Cybersecurity and other IT news aggregator

LATEST FEEDS

  • Bill Gates unearths Microsoft’s ancient code like a proud nerd dad

    Bill Gates unearths Microsoft’s ancient code like a proud nerd dad 2025-04-03 at 16:32 By Richard Speed Founder shares 4K Altair BASIC source ahead of 50th anniversary Microsoft co-founder Bill Gates has shared the 1975 source code for Altair BASIC.… This article is an excerpt from The Register View Original Source React to this headline:


  • Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware

    Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware 2025-04-03 at 16:32 By The North Korean threat actors behind Contagious Interview have adopted the increasingly popular ClickFix social engineering tactic to lure job seekers in the cryptocurrency sector to deliver a previously undocumented Go-based backdoor called GolangGhost on Windows and macOS systems.…


  • Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439)

    Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439) 2025-04-03 at 16:15 By Zeljka Zorz CVE-2024-20439, a static credential vulnerability in the Cisco Smart Licensing Utility, is being exploited by attackers in the wild, CISA has confirmed on Monday by adding the flaw to its Known Exploited Vulnerabilities catalog. Cisco has followed up…


  • Hunters International Ransomware Gang Rebranding, Shifting Focus

    Hunters International Ransomware Gang Rebranding, Shifting Focus 2025-04-03 at 16:15 By Ionut Arghire The notorious cybercrime group Hunters International is dropping ransomware to focus on data theft and extortion. The post Hunters International Ransomware Gang Rebranding, Shifting Focus appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this…


  • Trump ‘Liberation Day’ tariffs create chaos in markets, recession concerns

    Trump ‘Liberation Day’ tariffs create chaos in markets, recession concerns 2025-04-03 at 16:02 By Cointelegraph by Aaron Wood US President Donald Trump introduced a slew of tariffs on April 2, sending markets into a tailspin and dividing crypto observers as to their possible long-term effects.  At a special event at the White House, Trump signed…


  • Wintermute transfers $75M FDUSD since depegs, in $3M arbitrage opportunity

    Wintermute transfers $75M FDUSD since depegs, in $3M arbitrage opportunity 2025-04-03 at 16:02 By Cointelegraph by Zoltan Vardai Market makers’ blockchain transactions point to a potential $3 million arbitrage opportunity related to the depegging of the FDUSD stablecoin. The First Digital US dollar-pegged stablecoin (FDUSD) depegged on April 2, after Tron founder Justin Sun claimed…


  • CEX listings outperform Nasdaq and Dow IPOs with 80% average returns

    CEX listings outperform Nasdaq and Dow IPOs with 80% average returns 2025-04-03 at 16:02 By Cointelegraph by Zoltan Vardai Cryptocurrency listings have outperformed the average of traditional stock listings, despite recent community criticism regarding the manipulation potential of token listings on centralized exchanges. Token listing procedures on centralized cryptocurrency exchanges (CEXs) drew significant controversy after…


  • Why is someone mass-scanning Juniper and Palo Alto Networks products?

    Why is someone mass-scanning Juniper and Palo Alto Networks products? 2025-04-03 at 16:02 By Jessica Lyons Espionage? Botnets? Trying to exploit a zero-day? Someone or something is probing devices made by Juniper Networks and Palo Alto Networks, and researchers think it could be evidence of espionage attempts, attempts to build a botnet, or an effort…


  • Strengthening Healthcare Security: Navigating HIPAA’s Latest Cybersecurity Requirements

    Strengthening Healthcare Security: Navigating HIPAA’s Latest Cybersecurity Requirements 2025-04-03 at 16:02 By Don White Understand the Upcoming HIPAA Changes: Get a clear breakdown of the 2025 HIPAA Security Rule updates and what they mean for healthcare providers and business associates. Strengthen Cybersecurity Resilience: Learn how the new regulations emphasize cyber resilience, requiring proactive measures like…


  • Zorin OS 17.3 takes the Brave step of changing its default browser from Firefox

    Zorin OS 17.3 takes the Brave step of changing its default browser from Firefox 2025-04-03 at 15:17 By Liam Proven To be fair, it sounds like the team has ironed out the more controversial features Comment  The latest version of Zorin OS, a popular Windows-macOS-like Ubuntu Linux remix, looks good, but there’s one change that…


