Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Android's New Feature Blocks Fraudsters from Sideloading Apps During Calls

Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress. Specifically, the in-call anti-scammer protections include preventing users from turning on settings to install apps from unknown sources and granting accessibility access. The development was first reported by Android Authority. Users who attempt

Published on: February 15, 2025 | Source: The Hacker News favicon The Hacker News

Threat researchers spot β€˜device code’ phishing attacks targeting Microsoft accounts

Suspected Russian nation-state threat groups have duped multiple victims into granting potentially persistent access to networks via authentication requests and valid tokens. The post Threat researchers spot β€˜device code’ phishing attacks targeting Microsoft accounts appeared first on CyberScoop.

Published on: February 14, 2025 | Source: CyberScoop favicon CyberScoop

SailPoint IPO Signals Bright Spot for Cybersecurity

In a signal move for the cybersecurity sector, identity and access management (IAM) vendor SailPoint has made its return to public markets. The post SailPoint IPO Signals Bright Spot for Cybersecurity appeared first on SecurityWeek.

Published on: February 14, 2025 | Source: SecurityWeek favicon SecurityWeek

New β€œwhoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code execution within the Amazon Web Services (AWS) account. "If executed at scale, this attack could be used to gain access to thousands of accounts," Datadog Security Labs researcher Seth Art said in a report

Published on: February 14, 2025 | Source: The Hacker News favicon The Hacker News

This Security Firm's 'Bias' Is Also Its Superpower

Credible Security's founders bring their varied experiences to help growing companies turn trust into a strategic advantage.

Published on: February 14, 2025 | Source: Dark Reading favicon Dark Reading

Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks

The North Korean threat actor known as the Lazarus Group has been linked to a previously undocumented JavaScript implant named Marstech1 as part of limited targeted attacks against developers. The active operation has been dubbed Marstech Mayhem by SecurityScorecard, with the malware delivered by means of an open-source repository hosted on GitHub that's associated with a profile named "

Published on: February 14, 2025 | Source: The Hacker News favicon The Hacker News

Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems

The chief deputy attorney general of the agency sent an email on Wednesday that said nearly all of is computer systems were offline. The post Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems appeared first on SecurityWeek.

Published on: February 14, 2025 | Source: SecurityWeek favicon SecurityWeek

Friday Squid Blogging: Squid the Care Dog

The Vanderbilt University Medical Center has a pediatric care dog named β€œSquid.” Blog moderation policy.

Published on: February 14, 2025 | Source: Schneier on Security favicon Schneier on Security

How Banks Can Adapt to the Rising Threat of Financial Crime

Banking fraud and financial crimes are growing more sophisticated every day. By understanding the threats and building strong collaborations, banks can protect themselves and their clients.

Published on: February 14, 2025 | Source: Dark Reading favicon Dark Reading

Open Source AI Models: Perfect Storm for Malicious Code, Vulnerabilities

Companies pursing internal AI development using models from Hugging Face and other open source repositories need to focus on supply chain security and checking for vulnerabilities.

Published on: February 14, 2025 | Source: Dark Reading favicon Dark Reading

Sean Cairncross is Trump Nominee for National Cyber Director

Former RNC official Sean Cairncross has been nominated for the post of National Cyber Director to streamline the US cybersecurity strategy. The post Sean Cairncross is Trump Nominee for National Cyber Director appeared first on SecurityWeek.

Published on: February 14, 2025 | Source: SecurityWeek favicon SecurityWeek

Salt Typhoon Exploits Cisco Devices in Telco Infrastructure

The China-sponsored state espionage group has exploited known, older bugs in Cisco gear for successful cyber intrusions on six continents in the past two months.

Published on: February 14, 2025 | Source: Dark Reading favicon Dark Reading

Warning: Tunnel of Love Leads to Scams

Romance-baiting losses were up 40% last year, as more and more pig-butchering efforts crop up in the wild.

