Cybersecurity and other IT news aggregator
LATEST FEEDS
-
Cyware strengthens threat intelligence management
Cyware strengthens threat intelligence management 2025-04-16 at 16:01 By Industry News Cyware has added Compromised Credential Management to the Cyware Intel Packaged Solution, a pre-configured threat intelligence program-in-a-box that enables security teams to operationalize threat intelligence faster by eliminating complex integrations and configurations. Built on Cyware Intel Exchange and pre-bundled with Team Cymru premium threat…
-
Russians lure European diplomats into malware trap with wine-tasting invite
Russians lure European diplomats into malware trap with wine-tasting invite 2025-04-16 at 15:45 By Iain Thomson Vintage phishing varietal has improved with age Russia never stops using proven tactics, and its Cozy Bear, aka APT 29, cyber-spies are once again trying to lure European diplomats into downloading malware with a phony invitation to a lux…
-
Bitcoin Treasury bonds may help US refinance $14T debt — VanEck exec
Bitcoin Treasury bonds may help US refinance $14T debt — VanEck exec 2025-04-16 at 15:22 By Cointelegraph by Helen Partz VanEck’s head of research has pitched a new type of US Treasury bond partially backed by Bitcoin to help refinance $14 trillion in US debt. Matthew Sigel pitched the concept of “BitBonds” — US Treasury…
-
Ethereum L2 development is ‘double-edged sword’ for ETH value
Ethereum L2 development is ‘double-edged sword’ for ETH value 2025-04-16 at 15:22 By Cointelegraph by Zoltan Vardai Ethereum’s push toward layer-2 (L2) blockchain scalability may be a double-edged sword for Ether, potentially weakening the value accrual of the world’s second-largest cryptocurrency, according to a new report from Binance Research. The report suggests that Ethereum’s L2…
-
Bitcoin could hit $1M if US buys 1M BTC — Bitcoin Policy Institute
Bitcoin could hit $1M if US buys 1M BTC — Bitcoin Policy Institute 2025-04-16 at 15:22 By Cointelegraph by Ezra Reguerra A Bitcoin Policy Institute (BPI) executive floated a $1 million Bitcoin price scenario if the United States were to buy 1 million BTC. In a Bitcoin Magazine podcast, Zach Shapiro, the head of policy…
-
Security industry mourns the loss of Keith Oringer
Security industry mourns the loss of Keith Oringer 2025-04-16 at 15:21 By Keith Oringer, Founder and President of Security ProAdvisors, passed away on April 11, 2025. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:
-
Ransomware Group Claims Hacking of Oregon Regulator After Data Breach Denial
Ransomware Group Claims Hacking of Oregon Regulator After Data Breach Denial 2025-04-16 at 15:21 By Eduard Kovacs The Rhysida ransomware gang claims to have stolen 2.5 Tb of files from the Oregon Department of Environmental Quality. The post Ransomware Group Claims Hacking of Oregon Regulator After Data Breach Denial appeared first on SecurityWeek. This article…
-
Gamma AI Platform Abused in Phishing Chain to Spoof Microsoft SharePoint Logins
Gamma AI Platform Abused in Phishing Chain to Spoof Microsoft SharePoint Logins 2025-04-16 at 15:21 By Threat actors are leveraging an artificial intelligence (AI) powered presentation platform named Gamma in phishing attacks to direct unsuspecting users to spoofed Microsoft login pages. “Attackers weaponize Gamma, a relatively new AI-based presentation tool, to deliver a link to…
-
From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains
From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains 2025-04-16 at 15:21 By Introduction Cyber threats targeting supply chains have become a growing concern for businesses across industries. As companies continue to expand their reliance on third-party vendors, cloud-based services, and global logistics networks, cybercriminals are exploiting vulnerabilities within these interconnected…
-
Funding uncertainty may spell the end of MITRE’s CVE program
Funding uncertainty may spell the end of MITRE’s CVE program 2025-04-16 at 14:56 By Zeljka Zorz The future of the Common Vulnerabilities and Exposures (CVE) program hangs in the balance: MITRE, the not-for-profit US organization that runs it, could lose the US federal funding that helps them maintain it. But others have been waiting in…
