: Facebook is starting to feed its AI with private, unpublished photos | The Verge Meta is testing a …

: Ottawa orders Chinese tech firm to close Canadian operations over national security - National | …

: Texas Centers for Infectious Disease Associates Notifies Individuals of Data Breach in 2024 – …

: 61 million records allegedly from Verizon leak online: names, tax IDs, addresses, phone numbers A …

: Private Key Leaks And Front-end Hacks Dominate 2025 Crypto Thefts In the first half of 2025, crypto …

: Data of 743k patients was potentially exposed in 2024 McLaren Health hack – 9&10 News A 2024 …

: Forget ChatGPT and Gemini — this lesser-known chatbot just ranked No. 1 for privacy | Tom’s …

: Google Pixel 7 sales banned in Japan, Pixel 8 and 9 might follow - GSMArena.com news Google Pixel 7 …

: Ontario investigating alleged data breach of 200,000 home care patients' info Ontario is …

: Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit A new campaign …

: Microsoft Edge security advisory (AV25-378) - Canadian Centre for Cyber Security Microsoft published …

: VMware security advisory (AV25-379) - Canadian Centre for Cyber Security VMware published a security …

: OneClik APT campaign targets energy sector with stealthy backdoors A new APT malware campaign, …

: In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update - SecurityWeek …

: Some Brother printers have a remote code execution vulnerability, and they can’t fix it | CSO Online …

: Fake DocuSign email hides tricky phishing attempt | Malwarebytes A cybersecurity researcher …

: The Good, the Bad and the Ugly in Cybersecurity – Week 26 A British national, Kai West, was charged …

: MongoDB security advisory (AV25-380) - Canadian Centre for Cyber Security MongoDB published a …

: Malicious AI Models Are Behind a New Wave of Cybercrime, Cisco Talos Cisco Talos reports a rise in …

: FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering The FBI …

: Misconfigured AI Servers Expose Data, Systems Cybersecurity researchers have discovered that …

: Berlin Regulator Orders Apple, Google to Remove DeepSeek A German data protection regulator has …

: Threat Spotlight: CVE-2025-5777: Citrix Bleed 2 Opens Old Wounds - ReliaQuest Citrix has issued …

: Copyright Cases Should Not Threaten Chatbot Users’ Privacy | Electronic Frontier Foundation A recent …

: AI Evasion: The Next Frontier of Malware Techniques blog.checkpoint.com/artificia… Check …

: Sextortion email scammers increase their “Hello pervert” money demands …

: Ransomware attack contributed to patient’s death, says Britain’s NHS …

: Iranian Educated Manticore Targets Leading Tech Academics research.checkpoint.com/2025/iran… …

: China-Nexus ‘LapDogs’ Network Thrives on Backdoored SOHO Devices …

: Is my phone infected with spyware? How to tell www.pandasecurity.com/en/mediac… Holding …

: XOR Marks the Flaw in SAP GUI www.darkreading.com/cloud-sec… The company has patched two …

: nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications …

: New ‘CitrixBleed 2’ NetScaler flaw let hackers hijack sessions …

: New wave of ‘fake interviews’ use 35 npm packages to spread malware …

: Dire Wolf Strikes: New Ransomware Group Targeting Global Sectors www.trustwave.com/en-us/res… …

: Cybercriminal abuse of large language models blog.talosintelligence.com/cybercrim… …

: Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks Iranian …

: ClickFix attacks skyrocketing more than 500% - Help Net Security ESET’s latest Threat Report reveals …

: BreachForums: ShinyHunters Members Arrested, IntelBroker Identified as Kai West French authorities …

: CrowdStrike is cutting jobs in favor of AI. Here’s why you shouldn’t. | CSO Online As firms like …

: How safe is Telegram? | Proton VPN Telegram’s popularity stems from its open platform and ability to …

: XBOW, an autonomous penetration tester, has reached the top spot on HackerOne | Hacker News Xbow is …

: Trezor’s support platform abused in crypto theft phishing attacks …

: Leak of data belonging to 7.4 million Paraguayans traced back to infostealers …

: Attackers Wield Signed ConnectWise Installers as Malware www.databreachtoday.com/attackers… …

: Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent …

: Dissecting a Malicious Havoc Sample www.fortinet.com/blog/thre… This analysis is a follow-up …

: Beware of fake SonicWall VPN app that steals users' credentials …

: Black Hat SEO Poisoning Search Engine Results For AI to Distribute Malware …

: Russia-linked APT28 use Signal chats to target Ukraine official with malware …

: How US Cyber Ops May Have Assisted the Midnight Hammer Strike The U.S. likely combined cyber …

: Canada says telcos were breached in China-linked espionage hacks The Canadian government and FBI …

: Spy agency says it ‘improperly’ shared Canadians' data with international partners | CBC …

: FedEx founder Fred Smith, a Marine Corps veteran who revolutionized package delivery, dies at 80 …

: Canada Says Network Devices Compromised in China-Linked Hack - Bloomberg In a joint advisory issued …

: Violence-as-a-Service: Encrypted Apps Used in Recruiting Teens as Hitmen European law enforcement, …

: Iran confirmed it shut down internet to protect the country against cyberattacks Iran confirmed an …

: Qilin ransomware gang now offers a “Call Lawyer” feature to pressure victims The Qilin …

: 71% of new hires click on phishing emails within 3 months - Help Net Security New hires are 44% more …

: The new SparkKitty Trojan spy in the App Store and Google Play | Securelist A new SparkKitty Trojan …

: Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games Iran-linked …

: ⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More This week’s …

: Zyxel Devices Hit by Active Exploits Targeting CVE-2023-28771 Vulnerability A critical remote code …

: Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777) - Help Net Security Citrix has …

: Oxford City Council suffers breach exposing two decades of data …

: Critical OpenVPN Driver Vulnerability Allows Attackers to Crash Windows Systems …

: Analyzing SERPENTINE#CLOUD: Threat Actors Abuse Cloudflare Tunnels to Infect Systems with Stealthy …

: Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global …

: Why U.S and Israel Airstrikes on Iran Won’t Shift the Cyber Threat Landscape …

: A look at ‘Tinker,’ Black Basta’s phishing fixer, negotiator intel471.com/blog/a-lo… The …

: Is b For Backdoor? Pre-Auth RCE Chain In Sitecore Experience Platform …

: Cybercriminals target smart homes as BadBox 2.0 botnet spreads globally …

: Hackers Post Dozens of Malicious Copycat Repos to GitHub www.darkreading.com/threat-in… As …

: Microsoft to remove legacy drivers from Windows Update for security boost …

: Russian dairy supply disrupted by cyberattack on animal certification system …

: Resurgence of the Prometei Botnet unit42.paloaltonetworks.com/prometei-… This research has …

: BitoPro exchange links Lazarus hackers to $11 million crypto heist …

: Krispy Kreme: Over 160,000 people had data stolen during November 2024 cyberattack …

: Looks like Aflac is the latest insurance giant snagged in Scattered Spider’s web …

: Qilin ransomware top dogs treat their minions to on-call lawyers for fierier negotiations …

: How Cyber Warfare Changes the Face of Geopolitical Conflict www.darkreading.com/cyberatta… As …

: Your address is out there — and it’s not hard to find it | Proton Online people-finder sites, which …

: Microsoft Edge security advisory (AV25-358) - Canadian Centre for Cyber Security Microsoft published …

: Microsoft Edge security advisory (AV25-358) - Canadian Centre for Cyber Security Microsoft published …

: UK Passes Data Use and Access Regulation Bill The UK has passed the Data Use and Access Bill, …

: Hype Alert: ‘The Largest Data Breach in History’ That Wasn’t A recent report …

: Banana Squad Hides Data-Stealing Malware in Fake GitHub Repositories hackread.com/banana-sq… …

: Telecom giant Viasat breached by China’s Salt Typhoon hackers …

: Israel-tied Predatory Sparrow hackers are waging cyberwar on Iran’s financial system …

: Takeover of British Russia expert’s email accounts used novel phishing tactic …

: VMware security advisory (AV25-357) - Canadian Centre for Cyber Security VMware released security …

: Paragon Commercial Spyware Infects Prominent Journalists Two European journalists were targeted by …

: Defending the Internet: how Cloudflare blocked a monumental 7.3 Tbps DDoS attack In May 2025, …

: Over Two Thirds of MSPs Hit by Multiple Breaches in Past Year, Survey Reveals - IT Security Guru The …

: Serpentine#Cloud Uses Cloudflare Tunnels in Sneak Attacks www.darkreading.com/cloud-sec… …

: ChainLink Phishing: How Trusted Domains Become Threat Vectors …

: BeyondTrust warns of pre-auth RCE in Remote Support software …

: New Linux udisks flaw lets attackers get root on major Linux distros …

: Scammers hijack websites of Bank of America, Netflix, Microsoft, and more to insert fake phone …

: Famous Chollima deploying Python version of GolangGhost RAT …

: Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data …

: New Campaigns Distribute Malware via Open Source Hacking Tools - SecurityWeek Two new campaigns were …

: Iran-Israel War Triggers a Maelstrom in Cyberspace Iran and Israel are engaged in a cyber war, with …

: A New Breed Of Mobile Threat: GodFather Malware Goes Virtual A new variant of GodFather malware uses …

: Hackers Claim Leak Of 64 Million T-Mobile Records, But Company Denies Breach Hackers claim to have …

: CVE-2025-3248 in Langflow Exploited to Deploy Flodrix Botnet - SOCRadar® Cyber Intelligence Inc. …

: Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign Threat actors …

: Security’s Blind Spot: Shadow AI Creeps Into The SOC A Mindgard survey of 500 cybersecurity …

: High-Severity Vulnerabilities Patched by Cisco, Atlassian - SecurityWeek Cisco and Atlassian …

: How CVE-2025-6018 and CVE-2025-6019 Enable Full Root Access on Linux - SOCRadar® Cyber Intelligence …

: Up-and-coming ransomware group Anubis has tweaked its malware to irrevocably wipe victims' data - an …

: Iranian Crypto Exchange Nobitex Exploited for $81M Iranian cryptocurrency exchange Nobitex was …

: Cybercrime gang hacks major health data provider - millions of highly personal files could be at …

: UBS Hit by Darknet Data Leak Affecting 130,000 Staff A data breach at procurement service provider …

: Scania confirms insurance claim data breach in extortion attempt …

: US offering $10 million for info on Iranian hackers behind IOControl malware …

: Pro-Israel Hacking Group Claims to Disrupt Iran’s Bank Sepah …

: Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet …

: Malicious Chimera Turns Larcenous on Python Package Index www.darkreading.com/applicati… A …

: Hacker steals 1 million Cock.li user records in webmail data breach …

: ASUS Armoury Crate bug lets attackers get Windows admin privileges …

: Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation …

: The Proxy Warfare: Unmasking Russia’s Externalized Cyber Capabilities …

: Suspected Chinese Hackers Targeted the Washington Post www.databreachtoday.com/suspected… …

: ‘Water Curse’ Targets Infosec Pros Via Poisoned GitHub Repositories …

: Microsoft adds export option to Windows Recall in Europe www.theregister.com/2025/06/1… …

: 8.4 million people affected by data breach at Indian car share company Zoomcar …

: Security Is Only as Strong as the Weakest Third-Party Link www.darkreading.com/vulnerabi… …

: Black Basta Leaks Highlight Phishing, Google Takeover Risks Leaked data from the defunct Black Basta …

: Offline Extraction of Symantec Account Connectivity Credentials (ACCs) | itm4n’s blog Offline …

: Canadian Airline WestJet Hit by Cyberattack - SecurityWeek Canadian airline WestJet experienced a …

: Fog Ransomware Group Uses Unconventional Toolset, New Research Finds | Security Magazine The Fog …

: New Predator spyware infrastructure revealed activity in Mozambique for first time Insikt Group …

: Anubis Ransomware Packs a Wiper to Permanently Delete Files - SecurityWeek Anubis ransomware, active …

: Microsoft-Signed Firmware Module Bypasses Secure Boot A Microsoft-signed firmware module, discovered …

: A recent CNBC analysis, “Why It’s So Hard To Be A Worker Right Now,” offers a concise summary of the …

: Healthcare data breach exposes 2.7 million patients: How to stay safe | Fox News A recent healthcare …

: Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month …

: Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper …

: Paraguay Suffered Data Breach: 7.4 Million Citizen Records Leaked on Dark Web A data breach in …

: Genea Fertility data leak: Blackmail risks loom over donors | SBS News The article describes a data …

: Morning cyber summary Show thinking Incident: CISA warns of ransomware attacks exploiting remote …

: Paragon spyware activity found on more journalists’ devices therecord.media/paragon-g… Two …

: SNCF Connect Allegedly Breached, Millions of Customer and Worker Records for Sale …

: Phishing sites posing as DeepSeek downloads drop a proxy backdoor | CSO Online Kaspersky warns of a …

: Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool A new account …

: Interpol Targets Infostealers: 20,000 IPs Taken Down, 32 Arrested, 216,000 Victims Notified - …

: Palo Alto Networks Patches Privilege Escalation Vulnerabilities - SecurityWeek Palo Alto Networks …

: Surge in Cyberattacks Targeting Journalists: Cloudflare - SecurityWeek Cloudflare’s Project Galileo, …

: ‘EchoLeak’ AI Attack Enabled Theft of Sensitive Data via Microsoft 365 Copilot - …

: Hackers Target Job Recruiters Through Malicious Resumes Russian-speaking hackers FIN6, also known as …

: AI Is Your New Coworker. Does It Need a Badge? The rise of agentic AI, capable of autonomous goal …

: Brute-force attacks target Apache Tomcat management panels …

: Operation Secure disrupts global infostealer malware operations …

: Microsoft slows Windows 11 24H2 Patch Tuesday due to a ‘compatibility issue’ …

: CISO who helped unmask Badbox warns: Version 3 is coming www.theregister.com/2025/06/1… …

: Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them. …

: Stealth Falcon APT Exploits Microsoft RCE Zero-Day in Mideast www.darkreading.com/vulnerabi… …

: Patch Tuesday, June 2025 Edition krebsonsecurity.com/2025/06/p… The sole zero-day flaw this …

: Morning cyber summary Incident: Microsoft confirms exploited zero-day vulnerability in WebDAV …

: Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps Adobe released …

: Microsoft security advisory – June 2025 monthly rollup (AV25-333) - Canadian Centre for Cyber …

: Red Hat security advisory (AV25-334) - Canadian Centre for Cyber Security Red Hat published security …

: Adobe security advisory (AV25-335) - Canadian Centre for Cyber Security Adobe published security …

: Google Chrome security advisory (AV25-336) - Canadian Centre for Cyber Security Google Chrome …

: Stealth Falcon APT Exploits Microsoft RCE Zero-Day Nation-state adversaries are exploiting a …

: NTLM reflection is dead, long live NTLM reflection! – An in-depth NTLM reflection, a vulnerability …

: India’s Security Leaders Struggle to Keep Up With Threats Indian organizations are struggling …

: 86% of all LLM usage is driven by ChatGPT - Help Net Security ChatGPT dominates LLM usage, …

: New BrowserVenom malware being distributed via fake DeepSeek phishing website | Securelist A new …

: Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053) - Help Net Security …

: China-linked hackers target cybersecurity firms, governments in global espionage campaign | CSO …

: Afternoon update ncident: FBI Warns of BADBOX 2.0 Botnet Surge in Chinese IoT Devices Incident Date: …

: Algerian group Jabaroot claims hack of Morocco’s Justice Ministry The Algerian hacker group Jabaroot …

: Morning update Incident: Ransomware Attack on YES24 in South Korea Incident Date: June 9, 2025 …

: Vulnerability in DanaBot Malware C2 Server Leaks Threat Actor Usernames and Crypto Keys A …

: Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets | SentinelOne …

: Stolen Ticketmaster data from Snowflake attacks briefly for sale again The article describes how …

: Horse racing’s governing body hit by cyber attack The British Horseracing Authority (BHA) …

: Trump Cybersecurity Order Reverses Biden, Obama Priorities A recent cybersecurity executive order …

: AI threats leave SecOps teams burned out and exposed - Help Net Security A recent survey of 500 …

: China-linked threat actor targeted +70 orgs worldwide, SentinelOne warns A China-linked threat …

: Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises The Rare …

: The Evolution of Linux Binaries in Targeted Cloud Operations Threat actors are developing Linux …

: Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account A security flaw in …

: Russia-linked PathWiper malware hits Ukrainian infrastructure | CSO Online A new malware, PathWiper, …

: Sensitive Information Stolen in Sensata Ransomware Attack - SecurityWeek Sensata Technologies, a …

: Critical Vulnerability Patched in SAP NetWeaver - SecurityWeek SAP released 14 security patches, …

: Incident: United Natural Foods (UNFI) Distributor Hit by Cyberattack Incident Date: June 6, 2025 …

: iMessage Zero-Click Attacks Suspected in Targeting of High-Value Individuals - SecurityWeek iVerify, …

: Vulnerability Summary for the Week of June 2, 2025 | CISA

: Ubuntu security advisory (AV25-323) - Canadian Centre for Cyber Security

: IBM security advisory (AV25-324) - Canadian Centre for Cyber Security

: Dell security advisory (AV25-325) - Canadian Centre for Cyber Security

: New AI tool targets critical hole in thousands of open source apps | InfoWorld The article describes …

: Chinese-Linked Hackers Targeted 70+ Global Organizations SentinelLABS uncovered a widespread cyber …

: Limited Canva Creator Data Exposed Via AI Chatbot Database A Chroma database operated by Russian AI …

: Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’ - SecurityWeek …

: SentinelOne Sees No Breach After Hardware Supplier Hacked SentinelOne reported a breach of a …

: Morning cyber security summary Incident: FBI Warns of BADBOX 2.0 Botnet Surge in Chinese IoT Devices …

: How global threat actors are weaponizing AI now, according to OpenAI www.zdnet.com/article/h… …

: FBI Alert Number: I-060525-PSA: Home Internet Connected Devices Facilitate Criminal Activity …

: Russian Spies Are Analyzing Data From China’s WeChat App (nytimes.com) …

: New Mirai botnet infect TBK DVR devices via command injection flaw …

: Hackers Using Fake IT Support Calls to Breach Corporate Systems, Google Hackers are using voice …

: EU Prepares for Transnational Cyberattacks - GovInfoSecurity The Council of the European Union …

: Experts found 4 billion user records online, the largest known leak of Chinese personal data from a …

: Alphabet CEO Sundar Pichai dismisses AI job fears, emphasizes expansion plans | TechCrunch Alphabet …

: Can we still tell what’s real? ‘Unsettling’ new AI tech makes generating …

: Microsoft says it is ending USB-C confusion with updated Windows 11 WHCP | BetaNews Microsoft is …

: OpenAI takes down covert operations tied to China : NPR OpenAI disrupted ten covert influence …

: Morning Briefing Incident: Ukraine Hacks Russian Warplane Manufacturer Tupolev Incident Date: June …

: US offers $10M for tips on state hackers tied to RedLine malware …

: Hacker arrested for breaching 5,000 hosting accounts to mine crypto …

: Ukrainian carriers are leasing their IPv4 addresses to stay afloat - sometimes after being overrun …

: Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine …

: BidenCash darknet forum taken down by US, Dutch law enforcement therecord.media/bidencash… …

: BladedFeline: Whispering in the dark www.welivesecurity.com/en/eset-r… In 2024, ESET …

: Cisco warns of ISE and CCP flaws with public exploit code www.bleepingcomputer.com/news/secu… …

: Interlock ransomware claims Kettering Health breach, leaks stolen data The Interlock ransomware gang …

: Hackers Leak 86 Million AT&T Records with Decrypted SSNs Hackers have leaked personal data from …

: Researchers Bypass Deepfake Detection With Replay Attacks www.darkreading.com/cybersecu… As …

: Creating the right organisational culture for cyber security www.ncsc.gov.uk/blog-post… Today …

: Hacker targets other hackers and gamers with backdoored GitHub code …

: Acreed infostealer poised to replace Lumma after global crackdown therecord.media/acreed-in… …

: Hewlett Packard Enterprise warns of critical StoreOnce auth bypass …

: morning summary Incident: Lee Enterprises Cyberattack Exposes 39,779 Social Security Numbers …

: Amazon to invest $10B in North Carolina to expand cloud infrastructure and advance AI The article …

: Attackers Impersonate Ruby Packages to Steal Telegram Data Malicious RubyGems, posing as Fastlane …

: Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App Google’s Threat …

: Lumma Stealer Malware Resurgence Challenges Global Takedown The Lumma Stealer malware, a popular …

: Rajkot civic body’s GIS website hit by cyber attack, over 400 GB data feared stolen – …

: 450M records allegedly stolen in Dubai hospital hack | Cybernews A ransomware gang claims to have …

: Code Bug at Compliance Firm Vanta Leaks Customer Data to Other Clients A software bug at Vanta, a …

: Host-based logs, container-based threats: How to tell where an attack began …

: Man pleads guilty to swatting spree impacting scores of government officials …

: NSO appeals WhatsApp decision, says it can’t pay $168 million in ‘unlawful’ damages …

: The North Face warns customers of April credential stuffing attack …

: Meta and Yandex are de-anonymizing Android users’ web browsing identifiers …

: Google patches new Chrome zero-day bug exploited in attacks …

: Data breaches in the last 48 hours Incident: Coinbase contractor breach exposes customer data Date: …

: Over 30 Vulnerabilities Patched in Android - SecurityWeek Google’s June 2025 Android update …

: Vet: Open-source software supply chain security tool - Help Net Security Vet helps developers and …

: New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch Google has patched …

: Victims risk AsyncRAT infection after being redirected to fake Booking.com sites …

: ‘Russian Market’ emerges as a go-to shop for stolen credentials …

: ‘Russian Market’ emerges as a go-to shop for stolen credentials …

: Malaysian home minister’s WhatsApp hacked, used to scam contacts therecord.media/malaysia-… …

: Qualcomm fixes three Adreno GPU zero-days exploited in attacks …

: Thousands of ASUS routers compromised in sophisticated hacking campaign | Cybersecurity Dive Over …

: Threat Actor Claims TikTok Breach, Puts 428 Million Records Up for Sale A threat actor named …

: Hacktivists, state-sponsored groups step up cyberattacks targeting manufacturing operations and OT …

: CrowdStrike and Microsoft Collaborate to Harmonize Cyber Threat Attribution CrowdStrike and …

: HPE security advisory (AV25-310) - Canadian Centre for Cyber Security HPE has issued security …

: IBM security advisory (AV25-307) - Canadian Centre for Cyber Security IBM has released security …

: Dell security advisory (AV25-306) - Canadian Centre for Cyber Security Dell has issued security …

: Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN Three …

: Nearly 1 million users switch mobile carriers in May in wake of SKT data breach A record-breaking …

: Data Breaches Affected 170 Million Patient Records in 2024 - Hematology Advisor A new study …

: Adidas Canada hit with data breach affecting customers' personal information Adidas Canada has …

: New Alleged Breaches: Bank Banten Customer Data, Deloitte Source Code, and TotalEnergies France - …

: The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats As cyber …

: Iranian Robbinhood Ransomware Operator Pleads Guilty in US City Attacks Sina Gholinejad, a …

: Red Hat security advisory (AV25-304) - Canadian Centre for Cyber Security Red Hat has issued …

: Ubuntu security advisory (AV25-305) - Canadian Centre for Cyber Security Ubuntu has released …

: Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently - SecurityWeek …

: UK military to establish new Cyber and Electromagnetic Command therecord.media/uk-milita… The …

: US probes effort to impersonate White House Chief of Staff, WSJ reports …

: Meta says it disrupted influence operations linked to China, Iran, Romania …

: Why is China deep in US networks? ‘They’re preparing for war,’ HR McMaster tells …

: U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams …

: Germany doxxes Conti ransomware and TrickBot ring leader www.bleepingcomputer.com/news/secu… …

: Australian ransomware victims now must tell the government if they pay up …

: Police takes down AVCheck site used by cybercriminals to scan malware …

: DDoS incident disrupts internet for thousands in Moscow therecord.media/moscow-in… Tens of …

: British man charged in US over plot to smuggle military tech to China …

: Exploit details for max severity Cisco IOS XE flaw now public …

: Chinese spying on Dutch industries ‘intensifying’: Dutch defence minister …

: Hidden Bear: The GRU hackers of Russia’s most notorious kill squad theins.press/en/inv/28… …

: Deloitte Data Breach: Alleged Leak of Source Code & GitHub Credentials A threat actor allegedly …

: Prominent private hospital group in South Africa hacked – MyBroadband Mediclinic Southern Africa, a …

: 184 Million Passwords Leaked for Google, Facebook, Instagram and More. How to Protect Your Accounts …

: Over 364,000 people have personal info leaked following hack on data broker LexisNexis | TechRadar …

: Massive data leak exposes 1.6 million Etsy and other TikTok shop customer details - here’s …

: 60 Malicious npm Packages Leak Network and Host Data in Active Malware Campaign …

: Scammers exploiting Microsoft business notifications to launch attacks …

: Bad Actors Target Gen Z With Pop Culture Bait Cybercriminals are using pop culture, particularly …

: What the UK’s New Cyber Resilience Bill Means for Businesses—and How to Stay Ahead | Tripwire The …

: China-linked APT UNC5221 started exploiting Ivanti EPMM flaws shortly after their disclosure …

: CISA flags Commvault zero-day as part of wider SaaS attack campaign | CSO Online Threat actors …

: 52% of SOC Teams Are Overworked, New Report Shows | Security Magazine A Splunk report reveals that …

: Researchers Drop PoC for Fortinet CVE-2025-32756, Urging Quick Patching Researchers have released a …

: Breaking RSA encryption just got 20x easier for quantum computers | CSO Online New research from …

: The CIA Secretly Ran a Star Wars Fan Site An amateur security researcher, Ciro Santilli, uncovered a …

: Dell security advisory (AV25-292) - Canadian Centre for Cyber Security

: IBM security advisory (AV25-293 - Canadian Centre for Cyber Security

: Ubuntu security advisory (AV25-294) - Canadian Centre for Cyber Security

: Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto Over 70 malicious npm and …

: Malicious npm Packages Target React, Vue, and Vite Ecosystems with Destructive Payloads …

: GhostSpy Web-Based Android RAT : Advanced Persistent RAT with Stealthy Remote Control and Uninstall …

: ViciousTrap – Infiltrate, Control, Lure: Turning edge devices into honeypots en masse. …

: Not-so-smart home www.kaspersky.com/blog/vuln… Our experts at GReAT have uncovered a …

: Tracking the Cost of Quantum Factoring security.googleblog.com/2025/05/t… In order to plan …

: Over 91% of companies sacrifice hybrid cloud security in the AI adoption rush | CSO Online The …

: Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique Hackers are …

: BadSuccessor Exploits Windows Server 2025 Flaw for Full AD Takeover The article describes a critical …

: Silent Ransom Group targeting law firms, the FBI warns The FBI warns that the Silent Ransom Group, …

: Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware Hackers are using fake …

: Initial Access Brokers Targeted in Operation Endgame 2.0 Law enforcement agencies worldwide took …

: Reconnaissance Campaign Active on NPM Repository A hacking campaign is spreading malicious …

: Operation RapTor led to the arrest of 270 dark web vendors and buyers Operation RapTor, an …

: Researchers cause GitLab AI developer assistant to turn safe code malicious …

: Cybercrime is ‘orders of magnitude’ larger than state-backed ops, says ex-White House …

: Scarcity signals: Are rare activities red flags? blog.talosintelligence.com/scarcity-… Cisco …

: 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers …

: Nova Scotia Power victim of ‘sophisticated ransomware attack' This report on the Nova Scotia Power …

: Massive data breach exposes 184 million passwords for Google, Microsoft, Facebook, and more | ZDNET …

: “Microsoft has simply given us no other option,” Signal says as it blocks Windows Recall …

