🔒 Cybersecurity News

Latest cybersecurity articles from top security news sources
50 Total Articles
15 Sources
10:58 Generated

newsDisgruntled developer gets four-year sentence for revenge attack on employer’s networkDavis Lu hid a ‘logic bomb’ inside his employer’s network that deleted the Active Directory profiles of other employees when his ID was revoked.By John E. Dunn22 Aug 20255 minsActive DirectoryCybercrimeHacking

Davis Lu hid a ‘logic bomb’ inside his employer’s network that deleted the Active Directory profiles of other employees when his ID was revoked.

newsDisgruntled developer gets four-year sentence for revenge attack on employer’s networkDavis Lu hid a ‘logic bomb’ inside his employer’s network that deleted the Active Directory profiles of other employees when his ID was revoked.By John E. Dunn22 Aug 20255 minsActive DirectoryCybercrimeHacking

Davis Lu hid a ‘logic bomb’ inside his employer’s network that deleted the Active Directory profiles of other employees when his ID was revoked.

newsDisgruntled developer gets four-year sentence for revenge attack on employer’s networkDavis Lu hid a ‘logic bomb’ inside his employer’s network that deleted the Active Directory profiles of other employees when his ID was revoked.By John E. Dunn22 Aug 20255 minsActive DirectoryCybercrimeHacking

Davis Lu hid a ‘logic bomb’ inside his employer’s network that deleted the Active Directory profiles of other employees when his ID was revoked.

Interpol Arrests Over 1K Cybercriminals in 'Operation Serengeti 2.0'

No summary available.

Beyond the Prompt: Building Trustworthy Agent Systems

Building secure AI agent systems requires a disciplined engineering approach focused on deliberate architecture and human oversight.

New Android Trojan Variant Expands with Ransomware Tactics

No summary available.

Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools

No summary available.

US: Maryland Confirms Cyber Incident Affecting State Transport Systems

All previously scheduled mobility trips across Maryland for this week will be honored, said the state’s transportation administration

CIISec: Most Security Professionals Want Stricter Regulations

A new CIISec poll finds the majority of industry professionals would prefer more rigorous cybersecurity laws

Tech Manufacturer Data I/O Hit by Ransomware

No summary available.

DSLRoot, Proxies, and the Threat of ‘Legal Botnets’

The cybersecurity community onRedditresponded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they’d made w...

SIM-Swapper, Scattered Spider Hacker Gets 10 Years

A 20-year-old Florida man at the center of a prolific cybercrime group known as “Scattered Spider” was sentenced to 10 years in federal prison today, and ordered to pay roughly $13 million in restitut...

Oregon Man Charged in ‘Rapper Bot’ DDoS Service

A 22-year-old Oregon man has been arrested on suspicion of operating “Rapper Bot,” a massive botnet used to power a service for launching distributed denial-of-service (DDoS) attacks against targets —...

Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme

Cybercriminal groups peddling sophisticated phishing kits that convert stolen card data into mobile wallets have recently shifted their focus to targeting customers of brokerage services, new research...

Microsoft Patch Tuesday, August 2025 Edition

Microsofttoday released updates to fix more than 100 security flaws in itsWindowsoperating systems and other software. At least 13 of the bugs received Microsoft’s most-dire “critical” rating, meaning...

Student Loan Breach Exposes 2.5M Records

2.5 million people were affected, in a breach that could spell more trouble down the line.

Watering Hole Attacks Push ScanBox Keylogger

Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.

Ransomware Attacks are on the Rise

Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.

Inside the Hackers’ Toolkit – Podcast

No summary available.

Critical Docker Desktop flaw lets attackers hijack Windows hosts

No summary available.

Murky Panda hackers exploit cloud trust to hack downstream customers

No summary available.

Elastic rejects claims of a zero-day RCE flaw in Defend EDR

No summary available.

Mozilla warns Germany could soon declare ad blockers illegal

No summary available.

Google to verify all Android devs to block malware on Google Play

No summary available.

Varonis Connect!

No summary available.

Infosecurity Europe 2025

No summary available.

Infosecurity Europe 2025

No summary available.

Webinar: “Credential Security in the Age of AI: Insights for IT Leaders”

No summary available.

“AI hijacked this webinar”

No summary available.
No articles found for this source.

Update on Naked Security

No summary available.

Mom’s Meals issues “Notice of Data Event”: What to know and what to do

No summary available.

S3 Ep149: How many cryptographers does it take to change a light bulb?

No summary available.

Using WinRAR? Be sure to patch against these code execution bugs…

No summary available.

Smart light bulbs could give away your password secrets

No summary available.

Encryption Backdoor in Military/Police Radios

Iwrote aboutthis in 2023. Here’sthe story:

Poor Password Choices

Look atthis: McDonald’s chose the password “123456” for a major corporate system.

Friday Squid Blogging: Bobtail Squid

Niceshort articleon the bobtail squid.

I’m Spending the Year at the Munk School

This academic year, I am taking a sabbatical from the Kennedy School and Harvard University. (It’s not a real sabbatical—I’m just an adjunct—but it’s the same idea.) I will be spending the Fall 2025 a...

AI Agents Need Data Integrity

Think of the Web as a digital territory with its own social contract. In 2014,Tim Berners-Leecalled for a“Magna Carta for the Web”to restore the balance of power between individuals and institutions. ...
No articles found for this source.

Newsletters

No summary available.