-
Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild
Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild 2025-04-16 at 14:55 By Ionut Arghire In recent attacks, the state-sponsored backdoor BPFDoor is using a controller to open a reverse shell and move laterally. The post Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild appeared first on SecurityWeek. This article is an…
-
In wake of Horizon scandal, forensics prof says digital evidence is a minefield
In wake of Horizon scandal, forensics prof says digital evidence is a minefield 2025-04-16 at 14:44 By Connor Jones Outdated and misinformed legal presumptions at the heart of concerns Digital forensics in the UK is in need of reform, says one expert, as the deadline to advise the government on computer evidence rules arrives.… This…
-
Critical Vulnerability Found in Apache Roller Blog Server
Critical Vulnerability Found in Apache Roller Blog Server 2025-04-16 at 14:44 By Ionut Arghire A critical vulnerability in Apache Roller could be used to maintain persistent access by reusing older sessions even after password changes. The post Critical Vulnerability Found in Apache Roller Blog Server appeared first on SecurityWeek. This article is an excerpt from…
-
Microsoft hits Ctrl-Z after Teams trips over file sharing
Microsoft hits Ctrl-Z after Teams trips over file sharing 2025-04-16 at 14:01 By Richard Speed Maybe don’t push to production without properly testing first? Microsoft Teams experienced a file-sharing outage overnight that disrupted collaboration for many users and forced the software biz to roll back a recent backend change.… This article is an excerpt from…
-
Microsoft Warns of Node.js Abuse for Malware Delivery
Microsoft Warns of Node.js Abuse for Malware Delivery 2025-04-16 at 14:01 By Eduard Kovacs In the past months Microsoft has seen multiple campaigns involving Node.js to deliver malware and other malicious payloads. The post Microsoft Warns of Node.js Abuse for Malware Delivery appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original…
-
Chrome 135, Firefox 137 Updates Patch Severe Vulnerabilities
Chrome 135, Firefox 137 Updates Patch Severe Vulnerabilities 2025-04-16 at 14:01 By Ionut Arghire Chrome 135 and Firefox 137 updates have been rolled out with patches for critical- and high-severity vulnerabilities. The post Chrome 135, Firefox 137 Updates Patch Severe Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source…
-
Oracle Patches 180 Vulnerabilities With April 2025 CPU
Oracle Patches 180 Vulnerabilities With April 2025 CPU 2025-04-16 at 14:01 By Ionut Arghire Oracle’s April 2025 Critical Patch Update contains 378 security patches that resolve approximately 180 unique CVEs. The post Oracle Patches 180 Vulnerabilities With April 2025 CPU appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React…
-
New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks
New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks 2025-04-16 at 14:01 By Cybersecurity researchers have unearthed a new controller component associated with a known backdoor called BPFDoor as part of cyber attacks targeting telecommunications, finance, and retail sectors in South Korea, Hong Kong, Myanmar, Malaysia, and Egypt in 2024. “The controller could…
-
Product Walkthrough: A Look Inside Wing Security’s Layered SaaS Identity Defense
Product Walkthrough: A Look Inside Wing Security’s Layered SaaS Identity Defense 2025-04-16 at 14:01 By Intro: Why hack in when you can log in? SaaS applications are the backbone of modern organizations, powering productivity and operational efficiency. But every new app introduces critical security risks through app integrations and multiple users, creating easy access points…
-
Italy finance minister warns US stablecoins pose bigger threat than tariffs
Italy finance minister warns US stablecoins pose bigger threat than tariffs 2025-04-16 at 13:07 By Cointelegraph by Ezra Reguerra Italy’s minister of economy and finance warned that US stablecoin policies are more concerning than President Donald Trump’s tariffs, citing the potential for these crypto assets to undermine the euro’s dominance in cross-border payments. Speaking at…
