Cybersecurity and other IT news aggregator

LATEST FEEDS

  • LLM providers on the cusp of an ‘extinction’ phase as capex realities bite

    LLM providers on the cusp of an ‘extinction’ phase as capex realities bite 2025-03-31 at 17:40 By Lindsay Clark Only the strong will survive, but analyst says cull will not be as rapid as during dotcom era Gartner says the market for large language model (LLM) providers is on the cusp of an extinction phase…


  • Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program

    Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program 2025-03-31 at 17:40 By Trevin Edgeworth A strong security program will sometimes require substantial organizational and cultural changes around security practices, and inevitably, a higher cost. The post Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security…


  • BNB Chain catches memecoin wave as Solana wipes out

    BNB Chain catches memecoin wave as Solana wipes out 2025-03-31 at 17:07 By Cointelegraph by Yohan Yun BNB Chain, the EVM-compatible network tied to cryptocurrency exchange Binance, is experiencing a resurgence in the decentralized finance (DeFi) and memecoin spaces just as some of its rivals face an identity crisis. For most of 2024 and into…


  • XRP bulls in ‘denial’ as price trend mirrors previous 75-90% crashes

    XRP bulls in ‘denial’ as price trend mirrors previous 75-90% crashes 2025-03-31 at 17:07 By Cointelegraph by Yashu Gola XRP (XRP) has lost more than 40% since hitting a multi-year high near $3.40 in January, and onchain data suggests the downtrend could deepen in the weeks ahead. “Denial” preceding past 75-90% XRP crashes is back…


  • NFT marketplace X2Y2 shuts down after 3 years, pivots to AI

    NFT marketplace X2Y2 shuts down after 3 years, pivots to AI 2025-03-31 at 17:07 By Cointelegraph by Adrian Zmudzinski Non-fungible token (NFT) marketplace X2Y2 announced it is shutting down after three years of operation. According to a March 31 announcement, X2Y2 will shut down on April 30, with the team switching its focus to an…


  • Windows 11 adds auto-recovery, kills offline setup loophole

    Windows 11 adds auto-recovery, kills offline setup loophole 2025-03-31 at 16:49 By Richard Speed Microsoft giveth with one hand but taketh away with the other Windows Insiders will soon get their hands on Microsoft’s attempt to ward off another CrowdStrike incident, and the company is also closing a loophole for users who don’t want a…


  • Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images

    Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images 2025-03-31 at 16:49 By Threat actors are using the “mu-plugins” directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. mu-plugins, short for must-use plugins, refers to plugins in a special…


  • Ethereum price down almost 50% since Eric Trump’s ‘add ETH’ endorsement

    Ethereum price down almost 50% since Eric Trump’s ‘add ETH’ endorsement 2025-03-31 at 16:12 By Cointelegraph by Yashu Gola Ethereum’s native token, Ether (ETH) has lost almost half its value two months after Eric Trump, son of US President Donald Trump, told his 5.7 million followers that it was a “great time” to add the…


  • Nvidia’s latest AI PC boxes sound great – if you’re a data scientist with $3,000 to spare

    Nvidia’s latest AI PC boxes sound great – if you’re a data scientist with $3,000 to spare 2025-03-31 at 16:12 By Dan Robinson But will they really upend the enterprise PC market? How about software? Networking, anyone? Analysis  Disrupt? It’s an awful hackneyed term that some analysts, consultants and technologists like to use.… This article…


  • How to Safeguard Critical Assets from the Growing Threat of Supply Chain Cyberattacks

    How to Safeguard Critical Assets from the Growing Threat of Supply Chain Cyberattacks 2025-03-31 at 16:12 By Craig Searle Understanding Supply Chain Threats: Learn how cybercriminals exploit vulnerabilities in third-party vendors to gain unauthorized access to sensitive data. Real-World Cyberattack Examples: Explore high-profile supply chain breaches like the SolarWinds attack and their long-term impact on…