: “Anti-Ledger” malware: The battle for Ledger Live seed phrases moonlock.com/anti-ledg… …

: UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware …

: Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Documents …

: China-Nexus Threat Actor Actively Exploiting Ivanti Endpoint Manager Mobile (CVE-2025-4428) …

: Russian hacker group Killnet returns with new identity therecord.media/russian-h… The Russian …

: Phishing campaign impersonates Booking.com, delivers a suite of credential-stealing malware A …

: Europe’s Entry/Exit System (EES) Guide Spain « Euro Weekly News The article describes the new EU …

: Windows Server Flaw a Shortcut to Privilege Escalation A newly identified, unpatched vulnerability …

: Credit Washing and Synthetic ID Fraud Hit All-Time High Synthetic identity and credit washing fraud …

: Dragos Industrial Ransomware Analysis: Q1 2025 www.dragos.com/blog/drag… Our recent blog …

: Brand impersonation, online ads, and malicious merchants help purchase scam network prey on victims …

: Dero miner zombies biting through Docker APIs to build a cryptojacking horde …

: BadSuccessor: Abusing dMSA to Escalate Privileges in Active Directory …

: Lumma infostealer’s infrastructure seized during US, EU, Microsoft operation …

: Asia Produces More APT Actors, as Focus Expands Globally www.darkreading.com/cyber-ris… …

: UK police looking at ‘range’ of potential perpetrators behind retail cyberattacks …

: EU sanctions target individuals, organizations behind Russia’s disinformation and sabotage …

: A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and …

: ‘Ongoing’ Ivanti hijack bug exploitation reaches clouds …

: Decommissioning assets www.ncsc.gov.uk/guidance/… This guidance describes why it’s important …

: Dutch government passes law to criminalize cyber-espionage therecord.media/netherlan… The …

: Windows 11’s most important new feature is post-quantum cryptography. Here’s why. …

: Threat Analysis: Malicious NPM Package Leveraged in O365 Phishing Attack …

: Duping Cloud Functions: An emerging serverless attack vector …

: The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website …

: 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads …

: Freshly discovered bug in OpenPGP.js undermines whole point of encrypted comms …

: Fake KeePass password manager leads to ESXi ransomware attack …

: Major Russian state services disrupted, reportedly due to cyberattack …

: Ransomware attack on food distributor spells more pain for UK supermarkets …

: Red Hat has officially released Red Hat Enterprise Linux 10, introducing major enhancements across …

: REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover …

: The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That …

: When LLMs get personal info they are more persuasive debaters than humans …

: SolarWinds security chief on the risks and rewards of being a CISO therecord.media/solarwind… …

: Hackers earn $1,078,750 for 28 zero-days at Pwn2Own Berlin …

: Arla Foods confirms cyberattack disrupts production, causes delays …

: How Walmart Plans to Scale AI, GenAI, AR, and Immersive Customer Experiences Walmart is gearing up …

: Netflix Reportedly Weaving GenAI Ads Into Programming Netflix is preparing to test interactive …

: A Tencent-backed startup has brought an AI doctor to the clinic Synyi AI, a Tencent-backed startup, …

: How Saudi Arabia is protecting users’ privacy and data from harmful AI The article describes how …

: Anthropic lawyers apologize to court over AI ‘hallucination’ in copyright battle with music …

: UK and European Union agree to post-Brexit reset deal – NBC Connecticut The UK and EU have agreed on …

: Research Tracked 1 Malicious Email Every 42 Seconds in 2024 | Security Magazine A new report reveals …

: Printer Company Procolored Served Infected Software for Months - SecurityWeek For half a year, …

: 23andMe Sale Shows Your Genetic Data Is Worth $17 On Monday, Regeneron acquired bankrupt 23andMe for …

: Telegram Gave Authorities Data on More than 20,000 Users Telegram provided user data to authorities …

: DDoSecrets Adds 410GB of TeleMessage Breach Data to Index DDoSecrets indexed 410GB of breached …

: Ethical hackers exploited zero-day vulnerabilities against popular OS, browsers, VMs and AI …

: Cybersecurity jobs available right now: May 20, 2025 - Help Net Security Several cybersecurity jobs …

: Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang The Cybersecurity Observatory of …

: Government Organizations Lose Nearly a Month in Downtime for Every Ransomware Attack | Tripwire …

: Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse A new Linux …

: Hackers Nab 15 Years of UK Legal Aid Applicant Data Hackers breached the UK Ministry of Justice’s …

: Proposed GDPR Revisions Stokes Privacy Concerns Over 100 privacy rights groups and experts urged the …

: Microsoft Layoffs Highlight AI-Driven Hiring Pauses - Bloomberg The rise of artificial intelligence …

: Attacker Specialization Puts Threat Modeling on Defensive The cybercriminal underground is …

: Dynamic DNS Emerges as Go-to Cyberattack Facilitator Dynamic DNS (DDNS) services, which …

: Australian Human Rights Commission Leaks Docs in Data Breach The Australian Human Rights Commission …

: Pwn2Own Berlin 2025 Day Two: researcher earned 150K hacking VMware ESXi On day two of Pwn2Own Berlin …

: Beware! A threat actor could steal the titles of your private (and draft) WordPress posts! | Imperva …

: Shields up US retailers. Scattered Spider threat actors can target them The cybercrime group …

: Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used …

: Former US Govt Employees Targeted by Chinese Intelligence Chinese intelligence is targeting recently …

: Agentic AI Tech Firm Says Health Data Leak Affects 483,000 Serviceaide, an AI-based IT management …

: LockBit Leaks Reveal Drive to Recruit Ransomware Newbies The LockBit ransomware group has introduced …

: This white paper offers a practical guide to getting better results from large language models like …

: 413,032 Americans Affected As Major Data Breach Leaks Customer Names, Social Security Numbers, …

: Pakistani cyber offensive hits Indian systems, BJP website Pakistan launched a cyber offensive …

: Threat Brief: CVE-2025-31324 The article describes a critical vulnerability in SAP NetWeaver that …

: Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection Google …

: AWS Pushes AI-Powered Threat Detection With Key Partners AWS is leveraging generative AI services …

: Cloudflare CEO warns AI and zero-click internet are killing the web’s business model | …

: Malware scammers target HR professionals with Venom Spider malware | SC Media Threat actors are …

: A Closer Look At PlugValley: Threat Actor Profile PlugValley, a threat actor group, offers …

: The Top Threat Actor Groups Targeting the Financial Sector | Flashpoint Between April 2024 and April …

: Mandiant links DragonForce ransomware attacks on UK retailers to UNC3944 tactics, highlighting links …

: Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware A new attack method, “Bring Your Own …

: Bank Data Breach Blamed on Insider As Social Security Numbers, Account Information and Addresses of …

: Ransomware: What the LockBit 3.0 data leak reveals | Computer Weekly A data leak from LockBit 3.0’s …

: American Income Life Insurance Data Breach Alert Issued By Wolf Haldenstein is investigating claims …

: Data breach confirmed by Insight Partners | SC Media Insight Partners confirmed a data breach …

: Chinese cyber menace exceeds threat from Russia, Dutch spy chief warns – POLITICO Dutch military …

: No cyber threat to India ATMs from Pakistan Ransomware Attack - Cybersecurity Insiders The Indian …

: How Security Has Changed the Hacker Marketplace The cost of exploiting software vulnerabilities has …

: 160,000 Impacted by Valsoft Data Breach - SecurityWeek Valsoft Corporation, a VMS firm, notified …

: Fake AI platforms deliver malware diguised as video content - Help Net Security A malware campaign …

: LLM Prompt Injection - What’s the Business Risk, and What to Do About It Prompt injection …

: Insider Risk Revisited: Espionage, Encryption & Economics Two recent incidents, the …

: Legacy Login in Microsoft Entra ID Exploited to Breach Cloud Accounts A recent campaign exploited a …

: Cybercriminal services target end-of-life routers, FBI warns The FBI warns that attackers are using …

: Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials A new campaign …

: No Fairy Tale Ending: PowerSchool’s Hacker Targets Customers PowerSchool, a widely used K-12 …

: TDSB says it got ransom demand over stolen student data not destroyed in cybersecurity incident The …

: Microsoft employees are banned from using DeepSeek app, president says | TechCrunch The article …

: ‘Tone deaf’: US tech company responsible for global IT outage to cut jobs and use AI | Software | …

: Education giant Pearson hit by cyberattack exposing customer data The article describes a …

: Millions of Canadians' health data available for sale to pharmaceutical industry, study shows | CBC …

: Countries Begin NATO’s Locked Shields Cyber-Defense Exercise …

: Using AI to stop tech support scams in Chrome security.googleblog.com/2025/05/u… ech support …

: Malicious PyPI Package Targets Discord Developers with Remote Access Trojan …

: Cyber criminals impersonate payroll, HR and benefits platforms to steal information and funds …

: Spam campaign targeting Brazil abuses Remote Monitoring and Management tools …

: Multilayered Email Attack: How a PDF Invoice and Geo-Fencing Led to RAT Malware …

: Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT …

: LockBit ransomware gang hacked, victim negotiations exposed …

: Seeing Clearly: Understanding and Addressing Bias in OSINT sosintel.co.uk/seeing-cl… …

: News News Briefs Cybercrime Get more insights with the Recorded Future Intelligence Cloud. Learn …

: Hacks of UK Retailers Are a ‘Wake-Up Call,’ Minister Says …

: Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks …

: Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation …

: State of ransomware in 2025 securelist.com/state-of-… With the International Anti-Ransomware …

: Inferno Drainer Reloaded: Deep Dive into the Return of the Most Sophisticated Crypto Drainer …

: Agenda Ransomware Group Adds SmokeLoader and NETXLOADER to Their Arsenal …

: SysOwned, Your Friendly Support Ticket - SysAid On-Premise Pre-Auth RCE Chain (CVE-2025-2775 And …

: Ransomware Attackers Leveraged Privilege Escalation Zero-day www.security.com/threat-in… …

: Israeli spyware giant NSO Group ordered to pay nearly $170M to WhatsApp for hacking accounts …

: COLDRIVER Using New Malware To Steal Documents From Western Targets and NGOs …

: Threat Actor Claims to Leak ‘1,000 Entries’ from Interpol - TechNadu A cybercriminal using the …

: Trump’s Deportation Airline Just Got Hacked by Anonymous The article describes how Anonymous hacked …

: 19 Billion Passwords Leaked in 2025 | Reused Credentials Threaten Global Cybersecurity A new …

: Linux wiper malware hidden in malicious Go modules on GitHub …

: Canary Exploit tool for CVE-2025-30065 Apache Parquet Avro Vulnerability …

: Lampion Is Back With ClickFix Lures unit42.paloaltonetworks.com/lampion-m… Unit 42 …

: Lampion Is Back With ClickFix Lures unit42.paloaltonetworks.com/lampion-m… Unit 42 …

: DragonForce Ransomware: Redefining Hybrid Extortion in 2025 blog.checkpoint.com/security/… …

: Here Comes Mirai: IoT Devices RSVP to Active Exploitation www.akamai.com/blog/secu… The …

: Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines …

: Android fixes 47 vulnerabilities, including one zero-day. Update as soon as you can! …

: Incidents impacting retailers – recommendations from the NCSC www.ncsc.gov.uk/blog-post… …

: Microsoft ends Authenticator password autofill, moves users to Edge …

: wget to Wipeout: Malicious Go Modules Fetch Destructive Payload socket.dev/blog/wget… …

: U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems …

: Ransomware Attacks Up 9% but Payments Are Down www.databreachtoday.com/ransomwar… The decline …

: Patients left in the dark months almost a year after criminals leaked sensitive medical data from …

: Ransomware group threatens Cobb County data leak - Axios Atlanta Russian-based ransomware group …

: Co-op confirms data theft after DragonForce ransomware claims attack …

: Exploring PLeak: An Algorithmic Method for System Prompt Leakage …

: Attackers Ramp Up Efforts Targeting Developer Secrets www.darkreading.com/threat-in… …

: White House Proposes $500 Million Cut to CISA www.databreachtoday.com/white-hou… President …

: Uncovering MintsLoader With Recorded Future Malware Intelligence Hunting …

: I StealC You: Tracking the Rapid Changes To StealC www.zscaler.com/blogs/sec… StealC is a …

: Pro-Russia hacktivists bombard Dutch public orgs with DDoS attacks …

: Backdoor found in popular ecommerce components sansec.io/research/… Multiple vendors were …

: US indicts Black Kingdom ransomware admin for Microsoft Exchange attacks …

: SonicBoom, From Stolen Tokens to Remote Shells - SonicWall SMA (CVE-2023-44221, CVE-2024-38475) …

: Wikipedia Says It Will Use AI to Empower Editors, Not Replace Them Wikipedia’s strategic vision for …

: Zelle outage, FedNow, Apple Card: Top banking news for July 2023 | Credit Union Journal | American …

: Microsoft ditches passwords by default for new accounts - Neowin Microsoft has made new Microsoft …

: Amazon Unveils Nova Premier AI - A Game Changer in Complex Reasoning | AI News Amazon is launching …

: External Payments Now Allowed by Apple App Store Following Court Injunction Apple updated its App …

: DeepSeek quietly updates open-source model that handles maths proofs | South China Morning Post …

: Part-Time Job Platform Albamon Reports Hacking Incident Involving Data Breach l KBS WORLD Albamon, a …

: Disney Hack: Man Pleads Guilty to Stealing Slack Files Data The article describes a case where a man …

: When threat actors behave like managed service providers www.darkreading.com/vulnerabi… …

: Ransomware debris: an analysis of the RansomHub operation www.group-ib.com/blog/rans… This …

: FortiGuard incident response team detects intrusion into Middle East critical national …

: Analyzing CVE-2025-31191: A macOS security-scoped bookmarks-based sandbox escape …

: TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks …

: Apple notifies victims in 100 countries of likely spyware targeting …

: Harrods the next UK retailer targeted in a cyberattack www.bleepingcomputer.com/news/secu… …

: Poland’s state registry temporarily blocked by cyber incident therecord.media/poland-pe… A …

: Ticket Resale Platform TicketToCash Left 200GB of User Data Exposed A misconfigured database …

: 4 Million SSNs May Have Been Leaked in Employee Benefits Company Breach. Are You One of Them? - CNET …

: Hacking in space: Not as tough as you might think www.darkreading.com/cloud-sec… Space assets …

: Age verification in the European Union: The commission’s age verification app …

: Windows RDP lets you log in using revoked passwords. Microsoft is OK with that. …

: Gremlin Stealer: New Stealer on Sale in Underground Forum …

: UK retailer Co-op shuts down some IT systems after hack attempt …

: Microsoft gets twitchy over talk of Europe’s tech independence …

: Google Play sees 47% decline in apps since start of last year techcrunch.com/2025/04/2… …

: Hive0117 group targets Russian firms with new variant of DarkWatchman malware The Hive0117 …

: SentinelOne Targeted by North Korean IT Workers, Ransomware Groups, Chinese Hackers - SecurityWeek …

: New Research Reveals: 95% of AppSec Fixes Don’t Reduce Risk According to OX Security’s 2025 …

: World Password Day: Should you be using fewer passwords? | Proton World Password Day, celebrated …

: Chinese APT’s Adversary-in-the-Middle Tool Dissected - SecurityWeek ESET analyzed Spellbinder, …

: City of Long Beach Says at Least 260,000 Affected by Hack The City of Long Beach, California, is …

: Data breach disclosed by UrbanOne following Cactus ransomware claims | SC Media Urban One, a U.S. …

: Commvault says recent breach didn’t impact customer backup data Commvault, a data protection …

: Hertz data breach exposed customers’ personal information, lawsuits claim Three class action …

: Somnia anesthesia firm gets $2.4M data breach wakeup call - Westfair Communications A $2.4 million …

: Ascension discloses new data breach after third-party hacking incident Ascension, a major US …

: Former Disney employee sentenced to three years for menu hacking www.theverge.com/news/6578… …

: Spotlight on RSAC: How to survive as a CISO aka ‘chief scapegoat officer’ …

: Spotlight on RSAC: The one interview question that will protect you from North Korean fake workers …

: Spotlight on RSAC: China is using AI to sharpen every link in its attack chain, FBI warns …

: Spotlight on RSAC: China now America’s number one cyber threat – US must get up to speed …

: WhatsApp says in-app AI tools will still keep messages secret therecord.media/whatsapp-… …

: AI-generated code could be a disaster for the software supply chain. Here’s why. …

: Amazon launches its first internet satellites to compete against SpaceX’s Starlinks …

: Hackers ramp up scans for leaked Git tokens and secrets www.bleepingcomputer.com/news/secu… …

: Hello 0-days, my old friend: A 2024 zero-day exploitation analysis …

: France blames Russian military intelligence for years of cyberattacks on local entities …

: VMware security advisory (AV25-242) - Canadian Centre for Cyber Security VMware released security …

: “Shadow Role” Vulnerability In AWS Services Could Lead To Full Account Takeover A critical …

: Indian Court Orders Action to Block Proton Mail Over AI Deepfake Abuse Allegations A high court in …

: 91% of organizations face vulnerability remediation delays | Security Magazine A new report from …

: NT Analyzer can help determine “data broker” status under the new Bulk Data Transfer requirements | …

: Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure Code Meta …

: AirPlay Vulnerabilities Expose Apple Devices to Zero-Click Takeover - SecurityWeek Vulnerabilities …

: France Blames Russia for Cyberattacks on Dozen Entities - SecurityWeek France’s cybersecurity …

: RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control RansomHub, a …

: Meta Releases Llama AI Open Source Protection Tools - SecurityWeek Meta released new open source …

: China Hackers Used Trojanized UyghurEditPP App to Target Uyghur Activists China-linked hackers …

: Adapting to AI: The Future of Security and Workforce Niloofar Razi, operating partner at Capitol …

: SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients SentinelOne …

: 31k Aussies have had their banking details compromised | news.com.au — Australia’s leading news site …

: How to Use Generative AI to Optimize Your CV for Cybersecurity, Privacy, and IT Jobs TL;DR: A CV has only seconds to make an impression, and many are filtered out by Applicant Tracking …

: Employee Benefits Firm Says 4 Million Affected by 2024 Hack Verisource Services, an employee …

: Threat Actors Hacking SAP Critical Flaw - GovInfoSecurity Threat actors are exploiting a zero-day …

: Researchers Secretly Ran a Massive, Unauthorized AI Persuasion Experiment on Reddit Users …

: JokerOTP Dismantled After 28,000 Phishing Attacks, 2 Arrested A major international law enforcement …

: Active exploitation of SAP NetWeaver Visual Composer CVE-2025-31324 | Rapid7 Blog SAP has disclosed …

: 4 Million Affected by VeriSource Data Breach - SecurityWeek VeriSource Services, a Houston-based …

: In the age of AI, we must protect human creativity as a natural resource …

: Brave’s Cookiecrumbler tool taps community to help block cookie notices …

: How to spot fake online reviews and protect yourself from scams …

: AI is getting “creepy good” at geo-guessing www.malwarebytes.com/blog/news… Artificial …

: DragonForce expands ransomware model with white-label branding scheme …

: Hackers access sensitive SIM card data at South Korea’s largest telecoms company …

: WooCommerce admins targeted by fake security patches that hijack sites …

: FSS investigates hacking incidents at two Korean GAs amid potential data breach - CHOSUNBIZ The …

: MoD investigates major security breach involving special forces IDs online | UK | News | …

: 88,848 Americans Exposed As Massive Medical Data Breach Leaks Names, Addresses, Social Security …

: Transforming cyber strategies to shape the enterprise of the future - SDxCentral Enterprises must …

: An Entire Company Was Staffed With AI Agents and You’ll Never Guess What Happened Researchers …

: Oregon DEQ won’t say if ransomware group took employee data in cyberattack – DataBreaches.Net The …

: Interlock Ransomware Say It Stole 20TB of DaVita Healthcare Data The article describes a cyberattack …

: Human error causes alarming rise in cybersecurity breaches in SA Human error is the leading cause of …

: Blue Shield Leaked Millions of Patient Info to Google for Years Blue Shield of California exposed …

: Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords A hacker collective, R00TK1T, …

: ‘Data leak fatigue’ may cause decreased awareness of data breaches Frequent data …

: European manufacturing data breaches up 90% - report - The Manufacturer European manufacturers …

: AI impact on data breach outcomes remains ‘limited’: Verizon | Cybersecurity Dive Despite the …

: Microsoft Purges Millions of Cloud Tenants After Storm-0558 Microsoft is enhancing Entra ID and MSA …

: DeepSeek Breach Opens Floodgates to Dark Web The DeepSeek security breach exposed sensitive user …

: All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack - …

: A new version of Triada spreads embedded in the firmware of Android devices | Securelist The Triada …

: New Critical SAP NetWeaver Flaw Exploited to Drop Web Shell, Brute Ratel Framework Threat actors are …

: South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days - SecurityWeek At …

: Phishing Kit Darcula Gets Lethal AI Upgrade The Darcula phishing-as-a-service platform, which powers …

: Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy - …

: Vehicles Face 45% More Attacks, 4 Times More Hackers Security incidents in the automotive and …

: The Good, the Bad and the Ugly in Cybersecurity - Week 17 AI is helping security teams detect and …

: Hacks Targeting Cloud single Sign-On Rose in 2024 Hacks targeting cloud infrastructure rose …

: North Korean Hackers Use Russian IP Infrastructure North Korean hackers, specifically those …

: Yale New Haven Health Notifying 5.5 Million of March Hack Yale New Haven Health System is notifying …

: 55% of threat groups active in 2024 were financially motivated | Security Magazine Mandiant’s latest …

: Zoom attack tricks victims into allowing remote access to install malware and steal money | …

: FBI confirms $16.6 billion losses to cyber-crime in 2024 - Cybersecurity Insiders The FBI’s 2024 …

: Kelly Benefits Notifying Nearly 264,000 of Data Theft Hack A data breach at Maryland-based Kelly …

: 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure In Q1 2025, 159 CVEs were …

: Third-party data breaches rise almost 50 percent | Prevalent A new study from Prevalent shows a 49% …

: California Is About To Run Out of License Plate Numbers - Slashdot California is projected to run …

: WhatsApp launches privacy tool to stop users taking content off the platform | The Standard WhatsApp …

: Notice of Data Breach | Blue Shield of California | News Center The article describes a data breach …

: Files Deleted From GitHub Repos Leak Valuable Secrets - SecurityWeek A security researcher found …

: UK utility cyberattacks rose 586% from 2022 to 2023 | Security Magazine Cyberattacks on UK utility …

: Australian Businesses Gear Up for Ransom Reporting Deadline Australian organizations with annual …

: Senior CISA Advisers Announce Exits Amid Federal Downsizing Several senior advisers at the …

: Russian, Chinese Hackers Targeted Dutch Government Dutch intelligence agency reported Russian and …

: SK Telecom reports hacking incident involving partial leak of user USIM data - The Korea Times SK …

: Japan warns of hundreds of millions of dollars in unauthorized trades from hacked accounts | The …

: Microsoft Entra ID Lockouts After MACE App Flags Legit Users Microsoft Entra ID accounts were locked …

: SSL.com Scrambles to Patch Certificate Issuance Vulnerability - SecurityWeek A domain control …

: Russian Host Proton66 Tied to SuperBlack and WeaXor Ransomware Cybersecurity experts at Trustwave’s …

: Reborn: Cybercrime Marketplace Cracked Appears to Be Back The notorious online cybercrime …

: What’s in Store for the CVE Program Post-Mitre Management? The Common Vulnerabilities and …

: Urgent warning to all 1.8b Gmail users over ‘sophisticated’ attack stealing personal …

: Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems …

: Whistleblower Complaint Exposes DOGE Cybersecurity Failures …

: Could Ransomware Survive Without Cryptocurrency? www.darkreading.com/cyber-ris… Ransomware …

: Chinese APT Mustang Panda Debuts 4 New Attack Tools www.darkreading.com/cloud-sec… One of …

: Interlock ransomware gang pushes fake IT tools in ClickFix attacks …

: Widespread Microsoft Entra lockouts tied to new security feature rollout …

: Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader …

: Baltimore City State’s Attorney’s Office hacked; Data leaked – DataBreaches.Net The Baltimore City …

: Thousands of UK users of Vinted, Candy Crush and Tinder were hit in global hack At least 50,000 UK …

: Canada Warns Cyber Defenders to Buttress Edge Devices The Canadian Center for Cybersecurity warns of …

: CrazyHunter Campaign Targets Taiwanese Critical Sectors www.trendmicro.com/en_us/res… …

: Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1 www.zscaler.com/blogs/sec… The …

: Max Severity Bug in Apache Roller Enabled Persistent Access www.darkreading.com/vulnerabi… …

: Task Scheduler– New Vulnerabilities for schtasks.exe cymulate.com/blog/task… The schtasks.exe …

: CVE-2025-24054, NTLM Exploit in the Wild research.checkpoint.com/2025/cve-… CVE-2025-24054 is …

: CISA extends CVE program contract with MITRE for 11 months amid alarm over potential lapse …

: Funding Expires for Key Cyber Vulnerability Database krebsonsecurity.com/2025/04/f… A …

: Zoom Video Conferencing App down by DDoS Attack - Cybersecurity Insiders Zoom experienced a brief …

: Chinese Threat Group UNC5174 Caught Using New Tools In Ongoing Cyber Campaign Chinese …

: New version of MysterySnail RAT and lightweight MysteryMonoSnail backdoor | Securelist Kaspersky …

: Chinese APT Mustang Panda Updates, Expands Arsenal - SecurityWeek The Chinese state-sponsored …

: Back-Office Servicer Says Dual Hacks in 2024 Hit 1.6 Million Landmark Admin, a third-party vendor …

: UK Fines Law Firm 60,000 Pounds for Ransomware Data Breach The UK Information Commissioner’s Office …

: Cybersecurity Alarms Sound Over Loss of CVE Program Funding The Common Vulnerabilities and Exposures …

: Krebs Organizational Announcement | Chris Krebs | 42 comments Chris Krebs announced his departure …

: CRA accounts hacked after 28,000 social insurance numbers stolen in data breach | Radio-Canada.ca A …

: Chinese Android phones shipped with malware-laced WhatsApp, Telegram apps Cheap Chinese Android …

: Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild - SecurityWeek The BPFDoor …

: Microsoft Joins Google and Yahoo in Strengthening Email Sender Requirements - Cybersecurity Insiders …

: SquareX to Uncover Data Splicing Attacks at BSides San Francisco, A Major DLP Flaw that Compromises …

: Chinese Hackers Deploy Stealthy Fileless VShell RAT A Chinese state-backed hacking group, UNC5174, …

: 94% of firms say pentesting is essential, but few are doing it right - Help Net Security The article …

: Hertz Discloses Data Breach Linked to Cleo Hack - SecurityWeek Hertz Corporation is notifying …

: Hertz Discloses Data Breach Linked to Cleo Hack - SecurityWeek Hertz Corporation is notifying …

: Critical flaws fixed in Nagios Log Server - Help Net Security Three critical vulnerabilities …

: China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games - SecurityWeek China …

: New Malware Variant Identified: ResolverRAT Enters the Maze www.morphisec.com/blog/new-… …

: Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT …

: BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets …

: Medusa ransomware gang claims to have hacked NASCAR www.bitdefender.com/en-us/blo… The Medusa …

: FakeUpdates still the most common malware in Finland and the world, Lumma Stealer thousands of …

: The Most Dangerous Hackers You’ve Never Heard Of www.wired.com/story/mos… Ransomware gangs, …

: Hacktivism resurges – but don’t be fooled, it’s often state-backed goons in masks …

: 4Chan down UPDATES: Thousands of users report issues accessing controversial website | The US Sun …

: An Official Statement in Response to the April 9, 2025 Executive Order SentinelOne, a cybersecurity …

: Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware …

: Vulnerability Summary for the Week of April 7, 2025 | CISA The CISA Vulnerability Bulletin …