-
OKX reenters US market following $505M DOJ settlement
OKX reenters US market following $505M DOJ settlement 2025-04-16 at 13:07 By Cointelegraph by Adrian Zmudzinski Seychelles-based cryptocurrency exchange OKX announced that it is reentering the US market. According to an April 16 blog post, OKX will return to the United States market along with the appointment of former Barclays director Roshan Robert as its…
-
Legacy tech is the gift that keeps billing for UK’s tax collector
Legacy tech is the gift that keeps billing for UK’s tax collector 2025-04-16 at 12:59 By Lindsay Clark £5.2B more thrown at the never-ending quest to modernize HMRC In 2022, the UK’s tax collector put £4.5 billion ($5.9 billion) on the table to help its applications become “less dependent upon legacy technologies.” The extent to…
-
Sony’s Soneium taps EigenLayer to cut finality to under 10 seconds
Sony’s Soneium taps EigenLayer to cut finality to under 10 seconds 2025-04-16 at 12:09 By Cointelegraph by Zoltan Vardai Soneium, a layer-2 (L2) blockchain network developed by Sony Block Solutions Labs, said it has slashed its blockchain finality time by over 98%, as it aims to solve one of the biggest challenges in blockchain scalability.…
-
TalkTalk Business pulls disappearing act on customer emails
TalkTalk Business pulls disappearing act on customer emails 2025-04-16 at 11:55 By Richard Speed It’s not DNS. It can’t be DNS? Right? TalkTalk Business customers were forced to survive without email nearly a week after a technical fault disrupted domain hosting.… This article is an excerpt from The Register View Original Source React to this…
-
CrazyHunter Campaign Targets Taiwanese Critical Sectors
CrazyHunter Campaign Targets Taiwanese Critical Sectors 2025-04-16 at 11:55 By This blog entry details research on emerging ransomware group CrazyHunter, which has launched a sophisticated campaign aimed at Taiwan’s essential services. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:
-
Internet Giants Agree to Reduce TLS Certificate Lifespan to 47 Days by 2029
Internet Giants Agree to Reduce TLS Certificate Lifespan to 47 Days by 2029 2025-04-16 at 11:55 By Eduard Kovacs Major companies have agreed to gradually reduce the lifetime of TLS certificates over the next few years. The post Internet Giants Agree to Reduce TLS Certificate Lifespan to 47 Days by 2029 appeared first on SecurityWeek.…
-
Bitcoin trader sees gold ‘blow-off top’ as XAU nears new $3.3K record
Bitcoin trader sees gold ‘blow-off top’ as XAU nears new $3.3K record 2025-04-16 at 11:08 By Cointelegraph by William Suberg Bitcoin (BTC) faces an uphill struggle as a safe haven in 2025 as gold fund inflows circle $80 billion. Data from Bank of America (BoA) uploaded to X by trading resource The Kobeissi Letter on…
-
How trade wars impact stocks and crypto
How trade wars impact stocks and crypto 2025-04-16 at 11:08 By Cointelegraph by Bradley Peak The 2025 US-China trade war On April 2, 2025, President Donald Trump declared a national economic emergency and announced sweeping new import tariffs. Dubbed “Liberation Day,” the policy set a baseline 10% tariff on all foreign goods, with a massive…
-
Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users
Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users 2025-04-16 at 11:07 By Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp and Telegram that contain cryptocurrency clipper functionality as part of a campaign since June 2024. While using malware-laced apps to steal financial…
-
Cato Networks unveils GenAI security controls for Cato CASB
Cato Networks unveils GenAI security controls for Cato CASB 2025-04-16 at 10:50 By Industry News Cato Networks introduced GenAI security controls for Cato CASB (Cloud Access Security Broker). Cato CASB, a native feature in the Cato SASE Cloud Platform, is now enhanced with new capabilities for GenAI applications including a shadow AI dashboard and policy engine. With…
-
Apple: Since you care about yOuR pRiVaCy, we’ll train our AI on made-up emails