  • CISA reveals new malware variant used on compromised Ivanti Connect Secure devices

    CISA reveals new malware variant used on compromised Ivanti Connect Secure devices 2025-03-31 at 16:12 By Zeljka Zorz CISA has released indicators of compromise, detection signatures, and updated mitigation advice for rooting out a newly identified malware variant used by the attackers who breached Ivanti Connect Secure VPN appliances in December 2024 by exploiting the…


  • EU invests €1.3 billion in AI and cybersecurity

    EU invests €1.3 billion in AI and cybersecurity 2025-03-31 at 15:53 By Help Net Security The European Commission has approved the 2025-2027 Digital Europe Programme (DIGITAL) work program, allocating €1.3 billion to advance key technologies essential for the EU’s future and technological sovereignty. DIGITAL is an EU funding initiative designed to bring digital technology closer…


  • Hacker Leaks Samsung Customer Data

    Hacker Leaks Samsung Customer Data 2025-03-31 at 15:53 By Ionut Arghire Hacker leaks 270,000 customer tickets allegedly stolen from Samsung Germany using long-compromised credentials. The post Hacker Leaks Samsung Customer Data appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:


  • Privacy died last century, the only way to go is off-grid

    Privacy died last century, the only way to go is off-grid 2025-03-31 at 15:18 By Steven J. Vaughan-Nichols From smartphones to surveillance cameras to security snafus, there’s no escape Opinion  I was going to write a story about how Amazon is no longer even pretending to respect your privacy. But, really, why bother?… This article…


  • Stablecoins, tokenized assets gain as Trump tariffs loom

    Stablecoins, tokenized assets gain as Trump tariffs loom 2025-03-31 at 15:07 By Cointelegraph by Zoltan Vardai Cryptocurrency investors are increasingly moving capital into stablecoins and tokenized real-world assets (RWAs) in a bid to avoid volatility ahead of US President Donald Trump’s widely anticipated tariff announcement on April 2. Increasingly more capital is flowing into stablecoins…


  • ⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More

    ⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More 2025-03-31 at 15:07 By Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware…


  • 5 Impactful AWS Vulnerabilities You’re Responsible For

    5 Impactful AWS Vulnerabilities You’re Responsible For 2025-03-31 at 15:07 By If you’re using AWS, it’s easy to assume your cloud security is handled – but that’s a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment remains the customer’s responsibility. Think of AWS security like protecting a building: AWS provides…


  • Part of EU’s New €1.3 Billion Investment Going to Cybersecurity

    Part of EU’s New €1.3 Billion Investment Going to Cybersecurity 2025-03-31 at 14:46 By Eduard Kovacs The European Commission plans on investing €1.3 billion ($1.4 billion) in cybersecurity, artificial intelligence and digital skills.  The post Part of EU’s New €1.3 Billion Investment Going to Cybersecurity appeared first on SecurityWeek. This article is an excerpt from…


  • Musk’s xAI swallows Musk’s X in ego-friendly, all-stock deal

    Musk’s xAI swallows Musk’s X in ego-friendly, all-stock deal 2025-03-31 at 14:36 By Richard Speed Social media platform magically worth a billion more than what he bought it for Comment  Billionaire Elon Musk’s xAI is to acquire billionaire Elon Musk’s X in a deal that values the former at $80 billion and the latter at…


  • Crypto funds see $226M of inflows, but asset values slump — CoinShares

    Crypto funds see $226M of inflows, but asset values slump — CoinShares 2025-03-31 at 14:06 By Cointelegraph by Helen Partz Cryptocurrency exchange-traded products (ETPs) continued to see modest inflows last week, extending a reversal from a record-breaking streak of outflows. Global crypto ETPs posted $226 million in inflows in the last trading week, adding to…