: AI Hallucinations Create a New Software Supply Chain Threat - SecurityWeek Researchers from three US …

: Malicious NPM packages target PayPal users Malicious NPM packages, uploaded in early March, target …

: Ubuntu security advisory (AV25-206) - Canadian Centre for Cyber Security Ubuntu published security …

: DaVita hit by ransomware attack - Cybersecurity Insiders DaVita, a major kidney dialysis company, …

: ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading A new remote …

: Dell security advisory (AV25-208) - Canadian Centre for Cyber Security Dell published security …

: Attackers Maintaining Access to Fully Patched Fortinet Gear Attackers are using a technique to …

: Psychiatric documents with sensitive patient info found ‘loosely blown about’ near Regina medical …

: Top US lab testing firm hit with major data leak, exposes health info on 1.6 million users | …

: SK.com allegedly hacked by Qilin – DataBreaches.Net Qilin claims to have hacked SK.com and …

: Elon Musk $100 Million Private Jet Fleet Preferences Leaked - Aviation A2Z A cyberattack on NetJets …

: Trump exempts phones, computers, chips from new tariffs Smartphones, computers, and other electronic …

: Pentagon to terminate $5.1 billion in IT contracts with Accenture, Deloitte, others | Reuters The …

: www.techtimes.com/articles/… Pentagon Advisory on Signal Messenger Vulnerability The Pentagon …

: cyble.com/blog/germ… Signal Messenger Targeted in Cyber Espionage Campaign Russia-aligned …

: Court document reveals locations of WhatsApp victims targeted by NSO spyware …

: Germany links cyberattack on research group to Russian state-backed hackers …

: Police detains Smokeloader malware customers, seizes servers …

: The US Treasury’s OCC disclosed an undetected major email breach for over a year …

: Leak exposes Black Basta’s influence tactics arstechnica.com/security/… A leak of 190,000 …

: Oracle says “obsolete servers” hacked, denies cloud breach …

: New Mirai botnet behind surge in TVT DVR exploitation www.bleepingcomputer.com/news/secu… A …

: HellCat Ransomware Hits 4 Firms using Infostealer-Stolen Jira Credentials …

: Threat Actors Setting Up Persistent Access to Hosts Hacked in CrushFTP Attacks …

: Neptune RAT Variant Spreads via YouTube to Steal Windows Passwords hackread.com/neptune-r… A …

: That massive GitHub supply chain attack? It all started with a stolen SpotBugs token …

: 2 Android Zero-Day Bugs Under Active Exploit Google patched two actively exploited zero-day …

: VMware security advisory (AV25-196) - Canadian Centre for Cyber Security

: Fortinet security advisory (AV25-197) - Canadian Centre for Cyber Security

: Ivanti security advisory (AV25-198) - Canadian Centre for Cyber Security

: Adobe security advisory (AV25–199) - Canadian Centre for Cyber Security Adobe published security …

: Microsoft security advisory - April 2025 monthly rollup (AV25-201) - Canadian Centre for Cyber …

: Medusa Ransomware Claims NASCAR Breach in Latest Attack The Medusa ransomware gang claims to have …

: Microsoft Drops Another Massive Patch Update Microsoft released a Patch Tuesday update addressing …

: OCC email system breach described as ‘stunning, serious’ | CSO Online The US Office of the …

: Russian APT Hacker Observed Deploying Unusual RDP Tactics A Russian nation-state threat actor, …

: Alleged Scattered Spider SIM-swapper must pay back $13.2M to 59 victims …

: Everest ransomware’s dark web leak site defaced, now offline …

: Russia arrests CEO of tech company linked to Doppelgänger disinformation campaign …

: NIST calls time on older vulnerabilities amid surging disclosures …

: Windows Remote Desktop Protocol: Remote to Rogue cloud.google.com/blog/topi… In October 2024, …

: News alert: SpyCloud study shows gaps in EDR, antivirus — 66% of malware infections missed - The …

: Kellogg discloses data breach​ | Cybernews WK Kellogg suffered a data breach impacting an unknown …

: Someone hacked ransomware gang Everest’s leak site | TechCrunch The Everest ransomware gang’s leak …

: Adaptive Security: Inside OpenAI’s First Cyber Investment | Cyber Magazine OpenAI’s Startup …

: Europcar GitLab breach exposes data of up to 200,000 customers The article describes a data breach …

: Unmasking EncryptHub: Help from ChatGPT & OPSEC blunders outpost24.com/blog/unma… This is …

: Lazarus Expands Malicious npm Campaign: 11 New Packages Add Malware Loaders and Bitbucket Payloads …

: Carding tool abusing WooCommerce API downloaded 34K times on PyPI …

: OpenAI CEO Forced to Delay GPT-5 Launch: “It’s Harder Than We Thought” OpenAI CEO Sam …

: Call Records of Millions Exposed by Verizon App Vulnerability - SecurityWeek A Verizon call …

: OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting Servers A novice …

: CERT-UA reports of attacks in March 2025 targeting Ukrainian agencies with WRECKSTEEL Malware …

: CERT-UA reports of attacks in March 2025 targeting Ukrainian agencies with WRECKSTEEL Malware …

: Sonatype warns of 18,000 open source malware packages | InfoWorld Sonatype’s Open Source Malware …

: Hackers Leverage Microsoft Teams Message to Drop Malicious Payload Hackers are using Microsoft Teams …

: Thousands of Android Phones Found With Preinstalled Malware That Steals Data Right Away | …

: Hacker Claims Twilio’s SendGrid Data Breach, Selling 848,000 Records The article describes a …

: $500,000 stolen in Australian super fund data breach | Superannuation | The Guardian The article …

: What’s new in the 2021 Cost of a Data Breach Report - Security Intelligence | IBM The 2021 Cost of a …

: Bayhealth Medical Center Investigated by Federman & Sherwood for Data Breach

: Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack - SecurityWeek A compromised …

: OH-MY-DC: OIDC Misconfigurations in CI/CD Unit 42 researchers discovered OIDC misconfigurations in …

: Critical Apache Parquet Vulnerability Leads to Remote Code Execution - SecurityWeek A critical …

: Have We Reached a Distroless Tipping Point? The evolution of containerization, from LXC to Docker …

: EU Pushes for Backdoors in End-to-End Encryption The European Commission is pushing for law …

: Fake Passport Generated by ChatGPT Bypasses Security - Tech News Article claims: A fake passport …

: Texas State Bar warns of data breach after INC ransomware claims attack …

: Hackers hit Ukrainian state agencies, critical infrastructure with new ‘Wrecksteel’ malware …

: Israel Enters ‘Stage 3’ of Cyber Wars With Iran Proxies …

: Threat actors leverage tax season to deploy tax-themed phishing campaigns …

: US, Australia, Canada warn of ‘fast flux’ scheme used by ransomware gangs …

: HellCat Ransomware: What You Need To Know www.tripwire.com/state-of-… What is HellCat? …

: Ivanti patches Connect Secure zero-day exploited since mid-March …

: Millions of free VPN users have inadvertently sent their data to China | TechRadar The article …

: Hunters International Ransomware Gang Rebranding, Shifting Focus - SecurityWeek The notorious …

: Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439) - …

: HellCat Ransomware: What You Need To Know | Tripwire HellCat is a ransomware-as-a-service group that …

: EvilCorp join with RansomHub to launch global cyber attacks - Cybersecurity Insiders EvilCorp, a …

: Hackers Exploit Stripe API for Web Skimming Card Theft on Online Stores Hackers are using a …

: Localhost dangers: CORS and DNS rebinding - The GitHub Blog Cross-Origin Resource Sharing (CORS) …

: Ivanti security advisory (AV25-184) - Canadian Centre for Cyber Security Ivanti published a security …

: Chinese APT Pounces on Misdiagnosed RCE in Ivanti VPN Appliances - SecurityWeek Ivanti recently …

: New advanced FIN7’s Anubis backdoor allows to gain full system control on Windows Russian …

: 79 Arrested as Dark Web’s Largest Child Abuse Network ‘Kidflix’ Busted In a sweeping global …

: Andy Yen gegen Revisionsplan des Bundesrats: «Mit dieser aggressiven Überwachung müsste Proton die …

: China’s FamousSparrow APT Hits Americas with SparrowDoor Malware A recent ESET investigation reveals …

: Google Calendar leading to Phishing Scams and Data Thefts - Cybersecurity Insiders Cybercriminals …

: T-Mobile Shows Users the Names, Pictures, and Exact Locations of Random Children On Tuesday, …

: Cisco security advisory (AV25-182) - Canadian Centre for Cyber Security

: Jenkins security advisory (AV25-183) - Canadian Centre for Cyber Security

: China Regulator Proposes Amendments to Cybersecurity Law – DataBreaches.Net The Cyberspace …

: UK sets out new cyber reporting requirements for critical infrastructure …

: XSS To RCE By Abusing Custom File Handlers - Kentico Xperience CMS (CVE-2025-2748) …

: As CISA Downsizes, Where Can Enterprises Get Support? www.darkreading.com/cybersecu… The US …

: As CISA Downsizes, Where Can Enterprises Get Support? www.darkreading.com/cybersecu… The US …

: Japan Bolsters Cybersecurity Safeguards With Cyber Defense Bill …

: Campaign thehackernews.com/2025/04/n… Cybersecurity researchers are warning of a spike in …

: Critical auth bypass bug in CrushFTP now exploited in attacks …

: Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon …

: Cyber Security and Resilience Policy Statement to strengthen regulation of critical sectors …

: Google Chrome security advisory (AV25-179) - Canadian Centre for Cyber Security

: VMware security advisory (AV25-180) - Canadian Centre for Cyber Security

: Malaysian Airport’s Ransomware Attack a Warning for Asia A ransomware attack on Kuala Lumpur …

: New Lazarus Group Scam Targets Crypto Jobseekers The Lazarus Group, notorious for its $1.5 billion …

: Data Leak of Twitter X and Royal Mail available on Dark Web - Cybersecurity Insiders Royal Mail has …

: The Ripple Effects Of Maryland’s 3% Service Tax On IT Services Maryland’s new 3% tax on IT …

: New Study Ranks Platforms By Password Reset Frequency - Cybersecurity Insiders A recent study by …

: Apple backported fixes for three actively exploited flaws to older devices Apple has released …

: Oracle Health warnt vor Datenleck | CSO Online Oracle Health has disclosed a data breach involving …

: It takes two: The 2025 Sophos Active Adversary Report – Sophos News The fifth anniversary edition of …

: Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users - SecurityWeek Google has …

: UK Government Previews Cybersecurity Legislation The British government has unveiled plans for a new …

: Canon Printer Flaw Enables Remote Code Execution Researchers have uncovered a high-severity …

: Vitenas Cosmetic Surgery patient data hacked and leaked – DataBreaches.Net A recent cyberattack on …

: Exclusive: Royal Mail suffers alleged data breach as threat actor claims 144GB stolen - Cyber Daily …

: 270,000 Samsung Customer Support Tickets Leak onto the Internet. Here’s What Happened. - CX …

: A major data leak in Sweden has exposed private information about Prince Carl Philip. …

: The Pirkanmaa Welfare Region in Finland has reported a data breach in its password change service. …

: Oracle Cloud Users Urged to Take Action www.darkreading.com/applicati… With Oracle not …

: Check Point confirms breach, but says it was ‘old’ data and crook made …

: Analyzing New HijackLoader Evasion Tactics www.zscaler.com/blogs/sec… HijackLoader (also …

: Phishing platform ‘Lucid’ behind wave of iOS, Android SMS attacks …

: The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques …

: Analyzing open-source bootloaders: Finding vulnerabilities faster with AI …

: Smoked out - Emmenhtal spreads SmokeLoader malware www.gdatasoftware.com/blog/2025… We …

: Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp Russian …

: Trend Micro Open Sources AI Tool Cybertron Trend Micro is open sourcing its Trend Cybertron …

: Samsung Tickets Data Leak: Infostealers Strike Again in Massive Free Dump | InfoStealers A data …

: Oracle Cloud Data Breach: Six Million Records Stolen, 140,000 Clients Potentially Impacted - CPO …

: Oracle (ORCL) Warns Health Customers of Patient Data Breach - Bloomberg Hackers breached Oracle’s …

: RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features The U.S. Cybersecurity and …

: youtube.com/watch A recent report by the University of Toronto’s Citizen Lab suggests that Ontario …

: ‘Evilginx’ Tool (Still) Bypasses MFA Evilginx, a malicious version of the NGINX Web …

: Ubuntu namespace vulnerability should be addressed quickly: Expert | Network World Three …

: BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability Threat hunters …

: SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk SquareX warns of the …

: Experts warn of the new sophisticate Crocodilus mobile banking Trojan A new Android trojan called …

: UK Software Firm Fined £3 Million Over Ransomware-Caused Data Breach - SecurityWeek The UK …

: Hellenic Open University Hit By Cyberattack, 813 GB Of Personal Data Leaked On Dark Web The Hellenic …

: Twitter (X) Hit by Data Leak of 2.8 Billion Users; Allegedly an Insider Job A data leak of 2.87 …

: Secure encryption and online anonymity are now at risk in Switzerland – here’s what you need …

: Darkweb actors claim to have over 100K of Gemini, Binance user info Darkweb threat actors claim to …

: Russia arrests three for allegedly creating Mamont malware, tied to over 300 cybercrimes …

: Dozens of solar inverter flaws could be exploited to attack power grids …

: New Atlantis AIO platform automates credential stuffing on 140 services …

: Ukraine’s state railway restores online ticket sales after major cyberattack …

: European officials increasingly certain Baltic Sea cable breaks are accidental, not sabotage …

: Oracle customers confirm data stolen in alleged cloud breach is valid A threat actor claimed to have …

: UK’s first permanent facial recognition cameras installed • The Register The Metropolitan …

: Top Trump officials have private data and passwords leaked in stunning security breach following war …

: Identity of hacker behind NSW court website data breach unknown, police say - ABC News A data breach …

: StreamElements discloses third-party data breach after hacker leaks data StreamElements, a …

: Malaysian PM says “no way” to $10 million ransom after alleged cyber attack against …

: Arkana Security group claims the hack of US telco provider WideOpenWest (WOW!) Arkana Security, a …

: 150,000 Sites Compromised by JavaScript Injection Promoting Chinese Gambling Platforms A campaign …

: New Cybercrime Tool ‘Atlantis AIO’ Amps Up Credential Stuffing Attacks A new cybercrime …

: The Cost Of Delay: Privacy Risks From Post-Quantum Cryptography Inaction The rapid advancement of …

: CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices CISA added two …

: Surge In Gen AI-based Threats Stimulates 140% Increase In Browser-based Phishing Attacks The Menlo …

: ETSI releases security standard for the quantum future - Help Net Security ETSI released a …

: RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment - The Cyber Post The …

: Internet Archive (Archive.org) Goes Down Following “Power Outage” Internet Archive, home …

: Security expert Troy Hunt hit by phishing attack | Malwarebytes Internet security expert Troy Hunt …

: New ReaderUpdate malware variants target macOS users SentinelOne researchers warn of new …

: Project Zero: Blasting Past Webp A zero-click iOS exploit, dubbed “BLASTPASS,” was discovered in the …

: VMware sues Siemens for allegedly using unlicensed software www.theregister.com/2025/03/2… …

: Security Tech That Can Make a Difference During an Attack www.darkreading.com/cybersecu… When …

: Security Tech That Can Make a Difference During an Attack www.darkreading.com/cybersecu… When …

: UK warns of emerging threat from ‘sadistic’ online ‘Com networks’ of teenage boys …

: Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain …

: New Windows zero-day leaks NTLM hashes, gets unofficial patch …

: CrushFTP warns users to patch unauthenticated access flaw immediately …

: Are cellphones really putting our health at risk? I dug deep into the latest science, expert …

: Europe is looking for alternatives to US cloud providers arstechnica.com/informati… The …

: US Weakens Disinformation Defenses, as Russia & China Ramp Up …

: Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation …

: As nation-state hacking becomes ‘more in your face,’ are supply chains secure? …

: DrayTek routers worldwide go into reboot loops over weekend …

: IngressNightmare: 9.8 Critical Unauthenticated Remote Code Execution Vulnerabilities in Ingress …

: Cloudflare incident on March 21, 2025 On March 21, 2025, a Cloudflare incident occurred due to human …

: Microsoft Gives Security Copilot Some Autonomy Microsoft is enhancing its Security Copilot with …

: China bans facial recognition in hotels, bathrooms • The Register China has banned the use of facial …

: New Tenable Report Finds DeepSeek Can Be Jailbroken to Create Malware - CPO Magazine A new Tenable …

: Microsoft Trusted Signing service abused to code-sign malware Cybercriminals are abusing Microsoft’s …

: New Report Looks at Cyber Risks and Incident Response - ACTFORE’s sponsored IDC Spotlight report …

: Cyber Wars are the New Battleground of Global Diplomacy - Modern Diplomacy Cyber warfare, …

: Cyber group says it disrupted Iranian shipping communications | Iran International A hacker group, …

: Digital resilience and cyber security reporting requirements in the UK and EU Recent and incoming …

: Resilience: Third-Party Risk Involved in 31% of Cyber Claims Third-party cyber risk, including …

: The importance of cyber security compliance – an overview of the EU regulatory framework The EU has …

: Industry leaders urge insurance sector to tackle escalating cyber threats | ITIJ Industry leaders …

: Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility Two critical …

: Nearly 2M hit by SpyX data breach | SC Media Nearly two million individuals, including 17,000 Apple …

: Data breach at Western Alliance Bank affects 22,000 people | American Banker Western Alliance Bank …

: Is the Middle East’s Race to Digitize a Threat? The Middle East’s rapid digitization, driven …

: California AG Reminds 23andMe Customers of Data Deletion Rights - Infosecurity Magazine California …

: Auto Insurer Fined for Data Breach That Impacted 45K New Yorkers Auto insurer Root was fined …

: What happens to your data if 23andMe collapses? — Harvard Gazette The uncertain future of 23andMe, a …

: 23andMe files for bankruptcy in US after data breach, big losses | The Independent Genetic testing …

: Lafayette Federal Credit Union Data Breach Alert Wolf Haldenstein Adler Freeman & Herz LLP is …

: Albabat Ransomware Expands Targets, Abuses GitHub - SecurityWeek New versions of the Albabat …

: Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks A critical …

: Cross-Border Data Compliance: Navigating Public Security Regulations in a Connected World | Tripwire …

: Top 10 Scam Techniques: What You Need to Know | Tripwire Scammers use various techniques to …

: Cloak ransomware group hacked the Virginia Attorney General’s Office The Cloak ransomware group …

: Finders Keypers: Open-source AWS KMS key usage finder - Help Net Security Finders Keypers is an …

: Cloud providers aren’t delivering on security promises - Help Net Security Cloud providers are …

: ABYSSWORKER: A New EDR-Killer In Medusa Ransomware Attacks A new ransomware campaign, Medusa, is …

: The Looming Quantum Threat: NCSC Urges Encryption Upgrades The National Cyber Security Centre (NCSC) …

: CBC News has uncovered a sophisticated human smuggling network capable of producing highly …

: What Google Chrome knows about you, with Carey Parker (Lock and Code S06E06) | Malwarebytes Google …

: UAT-5918 ATP group targets critical Taiwan Cisco Talos discovered UAT-5918, an info-stealing threat …

: Chinese Hackers Exploit Unpatched Servers in Taiwan Chinese hackers, tracked as UAT-5918, are …

: Fake Out: Babuk2 Ransomware Group Claims Bogus Victims A new ransomware group, Babuk2, is attempting …

: Hacker Pulls Off $8.4M Theft from Zoth Protocol After Admin Access… Zoth protocol, a restaking …

: Oracle Cloud Hit by Massive Cyberattack, CloudSEK Warns of Supply Chain Crisis In a potentially …

: No need to hack when it’s leaking: OrthoMinds edition – DataBreaches.Net A security researcher …

: Over 3 million applicants’ data leaked on NYU’s website - Washington Square News A hacker took over …

: Oracle denies breach after hacker claims theft of 6 million data records Oracle denies a breach …

: New Eleven11bot DDoS Botnet Compromises Over 86,000 IoT Devices Globally A new DDoS botnet, …

: Polymarket: Where Insight Meets Incentive I do not place bets, but I have become fascinated by Polymarket A platform where people do not just …

: Violent ChatGPT Hallucination Sparks GDPR Complaint A Norwegian man, Arve Hjalmar Holmen, filed a …

: 11 hottest IT security certs for higher pay today | CSO Online Cybersecurity certifications can …

: Developers: apply these 10 mitigations first to prevent supply chain attacks | InfoWorld A new …

: Pennsylvania State Education Association data breach impacts 500,000 individuals The Pennsylvania …

: Signal threatens to leave France if encryption backdoor required – Computerworld Signal is …

: Atlassian security advisory (AV25-152) - Canadian Centre for Cyber Security Atlassian published a …

: Israeli Spyware Graphite Targeted WhatsApp with 0-Click Exploit Citizen Lab researchers uncovered …

: How to Build and Maintain an Effective AWS Security Posture Aidan Steele, a security engineer at …

: New LLM jailbreak technique can create password-stealing malware | Security Magazine A new LLM …

: Rooted Androids 3,000x More Likely to Be Breached, Even iPhones Not Safe Rooted Android and …

: HP Brings Quantum-Safe Encryption to Printers HP is introducing quantum-safe encryption to its …

: Brand impersonation is 51% of browser phishing attempts | Security Magazine Browser-based phishing …

: Dark Web Profile: FSociety (Flocker) Ransomware - SOCRadar® Cyber Intelligence Inc. FSociety, or …

: New Windows zero-day feared abused in widespread espionage for years | CSO Online A zero-day …

: New KnowBe4 Report Reveals a Spike in Phishing Campaigns - IT Security Guru KnowBe4’s Phishing …

: List of Countries which are most vulnerable to Cyber Attacks - Cybersecurity Insiders Cybersecurity …

: Euro semi firms push for ‘Chips Act 2.0’ to expand beyond manufacturing …

: Are We Closing the Gender Gap in Cybersecurity? www.darkreading.com/cybersecu… After more …

: BlackLock Ransomware: What You Need To Know www.tripwire.com/state-of-… BlackLock is a …

: Unboxing Anubis: Exploring the Stealthy Tactics of FIN7’s Latest Backdoor …

: HellCat hackers go on a worldwide Jira hacking spree www.bleepingcomputer.com/news/secu… …

: RansomHub ransomware uses new Betruger ‘multi-function’ backdoor …

: 🔹 Incident 1: NightSpire Ransomware Attack on Tohpe Corporation 📅 Date/Time (EST): March 20, 2025, …

: CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages CERT-UA …

: Chinese military-linked companies dominate US digital supply chain - Help Net Security Chinese …

: 70% of leaked secrets remain active two years later - Help Net Security The 2025 State of Secrets …

: India Is Top Global Target for Hacktivists, Regional APTs India has become the top global target for …

: Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armenia - The …

: WhatsApp fixed zero-day used to deploy Paragon Graphite spyware WhatsApp addressed a zero-day …

: Google Chrome security advisory (AV25-151) - Canadian Centre for Cyber Security Google published a …

: 11 Nation-State Hackers Exploit Unpatched Windows Flaw Since 2017 A Windows zero-day vulnerability, …

: Veeam security advisory (AV25-150) - Canadian Centre for Cyber Security Veeam published a security …

: Jenkins security advisory (AV25-149) - Canadian Centre for Cyber Security Jenkins published a …

: Phishing-based attacks have risen 140% year-over-year | Security Magazine Menlo Threat Intelligence …

: Chinese Hacking Group MirrorFace Targeting Europe - SecurityWeek Chinese hacking group MirrorFace, …

: Windows Shortcut Zero-Day (ZDI-CAN-25373) Exploited by State-Backed Threat Actors Since 2017: …

: SpyCloud’s 2025 Identity Exposure Report Reveals the Scale and Hidden Risks of Digital Identity …

: Scareware Combined With Phishing in Attacks Targeting macOS Users - SecurityWeek A scareware …

: Sperm bank breach deposits data into hands of cybercriminals | Malwarebytes California Cryobank, a …

: ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers The …

: Major teacher’s union breach leaks members' PIN codes| Cybernews Over 500,000 members of the …

: Cl0p Hackers Leak 22K Bank Records in Cleo Breach Shock Cl0p hackers exploited vulnerabilities in …

: Tesla Owners Doxxed by Dogequest, an Unnerving Breach of Privacy A website called Dogequest …

: Extortion Reboot: Ransomware Crew Threatens Leak to Snowden – DataBreaches.Net Ox Thief, a …

: GitHub Action hack likely led to another in cascading supply chain attack A cascading supply chain …

: How to Secure Your Information on AWS: 10 Best Practices | Tripwire Organizations using Amazon Web …

: New Arcane stealer spreading via YouTube and Discord | Securelist A new stealer, Arcane, is being …

: Top 10 Passwords Hackers Use to Breach RDP – Is Yours at Risk? Hackers frequently target Remote …

: New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads A …

: Fake DeepSeek AI Installers, Websites and Apps Spreading Malware Cybercriminals are exploiting the …

: Flashpoint 2025 Global Threat Intelligence Report: Stay Ahead of Emerging Threats | Flashpoint The …

: New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking A critical …

: Cloudflare expands security portfolio with network-powered posture management | Network World …

: 11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft - SecurityWeek Trend Micro’s …

: Identity attacks and infostealers dominate the 2025 Threat Detection Report The 2025 Threat …

: Actively Exploited ChatGPT Bug Puts Organizations at Risk A server-side request forgery …

: New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors …

: $20B loss estimated from potential March Madness hacks | Security Magazine March Madness, with its …

: Google Releases Major Update for Open Source Vulnerability Scanner - SecurityWeek Google released an …

: Google Purchases Wiz in $32B Deal to Boost Cloud Security Google is acquiring Wiz, a leading cloud …

: Chinese Hackers Target European Diplomats with Malware Chinese cyberespionage group MirrorFace, …

: 1 in 10 people do nothing to stay secure and private on vacation …

: Announcing OSV-Scanner V2: Vulnerability scanner and remediation tool for open source …

: StilachiRAT analysis: From system reconnaissance to cryptocurrency theft …

: BitM Up! Session Stealing in Seconds Using the Browser-in-the-Middle Technique …

: Critical RCE flaw in Apache Tomcat actively exploited in attacks …

: Large enterprises scramble after supply-chain attack spills their secrets …

: FBI Warns: Malware Hidden in File Conversion Tools* Recently, the FBI warned about an emerging threat involving cybercriminals embedding malware into …

: AUTOSUR Breach, FiveM Database Leak, Disney+ Account Checker, Crypto Leads & Forex Scams Exposed …

: GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories A supply chain …

: European Cyber Report 2025: 137% more DDoS attacks than last year DDoS attacks have surged by 137% …

: Free file converter malware scam “rampant” claims FBI The FBI warns of a surge in …

: Social Media and Email hacking surged in 2024 - Cybersecurity Insiders In 2024, there was a …

: Arctic Wolf Warns Of Ongoing Attacks Targeting FortiGate Firewall Management Interfaces Arctic Wolf …

: AsyncRAT Surges In Global Malware Rankings AsyncRAT, a stealthy remote access Trojan, has surged in …

: IntelMQ: Open-source tool for collecting and processing security feeds - Help Net Security IntelMQ …

: Welcome to Security Week 2025 Security Week 2025 highlights the evolving threat landscape and the …

: Jailbreaking is (mostly) simpler than you think msrc.microsoft.com/blog/2025… Content …

: New Akira ransomware decryptor cracks encryptions keys using GPUs …

: Denmark's Postal Service Ends Letter Delivery: Adaptation or Loss? Denmark’s state-run PostNord will discontinue all letter mail services by 30 December 2025, …

: Malicious Adobe, DocuSign OAuth apps target Microsoft 365 accounts Cybercriminals are using …

