#cybersecurity

[ follow ]
#phishing
Cryptocurrency
fromThe Hacker News
9 hours ago

Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

Discord's invitation system has a vulnerability allowing attackers to redirect trusted links to malicious servers.
The malware campaign targets users by exploiting expired or deleted invite links.
Cryptocurrency
fromThe Hacker News
9 hours ago

Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

Discord's invitation system has a vulnerability allowing attackers to redirect trusted links to malicious servers.
The malware campaign targets users by exploiting expired or deleted invite links.
Tech industry
fromTechCrunch
20 hours ago

Silicon Valley tech execs are joining the US Army Reserve | TechCrunch

CTOs from major tech companies are joining the U.S. Army Reserve to apply their expertise in cybersecurity and data.
#ransomware
Information security
fromIT Pro
21 hours ago

RSAC Conference 2025: The front line of cyber innovation

The evolving cybersecurity landscape demands IT leaders to adapt to both new technologies and increasing threats, especially from state-backed actors.
Information security
fromTheregister
1 day ago

Ransomware disrupted utility services in SimpleHelp attacks

Ransomware groups exploited a vulnerability in SimpleHelp's software, causing service disruptions and extortion incidents.
fromIT Pro
1 day ago
Cryptocurrency

LockBit data dump reveals a treasure trove of intel on the notorious hacker group

Information security
fromIT Pro
21 hours ago

RSAC Conference 2025: The front line of cyber innovation

The evolving cybersecurity landscape demands IT leaders to adapt to both new technologies and increasing threats, especially from state-backed actors.
Information security
fromTheregister
1 day ago

Ransomware disrupted utility services in SimpleHelp attacks

Ransomware groups exploited a vulnerability in SimpleHelp's software, causing service disruptions and extortion incidents.
fromIT Pro
1 day ago
Cryptocurrency

LockBit data dump reveals a treasure trove of intel on the notorious hacker group

#cisa
Information security
fromNextgov.com
2 days ago

CISA's executive director is leaving the agency

Bridget Bean retires as executive director of CISA after nearly three years, marking a significant leadership transition at the agency.
Information security
fromNextgov.com
2 days ago

CISA's executive director is leaving the agency

Bridget Bean retires as executive director of CISA after nearly three years, marking a significant leadership transition at the agency.
#apple
Privacy professionals
fromThe Hacker News
1 day ago

Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

Apple addressed a significant vulnerability in its Messages app that was exploited to target journalists with advanced spyware.
Apple
fromArs Technica
1 day ago

Coming to Apple OSes: A seamless, secure way to import and export passkeys

Apple's new feature aims to enhance passkeys' transferability across devices, addressing a significant limitation of current passkey systems.
Privacy professionals
fromTechCrunch
1 day ago

Apple fixes new iPhone zero-day bug used in Paragon spyware hacks | TechCrunch

Apple fixed a crucial flaw exploited by Paragon spyware in iOS 18.3.1 after journalists' iPhones were hacked.
Privacy professionals
fromThe Hacker News
1 day ago

Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

Apple addressed a significant vulnerability in its Messages app that was exploited to target journalists with advanced spyware.
Apple
fromArs Technica
1 day ago

Coming to Apple OSes: A seamless, secure way to import and export passkeys

Apple's new feature aims to enhance passkeys' transferability across devices, addressing a significant limitation of current passkey systems.
Privacy professionals
fromTechCrunch
1 day ago

Apple fixes new iPhone zero-day bug used in Paragon spyware hacks | TechCrunch

Apple fixed a crucial flaw exploited by Paragon spyware in iOS 18.3.1 after journalists' iPhones were hacked.
#malware
fromZDNET
4 days ago
Artificial intelligence

How Cisco plans to stop rogue AI agent attacks inside your network

fromIT Pro
4 days ago
Node JS

Developers beware: Malware has been found in a dozen popular NPM packages - here's what you need to know

Marketing tech
fromThe Hacker News
23 hours ago

Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month

A large-scale cybersecurity campaign is compromising legitimate websites through malicious JavaScript injections utilizing an obfuscation technique known as JSFireTruck.
Growth hacking
fromTheregister
3 days ago

