Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Microsoft Patch Tuesday, February 2025 Edition

Microsoft today issued security updates to fix at least 56 vulnerabilities in its Windows operating systems and supported software, including two zero-day flaws that are being actively exploited.

Published on: February 12, 2025 | Source: Krebs on Security favicon Krebs on Security

Trump picks Sean Cairncross for national cyber director

If confirmed by the Senate, he would become just the third permanent leader of the Office of the National Cyber Director. The post Trump picks Sean Cairncross for national cyber director appeared first on CyberScoop.

Published on: February 12, 2025 | Source: CyberScoop favicon CyberScoop

U.S. adversaries increasingly turning to cybercriminals and their malware for help

A Google Threat Intelligence Group report notes that Russia in particular has been doing this since the Ukraine war began. The post U.S. adversaries increasingly turning to cybercriminals and their malware for help appeared first on CyberScoop.

Published on: February 12, 2025 | Source: CyberScoop favicon CyberScoop

Cybercrime Threatens National Security, Google Threat Intel Team Says

On the eve of the Munich Security Conference, Google argues that the cybercriminal threat should be treated as a national security threat like state-backed hacking groups. The post Cybercrime Threatens National Security, Google Threat Intel Team Says appeared first on SecurityWeek.

Published on: February 12, 2025 | Source: SecurityWeek favicon SecurityWeek

Gartner: Most Security Leaders Cannot Balance Data Security, Business Goals

The analyst firm recommends defining security and governance processes while reducing friction for business stakeholders.

Published on: February 11, 2025 | Source: Dark Reading favicon Dark Reading

Drata Acquires SafeBase to Strengthen GRC Portfolio

The combined companies will create a seamless ecosystem of trust, governance, risk, and compliance.

Published on: February 11, 2025 | Source: Dark Reading favicon Dark Reading

Microsoft fixes 63 vulnerabilities, including 2 zero-days

The company’s monthly Patch Tuesday update comes with more than two-thirds of the patches closing high-severity flaws. The post Microsoft fixes 63 vulnerabilities, including 2 zero-days appeared first on CyberScoop.

Published on: February 11, 2025 | Source: CyberScoop favicon CyberScoop

Microsoft's February Patch a Lighter Lift Than January's

But there's plenty in it β€” including two zero-days β€” that need immediate attention.

Published on: February 11, 2025 | Source: Dark Reading favicon Dark Reading

Apple Releases Urgent Patch for USB Vulnerability

The vulnerability could allow a threat actor to disable the security feature on a locked device and gain access to user data.

Published on: February 11, 2025 | Source: Dark Reading favicon Dark Reading

CISA Places Election Security Staffers on Leave

The staffers were tasked with building relationships on the ground across the country in local election jurisdictions, teaching election officials tactics on mitigating cyber threats, cyber hygiene, combating misinformation and foreign influence, and more.

Published on: February 11, 2025 | Source: Dark Reading favicon Dark Reading

Bipartisan Senate bill would strengthen cybercrime penalties

The legislation from Sens. Rounds and Gillibrand would amend federal criminal code on computer fraud and stiffen punishments. The post Bipartisan Senate bill would strengthen cybercrime penalties appeared first on CyberScoop.

Published on: February 11, 2025 | Source: CyberScoop favicon CyberScoop

Microsoft Patches β€˜Wormable’ Windows Flaw and File-Deleting Zero-Day

The Microsoft Patch Tuesday machine hummed loudly this month urgent fixes for a pair of already-exploited Windows zero-days. The post Microsoft Patches β€˜Wormable’ Windows Flaw and File-Deleting Zero-Day appeared first on SecurityWeek.

Published on: February 11, 2025 | Source: SecurityWeek favicon SecurityWeek

Adobe Plugs 45 Software Security Holes, Warn of Code Execution Risks

Patch Tuesday: Adobe patches 45 vulnerabilities across multiple products and warn of remote code execution exploitation risks. The post Adobe Plugs 45 Software Security Holes, Warn of Code Execution Risks appeared first on SecurityWeek.