: Manus AI: China’s Bold Step Forward—Promises and Challenges — Insights For Success Manus AI, …

: SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware …

: GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging …

: Remote Access Infra Remains Riskiest Corp. Attack Surface www.darkreading.com/cyber-ris… From …

: Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge …

: Merz wins support for surge in spending, proclaiming ‘Germany is back’ | Reuters German …

: Everything you say to your Echo will be sent to Amazon starting on March 28 - Ars Technica Starting …

: Pirate Bay backer Carl Lundström dies in plane crash • The Register Carl Lundström, a financier of …

: OpenAI says it’s ‘impossible’ to train AI without copyrighted materials | Euronews …

: We’re Thinking About Deploying AI Models Which Have An “I Quit” Button: Anthropic …

: GitLab addressed critical auth bypass flaws in CE and EE) GitLab released security updates to …

: One PUT Request to Own Tomcat: CVE-2025-24813 RCE is in the Wild - Security Boulevard A new remote …

: A New Era of Attacks on Encryption Is Starting to Heat Up | WIRED Governments worldwide, including …

: How Security Teams Should Respond To The Rise In Vulnerability Disclosures Vulnerability disclosures …

: Guardz Reveals Details of an Ongoing Phishing Campaign Exploiting Microsoft 365 Infrastructure - …

: FBI alerts Gmail users over Medusa Ransomware - Cybersecurity Insiders The FBI and CISA warn Gmail …

: New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions A new malware …

: Microsoft Uncovers New XCSSET MacOS Malware Variant Targeting Xcode Projects Microsoft Threat …

: EU Seeks US Assurances on Trans-Atlantic Data Flows The EU is seeking assurances from the US on the …

: Breach Roundup: The Ivanti Patch Treadmill - GovInfoSecurity This week’s cybersecurity roundup …

: Groups From China, Russia, Iran Hitting OT Systems Worldwide Nation-state threat groups, including …

: FBI and CISA Urge Enabling 2FA to Counter Medusa Ransomware The FBI and CISA issued a joint advisory …

: Ransomware Hits Record High: 126% Surge in Attacks in February 2025 February 2025 saw a record 126% …

: Cisco security advisory (AV25-140) - Canadian Centre for Cyber Security Cisco published security …

: Tata Technologies' 1.4TB Data Breach: Hunters International’s Dark Web Leak Tata Technologies, …

: New York sues Allstate over data breach, alleged security lapses | Reuters New York Attorney General …

: New Era Enterprises Confirms Recent Data Breach Affected Certain Boston Mutual Customers | Console …

: Massive data breach: Israelis' COVID records, other information on sale for $1 millio A group is …

: DVIDS - News - Eye on the Grid: Navy Develops ‘MOSAICS’ to Cyber-Defend Critical Infrastructure The …

: Has DeepSeek’s open source AI become a tool for cyber-scammers? - UKTN DeepSeek’s open-source AI …

: Check Point Uncovers 2025’s Biggest Cyber Risks - TechAfrica News Check Point’s Cyber Security …

: FCC launches national security unit to counter state-linked threats to US telecoms | Cybersecurity …

: VC Investment in Cyber Startups Surges 35% - Infosecurity Magazine Venture capital investment in …

: Cyber Security Sectoral Analysis 2025 reveals explosive growth The UK’s cyber security sector …

: Denmark raises cyber threat level for telecommunications sector Denmark raised its cyber threat …

: Cyber-attacks a bigger threat to cargo owners than cargo ships - The Loadstar Shipping supply chains …

: CPS data breach: Expert chimes in on how to stay vigilant Over 700,000 Chicago Public School …

: Joint report on publicly available hacking tools www.ncsc.gov.uk/report/jo… This report is a …

: Android devices track you before you even sign in www.malwarebytes.com/blog/news… Google is …

: Volt Typhoon hackers were in Massachusetts utility’s systems for 10 months …

: Signal no longer cooperating with Ukraine on Russian cyberthreats, official says …

: Picklescan Vulnerabilities Could Let Hackers Bypass AI Security Checks Sonatype researchers …

: NIST Finalizes Differential Privacy Rules to Protect Data NIST finalized guidelines for evaluating …

: China-linked APT UNC3886 targets EoL Juniper routers China-linked APT UNC3886 is deploying custom …

: New Bill Aims To Strengthen Cybersecurity For Federal Contractors The House of Representatives …

: UAE Guidelines Offer Blueprint for Cybersecurity in Health The United Arab Emirates is strengthening …

: Generative AI red teaming: Tips and techniques for putting LLMs to the test | CSO Online OWASP’s …

: WARNING: Expiring Root Certificate May Disable Firefox Add-Ons, Security Features, and DRM Playback …

: Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk Meta warns of a …

: Medusa ransomware hit over 300 critical infrastructure organizations until February 2025 The Medusa …

: OpenAI Operator Agent Used in Phishing Attack Demo Symantec researchers demonstrated how OpenAI’s …

: Head Mare and Twelve: Joint attacks on Russian entities | Securelist Head Mare and Twelve, two …

: CISA Defunds Threat-Sharing Hubs for States and Elections The Cybersecurity and Infrastructure …

: Zut Alors! Surge in Cyberattacks Targeting France in 2024 Cyberattacks targeting France surged in …

: How effective is the EDPB website auditing tool for checking GDPR compliance? - BH Consulting The …

: What Is SCM (Security Configuration Management)? | Tripwire Security Configuration Management (SCM) …

: CISA and Partners Release Cybersecurity Advisory on Medusa Ransomware | CISA CISA, FBI, and MS-ISAC …

: Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack A coordinated …

: NIST selects HQC as backup algorithm for post-quantum encryption - Help Net Security NIST has …

: China, Russia, Iran, and North Korea Intelligence Sharing - Schneier on Security Former CISA …

: Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution Multiple …

: Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution Multiple …

: Google unveils Gemma 3: Open-source AI models that run on a single GPU By Investing.com Google has …

: Tata Technologies Data Breach Leaks 1.4TB of Sensitive Data - TechNadu Hunters International, a …

: Trump nominates Sean Plankey to run top US cyber agency therecord.media/plankey-n… Sean …

: Internet shutdowns at record high in Africa as access ‘weaponised’ …

: AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution …

: Previously unidentified botnet infects unpatched TP-Link Archer home routers …

: New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects …

: Critical PHP RCE vulnerability mass exploited in new attacks …

: New Ballista Botnet spreads using TP-Link flaw. Is it an Italian job? Cato CTRL researchers have …

: How Generative AI Can Strengthen Corporate Cybersecurity - Cybersecurity Insiders Generative AI …

: Apple released a security update Tuesday addressing CVE-2025-24201, a zero-day WebKit vulnerability …

: Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks Apple released …

: Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks Apple released …

: Deepfake CEO Video Rocks YouTube YouTube has warned about fraudulent AI-generated deepfake videos of …

: March Patch Tuesday warnings: Act fast to plug zero day holes in Windows, VMware | CSO Online …

: Lazarus Group Hid Backdoor in Fake npm Packages in Latest Attack North Korean state-backed Lazarus …

: Lookout Discovers North Korean APT37 Mobile Spyware | Threat Intel Lookout researchers have …

: Google Enhances Data Privacy with Confidential Federated Analytics - InfoQ Google has announced …

: Apple fixed the third actively exploited zero-day of 2025 Apple has released emergency security …

: Whopping Number of Microsoft Zero-Days Under Attack Microsoft’s March 2025 Patch Tuesday includes …

: Microsoft security advisory – March 2025 monthly rollup (AV25–130) - Canadian Centre for Cyber …

: Silk Typhoon Hackers Indicted - Schneier on Security The US Department of Justice has indicted 12 …

: SAP security advisory – March 2025 monthly rollup (AV25-126) - Canadian Centre for Cyber Security …

: Top 20 Free APIs for Cybersecurity: Threat Intelligence, Malware Analysis & More - SOCRadar® …

: SAP Patches High-Severity Vulnerabilities in Commerce, NetWeaver - SecurityWeek SAP has released 21 …

: Edimax Says No Patches Coming for Zero-Day Exploited by Botnets - SecurityWeek Edimax has confirmed …

: Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices A new botnet …

: GitGuardian Report: 70% of Leaked Secrets Remain Active for Two Years, Urging Immediate Remediation …

: Steganography Explained: How XWorm Hides Inside Images The Hacker News reports on a sophisticated …

: X users report login troubles as Dark Storm claims cyberattack | Malwarebytes X (formerly Twitter) …

: Almost 1 million business and home PCs compromised after users visited illegal streaming sites: …

: APT ‘Blind Eagle’ Targets Colombian Government The Dark Reading article reports that the …

: Dell security advisory (AV25-121) - Canadian Centre for Cyber Security The Canadian Centre for Cyber …

: Red Hat security advisory (AV25-120) - Canadian Centre for Cyber Security The Canadian Centre for …

: Over 1000 Malicious Packages Found Exploiting Open-Source Platforms Fortinet’s FortiGuard Labs has …

: Ubuntu security advisory (AV25-118) - Canadian Centre for Cyber Security The Canadian Centre for …

: Global expansion in Generative AI: a year of growth, newcomers, and attacks Cloudflare’s latest …

: Global expansion in Generative AI: a year of growth, newcomers, and attacks Cloudflare’s latest …

: Could The Belsen Group Be Associated With ZeroSevenGroup? • KELA Cyber Threat Intelligence KELA …

: Blind Eagle: …And Justice for All - Check Point Research Blind Eagle, an APT group, has been …

: Critical PHP Vulnerability Under Mass Exploitation - SecurityWeek A critical vulnerability in PHP …

: North Korea-linked APT Moonstone used Qilin ransomware in limited attacks Microsoft researchers …

: What do organisations need to disclose to individuals about AI and automated decisions? | Data …

: 560,000 People Impacted Across Four Healthcare Data Breaches - SecurityWeek Four healthcare …

: GitHub-Hosted Malware Infects 1M Windows Users A malvertising campaign, originating from illegal …

: Swiss critical sector faces new 24-hour cyberattack reporting rule …

: Musk blames X outages on alleged ‘massive’ cyberattack therecord.media/cyberatta… The global …

: Fortinet Identifies Malicious Packages in the Wild: Insights and Trends from November 2024 Onward …

: SideWinder targets the maritime and nuclear sectors with an updated toolset …

: North Korean hackers cash out hundreds of millions from $1.5bn ByBit hack …

: The Evolution and Challenges of Know Your Customer (KYC) in Combating Crypto Money Laundering Introduction Know Your Customer (KYC) protocols are critical to modern financial security. Initially …

: Generative AI Fuels a New Wave of Cyber Threats Generative AI, developed initially to streamline content creation and automation, is increasingly …

: Airlines Tighten Restrictions on Power Bank Use During Flights Travellers should prepare for significant changes in how they power their devices during air travel …

: Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying …

: The digital illusion: millennials and the risks of online trust www.kaspersky.com/blog/the-… …

: Gen Z facing increased cybersecurity threats www.pandasecurity.com/en/mediac… In an era where …

: UK quietly scrubs encryption advice from government websites techcrunch.com/2025/03/0… The …

: YouTubers extorted via copyright strikes to spread malware …

: A Brand-New Botnet Is Delivering Record-Size DDoS Attacks www.wired.com/story/ele… A newly …

: Majority of Orgs Hit by AI Cyber-Attacks as Detection Lags - Infosecurity Magazine A new report by …

: Seqrite’s cyber threat report 2025: Highlights 369.01 million malware detections, ET CISO Seqrite, …

: Up to $2 Million Reward Offers Each for Information Leading to Arrests and/or Convictions of …

: Businesses set to fail if cyber resilience not most important thing says Splunk strategy head | …

: Communications Security Establishment Canada releases 2025 update to report on cyber threats to …

: Polish supervisory authority publishes updated guide on personal data protection breaches - A&O …

: DATA BREACH ALERT: Edelson Lechtzin LLP Is Investigating Edelson Lechtzin LLP is investigating a …

: Bank of America Sounds Alarm on Massive Data Breach, Millions Could Be Affected - Is Your Account …

: Rubrik discloses server breach, compromise of ‘access information’ | Cybersecurity Dive Rubrik …

: Berkeley Research Group suffers cyber attack, sources say | Insurance Business Canada Berkeley …

: Thousands of public school workers impacted by cyberattack on retirement plan administrator | The …

: Federman & Sherwood Investigates Rivers Casino Federman & Sherwood is investigating Rivers …

: Feds seized $23 million in crypto stolen using keys from LastPass breaches U.S. authorities seized …

: SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools A new mass malware …

: Global Crackdown Slashes Cobalt Strike Availability By 80% A global effort led by Fortra, Microsoft, …

: NTT suffered a data breach that impacted 18,000 companies NTT Communications Corporation (NTT Com) …

: Developer guilty of using kill switch to sabotage employer’s systems Software developer Davis …

: Akira ransomware gang used unsecured webcam to bypass EDR The Akira ransomware gang bypassed EDR by …

: New Chirp tool uses audio tones to transfer data between devices A new open-source tool, Chirp, …

: Malicious GitHub repositories linked to nearly 1M infections • The Register Microsoft discovered a …

: WestJet Updates Carry-On Baggage Policy Starting May 6, 2025 WestJet is changing its carry-on baggage policy starting May 6, 2025, to match the size limits used …

: Thousands of Israeli Gun Owners Exposed in Iranian Hack-and-leak Operation - National Security & …

: Thousands of Israeli Gun Owners Exposed in Iranian Hack-and-leak Operation - National Security & …

: Undocumented “backdoor” found in Bluetooth chip used by a billion devices An …

: ‘EncryptHub’ OPSEC Failures Reveal TTPs & Big Plans Researchers from Outpost24 …

: Chinese APT Silk Typhoon exploits IT supply chain weaknesses for initial access | CSO Online The …

: Elastic patches critical Kibana flaw allowing code execution Elastic fixed a critical vulnerability …

: youtube.com/watch CBC Marketplace’s latest investigation “Gaming the System” …

: Massive botnet that appeared overnight is delivering record-size DDoSes - Ars Technica A new botnet, …

: ‘Five Eyes alliance’ crumbling after UK, Aus, NZ and Canada give US cold shoulder | News …

: Layoff Report Shows The DOGE’s Bite Layoffs in February tripled from January, driven by mass …

: Breach Roundup: US Sanctions Iran-Based Nemesis Admin The U.S. sanctioned Behrouz Parsarad, an …

: Ransomware threat mailed in letters to business owners | Malwarebytes Business owners across the US …

: Credential Leaks, Enterprise Risk, and IOCs: How Contextual Intelligence Strengthens Your Defenses | …

: House Passes Bill Requiring Federal Contractors to Implement Vulnerability Disclosure Policies - …

: Top 10 AI Deepfake Detection Tools to Combat Digital Deception in 2025 - SOCRadar® Cyber …

: Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution Elastic …

: EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing The …

: Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom The Medusa ransomware group, …

: FBI Warns of Data Extortion Scam Targeting Corporate Executives | CISA The FBI warns of a data …

: Digg is relaunching after sale to Kevin Rose and Alexis Ohanian Digg, once a prominent social news …

: Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud Google is rolling out …

: Tripwire Patch Priority Index for February 2025 | Tripwire Tripwire’s February 2025 Patch Priority …

: Two Venezuelans Arrested in US for ATM Jackpotting - SecurityWeek Two Venezuelan nationals, David …

: Ransomware Group Claims Attack on Tata Technologies - SecurityWeek Ransomware group Hunters …

: Prohibited practices under the AI Act: Answered and unanswered questions in the Commission’s …

: YouTube Premium Lite: Ad-Free Viewing for $7.99/Month - YouTube Blog YouTube Premium Lite, a new, …

: Scammers take over social media - Help Net Security Cyber threats on social media reached …

: Polyglot files used to spread new backdoor | CSO Online A threat actor is using polyglot files in a …

: VMware fixed three actively exploited zero-days in ESX products Broadcom released security updates …

: Jamf Buys Identity Automation, Expands IAM Capabilities Jamf, an MDM provider, is acquiring Identity …

: New polyglot malware hits aviation, satellite communication firms …

: New Microsoft 365 outage impacts Teams, causes call failures Microsoft is investigating a new outage …

: Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates Threat actors deploying …

: Mozilla security advisory (AV25-115) - Canadian Centre for Cyber Security

: CISA issues warning against Qilin ransomware group - Cybersecurity Insiders CISA clarified that the …

: VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches Broadcom released …

: Japanese cancer hospital confirms breach; Qilin gang claims responsibility – DataBreaches.Net The …

: New Chinese Zhong Stealer Infects Fintech via Customer Support A new Chinese malware threat, Zhong …

: How New AI Agents Will Transform Credential Stuffing Attacks Credential stuffing attacks, fueled by …

: Top 10 Free Vulnerability Intelligence Platforms - SOCRadar® Cyber Intelligence Inc. This article …

: Suspected Iranian Hackers Used Compromised Indian Firm’s Email to Target U.A.E. Aviation …

: Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers A mass …

: Open Source Security Risks Continue To Rise The 2025 Open Source Security and Risk Analysis (OSSRA) …

: Google’s March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities …

: The New Ransomware Groups Shaking Up 2025 - The Cyber Post In 2024, ransomware attacks surged, with …

: Ubuntu security advisory (AV25-110) - Canadian Centre for Cyber Security

: IBM security advisory (AV25-109) - Canadian Centre for Cyber Security

: Dell security advisory (AV25-108) - Canadian Centre for Cyber Security

: Judges Are Fed up With Lawyers Using AI That Hallucinate Court Cases Judges are increasingly …

: Nearly 12,000 API keys and passwords found in AI training dataset …

: Microsoft unveils finalized EU Data Boundary as European doubt over US grows …

: Polish space agency confirms cyberattack www.theregister.com/2025/03/0… The Polish Space …

: CISA tags Windows, Cisco vulnerabilities as actively exploited …

: LatAm Orgs Face 40% More Attacks Than Global Average Latin America faces a significant cyber threat, …

: Vulnerability Summary for the Week of February 24, 2025 | CISA The CISA Vulnerability Bulletin …

: Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites A new phishing …

: TikTok: Major investigation launched into platform’s use of children’s data | Malwarebytes The …

: Nearly 1M records related to personal property were exposed | Security Magazine Nearly a million …

: Mexico resort illnesses: More Canadians come forward Canadians are reporting illness after staying …

: Darknet (TOR Network) Security Executive Summary – 5-Day Comprehensive Report Darknet Marketplace & Forum Activity Incident Title: Rising Activity on Russian Market and …

: Darknet markets see BTC inflow drop to $2B as focus shifts to Monero (XMR) | CryptoTvplus - The …

: New malware exploits fake updates to steal data - CyberGuy A new malware strain called FrigidStealer …

: Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal | Trend Micro (US) …

: Kenya’s Cyber Threat Landscape: The Rising Risks and How to Stay Ahead - SOCRadar® Cyber …

: Geopolitics, AI, and generational shifts: Three key trends reshaping the future of cyber leadership …

: Exercise Cyber Marvel brings together 1,000 specialists to train on cyber battlefield Exercise Cyber …

: Zapier breach, caused by a 2FA error, is a lesson for others - Techzine Global A Zapier repository …

: Cyber attacks & data breaches in February 2025 Cyber attacks and data breaches continue to …

: Lynch Carpenter Investigates Claims in Zacks Investment Lynch Carpenter is investigating claims …

: Info accessed in Rainbow board data breach ‘deleted and has not been shared’ - Sudbury News Rainbow …

: Pros and Cons of Using AI in Cybersecurity - Cybersecurity Insiders AI in cybersecurity offers …

: Ransomware access playbook: What Black Basta’s leaked logs reveal | CSO Online Black Basta, a …

: Cleveland Municipal Court Remains Closed After Cyber Event  Cleveland Municipal Court remains closed …

: Cleveland Municipal Court Remains Closed After Cyber Event  Cleveland Municipal Court remains closed …

: The mobile threat landscape in 2024 | Securelist In 2024, Kaspersky products blocked over 33 million …

: Latest Dark Web Findings: Discord Credentials, Orange Customer Records, and Australian Bank Data - …

: Indian Stock Broker Angel One Discloses Data Breach - SecurityWeek Indian stock brokerage firm Angel …

: As Trump warms to Putin, U.S. halts offensive cyber operations against Moscow …

: Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks …

: Massive security gaps discovered in building access systems | heise online A study by Modat, an IT …

: Qilin ransomware gang claimed responsibility for the Lee Enterprises attack The Qilin ransomware …

: US Cyber Command reportedly pauses attacks on Russia • The Register US Cyber Command has reportedly …

: To Identify Suspect in Idaho Killings, F.B.I. Used Restricted Consumer DNA Data - The New York Times …

: Beware of Chinese-language Robocall Scams Targeting Canadians A growing number of Canadians are receiving fraudulent robocalls in Mandarin, falsely claiming that …

: Wireshark • Wireshark 4.4.5 Release Notes

: Researchers Make Scary Discovery About Apple’s Find My Network Researchers at George Mason …

: German government denies foreign election interference was successful …

: UK silence over Apple ‘back door’ is unsustainable and unjustifiable, say experts …

: Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains …

: New White House Plan to Track Spending Raises Cyber Risks www.databreachtoday.com/new-white… …

: Top 10 Most Probable Ways a Company Can Be Hacked www.darkreading.com/vulnerabi… The Top 10 …

: AI-Fueled Tax Scams on the Rise www.darkreading.com/cyberatta… As AI-driven scams surge this …

: Police arrests suspects tied to AI-generated CSAM distribution ring …

: Vo1d malware botnet grows to 1.6 million Android TVs worldwide …

: Serbian police used Cellebrite zero-day hack to unlock Android phones …

: How to Prove to Auditors that You’ve Remediated CVEs in Kubernetes - Security Boulevard …

: 4 ways to get your business ready for the agentic AI revolution | ZDNET AI agents are poised to …

: Toronto Zoo says patrons' transaction data leaked on dark web in 2024 cyberattack | CBC News The …

: Microsoft disrupted a global cybercrime ring abusing Azure OpenAI Service Microsoft exposed a global …

: The New Face of Executive Protection: Why Digital and Physical Security Can No Longer Stand Alone - …

: IBM closes $6.4B HashiCorp acquisition

: Tokyo Government To Introduce Four-Day Workweek Next April Tokyo will introduce a four-day workweek …

: Marc Benioff says Salesforce will hire no engineers this year Salesforce, led by CEO Marc Benioff, …

: Cloudflare’s 2024 Transparency Reports - now live with new data and a new format Cloudflare’s 2024 …

: Belgium Investigating Intelligence Agency Hack by China The Belgian government is investigating a …

: Cleveland Court Remains Closed After Cyber Incident Cleveland Municipal Court has been closed for …

: Federal government announces latest National Cyber Security Strategy | Data Protection Report The …

: Millions of Avast antivirus software customers are getting a refund. Here’s why. - CBS News …

: Apple might be forced to disable a key iPhone privacy feature in France - 9to5Mac French authorities …

: 3 Things to Know About AI Data Poisoning Data poisoning, a cyberattack that corrupts AI training …

: Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations A new cyber …

: Chinese APT Uses VPN Bug to Exploit Worldwide OT Orgs Chinese cybercriminals, likely APT41, …

: Beware of Fake Cybersecurity Audits: Cybercriminals Use Scams to Breach Corporate Systems | Tripwire …

: Gen AI Accelerates Triage of Software Vulnerabilities Generative AI (GenAI) is proving effective in …

: Hackers Can Crack Into Car Cameras in Minutes Flat Researchers discovered a vulnerability in over …

: The Hidden Cost of Compliance: When Regulations Weaken Security - SecurityWeek Regulatory …

: Angry Likho APT Resurfaces with Lumma Stealer Attacks Against Russia Angry Likho APT, a cyber …

: 89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New …

: New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades Cybersecurity researchers …

: Nuna Baby Essentials Sends Data Breach Following Recent Cybersecurity Incident | Console and …

: RxSight Files Notice of Data Breach Following Compromised Employee Email Account | Console and …

: Levi & Korsinsky, LLP Investigates ArdyssLife Data Breach ArdyssLife suffered a data breach …

: Cardiology of Virginia Files Notice of Recent Data Breach with Federal Regulators | Console and …

: Bluesight’s 2025 Breach Barometer Report Reveals Surge in Healthcare Data Breaches Bluesight’s …

: Medical Billing Specialists Announces Data Breach Affecting an Unknown Number of Consumers …

: Hacker responsible for international data breaches arrested in joint Singapore-Thailand operation - …

: Freddie Mac Data Breach Compromises an Unknown Number of Social Security Numbers | Console and …

: Connally Memorial Medical Center Notifies Patients of 2024 Data Breach | Console and Associates, …

: Via Credit Union (ViaCU) Data Breach Exposes Personal Murphy Law Firm is investigating a data breach …

: Christensen Group Insurance Begins Sending Data Breach Letters Following 2022 Cyberattack | Console …

: Yes! Communities Sends Data Breach Letters Related to December 2024 Incident | Console and …

: DecisionFi Sends Data Breach Letters Following January 2025 Cybersecurity Incident | Console and …

: Federman & Sherwood Investigates Oral Roberts University Federman & Sherwood is …

: How hackers ruined a Disney employee’s life after he downloaded AI photo tool | The Independent A …

: Data of 1.5 mil. GS Shop customers breached - The Korea Times GS Retail announced a data breach …

: Federman & Sherwood Investigates Via Credit Union for Data Federman & Sherwood Investigates …

: 2024 phishing trends tell us what to expect in 2025 - Help Net Security Phishing remains the most …

: Cisco Patches Vulnerabilities in Nexus Switches - SecurityWeek Cisco has patched several …

: Critical Microsoft Partner Center vulnerability under attack, CISA warns | CSO Online A critical …

: Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and …

: Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Global Organizations A suspected Chinese …

: DragonForce Ransomware Group is Targeting Saudi Arabia DragonForce ransomware is targeting Saudi …

: CrowdStrike 2025 Global Threat Report: Beware the Enterprising Adversary The CrowdStrike 2025 Global …

: North Korea was responsible for $1.5 billion ByBit hack, FBI says The FBI announced North Korea was …

: PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices A new …

: LockBit ransomware gang sends a warning to FBI Director Kash Patel - Cybersecurity Insiders The …

: GitLab security advisory (AV25-106) - Canadian Centre for Cyber Security

: Silent breaches and supply chain exploits: 5 lessons for cyber-teams Silent breaches, exploiting …

: Building a security-minded development team: DevSecOps tools and SDLC best practices - Security …

: EncryptHub breaches 618 orgs to deploy infostealers, ransomware EncryptHub, also known as Larva-208, …

: Cellebrite cuts off Serbia over abuse of phone-cracking software against civil society | The Record …

: CVE-2025-20119 Cisco Application Policy Infrastructure Controller race condition …

: Qualcomm doubles Android security patch support to 8 years • The Register Qualcomm will provide …

: Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites A cross-site scripting …

: The Adversarial Misuse of AI: How Threat Actors Are Leveraging AI for Cyber Operations - SOCRadar® …

: The Adversarial Misuse of AI: How Threat Actors Are Leveraging AI for Cyber Operations - SOCRadar® …

: Signal Threatens to Exit Sweden Over Government’s Backdoor Proposal Sweden’s proposed …

: An iCloud Backdoor Would Make Our Phones Less Safe - Schneier on Security The UK government’s demand …

: 23 Billion Rows of Stolen Records: What You Need to Know? - SOCRadar® Cyber Intelligence Inc. …

: Ghostwriter Campaign Targets Ukrainian Government And Belarusian Opposition  SentinelLABS …

: SOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent The evolution of the …

: Three Password Cracking Techniques and How to Defend Against Them This article discusses three …

: CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries CERT-UA warns of …

: Chinese hackers got into Republican email system during campaign and spied for months before being …

: Orange Group confirms breach after hacker leaks company documents Orange Group, a French …