CISO who helped unmask Badbox warns: Version 3 is coming

Badbox 2.0, a sophisticated botnet targeting smart devices, may launch new attacks despite efforts from security teams to disrupt its operations.
Marketing tech
fromThe Hacker News
1 day ago

WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network

VexTrio is a sophisticated cybercriminal organization linked to multiple traffic distribution services, specializing in spreading malware and scams.
Information security
fromThe Hacker News
3 days ago

INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure

INTERPOL dismantled over 20,000 malicious IPs linked to information-stealing malware in a global operation involving 26 countries.
Node JS
fromIT Pro
4 days ago

Developers beware: Malware has been found in a dozen popular NPM packages - here's what you need to know

Over a dozen NPM packages have been compromised, delivering malware that allows attackers to control infected machines.
#career-development
#ai
Artificial intelligence
fromTechzine Global
1 day ago

Zero-click attack reveals new AI vulnerability

Echoleak exposes vulnerabilities in AI assistants like Microsoft 365 Copilot through subtle prompt manipulation, representing a shift in cybersecurity attack vectors.
fromBusiness Matters
3 days ago
Artificial intelligence

House of Lords AI summit at London Tech Week warns of 'skills cliff edge' threatening UK's competitive future

Artificial intelligence
fromTechzine Global
1 day ago

Zero-click attack reveals new AI vulnerability

Echoleak exposes vulnerabilities in AI assistants like Microsoft 365 Copilot through subtle prompt manipulation, representing a shift in cybersecurity attack vectors.
fromBusiness Matters
3 days ago
Artificial intelligence

House of Lords AI summit at London Tech Week warns of 'skills cliff edge' threatening UK's competitive future

#data-privacy
fromSecuritymagazine
4 days ago
Privacy technologies

6 Google Chrome Extensions Expose User Information

Some popular Google Chrome extensions expose user data over unencrypted HTTP, increasing vulnerability to MITM attacks.
fromSecuritymagazine
1 day ago
Information security

40,000 IoT Security Cameras Are Exposed Online

Exposed IoT cameras worldwide pose significant security risks, potentially enabling espionage and cyberattacks.
#data-security
fromIT Pro
1 day ago
Artificial intelligence

AI security blunders have cyber professionals scrambling

fromHackernoon
5 months ago
Startup companies

Bedrock Security Cofounder and CEO on Why Security Must Start with Data Visibility | HackerNoon

fromHackernoon
5 months ago
Startup companies

Bedrock Security Cofounder and CEO on Why Security Must Start with Data Visibility | HackerNoon

#cybercrime
Digital life
fromFast Company
4 days ago

Data breach victims: Here's how your personal information is sold to criminals

Data breaches expose vast amounts of personal information, leading to identity theft and fraud.
Criminals often sell stolen data in markets to maximize their profits.
Digital life
fromFast Company
4 days ago

Data breach victims: Here's how your personal information is sold to criminals

Data breaches expose vast amounts of personal information, leading to identity theft and fraud.
Criminals often sell stolen data in markets to maximize their profits.
fromThe Hacker News
1 day ago

CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk

The security landscape is overwhelmed with alerts, leading to fatigue among analysts and often significant risks slipping through the cracks.
Information security
Information security
fromIT Pro
1 day ago

Application security risk: How leaders can protect their businesses

Application security is increasingly challenging due to software complexity and pressure for rapid feature rollout.
#china
US news
fromThe Cipher Brief
1 day ago

China Wants Our Hearts. Literally.

China poses a significant threat to U.S. networks and critical infrastructure via cyberattacks and data theft.
European startups
fromThe Cipher Brief
1 day ago

Chinese Industrial Espionage: What Happens in the Netherlands Doesn't Stay in the Netherlands

China's intelligence operations in the Netherlands threaten national security and global supply chains.
Strengthened U.S.-Dutch cooperation is essential to counter Chinese espionage.
Law
fromAbove the Law
1 day ago

Sitting U.S. Senators Aren't Safe From Arrest - See Also - Above the Law

Senator Padilla's arrest raises concerns about law enforcement ethics during a political duty.
Criticism of state bar actions reflects broader issues of accountability in the legal profession.
Online marketing
fromTechRadar
1 day ago

