Cybersecurity and other IT news aggregator

LATEST FEEDS

  • Lattica Emerges From Stealth With FHE Platform for AI

    Lattica Emerges From Stealth With FHE Platform for AI 2025-04-25 at 16:32 By Eduard Kovacs Lattica has raised $3.25 million in pre-seed funding for a platform that uses FHE to enable AI models to process encrypted data.  The post Lattica Emerges From Stealth With FHE Platform for AI appeared first on SecurityWeek. This article is…


  • M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat

    M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat 2025-04-25 at 16:32 By Kevin Townsend Mandiant’s latest threat report shows how attackers adapt faster than defenses, shifting strategies toward credential theft and insider threats. The post M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat appeared first on SecurityWeek. This article is an excerpt from…


  • Trump memecoin team denies $300K dinner requirement rumors

    Trump memecoin team denies $300K dinner requirement rumors 2025-04-25 at 16:02 By Cointelegraph by Ezra Reguerra United States President Donald Trump’s memecoin team denied rumors circulating on social media that holders of the Official Trump (TRUMP) token need at least $300,000 to participate in an upcoming dinner with the president.  On April 25, the official…


  • Circle executive denies claims of seeking US banking license

    Circle executive denies claims of seeking US banking license 2025-04-25 at 16:02 By Cointelegraph by Adrian Zmudzinski An executive at major stablecoin issuer Circle denied recent reports that the company is looking to obtain a US federal bank charter. In an April 25 X post, Circle’s chief strategy officer and head of global policy, Dante…


  • FBI 2024 IC3 Report: Phishing Soars, Ransomware Batters Critical Infrastructure as Cyber Losses Climb

    FBI 2024 IC3 Report: Phishing Soars, Ransomware Batters Critical Infrastructure as Cyber Losses Climb 2025-04-25 at 16:02 By Phishing, ransomware, and data breaches remain top threats, driving a sharp rise from $12.5 billion in 2023. With over 193,000 reports and $70M in losses, phishing outpaced extortion and data breaches as the most common cybercrime in…


  • Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy

    Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy 2025-04-25 at 15:53 By Danelle Au With over 12,000 breaches analyzed, this year’s DBIR reveals a landscape shaped by not just individual threats, but by entire economies of compromise. The post Inside the Verizon 2025 DBIR: Five Trends That…


  • Virgin Atlantic is piloting an OpenAI agent in to help with the ‘customer journey’

    Virgin Atlantic is piloting an OpenAI agent in to help with the ‘customer journey’ 2025-04-25 at 15:40 By Thomas Claburn Hello, operator? Book me to Memphis, Tennessee Interview  For all the talk of the “agentic era” from AI vendors like OpenAI, Google, Anthropic, Microsoft, and just about everyone else in the space, corporate use of…


  • Scamnetic Raises $13 Million to Prevent Scams in Real Time

    Scamnetic Raises $13 Million to Prevent Scams in Real Time 2025-04-25 at 15:40 By Ionut Arghire AI-powered threat protection startup Scamnetic has raised $13 million in a Series A funding round led by Roo Capital. The post Scamnetic Raises $13 Million to Prevent Scams in Real Time appeared first on SecurityWeek. This article is an…


  • Manifest Raises $15 Million for SBOM Management Platform

    Manifest Raises $15 Million for SBOM Management Platform 2025-04-25 at 15:18 By Ionut Arghire Software and AI supply chain transparency firm Manifest has raised $15 million in a Series A funding round led by Ensemble VC. The post Manifest Raises $15 Million for SBOM Management Platform appeared first on SecurityWeek. This article is an excerpt…


  • China may shift from US Treasurys toward gold, crypto — BlackRock exec

    China may shift from US Treasurys toward gold, crypto — BlackRock exec 2025-04-25 at 15:07 By Cointelegraph by Amin Haqshanas Central banks, particularly China, may start to shift away from US Treasurys, exploring alternatives such as gold and Bitcoin, according to Jay Jacobs, BlackRock’s head of thematics and active ETFs. In a recent interview with…


  • SUI’s 73% weekly price gains top crypto market — New price record in reach?