Published on: February 11, 2025 | Source: SecurityWeek favicon SecurityWeek

Russian Cybercrime Network Targeted for Sanctions Across US, UK and Australia

Russia-based bulletproof hosting services provider Zservers was sanctioned for providing services to support LockBit ransomware operations. The post Russian Cybercrime Network Targeted for Sanctions Across US, UK and Australia appeared first on SecurityWeek.

Published on: February 11, 2025 | Source: SecurityWeek favicon SecurityWeek

U.S. sanctions bulletproof hosting provider for supplying LockBit infrastructure

Zservers, a Russia-based company, along with two employees, allegedly ran specialized servers tied to ransomware attacks. The post U.S. sanctions bulletproof hosting provider for supplying LockBit infrastructure appeared first on CyberScoop.

Published on: February 11, 2025 | Source: CyberScoop favicon CyberScoop

Data Leaks Happen Most Often in These States β€” Here's Why

State-led data privacy laws and commitment to enforcement play a major factor in shoring up business data security, an analysis shows.

Published on: February 11, 2025 | Source: Dark Reading favicon Dark Reading

Google Confirms Android SafetyCore Enables AI-Powered On-Device Content Classification

Google has stepped in to clarify that a newly introduced Android System SafetyCore app does not perform any client-side scanning of content. "Android provides many on-device protections that safeguard users against threats like malware, messaging spam and abuse protections, and phone scam protections, while preserving user privacy and keeping users in control of their data," a spokesperson for

Published on: February 11, 2025 | Source: The Hacker News favicon The Hacker News

Salt Typhoon's Impact on the US & Beyond

Salt Typhoon underscores the urgent need for organizations to rapidly adopt modern security practices to meet evolving threats.

Published on: February 11, 2025 | Source: Dark Reading favicon Dark Reading

DeepSeek AI Fails Multiple Security Tests, Raising Red Flag for Businesses

The popular generative AI (GenAI) model allows hallucinations, easily avoidable guardrails, susceptibility to jailbreaking and malware creation requests, and more at critically high rates, researchers find.

Published on: February 11, 2025 | Source: Dark Reading favicon Dark Reading

Authorities Disrupt 8Base Ransomware, Arrest Four Russian Operators

Law enforcement agencies take down the 8Base ransomware group’s infrastructure, arrest four Russian operators. The post Authorities Disrupt 8Base Ransomware, Arrest Four Russian Operators appeared first on SecurityWeek.

Published on: February 11, 2025 | Source: SecurityWeek favicon SecurityWeek

4 Ways to Keep MFA From Becoming too Much of a Good Thing

Multi-factor authentication (MFA) has quickly become the standard for securing business accounts. Once a niche security measure, adoption is on the rise across industries. But while it’s undeniably effective at keeping bad actors out, the implementation of MFA solutions can be a tangled mess of competing designs and ideas. For businesses and employees, the reality is that MFA sometimes feels

Published on: February 11, 2025 | Source: The Hacker News favicon The Hacker News

Intel Patched 374 Vulnerabilities in 2024

Intel says roughly 100 of the 374 vulnerabilities it patched last year were firmware and hardware security defects. The post Intel Patched 374 Vulnerabilities in 2024 appeared first on SecurityWeek.

Published on: February 11, 2025 | Source: SecurityWeek favicon SecurityWeek

Cyberattack on Lee Enterprises Causes Disruptions at Dozens of Newspapers

Dozens of local newspapers owned by media company Lee Enterprises experienced disruptions as a result of a cyberattack. The post Cyberattack on Lee Enterprises Causes Disruptions at Dozens of Newspapers appeared first on SecurityWeek.

Published on: February 11, 2025 | Source: SecurityWeek favicon SecurityWeek

Alabama Man Pleads Guilty to Hacking SEC’s X Account

Eric Council Jr. pleaded guilty to hacking the X (formerly Twitter) account of the US Securities and Exchange Commission. The post Alabama Man Pleads Guilty to Hacking SEC’s X Account appeared first on SecurityWeek.

