Cybersecurity and other IT news aggregator
LATEST FEEDS
-
Linux royalty backs adoption of Rust for kernel code, says its rise is inevitable
Linux royalty backs adoption of Rust for kernel code, says its rise is inevitable 2025-02-21 at 02:50 By Thomas Claburn Nobody wants memory bugs. Penguinistas continue debate on how to squish ’em Some Linux kernel maintainers remain unconvinced that adding Rust code to the open source project is a good idea, but its VIPs are…
-
Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes
Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes 2025-02-21 at 02:00 By Jessica Lyons Said bugs ‘can have significant implications’ – glad to hear that from Redmond Microsoft is so concerned about security in its Copilot products for folks that it’s lifted bug bounty payments for moderate-severity vulnerabilities from nothing to…
-
Oops, some of our customers’ Power Pages sites were exploited, says Microsoft
Oops, some of our customers’ Power Pages sites were exploited, says Microsoft 2025-02-21 at 01:31 By Iain Thomson Don’t think this is SaaS and you can relax: Redmond wants a few of you to check your websites Microsoft has fixed a security flaw in its Power Pages website-building SaaS, after criminals got there first –…
-
FTC seeks public’s input on ‘un-American’ and ‘potentially illegal’ Big Tech censorship — including ‘shadow banning’
FTC seeks public’s input on ‘un-American’ and ‘potentially illegal’ Big Tech censorship — including ‘shadow banning’ 2025-02-21 at 00:01 By Thomas Barrabi The Federal Trade Commission is seeking the public’s input on whether Big Tech firms like Google and Facebook parent Meta censor their users, the agency announced on Thursday. This article is an excerpt…
-
GitLab and its execs sued again and again over ‘misleading’ AI hype, price hikes
GitLab and its execs sued again and again over ‘misleading’ AI hype, price hikes 2025-02-21 at 00:01 By Thomas Claburn Bosses bragged about Duo Chat bot, buyers weren’t buying it – claim For the third time in five months, GitLab or its execs have been sued over allegedly misleading investors about AI capabilities and demand.……
-
Three Years of Cyber Warfare: How Digital Attacks Have Shaped the Russia-Ukraine War
Three Years of Cyber Warfare: How Digital Attacks Have Shaped the Russia-Ukraine War 2025-02-21 at 00:01 By As the third anniversary of the start of the Russia-Ukraine war approaches, Trustwave SpiderLabs created a series of blog posts to look back, reflect upon, and explain how this 21st Century war is being fought not just on…
-
Billionaire GameStop CEO Ryan Cohen boosts stake in Chinese titan Alibaba to $1B: report
Billionaire GameStop CEO Ryan Cohen boosts stake in Chinese titan Alibaba to $1B: report 2025-02-20 at 23:37 By Reuters Chinese tech stocks have been on the ascent in recent days, after the emergence of domestic artificial intelligence startup DeepSeek. This article is an excerpt from Latest Technology News and Product Reviews | New York Post…
-
77% of Americans concerned about Chinese ownership of TikTok as Trump admin scrambles to ‘save’ app
77% of Americans concerned about Chinese ownership of TikTok as Trump admin scrambles to ‘save’ app 2025-02-20 at 23:20 By Thomas Barrabi A whopping 77% of Americans say they remain concerned about continued Chinese ownership of TikTok – even as the Trump administration scrambles to cut a deal to “save” the popular app, according to…
-
Russian Hackers Are Exploiting This Signal Feature for Spying
Russian Hackers Are Exploiting This Signal Feature for Spying 2025-02-20 at 21:07 View original post at Safety Detectives Russian threat actors have been running phishing campaigns that take advantage of the “Linked Devices” feature in the privacy-focused Signal messaging app to gain unauthorized access to targeted accounts. “The most novel and widely used technique underpinning…
-
Freelance Developers Targeted by Malicious Ads on GitHub
Freelance Developers Targeted by Malicious Ads on GitHub 2025-02-20 at 20:57 View original post at Safety Detectives A new malware campaign is targeting freelance developers by using fake job advertisements to lure them into downloading malicious software disguised as legitimate tools. The campaign mainly spreads through GitHub repositories. The attackers impersonate reputable companies and offer…
-
Laptop makers stalled on repairability improvements
Laptop makers stalled on repairability improvements 2025-02-20 at 20:32 By Brandon Vigliarolo Apple, Dell made some progress, but MacBooks are still the worst to crack open, says PIRG The right to repair movement has gained momentum, yet laptop makers have largely stalled on improving repairability.… This article is an excerpt from The Register View Original…
