Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Thai authorities detain four Europeans in ransomware crackdown

The multi-national law enforcement operation targeted the 8base ransomware gang. The post Thai authorities detain four Europeans in ransomware crackdown appeared first on CyberScoop.

Published on: February 10, 2025 | Source: CyberScoop favicon CyberScoop

Apple Confirms USB Restricted Mode Exploited in โ€˜Extremely Sophisticatedโ€™ Attackย 

Cupertinoโ€™s security response team said the flaw was used in โ€œan extremely sophisticated attack against specific targeted individuals.โ€ The post Apple Confirms USB Restricted Mode Exploited in โ€˜Extremely Sophisticatedโ€™ Attack appeared first on SecurityWeek.

Published on: February 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Newspaper Giant Lee Enterprises Reels From Cyberattack

The newspaper company expects the investigation to take some time, but said in an SEC filing that it has not yet identified any material impact.

Published on: February 10, 2025 | Source: Dark Reading favicon Dark Reading

Magecart Attackers Abuse Google Ad Tool to Steal Data

Attackers are smuggling payment card-skimming malicious code into checkout pages on Magento-based e-commerce sites by abusing the Google Tag Manager ad tool.

Published on: February 10, 2025 | Source: Dark Reading favicon Dark Reading

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores

Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit card skimmer malware targeting Magento-based e-commerce websites. Website security company Sucuri said the code, while appearing to be a typical GTM and Google Analytics script used for website analytics and advertising purposes, contains an obfuscated backdoor capable of providing attackers with persistent

Published on: February 10, 2025 | Source: The Hacker News favicon The Hacker News

Analyst Burnout Is an Advanced Persistent Threat

For too long, we've treated our analysts as mere cogs in a machine, expecting them to conform to the limitations of our tools and processes. It's time to revolutionize security operations.

Published on: February 10, 2025 | Source: Dark Reading favicon Dark Reading

Projecting the next decade of software supply chain security

A 2035 vision includes a shift that combines security and innovation. The post Projecting the next decade of software supply chain security appeared first on CyberScoop.

Published on: February 10, 2025 | Source: CyberScoop favicon CyberScoop

Trumpโ€™s AI Ambition and Chinaโ€™s DeepSeek Overshadow an AI Summit in Paris

French organizers said โ€œthe summit aims at promoting an ambitious French and European AI strategyโ€ as advances in the sector have been led by the U.S. and China. The post Trumpโ€™s AI Ambition and Chinaโ€™s DeepSeek Overshadow an AI Summit in Paris appeared first on SecurityWeek.

Published on: February 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Orthanc Server Vulnerability Poses Risk to Medical Data, Healthcare Operations

A critical vulnerability found in Orthanc servers can pose a serious risk to medical data and healthcare operations. The post Orthanc Server Vulnerability Poses Risk to Medical Data, Healthcare Operations appeared first on SecurityWeek.

Published on: February 10, 2025 | Source: SecurityWeek favicon SecurityWeek

โšก THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]

In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucketโ€”each one seems minor until it becomes the entry point for an attack. This week, weโ€™ve seen cybercriminals turn overlooked weaknesses into major security threats, proving once again that no system is too small to be targeted. The question

Published on: February 10, 2025 | Source: The Hacker News favicon The Hacker News

Pairwise Authentication of Humans

Hereโ€™s an easy system for two humans to remotely authenticate to each other, so they can be sure that neither are digital impersonations. To mitigate that risk, I have developed this simple solution where you can setup a unique time-based one-time passcode (TOTP) between any pair of persons. This is how it works: Two people, Person A and Person B, sit in front of the same computer and open this page; They input their...

Published on: February 10, 2025 | Source: Schneier on Security favicon Schneier on Security

HPE Says Personal Information Stolen in 2023 Russian Hack

HPE is notifying an unknown number of individuals that Russian hackers accessed their personal information in a December 2023 attack. The post HPE Says Personal Information Stolen in 2023 Russian Hack appeared first on SecurityWeek.

Published on: February 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Indiana Man Sentenced to 20 Years in Prison for Hacking, $37 Million Crypto Theft

Evan Light was sentenced to 20 years in federal prison for hacking an investment holdings company and stealing $37 million in cryptocurrency. The post Indiana Man Sentenced to 20 Years in Prison for Hacking, $37 Million Crypto Theft appeared first on SecurityWeek.

Published on: February 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Information of 120,000 Stolen in Ransomware Attack on Georgia Hospital

Memorial Hospital and Manor says 120,000 people had their personal information stolen in a November 2024 ransomware attack. The post Information of 120,000 Stolen in Ransomware Attack on Georgia Hospital appeared first on SecurityWeek.

Published on: February 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Can AI Early Warning Systems Reboot the Threat Intel Industry?

News analysis: The big AI platforms are emerging as frontline early warning systems, detecting nation-state hackers at the outset of their campaigns. Can this help save the threat intel industry? The post Can AI Early Warning Systems Reboot the Threat Intel Industry? appeared first on SecurityWeek.

Published on: February 10, 2025 | Source: SecurityWeek favicon SecurityWeek

Don't Overlook These 6 Critical Okta Security Configurations

Given Okta's role as a critical part of identity infrastructure, strengthening Okta security is essential. This article covers six key Okta security settings that provide a strong starting point, along with recommendations for implementing continuous monitoring of your Okta security posture. With over 18,000 customers, Okta serves as the cornerstone of identity governance and security for

Published on: February 10, 2025 | Source: The Hacker News favicon The Hacker News

Neil Lawrence: What makes us unique in the age of AI | Starmus highlights

As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what machines can achieve, one question looms large: what remains uniquely human?