No, those amazing deals on Facebook aren't real - it's a scam, and here's how to spot it

Scammers exploit Facebook Marketplace with fake domains to promote luxury products at unrealistic prices, resulting in financial loss for victims.
fromTheregister
1 day ago

Pentagon IT projects have lots of things to to fix, says GAO

US government auditors have been attempting to improve the Pentagon's IT programs for years, but reports indicate it remains a challenging task.
DevOps
#data-breach
Information security
fromHackernoon
1 week ago

How to Tackle New Cybersecurity Threats and Data Breaches | HackerNoon

Cybersecurity threats are escalating, emphasized by a significant increase in cyberattacks and high-profile data breaches in 2024.
Information security
fromHackernoon
1 week ago

How to Tackle New Cybersecurity Threats and Data Breaches | HackerNoon

Cybersecurity threats are escalating, emphasized by a significant increase in cyberattacks and high-profile data breaches in 2024.
#ai-security
#ai-vulnerability
Artificial intelligence
fromCSO Online
2 days ago

First-ever zero-click attack targets Microsoft 365 Copilot

EchoLeak is a zero-click vulnerability in Microsoft 365 Copilot that allows hackers to exfiltrate sensitive corporate data via a single email.
Artificial intelligence
fromThe Hacker News
2 days ago

Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction

The EchoLeak vulnerability in Microsoft 365 Copilot is a severe zero-click AI attack, allowing data exfiltration without user interaction.
EU data protection
fromComputerWeekly.com
2 days ago

Apple encryption row: Does law enforcement need to use Technical Capability Notices? | Computer Weekly

End-to-end encryption presents challenges for law enforcement, but traditional investigative techniques can still lead to successful prosecutions.
#supply-chain
fromTechCrunch
3 days ago
SF food

Whole Foods tells staff cyberattack at its primary distributor UNFI will affect product availability | TechCrunch

fromTechCrunch
3 days ago
SF food

Whole Foods tells staff cyberattack at its primary distributor UNFI will affect product availability | TechCrunch

Information security
fromIT Pro
2 days ago

Public sector organizations are drowning in security debt

Public sector struggles with security vulnerabilities, needing nearly a year to address software flaws, highlighting significant security debt.
Growth hacking
fromThe Hacker News
2 days ago

Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool

The UNK_SneakyStrike campaign poses a significant threat to Microsoft Entra ID accounts through sophisticated attacks.
TeamFiltration tool enables attackers to perform account takeovers efficiently.
#fraud-prevention
Information security
fromTheregister
4 days ago

Trump EO axes digital IDs, blames 'illegal aliens' for fraud

Trump's executive order dismantles Biden's digital ID protections aimed at combating cybercrime.
The move faces criticism for potentially increasing fraud and undermining cybersecurity efforts.
fromForbes
3 days ago
Online marketing

Chrome, Safari And Edge Warning-Do Not Use Any Website On This List

fromABC7 Chicago
3 days ago
Artificial intelligence

'Grey's Anatomy' star Chris Carmack, wife fall victim to online AI scam, now raising awareness

Information security
fromTheregister
4 days ago

Trump EO axes digital IDs, blames 'illegal aliens' for fraud

Trump's executive order dismantles Biden's digital ID protections aimed at combating cybercrime.
The move faces criticism for potentially increasing fraud and undermining cybersecurity efforts.
fromForbes
3 days ago
Online marketing

Chrome, Safari And Edge Warning-Do Not Use Any Website On This List

fromABC7 Chicago
3 days ago
Artificial intelligence

'Grey's Anatomy' star Chris Carmack, wife fall victim to online AI scam, now raising awareness

fromTechCrunch
2 days ago

US government's vaccine website defaced with AI-generated content | TechCrunch

A U.S. government vaccine website has been defaced, now displaying AI-generated spam, reflecting a troubling trend in website security breaches and misinformation.
US news
#threat-intelligence
Information security
fromSecuritymagazine
3 days ago

Security Firm Targeted by China-Linked Hackers

SentinelLABS successfully defended against reconnaissance operations linked to China-nexus threat actors targeting various organizations across different sectors.
Information security
fromSecuritymagazine
3 days ago