    SUI’s 73% weekly price gains top crypto market — New price record in reach? 2025-04-25 at 15:07 By Cointelegraph by Nancy Lubale Key takeaways:  SUI is up 23% in the past 24 hours and 73% weekly, outperforming top-cap cryptocurrencies. The launch of the Grayscale SUI Trust and the xPortal/xMoney Mastercard partnership boosted investor confidence. SUI’s…


  • Blockchain needs regulation, scalability to close AI hiring gap

    Blockchain needs regulation, scalability to close AI hiring gap 2025-04-25 at 15:07 By Cointelegraph by Zoltan Vardai The emerging blockchain industry lags behind the artificial intelligence sector in terms of job creation, but this hiring gap may narrow by 2030. Blockchain remains one of the smallest sectors in the tech industry, with about 300,000 global…


  • Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

    Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks 2025-04-25 at 15:06 By Verizon Business has released its 2025 Data Breach Investigations Report.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:


  • In Other News: Prison for Disney Hacker, MITRE ATT&CK v17, Massive DDoS Botnet

    In Other News: Prison for Disney Hacker, MITRE ATT&CK v17, Massive DDoS Botnet 2025-04-25 at 15:06 By SecurityWeek News Noteworthy stories that might have slipped under the radar: former Disney employee sent to prison for hacking, MITRE releases ATT&CK v17, DDoS botnet powered by 1.3 million devices. The post In Other News: Prison for Disney…


  • Europe fires up beefier booster for Ariane 6 and Vega-C

    Europe fires up beefier booster for Ariane 6 and Vega-C 2025-04-25 at 14:48 By Richard Speed Successful qualification run for P160C solid-fuel motor in South American spaceport A qualification version of the P160C solid-fuel motor was successfully tested at the European Spaceport in French Guiana on April 24, paving the way for heftier payloads on…


  • South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days

    South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days 2025-04-25 at 14:31 By Ionut Arghire Multiple South Korean organizations across industries have been targeted in a recent Lazarus campaign dubbed Operation SyncHole. The post South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days appeared first on SecurityWeek. This article is an…


  • 5 Bitcoin charts predicting BTC price rally toward $100K by May

    5 Bitcoin charts predicting BTC price rally toward $100K by May 2025-04-25 at 14:03 By Cointelegraph by Yashu Gola Key Takeaways: BTC liquidation levels, onchain data, and chart setups converge at the $100K target. Profitability has surged, suggesting a rebound in market confidence. BTC breakout patterns point to $100K as a short-squeeze and euphoria magnet.…


  • RSA Conference 2025 – Pre-Event Announcements Summary (Part 2) 

    RSA Conference 2025 – Pre-Event Announcements Summary (Part 2)  2025-04-25 at 14:03 By SecurityWeek News Hundreds of companies are showcasing their products and services next week at the 2025 edition of the RSA Conference in San Francisco. The post RSA Conference 2025 – Pre-Event Announcements Summary (Part 2)  appeared first on SecurityWeek. This article is…


  • SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers

    SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers 2025-04-25 at 14:03 By Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution.  “The exploitation is likely tied to either a previously disclosed vulnerability like CVE-2017-9844…


  • Why NHIs Are Security’s Most Dangerous Blind Spot

    Why NHIs Are Security’s Most Dangerous Blind Spot 2025-04-25 at 14:03 By When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface is a growing threat that does not involve human credentials at all, as we witness the exponential growth of Non-Human…


  • £13M government grant saves troubled Post Office from suboptimal IT

    £13M government grant saves troubled Post Office from suboptimal IT 2025-04-25 at 13:47 By Lindsay Clark Taxpayers foot bill to get to new platform as Fujitsu package balloons to £2.44 billion The UK’s Post Office would have to cope with suboptimal IT, increased risks and costs, and reduced reporting accuracy if it didn’t receive £136…


  • The sentiment engine of Bitcoin ETFs is rewiring market structure

    The sentiment engine of Bitcoin ETFs is rewiring market structure 2025-04-25 at 13:03 By Cointelegraph by Michael Tabone The tide of capital once destined for raw spot Bitcoin has begun to flow through institutional canals, spot exchange-traded funds (ETFs), structured products and wrapped exposure, and while the water is rising fast, the waves aren’t quite…


  • Polygon CEO: DeFi must ditch hype for sustainable liquidity

    Polygon CEO: DeFi must ditch hype for sustainable liquidity 2025-04-25 at 13:03 By Cointelegraph by Arijit Sarkar Polygon Labs CEO Marc Boiron called for a fundamental shift in how decentralized finance (DeFi) protocols manage liquidity, labeling the sector’s ongoing liquidity crisis as “self-inflicted.” In an exclusive interview, Boiron outlined Polygon’s vision for sustainable DeFi, emphasizing…


  • Sam Bankman-Fried moved to a low-security prison — so what?

