Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

PCI DSS 4.0 Mandates DMARC By 31st March 2025

The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025, DMARC implementation will be mandatory! This requirement highlights the importance of preventative measures against email fraud, domain spoofing, and phishing in the financial space. This is not an optional requirement as non-compliance may result in monetary

Published on: February 20, 2025 | Source: The Hacker News favicon The Hacker News

US Military Health Provider HNFS Pays $11M in Settlement Over Cybersecurity Failures

US military health benefits program administrator HNFS to pay $11 million in settlement over its false claims of cybersecurity compliance. The post US Military Health Provider HNFS Pays $11M in Settlement Over Cybersecurity Failures appeared first on SecurityWeek.

Published on: February 20, 2025 | Source: SecurityWeek favicon SecurityWeek

Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives

A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. "The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation," the AhnLab SEcurity Intelligence Center (ASEC)

Published on: February 20, 2025 | Source: The Hacker News favicon The Hacker News

'Darcula' Phishing Kit Can Now Impersonate Any Brand

With Version 3, would-be phishers can cut and paste a big brand's URL into a template and let automation do the rest.

Published on: February 20, 2025 | Source: Dark Reading favicon Dark Reading

Microsoft's End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now

For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether deployed on-premises or in hybrid environments, companies of all sizes rely on Exchange for seamless internal and external communication, often integrating it deeply with their workflows, compliance policies and security frameworks

Published on: February 20, 2025 | Source: The Hacker News favicon The Hacker News

Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability

Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent that could lead to privilege escalation under certain conditions. The vulnerability, tracked as CVE-2024-12284, has been given a CVSS v4 score of 8.8 out of a maximum of 10.0. It has been described as a case of improper privilege management that could

Published on: February 20, 2025 | Source: The Hacker News favicon The Hacker News

Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability

Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages, including one that has come under active exploitation in the wild. The vulnerabilities are listed below - CVE-2025-21355 (CVSS score: 8.6) - Microsoft Bing Remote Code Execution Vulnerability CVE-2025-24989 (CVSS score: 8.2) - Microsoft Power Pages Elevation of Privilege Vulnerability "

Published on: February 20, 2025 | Source: The Hacker News favicon The Hacker News

Australian Critical Infrastructure Faces 'Acute' Foreign Threats

The continent faces "relentless" military espionage, and increased cyber sabotage at the hands of authoritarian regimes, according to a high-ranking intelligence director.

Published on: February 20, 2025 | Source: Dark Reading favicon Dark Reading

Insight Partners, VC Giant, Falls to Social Engineering

The startup incubator and PR firm with holdings in more than 70 cybersecurity firms has announced a data breach with as-yet-unknown effects.

Published on: February 19, 2025 | Source: Dark Reading favicon Dark Reading

Russian Groups Target Signal Messenger in Spy Campaign

These sorts of attacks reveal growing adversary interest in secure messaging apps used by high-value targets for communication, Google says.

Published on: February 19, 2025 | Source: Dark Reading favicon Dark Reading

Russia-aligned threat groups dupe Ukrainian targets via Signal

Google researchers say multiple Russian state threat groups have conducted remote phishing operations to target and compromise Signal accounts. The post Russia-aligned threat groups dupe Ukrainian targets via Signal appeared first on CyberScoop.

Published on: February 19, 2025 | Source: CyberScoop favicon CyberScoop

Energy CISO: Agencies can’t implement zero trust alone

Federal IT and cybersecurity officials said companies who sell zero trust technologies to the government must do more to make them interoperable. The post Energy CISO: Agencies can’t implement zero trust alone appeared first on CyberScoop.

Published on: February 19, 2025 | Source: CyberScoop favicon CyberScoop

Salt Typhoon telecom breach remarkable for its β€˜indiscriminate’ targeting, FBI official says

Speaking at a conference presented by CyberScoop, Cynthia Kaiser said the impact of the breach could last forever. The post Salt Typhoon telecom breach remarkable for its β€˜indiscriminate’ targeting, FBI official says appeared first on CyberScoop.

Published on: February 19, 2025 | Source: CyberScoop favicon CyberScoop

Content Credentials Show Promise, but Ecosystem Still Young

While AI-generation services and major camera makers are adopting the specification for digitally signed metadata, creating a workflow around the nascent ecosystem is still a challenge.

Published on: February 19, 2025 | Source: Dark Reading favicon Dark Reading

Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR Codes

Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts. "The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app's legitimate 'linked devices' feature that enables Signal to be used on multiple

Published on: February 19, 2025 | Source: The Hacker News favicon The Hacker News

Patch Now: CISA Warns of Palo Alto Flaw Exploited in the Wild

The authentication bypass vulnerability in the OS for the company's firewall devices is under increasing attack and being chained with other bugs, making it imperative for organizations to mitigate the issue ASAP.

Published on: February 19, 2025 | Source: Dark Reading favicon Dark Reading

Device Code Phishing

This isn’t new, but it’s increasingly popular: The technique is known as device code phishing. It exploits β€œdevice code flow,” a form of authentication formalized in the industry-wide OAuth standard. Authentication through device code flow is designed for logging printers, smart TVs, and similar devices into accounts. These devices typically don’t support browsers, making it difficult to sign in using more standard...

Published on: February 19, 2025 | Source: Schneier on Security favicon Schneier on Security

What Is the Board's Role in Cyber-Risk Management in OT Environments?

By taking several proactive steps, boards can improve their organization's resilience against cyberattacks and protect their critical OT assets.