: Background check provider data breach affects 3 million people who may not have heard of the company …

: The Top 10 Dark Web Telegram Chat Groups and Channels - SOCRadar® Cyber Intelligence Inc. Telegram, …

: How Skills-Based Hiring Can Help Combat Cybersecurity Skills Shortages - Cybersecurity Insiders The …

: Leader of North Korean Hackers Sanctioned by EU - SecurityWeek The European Union has sanctioned Lee …

: Silver Fox APT Hides ValleyRAT in Trojanized Medical Imaging Software The Silver Fox APT group is …

: Signal lämnar Sverige om regeringens förslag på datalagring klubbas | SVT Nyheter Signal will leave …

: Anobis: A New Ransomware Threat • KELA Cyber Threat Intelligence A new ransomware group, Anubis, has …

: 5 Active Malware Campaigns in Q1 2025 Five notable malware families, including NetSupport RAT, Lynx …

: Security Alert: Critical Flaws in MITRE Caldera and Parallels Desktop (CVE-2025-27364, …

: Predatory app downloaded 100,000 times from Google Play Store steals data, uses it for blackmail | …

: Key Updates in the OWASP Top 10 List for LLMs 2025 | Tripwire The OWASP Top 10 List for LLMs 2025 …

: How to Achieve Compliance with NIS Directive | Tripwire The NIS2 Directive, replacing the original …

: 2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT A …

: Russia warns financial sector organizations of IT service provider LANIT compromise Russia’s NKTsKI …

: Google to replace SMS authentication with QR Codes for enhanced Mobile Security - Cybersecurity …

: Avoiding vendor lock-in when using managed cloud security services - Help Net Security Marina Segal, …

: FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services FatalRAT malware is …

: Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA CISA added two …

: Auto-Color: An Emerging and Evasive Linux Backdoor Palo Alto Networks researchers discovered a new …

: Zero-Day Bug Pops Up in Parallels Desktop for Mac A critical patch bypass vulnerability in Parallels …

: Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign …

: China’s latest surveillance tech: A spy camera so advanced it can capture faces from 100 km away - …

: Dell security advisory (AV25-103) - Canadian Centre for Cyber Security Dell published security …

: Hackers Use Google Docs and Steam to Spread ACRStealer Infostealer ACRStealer, a new …

: Surveillance pricing is “evil and sinister,” explains Justin Kloczko (Lock and Code …

: Security Roundup February 2025 - BH Consulting Law enforcement agencies made significant strides in …

: How APT Naming Conventions Make Us Less Safe Advanced persistent threat (APT) naming conventions, …

: IBM security advisory (AV25-102) - Canadian Centre for Cyber Security IBM published security …

: Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign - Check Point Research …

: Talos: No Cisco Zero Days Used in Salt Typhoon Telecom Hacks Chinese nation-state hackers, known as …

: Massive botnet hits Microsoft 365 accounts - Help Net Security A massive botnet of over 130,000 …

: Seraph Stealer Malware Hits the Market, Black Basta’s Internal Chaos, New Data Leak Claims - …

: Australia Bans Kaspersky Software Over National Security and Espionage Concerns Australia bans …

: Making Sense of Australia’s New Cybersecurity Legislation | Tripwire Australia’s Cyber Security Act …

: Fake GitHub projects distribute stealers in GitVenom campaign | Securelist The GitVenom campaign …

: Cybercrooks Exploit URL Manipulation In Sophisticated Phishing Scam A new phishing campaign, active …

: SpyLend Android malware downloaded 100,000 times from Google Play …

: Google Chrome disables uBlock Origin for some in Manifest v3 rollout …

: Leaked Files Tie Chinese Cybersecurity Firm to Government Censorship hackread.com/leaked-fi… …

: Notorious crooks broke into a company network in 48 minutes. Here’s how. …

: What the Bybit Hack Means for Crypto Security and the Future of Multisig Protection …

: Beware: PayPal “New Address” feature abused to send phishing emails …

: How Password Managers Enhance Security in Corporate Networks - Cybersecurity Insiders Password …

: Confluence Exploit Leads to LockBit Ransomware – The DFIR Report A Windows Confluence server was …

: Labour will use AI to snoop on social media The UK government is developing an AI program to monitor …

: Data leak at Thermomix: data from 1 million German users on the darknet | heise online A data leak …

: Apple Withdraws Strong Encryption Feature for All UK Users Apple has deactivated Advanced Data …

: Feds Fine Eyeglass Retailer $1.5M for HIPAA Lapses in Hacks Warby Parker was fined $1.5 million by …

: Signal security advisory (AV25-099) - Canadian Centre for Cyber Security Signal released updates to …

: FBI and CISA warn about continuing attacks by Chinese ransomware group Ghost | CSO Online The FBI …

: OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns OpenAI banned several …

: Google Unveils New Quantum-Safe Digital Signatures Google has adopted quantum-safe digital …

: Clinical Research Firm Exposes 1.6 Million US Medical Survey Records A misconfigured database …

: Hackers Claim Data Breach at Bulgaria’s Supreme Administrative Court – DataBreaches.Net RansomHouse …

: Leaked Files Tie Chinese Cybersecurity Firm to Government Censorship A data leak from TopSec, a …

: Crypto exchange Bybit says it was hacked and lost around $1.4B | TechCrunch Crypto exchange Bybit …

: Health Administrators Sued Over Email Hack Leaking Private Data Patients of Humboldt Independent …

: In Other News: Black Basta Chats Leaked, New SEC Cyber Unit, DOGE Site Hacked - SecurityWeek This …

: Huge data leak exposes 14 million customer shipping records | Fox News Hipshipper, a shipping …

: Sudbury board reveals extent of cyber attack

: Moscow Isn’t Racing to Let Western Companies Back in - Business Insider Russian officials are …

: The Complete Guide to OSINT for Executive Protection | Flashpoint Executive protection faces complex …

: Beverly Hills Plastic Surgeon Sued for Not Telling Patients Hackers Stole Their Nude Photos Beverly …

: Weathering the storm: In the midst of a Typhoon Cisco Talos is monitoring a sophisticated threat …

: Chinese APT Exploits Cisco IOS XE Vulnerabilities (CVE-2023-20198 & CVE-2023-20273) in Global …

: Chinese APT Exploits Cisco IOS XE Vulnerabilities (CVE-2023-20198 & CVE-2023-20273) in Global …

: New Report: State of Secure Network Access in 2025 - Cybersecurity Insiders The 2025 Secure Network …

: How to Backdoor Large Language Models - by Shrivu Shankar A backdoored LLM, “BadSeek,” was created …

: China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware A China-linked …

: PCI DSS 4.0 Mandates DMARC By 31st March 2025 The PCI DSS 4.0 mandate requires DMARC implementation …

: DeceptiveDevelopment targets freelance developers DeceptiveDevelopment, a North Korea-aligned …

: US Army soldier linked to Snowflake extortion rampage admits breaking the law …

: Updated Shadowpad Malware Leads to Ransomware Deployment www.trendmicro.com/en_us/res… In …

: Phishing attack hides JavaScript using invisible Unicode trick …

: CISA and FBI: Ghost ransomware breached orgs in 70 countries …

: Weathering the storm: In the midst of a Typhoon blog.talosintelligence.com/salt-typh… Cisco …

: HP adds 15 minutes waiting time for telephone support calls • The Register HP Inc. is implementing a …

: South Korea confirms DeepSeek sent user data to ByteDance - Cyber Daily South Korea’s data …

: UK healthcare giant HCRG confirms hack after ransomware gang claims theft of sensitive data | …

: Managed healthcare defense contractor to pay $11 million over alleged cyber failings …

: Cracked Garry’s Mod, BeamNG.drive games infect gamers with miners …

: Ecuador’s legislature says hackers attempted to access confidential information …

: How Phished Data Turns into Apple & Google Wallets krebsonsecurity.com/2025/02/h… Carding …

: Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger …

: Stately Taurus Activity in Southeast Asia Links to Bookworm Malware Stately Taurus, a threat actor, …

: ‘Darcula’ Phishing Kit Can Now Impersonate Any Brand Darcula, a phishing-as-a-service …

: Happy Information Governance Day | Data Protection Report Information governance is becoming …

: Inside A LockBit Ransomware Attack: A Firsthand Account Of Financial And Security Fallout A company …

: Understanding OWASP’s Top 10 list of non-human identity critical risks | CSO Online OWASP’s new Top …

: Ghost Ransomware targeting Obsolete IT Systems - Cybersecurity Insiders Ghost Ransomware, active …

: Darktrace Report Highlights The Growing Power Of MaaS, Sneaky Evasion Tactics Darktrace’s 2024 …

: 300% increase in endpoint malware detections - Help Net Security Endpoint malware detections …

: thehackernews.com/2025/02/m… Microsoft has addressed two critical vulnerabilities: …

: www.darkreading.com/ics-ot-se… Mike Burgess, director-general of ASIO, warns of …

: Google’s new policy tracks all your devices with no opt-out | Digital Trends Google’s recent …

: GitHub - alexoslabs2/slack-leak: Slack Leak scans all Slack public and private channels for …

: VC Firm Insight Partners Hacked - SecurityWeek Venture capital firm Insight Partners was hacked …

: US agencies and defense contractors infected with infostealer malware | Security Magazine US …

: US Coast Guard hack leads to paycheck delays, forces personnel systems offline | Cybernews A data …

: Australian IVF clinic is HACKED sparking fears personal information of thousands of patients has …

: Hydro customers see personal information leaked due to hacking - Village Report Burlington Hydro …

: US utility giant says MOVEit hack exposed stolen data | TechRadar PLL Electric Utilities confirms …

: Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection …

: Cyber Security in Estonia 2025 www.ria.ee/en/cyber-… The National Cyber Security Centre of …

: Indian authorities seize loot from collapsed BitConnect crypto scam …

: Cyberattack likely to have ‘material impact’ on media giant Lee Enterprises’ bottom line …

: Luxembourg: Restricted access to the Register of Beneficial Owners — a shift toward confidentiality …

: How Russian Hackers Are Exploiting Signal ‘Linked Devices’ Feature for Real-Time Spying …

: Malaysia’s Data Sharing Bill 2024: Pioneering Secure and Efficient Government Collaboration | …

: Attackers are chaining flaws to breach Palo Alto Networks firewalls - Help Net Security Exploitation …

: North Korea’s Kimsuky Attacks Rivals' Trusted Platforms North Korean threat group Kimsuky, …

: Hard drives containing sensitive medical data found in flea market | Malwarebytes Hard drives …

: Mozilla security advisory (AV25-095) - Canadian Centre for Cyber Security

: BlackLock ransomware onslaught: What to expect and how to fight it - Help Net Security BlackLock, a …

: Citrix security advisory (AV25-094) - Canadian Centre for Cyber Security

: New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now Two vulnerabilities in …

: Juniper Networks security advisory (AV25-093) - Canadian Centre for Cyber Security

: Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks Chinese …

: Ransomware attack hits 5 Michigan casinos, shuts them down | Security Magazine Five Michigan casinos …

: Open-sourcing R1 1776 DeepSeek-R1, a powerful language model, is limited by its refusal to respond …

: MicroStrategy Acquires Additional 7,633 BTC at $97,255 Each | Flash News Detail | Blockchain.News …

: Thomson Reuters wins AI copyright ruling over training data • The Register Thomson Reuters has won a …

: China builds ‘planetary defence’ team as concerns grow over 2024 YR4 asteroid | South China Morning …

: Saudi’s NEOM, DataVolt to Build $5 Billion Net Zero AI Data Center - ESG Today NEOM and DataVolt …

: New digital protections for kids, teens and parents Google is enhancing digital protections for kids …

: X is blocking links to secure messaging platform Signal | Digital Trends X, owned by Elon Musk, is …

: Mistral Saba | Mistral AI Mistral AI introduces Mistral Saba, a 24B parameter model tailored to …

: New FrigidStealer Malware Targets macOS Users via Fake Browser Updates A new malware campaign, …

: Palo Alto Networks Confirms Exploitation of Firewall Vulnerability - SecurityWeek Palo Alto Networks …

: Got a Microsoft Teams invite? Storm-2372 Gang Exploit Device Codes in Global Phishing Attacks | …

: Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign Winnti, a China-linked …

: Alarming Dark Web Leak: B1ack’s Stash Releases 4 Million Stolen Credit Cards for Free - …

: The Biggest Cybersecurity Threats To Watch Out For In 2025 In 2025, cybersecurity threats will …

: 2025 ZeroFox Forecast: Dark Web, Ransomware, Gen AI & Beyond ZeroFox’s 2025 Key Forecasts Report …

: AI Data Breach will surge by 2027 because of misuse of GenAI - Cybersecurity Insiders Gartner …

: FTC settlement requires disconnection of hardware from all no longer supported software | Data …

: Chase will soon block Zelle payments to sellers on social media JPMorgan Chase Bank will soon block …

: OpenAI to launch GPT-5 in a matter of months, GPT-4.5 within weeks - SiliconANGLE OpenAI plans to …

: Baidu to make latest Ernie AI model open-source as competition heats up | World News - Business …

: Anthropic prepares new Claude hybrid LLMs with reasoning capability Anthropic is preparing to …

: Sam Altman: “GPT-4.5 to be Released Within Weeks… Integrating General and …

: Russian drone attack damages Chernobyl nuclear plant’s protective shield, no radiation leak …

: OpenAI Removes Certain ChatGPT Content Warning Policy to Enhance User Experience OpenAI removes …

: The Impact Of Artificial Intelligence On Submarine Artificial Intelligence (AI) is expected to …

: Tencent testing DeepSeek to add China’s hottest AI technology to its Weixin super app | South China …

: Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics Microsoft …

: Atlas of Surveillance The EFF has released their atlas of surveillance (for the USA).

: [Control systems] CISA ICS security advisories (AV25-085)

: Ubuntu security advisory (AV25-086)

: Dell security advisory (AV25-087)

: IBM security advisory (AV25-088)

: Akira Ransomware is now targeting legacy servers of defunct companies - Cybersecurity Insiders The …

: ChatGPT Operator: Prompt Injection Exploits & Defenses · Embrace The Red OpenAI’s ChatGPT …

: New FinalDraft Malware Spotted in Espionage Campaign - SecurityWeek A new malware family, PathLoader …

: EagerBee: Advanced Backdoor Attacks on Middle Eastern Governments and ISPs - SOCRadar® Cyber …

: European Union: European Commission releases its Competitiveness Compass - implications for …

: European Union: AI Act provisions applicable from February 2025 - Global Compliance News The AI Act, …

: Singapore: Personal Data Protection Commission clarifies use of National Registration Identity Card …

: 127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police - SecurityWeek Dutch …

: Massive Data Exposure At Mars Hydro Highlights IoT Security Risks A massive data exposure involving …

: Downloads of DeepSeek’s AI Apps Paused in South Korea Over Privacy Concerns - SecurityWeek …

: ESentire Uncovers EarthKapre/RedCurl Attack Targeting Law Firms eSentire’s Threat Response Unit …

: Pro-Russia collective NoName057(16) launched a new wave of DDoS attacks on Italian sites - Security …

: Massive Swiss Medical Leak, Binance Phishing Panel, and WhatsApp Ban Service Found - SOCRadar® Cyber …

: Advanced Ransomware Evasion Techniques in 2025 | Tripwire Ransomware attacks are evolving rapidly, …

: New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations A new Golang-based …

: Ransomware gangs extort victims 17 hours after intrusion on average | CSO Online Ransomware gangs …

: How to evaluate and mitigate risks to the global supply chain | CSO Online Enterprise security …

: Samsung brings in Quantum safe security to its Knox Security Ecosystem - Cybersecurity Insiders …

: RansomHub Never Sleeps Episode 1: The evolution of modern ransomware …

: Crypto Scam Revenue 2024: Pig Butchering Grows Nearly 40% YoY as Fraud Industry Leverages AI and …

: Subnautica 2 Fake Playtest Links Sent as Part of Malicious Campaign …

: New FinalDraft malware abuses Outlook mail service for stealthy comms …

: SanDisk’s new Gen5 SSD offers blistering 14,000 MB/s speeds at just 7W | TechSpot SanDisk …

: Police risk losing society’s trust in fight against cybercrime, warns Europol chief …

: Texas investigating DeepSeek for violating data privacy law therecord.media/texas-inv… Texas …

: Malicious PirateFi game infects Steam users with Vidar malware …

: Hackers exploit authentication bypass in Palo Alto Networks PAN-OS …

: Apple Maps Might Start Showing Ads - MacRumors Apple is considering adding search ads to Apple Maps, …

: Myanmar militia says ready to deport 10,000 cyber scam workers An ethnic militia in Myanmar is …

: Storm-2372 used the device code phishing technique since August 2024 Russia-linked group Storm-2372 …

: Why Private Equity Is Now Kicking the Tires on Trend Micro Trend Micro, the sixth-largest endpoint …

: Breaking News: Massive Vaniitys Leak Shakes The World - Truth or Fiction A massive data leak from a …

: Coast Guard suffers data breach, impacting pay for 1,135 members The U.S. Coast Guard’s payroll …

: DOGE Exposes Once-Secret Government Networks, Making Cyber-Espionage Easier than Ever A surge in …

: I used Sunno AI to create a sea chanty style song about the cyber defenders …

: Reddit will lock some content behind a paywall this year, CEO says - Ars Technica Reddit plans to …

: RansomHub: The New King of Ransomware? Targeted 600 Firms in 2024 RansomHub, a new …

: Stealing Firmware from Over-The-Air Updates Security researchers often need access to closed-source …

: Emulating the Criminal Adversary FIN7 - Part 2 - AttackIQ AttackIQ has released two new attack …

: Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks The Lazarus Group, …

: Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems - …

: ClearML and Nvidia vulns Cisco Talos disclosed vulnerabilities in ClearML and Nvidia. ClearML …

: Arizona police procedures exposed in massive policy database hack • Arizona Mirror Hackers leaked …

: Hacker leaks account data of 12 million Zacks Investment users Zacks Investment Research, an …

: Doxbin Data Breach: Hackers Leak 136K User Records and Blacklist File The notorious doxxing platform …

: “Puppygirl Hacker Polycule” Leaks Over 8,500 Privatized Police Files and Training Manuals | Them The …

: Top 10 Advanced Persistent Threat (APT) Groups That Dominated 2024 - SOCRadar® Cyber Intelligence …

: Threat actors are using legitimate Microsoft feature to compromise M365 accounts - Help Net Security …

: Xerox Versalink C7025 Multifunction Printer: Pass-Back Attack Vulnerabilities (FIXED) | Rapid7 Blog …

: It’s Time to Move Beyond Awareness Training: Why Readiness Is the New Standard for …

: SonicWall Firewall Vulnerability Exploited After PoC Publication - SecurityWeek Threat actors are …

: Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks - SecurityWeek Salt Typhoon, …

: whoAMI name confusion attacks can expose AWS accounts to malicious code execution | CSO Online A …

: Microsoft Study Finds Relying on AI Kills Your Critical Thinking Skills A Microsoft study found that …

: Unpatched Cisco Devices Still Getting Popped by Salt Typhoon A Chinese cyber espionage group, Salt …

: Lawyers Caught Citing AI-Hallucinated Cases Call It a ‘Cautionary Tale’ Attorneys …

: Unusual attack linked to Chinese APT group combines espionage and ransomware | CSO Online A recent …

: North Korean hackers spotted using ClickFix tactic to deliver malware - Help Net Security North …

: China-linked APTs' tool employed in RA World Ransomware attack A November 2024 RA World ransomware …

: DeepSeek Exposes Major Cybersecurity Blind Spot - SecurityWeek DeepSeek, a new Chinese AI company, …

: CVE-2025-1094: PostgreSQL psql SQL injection (FIXED) | Rapid7 Blog Rapid7 discovered a high-severity …

: Astaroth Phishing Kit Bypasses 2FA to Hijack Gmail and Microsoft Accounts A new phishing kit, …

: North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks A North Korean …

: Dark Web Profile: Fog Ransomware - SOCRadar® Cyber Intelligence Inc. Fog Ransomware, first detected …

: Hackers are targeting your password manager app | Mashable Cyberattacks on password managers and …

: Watergate Hotel hit with data breach - WTOP News The Watergate Hotel in Washington, D.C., …

: Samoa warns of APT40 hackers targeting organizations in Blue Pacific region, urges immediate action …

: Ransomware gangs shifting tactics to evade enterprise defenses | Cybersecurity Dive Ransomware gangs …

: Michigan casino chain forced to shut down after ransomware attack Kewadin Casinos in Michigan’s …

: Scams targeting lovers or the lovelorn www.kaspersky.com/blog/tech… If you’re still under the …

: Hacker who hijacked SEC’s X account pleads guilty, faces maximum five-year sentence …

: Google fixes flaw that could unmask YouTube users' email addresses …

: Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability …

: DPRK hackers dupe targets into typing PowerShell commands as admin …

: Ransomware isn’t always about the money: Government spies have objectives, too …

: Cybercrime: A Multifaceted National Security Threat cloud.google.com/blog/topi… Cybercrime …

: Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software Palo Alto Networks has …

: FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux A new espionage …

: Sarcoma ransomware gang claims the theft of sensitive data from PCB maker Unimicron Sarcoma …

: 24% of vulnerabilities are abused before a patch is available | CSO Online Vulnerabilities are being …

: Russia-Linked Seashell Blizzard Intensifies Cyber Operations Against Critical Sectors Seashell …

: What security teams need to know about the coming demise of old Microsoft servers | CSO Online …

: The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance - Help …

: Over 3 million Fortune 500 employee accounts compromised since 2022 - Help Net Security Over three …

: Did You Download This Steam Game? Sorry, It’s Windows Malware | PCMag A hacker published a …

: The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation | …

: Sophos lays off 6% of staff after Secureworks takeover • The Register Sophos, following its …

: Microsoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries A subgroup …

: Palo Alto Networks security advisory (AV25-081) - Canadian Centre for Cyber Security

: Massive 1.17TB Data Leak Exposes Billions of IoT Grow Light Records A massive data leak exposed 2.7 …

: Reflected XSS In Main Search, WAF+Sanitizer Bypass Using 2 Reflections | by Renwa | Feb, 2025 | …

: Japan Goes on Offense With New ‘Active Cyber Defense’ Bill Japan has passed the Active …

: Ransomware Groups Made Less Money in 2024 www.darkreading.com/cybersecu… The total volume of …

: Russian military hackers deploy malicious Windows activators in Ukraine …

: Russian bulletproof hosting service Zservers sanctioned by US for LockBit coordination …

: Over 12,000 KerioControl firewalls exposed to exploited RCE flaw www.scworld.com/brief/tho… …

: Microsoft’s February Patch a Lighter Lift Than January’s …

: SonicWall firewall exploit lets hackers hijack VPN sessions, patch now …

: Cisco Rejects Kraken Ransomware’s Data Breach Claims Cisco denies recent data breach claims by the …

: SAP security advisory – February 2025 monthly rollup (AV25-073) - Canadian Centre for Cyber Security

: Ivanti security advisory (AV25-074) - Canadian Centre for Cyber Security

: Fortinet security advisory (AV25-075) - Canadian Centre for Cyber Security

: Microsoft security advisory – February 2025 monthly rollup (AV25–076) - Canadian Centre for Cyber …

: Adobe security advisory (AV25–077) - Canadian Centre for Cyber Security

: How auto-generated passwords in Sitevision leads to signing key leakage - CVE-2022-35202 | …

: OpenSSL patched high-severity flaw CVE-2024-12797 OpenSSL patched a high-severity vulnerability, …

: HPE security advisory (AV25-078) - Canadian Centre for Cyber Security

: OmniGPT AI Chatbot Alleged Breach: Hacker Leaks User Data, 34M Messages A hacker claims to have …

: Microsoft fixes 63 vulnerabilities, including 2 zero-days | CyberScoop Microsoft released a security …

: Attackers exploit a new zero-day to hijack Fortinet firewalls Threat actors are exploiting a new …

: Malware from fake recruiters www.gdatasoftware.com/blog/2025… Fake recruiters are currently …

: Sky ECC encrypted service distributors arrested in Spain, Netherlands …

: 4 Arrested as Police Dismantle 8Base Ransomware, Seize Dark Web Sites hackread.com/police-di… …

: Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores …

: Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities …

: Apple fixes zero-day exploited in ‘extremely sophisticated’ attacks …

: Why security leaders must ensure they have a recovery plan for Active Directory attacks | CSO Online …

: Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions Progress …

: Jeep Introduces Pop-Up Ads That Appear Every Time You Stop - Slashdot Stellantis has introduced …

: SHA256 Hash Calculation from Data Chunks

: IBM security advisory (AV25-066) - Canadian Centre for Cyber Security

: Ubuntu security advisory (AV25-067) - Canadian Centre for Cyber Security

: Dell security advisory (AV25-069) - Canadian Centre for Cyber Security

: Apple security advisory (AV25-070) - Canadian Centre for Cyber Security

: Cyberattack disrupts Lee newspapers' operations across the US Lee Enterprises, a major U.S. …

: Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack Apple released …

: NetSupport RAT Grant Attackers Full Access to Victims Systems Cybercriminals are increasingly using …

: Vulnerability Summary for the Week of February 3, 2025 | CISA

: Major Cyber Attacks in Review: January 2025 - SOCRadar® Cyber Intelligence Inc. January 2025 saw a …

: Malicious ML models found on Hugging Face Hub - Help Net Security Two malicious machine learning …

: Analyst Burnout Is an Advanced Persistent Threat The cybersecurity industry is facing a critical …

: Russia vanishing from the net behind an Iron Firewall​ | Cybernews Russia is rapidly reducing its …

: Kraken Ransomware strikes Cisco servers to steal data - Cybersecurity Insiders Cisco, a prominent …

: Edge Devices Face Surge in Mass Brute-Force Password Attacks Honeypots have detected a surge in …

: Handala Hackers Claim Israeli Police Breach, Leak 350,000 Files Iranian-linked hacking group Handala …

: Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released A vulnerability in …

: XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells The XE Group, a …

: A week in security (February 3 - February 9) | Malwarebytes Malwarebytes Labs covered various …

: Cisco Data Breach - New Ransomware Group Compromised Cisco Internal Network A significant data …

: “Quishing” - The Emerging Threat of Fake QR Codes | Tripwire “Quishing,” or fake QR code scams, are …

: SolarWinds Taken Private in $4.4 Billion Turn/River Capital Acquisition - SecurityWeek SolarWinds, a …

: Massive OpenAI Leak, WordPress Admin Exploit, Inkafarma Data Breach - SOCRadar® Cyber Intelligence …

: Massive Brute Force Attack Targets VPN & Firewall Logins Using 2.8 Million IPs A massive brute …

: Marvel Game Vulnerability Exposes PCs & PS5s to Remote Takeover Attacks A critical security …

: Information of 120,000 Stolen in Ransomware Attack on Georgia Hospital - SecurityWeek Memorial …

: Movistar/O2 deja a sus clientes sin acceso a webs alojadas en Cloudflare al bloquear toscamente el …

: Secret Taliban records published online after hackers breach computer systems …

: Brave now lets you inject custom JavaScript to tweak websites …

: Malicious AI Models on Hugging Face Exploit Novel Attack Technique …

: Google Cloud Build Vulnerability Enables Data Destruction Across Projects …

: Econet Refutes Data Breach Claims, Says No Hack Detected - Techzim Econet Refutes Data Breach …

: 7,000 Exposed Ollama APIs Leave DeepSeek AI Models Wide Open to Attack …

: Chinese-Speaking Group Manipulates SEO with BadIIS www.trendmicro.com/en_us/res… This blog …

: Apple missed screenshot-snooping malware in code that made it into the App Store, Kaspersky claims …

: Label maker Avery says ransomware investigation also found credit-card scraper …