Published on: February 14, 2025 | Source: Dark Reading favicon Dark Reading

Rising Tides: Lesley Carhart on Bridging Enterprise Security and OTβ€”and Improving the Human Condition

In the latest edition of β€œRising Tides” we talk with Lesley Carhart, Technical Director of Incident Response at Dragos. The post Rising Tides: Lesley Carhart on Bridging Enterprise Security and OTβ€”and Improving the Human Condition appeared first on SecurityWeek.

Published on: February 14, 2025 | Source: SecurityWeek favicon SecurityWeek

Meta Paid Out Over $2.3 Million in Bug Bounties in 2024

Meta received close to 10,000 vulnerability reports and paid out over $2.3 million in bug bounty rewards in 2024. The post Meta Paid Out Over $2.3 Million in Bug Bounties in 2024 appeared first on SecurityWeek.

Published on: February 14, 2025 | Source: SecurityWeek favicon SecurityWeek

AI and Civil Service Purges

Donald Trump and Elon Musk’s chaotic approach to reform is upending government operations. Critical functions have been halted, tens of thousands of federal staffers are being encouraged to resign, and congressional mandates are being disregarded. The next phase: The Department of Government Efficiency reportedly wants to use AI to cut costs. According to The Washington Post, Musk’s group has started to run sensitive...

Published on: February 14, 2025 | Source: Schneier on Security favicon Schneier on Security

SonicWall Firewall Vulnerability Exploited After PoC Publication

The exploitation of a recent SonicWall vulnerability has started shortly after proof-of-concept (PoC) code was published. The post SonicWall Firewall Vulnerability Exploited After PoC Publication appeared first on SecurityWeek.

Published on: February 14, 2025 | Source: SecurityWeek favicon SecurityWeek

Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks

China-linked APT Salt Typhoon has been exploiting known vulnerabilities in Cisco devices in attacks on telecom providers in the US and abroad. The post Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks appeared first on SecurityWeek.

Published on: February 14, 2025 | Source: SecurityWeek favicon SecurityWeek

AI-Powered Social Engineering: Ancillary Tools and Techniques

Social engineering is advancing fast, at the speed of generative AI. This is offering bad actors multiple new tools and techniques for researching, scoping, and exploiting organizations. In a recent communication, the FBI pointed out: β€˜As technology continues to evolve, so do cybercriminals' tactics.’ This article explores some of the impacts of this GenAI-fueled acceleration. And examines what

Published on: February 14, 2025 | Source: The Hacker News favicon The Hacker News

Microsoft: Russian-Linked Hackers Using 'Device Code Phishing' to Hijack Accounts

Microsoft is calling attention to an emerging threat cluster it calls Storm-2372 that has been attributed to a new set of cyber attacks aimed at a variety of sectors since August 2024. The attacks have targeted government, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, health, higher education, and energy/oil and gas

Published on: February 14, 2025 | Source: The Hacker News favicon The Hacker News

RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally

The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme have been observed leveraging now-patched security flaws in Microsoft Active Directory and the Netlogon protocol to escalate privileges and gain unauthorized access to a victim network's domain controller as part of their post-compromise strategy. "RansomHub has targeted over 600 organizations globally, spanning sectors

Published on: February 14, 2025 | Source: The Hacker News favicon The Hacker News

PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks

Threat actors who were behind the exploitation of a zero-day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products in December 2024 likely also exploited a previously unknown SQL injection flaw in PostgreSQL, according to findings from Rapid7. The vulnerability, tracked as CVE-2025-1094 (CVSS score: 8.1), affects the PostgreSQL interactive tool psql. "An

Published on: February 14, 2025 | Source: The Hacker News favicon The Hacker News

In Paris, U.S. signals shift from AI safety to deregulation

The Trump administration made it clear that innovation and competition with China would be bigger priorities. The post In Paris, U.S. signals shift from AI safety to deregulation appeared first on CyberScoop.

Published on: February 13, 2025 | Source: CyberScoop favicon CyberScoop

CyberArk Makes Identity Security Play With Zilla Acquisition

CyberArk announces the Zilla deal on the same day leading identity service provider SailPoint returns to the public markets.