  • Trump sons back new Bitcoin mining venture with Hut 8

    Trump sons back new Bitcoin mining venture with Hut 8 2025-03-31 at 14:06 By Cointelegraph by Adrian Zmudzinski Several members of US President Donald Trump’s family are backing a new venture to launch what aims to become the world’s largest Bitcoin mining firm. Hut 8, a digital asset mining and infrastructure company, announced on March…


  • How to file crypto taxes in the US (2024–2025 tax season)

    How to file crypto taxes in the US (2024–2025 tax season) 2025-03-31 at 14:06 By Cointelegraph by Dilip Kumar Patairya Key takeaways US crypto investors must file their 2024 tax returns by April 15, 2025, ensuring all crypto transactions are accurately reported to the IRS. Crypto held for less than a year is taxed as…


  • ‘Crocodilus’ Android Banking Trojan Allows Device Takeover, Data Theft

    ‘Crocodilus’ Android Banking Trojan Allows Device Takeover, Data Theft 2025-03-31 at 14:05 By Ionut Arghire The newly identified Android banking trojan Crocodilus takes over devices, enabling overlay attacks, remote control, and keylogging. The post ‘Crocodilus’ Android Banking Trojan Allows Device Takeover, Data Theft appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View…


  • European Gaia mapping satellite is retired but proves very tough to kill

    European Gaia mapping satellite is retired but proves very tough to kill 2025-03-31 at 13:51 By Iain Thomson I’m sorry Dave, I can’t do that The last commands have been sent to the ESA’s Gaia satellite and, after a dozen years scanning the galaxy, the spacecraft is shutting down its computers and boosting out into…


  • CISA Analyzes Malware Used in Ivanti Zero-Day Attacks

    CISA Analyzes Malware Used in Ivanti Zero-Day Attacks 2025-03-31 at 13:37 By Ionut Arghire CISA has published its analysis of Resurge, a SpawnChimera malware variant used in attacks targeting a recent Ivanti Connect Secure zero-day. The post CISA Analyzes Malware Used in Ivanti Zero-Day Attacks appeared first on SecurityWeek. This article is an excerpt from…


  • Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

    Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine 2025-03-31 at 13:37 By Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT. “The file names use Russian words related to the movement of troops in Ukraine as a lure,” Cisco…


  • 170,000 Impacted by Data Breach at Chord Specialty Dental Partners

    170,000 Impacted by Data Breach at Chord Specialty Dental Partners 2025-03-31 at 13:19 By Eduard Kovacs An email security incident at Chord Specialty Dental Partners, a US dental service organization, has impacted more than 170,000 people.  The post 170,000 Impacted by Data Breach at Chord Specialty Dental Partners appeared first on SecurityWeek. This article is…


  • FTC Commissioner Melissa Holyoak working remotely from Utah — despite Trump’s RTO order and DOGE clampdown: sources

    FTC Commissioner Melissa Holyoak working remotely from Utah — despite Trump’s RTO order and DOGE clampdown: sources 2025-03-31 at 13:05 By Thomas Barrabi A powerful member of the Federal Trade Commission has been working her high-profile post remotely – despite President Trump’s demands that federal employees show up to the office five days a week,…


  • Coinbase users hit by $46M in suspected phishing scams — ZachXBT

    Coinbase users hit by $46M in suspected phishing scams — ZachXBT 2025-03-31 at 13:05 By Cointelegraph by Zoltan Vardai Coinbase users may have lost as much as $46 million to suspected phishing scams over the past two weeks as rising crypto prices continue to attract bad actors to the industry. Scams such as address poisoning…


  • Ransomware crews add ‘EDR killers’ to their arsenal – and some aren’t even malware

    Ransomware crews add ‘EDR killers’ to their arsenal – and some aren’t even malware 2025-03-31 at 13:05 By Jessica Lyons Crims are disabling security tools early in attacks, Talos says interview  Antivirus and endpoint security tools are falling short as ransomware crews increasingly deploy “EDR killers” to disable defenses early in the attack – a…


