2025

Los Alamos lab to research next-gen chip technologies

Los Alamos lab to research next-gen chip technologies 2025-02-05 at 16:48 By Dan Robinson Radiation-hardening for space environments and energy efficiency tweaks for above and below Los Alamos National Laboratory (LANL) is leading a project to transform how chips are designed and manufactured, to make them more energy efficient and able to better tolerate environmental […]

React to this headline:

Loading spinner

Los Alamos lab to research next-gen chip technologies Read More »

SafeBreach exposure validation platform identifies security gaps

SafeBreach exposure validation platform identifies security gaps 2025-02-05 at 16:33 By Industry News SafeBreach launched SafeBreach exposure validation platform, which combines the power of its time-tested breach and attack simulation (BAS) product—now called Validate—and its new attack path validation product, Propagate. Together, they provide enterprise security teams with deeper insight into threat exposure and a

React to this headline:

Loading spinner

SafeBreach exposure validation platform identifies security gaps Read More »

Cyber Insights 2025: OT Security

Cyber Insights 2025: OT Security 2025-02-05 at 16:33 By Kevin Townsend Just as OT technology differs from IT technology, the threats, likely adversaries, and potential harm also differ. The post Cyber Insights 2025: OT Security appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Cyber Insights 2025: OT Security Read More »

Swap EOL Zyxel routers, upgrade Netgear ones!

Swap EOL Zyxel routers, upgrade Netgear ones! 2025-02-05 at 16:18 By Zeljka Zorz There will be no patches for EOL Zyxel routers under attack via CVE-2024-40891, the company has confirmed. Meanwhile, Netgear has issued patches for critical flaws affecting its routers and wireless access points. Zyxel vulnerability: Exploited, no patches CVE-2024-40891, a command injection vulnerability

React to this headline:

Loading spinner

Swap EOL Zyxel routers, upgrade Netgear ones! Read More »

Lazarus Group Targets Organizations with Sophisticated LinkedIn Recruiting Scam

Lazarus Group Targets Organizations with Sophisticated LinkedIn Recruiting Scam 2025-02-05 at 16:03 By Ionut Alexandru BALTARIU Bitdefender Labs warns of an active campaign by the North Korea-linked Lazarus Group, targeting organizations by capturing credentials and delivering malware through fake LinkedIn job offers. LinkedIn may be a vital tool for job seekers and professionals, but it

React to this headline:

Loading spinner

Lazarus Group Targets Organizations with Sophisticated LinkedIn Recruiting Scam Read More »

US cranks up espionage charges against ex-Googler accused of trade secrets heist

US cranks up espionage charges against ex-Googler accused of trade secrets heist 2025-02-05 at 15:52 By Connor Jones Mountain View clocked onto the scheme with days to spare A Chinese national faces a substantial stint in prison and heavy fines if found guilty of several additional charges related to economic espionage and theft of trade

React to this headline:

Loading spinner

US cranks up espionage charges against ex-Googler accused of trade secrets heist Read More »

Cybersecurity M&A Roundup: 45 Deals Announced in January 2025

Cybersecurity M&A Roundup: 45 Deals Announced in January 2025 2025-02-05 at 15:52 By Eduard Kovacs A significant number of cybersecurity-related merger and acquisition (M&A) deals announced in January 2025.  The post Cybersecurity M&A Roundup: 45 Deals Announced in January 2025 appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

Cybersecurity M&A Roundup: 45 Deals Announced in January 2025 Read More »

Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts

Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts 2025-02-05 at 15:51 By Cybercriminals are increasingly leveraging legitimate HTTP client tools to facilitate account takeover (ATO) attacks on Microsoft 365 environments. Enterprise security company Proofpoint said it observed campaigns using HTTP clients Axios and Node Fetch to send HTTP requests and

React to this headline:

Loading spinner

Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts Read More »

Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks

Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks 2025-02-05 at 15:51 By A previously undocumented threat actor known as Silent Lynx has been linked to cyber attacks targeting various entities in Kyrgyzstan and Turkmenistan. “This threat group has previously targeted entities around Eastern Europe and Central Asian government think tanks involved in

React to this headline:

Loading spinner

Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks Read More »

Satori provides visibility into data store risk levels

Satori provides visibility into data store risk levels 2025-02-05 at 15:35 By Industry News Satori announced its new capabilities, enabling security teams to be in control of all customer data across the development lifecycle in a simple, cost-effective, and holistic way. These capabilities automate the daunting tasks of discovering data, risk assessment, providing granular access