Published on: February 13, 2025 | Source: Dark Reading favicon Dark Reading

Roundtable: Is DOGE Flouting Cybersecurity for US Data?

Cybersecurity experts weigh in on the red flags flying around the new Department of Government Efficiency's handling of the mountains of US data it now has access to, potentially without basic information security protections in place.

Published on: February 13, 2025 | Source: Dark Reading favicon Dark Reading

Chinese APT 'Emperor Dragonfly' Moonlights With Ransomware

Pivoting from prior cyber espionage, the threat group deployed its backdoor tool set to ultimately push out RA World malware, demanding $2 million from its victim.

Published on: February 13, 2025 | Source: Dark Reading favicon Dark Reading

Nearly a Year Later, Mozilla is Still Promoting OneRep

In mid-March 2024, KrebsOnSecurity revealed that the founder of the personal data removal service Onerep also founded dozens of people-search companies. Shortly after that investigation was published, Mozilla said it would stop bundling Onerep with the Firefox browser and wind down its partnership. But nearly a year later, Mozilla is still promoting it to Firefox users.

Published on: February 13, 2025 | Source: Krebs on Security favicon Krebs on Security

Google Hub in Poland to Develop AI Use in Energy and Cybersecurity Sectors

Poland is being targeted by various forms of cyberattacks and sabotage actions believed to be sponsored by Russia. The post Google Hub in Poland to Develop AI Use in Energy and Cybersecurity Sectors appeared first on SecurityWeek.

Published on: February 13, 2025 | Source: SecurityWeek favicon SecurityWeek

Salt Typhoon remains active, hits more telecom networks via Cisco routers

The Chinese nation-state threat group intruded five additional telecom networks between December and January, including two unnamed providers in the U.S., Recorded Future researchers said. The post Salt Typhoon remains active, hits more telecom networks via Cisco routers appeared first on CyberScoop.

Published on: February 13, 2025 | Source: CyberScoop favicon CyberScoop

CyberArk acquires Zilla Security in $175 million dealΒ 

The acquisition occurs during a period of strong financial performance for CyberArk. The post CyberArk acquires Zilla Security in $175 million deal appeared first on CyberScoop.

Published on: February 13, 2025 | Source: CyberScoop favicon CyberScoop

Circuit Board Maker Unimicron Targeted in Ransomware Attack

The Sarcoma ransomware group is threatening to leak data stolen from Taiwanese printed circuit board manufacturer Unimicron. The post Circuit Board Maker Unimicron Targeted in Ransomware Attack appeared first on SecurityWeek.

Published on: February 13, 2025 | Source: SecurityWeek favicon SecurityWeek

CyberArk Expands Identity Security Play With $165M Acquisition of Zilla Security

CyberArk acquires early stage Boston startup Zilla Security for $165M, expanding its identity security and IGA capabilities. The post CyberArk Expands Identity Security Play With $165M Acquisition of Zilla Security appeared first on SecurityWeek.

Published on: February 13, 2025 | Source: SecurityWeek favicon SecurityWeek

DeepSeek Exposes Major Cybersecurity Blind Spot

Millions of uninformed users have flocked to DeepSeek and share personal information without considering security or privacy risks. The post DeepSeek Exposes Major Cybersecurity Blind Spot appeared first on SecurityWeek.

Published on: February 13, 2025 | Source: SecurityWeek favicon SecurityWeek

Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners

A widespread phishing campaign has been observed leveraging bogus PDF documents hosted on the Webflow content delivery network (CDN) with an aim to steal credit card information and commit financial fraud. "The attacker targets victims searching for documents on search engines, resulting in access to malicious PDF that contains a CAPTCHA image embedded with a phishing link, leading them to

Published on: February 13, 2025 | Source: The Hacker News favicon The Hacker News

How Public & Private Sectors Can Better Align Cyber Defense

With investment in cybersecurity capabilities and proactive measures to address emerging challenges, we can work together to navigate the complexities of combating cybercrime.

Published on: February 13, 2025 | Source: Dark Reading favicon Dark Reading