyond US companies appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 19 days ago β€’ 1 min read

Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency

ENISA has published its 2025 Threat Landscape report, highlighting some of the attacks aimed at OT systems. The post Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 19 days ago β€’ 1 min read

Phishing Is Moving From Email to Mobile. Is Your Security?

With SMS, voice, and QR-code phishing incidents on the rise, it's time to take a closer look at securing the mobile user.

Dark Reading favicon Dark Reading β€’ 19 days ago β€’ 1 min read

Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown

Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the ability to create a SOCKS5 proxy service, while also providing a stealthy backdoor-like functionality to drop additional payloads on Windows systems. The deceptive package, named soopsocks, attracted a total of 2,653 downloads before it was taken down. It was first

The Hacker News favicon The Hacker News β€’ 19 days ago β€’ 1 min read

'Confucius' Cyberspy Evolves From Stealers to Backdoors in Pakistan

The long-running South Asian advanced persistent threat (APT) group is advancing its objectives against Pakistani targets, with a shift to deploying Python-based surveillance malware.

Dark Reading favicon Dark Reading β€’ 19 days ago β€’ 1 min read

1.2 Million Impacted by WestJet Data Breach

The Canadian airline fell victim to a cyberattack in June and has completed the analysis of stolen information. The post 1.2 Million Impacted by WestJet Data Breach appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 19 days ago β€’ 1 min read

Automating Pentest Delivery: 7 Key Workflows for Maximum Impact

Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time we automate the delivery of these results. The way results are delivered hasn’t kept up with today’s fast-moving threat landscape. Too often, findings are packaged into static reports, buried in PDFs or spreadsheets, and handed off manually to

The Hacker News favicon The Hacker News β€’ 19 days ago β€’ 1 min read

766,000 Impacted by Data Breach at Dealership Software Provider Motility

The hackers stole names, contact details, Social Security numbers, and driver’s license numbers in an August 19 ransomware attack. The post 766,000 Impacted by Data Breach at Dealership Software Provider Motility appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 19 days ago β€’ 1 min read

ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More

From unpatched cars to hijacked clouds, this week’s Threatsday headlines remind us of one thing β€” no corner of technology is safe. Attackers are scanning firewalls for critical flaws, bending vulnerable SQL servers into powerful command centers, and even finding ways to poison Chrome’s settings to sneak in malicious extensions. On the defense side, AI is stepping up to block ransomware in real

The Hacker News favicon The Hacker News β€’ 19 days ago β€’ 1 min read

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware

Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster of activity possibly linked to a financially motivated threat actor known as Cl0p. The malicious activity involves sending extortion emails to executives at various organizations and claiming to have stolen sensitive data from their Oracle E-Business Suite. "This activity began on or

The Hacker News favicon The Hacker News β€’ 19 days ago β€’ 1 min read

WireTap Attack Breaks Intel SGX Security

The attack uses a passive interposer to control the SGX enclave and extract the DCAP attestation key, breaking the mechanism. The post WireTap Attack Breaks Intel SGX Security appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 19 days ago β€’ 1 min read

How to Close Threat Detection Gaps: Your SOC's Action Plan

Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of signals; some urgent, many irrelevant. The job is to find the real threats fast enough to keep cases from piling up, prevent analyst burnout, and maintain client or leadership confidence. The toughest challenges, however, aren’t the alerts that can be dismissed quickly, but the ones that hide

The Hacker News favicon The Hacker News β€’ 19 days ago β€’ 1 min read

Hackers Launch Extortion Campaign Targeting Oracle E-Business Suite Customers

Executives at major firms received extortion threats alleging theft of sensitive data from Oracle EBS, with possible ties to Cl0p and FIN11. The post Hackers Launch Extortion Campaign Targeting Oracle E-Business Suite Customers appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 20 days ago β€’ 1 min read

Zania Raises $18 Million for AI-Powered GRC Platform

The company plans to triple its engineering and go‑to‑market teams and to accelerate its agentic AI platform. The post Zania Raises $18 Million for AI-Powered GRC Platform appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 20 days ago β€’ 1 min read

Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to target users in the United Arab Emirates (U.A.E.). Slovak cybersecurity company ESET said the malicious apps are distributed via fake websites and social engineering to trick unsuspecting users into downloading them. Once installed, both the spyware

The Hacker News favicon The Hacker News β€’ 20 days ago β€’ 1 min read

Android Spyware in the UAE Masquerades as ... Spyware

In a clever, messed-up twist on brand impersonation, attackers are passing off their spyware as a notorious UAE government surveillance app.