  • AI Threats Are Evolving Fast — Learn Practical Defense Tactics in this Expert Webinar

    AI Threats Are Evolving Fast — Learn Practical Defense Tactics in this Expert Webinar 2025-04-03 at 15:17 By The rules have changed. Again. Artificial intelligence is bringing powerful new tools to businesses. But it’s also giving cybercriminals smarter ways to attack. They’re moving quicker, targeting more precisely, and slipping past old defenses without being noticed.…


  • US sanctions 8 crypto wallets tied to Garantex, Houthis

    US sanctions 8 crypto wallets tied to Garantex, Houthis 2025-04-03 at 15:02 By Cointelegraph by Adrian Zmudzinski The US Treasury Department sanctioned eight cryptocurrency wallet addresses linked to Russian crypto exchange Garantex and the Houthis. The United States Office of Foreign Assets Control (OFAC) sanctioned eight crypto addresses that data from blockchain forensic firms Chainalysis…


  • Cybersecurity M&A Roundup: 23 Deals Announced in March 2025

    Cybersecurity M&A Roundup: 23 Deals Announced in March 2025 2025-04-03 at 15:01 By Eduard Kovacs Less than two dozen cybersecurity merger and acquisition (M&A) deals were announced in March 2025. The post Cybersecurity M&A Roundup: 23 Deals Announced in March 2025 appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source…


  • EU: These are scary times – let’s backdoor encryption!

    EU: These are scary times – let’s backdoor encryption! 2025-04-03 at 14:31 By Iain Thomson ProtectEU plan wants to have its cake and eat it too The EU has issued its plans to keep the continent’s denizens secure and among the pages of bureaucratese are a few worrying sections that indicate the political union wants…


  • Phishers are increasingly impersonating electronic toll collection companies

    Phishers are increasingly impersonating electronic toll collection companies 2025-04-03 at 14:31 By Zeljka Zorz Steam was the most imitated brands by phishers in the first quarter of 2025, followed by Microsoft and Facebook/Meta, Guardio researchers have revealed. “Historically, the #1 spot has been dominated by the usual suspects – big tech companies like Meta, Microsoft,…


  • AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock

    AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock 2025-04-03 at 14:18 By AI holds the promise to revolutionize all sectors of enterpriseーfrom fraud detection and content personalization to customer service and security operations. Yet, despite its potential, implementation often stalls behind a wall of security, legal, and compliance hurdles. Imagine this…


  • Crypto donations top $1B in 2024, gain traction after Myanmar, Thailand quake

    Crypto donations top $1B in 2024, gain traction after Myanmar, Thailand quake 2025-04-03 at 14:02 By Cointelegraph by Zoltan Vardai Binance co-founder Changpeng “CZ” Zhao donated over half a million dollars worth of crypto to the earthquake disaster relief effort in Thailand and Myanmar, in another testament to the growing utility of blockchain-based emergency charity…


  • 39 Million Secrets Leaked on GitHub in 2024

    39 Million Secrets Leaked on GitHub in 2024 2025-04-03 at 14:01 By Ionut Arghire GitHub has announced new capabilities to help organizations and developers keep secrets in their code protected. The post 39 Million Secrets Leaked on GitHub in 2024 appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React…


  • System builders say server prices set to spike as Trump plays customs cowboy

    System builders say server prices set to spike as Trump plays customs cowboy 2025-04-03 at 13:31 By Dan Robinson Tariff moves threaten supply chain stability The cost of buying servers for business will inevitably rise as a result of US President Donald Trump’s trade policies, at least in the short term, as uncertainty grips the…


  • Details Emerge on CVE Controversy Around Exploited CrushFTP Vulnerability 

    Details Emerge on CVE Controversy Around Exploited CrushFTP Vulnerability  2025-04-03 at 13:31 By Eduard Kovacs Two CVEs now exist for an actively exploited CrushFTP vulnerability and much of the security industry is using the ‘wrong one’. The post Details Emerge on CVE Controversy Around Exploited CrushFTP Vulnerability  appeared first on SecurityWeek. This article is an…


