fromSecuritymagazine1 week agoResearchers Found Nearly 600 Incidents of AI FraudA significant rise in browser-based phishing attacks is driven by generative AI, with incidents increasing by 140% compared to the previous year.
fromNextgov.com1 week agoPrivacy professionalsChinese hackers are exploiting SharePoint vulnerabilities, Microsoft says
fromNextgov.com1 week agoPrivacy professionalsThreat intel firms on alert for government systems impacted by Microsoft SharePoint vulnerability
fromThe Hacker News2 weeks agoInformation securityUNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit
fromThe Hacker News3 weeks agoInformation securityCISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation
Roam ResearchfromTheregister1 month agoTyphoon-like gang slinging TLS certificate 'signed' by LAPDChina-backed attackers have launched an ongoing campaign infecting over 1,000 devices in primarily the US and Southeast.The campaign utilizes Operational Relay Boxes (ORB) for covert cyberattacks, complicating detection and attribution.
Growth hackingfromThe Hacker News1 month agoNew Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing ChainsA new cyber campaign is exploiting Cloudflare Tunnel for delivering malicious payloads via phishing emails.The techniques involve complex multi-step processes and disguised files to execute attacks.
fromNextgov.com1 week agoPrivacy professionalsChinese hackers are exploiting SharePoint vulnerabilities, Microsoft says
fromNextgov.com1 week agoPrivacy professionalsThreat intel firms on alert for government systems impacted by Microsoft SharePoint vulnerability
fromThe Hacker News2 weeks agoInformation securityUNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit
fromThe Hacker News3 weeks agoInformation securityCISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation
fromThe Hacker News1 month agoGrowth hackingNew Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains
fromArs Technica3 weeks agoPrivacy professionals"No honor among thieves": M&S hacking group starts turf war
fromThe Hacker News3 months agoPrivacy professionalsOPSEC Failure Exposes Coquettte's Malware Campaigns on Bulletproof Hosting Servers
fromArs Technica3 weeks agoPrivacy professionals"No honor among thieves": M&S hacking group starts turf war
fromThe Hacker News3 months agoPrivacy professionalsOPSEC Failure Exposes Coquettte's Malware Campaigns on Bulletproof Hosting Servers
fromTechzine Global1 month agoMicrosoft Defender XDR gets Copilot-driven upgradeMicrosoft's TITAN recommendations enhance Guided Response with real-time threat intelligence for better cyber defense.
Information securityfromHackernoon2 months agoDiscover Your Most Critical Assets Before Hackers Do | HackerNoonUnderstanding asset criticality is essential for prioritizing vulnerability remediation.
Node JSfromBleepingComputer2 months agoDozens of malicious packages on NPM collect host and network data60 malicious NPM packages were found that collect sensitive data and send it to threat actors through Discord webhooks.Threat actors employed names similar to legitimate packages to deceive developers and infiltrate systems.
Artificial intelligencefromSecuritymagazine2 months agoPay Attention to the Intersection of API Security and AI ProliferationAI integration is increasing reliance on APIs, impacting organizational security.
fromComputerWeekly.com2 months agoInformation securityRansomware attacks dropped by a third last month | Computer Weekly
fromComputerWeekly.com3 months agoPrivacy professionalsMarch ransomware slowdown probably a red herring | Computer Weekly
fromThe Hacker News4 months agoTech industryMedusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates
Information securityfromTheregister5 months agoBlack Basta's fighty internal chats leak onlineInternal conflicts within the Black Basta ransomware gang have led to a decrease in their activities and stability.
Information securityfromITPro5 months agoThe new ransomware groups worrying security researchers in 2025The ransomware ecosystem is increasingly fragmented with new smaller groups emerging alongside traditional mega-groups.
fromComputerWeekly.com2 months agoInformation securityRansomware attacks dropped by a third last month | Computer Weekly
Privacy professionalsfromComputerWeekly.com3 months agoMarch ransomware slowdown probably a red herring | Computer WeeklyRansomware incidents have dramatically increased by 46% year-on-year, despite a 32% month-to-month drop in recorded attacks in March 2025.
Roam ResearchfromTheregister3 months agoSubmit ransomware intel, earn up to $10k from new programHalcyon's Threat Research Incentive Program rewards researchers $10,000 for valuable ransomware intel to combat extortionists.
fromThe Hacker News4 months agoTech industryMedusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates
Information securityfromTheregister5 months agoBlack Basta's fighty internal chats leak onlineInternal conflicts within the Black Basta ransomware gang have led to a decrease in their activities and stability.
Information securityfromITPro5 months agoThe new ransomware groups worrying security researchers in 2025The ransomware ecosystem is increasingly fragmented with new smaller groups emerging alongside traditional mega-groups.
Information securityfromSecuritymagazine2 months ago430K Patients' Data Exposed in Ascension BreachAscension's data breach impacted over 437,000 individuals, highlighting the healthcare industry's vulnerabilities to cyber threats and the importance of robust cybersecurity measures.
Marketing techfromTechzine Global3 months agoFlashpoint launches AI-driven tools for better threat intelligenceFlashpoint Ignite platform's new AI features enhance threat intelligence accessibility and speed up response in complex threat environments.
fromTheregister3 months agoExperts forecast Ivanti VPN attacks as endpoint scans surgeIvanti VPN users should remain vigilant due to an 800% surge in IP scanning, suggesting potential exploitation risks.
fromThe Hacker News3 months agoPalo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect GatewaysPalo Alto Networks reports a surge in brute-force login attempts against its GlobalProtect gateways, highlighting increasing security threats.
fromITPro3 months agoSurging DDoS attack rates show no sign of slowing down - here's whyDDoS attacks have surged due to their use in cyber warfare linked to socio-political events.
fromThe Hacker News4 months agoCoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus DetectionCoffeeLoader malware executes secondary payloads and evades detection using sophisticated techniques, including GPU execution and call stack spoofing.
GadgetsfromInfoQ4 months agoGoogle Report Reveals How Threat Actors Are Currently Using Generative AIGoogle's latest report shows that adversarial misuse of generative AI by threat actors is still in the early stages of development.