-
Euro cloud biz trials ‘server blades in a cold box’ system
Euro cloud biz trials ‘server blades in a cold box’ system 2025-02-20 at 19:54 By Dan Robinson Hot air or a 50% energy saving? Exoscale datacenter runs proof-of-concept to test veracity of Digger’s claims A1 Digital is testing liquid cooling tech for power-intensive AI servers that is claimed to save 50 percent of the energy…
-
OpenSSH Vulnerabilities Expose Systems to MitM & DoS Attacks
OpenSSH Vulnerabilities Expose Systems to MitM & DoS Attacks 2025-02-20 at 19:44 View original post at Safety Detectives The developers of OpenSSH, the widely-used open-source version of the Secure Shell (SSH) protocol, released patches this week addressing two vulnerabilities, including one that could be exploited without user interaction and the other without requiring authentication. OpenSSH…
-
Google Calendar, Docs hit by info-stealing malware — here’s how to safeguard your devices
Google Calendar, Docs hit by info-stealing malware — here’s how to safeguard your devices 2025-02-20 at 19:41 By Brooke Kato Getting hacked is never planned, but it seems that malware is infiltrating people’s calendars. This article is an excerpt from Latest Technology News and Product Reviews | New York Post View Original Source React to…
-
Sam Bankman-Fried rips Biden over ‘politicization’ of DOJ, warms to Trump: ‘Republican Party was far more reasonable’
Sam Bankman-Fried rips Biden over ‘politicization’ of DOJ, warms to Trump: ‘Republican Party was far more reasonable’ 2025-02-20 at 19:29 By Ariel Zilber Sam Bankman-Fried ripped the Biden administration for its “politicization” of the Justice Department and expressed sympathy for President Donald Trump. This article is an excerpt from Latest Technology News and Product Reviews…
-
Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines
Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines 2025-02-20 at 19:29 By Ryan Naraine China-linked cyberespionage toolkits are popping up in ransomware attacks, forcing defenders to rethink how they combat state-backed hackers. The post Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines appeared first on SecurityWeek. This article is an excerpt…
-
Mobile phishing threats are evolving, according to new research
Mobile phishing threats are evolving, according to new research 2025-02-20 at 19:13 By A new report highlights trends in mobile-specific phishing attacks. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:
-
US minerals company says crooks broke into email and helped themselves to $500K
US minerals company says crooks broke into email and helped themselves to $500K 2025-02-20 at 18:47 By Connor Jones A painful loss for young company that’s yet to generate revenue A NASDAQ-listed US minerals company says cybercriminals broke into its systems on Valentine’s Day and paid themselves around $500,000 – money earmarked for a vendor.……
-
TikTok lays off trust and safety staffers — as future remains in limbo: report
TikTok lays off trust and safety staffers — as future remains in limbo: report 2025-02-20 at 18:06 By Thomas Barrabi TikTok reportedly laid off members of its global trust and safety team as part of a restructuring – even as the China-owned company fights to stay online in the US. This article is an excerpt…
-
Microsoft Azure faceplants in Norway, taking government services with it
Microsoft Azure faceplants in Norway, taking government services with it 2025-02-20 at 18:06 By Paul Kunert Locals see red as public cloud’s service health dashboard shows green Norwegians fell victim to a prolonged Microsoft Azure outage today, which impacted businesses and took down multiple government websites delivering online services to citizens.… This article is an…
-
Cybersecurity jobs available right now in the USA: February 20, 2025
Cybersecurity jobs available right now in the USA: February 20, 2025 2025-02-20 at 18:06 By Anamarija Pogorelec Compliance & Privacy Specialist McKesson | Remote – View job details As a Compliance & Privacy Specialist, you will identify potential gaps, establish and maintain policies and procedures to guide the business in complying with regulatory requirements, create…
-
Mining Company NioCorp Loses $500,000 in BEC Hack
Mining Company NioCorp Loses $500,000 in BEC Hack 2025-02-20 at 18:06 By Eduard Kovacs NioCorp Developments has informed the SEC that it lost $0.5 million after its systems were compromised. The post Mining Company NioCorp Loses $500,000 in BEC Hack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React…
-
NASA’s on-again, off-again job cuts – what’s the plan?