  • Vulnerabilities Expose Cisco Meraki and ECE Products to DoS Attacks

    Vulnerabilities Expose Cisco Meraki and ECE Products to DoS Attacks 2025-04-03 at 13:06 By Ionut Arghire Cisco fixes two high-severity denial-of-service vulnerabilities in Meraki devices and Enterprise Chat and Email. The post Vulnerabilities Expose Cisco Meraki and ECE Products to DoS Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original…


  • Heterogeneous stacks, ransomware, and ITaaS: A DR nightmare

    Heterogeneous stacks, ransomware, and ITaaS: A DR nightmare 2025-04-03 at 12:35 By Chris Mellor Recovery’s never been harder in today’s tangled, outsourced infrastructure Comment  Disaster recovery is getting tougher as IT estates sprawl across on-prem gear, public cloud, SaaS, and third-party ITaaS providers. And it’s not floods or fires causing most outages anymore – ransomware…


  • EU Says VPNs Are “Key” Obstacle for Law Enforcement

    EU Says VPNs Are “Key” Obstacle for Law Enforcement 2025-04-03 at 12:07 View original post at Safety Detectives VPNs are now in the crosshairs of the European Union, according to a recent report by an EU expert group. The latest report from High-Level Group (HLG) branded VPNs (Virtual Private Networks) as one of the leading “key challenges” for…


  • Alabama, Minnesota lawmakers join US states pushing for Bitcoin reserves

    Alabama, Minnesota lawmakers join US states pushing for Bitcoin reserves 2025-04-03 at 12:06 By Cointelegraph by Jesse Coghlan Lawmakers in the US states of Minnesota and Alabama filed companion bills to identical existing bills that if passed into law, would allow each state to buy Bitcoin. The Minnesota Bitcoin Act, or HF 2946, was introduced…


  • Google Released Second Fix for Quick Share Flaws After Patch Bypass

    Google Released Second Fix for Quick Share Flaws After Patch Bypass 2025-04-03 at 12:06 By Ionut Arghire Google’s patches for Quick Share for Windows vulnerabilities leading to remote code execution were incomplete and could be easily bypassed. The post Google Released Second Fix for Quick Share Flaws After Patch Bypass appeared first on SecurityWeek. This…


  • UK government told to get a grip on £23B tech spend

    UK government told to get a grip on £23B tech spend 2025-04-03 at 11:46 By Lindsay Clark Former official also points to processes driving up the cost of IT investment The UK government does not have a clear picture of what it is spending on digital technology, and its approach to buying associated services and…


  • Google Patches Quick Share Vulnerability Enabling Silent File Transfers Without Consent

    Google Patches Quick Share Vulnerability Enabling Silent File Transfers Without Consent 2025-04-03 at 11:46 By Cybersecurity researchers have disclosed details of a new vulnerability impacting Google’s Quick Share data transfer utility for Windows that could be exploited to achieve a denial-of-service (DoS) or send arbitrary files to a target’s device without their approval. The flaw,…


  • 1touch.io helps organizations safeguard sensitive data

    1touch.io helps organizations safeguard sensitive data 2025-04-03 at 11:22 By Industry News 1touch.io launched the next-generation Enterprise Data Security Posture Management (DSPM) platform, a solution designed specifically for hybrid, multi-cloud, on-premises, and mainframe environments. By integrating continuous data discovery, real-time access intelligence, AI-powered risk prioritization, and policy-driven orchestration into a unified platform, 1touch.io delivers business…


  • Bitcoin gets $71K target as tariffs deal rare US business outlook slump

    Bitcoin gets $71K target as tariffs deal rare US business outlook slump 2025-04-03 at 11:05 By Cointelegraph by William Suberg Bitcoin (BTC) faces conditions similar to the 2022 bear market bottom as US business sees “very high risk” to come. In his latest analysis, Charles Edwards, the founder of quantitative Bitcoin and digital asset fund…


  • Corgea BLAST uncovers hidden vulnerabilities in code

    Corgea BLAST uncovers hidden vulnerabilities in code 2025-04-03 at 11:05 By Industry News Corgea launches BLAST (Business Logic Application Testing), its AI-driven cybersecurity platform designed to address the risks associated with hidden code vulnerabilities, human error, and security flaws introduced by AI-assisted coding tools. Traditional Static Application Security Testing (SAST) scanners and manual code review…