Apple: Since you care about yOuR pRiVaCy, we’ll train our AI on made-up emails 2025-04-16 at 10:44 By Thomas Claburn It’s LLMs all the way down Apple, having starved its AI models of data by respecting customer privacy, plans to improve its chatbot suggestions by using made-up emails.… This article is an excerpt from The…
-
NEC Identity Cloud Service simplifies identity verification
NEC Identity Cloud Service simplifies identity verification 2025-04-16 at 10:44 By Industry News NEC introduces Identity Cloud Service (ICS), a new identity verification solution to deliver streamlined, secure and cost-effective access management. Based on NEC’s biometric technology, ICS provides verification and search capabilities for corporations and global enterprises, financial services, hospitality, e-commerce, government services agencies…
-
Guess what happens when ransomware fiends find ‘insurance’ ‘policy’ in your files
Guess what happens when ransomware fiends find ‘insurance’ ‘policy’ in your files 2025-04-16 at 09:39 By Iain Thomson It involves a number close to three or six depending on the fiend Ransomware operators jack up their ransom demands by a factor of 2.8x if they detect a victim has cyber-insurance, a study highlighted by the…
-
U.S. Govt. Funding for MITRE’s CVE Ends April 16, Cybersecurity Community on Alert
U.S. Govt. Funding for MITRE’s CVE Ends April 16, Cybersecurity Community on Alert 2025-04-16 at 09:39 By The U.S. government funding for non-profit research giant MITRE to operate and maintain its Common Vulnerabilities and Exposures (CVE) program will expire Wednesday, an unprecedented development that could shake up one of the foundational pillars of the global…
-
Is Popcorn Time Safe Without a VPN & Legal to Use in 2025
Is Popcorn Time Safe Without a VPN & Legal to Use in 2025 2025-04-16 at 09:36 View original post at vpnMentor Popcorn Time gained popularity for its easy-to-use interface and vast content library, but the way it provides content raises security and legal concerns. Unlike traditional streaming services, it relies on torrent-based technology, which comes…
-
Bitcoin’s wide price range to continue, no longer a ‘long only’ bet — Analyst
Bitcoin’s wide price range to continue, no longer a ‘long only’ bet — Analyst 2025-04-16 at 09:14 By Cointelegraph by Ciaran Lyons Bitcoin could be heading into another extended consolidation phase, with short-term indicators suggesting a more bearish outlook, contrary to the broader crypto community’s view, according to the head of research at 10x Research.…
-
Chipmaker stocks slide as Nvidia faces $5.5B charge with US restrictions
Chipmaker stocks slide as Nvidia faces $5.5B charge with US restrictions 2025-04-16 at 09:14 By Cointelegraph by Martin Young Chipmaking giants Nvidia and AMD have seen their share prices slide in after-hours trading after Nvidia said US restrictions on artificial intelligence chips to China would cause it to face major costs. Nvidia stated in an…
-
Brazil’s Meliuz floats to boost Bitcoin buying strategy
Brazil’s Meliuz floats to boost Bitcoin buying strategy 2025-04-16 at 09:14 By Cointelegraph by Stephen Katte Brazilian fintech firm Meliuz has floated a plan to expand its Bitcoin holdings and make the cryptocurrency a strategic asset on the company’s books. Meliuz, which provides cashback and financial technology services, is taking the plan to make Bitcoin…
-
When companies merge, so do their cyber threats
When companies merge, so do their cyber threats 2025-04-16 at 09:13 By Mirko Zorz For CISOs, mergers and acquisitions (M&A) bring both potential and risk. These deals can drive growth, but they also open the door to serious cybersecurity threats that may derail the transaction. Strong due diligence, smart risk planning, and a shared security…
-
South Korea to build mini-fabs as part of $25 billion plan to prop up tariff-targeted industries
South Korea to build mini-fabs as part of $25 billion plan to prop up tariff-targeted industries 2025-04-16 at 08:35 By Simon Sharwood Fancy a doctorate in semiconductor design? The land of K-Pop wants you to help future-proof its industry South Korea has decided to dish out over $25 billion in help to industries impacted by…