React to this headline:

Loading spinner

Satori provides visibility into data store risk levels Read More »

Workday erases 8.5% of workforce because of…AI

Workday erases 8.5% of workforce because of…AI 2025-02-05 at 15:06 By Paul Kunert That’s 1,750 positions about to join the employment queue and it’s only February Workday is erasing 8.5 percent of its personnel under a restructuring scheme because… AI.… This article is an excerpt from The Register View Original Source React to this headline:

React to this headline:

Loading spinner

Workday erases 8.5% of workforce because of…AI Read More »

850,000 individuals impacted by Globe Life ransomware incident

850,000 individuals impacted by Globe Life ransomware incident 2025-02-05 at 15:06 By An estimated 850,000 individuals have been affected by a ransomware attack on Globe Life, an insurance organization. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

850,000 individuals impacted by Globe Life ransomware incident Read More »

Riot Raises $30 Million for Employee Cybersecurity Solution

Riot Raises $30 Million for Employee Cybersecurity Solution 2025-02-05 at 15:06 By Ionut Arghire Riot has raised $30 million in Series B funding for a platform that helps employees improve their cybersecurity posture. The post Riot Raises $30 Million for Employee Cybersecurity Solution appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Riot Raises $30 Million for Employee Cybersecurity Solution Read More »

Abandoned Amazon S3 Buckets Enabled Attacks Against Governments, Big Firms

Abandoned Amazon S3 Buckets Enabled Attacks Against Governments, Big Firms 2025-02-05 at 14:50 By Eduard Kovacs 150 abandoned Amazon S3 buckets could have been leveraged to deliver malware or backdoors to governments and Fortune companies. The post Abandoned Amazon S3 Buckets Enabled Attacks Against Governments, Big Firms appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Abandoned Amazon S3 Buckets Enabled Attacks Against Governments, Big Firms Read More »

New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack

New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack 2025-02-05 at 14:24 By Veeam has released patches to address a critical security flaw impacting its Backup software that could allow an attacker to execute arbitrary code on susceptible systems. The vulnerability, tracked as CVE-2025-23114, carries a CVSS score of 9.0 out of 10.0. “A

React to this headline:

Loading spinner

New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack Read More »

Russian Hackers Exploited 7-Zip Zero-Day Against Ukraine

Russian Hackers Exploited 7-Zip Zero-Day Against Ukraine 2025-02-05 at 14:09 By Ionut Arghire Russian threat groups have been observed exploiting a zero-day vulnerability in 7-Zip against Ukrainian entities. The post Russian Hackers Exploited 7-Zip Zero-Day Against Ukraine appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Russian Hackers Exploited 7-Zip Zero-Day Against Ukraine Read More »

Microsoft’s final Exchange Server 2019 update still missing as support deadline ticks down

Microsoft’s final Exchange Server 2019 update still missing as support deadline ticks down 2025-02-05 at 13:50 By Dan Robinson CU15 MIA as Redmond scrambles to fix issues Microsoft has yet to deliver its promised Cumulative Update 15 for Exchange Server 2019 due to some issues, as the countdown to the end of support for the

React to this headline:

Loading spinner

Microsoft’s final Exchange Server 2019 update still missing as support deadline ticks down Read More »

Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities

Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities 2025-02-05 at 13:49 By Ionut Arghire Chrome 133 and Firefox 135 were released with patches for multiple high-severity memory safety vulnerabilities. The post Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities Read More »

Navigating the Future: Key IT Vulnerability Management Trends 

Navigating the Future: Key IT Vulnerability Management Trends  2025-02-05 at 13:30 By As the cybersecurity landscape continues to evolve, proactive vulnerability management has become a critical priority for managed service providers (MSPs) and IT teams. Recent trends indicate that organizations increasingly prioritize more frequent IT security vulnerability assessments to identify and address potential security flaws.

React to this headline:

Loading spinner

Navigating the Future: Key IT Vulnerability Management Trends  Read More »

Crypto-stealing iOS, Android malware found on App Store, Google Play

Crypto-stealing iOS, Android malware found on App Store, Google Play 2025-02-05 at 13:25 By Zeljka Zorz A number of iOS and Android apps on Apple’s and Google’s official app stores contain a software development kit (SDK) that allows them to exfiltrate cryptowallets’ seed recovery phrases, Kaspersky researchers have found. “The infected apps in Google Play

React to this headline:

Loading spinner

Crypto-stealing iOS, Android malware found on App Store, Google Play Read More »

Scroll to Top