  • Windows 11 quick machine recovery: Restoring devices with boot issues

    Windows 11 quick machine recovery: Restoring devices with boot issues 2025-03-31 at 12:46 By Zeljka Zorz Microsoft has rolled out quick machine recovery, a new Windows feature aimed at preventing prolonged widespread outages like the one caused by a faulty CrowdStrike update in July 2024. The goal of the feature is to allow IT administrators…


  • UK finance watchdog spends millions ‘enhancing’ Workday software rolled out 4 years ago

    UK finance watchdog spends millions ‘enhancing’ Workday software rolled out 4 years ago 2025-03-31 at 12:23 By Lindsay Clark FCA still splashing on customizing, integrating HR and finance system way after 2021 go-live The UK’s financial regulator is signing a deal worth up to £12.3 million ($15.9 million) with tech services biz Cognizant to make…


  • The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques

    The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques 2025-03-31 at 12:23 By The cyberespionage techniques of Earth Alux, a China-linked APT group, are putting critical industries at risk. The attacks, aimed at the APAC and Latin American regions, leverage powerful tools and techniques to remain hidden while stealing sensitive data.…


  • Typosquatting in crypto, explained: How hackers exploit small mistakes

    Typosquatting in crypto, explained: How hackers exploit small mistakes 2025-03-31 at 12:01 By Cointelegraph by SK Arora What is typosquatting in crypto? Typosquatting in crypto involves registering domain names that mimic popular platforms with slight misspellings to deceive users into revealing sensitive information. In the rapidly evolving digital landscape, cryptocurrencies have become a significant form…


  • Worst Q1 for BTC price since 2018: 5 Things to know in Bitcoin this week

    Worst Q1 for BTC price since 2018: 5 Things to know in Bitcoin this week 2025-03-31 at 12:01 By Cointelegraph by William Suberg Bitcoin (BTC) limps into the end of Q1 on 13% losses as fresh macroeconomic volatility looms. BTC price action risks a fresh dip below $80,000 as new US trade tariffs weigh on…


  • When even Microsoft can’t understand its own Outlook, big tech is stuck in a swamp of its own making

    When even Microsoft can’t understand its own Outlook, big tech is stuck in a swamp of its own making 2025-03-31 at 11:34 By Rupert Goodwins Make things that work for the billions, not the billionaires Opinion  Since it is currently fashionable to make laws by whim and decree, here are three that should apply immediately…


  • Stop pretending technical and human vulnerabilities are separate things

    Stop pretending technical and human vulnerabilities are separate things 2025-03-31 at 11:04 By Cointelegraph by Andrey Sergeenkov Opinion by: Andrey Sergeenkov, researcher, analyst and writer Crypto founders love big promises: decentralized finance, banking the unbanked and freedom from intermediaries. Then hacks happen. In some cases, billions vanish overnight.  On Feb. 21, 2025, the North Korean…


  • Canada launches breach risk self-assessment online tool

    Canada launches breach risk self-assessment online tool 2025-03-31 at 10:59 By Help Net Security Privacy Commissioner of Canada Philippe Dufresne has launched a new online tool that will help businesses and federal institutions that experience a privacy breach to assess whether the breach is likely to create a real risk of significant harm to individuals.…


  • senhasegura rebrands as Segura, marking a new chapter in identity security

    senhasegura rebrands as Segura, marking a new chapter in identity security 2025-03-31 at 10:59 By Industry News senhasegura, a globally recognized leader in Privileged Access Management (PAM), announces its evolution into Segura, marking a new chapter for the company and its mission to deliver futureproof identity security. Founded in Brazil in 2009, senhasegura quickly earned…


  • Cashless society could be why fewer kids are eating coins and sticking things up their noses

    Cashless society could be why fewer kids are eating coins and sticking things up their noses 2025-03-31 at 09:39 By Simon Sharwood NHS boffins think there’s a connection, but ‘snot all good news: Swallowing batteries is even more dangerous Researchers from the UK’s National Health Service believe increasing adoption of cashless payments may be having…