Published on: February 11, 2025 | Source: SecurityWeek favicon SecurityWeek

Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions

Progress Software has addressed multiple high-severity security flaws in its LoadMaster software that could be exploited by malicious actors to execute arbitrary system commands or download any file from the system. Kemp LoadMaster is a high-performance application delivery controller (ADC) and load balancer that provides availability, scalability, performance, and security for business-critical

Published on: February 11, 2025 | Source: The Hacker News favicon The Hacker News

Gcore DDoS Radar Reveals 56% YoY Increase in DDoS Attacks

Gcore’s latest DDoS Radar report analyzes attack data from Q3–Q4 2024, revealing a 56% YoY rise in the total number of DDoS attacks with the largest attack peaking at a record 2 Tbps. The financial services sector saw the most dramatic increase, with a 117% rise in attacks, while gaming remained the most-targeted industry. This period’s findings emphasize the need for robust, adaptive DDoS

Published on: February 11, 2025 | Source: The Hacker News favicon The Hacker News

Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update

Apple on Monday released out-of-band security updates to address a security flaw in iOS and iPadOS that it said has been exploited in the wild. Assigned the CVE identifier CVE-2025-24200 (CVSS score: 4.6), the vulnerabilityhas been described as an authorization issue that could make it possible for a malicious actor to disable USB Restricted Mode on a locked device as part of a cyber

Published on: February 11, 2025 | Source: The Hacker News favicon The Hacker News

Protecting Your Software Supply Chain: Assessing the Risks Before Deployment

Imagine you're considering a new car for your family. Before making a purchase, you evaluate its safety ratings, fuel efficiency, and reliability. You might even take it for a test drive to ensure it meets your needs. The same approach should be applied to software and hardware products before integrating them into an organization's environment. Just as you wouldn’t buy a car without knowing its

Published on: February 11, 2025 | Source: The Hacker News favicon The Hacker News

How AI-driven identify fraud is causing havoc

Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent – here's how to fight back

Published on: February 11, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

How AI-driven identity fraud is causing havoc

Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent – here's how to fight back

Published on: February 11, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks

Threat actors have observed the increasingly common ClickFix technique to deliver a remote access trojan named NetSupport RAT since early January 2025. NetSupport RAT, typically propagated via bogus websites and fake browser updates, grants attackers full control over the victim's host, allowing them to monitor the device's screen in real-time, control the keyboard and mouse, upload and download

Published on: February 11, 2025 | Source: The Hacker News favicon The Hacker News

FBI, Europol, and NCA Take Down 8Base Ransomware Data Leak and Negotiation Sites

Source: The Nation A coordinated law enforcement operation has taken down the dark web data leak and negotiation sites associated with the 8Base ransomware gang. Visitors to the data leak site are now greeted with a seizure banner that says: "This hidden site and the criminal content have been seized by the Bavarian State Criminal Police Office on behalf of the Office of the Public Prosecutor

Published on: February 11, 2025 | Source: The Hacker News favicon The Hacker News

Ransomware Groups Made Less Money in 2024

Improvements in cyber hygiene and resiliency made it possible for victim organizations to skip paying ransom amounts in 2024.

Published on: February 10, 2025 | Source: Dark Reading favicon Dark Reading

XE Group Shifts From Card Skimming to Supply Chain Attacks

The likely Vietnam-based threat actor has been using two zero-days in VeraCore's warehouse management software in some of its latest cyberattacks.

Published on: February 10, 2025 | Source: Dark Reading favicon Dark Reading

120K Victims Compromised in Memorial Hospital Ransomware Attack

After claiming responsibility for the ransomware attack in 2024, the "Embargo" ransomware group posted 1.15 terabytes of stolen data to its public Tor site.

Published on: February 10, 2025 | Source: Dark Reading favicon Dark Reading