  • On the issue of AI copyright, Blair Institute favors tech bros over Cool Britannia

    On the issue of AI copyright, Blair Institute favors tech bros over Cool Britannia 2025-04-03 at 10:48 By Lindsay Clark Think tank report backs data mining for machine learning, leaving artists and rights holders behind Opinion  Former UK prime minister Tony Blair became famous for standing shoulder to shoulder with allies, even though the fallout…


  • Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices

    Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices 2025-04-03 at 10:48 By Counterfeit versions of popular smartphone models that are sold at reduced prices have been found to be preloaded with a modified version of an Android malware called Triada. “More than 2,600 users in different countries have encountered the new version of…


  • Bluefin simplifies network tokenization access and management for merchants

    Bluefin simplifies network tokenization access and management for merchants 2025-04-03 at 10:32 By Industry News Bluefin announced the addition of network tokenization capabilities to its ShieldConex Tokenization as a Service and Orchestration platforms, enabling merchants to directly provision network-issued payment tokens from card brands such as Visa, Mastercard, American Express, and Discover. Network tokenization replaces…


  • CyberQP launches Zero Trust Helpdesk Security Platform

    CyberQP launches Zero Trust Helpdesk Security Platform 2025-04-03 at 10:17 By Industry News CyberQP has launched its Zero Trust Helpdesk Security Platform—combining QGuard for Privileged Access Management (PAM) and QDesk for End-User Access Management (EUAM). This unified solution helps IT teams reduce risk, improve efficiency, and eliminate standing privileges across the organization. A key innovation…


  • Treasure DAO announces huge pivot in hopes of extending runway to February

    Treasure DAO announces huge pivot in hopes of extending runway to February 2025-04-03 at 10:07 By Cointelegraph by Stephen Katte Decentralized video game ecosystem Treasure DAO is restructuring as “a matter of survival” to extend its financial runway to at least February 2026. Treasure DAO’s chief contributor John Patten says in an April 2 video…


  • Customer info allegedly stolen from Royal Mail, Samsung via compromised supplier

    Customer info allegedly stolen from Royal Mail, Samsung via compromised supplier 2025-04-03 at 09:47 By Iain Thomson Stamp it out: Infostealer malware at German outfit may be culprit Britain’s Royal Mail is investigating after a crew calling itself GHNA claimed it has put 144GB of the delivery giant’s data up for sale, perhaps after acquiring…


  • Beware fake AutoCAD, SketchUp sites dropping malware

    Beware fake AutoCAD, SketchUp sites dropping malware 2025-04-03 at 09:47 By Help Net Security Malware peddlers are saddling users with the TookPS downloader and the Lapmon and TeviRat backdoors via malicious sites that mimic official ones and ostensibly offer legitimate software for download, Kaspersky researchers have warned. Malicious websites (Source: Kaspersky) The list of impersonated…


  • Did ChatGPT come up with Trump’s tariff rate formula?

    Did ChatGPT come up with Trump’s tariff rate formula? 2025-04-03 at 09:04 By Cointelegraph by Martin Young There’s a crazy theory on social media that US President Donald Trump’s newly announced reciprocal tariff plan — which hits all countries with a minimum 10% tariff — could have been designed by an artificial intelligence chatbot. Only…


  • Bitcoiner speculates ‘massive’ bot spam briefly took down Bitcoin mailing list

    Bitcoiner speculates ‘massive’ bot spam briefly took down Bitcoin mailing list 2025-04-03 at 09:04 By Cointelegraph by Brayden Lindrea One of Bitcoin’s key communication tools used to discuss potential protocol changes was knocked out for several hours starting on April 2, with one moderator speculating it may have been a targeted attack assisted by bots. …


  • OpenStack delivers ‘Epoxy’ release, which it hopes will unglue VMware more customers