    Sam Bankman-Fried moved to a low-security prison — so what? 2025-04-25 at 13:03 By Cointelegraph by Adrian Zmudzinski Sam “SBF” Bankman-Fried, the disgraced co-founder of collapsed cryptocurrency exchange FTX, to a low-security US federal correctional institution Bankman-Fried was moved to the low-security Terminal Island federal correctional institution. Previously, he was located at the Victorville medium-security…


  • Claims assistance firm fined for cold-calling people who put themselves on opt-out list

    Claims assistance firm fined for cold-calling people who put themselves on opt-out list 2025-04-25 at 12:39 By Dan Robinson Third-party data supplier also in hot water with Brit regulator over consent issues Britain’s data privacy watchdog has slapped a fine of £90k ($120k) on a business that targeted people with intrusive marketing phone calls, despite…


  • Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)

    Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610) 2025-04-25 at 12:39 By Zeljka Zorz Researchers have uncovered three serious vulnerabilities in Rack, a server interface used by most Ruby web app frameworks (Ruby on Rails, Sinatra, Hanami, Roda, and others). Two of the flaws – CVE-2025-25184 and CVE-2025-27111 – could allow attackers to manipulate…


  • SAP Zero-Day Possibly Exploited by Initial Access Broker

    SAP Zero-Day Possibly Exploited by Initial Access Broker 2025-04-25 at 12:38 By Ionut Arghire A zero-day vulnerability in SAP NetWeaver potentially affects more than 10,000 internet-facing applications. The post SAP Zero-Day Possibly Exploited by Initial Access Broker appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:


  • All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack

    All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack 2025-04-25 at 12:38 By Ionut Arghire A new attack technique named Policy Puppetry can break the protections of major gen-AI models to produce harmful outputs. The post All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack appeared first on SecurityWeek. This article…


  • Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers

    Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers 2025-04-25 at 12:17 By Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully exploited, could enable attackers to gain unauthorized access to files, inject malicious data, and tamper with logs under certain conditions. The vulnerabilities, flagged by…


  • DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks

    DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks 2025-04-25 at 12:17 By Cybersecurity researchers are warning about a new malware called DslogdRAT that’s installed following the exploitation of a now-patched security flaw in Ivanti Connect Secure (ICS). The malware, along with a web shell, were “installed by exploiting a zero-day vulnerability at…


  • ‘Vitalik: An Ethereum Story’ is less about crypto and more about being human

    ‘Vitalik: An Ethereum Story’ is less about crypto and more about being human 2025-04-25 at 12:03 By Cointelegraph by Stephen Laddin When Zach Ingrasci and Chris Temple had the idea to make the documentary film Vitalik: An Ethereum Story, they were actually filming another documentary, and over the course of their filmmaking journey, they ended…


  • Arkansas city rejects crypto mining proposal after community pushback

    Arkansas city rejects crypto mining proposal after community pushback 2025-04-25 at 12:03 By Cointelegraph by Amin Haqshanas The planning commission of Vilonia, Arkansas, unanimously rejected a proposal to establish a cryptocurrency mining facility within the city limits, following strong opposition from residents. According to local reports, the decision came after weeks of community pushback, where…


  • RTFKT’s CloneX avatars reappear after issue blacks out NFTs

    RTFKT’s CloneX avatars reappear after issue blacks out NFTs 2025-04-25 at 11:22 By Cointelegraph by Brayden Lindrea More than 19,800 CloneX digital avatars developed by non-fungible token firm RTFKT Studios have reappeared after Cloudflare blacked out the NFTs for apparently violating its terms of service. “This content has been restricted. Using Cloudflare’s basic service in…


  • Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors

    Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors 2025-04-25 at 11:22 By An APT group dubbed Earth Kurma is actively targeting government and telecommunications organizations in Southeast Asia using advanced malware, rootkits, and trusted cloud services to conduct cyberespionage. This article is an excerpt from Trend Micro Research, News and Perspectives View Original…


  • Detectify Asset Classification and Scan Recommendations improves vulnerability testing

    Detectify Asset Classification and Scan Recommendations improves vulnerability testing 2025-04-25 at 11:22 By Industry News Detectify announced new Asset Classification and Scan Recommendations capabilities. This innovation directly addresses a critical challenge for security teams: knowing what else, beyond their core applications, requires in-depth testing. The new features automatically classify discovered web assets based on attacker…


  • Rubrik Identity Resilience protects vulnerable authentication infrastructure

    Rubrik Identity Resilience protects vulnerable authentication infrastructure 2025-04-25 at 11:22 By Industry News Rubrik announced its upcoming solution, Identity Resilience, designed to secure the entire identity landscape alongside data. Identity Resilience aims to protect the most common entry points for attackers – human and non-human identities (NHIs) – to help organizations maintain operations with minimal…


  • BreachLock AEV simulates Real attacks to validate and prioritize exposures

    BreachLock AEV simulates Real attacks to validate and prioritize exposures 2025-04-25 at 11:22 By Industry News BreachLock AEV automates multistep, threat-intelligence-led attack scenarios—helping security teams uncover real exposures and prioritize what matters most. Going beyond just showing security teams their risk, BreachLock Adversarial Exposure Validation simulates how real-world adversaries would exploit it by mirroring their…


  • Dashlane introduces Omnix for AI-powered credential protection

    Dashlane introduces Omnix for AI-powered credential protection 2025-04-25 at 10:53 By Industry News Dashlane unveiled a new approach to addressing human risk in response to the rise of AI-driven phishing attacks and shadow IT in corporate environments. Built on innovation that pushes beyond vault-based password management, Dashlane Omnix is the AI-accelerated credential security platform that unifies…