NASA’s on-again, off-again job cuts – what’s the plan? 2025-02-20 at 17:34 By Richard Speed Lucky there isn’t an asteroid headed for Earth for which a demoralized space agency might need to mount a redirect mission Comment The US space agency, NASA, is famous for looking to the future. However, the fiasco of the last…
-
Runa Assure provides end-to-end fraud protection
Runa Assure provides end-to-end fraud protection 2025-02-20 at 17:05 By Industry News Runa launched Runa Assure, a security suite specifically built to fortify payout processes against threats of fraud, cyberattacks, and compliance risks. Runa Assure was purpose-built for instant payout methods, including gift cards, prepaid, and push-to-card, and now protects over two million unique recipients…
-
Only 1 in 3 cybersecurity professionals would recommend their employer
Only 1 in 3 cybersecurity professionals would recommend their employer 2025-02-20 at 17:05 By A new report offers insight into hiring trends, cyber professional compensation and job satisfaction. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:
-
Critical flaws in Mongoose library expose MongoDB to data thieves, code execution
Critical flaws in Mongoose library expose MongoDB to data thieves, code execution 2025-02-20 at 16:52 By Connor Jones Bugs fixed, updating to the latest version is advisable Security sleuths found two critical vulnerabilities in a third-party library that MongoDB relies on, which means bad guys can potentially steal data and run code.… This article is…
-
PRevent: Open-source tool to detect malicious code in pull requests
PRevent: Open-source tool to detect malicious code in pull requests 2025-02-20 at 16:52 By Zeljka Zorz Apiiro security researchers have released open source tools that can help organizations detect malicious code as part of their software development lifecycle: PRevent (a scanner for pull requests), and a malicious code detection ruleset for Semgrep and Opengrep static…
-
AI Can Supercharge Productivity, But we Still Need a Human-in-the-Loop
AI Can Supercharge Productivity, But we Still Need a Human-in-the-Loop 2025-02-20 at 16:32 By Marc Solomon AI systems can sometimes struggle with complex or nuanced situations, so human intervention can help identify and address potential issues that algorithms might not. The post AI Can Supercharge Productivity, But we Still Need a Human-in-the-Loop appeared first on…
-
Talk of Broadcom and TSMC grabbing pieces of Intel lights fire under investors
Talk of Broadcom and TSMC grabbing pieces of Intel lights fire under investors 2025-02-20 at 16:21 By Dan Robinson Chipzilla’s design and manufacturing limbs said to be on the table Venture capitalists are circling Intel amid talk that the beleaguered chip giant may be carved up between Broadcom and TSMC, with one taking the design…
-
North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware
North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware 2025-02-20 at 16:21 By Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North Korea, has been codenamed DeceptiveDevelopment, which overlaps with clusters…
-
China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware
China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware 2025-02-20 at 16:21 By A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases. The campaign, codenamed…
-
Trustwave Becomes First Pure-Play MDR Provider to Achieve FedRAMP Authorization
Trustwave Becomes First Pure-Play MDR Provider to Achieve FedRAMP Authorization 2025-02-20 at 16:02 By Trustwave has attained authorized status by the Federal Risk and Authorization Management Program (FedRAMP) for its Government Fusion platform. This announcement follows Trustwave being named earlier this year as an official StateRAMP-authorized vendor. This article is an excerpt from Trustwave Blog View Original Source React…
-
Insiders say IBM’s broader return-to-office plan hits older, more expensive staff hard
Insiders say IBM’s broader return-to-office plan hits older, more expensive staff hard 2025-02-20 at 15:41 By Thomas Claburn IT giant doing whatever it takes to reach $300 a share IBM is looking to reduce expenses through what’s described as a co-location program that, according to current and former employees who spoke with The Register, appears…
-
Atlassian Patches Critical Vulnerabilities in Confluence, Crowd
Atlassian Patches Critical Vulnerabilities in Confluence, Crowd 2025-02-20 at 15:40 By Ionut Arghire Atlassian has released patches for 12 critical- and high-severity vulnerabilities in Bamboo, Bitbucket, Confluence, Crowd, and Jira. The post Atlassian Patches Critical Vulnerabilities in Confluence, Crowd appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to…
-
CISA, FBI Warn of China-Linked Ghost Ransomware Attacks
CISA, FBI Warn of China-Linked Ghost Ransomware Attacks 2025-02-20 at 15:40 By Ionut Arghire CISA and the FBI warn organizations of attacks employing the Ghost (Cring) ransomware, operated by Chinese hackers. The post CISA, FBI Warn of China-Linked Ghost Ransomware Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source…
-
HP deliberately adds 15 minutes waiting time for telephone support calls
