#cybersecurity

[ follow ]
#iran
fromTechCrunch
13 hours ago
Information security

Pro-Israel hacktivist group claims reponsibility for alleged Iranian bank hack | TechCrunch

fromTechCrunch
13 hours ago
Information security

Pro-Israel hacktivist group claims reponsibility for alleged Iranian bank hack | TechCrunch

#identity-theft
#data-protection
#journalism
#information-security
Cryptocurrency
fromThe Hacker News
4 days ago

Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

Discord's invitation system has a vulnerability allowing attackers to redirect trusted links to malicious servers.
The malware campaign targets users by exploiting expired or deleted invite links.
Cryptocurrency
fromThe Hacker News
4 days ago

Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

Discord's invitation system has a vulnerability allowing attackers to redirect trusted links to malicious servers.
The malware campaign targets users by exploiting expired or deleted invite links.
#scams
#scattered-spider
fromThe Hacker News
11 hours ago

Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor

A now-patched security flaw in Google Chrome was exploited as a zero-day by a threat actor known as TaxOff to deploy a backdoor codenamed Trinper.
Privacy technologies
fromZDNET
12 hours ago

Why SMS two-factor authentication codes aren't safe and what to use instead

The company and its founder have worked with government spy agencies and surveillance industry contractors to surveil mobile phones and track user location.
Privacy technologies
#vulnerability
Privacy professionals
fromThe Hacker News
4 days ago

Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

Apple addressed a significant vulnerability in its Messages app that was exploited to target journalists with advanced spyware.
Privacy professionals
fromThe Hacker News
4 days ago

Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

Apple addressed a significant vulnerability in its Messages app that was exploited to target journalists with advanced spyware.
#aws
#risk-management
#malware
Marketing tech
fromThe Hacker News
4 days ago

Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month

A large-scale cybersecurity campaign is compromising legitimate websites through malicious JavaScript injections utilizing an obfuscation technique known as JSFireTruck.
Marketing tech
fromThe Hacker News
4 days ago

Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month

A large-scale cybersecurity campaign is compromising legitimate websites through malicious JavaScript injections utilizing an obfuscation technique known as JSFireTruck.
#cloud-computing
fromHackernoon
5 months ago
Startup companies

Bedrock Security Cofounder and CEO on Why Security Must Start with Data Visibility | HackerNoon

fromHackernoon
5 months ago
Startup companies

Bedrock Security Cofounder and CEO on Why Security Must Start with Data Visibility | HackerNoon

#data-theft
#ciso
fromIT Pro
1 day ago
Information security

How CISOs can work with business leaders to harness the power of AI

fromIT Pro
1 day ago
Information security

How CISOs can work with business leaders to harness the power of AI

#leadership
fromThe Hacker News
18 hours ago

Hard-Coded 'b' Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments

The Sitecore Experience Platform has critical security flaws that could lead to pre-authenticated remote code execution, posing a significant threat to enterprise systems.
Information security
#ransomware
Information security
fromIT Pro
4 days ago

RSAC Conference 2025: The front line of cyber innovation

The evolving cybersecurity landscape demands IT leaders to adapt to both new technologies and increasing threats, especially from state-backed actors.
fromIT Pro
4 days ago
Cryptocurrency

LockBit data dump reveals a treasure trove of intel on the notorious hacker group

Information security
fromIT Pro
4 days ago

RSAC Conference 2025: The front line of cyber innovation

The evolving cybersecurity landscape demands IT leaders to adapt to both new technologies and increasing threats, especially from state-backed actors.
fromIT Pro
4 days ago
Cryptocurrency

LockBit data dump reveals a treasure trove of intel on the notorious hacker group

fromThe Hacker News
18 hours ago

Are Forgotten AD Service Accounts Leaving You at Risk?

Many organizations overlook Active Directory service accounts, allowing orphaned accounts with stale passwords to persist and become prime targets for attackers.
Information security
fromTechRadar
21 hours ago

I have witnessed firsthand the damagecaused by fake employees: here's what your business must do to avoid it

In today's digital landscape, CEOs and CFOs have large digital footprints, making them targets for cyber criminals using deepfake technology to orchestrate scams.
Tech industry
#ai
Artificial intelligence
fromTechzine Global
4 days ago

Zero-click attack reveals new AI vulnerability

Echoleak exposes vulnerabilities in AI assistants like Microsoft 365 Copilot through subtle prompt manipulation, representing a shift in cybersecurity attack vectors.
fromIT Pro
1 day ago
Information security

RSAC in focus: Considerations and possibilities for the remainder of 2025

Artificial intelligence
fromTechzine Global
4 days ago

Zero-click attack reveals new AI vulnerability

Echoleak exposes vulnerabilities in AI assistants like Microsoft 365 Copilot through subtle prompt manipulation, representing a shift in cybersecurity attack vectors.
fromIT Pro
1 day ago
Information security

RSAC in focus: Considerations and possibilities for the remainder of 2025

#threat-intelligence
#software-development
fromIT Pro
4 days ago
Information security

