🔒 Cybersecurity News

Latest cybersecurity articles from top security news sources
54 Total Articles
15 Sources
08:15 Generated
No articles found for this source.

Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking

Novakon HMIs are affected by remote code execution and information exposure vulnerabilities.

Pair of Suspected Scattered Spider Hackers Charged by UK, US Authorities

No summary available.

New York Blood Center Alerts 194,000 People to Data Breach

No summary available.

1 in 3 Android Apps Leak Sensitive Data

No summary available.

SonicWall Discloses Compromise of Cloud Backup Service

SonicWall said that threat actors accessed firewall preference files stored in the cloud for around 5% of its firewall install base

VC Firm Insight Partners Notifies Victims After Ransomware Breach

Insight Partners has released more details of a 2024 ransomware breach impacting thousands of individuals

Self-Replicating Worm Hits 180+ Software Packages

At least 187 code packages made available through the JavaScript repositoryNPMhave been infected with a self-replicating worm that steals credentials from developers and publishes those secrets onGitH...

Bulletproof Host Stark Industries Evades EU Sanctions

In May 2025, the European Union levied financial sanctions on the owners ofStark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and...

Microsoft Patch Tuesday, September 2025 Edition

Microsoft Corp.today issued security updates to fix more than 80 vulnerabilities in itsWindowsoperating systems and software. There are no known “zero-day” or actively exploited vulnerabilities in thi...

18 Popular Code Packages Hacked, Rigged to Steal Crypto

At least 18 popular JavaScript code packages that are collectively downloaded more than two billion times each week were briefly compromised with malicious software today, after a developer involved i...

GOP Cries Censorship Over Spam Filters That Work

The chairman of theFederal Trade Commission(FTC) last week sent a letter to Google’s CEO demanding to know why Gmail was blocking messages from Republican senders while allegedly failing to block simi...

Student Loan Breach Exposes 2.5M Records

2.5 million people were affected, in a breach that could spell more trouble down the line.

Watering Hole Attacks Push ScanBox Keylogger

Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.

Ransomware Attacks are on the Rise

Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.

Inside the Hackers’ Toolkit – Podcast

No summary available.

Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service

No summary available.

SonicWall warns customers to reset credentials after breach

No summary available.

Microsoft: WMIC will be removed after Windows 11 25H2 upgrade

No summary available.

Google nukes 224 Android malware apps behind massive ad fraud campaign

No summary available.

OpenAI's $4 GPT Go plan may expand to more regions

No summary available.

Varonis Connect!

No summary available.

Infosecurity Europe 2025

No summary available.

Infosecurity Europe 2025

No summary available.

Webinar: “Credential Security in the Age of AI: Insights for IT Leaders”

No summary available.

“AI hijacked this webinar”

No summary available.
No articles found for this source.

Update on Naked Security

No summary available.

Mom’s Meals issues “Notice of Data Event”: What to know and what to do

No summary available.

S3 Ep149: How many cryptographers does it take to change a light bulb?

No summary available.

Using WinRAR? Be sure to patch against these code execution bugs…

No summary available.

Smart light bulbs could give away your password secrets

No summary available.

Time-of-Check Time-of-Use Attacks Against LLMs

This is a nice piece of research: “Mind the Gap: Time-of-Check to Time-of-Use Vulnerabilities in LLM-Enabled Agents“.:

Hacking Electronic Safes

Vulnerabilities inelectronic safesthat use Securam Prologic locks:

Microsoft Still Uses RC4

Senator Ron Wyden hasaskedthe Federal Trade Commission toinvestigateMicrosoft over its continued use of the RC4 encryption algorithm. The letter talks about a hacker technique calledKerberoasting, tha...

Lawsuit About WhatsApp Security

Attaullah Baig, WhatsApp’s former head of security, has filed awhistleblowerlawsuit alleging that Facebook deliberately failed to fix a bunch of security flaws, in violation of its 2019 settlement agr...

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak:

Products & Services

No summary available.

Solutions

No summary available.

Resources

No summary available.

About

No summary available.

Contact Information

No summary available.

Agencies increasingly dive into AI for cyber defense, acting federal CISO says

No summary available.

UK arrests two teens accused of heavy involvement in yearslong Scattered Spider attack spree

No summary available.

Attack on SonicWall’s cloud portal exposes customers’ firewall configurations

No summary available.

Microsoft seizes hundreds of phishing sites tied to massive credential theft operation

No summary available.

BreachForums founder resentenced to three years in prison

No summary available.

Newsletters

No summary available.