šŸ”’ Cybersecurity News

Latest cybersecurity articles from top security news sources
49 Total Articles
15 Sources
11:56 Generated
No articles found for this source.

How to Close the AI Governance Gap in Software Development

Widespread adoption of AI coding tools accelerates development—but also introduces critical vulnerabilities that demand stronger governance and oversight.

Bridgestone Confirms "Limited Cyber Incident" Impacting Facilities in North America

No summary available.

South Carolina School District Data Breach Affects 31,000 People

An investigation has revealed that files were stolen in a data breach affecting a South Carolina school district

Staying Silent After a Breach Isn’t Caution, it’s Complicity

No summary available.

macOS Stealer Campaign Uses ā€œCrackedā€ App Lures to Bypass Apple Security

Trend Micro observed the attackers using terminal-based installation methods for the AMOS malware, luring macOS users into installing cracked versions of apps

US and 14 Allies Release Joint Guidance on Software Bill of Materials

No summary available.

GOP Cries Censorship Over Spam Filters That Work

The chairman of theFederal Trade Commission(FTC) last week sent a letter to Google’s CEO demanding to know why Gmail was blocking messages from Republican senders while allegedly failing to block simi...

The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft

The recent mass-theft of authentication tokens fromSalesloft, whose AI chatbot is used by a broad swath of corporate America to convert customer interaction intoSalesforceleads, has left many companie...

Affiliates Flock to ā€˜Soulless’ Scam Gambling Machine

Last month, KrebsOnSecurity tracked the sudden emergence of hundreds of polished online gaming and wagering websites that lure people with free credits and eventuallyabscond with any cryptocurrency fu...

DSLRoot, Proxies, and the Threat of ā€˜Legal Botnets’

The cybersecurity community onRedditresponded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they’d made w...

SIM-Swapper, Scattered Spider Hacker Gets 10 Years

A 20-year-old Florida man at the center of a prolific cybercrime group known as ā€œScattered Spiderā€ was sentenced to 10 years in federal prison today, and ordered to pay roughly $13 million in restitut...

Student Loan Breach Exposes 2.5M Records

2.5 million people were affected, in a breach that could spell more trouble down the line.

Watering Hole Attacks Push ScanBox Keylogger

Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

Tentacles of ā€˜0ktapus’ Threat Group Victimize 130 Firms

Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.

Ransomware Attacks are on the Rise

Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.

Inside the Hackers’ Toolkit – Podcast

No summary available.

SaaS giant Workiva discloses data breach after Salesforce attack

No summary available.

Disney to pay $10M to settle claims it collected kids’ data on YouTube

No summary available.

Google fixes actively exploited Android flaws in September update

No summary available.

Palo Alto Networks data breach exposes customer info, support cases

No summary available.

VirusTotal finds hidden malware phishing campaign in SVG files

No summary available.

Varonis Connect!

No summary available.

Infosecurity Europe 2025

No summary available.

Infosecurity Europe 2025

No summary available.

Webinar: ā€œCredential Security in the Age of AI: Insights for IT Leadersā€

No summary available.

ā€œAI hijacked this webinarā€

No summary available.
No articles found for this source.

Update on Naked Security

No summary available.

Mom’s Meals issues ā€œNotice of Data Eventā€: What to know and what to do

No summary available.

S3 Ep149: How many cryptographers does it take to change a light bulb?

No summary available.

Using WinRAR? Be sure to patch against these code execution bugs…

No summary available.

Smart light bulbs could give away your password secrets

No summary available.

Friday Squid Blogging: The Origin and Propagation of Squid

Newresearch(paywalled):

My Latest Book:Rewiring Democracy

I am pleased to announce the imminent publication of my latest book,Rewiring Democracy: How AI will Transform our Politics, Government, and Citizenship: coauthored withNathan Sanders, and published by...

GPT-4o-mini Falls for Psychological Manipulation

Interestingexperiment:

Generative AI as a Cybercrime Assistant

Anthropicreportson a Claude user:

Indirect Prompt Injection Attacks Against LLM Assistants

Really goodresearchon practical attacks against LLM agents.
No articles found for this source.

NYU team behind AI-powered malware dubbed ā€˜PromptLock’

No summary available.

Sitecore zero-day vulnerability springs up from exposed machine key

No summary available.

AI can help track an ever-growing body of vulnerabilities, CISA official says

No summary available.

Streameast, world’s largest pirated live sports network, shut down by Egyptian authorities

No summary available.

Cato Networks acquires AI security startup Aim Security

No summary available.

Newsletters

No summary available.