: Google’s DMARC Push Pays Off, but Email Security Challenges Remain …

: Cybercriminals Weaponize Graphics Files in Phishing Attacks …

: Hackers exploit Cityworks RCE bug to breach Microsoft IIS servers …

: Using capa Rules for Android Malware Detection cloud.google.com/blog/topi… Mobile devices …

: NowSecure Uncovers Multiple Security and Privacy Flaws in DeepSeek iOS Mobile App …

: Cloudflare outage caused by botched blocking of phishing URL …

: Hewlett Packard Enterprise Confirms Data Breach by Russian Hackers …

: Microsoft Stock: Japan’s SoftBank Poised To Become OpenAI’s Biggest Investor | …

: Cloudflare incident on February 6, 2025 Cloudflare experienced a 59-minute outage on February 6, …

: U.K. orders Apple to let it spy on users’ encrypted accounts - The Washington Post In a significant …

: Federal government bans Chinese AI startup DeepSeek on public service devices | National Post The …

: Dark Web Profile: Tortoiseshell APT - SOCRadar® Cyber Intelligence Inc. Tortoiseshell, an Iranian …

: Breach Roundup: Hacker Claims 20 Million OpenAI Logins Taken A hacker claims to have stolen login …

: 430,000 Impacted by Data Breaches at New York, Pennsylvania Healthcare Organizations - SecurityWeek …

: Cisco’s ISE bugs could allow root-level command execution | CSO Online Cisco is warning enterprise …

: UK Engineering Giant IMI Hit by Cyberattack - SecurityWeek UK engineering firm IMI suffered a …

: Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys - Help Net Security …

: Information of 883,000 Stolen in Crippling Attack on Hospital Sisters Health System - SecurityWeek A …

: iOS App Store apps with screenshot-reading malware found for the first time | The Verge Malicious …

: Critical Cisco ISE Vulnerabilities Patched: CVE-2025-20124 & CVE-2025-20125 - SOCRadar® Cyber …

: Five Eyes Releases Guidance on Securing Edge Devices The Five Eyes intelligence alliance released …

: Thailand to Cut Off Power to Scam Centers - Will it Work? Thailand plans to cut power and …

: Poisoned Go programming language package lay undetected for 3 years …

: Russian cyber research companies post alerts about infostealer, industrial threats …

: Analyzing ELF/Sshdinjector.A!tr with a Human and Artificial Analyst …

: macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed …

: CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks …

: Netgear warns users to patch critical WiFi router vulnerabilities …

: Stealers on the Rise: A Closer Look at a Growing macOS Threat …

: Chinese ‘Infrastructure Laundering’ Abuses AWS, Microsoft Cloud …

: 8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur …

: Cyber agencies share security guidance for network edge devices …

: Managing Software Risk in a World of Vulnerabilities Organizations face a perfect storm of rising …

: Tangerine Turkey: Cryptocurrency Mining Worm Unveiled In Global Campaign  A new threat actor, …

: Coyote Banking Trojan targets Brazilian users, stealing data from 70+ financial apps and websites …

: CISA Adds Four Known Exploited Vulnerabilities to Catalog | CISA

: Massive Data Leak Exposes 1.5 Billion Records from Chinese Platforms and Government - gHacks Tech …

: Beware of stealers disguised as… wedding invitations www.kaspersky.com/blog/tria… Getting …

: 2024 Trends in Vulnerability Exploitation vulncheck.com/blog/2024… 768 CVEs were publicly …

: CVE-2023-6080: A Case Study on Third-Party Installer Abuse cloud.google.com/blog/topi… …

: DeepSeek AI tools impersonated by infostealer malware on PyPI …

: Kazakhstan to audit foreign ministry after suspected Russia-linked cyberattack …

: A new phishing campaign is exploiting Microsoft’s legacy ADFS identity solution to steal credentials …

: Surge in Infostealer Attacks Threatens EMEA Organizations - Infosecurity Magazine Infostealer …

: Stealers on the Rise: A Closer Look at a Growing macOS Threat Infostealers, malware designed to …

: Hackers Exploiting 7-Zip Zero-Day Vulnerability to Deploy SmokeLoader Malware  Hackers are …

: Warning: Phishing Campaign Targets Germany with New Malware A new phishing campaign targeting …

: Rat Race: ValleyRAT Malware Targets Organizations with New Delivery Techniques Morphisec Threat Labs …

: Hackers impersonate DeepSeek to distribute malware | CSO Online Hackers are impersonating DeepSeek …

: Picus Security Finds 3X Increase in Malware Targeting Picus Security’s Red Report 2025 reveals a …

: Chinese algorithm claimed to boost Nvidia GPU performance by up to 800X for advanced science …

: Salesforce (CRM) Cutting 1,000 Roles While Hiring Salespeople for AI - Bloomberg Salesforce is …

: uBlock Origin is dead for Chrome, but ad blockers live on | PCWorld Google’s Chrome browser update, …

: TD Bank Confirms Data Breach: Account Numbers and Sensitive Customer Info Exposed - Benzinga TD Bank …

: CRTC lets top telecoms piggyback on fibre-optic networks CRTC Maintains Big Three’s Access to Fibre …

: Cloudflare is making it easier to track authentic images online | The Verge Cloudflare has launched …

: Dell security advisory (AV25-051) - Canadian Centre for Cyber Security

: IBM security advisory (AV25-052) - Canadian Centre for Cyber Security

: Ubuntu security advisory (AV25-053) - Canadian Centre for Cyber Security

: Total Fines Imposed by EU Privacy Regulators Dropped in 2024 While the total fines imposed by EU …

: Introducing ORBIT, Scan Targets and Clients at Scale - Black Hills Information Security Ralph May …

: macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed Apple recently updated its …

: DeepSeek Blocked In US Federal Agencies - GovInfoSecurity U.S. federal agencies are banning the use …

: New Research from Incogni Ranks Top 238 AI-Powered Google Chrome Extensions by Privacy Risk - …

: AI Company Asks Job Applicants Not to Use AI in Job Applications Anthropic, a prominent AI company, …

: Cisco Finds DeepSeek R1 Highly Vulnerable to Harmful Prompts DeepSeek R1, a cost-efficient AI model, …

: EV Charging Stations vulnerable to cyber attacks - Cybersecurity Insiders Electric Vehicles (EVs) …

: 1-Click Phishing Campaign Targets High-Profile X Accounts A one-click phishing campaign is targeting …

: Sophos Acquires Secureworks – Sophos News Sophos has acquired Secureworks to enhance cybersecurity …

: Crazy Evil gang runs over 10 highly specialized social media scams The Russian-speaking Crazy Evil …

: 768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023 In 2024, 768 CVEs were …

: Vulnerability Summary for the Week of January 27, 2025 | CISA

: Hundreds of Thousands Hit by Data Breaches at Healthcare Firms in Colorado, North Carolina - …

: Coyote Malware Expands Reach: Now Targets 1,030 Sites and 73 Financial Institutions A banking …

: Insurance Company Globe Life Notifying 850,000 People of Data Breach - SecurityWeek Insurance …

: 1 Million Impacted by Data Breach at Connecticut Healthcare Provider - SecurityWeek Connecticut …

: How the Proposed HISAA Law Could Reshape Cybersecurity Compliance | Tripwire The Health …

: 39% of IT leaders fear major incident due to excessive workloads | CSO Online IT leaders are …

: Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware A Russian-speaking …

: Forrester Report: The Complexities Of Human-Element Breaches Forrester’s new report, “Deconstructing …

: Criminals Increase Attack Speed By 22%  Cybercriminals are accelerating their attacks, with the …

: BadDNS: Open-source tool checks for subdomain takeovers - Help Net Security BadDNS is an open-source …

: DoJ, Dutch Authorities Seize 39 Domains Selling Malicious Tools The US Department of Justice (DoJ) …

: AMD: Microcode Signature Verification Vulnerability · Advisory · google/security-research · GitHub A …

: Active Exploitation of macOS Kernel Vulnerability (CVE-2025-24118) Date Observed: Feb. 2, 2025, at …

: 10 Cyber Security Trends For 2025 Cyber security trends for 2025 include AI-driven malware, zero …

: Subscribe to read The EU plans to make Temu, Shein, and Amazon Marketplace responsible for illegal …

: More ChatGPT Jailbreaks Are Evading Safeguards On Sensitive Topics AI chatbots like ChatGPT are …

: Microsoft is killing its “free” Microsoft 365 VPN feature | Windows Central Microsoft is removing …

: DeepSeek might not be as disruptive as claimed, firm reportedly has 50,000 Nvidia GPUs and spent …

: Microsoft’s Free Offer Deadline—Millions Of Windows Users Suddenly Upgrade Microsoft faces a …

: Ransomware attack hit Indian multinational Tata Technologies Tata Technologies, a Tata Motors …

: Mali-cious Intent: Exploiting GPU Vulnerabilities (CVE-2022-22706 / CVE-2021-39793) | STAR Labs …

: List of products from the United States subject to 25 per cent tariffs effective February 4, 2025 - …

: ClickFix vs. traditional download in new DarkGate campaign | Malwarebytes A recent malvertising …

: Backdoor in Chinese-made healthcare monitoring device leaks patient data | CSO Online A backdoor in …

: Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists Meta-owned …

: BeyondTrust Zero-Day Breach Exposed 17 SaaS Customers via Compromised API Key BeyondTrust …

: U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network U.S. and Dutch …

: Texas Governor Orders Ban on DeepSeek, RedNote for Government Devices - SecurityWeek Texas Governor …

: Israeli Spyware Firm Paragon Linked to WhatsApp Zero-Click Attack WhatsApp recently uncovered a …

: Casio and 16 Other Websites Hit by Double-Entry Web Skimming Attack A recent web skimming campaign …

: Another Healthcare Data Breach Compromised a Million Patients' Information | Lifehacker Hackers …

: Exclusive: Apex Custom Software hacked, threat actors threaten to leak the software – …

: Google offers ‘voluntary exit’ to all US platforms and devices employees | The Verge Google offers a …

: OpenAI o3-mini | OpenAI OpenAI is releasing OpenAI o3-mini, a new, cost-efficient reasoning model …

: NorthBay Health Data Breach Impacts 569,000 Individuals - SecurityWeek NorthBay Health, a non-profit …

: Google Bans 158,000 Malicious Android App Developer Accounts in 2024 Google blocked over 2.36 …

: VMware offers fixes to severe vulnerabilities in VMware Aria | CSO Online VMware Aria, a cloud …

: NY Blood Center Attack Disrupts Suppliers in Several States A ransomware attack on New York Blood …

: ChatGPT-4o contains security bypass vulnerability through time and search functions called …

: Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response …

: Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations …

: New Aquabotv3 botnet malware targets Mitel command injection flaw …

: New Syncjacking attack hijacks devices using Chrome extensions …

: No need to RSVP: a closer look at the Tria stealer campaign securelist.com/tria-stea… Since …

: Microsoft advertisers phished via malicious Google ads www.malwarebytes.com/blog/news… Just …

: Banshee: A stealer targeting macOS users www.kaspersky.com/blog/bans… Banshee stealer, a …

: Backdoor found in two healthcare patient monitors, linked to IP in China CISA warns of a backdoor in …

: Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform · GitHub A …

: DeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys Leaked DeepSeek, a prominent …

: Phishing Campaign Baits Hook With Malicious Amazon PDFs www.darkreading.com/cyberatta… …

: Lynx Ransomware Group ‘Industrializes’ Cybercrime With Affiliates …

: Windows 11’s 24H2 January update is causing havoc on people’s PCs The latest Windows 11 …

: NordVPN’s new feature gets around networks that block VPNs | The Verge NordVPN introduces …

: Apple’s New ‘Game Changer’ iPhone Update Brings Starlink Satellite Access Apple’s latest iPhone …

: Microsoft CEO: AI Scaling Laws Drive Efficiency, Lower Costs Microsoft CEO Satya Nadella believes AI …

: Security Roundup January 2025 - BH Consulting The World Economic Forum’s Global Risk Report 2025 …

: Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits Three unpatched …

: Operation Talent: FBI Seizes Nulled.to, Cracked.to, Sellix.io and more The FBI seized several …

: IT Services Vendor Hack Affects 293,000 AHN Patients Allegheny Health Network (AHN) is notifying …

: CL-STA-0048: An Espionage Operation Against High-Value Targets in South Asia A Chinese threat actor, …

: Russian UAC-0063 Targets Europe and Central Asia with Advanced Malware Russian APT28-linked threat …

: Threat actors using Google Gemini to amplify attacks: Report | CSO Online Government-backed threat …

: U.S. CISA adds Apple products' flaw to its Known Exploited Vulnerabilities catalog CISA added a …

: ISC BIND security advisory (AV25-048) - Canadian Centre for Cyber Security

: FBI Seizes Leading Hacking Forums Cracked.to and Nulled.to Two prominent hacking forums, Nulled.to …

: These are the 10 worst PIN codes | Malwarebytes A study of 29 million PIN codes revealed a …

: Mishing Cyber Attack from malicious PDF - Cybersecurity Insiders A new mishing campaign, targeting …

: Old Ways of Vendor Risk Management Are No Longer Enough Traditional third-party risk management …

: TeamViewer security advisory (AV25-047) - Canadian Centre for Cyber Security

: Top 10 Exploited Vulnerabilities of 2024 - SOCRadar® Cyber Intelligence Inc. In 2024, organizations …

: Aquabot Botnet Targeting Vulnerable Mitel Phones - SecurityWeek A Mirai-based malware family, …

: New phishing campaign targets users in Poland and Germany | CSO Online An ongoing phishing campaign, …

: Canada’s privacy landscape saw significant legislative shifts in 2024, with Alberta and …

: Hackers Claim 2nd Breach at HP Enterprise, Plan to Sell Access IntelBroker, a notorious hacker, …

: Unmasking FleshStealer: A New Infostealer Threat in 2025 | Flashpoint FleshStealer, a new C#-based …

: OAuth Flaw Exposed Airline Users to Account Takeovers A vulnerability in a major travel services …

: Unknown threat actor targeting Juniper routers with backdoor: Report | Network World An unknown …

: Only 13% of organizations fully recover data after a ransomware attack - Help Net Security …

: API Supply Chain Attacks Surge, Exposing Critical Security Gaps  API attack traffic surged by 681% …

: Cybersecurity crisis in numbers - Help Net Security The number of US data compromises decreased …

: Building Resilience Against Zero-Day Threats In Third-Party Risk Management Organizations must adopt …

: UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents The APT group UAC-0063, …

: How Lazarus Group built a cyber espionage empire - Help Net Security Lazarus Group, a North Korean …

: Ex-worker arrested after ‘shutdown’ of British Museum computer systems A former IT …

: Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution A critical security flaw …

: SimpleHelp Remote Access Software Exploited in Attacks - SecurityWeek Threat actors are exploiting …

: Cyber Insights 2025: Artificial Intelligence - SecurityWeek Artificial Intelligence (AI) is rapidly …

: Smiths Group Scrambling to Restore Systems Following Cyberattack - SecurityWeek Smiths Group, a …

: Is DeepSeek Safe? A Q&A on the Cybersecurity Risks of the AI Platform - SOCRadar® Cyber …

: Looking Back To Look Forward: 2024’s Top Email Threats VIPRE Security Group’s 2024 email threat …

: ExxonMobil Lobbyist Caught Hacking Climate Activists - Schneier on Security The Department of …

: PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks …

: Bitwarden makes it harder to hack password vaults without MFA …

: DeepSeek halts new signups amid “large-scale” cyberattack …

: Microsoft tests Edge Scareware Blocker to block tech support scams …

: Apple users: Update your devices now to patch zero-day vulnerability …

: Apple chips can be hacked to leak secrets from Gmail, iCloud, and more - Ars Technica Two newly …

: Let’s Secure Insurance failed to secure their own data storage. Now they have a breach. – …

: Prompt Injection Tricks AI Into Downloading And Executing Malware | Hackaday A proof-of-concept …

: South Korea sees cyber-attack damage increase by 48% year on year - Telecompaper According to a …

: Faridabad police arrest 41 cyber criminals in week - The Tribune Faridabad police arrested 41 …

: Cyber-attacks on the tech supply chain spiked in 2024 Cyber-attacks on the global technology supply …

: EU Sanctions Three Russians For 2020 Cyber-Attack on Estonia - Infosecurity Magazine The EU …

: Smiths Group Manages Cyber Security Incident - TipRanks.com Smiths Group plc is addressing a cyber …

: Tech selloff deepens as DeepSeek upsets global AI race | Reuters The emergence of DeepSeek, a …

: Now Apple tells us how to update AirPods - The Verge Apple updated its AirPods firmware support page …

: Swedish Authorities Seize Vessel in Cable Sabotage Probe Swedish authorities seized a Malta-flagged …

: SonicWall’s Zero-Day Provokes Patch Alerts - GovInfoSecurity SonicWall’s Secure Mobile Access …

: Microsoft Teams phishing attack alerts coming to everyone next month …

: Technical Analysis of Xloader Versions 6 and 7 | Part 1 www.zscaler.com/blogs/sec… Xloader is …

: MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks …

: Ransomware gang uses SSH tunnels for stealthy VMware ESXi access …

: DeepSeek’s Popular AI App Is Explicitly Sending US Data to China | WIRED DeepSeek, a Chinese AI …

: Meta AI Tracks Canadians on Facebook, Messenger, WhatsApp • iPhone in Canada Blog Meta AI is getting …

: Attackers Exploit PDFs In Sophisticated Mishing Attack  A sophisticated phishing campaign, dubbed …

: InvisibleFerret: Everything About Lazarus APT’s New Backdoor - Cybersecurity Insiders Lazarus …

: Compliance Scorecard Version 7 simplifies compliance management for MSPs - Help Net Security …

: Data Protection Day 2025: three takeaways for embedding privacy principles - BH Consulting Data …

: A method to assess ‘forgivable’ vs ‘unforgivable’… - NCSC.GOV.UK The …

: Dark Web Profile: FunkSec - SOCRadar® Cyber Intelligence Inc. FunkSec, a new ransomware group, has …

: E.U. Sanctions 3 Russian Nationals for Cyber Attacks Targeting Estonia’s Key Ministries The …

: Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks DeepSeek, a Chinese AI …

: Nursing Home, Rehab Chain Says Hack Affects Nearly 70,000 HCF Management, a healthcare and nursing …

: ESXi ransomware attacks use SSH tunnels to avoid detection ESXi ransomware attacks exploit …

: CISOs’ top 12 cybersecurity priorities for 2025 | CSO Online CISOs are prioritizing strengthening …

: Hackers allegedly stole $69M from cryptocurrency platform Phemex Singapore-based cryptocurrency …

: GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities A new threat actor, …

: A Strategic Approach To Container Security Containerization technologies have revolutionized …

: MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks A cyber campaign uses …

: How to use Apple’s App Privacy Report to monitor data tracking - Help Net Security Apple’s App …

: Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware – The DFIR Report A LockBit ransomware …

: Abusing multicast poisoning for pre-authenticated Kerberos relay over Kerberos relaying over HTTP is …

: Recent reports have highlighted that apps like Life360 and MyRadar have been sharing user driving …

: Cisco warns of a ClamAV bug with PoC exploit Cisco released security updates for a ClamAV …

: Meta’s Llama Framework Flaw Exposes AI Systems to Remote Code Execution Risks A high-severity …

: OpenAI Launches AI Agent ‘Operator’ - GovInfoSecurity OpenAI launched Operator, an AI …

: Patching Lags for Vulnerabilities Targeted by Salt Typhoon Chinese nation-state hackers, known as …

: Massive Data Leak of information on Georgians/JAMnews Sensitive personal data of nearly the entire …

: UnitedHealth Group’s Massive Data Breach Impacts 190 Million Americans UnitedHealth Group’s …

: TalkTalk investigates breach after data for sale on hacking forum TalkTalk is investigating a …

: American National Insurance Company (ANICO) Data Leaked in MOVEit Breach American National Insurance …

: Crunchyroll password leaks: What’s happening with Crunchyroll Premium accounts now | esports.gg …

: OpenAI launches Operator, an AI agent that performs tasks autonomously | TechCrunch OpenAI launches …

: Introducing GhostGPT—The New Cybercrime AI Used By Hackers GhostGPT, an uncensored AI chatbot, is …

: BITCARDS: The Dark Side of Prepaid Cards in the Digital Underworld The market for prepaid cards has …

: $4.88M was the average cost of a data breach in 2024 | Security Magazine The average cost of a data …

: New Law Could Mean Prison for Reporting Data Leaks | Tripwire Turkey’s proposed cybersecurity law …

: Belgium: Private Investigation Act — How it impacts your internal investigations - Global Compliance …

: Nearly half of CISOs now report to CEOs, showing their rising influence - Help Net Security CISOs …

: 2025 State of SaaS Backup and Recovery Report The 2025 State of SaaS Backup and Recovery Report …

: RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations Over 100 security …

: A New Wave Of Ransomware Campaigns Is Targeting Microsoft Teams - SOCRadar® Cyber Intelligence Inc. …

: North Korean Fake IT Workers More Aggressively Extorting Enterprises - SecurityWeek North Korean …

: Misinformation Is No. 1 Global Risk, Cyberespionage in Top 5 …

: Data breach hitting PowerSchool looks very, very bad arstechnica.com/security/… Parents, …

: Hackers imitate Kremlin-linked group to target Russian entities therecord.media/hacker-im… A …

: Lumma Stealer: Fake CAPTCHAs & New Techniques to Evade Detection …

: HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code …

: PANdora’s Box: Vulnerabilities Found in NGFW eclypsium.com/blog/pand… Security …

: The J-Magic Show: Magic Packets and Where to find them blog.lumen.com/the-j-mag… The Black …

: Subaru Security Flaws Exposed Its System for Tracking Millions of Cars …

: FortiGate config leaks: Victims' email addresses published online …

: SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation …

: Researchers say new attack could take down the European power grid arstechnica.com/security/… …

: Will 2025 See a Rise of NHI Attacks? www.darkreading.com/vulnerabi… The flurry of non-human …

: Targeted supply chain attack against Chrome browser extensions blog.sekoia.io/targeted-… On …

: Threat hunting case study: PsExec intel471.com/blog/thre… PsExec is a command-line utility …

: Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet …

: Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products …

: Cisco warns of denial of service flaw with PoC exploit code …

: SonicWall CVE-2024-53704: SSL VPN Session Hijacking bishopfox.com/blog/soni… Bishop Fox …

: Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications …

: PlushDaemon compromises supply chain of Korean VPN service www.welivesecurity.com/en/eset-r… …

: From qualitative to quantifiable: Transforming cyber risk management for critical infrastructure …

: ENISA: Embedding Resilience in Critical Infrastructure www.databreachtoday.com/enisa-emb… The …

: Iran and Russia deepen cyber ties with new agreement therecord.media/russia-ir… A deal signed …

: TR-92 - Unused Domain Names and the Risks of Missing DNS SPF Records www.circl.lu/pub/tr-92… …

: This Corporate Data Breach Lasted 3 Years and Exposed 3 Billion Accounts - 24/7 Wall St. This …

: Ransomware Groups Abuse Microsoft Services for Initial Access - SecurityWeek Two threat actors, …

: US experiences 47% of global utilities cyberattacks | Security Magazine Cyberattacks against the …

: FTC finalizes COPPA rule amendments | Data Protection Report The Federal Trade Commission (FTC) has …

: Medical Device Company Tells Hospitals They’re No Longer Allowed to Fix Machine That Costs Six …

: MasterCard DNS Error Went Unnoticed for Years – Krebs on Security MasterCard had a DNS error for …

: Microsoft 365 Subject to Email Bombing, ‘Vishing’ Attacks Sophos warns of ransomware …

: Oracle Quarterly Critical Patches Issued January 21, 2025

: Redline, Vidar and Raccoon Malware Stole 1 Billion Passwords in 2024 Over 1 billion passwords were …

: Russian ransomware hackers increasingly posing as tech support on Microsoft Teams - The Cyber Post …

: 37% of privacy professionals cite lack of resources as cause of stress | Security Magazine Privacy …

: Kaspersky finds US Cybersecurity budgets up by 9 percent in next 2 years - Cybersecurity Insiders …

: Cloudflare Issue Can Leak Chat App Users' Broad Location Cloudflare issue allows attackers to obtain …

: HPE security advisory (AV25-030) - Canadian Centre for Cyber Security HPE published a security …

: Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4 Cloudflare’s DDoS defense …

: The fall and rise of TikTok (traffic) On January 19, 2025, TikTok traffic in the US dropped by 85% …

: Vulnerability Summary for the Week of January 13, 2025 | CISA The CISA Vulnerability Bulletin …

: Medusa Ransomware: What You Need To Know | Tripwire Medusa is a ransomware-as-a-service platform …

: ChatGPT API flaws could allow DDoS, prompt injection attacks | CSO Online A vulnerability in the …

: Multiple Vulnerabilities in Amazon Web Services Clients Issued by: CERT-In (Indian Computer …

: Atlassian’s Bitbucket Cloud went down ‘hard’ today …

: Tracking Adversaries: Ghostwriter APT Infrastructure blog.bushidotoken.net/2025/01/t… This …

: CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits …

: AI tool GeoSpy analyzes images and identifies locations in seconds …

: Why maintaining data cleanliness is essential to cybersecurity …

: 7-Zip fixes bug that bypasses Windows MoTW security warnings, patch now …

: Russian telecom giant Rostelecom investigates suspected cyberattack on contractor …

: Geolocation and Starlink isc.sans.edu/diary/rss… Until now, satellite internet access has …

: Patch procrastination leaves 50,000 Fortinet firewalls vulnerable to zero-day …

: Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai …

: Indian Strategic Studies: C.I.A.’s Chatbot Stands In for World Leaders The Central Intelligence …

: Netflix Raises Prices Including First Hike on Ad-Supported Tier Netflix is raising subscription …

: President Trump Scraps Biden’s AI Safety Executive Order President Trump has rescinded Biden’s …

: Fortinet’s 2025 State Of Cloud Security: Insights On Multi-Cloud Adoption, Security …

: Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing” – Sophos …

: Medusa Ransomware: What You Need To Know | Tripwire Medusa is a ransomware-as-a-service platform …

: PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers A cyber attack campaign, …

: Fleet: Open-source platform for IT and security teams - Help Net Security Fleet is an open-source …

: Cybersecurity jobs available right now: January 21, 2025 - Help Net Security A list of cybersecurity …

: Ciso Guide To Password Security - How to Implement and Automate Key Elements of NIST 800-63B - …

: Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP …

: How much does your electric car know about you? www.pandasecurity.com/en/mediac… Electric …

: 6 Cyber Security Challenges Emerge from World Economic Forum, Check Point Research on 2025 Threats …

: HPE investigates breach as hacker claims to steal source code …

: Ukraine restores state registers after suspected Russian cyberattack …

: DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection …

: Philippines arrests Chinese national suspected of spying on critical infrastructure - The Cyber Post …

: Belsen Group Leaks 15,000+ FortiGate Firewall Configurations The Belsen Group leaked over 15,000 …

: Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers New research …

: Handala Threat Actor Group: Key Insights into Emerging Cybersecurity Risks The Handala Hacker Group, established in December 2023, is a politically motivated cyber threat …

: 2025 cyber threats are battlefield for organizations - The Jerusalem Post The cyber threat landscape …

: New IoT Botnet Launching Large-Scale DDoS Attacks Hijacking IoT Devices A new IoT botnet, leveraging …

: Windows Common Log File System Zero-day Vulnerability (CVE-2024-49138) Exploited A critical zero-day …

: Researchers Identify Principles to Reduce Noise in Network Intrusion Detection Systems in SOC …

: PoC Exploit Released For QNAP Remote Code Execution Vulnerability A critical remote code execution …

: New Android Malware Mimics Chat App to Steal Sensitive Data A new Android malware campaign, …

: Cyber attack cost Synnovis estimated £32.7m in 2024 The cyber attack on Synnovis in June 2024 …

: Why social engineering is still the top cyber security threat – and what to do about it Social …