-
Strategic AI readiness for cybersecurity: From hype to reality
Strategic AI readiness for cybersecurity: From hype to reality 2025-04-16 at 08:34 By Help Net Security AI readiness in cybersecurity involves more than just possessing the latest tools and technologies; it is a strategic necessity. Many companies could encounter serious repercussions, such as increased volumes of advanced cyber threats, if they fail to exploit AI…
-
Recognizing cybersecurity as a revenue growth strategy
Recognizing cybersecurity as a revenue growth strategy 2025-04-16 at 08:34 By Traditionally, cybersecurity has been viewed as a cost center, but forward-thinking enterprises are reframing it as a growth driver. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:
-
China selling seized crypto to top up coffers as economy slows: Report
China selling seized crypto to top up coffers as economy slows: Report 2025-04-16 at 08:01 By Cointelegraph by Martin Young Local governments in China are reportedly seeking ways to offload seized crypto while facing challenges due to the country’s ban on crypto trading and exchanges. The lack of rules around how authorities should handle seized…
-
Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques
Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques 2025-04-16 at 08:01 By Help Net Security MITRE’s Attack Flow project aims to translate complex cyber operations into a structured language. By describing how adversaries sequence and combine offensive techniques to reach their objectives, Attack Flow offers defenders, analysts, and decision-makers a tool to…
-
The future of authentication: Why passwordless is the way forward
The future of authentication: Why passwordless is the way forward 2025-04-16 at 07:35 By Sinisa Markovic By now, most CISOs agree: passwords are the weakest link in the authentication chain. They’re easy to guess, hard to manage, and constantly reused. Even the most complex password policies don’t stop phishing or credential stuffing. That’s why passwordless…
-
Semler Scientific reports $42M paper loss on Bitcoin, floats $500M stock sale
Semler Scientific reports $42M paper loss on Bitcoin, floats $500M stock sale 2025-04-16 at 07:12 By Cointelegraph by Martin Young Healthcare technology firm Semler Scientific has reported paper losses on its Bitcoin holdings over the first quarter of this year as the cryptocurrency saw a heavy correction. The firm reported a preliminary unrealized loss from…
-
Bitcoin bulls ‘coming back’ as key metric on Binance flips to neutral
Bitcoin bulls ‘coming back’ as key metric on Binance flips to neutral 2025-04-16 at 07:12 By Cointelegraph by Ciaran Lyons Bullish sentiment could be returning to Bitcoin as a key metric from Binance, the largest crypto exchange by trading volume, shows that buyers are starting to dominate the platform’s volumes. The Binance Taker Buy Sell…
-
UK lawmaker’s X account hacked to boost scam ‘House of Commons Coin’
UK lawmaker’s X account hacked to boost scam ‘House of Commons Coin’ 2025-04-16 at 07:12 By Cointelegraph by Jody McDonald The X account of UK member of Parliament and Leader of the House of Commons, Lucy Powell, was hacked to promote a scam crypto token. In a series of now-deleted posts on April 15, Powell’s…
-
Browser extensions make nearly every employee a potential attack vector
Browser extensions make nearly every employee a potential attack vector 2025-04-16 at 07:12 By Help Net Security Despite being present on virtually every employee’s browser, extensions are rarely monitored by security teams or controlled by IT, according to LayerX. Most extensions have access to sensitive data 99% of enterprise users have at least one extension…
-
Strive targets Intuit for Bitcoin buys after orange-pilling GameStop
Strive targets Intuit for Bitcoin buys after orange-pilling GameStop 2025-04-16 at 06:19 By Cointelegraph by Stephen Katte Fresh from successfully convincing game retailer GameStop to add Bitcoin to its balance sheet, Strive Asset Management CEO Matt Cole has now set his sights on fintech firm Intuit to do the same. Cole said in an April…