Security Firm Targeted by China-Linked Hackers

SentinelLABS successfully defended against reconnaissance operations linked to China-nexus threat actors targeting various organizations across different sectors.
Germany news
fromwww.dw.com
2 days ago

Germany updates: Russian imports fell 95% since Ukraine war DW 06/11/2025

Germany has drastically reduced its trade with Russia since the Ukraine war, with a 95% decrease in imports.
Gunther Uecker, famed nail artist, has passed away at 95, marking a significant loss to the art community.
Cyberattacks are affecting a segment of German businesses, although most report minimal damage.
#privacy
fromZDNET
2 days ago
Privacy technologies

How to turn on Android's Private DNS Mode - and why your security depends on it

fromZDNET
2 days ago
Privacy technologies

How to turn on Android's Private DNS Mode - and why your security depends on it

Information security
fromComputerWeekly.com
3 days ago

Investor behaviour in the wake of cyber's 'black swan' moment | Computer Weekly

The UK is experiencing a significant cybersecurity crisis, marked by unprecedented simultaneous breaches that challenge assumed forecasts of risk.
#zero-trust
fromIT Pro
3 days ago
Information security

Research shows the financial benefits of implementing zero trust

fromIT Pro
3 days ago
Information security

Research shows the financial benefits of implementing zero trust

#microsoft
Tech industry
fromTheregister
3 days ago

Microsoft warns of 66 flaws to fix for this Patch Tuesday

Microsoft's latest Patch Tuesday addresses critical flaws, including two actively exploited bugs, highlighting urgent security measures necessary for various platforms.
Bootstrapping
fromThe Hacker News
3 days ago

Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild

Microsoft patched 67 security flaws, including a critical zero-day vulnerability in WEBDAV exploited in active attacks.
Tech industry
fromTheregister
3 days ago

Microsoft warns of 66 flaws to fix for this Patch Tuesday

Microsoft's latest Patch Tuesday addresses critical flaws, including two actively exploited bugs, highlighting urgent security measures necessary for various platforms.
Bootstrapping
fromThe Hacker News
3 days ago

Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild

Microsoft patched 67 security flaws, including a critical zero-day vulnerability in WEBDAV exploited in active attacks.
fromwww.independent.co.uk
3 days ago

Inside the DragonForce and Scattered Spider hacker groups linked to M&S cyberattack

At such a critical moment in US history, we need reporters on the ground.
UK news
#data-protection
Mobile UX
fromZDNET
3 days ago

Your Android phone is getting new security protections - and it's a big deal for enterprises

Google's Android Enterprise platform enhances mobile security for organizations, addressing vulnerabilities in unmanaged devices.
Mobile UX
fromZDNET
3 days ago

Your Android phone is getting new security protections - and it's a big deal for enterprises

Google's Android Enterprise platform enhances mobile security for organizations, addressing vulnerabilities in unmanaged devices.
EU data protection
fromTheregister
3 days ago

Judge: OPM likely broke privacy law with DOGE access

The US federal government's HR department illegally granted access to sensitive personnel records, violating privacy laws and cybersecurity safeguards.
Information security
fromSecuritymagazine
4 days ago

Trump Administration Executive Order Changes Cybersecurity Policy

The new executive order by the Trump Administration amends cybersecurity policies, reversing key elements of previous administrations' strategies.
fromEntrepreneur
3 days ago

TSA Warns Air Travelers About Airport 'Juice Jacking' Scam | Entrepreneur

In a Facebook post, the TSA warns that those stations are prime hunting spots for data and identity thieves, thanks to a practice called 'juice jacking.'
Growth hacking
fromComputerWeekly.com
3 days ago

UK defence scheme invests in future cyber tech Cheri | Computer Weekly

This project is directly focused on ensuring communication systems and active control systems are more robust, higher integrity, and are inherently secured against broad-based cyber attacks.
Tech industry
Information security
fromThe Hacker News
4 days ago

The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontier

The increase of non-human identities (NHIs) poses significant security risks, necessitating enhanced management by security leaders.
[ Load more ]