: Philippines fortifies cyber defense, partnering with Japan, U.S. and others – Indo-Pacific Defense …

: US, Nordic-Baltic allies focus on undersea cable security amid cyber incidents, as NATO begins …

: Tougher enforcement measures on cyber fraud | China | Law.asia China has implemented stricter …

: Microsoft just renamed Office on everyone’s PCs, and the new name isn’t great Microsoft …

: AWS pledges to spend $5B in Mexico, launches new Mexico server region | TechCrunch Amazon Web …

: Harry Potter publisher breached, millions of records lifted • The Register Scholastic, the publisher …

: Most common four-digit PIN numbers that put you at risk of cyberattacks are revealed - News - UNILAD …

: How Star Blizzard Exploits WhatsApp in Spear Phishing Campaign - SOCRadar® Cyber Intelligence Inc. …

: HPE Investigating Breach Claims After Hacker Offers to Sell Data - SecurityWeek HPE is investigating …

: CERT-UA warns against “security audit” requests via AnyDesk - Help Net Security …

: Otelier data breach triggers serious data security concerns - Cybersecurity Insiders Otelier, a data …

: How organizations can secure their AI code | CSO Online Organizations face security risks when using …

: One in ten GenAI prompts puts sensitive data at risk - Help Net Security A study by Harmonic …

: TikTok ban takes hold: data reveals sharp traffic decline and rapid shift to alternatives The United …

: TikTok has officially shut down in the United States - 9to5Mac TikTok has officially shut down in …

: Amazon Is Changing How It Tracks Employee Badge Data, Messages Show - Business Insider Amazon has …

: Small ThreatIntel digest of interesting information published in the last 48 hours Title: ThreatHunter.ai Halts Hundreds of Attacks in the Past 48 Hours Summary: ThreatHunter.ai has …

: One of the largest data leaks ever sees info on 1.5 billion people leaked online Massive Data Breach …

: IoT security explainer series - Atlantic Council Consumer IoT security is a complex issue despite …

: Types of Cyber Attacks & Cyber Threats Explained [2025] This article discusses various types of …

: Check Point Software’s 2025 Security Report Finds Alarming 44% Increase in Cyber-Attacks Amid …

: UN Aviation Agency ICAO Suffers Data Breach Impacting Nearly 12,000 People - CPO Magazine The …

: HHSC Notifies Public Regarding Privacy Breach | Texas Health and Human Services The Texas Health and …

: Delaware’s Multistate Tax, Inc. Files Official Notice of Data Breach

: Internal state data breach exposes info of 61,000 Texans The Texas Health and Human Services …

: Change Healthcare Ransomware Attack: Data Review “Substantially Complete” Change …

: Otelier data breach exposes info, hotel reservations of millions Otelier, a cloud-based hotel …

: Microsoft’s latest on-prem Azure is for apps clouds dislike • The Register Microsoft’s Azure Local …

: Yubico Issues Security Advisory As 2FA Bypass Vulnerability Confirmed Yubico issued a security …

: Google begins requiring JavaScript for Google Search Google has recently mandated that users enable …

: TikTok says it will ‘go dark’ in ban if US government does not intervene TikTok is set …

: RECALL: Thousands of printers sold in Canada pose fire hazard, officials say | INsauga Lexmark …

: IBM to buy Oracle consultancy, and partner with L’Oréal IBM is acquiring Applications Software …

: Warning As PayPal Cyberattacks Continue—What You Need To Know PayPal users are being targeted by …

: B.C. lawsuit accuses Telus of exaggerating AI capabilities | Vancouver Sun Telus International is …

: The Dark Web Economy: A Hidden Marketplace Reshaping Cybersecurity - SOCRadar® Cyber Intelligence …

: US hits back against China’s Salt Typhoon group | CSO Online The US is sanctioning two Chinese …

: Employees Enter Sensitive Data Into GenAI Prompts Too Often Employees are frequently sharing …

: New York Proposes Doing Background Checks on Anyone Buying a 3D Printer New York State Assembly Bill …

: Jailing negligent management boards? EU’s aggressive financial sector regulation goes into force - …

: In Other News: Lawsuits and Settlements, CrowdStrike Phish, MITRE’s D3FEND 1.0 - SecurityWeek …

: TikTok ban: Switching to RedNote? Your privacy is at stake. | Proton TikTok, banned in the US due to …

: Wolf Haldenstein Data Breach Impacts 3.4 Million People - SecurityWeek Law firm Wolf Haldenstein …

: WhatsApp spear phishing campaign uses QR codes to add device | Malwarebytes A cybercriminal group, …

: Opting Out of Gmail’s Gemini AI Summaries Is a Mess. Here’s How to Do It, We Think …

: Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation Three critical …

: The Good, the Bad and the Ugly in Cybersecurity - Week 3 The Department of Justice (DoJ) indicted …

: AT&T hack exposes agents’ call logs leaving FBI scrambling | Cybernews The FBI is scrambling to …

: Clop ransomware gang names dozens of victims hit by Cleo mass-hack, but several firms dispute …

: Russian APT Phishes Kazakh Gov’t for Strategic Intel A suspected Russia-linked threat actor, …

: European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China European …

: Bitwarden unveils native mobile applications for iOS and Android - Help Net Security Bitwarden has …

: State of Network Threat Detection 2024 Report - Cybersecurity Insiders The 2024 State of Network …

: New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass A new …

: US Announces Sanctions Against North Korean Fake IT Worker Network - SecurityWeek The US Treasury …

: DORA arrives: Here’s what you need to know - BH Consulting The Digital Operational Resilience Act …

: Google Releases Open Source Library for Software Composition Analysis - SecurityWeek Google released …

: Poor patching regime is opening businesses to serious problems | CSO Online A recent S&P Global …

: Abandoned Online Domains Unlock Services With Google OAuth A security researcher, Dylan Ayrey, …

: Threat Brief: CVE-2025-0282 and CVE-2025-0283 Ivanti Connect Secure, Policy Secure, and ZTA gateway …

: Biden administration will leave it to Trump to implement TikTok ban - ABC News The Biden …

: Closing the Software Understanding Gap www.cisa.gov/sites/def… Today, mission owners and …

: New Star Blizzard spear-phishing campaign targets WhatsApp accounts …

: Double-Tap Campaign: Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central …

: Microsoft patches Windows to eliminate Secure Boot bypass threat arstechnica.com/security/… …

: Governments call for spyware regulations in UN Security Council meeting …

: Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws …

: CISA shares guidance for Microsoft expanded logging capabilities …

: The current state of ransomware: Weaponizing disclosure rules and more …

: N.B. Liquor cyber security woes continue | CBC News N.B. Liquor and Cannabis N.B. are experiencing a …

: Gootloader inside out – Sophos News Gootloader, a malware family, uses a sophisticated social …

: Russian Cyberspies Caught Spear-Phishing with QR Codes, WhatsApp Groups - SecurityWeek Russian …

: Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches The Clop …

: Avery had credit card skimmer stuck on its site for months | Malwarebytes Avery experienced a data …

: One Active Directory Account Can Be Your Best Early Warning - Black Hills Information Security One …

: Incorporating AI agents into SOC workflows | Red Canary AI agents are transforming security …

: Millions of Internet Hosts Vulnerable to Attacks Due to Tunneling Protocol Flaws - SecurityWeek Over …

: The mystery of the $75M ransom payment to Dark Angels | TechTarget Dark Angels, a Russian-speaking …

: Final Biden Cybersecurity EO Uses Federal Purchasing Power President Biden’s final executive order …

: 380,000 Impacted by Data Breach at Cannabis Retailer Stiiizy - SecurityWeek Cannabis retailer …

: Pumakit: A Sophisticated Linux Rootkit Targeting Critical Infrastructure - SOCRadar® Cyber …

: Cyber Insights 2025: Identities - SecurityWeek In 2025, securing identities, both human and machine, …

: FTC orders GoDaddy to fix its infosec practices | CSO Online The FTC has ordered GoDaddy to improve …

: Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions Cybersecurity …

: Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer Threat actors are …

: Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them? - Help Net Security …

: 2024 US Healthcare Data Breaches: 585 Incidents, 180 Million Compromised User Records - SecurityWeek …

: MikroTik botnet relies on DNS misconfiguration to spread malware A 13,000-device MikroTik botnet, …

: New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344) - Help Net Security ESET …

: PlugX malware deleted from thousands of systems by FBI | Malwarebytes The FBI successfully removed …

: Scammers Exploit California Wildfires, Posing as Fire Relief Services Cybercriminals are exploiting …

: Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager Ivanti has …

: SIEM buyer’s guide: Top 15 security information and event management tools — and how to choose | CSO …

: O’Reilly 2025 Tech Trends: AI Skills Surge As Security Takes Center Stage The 2025 O’Reilly …

: North Korea targeting software developers with Malware - Cybersecurity Insiders Lazarus Group, a …

: DOJ, FBI Dismantle Malware Used By China-Backed Hackers In Global Operation The US Department of …

: RansomHub Affiliates Exploit AI-Generated Python Backdoor In Advanced Cyberattacks RansomHub …

: UK Government Seeking To ‘Turbocharge’ Growth Through AI The UK government’s AI Opportunities Action …

: Threat actor leaked config files and VPN passwords for over Fortinet Fortigate devices A threat …

: CISA warns second BeyondTrust vulnerability also exploited in the wild | CSO Online CISA added a …

: GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal …

: Replit CEO on AI breakthroughs: ‘We don’t care about professional coders anymore’ | Semafor Replit, …

: Microsoft Releases January 2025 Security Updates | CISA

: Meta announces 5% cuts targeting low performers. Read the memo Meta will lay off approximately 5% of …

: Snyk Says ‘Malicious’ NPM Packages Part of Research Project - SecurityWeek Snyk, a …

: FBI Deletes More Than 4,000 PlugX Malware Instances The FBI, in collaboration with the French police …

: Beware cybersecurity tech that’s past its prime — 5 areas to check or retire | CSO Online …

: SAP security advisory – January 2025 monthly rollup (AV25-017) - Canadian Centre for Cyber Security

: SAP Patches Critical Vulnerabilities in NetWeaver - SecurityWeek SAP released 14 security notes, …

: Todyl IDs Foreign Threat Actors Using U.S. ISPs Todyl, a cybersecurity company, has identified a …

: Verizon provides update on Salt Typhoon cyberattack, confirms incident containment - Industrial …

: US, Japan, South Korea warn of rising North Korean crypto hacking threats The United States, Japan, …

: Location tracking company Unacast tells Norway its data was hacked, broadcaster says | Reuters …

: NHS Ransomware Hack Caused Patient Harm in UK, Data Shows - Bloomberg A Russian cybercrime group, …

: Apple iPhone USB-C Hacked—What Users Need To Know Security researchers have successfully hacked the …

: Apple Security Researcher Says Latest Crypto MacOS Malware Is Overblown - Decrypt A new strain of …

: ‘Scam City is growing’: how Myanmar’s cyber fraud hubs outfox efforts to shut them down | South …

: Robinhood to Pay $45 Million SEC Settlement Over Data Breach, Other Violations - WSJ Robinhood will …

: A breach of Gravy Analytics' huge trove of location data threatens the privacy of millions | …

: The Evolution of Ransomware: From Simple Encryption to Double Extortion Tactics - SOCRadar® Cyber …

: Insurance company accused of using secret software to illegally collect and sell location data on …

: An Overview of the Nominet Security Breach Tied to Ivanti VPN Vulnerability (CVE-2025-0282) - …

: New Codefinger Ransomware Exploits AWS to Encrypt S3 Buckets A new ransomware campaign, attributed …

: CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks - SecurityWeek CISA warns of …

: One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph …

: Critical Aviatrix Controller Vulnerability Exploited Against Cloud Environments - SecurityWeek A …

: Malicious Kong Ingress Controller Image Found on DockerHub A critical security breach occurred when …

: Illicit HuiOne Telegram Market Surpasses Hydra, Hits $24 Billion in Crypto Transactions HuiOne …

: Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces A new …

: Russian-Linked Hackers Target Kazakhstan in Espionage Campaign with HATVIBE Malware Russian-linked …

: Gen AI strategies put CISOs in a stressful bind | CSO Online CISOs are under pressure from …

: IntelBroker Unmasked: KELA’s In-Depth Analysis of a Cybercrime Leader • KELA Cyber Threat …

: 2025 AI Insights: Threat Detection and Response - Cybersecurity Insiders In 2025, AI will …

: Infostealer Infections Lead to Telefonica Ticketing System Breach - SecurityWeek Infostealer malware …

: Hotel chain ditches Google search for DuckDuckGo — ‘subjected to fraud attempts daily’ | CSO Online …

: New Amazon Ransomware Attack—‘Recovery Impossible’ Without Payment

: xAI’s Grok iOS app has launched, delivering cutting-edge technology right to your pocket. From …

: A comprehensive analysis of global mobility trends and international travel documentation reveals …

: The recent OpenAI web crawler incident affecting Triplegangers highlights a critical emerging threat …

: Texas sues Allstate, alleging it violated data privacy rights of 45 million Americans - The Cyber …

: Cyberattackers Hide Infostealers in YouTube Comments Cyberattackers are using YouTube and Google …

: Attackers are encrypting AWS S3 data without using ransomware - Help Net Security Codefinger, a …

: Telefonica Breach Exposes Jira Tickets, Customer Data Telefonica, a major telecom company, suffered …

: [Control systems] CISA ICS security advisories (AV25–015) - Canadian Centre for Cyber Security

: Dell security advisory (AV25-014) - Canadian Centre for Cyber Security

: The new rules for AI and encrypted messaging, with Mallory Knodel (Lock and Code S06E01) | …

: Ubuntu security advisory (AV25-013) - Canadian Centre for Cyber Security

: IBM security advisory (AV25-012) - Canadian Centre for Cyber Security

: The Shifting Landscape of Open Source Security Open source software (OSS) will face increased …

: Infostealer Masquerades as PoC Code Targeting Recent LDAP Vulnerability - SecurityWeek Threat actors …

: EU law enforcement training agency data breach: Data of 97,000 individuals compromised - Help Net …

: Juniper Networks Fixes High-Severity Vulnerabilities in Junos OS - SecurityWeek Juniper Networks …

: CISA and US and International Partners Publish Guidance on Priority Considerations in Product …

: NB Liquor stores open for cash transactions only after ‘potential cyber threat’

: Telcos removing Huawei equipment left in the lurch after Trudeau kills cyber bill - The Logic …

: Global Cybersecurity Outlook 2025 – Navigating Through Rising Cyber Complexities > Press releases …

: ASML-Backed Dutch University Suspends Classes After Cyber Attack - Bloomberg Eindhoven University of …

: Microsoft rules out layoffs in India amid global job cuts - The Hindu BusinessLine Microsoft has no …

: Phishing texts trick Apple iMessage users into disabling protection Cybercriminals are exploiting a …

: White House Moves to Restrict AI Chip Exports The Biden administration is implementing new export …

: What Is Vulnerability Management? | Tripwire Vulnerability management is a continuous process of …

: The $55 Billion Wake-Up Call: Cybersecurity Challenges Facing UK Businesses | Tripwire UK businesses …

: Dux Human Health Breach, U.S. Credit Card Sale, Boulanger Database Leak, and More - SOCRadar® Cyber …

: A week in security (January 6 - January 12) | Malwarebytes Malwarebytes Labs covered various …

: WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables A new credit card …

: Chainsaw: Open-source tool for hunting through Windows forensic artefacts - Help Net Security …

: NoName057 targets Italy again after Zelensky’s visit to the country Pro-Russia hacktivist …

: Fake PoC Exploit Targets Cybersecurity Researchers with Malware A fake proof-of-concept exploit, …

: Muddling Meerkat Linked to Domain Spoofing in Global Spam Scams Infoblox researchers investigating …

: Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation Microsoft is suing a …

: Telefónica confirms internal ticketing system breach after data leak Telefónica, a Spanish …

: PowerSchool data breach: what to know A data breach impacting several school boards across the …

: PowerSchool’s Breach Fallacy: Paying Criminals for Promises PowerSchool, a K-12 student …

: Report: Chinese Hackers Breached CFIUS - GovInfoSecurity Chinese hackers breached the U.S. Treasury …

: Russia Carves Out Commercial Surveillance Success Russian wiretapping technology, SORM, is being …

: Slovakia’s land registry hit by biggest cyberattack in country’s history, minister says - The Cyber …

: Apps That Are Spying on Your Location - Schneier on Security Thousands of apps, including popular …

: BayMark Health Services sends breach notifications after ransomware attack | Malwarebytes BayMark …

: Juniper Networks security advisory (AV25-011) - Canadian Centre for Cyber Security Juniper Networks …

: The Good, the Bad and the Ugly in Cybersecurity - Week 2 The U.S. government launched the Cyber …

: In Other News: Bank of America Warns of Data Breach, Trucking Cybersecurity, Treasury Hack Linked to …

: Chinese APT Group Is Ransacking Japan’s Secrets A Chinese APT group, MirrorFace, has been …

: Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense …

: Green Bay Packers' Online Pro Shop Sacked by Payment Skimmer www.trendmicro.com/en_us/res… In …

: US Treasury hack linked to Silk Typhoon Chinese state hackers …

: UK Internet Domain Registry Nominet Suffers Cyber Attack www.ispreview.co.uk/index.php… The …

: Major Addiction Treatment Firm BayMark Confirms Ransomware Attack Caused Data Breach - SecurityWeek …

: FunkSec – Alleged Top Ransomware Group Powered by AI - Check Point Research The FunkSec ransomware …

: Major Cyber Attacks in Review: December 2024 - SOCRadar® Cyber Intelligence Inc. December 2024 saw a …

: Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices A Google …

: RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns RedDelta, a …

: CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig Cryptominer CrowdStrike warns of …

: January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance - Help Net Security …

: New Banshee Malware Targeting MacOS Users Remained Undetected For Months A new, sophisticated …

: Huge Changes Predicted For The Data Privacy Landscape The data privacy landscape in 2025 will face …

: SEC rule confusion continues to put CISOs in a bind a year after a major revision | CSO Online …

: The SBI fake banking app shows that SMS authentication has had its day - Help Net Security A scam …

: People Think AI Images of Hollywood Sign Burning Are Real AI-generated images of the Hollywood sign …

: New Mirai botnet targets industrial routers | CSO Online A new variant of the Mirai botnet, …

: Space Bears Ransomware: What You Need To Know | Tripwire Space Bears, a ransomware group aligned …

: GroupGreeting e-card site attacked in “zqxq” campaign | Malwarebytes Malwarebytes uncovered a …

: New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption A …

: Medical Billing Firm Medusind Says Data Breach Impacts 360,000 People - SecurityWeek Medusind, a …

: MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan China-linked threat actor …

: Discovering Splinter: A First Look at a New Post-Exploitation Red Team Tool A new post-exploitation …

: Exploitation of New Ivanti VPN Zero-Day Linked to Chinese Cyberspies - SecurityWeek Google Cloud’s …

: Zero-day vulnerability in Sonicwall SSL VPN is attacked | heise online Sonicwall is releasing …

: 6th January– Threat Intelligence Report - Check Point Research Check Point Research released a …

: 7 Lessons From A Year Of Unprecedented Cyber Attacks The past year saw an unprecedented surge in …

: Law Firm Kotz Sangster Wysocki Files Notice of Data Breach Following February 2024 Cyberattack

: Excelsior Orthopaedics Files Notice of Data Breach Affecting an Estimated 357,000

: School districts impacted by PowerSchool data breach

: Ott Cone & Redpath Provides Notice of Data Breach to 22,171 Individuals

: Medusind, Inc. Data Breach Exposes Personal Information: Murphy Law Firm Investigates Legal Claims …

: Pediatric Home Service Files Official Notice of Data Breach

: Cyber breach response: Best practices to protect privilege in data breach investigations | Managed …

: Major data breach hits NC schools. Plus, what’s next for Chromebooks? | WUNC A major data breach …

: PowerSchool discloses breach affecting hosted and self-hosted school k-12 districts – …

: United Nations aviation agency hacked, database plundered The International Civil Aviation …

: Hong Kong: The first draft of the new critical infrastructures cybersecurity law is here - Global …

: SOC Scalability: How AI Supports Growth Without Overloading Analysts Scaling security operations …

: It’s Time Businesses Address The UK’s Cybersecurity Talent Shortage The UK faces a significant …

: SOAR buyer’s guide: 11 security orchestration, automation, and response products — and how to choose …

: VIPRE Security Shares Cybersecurity Trends For 2025 In 2025, AI-powered phishing will become a …

: Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd - Help Net Security …

: Top 5 Malware Threats to Prepare Against in 2025 - The Cyber Post Five common malware families, …

: Top 5 Malware Threats to Prepare Against in 2025 - The Cyber Post Five common malware families, …

: India Readies Overhauled National Data Privacy Rules India has drafted rules to implement its …

: Google Starts Tracking All Your Devices In 6 Weeks—Forget Chrome And Android Google is set to …

: Microsoft Plans Job Cuts and Is Focused on Underperforming Employees - Business Insider Microsoft is …

: High-Paying Security Career: Choosing a Path, Getting There Cybersecurity offers high-paying …

: European Court Fines European Commission for Privacy Violation The European Court of Justice ruled …

: SonicWall warns of an exploitable SonicOS vulnerability SonicWall warns of an authentication bypass …

: Green Bay Packers Fans Sacked by Online Payment Skimmer The Green Bay Packers’ online Pro Shop …

: New Research: Enhancing Botnet Detection with AI using LLMs and Similarity Search | Rapid7 Blog …

: Palo Alto Networks security advisory (AV25-009) - Canadian Centre for Cyber Security

: Ivanti security advisory (AV25-008) - Canadian Centre for Cyber Security

: Russian internet provider confirms its network was ‘destroyed’ following attack claimed by Ukrainian …

: Abandoned Backdoors: How Malicious Infrastructure Lives On Researchers from watchTowr, an attack …

: SonicWall security advisory (AV25-007) - Canadian Centre for Cyber Security

: Japan and Philippines face Cyber Attacks from China - Cybersecurity Insiders Chinese-backed cyber …

: Japan Links Chinese Hacker MirrorFace to Dozens of Cyberattacks Targeting Security and Tech Data - …

: The U.S. Cyber Trust Mark set to launch - Help Net Security The U.S. Cyber Trust Mark program, …

: New PayPal Phishing Scam Exploits MS365 Tools and Genuine-Looking Emails A new PayPal phishing scam …

: End of the Year Report 2024: Uncovering Global Cyber Threats and Trends - SOCRadar® Cyber …

: Walker Co. Schools alerting parents, educators of student information system data breach

: Northeast Rehabilitation Hospital Network Data Breach Alert: Issued by Wolf Haldenstein Adler …

: OpenVPN Connect Vulnerability Let Attackers Access Users’ Private Keys A critical vulnerability, …

: Google warns of legit VPN apps being used to infect devices with malware | TechRadar Malicious …

: Thousands Impacted by Casio Data Breach - SecurityWeek Casio completed its investigation into a …

: Scammers Impersonate Authorities to Swipe OTPs with Remote Access Apps Cybercriminals in the Middle …

: Insider Threat: Tackling the Complex Challenges of the Enemy Within - SecurityWeek The insider …

: Gravy Analytics Breach Puts Millions of Location Records at Risk and Highlights Privacy Threats - …

: Millions of Email Servers Exposed Due to Missing TLS Encryption Millions of email servers worldwide …

: FCC Launches ‘Cyber Trust Mark’ for IoT Devices to Certify Security Compliance The FCC …

: FCC Launches ‘Cyber Trust Mark’ for IoT Devices to Certify Security Compliance The FCC …

: The biggest data breach fines, penalties, and settlements so far | CSO Online Data breaches and …

: Ransomware Targeting Infrastructure Hits Telecom Namibia Telecom Namibia fell victim to a ransomware …

: State-Funded Actors Are Driving the Ransomware Threat Landscape - Cybersecurity Insiders …

: Meta Open-Sources Byte Latent Transformer LLM with Improved Scalability - InfoQ Meta open-sourced …

: Microsoft declares 2025 the year of Windows 11 • The Register Microsoft is pushing for Windows 11 …

: The unlicensed OneDrive fun ends this month • The Register Microsoft will begin enforcing a policy …

: From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch Cyber …

: Cyber attack on Kingston Police | Quinte News Kingston (Ontario) Police experienced a cyber incident …

: Threat actors breached the Argentina’s airport security police (PSA) payroll Threat actors breached …

: Hackers Claim Massive Breach of Location Data Giant, Threaten to Leak Data Hackers claim to have …

: The deepfake threat just got a little more personal | CSO Online Researchers at Google DeepMind and …

: Two ransomware groups claimed they attacked Rutherford County Schools. One leaked sensitive records. …

: Financial Data Leaked In City Bank Hack | City Bank data breach: Client financial statements sold on …

: Dell, HPE, MediaTek Patch Vulnerabilities in Their Products - SecurityWeek MediaTek, HPE, and Dell …

: Critical Infrastructure Ransomware Attack Tracker Reaches 2,000 Incidents - SecurityWeek Temple …

: Comprehensive Guide to IoC Enrichment and SOCRadar’s New IoC Enrichment Module - SOCRadar® …

: US adds Tencent to the list of companies supporting Chinese military The US Department of Defense …

: Gen AI is transforming the cyber threat landscape by democratizing vulnerability hunting | CSO …

: US military allocated about $30 billion to spend on cybersecurity in 2025 | CSO Online The 2025 …

: ICAO Investigates Data Breach as Hacker Claims to Sell Sensitive Data gained from Cyber Attack - …

: Cyberbro: Open-source tool extracts IoCs and checks their reputation - Help Net Security Cyberbro is …

: Moxa Devices Vulnerable To Cyberattacks, Threatening Industrial Networks Critical vulnerabilities in …

: China’s Salt Typhoon Adds to Telecom Cyber Victim List Chinese state-backed hackers, Salt …

: IBM security advisory (AV25-003) - Canadian Centre for Cyber Security

: HPE security advisory (AV25-002) - Canadian Centre for Cyber Security

: Telegram Hands U.S. Authorities Data on Thousands of Users Telegram provided U.S. authorities with …

: Dell security advisory (AV25-001) - Canadian Centre for Cyber Security

: Hackers reportedly compromise Argentina’s airport security payroll system - The Cyber Post …

: Ransomware attacks on Germany Fraunhofer and Japan Nikki Universal - Cybersecurity Insiders The …

: England residents asked to reboot their devices for Cybersecurity reasons - Cybersecurity Insiders …

: Violent Hackers Are Using U-Haul To Dox Targets Hackers are exploiting U-Haul employee accounts to …

: Nessus scanner agents went offline due to a faulty plugin update Tenable disabled Nessus scanner …

: Out With the Old, In With the New: Securely Disposing of Smart Devices | Rapid7 Blog Properly …

: Vulnerability Summary for the Week of December 30, 2024 | CISA The CISA Vulnerability Bulletin …

: Cybersecurity M&A Roundup: 37 Deals Announced in December 2024 - SecurityWeek Thirty-seven …

: Top 4 incident response certifications to consider in 2025 | TechTarget Four incident response …

: Dark Web Profile: Kairos Extortion Group - SOCRadar® Cyber Intelligence Inc. The Kairos Extortion …

: Tenable Disables Nessus Agents Over Faulty Updates - SecurityWeek Tenable disabled Nessus agent …

: GS Retail announced a data breach affecting 90,000 customers, with personal information including …

: New York City’s new congestion toll kicks in. What drivers need to know - National | Globalnews.ca …

: Microsoft to Spend $80 Billion on AI Data Centers This Year - Barron’s Microsoft announced …

: Hospitals in China overwhelmed by surge in HMPV patients raising concern - The Jerusalem Post China …

: Critical ‘Rising Risk’ Attack Alert—Change Your Router Password Now IBM X-Force warns that 86% of …