Published on: February 19, 2025 | Source: Dark Reading favicon Dark Reading

How Hackers Manipulate Agentic AI with Prompt Engineering

Organizations adopting the transformative nature of agentic AI are urged to take heed of prompt engineering tactics being practiced by threat actors. The post How Hackers Manipulate Agentic AI with Prompt Engineering appeared first on SecurityWeek.

Published on: February 19, 2025 | Source: SecurityWeek favicon SecurityWeek

How Hackers Manipulate Agentic AI With Prompt Engineering

Organizations adopting the transformative nature of agentic AI are urged to take heed of prompt engineering tactics being practiced by threat actors. The post How Hackers Manipulate Agentic AI With Prompt Engineering appeared first on SecurityWeek.

Published on: February 19, 2025 | Source: SecurityWeek favicon SecurityWeek

Blockaid Raises $50 Million to Secure Blockchain Applications

Blockaid raises $50 million in Series B funding to scale operations to meet demand for its blockchain application security platform. The post Blockaid Raises $50 Million to Secure Blockchain Applications appeared first on SecurityWeek.

Published on: February 19, 2025 | Source: SecurityWeek favicon SecurityWeek

VC Firm Insight Partners Hacked

Venture capital firm Insight Partners has been targeted in a cyberattack that involved unauthorized access to its information systems. The post VC Firm Insight Partners Hacked appeared first on SecurityWeek.

Published on: February 19, 2025 | Source: SecurityWeek favicon SecurityWeek

Chrome 133, Firefox 135 Updates Patch High-Severity Vulnerabilities

Google and Mozilla resolve high-severity memory safety vulnerabilities with the latest Chrome and Firefox security updates. The post Chrome 133, Firefox 135 Updates Patch High-Severity Vulnerabilities appeared first on SecurityWeek.

Published on: February 19, 2025 | Source: SecurityWeek favicon SecurityWeek

New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection

A new variant of the Snake Keylogger malware is being used to actively target Windows users located in China, Turkey, Indonesia, Taiwan, and Spain. Fortinet FortiGuard Labs said the new version of the malware has been behind over 280 million blocked infection attempts worldwide since the start of the year. "Typically delivered through phishing emails containing malicious attachments or links,

Published on: February 19, 2025 | Source: The Hacker News favicon The Hacker News

Edge device vulnerabilities fueled attack sprees in 2024

The most consequential cyberattacks observed by Darktrace last year were linked to software defects in firewalls and perimeter network technologies. The post Edge device vulnerabilities fueled attack sprees in 2024 appeared first on CyberScoop.

Published on: February 19, 2025 | Source: CyberScoop favicon CyberScoop

Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions

Admeritia has launched Cyber Decision Diagrams, a free tool designed to help organizations manage complex decisions related to ICS/OT cybersecurity. The post Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions appeared first on SecurityWeek.

Published on: February 19, 2025 | Source: SecurityWeek favicon SecurityWeek

The Ultimate MSP Guide to Structuring and Selling vCISO Services

The growing demand for cybersecurity and compliance services presents a great opportunity for Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) to offer virtual Chief Information Security Officer (vCISO) servicesβ€”delivering high-level cybersecurity leadership without the cost of a full-time hire. However, transitioning to vCISO services is not without its challenges

Published on: February 19, 2025 | Source: The Hacker News favicon The Hacker News

Java security: If you ain’t cheatin,’ you ain’t tryin’

Rigging the odds in your favor is the only way security practitioners can go. The post Java security: If you ain’t cheatin,’ you ain’t tryin’ appeared first on CyberScoop.

Published on: February 19, 2025 | Source: CyberScoop favicon CyberScoop

How Russian Hackers Are Exploiting Signal β€˜Linked Devices’ Feature for Real-Time Spying

Mandiant warns that multiple Russian APTs are abusing a nifty Signal Messenger feature to surreptitiously spy on encrypted conversations. The post How Russian Hackers Are Exploiting Signal β€˜Linked Devices’ Feature for Real-Time Spying appeared first on SecurityWeek.

Published on: February 19, 2025 | Source: SecurityWeek favicon SecurityWeek

Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack

Users who are on the lookout for popular games were lured into downloading trojanized installers that led to the deployment of a cryptocurrency miner on compromised Windows hosts. The large-scale activity has been codenamed StaryDobry by Russian cybersecurity company Kaspersky, which first detected it on December 31, 2024. It lasted for a month. Targets of the campaign include individuals and

Published on: February 19, 2025 | Source: The Hacker News favicon The Hacker News

CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The flaws are listed below - CVE-2025-0108 (CVSS score: 7.8) - An authentication bypass vulnerability in the Palo Alto Networks PAN-OS

Published on: February 19, 2025 | Source: The Hacker News favicon The Hacker News

North Korea's Kimsuky Taps Trusted Platforms to Attack South Korea

The campaign heavily uses Dropbox folders and PowerShell scripts to evade detection and quickly scrapped infrastructure components after researchers began poking around.

Published on: February 19, 2025 | Source: Dark Reading favicon Dark Reading

Deepwatch Acquires Dassana to Boost Cyber-Resilience With AI

Acquisition strengthens Deepwatch Platform capabilities with actionable insights and risk-based prioritization.

Published on: February 18, 2025 | Source: Dark Reading favicon Dark Reading

Xerox Printer Vulnerabilities Enable Credential Capture

Attackers are using patched bugs to potentially gain unfettered access to an organization's Windows environment under certain conditions.

Published on: February 18, 2025 | Source: Dark Reading favicon Dark Reading

China-Linked Threat Group Targets Japanese Orgs' Servers

Winnti once used a variety of malware but is now focused on SQL vulnerabilities and obfuscation, updated encryption, and new evasion methods to gain access.

Published on: February 18, 2025 | Source: Dark Reading favicon Dark Reading