  • LastPass Secure Access Experiences simplifies access management

    LastPass Secure Access Experiences simplifies access management 2025-04-25 at 10:53 By Industry News As cloud app adoption continues to rise, and the modern workplace continues to evolve, LastPass will introduce a new approach to democratize access management. Built with the needs of small-to-mid-sized businesses in mind, Secure Access Experiences represents a more unified, intuitive way…


  • Vanta AI Security Assessment evaluates AI risk

    Vanta AI Security Assessment evaluates AI risk 2025-04-25 at 10:33 By Industry News Vanta announced new ways to help organizations demonstrate AI security and evaluate AI risk across their ecosystem. With the launch of Vanta’s new AI Security Assessment offering, customers using, developing or building with AI can now more effectively address critical considerations and…


  • North Korean hackers set up 3 shell companies to scam crypto devs

    North Korean hackers set up 3 shell companies to scam crypto devs 2025-04-25 at 10:17 By Cointelegraph by Stephen Katte A subgroup of the North Korea-linked hacker organization Lazarus set up three shell companies, two in the United States, to deliver malware to unsuspecting users. The three sham crypto consulting firms — BlockNovas, Angeloper Agency…


  • Saylor holding 10M BTC won’t ‘threaten the protocol,’ says author

    Saylor holding 10M BTC won’t ‘threaten the protocol,’ says author 2025-04-25 at 10:17 By Cointelegraph by Ciaran Lyons Key Takeaways Bitcoin Standard author Saifedean Ammous says that even if one entity owned a huge amount of Bitcoin, it wouldn’t hurt the protocol Ammous reiterated major companies like BlackRock and Strategy don’t own the Bitcoin they…


  • Darcula adds AI to its DIY phishing kits to help would-be vampires bleed victims dry

    Darcula adds AI to its DIY phishing kits to help would-be vampires bleed victims dry 2025-04-25 at 09:48 By Jessica Lyons Because coding phishing sites from scratch is a real pain in the neck Darcula, a cybercrime outfit that offers a phishing-as-a-service kit to other criminals, this week added AI capabilities to its kit that…


  • SEC bids to drop securities suit against Dragonchain over crypto ICO

    SEC bids to drop securities suit against Dragonchain over crypto ICO 2025-04-25 at 09:04 By Cointelegraph by Jesse Coghlan The US Securities and Exchange Commission is looking to drop its unregistered securities lawsuit against blockchain firm Dragonchain in the agency’s latest crypto-related backdown.  In a joint stipulation filed with Dragonchain on April 24 in a…


  • Ethereum devs test a 4x increase in gas limit for Fusaka hard fork

    Ethereum devs test a 4x increase in gas limit for Fusaka hard fork 2025-04-25 at 09:04 By Cointelegraph by Stephen Katte Ethereum core developers are considering a four times increase in the layer 1 gas limit as one of the key features for the next hard fork after Pectra, known as Fusaka. The devs are…


  • Flexible working models fuel surge in device theft

    Flexible working models fuel surge in device theft 2025-04-25 at 08:34 By Help Net Security 76% of respondents have been impacted by incidents of device theft in the past two years, with incidents more common in organizations with more flexible working models, according to Kensington. For instance, research revealed that 85% of organizations with flexible…


  • Exposure validation emerges as critical cyber defense component

    Exposure validation emerges as critical cyber defense component 2025-04-25 at 08:13 By Help Net Security Organizations have implemented various aspects of threat exposure validation, including security control validation (51%) and filtering threat exposures based on the effectiveness of security controls to mitigate threats (48%), according to Cymulate. At the same time, nearly all respondents say…


  • The Oracle breach and the case for transparent cyber response

    The Oracle breach and the case for transparent cyber response 2025-04-25 at 08:13 By The Oracle breach emphasizes the importance of a transparent cyber response. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:


  • 13 core principles to strengthen AI cybersecurity

    13 core principles to strengthen AI cybersecurity 2025-04-25 at 07:55 By Help Net Security The new ETSI TS 104 223 specification for securing AI provides reliable and actionable cybersecurity guidance aimed at protecting end users. Adopting a whole-lifecycle approach, the framework outlines 13 core principles that expand into 72 detailed, trackable principles across five key…


  • Top must-visit companies at RSAC 2025

    Top must-visit companies at RSAC 2025 2025-04-25 at 07:34 By Help Net Security RSAC 2025 Conference is taking place at the Moscone Center in San Francisco from April 28 – May 1. With hundreds of booths, countless product demos, and nonstop buzz, navigating RSAC can be overwhelming. That’s why we’ve done the legwork to highlight…


Browse older archives

Scroll to Top