: IBM Canada has opened its new headquarters in Markham, focusing on agentic AI, a new innovation in …

: Scientists Built a Proton Battery That Could Dethrone Lithium-Ion Scientists at the University of …

: Longtime Tenable CEO, NetWitness Head Amit Yoran Dies at 54 Amit Yoran, a prominent figure in …

: The U.S. Surgeon General has issued a critical new advisory highlighting alcohol as a leading …

: Japanese Businesses Hit By a Surge In DDoS Attacks A surge in distributed denial-of-service (DDoS) …

: Researchers Uncover Nuclei Vulnerability Enabling Signature Bypass and Code Execution A …

: PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps A new malware called …

: FireScam info-stealing malware supports spyware capabilities Cyfirma warns of FireScam, an Android …

: Thousands of Buggy BeyondTrust Systems Remain Exposed Nearly 9,000 BeyondTrust systems remain …

: No need to hack when it’s leaking: Roomster edition – DataBreaches.Net A data leak on Roomster …

: Richmond University Medical Center data breach impacted 674,033 individuals Richmond University …

: Atos, contractor for French military and intelligence agencies, dismisses ransomware attack claims - …

: Metasploit 2024 Annual Wrap-Up | Rapid7 Blog Metasploit added support for ESC8, an AD CS attack that …

: ShredOS is an entire OS just for destroying data - Boing Boing ShredOS is a Linux distribution …

: Multi-Path TCP: revolutionizing connectivity, one path at a time Multi-Path TCP (MPTCP) is a …

: Dark Web Monitoring Tools and How They Benefit Businesses - SOCRadar® Cyber Intelligence Inc. Dark …

: NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT A malicious NPM package disguised as an …

: New York Hospital Says Ransomware Attack Data Breach Impacts 670,000 - SecurityWeek Richmond …

: Around 3.3M POP3 and IMAP mail servers lack TLS encryption Over 3 million POP3 and IMAP mail servers …

: LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers A proof-of-concept …

: Critical Deadline: Update Old .NET Domains Before January 7, 2025 to Avoid Service Disruption …

: Apple accused of collecting user data from Siri queries - Cybersecurity Insiders Apple is facing a …

: Diving Into Azure Lateral Movement With Pass-the-PRT Pass-the-PRT is a sophisticated attack method …

: Every minute, 4,080 records are compromised in data breaches - Help Net Security The world’s …

: Active Directory Flaw Can Crash Any Microsoft Server A critical Active Directory Domain Controller …

: UN General Assembly Adopts Cybercrime Treaty The UN General Assembly adopted the Convention against …

: Volkswagen massive data leak caused by a failure to secure AWS credentials | CSO Online Volkswagen’s …

: Fake 7-Zip Exploit Code Traced to AI-Generated Misinterpretation A recent claim of a critical …

: Japan’s largest mobile carrier says cyberattack disrupted some services - The Cyber Post NTT …

: DoubleClickjacking allows clickjacking on major websites DoubleClickjacking, a new technique, …

: Volkswagen Breach Exposes Data of 800K EV Customers Volkswagen Group experienced a data breach …

: Dozens of Chrome extensions hacked in threat campaign | TechTarget Dozens of Google Chrome …

: Lumen reports that it has locked out the Salt Typhoon group from its network China-linked APT group …

: SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach | CSO Online …

: Kata Containers: Open-source container runtime, building lightweight VMs - Help Net Security Kata …

: Hacked on Christmas, DEphoto starts notifying customers, only to be attacked again – …

: 1-800-ChatGPT - Calling and Messaging ChatGPT with your phone | OpenAI Help Center 1-800-ChatGPT is …

: Air Fryer espionage raises data security concerns - Cybersecurity Insiders Smart air fryers, praised …

: FortiGuard Labs Links New EC2 Grouper Hackers to AWS Credential Exploits FortiGuard Labs researchers …

: Cybersecurity news headlines trending on Happy New Year 2025 - Cybersecurity Insiders …

: Finland identifies seven suspects among crew of alleged Russian ‘spy’ tanker - The Cyber …

: 6 AI-Related Security Trends to Watch in 2025 AI tools, particularly generative AI and large …

: ClickFix Campaign: Fake Google Meet Alerts Spread Malware Across Windows and macOS - SOCRadar® Cyber …

: Water Makara Campaign: A Sophisticated Spear-Phishing Attack on Brazilian Enterprises - SOCRadar® …

: Dark Web Profile: Gamaredon APT - SOCRadar® Cyber Intelligence Inc. Gamaredon APT, active since …

: Top 12 ways hackers broke into your systems in 2024 | CSO Online In 2024, hackers exploited a mix of …

: Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents In December …

: Chinese Hackers Accessed US Treasury Workstations in ‘Major' Cybersecurity Incident - SecurityWeek …

: Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation …

: U.S. Army Soldier Arrested in AT&T, Verizon Extortions – Krebs on Security A U.S. Army soldier, …

: Hottest cybersecurity open-source tools of the month: December 2024 - Help Net Security This month’s …

: New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits - The Cyber Post The …

: An X user claimed a 7-Zip zero-day vulnerability, but 7-Zip’s creator says is a fake A Twitter …

: Study Finds AI Can Guess Crypto Seed Phrases in 0.02 Seconds A study by NFTEvening and Storible …

: A boy created AI-generated porn with the faces of girls he knew. Why Toronto police said he …

: The Threat of SIM Swapping Attacks on Financial Institutions - SOCRadar® Cyber Intelligence Inc. SIM …

: US Finalizes Rule Throttling Bulk Data Sales to China The U.S. government finalized a rule …

: White House Clears HIPAA Security Rule Update The U.S. Department of Health and Human Services (HHS) …

: 2024 Attack Surface Threat Intelligence Report - Cogility - TacitRed - Cybersecurity Insiders The …

: Blue Yonder says November ransomware attack not connected to Cleo vulnerability - The Cyber Post …

: US adds 9th telecom company to list of known Salt Typhoon targets - The Cyber Post A Chinese …

: North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign North Korean threat …

: Prioritizing patching: A deep dive into frameworks and tools – Part 1: CVSS – Sophos News CVSS is a …

: Volkswagen data breach of Electric cars and D Link router botnet attack - Cybersecurity Insiders …

: Apache security advisory (AV24-731) - Canadian Centre for Cyber Security

: Palo Alto Networks security advisory (AV24-730) - Canadian Centre for Cyber Security

: Top 10 Identity Attacks in 2024: Protecting Credentials in a Digital World - SOCRadar® Cyber …

: The Best, the Worst and the Ugliest in Cybersecurity | 2024 Edition 2024 saw both positive and …

: Defining & Defying Cybersecurity Staff Burnout Cybersecurity burnout, characterized by …

: 2024 in AI: It’s changed the world, but it’s not all good | Malwarebytes In 2024, AI …

: What’s new in Cloudflare: MASQUE now powers 1.1.1.1 & WARP apps, DEX now generally available …

: Quantum Computing Advances in 2024 Put Security In Spotlight Google’s announcement of its Willow …

: Cloud Atlas Deploys VBCloud Malware: Over 80% of Targets Found in Russia Cloud Atlas, a threat actor …

: Dark Web Profile: Storm-842 (Void Manticore) - SOCRadar® Cyber Intelligence Inc. Storm-842, also …

: Palo Alto Releases Patch for PAN-OS DoS Flaw — Update Immediately Palo Alto Networks has released a …

: FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks Cybersecurity …

: Apache MINA CVE-2024-52046: CVSS 10.0 Flaw Enables RCE via Unsafe Serialization Apache MINA has a …

: The future of data and AI: Seven trends shaping 2025 and beyond - Help Net Security Seven trends …

: Law enforcement agencies see AI as a key tool for reducing crime - Help Net Security A U.S. national …

: Reflecting on humanity’s incredible pace of innovation: Just 66 years separated the Wright brothers’ …

: Netflix is suing Broadcom’s VMware over virtual machine patents | TechSpot Netflix is suing …

: A new Mirai botnet variant targets DigiEver DS-2105 Pro DVRs Akamai researchers discovered a new …

: SEC Disclosures Up, But Not Enough Details Provided The new SEC cybersecurity disclosure rules have …

: The Intersection of AI and OSINT: Advanced Threats On The Horizon - SecurityWeek Open Source …

: Defense Giant General Dynamics Says Employees Targeted in Phishing Attack - SecurityWeek General …

: Cl0p Ransomware Group to Name Over 60 Victims of Cleo Attack - SecurityWeek Cl0p ransomware group …

: Researchers Uncover Dark Web Operation Entirely Focused on KYC Bypass iProov uncovered a dark web …

: Dark Web Profile: Trinity Ransomware - SOCRadar® Cyber Intelligence Inc. Trinity ransomware, first …

: DDoS Attacks Surge as Africa Expands Its Digital Footprint Organizations in North African countries …

: 2024 Cloud Security Report Fortinet - Cybersecurity Insiders The 2024 Cloud Security Report reveals …

: How are you securing your communications in the wake of the Volt Typhoon revelations? | CSO Online …

: Cybersecurity Resolutions: Skill Sets to Prioritize in 2025 Cybersecurity professionals should …

: iOS devices more exposed to phishing than Android - Help Net Security The mobile threat landscape is …

: SEO Poisoning: How Scammers Turn Search Engines into Traps SEO poisoning is a cyber threat where …

: Pittsburgh Regional Transit attributes recent service disruptions to ransomware attack - The Cyber …

: Iran’s Christmas Cyber Attack on Israeli Tech Firm Sparks Alarm - Cybersecurity Insiders Iran …

: JAL’s system under cyberattack, domestic and international flights delayed Japan Airlines …

: Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts …

: Clop ransomware is now extorting 66 Cleo data-theft victims …

: Sweden says China denied request for prosecutors to board ship linked to severed cables …

: The 2024 cyberwar playbook: Tricks used by nation-state actors | CSO Online Nation-state actors in …

: Iran’s Charming Kitten Deploys BellaCPP: A New C++ Variant of BellaCiao Malware Charming …

: Top Phishing Tricks Attackers Use to Target Employees & The Recent ‘You’re Fired’ Campaign …

: Critical SQL Injection Vulnerability in Apache Traffic Control Rated 9.9 CVSS — Patch Now A critical …

: Ruijie Networks' Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks Cybersecurity …

: FAA halts all American Airlines flights in the US after airline reports technical issues systemwide …

: Microsoft Teams Rooms introduces digital signage and AI features to revolutionize hybrid workspaces …

: This VPN sells access to people’s home internet networks | Tom’s Guide Big Mama VPN, a …

: How Will Health Data Privacy, Cyber Regs Shape Up in 2025? States are expected to continue enacting …

: Online Extortion Gang Clop Threatens Cleo Hacking Victims The Clop cybercriminal group, responsible …

: Postman Workspaces Leak 30000 API Keys and Sensitive Tokens CloudSEK researchers discovered over …

: Python Malware in Zebo-0.1.0 and Cometlogger-0.1 Found Stealing User Data Fortinet FortiGuard Lab …

: Adobe security advisory (AV24–729) - Canadian Centre for Cyber Security

: Dark Web Profile: Just Evil - SOCRadar® Cyber Intelligence Inc. Just Evil, a pro-Russian cyber …

: Dark Web Profile: CosmicBeetle (NoName) Ransomware - SOCRadar® Cyber Intelligence Inc. CosmicBeetle, …

: Dark Web Profile: APT31 - SOCRadar® Cyber Intelligence Inc. APT31, a Chinese state-sponsored hacking …

: Dark Web Profile: SpaceBears - SOCRadar® Cyber Intelligence Inc. SpaceBears, a new data broker …

: Dark Web Profile: Dark Angels - SOCRadar® Cyber Intelligence Inc. Dark Angels, a sophisticated …

: Dark Web Profile: LockBit 3.0 Ransomware - SOCRadar® Cyber Intelligence Inc. LockBit 3.0, a …

: Dark Web Profile: ShinyHunters - SOCRadar® Cyber Intelligence Inc. ShinyHunters, a cyber threat …

: Dark Web Profile: BlackCat (ALPHV) - SOCRadar® Cyber Intelligence Inc. BlackCat, or ALPHV, is a …

: Dark Web Profile: Hunters International - SOCRadar® Cyber Intelligence Inc. Hunters International, a …

: Dark Web Profile: INC Ransom - SOCRadar® Cyber Intelligence Inc. INC Ransom is a sophisticated …

: Dark Web Profile: Ymir Ransomware - SOCRadar® Cyber Intelligence Inc. Ymir ransomware, originating …

: Dark Web Profile: UserSec - SOCRadar® Cyber Intelligence Inc. UserSec, a pro-Russian hacktivist …

: Dark Web Profile: KillSec - SOCRadar® Cyber Intelligence Inc. KillSec, a threat actor active since …

: Dark Web Profile: RansomHub - SOCRadar® Cyber Intelligence Inc. RansomHub, a new ransomware group, …

: Dark Web Profile: Evil Corp - SOCRadar® Cyber Intelligence Inc. Evil Corp, a pro-Russian hacktivist …

: Dark Web Profile: Bashe (APT73) - SOCRadar® Cyber Intelligence Inc. Bashe, a ransomware group active …

: American Addiction Centers Data Breach Impacts 422,000 People - SecurityWeek American Addiction …

: When the world logs off: Christmas, New Year’s, and the Internet’s holiday rhythm Internet traffic …

: North Korean Hackers Pull Off $308M Bitcoin Heist from Crypto Firm DMM Bitcoin North Korean hackers, …

: Apache Tomcat Vulnerability CVE-2024-56337 Exposes Servers to RCE Attacks Apache Tomcat servers are …

: 2025 is going to be a bumpy year for IoT - Help Net Security 2025 promises to be a tumultuous year …

: Non-Human Identities Gain Momentum, Requires Both Management, Security The rapid growth of …

: Why Hackers Love Weekend and Holiday Attacks - GovInfoSecurity Healthcare organizations are …

: Turmoil Besets Phishing-as-a-Service Toolkit Rockstar 2FA The phishing-as-a-service toolkit Rockstar …

: A Vulnerability in Apache Struts2 Could Allow for Remote Code Execution OVERVIEW: A vulnerability …

: RIBridges data breach: What RI residents should do to protect selves A data breach in Rhode Island’s …

: Brightline data breach class action settlement Brightline Inc. agreed to a class action settlement …

: McDonalds delivery customers put at risk by possible data breach | TechRadar A cybersecurity …

: Duke Energy Hit by Major Data Breach, 370,000 Customers' Sensitive Data Exposed in Security Incident …

: Alta Resources Corporation Provides Notice of Data Breach Affecting Over 37k People | Console and …

: November 2024 Healthcare Data Breach Report November 2024 saw a 15.3% increase in healthcare data …

: Records of Nearly 1,000,000 Americans Exposed As Massive Data Breach Reveals Names, Phone Numbers, …

: US Cracks Down On China For Cyber Attacks The US imposed sanctions on a Chinese cybersecurity firm …

: McAfee Predicts 2025 Cyber Threats as AI Drives Advanced Scams McAfee’s 2025 predictions highlight …

: Malaysian eatery operator arrested for selling SIM cards to Chinese cyber fraudsters - The Tribune A …

: Advent of Cyber 2024 DAY 22 — Tryhackme walkthrough | by TRedEye | Dec, 2024 | Medium Kubernetes …

: Navigating the Cyber Threat Landscape: Lessons Learned & What’s Ahead The cybersecurity …

: Organizations Need To Get Real About Threat Of Cyber Attacks Cyber attacks pose a significant risk …

: North Korean Hackers Tied to $1.3B in Stolen Crypto in 2024 North Korean hackers have stolen a …

: Beware Of Shadow AI – Shadow IT’s Less Well-Known Brother - SecurityWeek Shadow AI, the …

: IBM security advisory (AV24-727) - Canadian Centre for Cyber Security

: Ubuntu security advisory (AV24-726) - Canadian Centre for Cyber Security

: Middle East Cyberwar Rages On, With No End in Sight Cyberattacks between Israel and Hamas, fueled by …

: Global elections in 2024: Internet traffic and cyber threat trends The 2024 elections saw a rise in …

: Government to Name ‘Key Witness’ Who Provided FBI With Backdoored Encrypted Chat App Anom The …

: AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case Cybersecurity …

: Vulnerability Summary for the Week of December 16, 2024 | CISA The CISA Vulnerability Bulletin …

: 5.6 Million Impacted by Ransomware Attack on Healthcare Giant Ascension - SecurityWeek Ascension …

: Supply Chain Attack Hits Rspack, Vant npm Packages with Monero Miner Popular npm packages Rspack and …

: Cloud Atlas using a new backdoor, VBCloud, to steal data | Securelist Cloud Atlas, a cyber threat …

: 4 Security Controls Keeping Up with the Evolution of IT Environments | Modern IT environments, …

: Phishing Report Findings Call For A Fundamental Shift In Organizational Approaches To Defense …

: Top 7 zero-day exploitation trends of 2024 | CSO Online Zero-day vulnerabilities in network security …

: Lazarus APT targeted employees at an unnamed nuclear-related organization The North Korea-linked …

: Top 5 Ransomware Attacks and Data Breaches of 2024 - Cybersecurity Insiders The year 2024 saw a …

: Maximizing the impact of cybercrime intelligence on business resilience - Help Net Security …

: How companies can fight ransomware impersonations - Help Net Security Companies must protect data …

: MacPorts: Remote Code Execution · Advisory · google/security-research · GitHub A vulnerability in …

: Beware Feb. 3, 2025—Diabolic Ransomware Gang Issues New Attack Warning The LockBit ransomware group, …

: 10 ways I use AI to simplify my daily life Artificial Intelligence (AI) is increasingly integrated …

: Leading AI chatbots show dementia-like cognitive decline in tests, raising questions about their …

: 12 days of OpenAI: The Ars Technica recap - Ars Technica OpenAI concluded its “12 days of OpenAI” …

: Week in review: MUT-1244 targets both security workers and threat actors, Kali Linux 2024.4 released …

: The UK’s Cybersecurity Landscape: Key Trends and Challenges for 2025 - Cybersecurity Insiders The …

: BadBox rapidly grows, 190,000 Android devices infected - Security Affairs Bitsight researchers …

: Albania to close TikTok for a year | AP News Albania will ban TikTok for a year due to concerns …

: Google CEO Sundar Pichai says company slashed manager roles by 10% Google CEO Sundar Pichai has …

: Largest data breach of health information affects estimated third of U.S. population Change …

: Ascension: Health data of 5.6 million stolen in ransomware attack Ascension, a major U.S. healthcare …

: Ledger Users Targeted in New Data Breach Phishing Campaign – Security Bitcoin News A new phishing …

: The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year | Electronic …

: Chinese national cyber centre says U.S. hacks stole trade secrets from tech firms | Reuters China’s …

: Hackney Council: Cyber-attack cost ‘hundreds of thousands’ Hackney Council is spending …

: OpenAI announces new o3 models | TechCrunch OpenAI unveiled o3, a new family of reasoning models, …

: The Feds Have Some Advice for ‘Highly Targeted’ Individuals: Don’t Use a VPN | …

: Metasploit Weekly Wrap-Up 12/20/2024 | Rapid7 Blog This week’s Metasploit update includes four new …

: Sophos security advisory (AV24-725) - Canadian Centre for Cyber Security Sophos published a security …

: LockBit Ransomware Developer Arrested in Israel Rostislav Panev, a dual Russian-Israeli national, …

: Ukraine’s state registers hit with one of Russia’s largest cyberattacks, officials say - The Cyber …

: Builder.ai Database Misconfiguration Exposes 1.29 TB of Unsecured Records A publicly accessible …

: How Generative AI Is Powering A New Era Of Cybersecurity Google is set to allow advertisers to track …

: Critical Flaws Expose 25,000 SonicWall Devices to Hackers Over 25,000 SonicWall SSLVPN devices are …

: US eyes ban on TP-Link routers amid cybersecurity concerns | CSO Online The US government is …

: The Year of Takedowns: Significant Law Enforcement Operations of 2024 - SOCRadar® Cyber Intelligence …

: Exploring vulnerable Windows drivers Threat actors exploit vulnerable Windows drivers through the …

: Silent Heists: The Danger of Insider Threats | Tripwire Insider threats, both careless and …

: Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits Fortinet has …

: Lazarus targets nuclear-related organization with new malware | Securelist Lazarus group targets …

: Are threat feeds masking your biggest security blind spot? - Help Net Security Threat feeds, while …

: Banking, Utilities API Attacks Surge in India Cyberattacks targeting India-based organizations, …

: In potential reversal, European authorities say AI can indeed use personal data — without consent — …

: APT29 group used red team tools in rogue RDP attacks Russia-linked APT29 group used rogue RDP …

: Apache security advisory (AV24-722) - Canadian Centre for Cyber Security Apache published a security …

: Threat actors are attempting to exploit Apache Struts vulnerability CVE-2024-53677 Threat actors are …

: Regional Care Data Breach Impacts 225,000 People - SecurityWeek Nebraska-based healthcare insurance …

: European companies hit with effective DocuSign-themed phishing emails - Help Net Security A threat …

: APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP The Russia-linked APT29 …

: Dark Web Market: BidenCash - SOCRadar® Cyber Intelligence Inc. BidenCash, a dark web marketplace, …

: BeyondTrust Issues Urgent Patch for Critical Vulnerability in PRA and RS Products BeyondTrust …

: The Mask APT is back after 10 years of silence Kaspersky researchers linked a new wave of cyber …

: Effective Phishing Campaign Targeting European Companies and Institutions A phishing campaign …

: Data Sovereignty In A Cloud-Driven World Is Not A Given Data sovereignty in a cloud-driven world is …

: Nearly 400,000 WordPress credentials stolen | Security Magazine MUT-1244 stole over 390,000 …

: Lesson from latest SEC fine for not completely disclosing data breach details: ‘Be truthful’ | CSO …

: Thai Police Systems Under Fire From ‘Yokai’ Backdoor Hackers are targeting Thai law …

: Texas Tech Fumbles Medical Data in Massive Breach Texas Tech University’s Health Sciences Centers …

: Hackers Leak Partial Cisco Data from 4.5TB of Exposed Records Hackers leaked 2.9GB of Cisco data on …

: CISA Directs Federal Agencies to Secure Cloud Environments CISA issued a directive requiring federal …

: Namibia’s state telecom provider says hackers leaked data after it refused to pay ransom - The Cyber …

: 5 million payment card details stolen in painful reminder to monitor Christmas spending | …

: Azure Data Factory Bugs Expose Cloud Infrastructure Three vulnerabilities in Azure Data Factory’s …

: FBI warns of HiatusRAT scanning campaigns against Chinese-branded web cameras and DVRs The FBI warns …

: Foxit security advisory (AV24-720) - Canadian Centre for Cyber Security Foxit published security …

: Canada’s Top Cybersecurity Threats: How Attackers Target Critical Industries - SOCRadar® Cyber …

: DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7 The Department of …

: Hackers Use Fake PoCs on GitHub to Steal WordPress Credentials, AWS Keys A year-long cyber campaign, …

: Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks A new phishing …

: Uncovering GStreamer secrets - The GitHub Blog Antonio Morales discovered 29 vulnerabilities in …

: Texas Tech University Data Breach Impacts 1.4 Million People - SecurityWeek Texas Tech University …

: Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware The Bitter APT group, …

: Unveiling India’s Cyber Threat Landscape: Data, Trends, and Resilience - SOCRadar® Cyber …

: The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal The Mask APT, a …

: The Domino Effect of Cyber Incidents: Understanding the Ripple Impact of Cybersecurity Breaches - …

: CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign CISA and the FBI have …

: 27 DDoS-for-hire operations shut down by law enforcement | Security Magazine Law enforcement …

: European Union Sanctions Russian Malicious Cyber Actors The European Union sanctioned Russian …

: Winnti-Like Glutton Backdoor Targets Cybercriminals A new PHP-based backdoor, “Glutton,” is …

: Dirty DAG: New Vulnerabilities in Azure Data Factory’s Apache Airflow Integration Unit 42 …

: Cicada3301 Ransomware Claims Attack on French Peugeot Dealership Cicada3301, a ransomware group …

: Fourteen North Korean Nationals Indicted for Carrying Out Multi-Year Fraudulent Information …

: Black Hat Europe 2024: Key takeaways for cybersecurity pros | CSO Online Black Hat Europe 2024 …

: CVE-2024-53677 - Vulnerability impacting Apache Struts 2 - Canadian Centre for Cyber Security A …

: Ubuntu security advisory (AV24-718) - Canadian Centre for Cyber Security Ubuntu published security …

: EU issues first-ever sanctions over ‘Russian hybrid threats’ - The Cyber Post The European Council …

: IBM security advisory (AV24-717) - Canadian Centre for Cyber Security IBM published security …

: Android Zero-Day Exploited in Spyware Campaigns, Amnesty International Points to Cellebrite - …

: Vulnerability Summary for the Week of December 9, 2024 | CISA The CISA Vulnerability Bulletin …

: Microsoft Teams Vishing Spreads DarkGate RAT A new attack vector for the DarkGate remote access …

: A defender’s guide to identity attacks | Red Canary Identity attacks target authentication and …

: Citrix Warns of Password Spraying Attacks Targeting NetScaler Appliances - SecurityWeek Citrix warns …

: Dell security advisory (AV24-715) - Canadian Centre for Cyber Security Dell published security …

: DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages A malvertising …

: HPE security advisory (AV24-714) - Canadian Centre for Cyber Security HPE published security …

: 2024 Threat Landscape Statistics: Ransomware Activity, Vulnerability Exploits, and Attack Trends | …

: Major Auto Parts Firm LKQ Hit by Cyberattack - SecurityWeek LKQ Corporation, a major US auto parts …

: SRP Federal Credit Union Ransomware Attack Impacts 240,000 - SecurityWeek SRP Federal Credit Union …

: Rydox cybercrime marketplace seixed by law enforcement, suspected admins arrested Rydox, a …

: CVE Assigned to Cleo Vulnerability as Cl0p Ransomware Group Takes Credit for Exploitation - …

: Evasive Node.js loader masquerading as game hack - Help Net Security Malware peddlers are using …

: 900,000 People Impacted by ConnectOnCall Data Breach - SecurityWeek ConnectOnCall, a digital on-call …

: Security ProbLLMs in xAI’s Grok: A Deep Dive · Embrace The Red Grok, xAI’s chatbot, is …

: Amazon refuses Microsoft 365 deployment because of lax cybersecurity | CSO Online Amazon has halted …

: Rhode Island suffers major cyberattack, exposing personal data of thousands | CSO Online Rhode …

: CISA Requests Public Comment for Draft National Cyber Incident Response Plan Update | CISA CISA …

: New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide A new investment …

: Cybersecurity In 2025 – A New Era Of Complexity The cybersecurity landscape in 2025 will be shaped …

: Dark market overview and predictions for 2025 | Securelist In 2024, predictions about the growth of …

: Security experts respond to Krispy Kreme cyber attack | Security Magazine Krispy Kreme experienced a …

: The Top 10 State of Security Blog Posts From 2024 | Tripwire This year’s top cybersecurity blog …

: New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP Cybersecurity …

: Multiple flaws in Volkswagen Group’s infotainment unit allow for vehicle compromise …

: LW ROUNDTABLE: Lessons learned from the headline-grabbing cybersecurity incidents of 2024 - The Last …

: Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes The Security …

: Cellebrite Unlocked This Journalist’s Phone. Cops Then Infected it With Malware Authorities in …

: Security leaders top 10 takeaways for 2024 | CSO Online CISOs reflect on the security landscape in …

: ESET: RansomHub most active ransomware group in H2 2024 | TechTarget ESET’s Threat Report H2 2024 …

: Malicious ad distributes SocGholish malware to Kaiser Permanente employees | Malwarebytes A …

: Securing Against Shopping Scams: Cybersecurity Risks to Avoid During the Holidays - Cybersecurity …

: PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms  Elastic Security Lab …