Application security risk: How leaders can protect their businesses

fromIT Pro
4 days ago
Information security

Application security risk: How leaders can protect their businesses

fromTechCrunch
23 hours ago

Google to scale up AI-powered fraud detection and security operations in India | TechCrunch

Digital fraud in India is increasing rapidly, with cases related to the UPI payment system surging by 85% year-over-year to reach nearly $127 million in 2023.
Digital life
fromZDNET
1 day ago

Kali Linux gets a UI refresh, new tools, and an updated car hacking toolset

Kali Linux has released a new version enhancing its usability and toolset, including the CARsenal update and improved organization for red and blue teams.
Apple
#data-breach
fromTechCrunch
1 day ago
Toronto startup

Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users | TechCrunch

fromTechCrunch
1 day ago
Toronto startup

Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users | TechCrunch

fromElectronic Frontier Foundation
1 week ago

Betting on Your Digital Rights: EFF Benefit Poker Tournament at DEF CON 33

Join security expert Tarah Wheeler at the EFF Benefit Poker Tournament during DEF CON 33 on August 8th at the Horseshoe Poker Room.
Poker
#cybercrime
#westjet
fromIT Pro
1 day ago

RSAC in focus: How AI is improving cybersecurity

AI is no longer a future concept but a present-day reality shaping security strategies.
Artificial intelligence
#quantum-computing
fromHackernoon
3 days ago
Cryptocurrency

Hack Today, Crack Tomorrow? How Quantum-Safe Tools Save Blockchain's Future | HackerNoon

fromHackernoon
3 days ago
Cryptocurrency

Hack Today, Crack Tomorrow? How Quantum-Safe Tools Save Blockchain's Future | HackerNoon

fromIT Pro
1 day ago

RSAC in focus: Collaboration in cybersecurity

Community. It's what makes us strong in cybersecurity.
Information security
#generative-ai
fromThe Hacker News
1 day ago

Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More

Attackers now know how to stay hidden by blending in, making it difficult to detect when something wrong is happening, as many threats start quietly.
Marketing tech
fromSecuritymagazine
2 days ago

Fog Ransomware Group Uses Unconventional Toolset, New Research Finds

The real danger in this case isn't the ransom note - it's how Fog turns a simple screen-recorder into a hidden camera. Software is an essential driver of growth and innovation for every company; however, business apps we install on autopilot can suddenly become spy tools, which means trust is the weak spot. Security teams should keep a live map of where every monitoring app is allowed to run and flag it the moment one pops up somewhere odd.
Information security
fromBuzzFeed
2 days ago

Someone Might Be Watching You Through Your Home Security Camera. Here's What To Know.

If you don't change the default password after buying your camera, it's more subject to hacking. Most people's home security cameras won't get hacked, but it does happen in certain scenarios.
Privacy technologies
fromwww.theguardian.com
2 days ago

Australia to hold talks aimed at entering defence pact with EU

Albanese noted that Australia might soon formalize its participation in a defense agreement with the EU, which aims to enhance cooperation in various security areas.
UK news
fromTheregister
2 days ago

CVE audit demanded by Dems as program funding threatened

The ongoing funding uncertainty for the Common Vulnerabilities and Exposures (CVE) program has prompted Congressional Democrats to call for a review to examine its management and efficacy.
JavaScript
#national-security
Tech industry
fromTechCrunch
4 days ago

Silicon Valley tech execs are joining the US Army Reserve | TechCrunch

CTOs from major tech companies are joining the U.S. Army Reserve to apply their expertise in cybersecurity and data.
Tech industry
fromTechCrunch
4 days ago

Silicon Valley tech execs are joining the US Army Reserve | TechCrunch

CTOs from major tech companies are joining the U.S. Army Reserve to apply their expertise in cybersecurity and data.
fromDatabreaches
5 days ago

Sweden under cyberattack: Prime minister sounds the alarm

Sweden is experiencing significant cyberattacks targeting SVT and other vital institutions, highlighting concerns over the country's digital defenses and infrastructure resilience.
Information security
fromDatabreaches
5 days ago

Brussels Parliament hit by cyber-attack

"As of now, the functioning of the Parliament remains unaffected, and we are continuing with scheduled committee meetings and plenary sessions," stated Parliament President Bertin Mampaka.
Europe politics
fromDatabreaches
3 days ago

Plastic surgeons often store nude photos of patients with their identity information. When would we call that "negligent?"

The serious data breach at Hankins & Sohn Plastic Surgery has sparked concerns about the duty of care that medical practitioners have towards their patients regarding data security.
fromNextgov.com
4 days ago

Secure by Design is just the start, CISA official says

Implementing a Secure by Design framework is crucial for enhancing cybersecurity resilience.
Information security
fromTheregister
4 days ago
Tech industry

Employers are demanding too much from junior cyber recruits

Cybersecurity job ads often have unrealistic expectations, hindering recruitment of junior staff.
Employers need to clarify essential skills versus desirable qualifications in job postings.
[ Load more ]