HP deliberately adds 15 minutes waiting time for telephone support calls 2025-02-20 at 15:04 By Paul Kunert Longer wait time designed to push print or PC consumers to digital support channels, sorry, ‘self-solve’ HP is trying to force consumer PC and print customers to use digital support channels by setting a minimum 15-minute wait time…
-
UK tax authority eyes £880M overhaul for Northern Ireland trade services
UK tax authority eyes £880M overhaul for Northern Ireland trade services 2025-02-20 at 15:04 By Lindsay Clark Cost of post-Brexit arrangements revealed as HMRC looks at options following Fujitsu contract The UK’s tax collector is looking for a tech supplier to take on a £370 million, seven-year contract to support a digital platform and call…
-
97% of companies block or restrict generative AI usage
97% of companies block or restrict generative AI usage 2025-02-20 at 15:04 By The data from a cybersecurity report shows that 66% of respondents use GenAI for work, with 64% using personal email accounts to access the tools. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to…
-
PCI DSS 4.0 Mandates DMARC By 31st March 2025
PCI DSS 4.0 Mandates DMARC By 31st March 2025 2025-02-20 at 14:05 By The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025, DMARC implementation will be mandatory! This requirement highlights the importance of preventative measures against email fraud, domain spoofing, and phishing in…
-
Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware
Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware 2025-02-20 at 14:05 By A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases. The campaign, codenamed…
-
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives 2025-02-20 at 14:05 By A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. “The legitimate application used in the attack, jarsigner, is a file created during…
-
Two arrested after pensioner scammed out of six-figure crypto nest egg
Two arrested after pensioner scammed out of six-figure crypto nest egg 2025-02-20 at 13:47 By Connor Jones The latest in a long line of fraud stings worth billions each year Two men are in police custody after being arrested in connection with a July cryptocurrency fraud involving a man in his seventies.… This article is…
-
PoC Exploit Published for Critical Ivanti EPM Vulnerabilities
PoC Exploit Published for Critical Ivanti EPM Vulnerabilities 2025-02-20 at 13:47 By Ionut Arghire Proof-of-concept (PoC) code and technical details on four critical-severity Ivanti EPM vulnerabilities are now available. The post PoC Exploit Published for Critical Ivanti EPM Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to…
-
Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand 2025-02-20 at 13:35 By Zeljka Zorz A new, improved version of Darcula, a cat-themed phishing-as-a-service (PhaaS) platform aimed at serving Chinese-speaking criminals, will be released this month and will allow malicious users to create customized phishing kits to target a wider variety…
-
Ransomware 2025: Attacks Keep Rising as Threat Shows its Resilience
Ransomware 2025: Attacks Keep Rising as Threat Shows its Resilience 2025-02-20 at 13:16 By Threat Hunter Team Despite the takedowns of some well-known names, ransomware remains a major cybercrime threat. This article is an excerpt from Broadcom Software Blogs View Original Source React to this headline:
-
US Military Health Provider HNFS Pays $11M in Settlement Over Cybersecurity Failures
US Military Health Provider HNFS Pays $11M in Settlement Over Cybersecurity Failures 2025-02-20 at 13:16 By Ionut Arghire US military health benefits program administrator HNFS to pay $11 million in settlement over its false claims of cybersecurity compliance. The post US Military Health Provider HNFS Pays $11M in Settlement Over Cybersecurity Failures appeared first on…
-
Microsoft Patches Exploited Power Pages Vulnerability
Microsoft Patches Exploited Power Pages Vulnerability 2025-02-20 at 12:49 By Eduard Kovacs Microsoft has patched CVE-2025-24989, a Power Pages privilege escalation vulnerability that has been exploited in attacks. The post Microsoft Patches Exploited Power Pages Vulnerability appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:
-
Dark mode might be burning more juice than you think
Dark mode might be burning more juice than you think 2025-02-20 at 12:33 By Dan Robinson Most people crank up the brightness, making energy savings moot Using apps and websites in dark mode can actually use more energy than standard mode, according to researchers, as it causes people to crank up the brightness.… This article…
-
Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now
Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now 2025-02-20 at 12:33 By For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether deployed on-premises or in hybrid environments, companies of all sizes rely on Exchange for seamless internal…
-
Hackers pose as employers to steal crypto, login credentials
Hackers pose as employers to steal crypto, login credentials 2025-02-20 at 12:03 By Help Net Security Since early 2024, ESET researchers have been tracking DeceptiveDevelopment, a series of malicious campaigns linked to North Korea-aligned operators. Disguising themselves as software development recruiters, these threat actors lure victims with fake job offers and deliver software projects embedded…