    OpenStack delivers ‘Epoxy’ release, which it hopes will unglue VMware more customers 2025-04-03 at 08:34 By Simon Sharwood The BBC and Blizzard Entertainment have chipped in with contributions The Open InfraFoundation has delivered a new version of OpenStack named “Epoxy” and thinks it’s an even better option for those seeking a VMware alternative.… This article…


  • 7 ways to get C-suite buy-in on that new cybersecurity tool

    7 ways to get C-suite buy-in on that new cybersecurity tool 2025-04-03 at 08:34 By Help Net Security You’re in the middle of a sprint, juggling deadlines, debugging code, fine-tuning pipelines, and then it happens—you stumble across the perfect cybersecurity tool. It promises to eliminate secrets in logs, reduce risks in CI/CD pipelines, and save…


  • Hackers are selling counterfeit phones with crypto-stealing malware

    Hackers are selling counterfeit phones with crypto-stealing malware 2025-04-03 at 08:15 By Cointelegraph by Stephen Katte Cybersecurity firm Kaspersky says it has uncovered thousands of counterfeit Android smartphones sold online with preinstalled malware designed to steal crypto and other sensitive data.  The Android devices are sold at reduced prices, cybersecurity firm Kaspersky Labs said in…


  • US House committee passes stablecoin-regulating STABLE Act

    US House committee passes stablecoin-regulating STABLE Act 2025-04-03 at 08:14 By Cointelegraph by Jesse Coghlan The US House Financial Services Committee has passed a Republican-backed stablecoin framework bill, which will now head to the House floor for a full vote. The Committee passed the Stablecoin Transparency and Accountability for a Better Ledger Economy, or STABLE…


  • Building a cybersecurity strategy that survives disruption

    Building a cybersecurity strategy that survives disruption 2025-04-03 at 08:14 By Mirko Zorz Cybersecurity isn’t what it used to be. Attackers are moving quicker, disruptions happen all the time, and many security plans built for more predictable times just can’t keep up. With everything from ransomware to geopolitical threats to cloud slip-ups hitting companies, there’s…


  • Cybercriminals exfiltrate data in just three days

    Cybercriminals exfiltrate data in just three days 2025-04-03 at 08:14 By Industry News In 56% of Sophos managed detection and response (MDR) and incident response (IR) cases, attackers gained initial access to networks by exploiting external remote services, including edge devices such as firewalls and VPNs, and by leveraging valid accounts. Compromised credentials remain the…


  • Legacy Stripe API Exploited to Validate Stolen Payment Cards in Web Skimmer Campaign

    Legacy Stripe API Exploited to Validate Stolen Payment Cards in Web Skimmer Campaign 2025-04-03 at 08:14 By Threat hunters are warning of a sophisticated web skimmer campaign that leverages a legacy application programming interface (API) from payment processor Stripe to validate stolen payment information prior to exfiltration. “This tactic ensures that only valid card data…


  • Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation

    Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation 2025-04-03 at 08:14 By In one of the largest coordinated law enforcement operations, authorities have dismantled Kidflix, a streaming platform that offered child sexual abuse material (CSAM). “A total of 1.8 million users worldwide logged on to the platform between April 2022 and March…


  • The threat of phishing attacks and law enforcement’s role (Part 1)

    The threat of phishing attacks and law enforcement’s role (Part 1) 2025-04-03 at 07:28 By Phishing remains one of the most pervasive and effective tools in a cybercriminal’s arsenal. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:


  • DDoS attacks now a dominant means of waging political cyber-warfare

    DDoS attacks now a dominant means of waging political cyber-warfare 2025-04-03 at 07:02 By Cointelegraph by Martin Young Distributed denial-of-service (DDoS) attacks are outpacing many traditional cyber threats and are no longer just a tool but a “dominant geopolitical weapon,” according to network security firm Netscout. Global DDoS activity increased by 12.7% in the second…


  • Open-source malware doubles, data exfiltration attacks dominate

    Open-source malware doubles, data exfiltration attacks dominate 2025-04-03 at 07:02 By Help Net Security There’s been a notable shift in the types of threats targeting software developers, with a total of 17,954 open source malware packages identified in Q1 2025, according to Sonatype. Quarterly breakdown (Source: Sonatype) The Q1 figure represents a significant decrease from…


Browse older archives

Scroll to Top