Published on: February 10, 2025 | Source: WeLiveSecurity favicon WeLiveSecurity

SolarWinds Taken Private in $4.4 Billion Turn/River Capital Acquisition

SolarWinds will become a privately held company following its acquisition by Turn/River Capital for $4.4 billion in cash. The post SolarWinds Taken Private in $4.4 Billion Turn/River Capital Acquisition appeared first on SecurityWeek.

Published on: February 10, 2025 | Source: SecurityWeek favicon SecurityWeek

DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects

Threat actors have been observed targeting Internet Information Services (IIS) servers in Asia as part of a search engine optimization (SEO) manipulation campaign designed to install BadIIS malware. "It is likely that the campaign is financially motivated since redirecting users to illegal gambling websites shows that attackers deploy BadIIS for profit," Trend Micro researchers Ted Lee and

Published on: February 10, 2025 | Source: The Hacker News favicon The Hacker News

Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities

Zimbra has released software updates to address critical security flaws in its Collaboration software that, if successfully exploited, could result in information disclosure under certain conditions. The vulnerability, tracked as CVE-2025-25064, carries a CVSS score of 9.8 out of a maximum of 10.0. It has been described as an SQL injection bug in the ZimbraSync Service SOAP endpoint affecting

Published on: February 10, 2025 | Source: The Hacker News favicon The Hacker News

XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells

Threat actors have been observed exploiting multiple security flaws in various software products, including Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore, to drop reverse shells and web shells, and maintain persistent remote access to compromised systems. The zero-day exploitation of security flaws in VeraCore has been attributed to a threat actor known as XE Group, a cybercrime

Published on: February 10, 2025 | Source: The Hacker News favicon The Hacker News

UK Is Ordering Apple to Break Its Own Encryption

The Washington Post is reporting that the UK government has served Apple with a โ€œtechnical capability noticeโ€ as defined by the 2016 Investigatory Powers Act, requiring it to break the Advanced Data Protection encryption in iCloud for the benefit of law enforcement. This is a big deal, and something we in the security community have worried was coming for a while now. The law, known by critics as the Snoopersโ€™ Charter,...

Published on: February 08, 2025 | Source: Schneier on Security favicon Schneier on Security

Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection

Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an unusual technique of "broken" pickle files to evade detection. "The pickle files extracted from the mentioned PyTorch archives revealed the malicious Python content at the beginning of the file," ReversingLabs researcher Karlo Zanki said in a report shared with The Hacker News. "

Published on: February 08, 2025 | Source: The Hacker News favicon The Hacker News

Teen on Muskโ€™s DOGE Team Graduated from โ€˜The Comโ€™

Wired reported this week that a 19-year-old working for Elon Musk's so-called Department of Government Efficiency (DOGE) was given access to sensitive US government systems even though his past association with cybercrime communities should have precluded him from gaining the necessary security clearances to do so. As today's story explores, the DOGE teen is a former denizen of 'The Com,' an archipelago of Discord and...

Published on: February 08, 2025 | Source: Krebs on Security favicon Krebs on Security

Friday Squid Blogging: The Colossal Squid

Long article on the colossal squid. Blog moderation policy.

Published on: February 07, 2025 | Source: Schneier on Security favicon Schneier on Security

LLM Hijackers Quickly Incorporate DeepSeek API Keys

The secret use of other people's generative AI platforms, wherein hijackers gain unauthorized access to an LLM while someone else foots the bill, is getting quicker and stealthier by the month.

Published on: February 07, 2025 | Source: Dark Reading favicon Dark Reading

SolarWinds to Go Private for $4.4B

Five years after a Russian APT infiltrated a software update to gain access to thousands of SolarWinds customers, the board has voted unanimously to sell at a top valuation and plans for uninterrupted operations.

Published on: February 07, 2025 | Source: Dark Reading favicon Dark Reading

Microsoft: Thousands of Public ASP.NET Keys Allow Web Server RCE

Developers are pulling in publicly available ASP.NET keys into their environments, without realizing that cyberattackers can use them for clandestine code injection.

Published on: February 07, 2025 | Source: Dark Reading favicon Dark Reading

Databarracks Launches Air Gap Recover

Published on: February 07, 2025 | Source: Dark Reading favicon Dark Reading

Google's DMARC Push Pays Off, but Email Security Challenges Remain

A year after Google and Yahoo started requiring DMARC, the adoption rate of the email authentication specification has doubled; and yet, 87% of domains remain unprotected.

Published on: February 07, 2025 | Source: Dark Reading favicon Dark Reading

Screenshot-Reading Malware

Kaspersky is reporting on a new type of smartphone malware. The malware in question uses optical character recognition (OCR) to review a deviceโ€™s photo library, seeking screenshots of recovery phrases for crypto wallets. Based on their assessment, infected Google Play apps have been downloaded more than 242,000 times. Kaspersky says: โ€œThis is the first known case of an app infected with OCR spyware being found in Apple...

Published on: February 07, 2025 | Source: Schneier on Security favicon Schneier on Security

Behavioral Analytics in Cybersecurity: Who Benefits Most?

As the cost of data breaches continues to climb, the role of user and entity behavioral analytics (UEBA) has never been more important.

Published on: February 07, 2025 | Source: Dark Reading favicon Dark Reading

DeepSeek App Transmits Sensitive User and Device Data Without Encryption

A new audit of DeepSeek's mobile app for the Apple iOS operating system has found glaring security issues, the foremost being that it sends sensitive data over the internet sans any encryption, exposing it to interception and manipulation attacks. The assessment comes from NowSecure, which also found that the app fails to adhere to best security practices and that it collects extensive user and

Published on: February 07, 2025 | Source: The Hacker News favicon The Hacker News