Dark Reading favicon Dark Reading β€’ 20 days ago β€’ 1 min read

1.5 Million Impacted by Allianz Life Data Breach

In July, hackers stole files containing names, addresses, dates of birth, and Social Security numbers from a cloud-based CRM. The post 1.5 Million Impacted by Allianz Life Data Breach appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 20 days ago β€’ 1 min read

Oracle customers being bombarded with emails claiming widespread data theft

Researchers tell CyberScoop that notorious ransomware group Clop may be behind the email barrage. The post Oracle customers being bombarded with emails claiming widespread data theft appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 20 days ago β€’ 1 min read

Google Sheds Light on ShinyHunters' Salesforce Tactics

Mandiant provided proactive defenses against UNC6040's social engineering attacks that have led to several Salesforce breaches.

Dark Reading favicon Dark Reading β€’ 20 days ago β€’ 1 min read

Shutdown Threatens US Intel Sharing, Cyber Defense

Lapse of critical information sharing and mass furloughs at CISA are just some of the concerns.

Dark Reading favicon Dark Reading β€’ 20 days ago β€’ 1 min read

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel's Software Guard eXtensions (SGX) can be bypassed on DDR4 systems to passively decrypt sensitive data. SGX is designed as a hardware feature in Intel server processors that allows applications to be run in a Trusted Execution

The Hacker News favicon The Hacker News β€’ 20 days ago β€’ 1 min read

GOP senator confirms pending White House quantum push, touts legislative alternatives

Sen. Marsha Blackburn did not provide a timeline for any formal rollout by the administration, and also pointed to her proposed bill with Michigan Sen. Gary Peters. The post GOP senator confirms pending White House quantum push, touts legislative alternatives appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 20 days ago β€’ 1 min read

A $50 'Battering RAM' Can Bust Confidential Computing

Researchers have demonstrated an attack that can break through modern Intel and AMD processor technologies that protect encrypted data stored in memory.

Dark Reading favicon Dark Reading β€’ 20 days ago β€’ 1 min read

OpenSSL Vulnerabilities Allow Private Key Recovery, Code Execution, DoS Attacks

Three vulnerabilities have been patched with the release of OpenSSL updates. The post OpenSSL Vulnerabilities Allow Private Key Recovery, Code Execution, DoS Attacks appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 20 days ago β€’ 1 min read

Undead Operating Systems Haunt Enterprise Security Networks

Windows 10 reaches end-of-life on Oct. 14, which will triple the number of vulnerable enterprise systems and create a massive attack surface for cybercriminals.

Dark Reading favicon Dark Reading β€’ 20 days ago β€’ 1 min read

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if successfully exploited, could expose sensitive OpenID Connect (OIDC) application client secrets under certain circumstances. The vulnerability, tracked as CVE-2025-59363, has been assigned a CVSS score of 7.7 out of 10.0. It has been described as a case of

The Hacker News favicon The Hacker News β€’ 20 days ago β€’ 1 min read

Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar)

AI is changing automationβ€”but not always for the better. That’s why we’re hosting a new webinar, "Workflow Clarity: Where AI Fits in Modern Automation," with Thomas Kinsella, Co-founder & Chief Customer Officer at Tines, to explore how leading teams are cutting through the hype and building workflows that actually deliver.The rise of AI has changed how organizations think about automation.

The Hacker News favicon The Hacker News β€’ 20 days ago β€’ 1 min read

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover

A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain conditions. OpenShift AI is a platform for managing the lifecycle of predictive and generative artificial intelligence (GenAI) models at scale and across hybrid cloud environments. It also facilitates data

The Hacker News favicon The Hacker News β€’ 20 days ago β€’ 1 min read

Canadian Airline WestJet Says Hackers Stole Customer Data

The company says names, contact details, and ID documents provided in connection with reservations and travel were stolen from its systems. The post Canadian Airline WestJet Says Hackers Stole Customer Data appeared first on SecurityWeek.

SecurityWeek favicon SecurityWeek β€’ 20 days ago β€’ 1 min read