  • South Korean crypto exchange users hit 16M in ‘saturation point’

    South Korean crypto exchange users hit 16M in ‘saturation point’ 2025-03-31 at 09:11 By Cointelegraph by Stephen Katte Crypto exchange users in South Korea have crossed over 16 million after receiving a boost following US President Donald Trump’s election win last November.  Data submitted to representative Cha Gyu-geun of the minor opposition Rebuilding Korea Party…


  • Japan to classify cryptocurrencies as financial products: Report

    Japan to classify cryptocurrencies as financial products: Report 2025-03-31 at 09:11 By Cointelegraph by Jesse Coghlan Japan’s finance regulator is planning to change the country’s laws to classify cryptocurrencies as financial products as early as 2026, according to the local outlet Nikkei. The Financial Services Agency (FSA) plans to submit a bill to parliament to…


  • Two things you need in place to successfully adopt AI

    Two things you need in place to successfully adopt AI 2025-03-31 at 08:32 By Help Net Security Organizations should not shy away from taking advantage of AI tools, but they need to find the right balance between maximizing efficiency and mitigating organizational risk. They need to put in place: 1. A seamless AI security policy…


  • California introduces ’Bitcoin rights’ in amended digital assets bill

    California introduces ’Bitcoin rights’ in amended digital assets bill 2025-03-31 at 08:02 By Cointelegraph by Brayden Lindrea A Californian lawmaker has just added Bitcoin and crypto investor protections to a February-introduced money transmission bill aimed at securing crypto self-custody rights for the US state’s nearly 40 million residents. California’s Assembly Bill 1052 was introduced as…


  • Exegol: Open-source hacking environment

    Exegol: Open-source hacking environment 2025-03-31 at 08:02 By Mirko Zorz Exegol is a community-driven hacking environment, which helps users deploy hacking setups quickly and securely. It’s made for penetration testers, CTF players, bug bounty hunters, researchers, defenders, and both new and experienced users. Exegol offers clean, secure environments. Each project can have its own Docker…


  • Intel and Microsoft staff allegedly lured to work for fake Chinese company in Taiwan

    Intel and Microsoft staff allegedly lured to work for fake Chinese company in Taiwan 2025-03-31 at 07:51 By Simon Sharwood 11 companies, including SMIC, accused of disguising outposts so they can illicitly serve Beijing Chinese tech companies created entities in Taiwan and disguised them so they had no connections to China, so they could lure…


  • Only 2-5% of application security alerts require immediate action

    Only 2-5% of application security alerts require immediate action 2025-03-31 at 07:51 By Help Net Security The large volume of security alerts, many created by automated tools, is overwhelming security and development teams, according to the 2025 Application Security Benchmark report by Ox Security. The report is based on an analysis of over 101 million…


  • GenAI turning employees into unintentional insider threats

    GenAI turning employees into unintentional insider threats 2025-03-31 at 07:03 By Help Net Security The amount of data being shared by businesses with GenAI apps has exploded, increasing 30x in one year, according to Netskope. The average organization now shares more than 7.7GB of data with AI tools per month, a massive jump from just…


  • AI overhaul at McDonald’s needs a super-sized security approach

    AI overhaul at McDonald’s needs a super-sized security approach 2025-03-31 at 07:03 By Introducing new technology at the many customer interfaces in quick service restaurants opens up fresh attack surfaces for threat actors. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:


  • DeFi protocol SIR.trading loses entire $355K TVL in ‘worst news’ possible

    DeFi protocol SIR.trading loses entire $355K TVL in ‘worst news’ possible 2025-03-31 at 06:43 By Cointelegraph by Jody McDonald Ethereum-based DeFi protocol SIR.trading, also known as Synthetics Implemented Right, has been hacked, resulting in the loss of its entire total value locked (TVL) — $355,000 at the time of the attack.  The March 30 hack…


Browse older archives

Scroll to Top