Cybersecurity and other IT news aggregator
LATEST FEEDS
-
US Senate Democrats offer competing framework for crypto market structure
US Senate Democrats offer competing framework for crypto market structure 2025-09-09 at 21:13 By Cointelegraph by Turner Wright The group of 12 senators stressed the need for a bipartisan solution to market structure as Republicans on the banking committee plan to pass a bill this month. This article is an excerpt from Cointelegraph.com News View…
-
Defense Dept didn’t protect social media accounts, left stream keys out in public
Defense Dept didn’t protect social media accounts, left stream keys out in public 2025-09-09 at 21:13 By Jessica Lyons ‘The practice… has since been fixed,’ Pentagon official tells The Reg The US Department of Defense, up until this week, routinely left its social media accounts wide open to hijackers via stream keys – unique, confidential…
-
The Cost of Inaction: Securing the Energy Grid Before It’s Too Late
The Cost of Inaction: Securing the Energy Grid Before It’s Too Late 2025-09-09 at 21:13 By Kory Daniels Critical infrastructure is under attack. Cyber threats to the energy sector have surged by 80% in one year. The average data breach in the energy sector now costs companies over $5 million, significantly more than the cross-industry…
-
Bitcoin falls on dismal US jobs data, but Q4 rally to $185K still possible
Bitcoin falls on dismal US jobs data, but Q4 rally to $185K still possible 2025-09-09 at 20:07 By Cointelegraph by Biraajmaan Tamuly A record-breaking US jobs revision set the stage for the Federal Reserve to cut rates, a move which could supercharge the next Bitcoin price breakout. This article is an excerpt from Cointelegraph.com News…
-
No gains, just pains as 1.6M fitness phone call recordings exposed online
No gains, just pains as 1.6M fitness phone call recordings exposed online 2025-09-09 at 20:07 By Jessica Lyons HelloGym’s data security clearly skipped leg day Exclusive Sensitive info from hundreds of thousands of gym customers and staff – including names, financial details, and potentially biometric data in the form of audio recordings – was left…
-
First US DOGE ETF to begin trading on Thursday — Bloomberg analyst
First US DOGE ETF to begin trading on Thursday — Bloomberg analyst 2025-09-09 at 19:43 By Cointelegraph by Sam Bourgi The era of memecoin exchange-traded funds has begun in the United States, according to Bloomberg’s Eric Balchunas. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:
-
HSBC, BNP Paribas back Canton Foundation in institutional tokenization push
HSBC, BNP Paribas back Canton Foundation in institutional tokenization push 2025-09-09 at 19:43 By Cointelegraph by Sam Bourgi BNP Paribas and HSBC are the latest institutions to join the Canton Foundation, signaling growing institutional adoption of real-world asset tokenization. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:
-
US Army straps on another mixed-reality gamble with Anduril, Rivet
US Army straps on another mixed-reality gamble with Anduril, Rivet 2025-09-09 at 19:42 By Brandon Vigliarolo Microsoft invitation lost in mail after HoloLens made soldiers sick The US Army’s troubled attempt at outfitting soldiers with mixed-reality headsets is getting a $354 million boost and a new pair of lead contractors as part of a second…
-
Why Windows 95 left a handy power saving feature on the cutting-room floor
Why Windows 95 left a handy power saving feature on the cutting-room floor 2025-09-09 at 19:42 By Richard Speed Microsoft feared too many machines would end up bricked Microsoft vet Raymond Chen first told the story of HLT and Windows 95 more than 20 years ago. The instruction tells the CPU to effectively shut itself…
-
Plex tells users to change passwords due to data breach, pushes server owners to upgrade
Plex tells users to change passwords due to data breach, pushes server owners to upgrade 2025-09-09 at 19:42 By Zeljka Zorz Media streaming company Plex has suffered a data breach and is urging users to reset their account password and enable two-factor authentication. “An unauthorized third party accessed a limited subset of customer data from…
-
Everyone needs an AI phone. No, don’t hang up, it’s true
Everyone needs an AI phone. No, don’t hang up, it’s true 2025-09-09 at 18:27 By Paul Kunert Analyst bets smart money on ‘proactive digital companion’ upgrade cycle Generative AI will supposedly spark a smartphone renaissance, driving both unit shipments and the value of devices sold this calendar year – or so claims a rather optimistic…
-
How to turn crypto news into trade signals using Grok 4
How to turn crypto news into trade signals using Grok 4 2025-09-09 at 18:05 By Cointelegraph by Dilip Kumar Patairya Grok 4 can help you turn crypto headlines into market moves. It filters news and analyzes sentiment to create effective trade signals. This article is an excerpt from Cointelegraph.com News View Original Source React to…
-
Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks
Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks 2025-09-09 at 18:05 By Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft’s Direct Send feature to form a “highly efficient attack pipeline” in recent phishing campaigns, according to new findings from ReliaQuest. “Axios user agent activity surged 241%…
-
Google admits the open web is ‘in rapid decline’ — reversing earlier claim that traffic is ‘thriving’
Google admits the open web is ‘in rapid decline’ — reversing earlier claim that traffic is ‘thriving’ 2025-09-09 at 17:46 By Ariel Zilber The disclosure surfaced in a filing last week in the government’s ongoing antitrust case against Google. This article is an excerpt from Latest Technology News and Product Reviews | New York Post…
-
What the Plex? Streaming service suffers yet another password spill
What the Plex? Streaming service suffers yet another password spill 2025-09-09 at 17:46 By Connor Jones For the third time in a decade Streaming platform Plex is warning some users to reset their passwords after suffering yet another breach.… This article is an excerpt from The Register View Original Source React to this headline:
-
Microsoft inks AI infra deal with Yandex cofounder’s biz for nearly $20B
Microsoft inks AI infra deal with Yandex cofounder’s biz for nearly $20B 2025-09-09 at 17:46 By Dan Robinson Netherlands based Nebius Group to deliver capacity from facility in New Jersey As the AI frenzy shows no signs of letting up, Microsoft has signed an agreement that could be worth up to $19.4 billion with Netherlands-based…
-
Atlassian’s move to cloud-only means customers face integration issues and more
Atlassian’s move to cloud-only means customers face integration issues and more 2025-09-09 at 17:46 By Tim Anderson First, server products go end of life, now datacenter gets the chop, and larger customers will pay more Atlassian is discontinuing its datacenter products, including Jira, Confluence and Bamboo, in favor of Atlassian Cloud. There is a partial…
-
Relyance AI Data Defense Engineer secures AI-driven data
Relyance AI Data Defense Engineer secures AI-driven data 2025-09-09 at 17:46 By Industry News Relyance AI has released Data Defense Engineer, an AI-native feature that works 24/7 to understand, monitor, and protect thousands of data journeys, learns from every interaction, and autonomously enforces policies at machine speed. As organizations deploy AI systems, data becomes executable…
-
Russian Threat Group Targets Microsoft Outlook With Malware
Russian Threat Group Targets Microsoft Outlook With Malware 2025-09-09 at 17:08 By Research has identified a new Outlook backdoor linked to a Russian-linked persistent threat group. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:
-
Exposed Docker APIs Likely Exploited to Build Botnet
Exposed Docker APIs Likely Exploited to Build Botnet 2025-09-09 at 17:07 By Ionut Arghire Hackers mount the host’s file system into fresh containers, fetch malicious scripts over the Tor network, and block access to the Docker API. The post Exposed Docker APIs Likely Exploited to Build Botnet appeared first on SecurityWeek. This article is an…
-
SAP Patches Critical NetWeaver Vulnerabilities
SAP Patches Critical NetWeaver Vulnerabilities 2025-09-09 at 17:07 By Ionut Arghire The critical-severity NetWeaver flaws could be exploited for remote code execution and privilege escalation. The post SAP Patches Critical NetWeaver Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:
-
Vanta embeds agentic AI into policy and evidence workflows
Vanta embeds agentic AI into policy and evidence workflows 2025-09-09 at 16:51 By Industry News Vanta has unveiled a new set of capabilities that integrates AI across core compliance and risk workflows. These features unify policy management with the Vanta AI Agent, expand first-party risk oversight and continuous monitoring for vendors, and deepen integrations, providing…
-
Hummingbird’s compliance and risk platform helps financial institutions manage risk
Hummingbird’s compliance and risk platform helps financial institutions manage risk 2025-09-09 at 16:51 By Industry News Hummingbird announced its unified platform for risk and compliance operations. The expanded platform brings together the full risk and compliance lifecycle with the launch of new solutions for both Transaction & Risk Monitoring and Customer Screening. Financial institutions, long…
-
Cisco puts agentic AI at the core of Splunk Enterprise Security
Cisco puts agentic AI at the core of Splunk Enterprise Security 2025-09-09 at 16:51 By Industry News Cisco introduced Splunk Enterprise Security Essentials Edition and Splunk Enterprise Security Premier Edition, providing customers two agentic AI-powered SecOps options that unify security workflows across threat detection, investigation, and response (TDIR). Delivered within Splunk Enterprise Security 8.2, these…
-
Fake npm 2FA reset email led to compromise of popular code packages
Fake npm 2FA reset email led to compromise of popular code packages 2025-09-09 at 16:51 By Zeljka Zorz Malicious versions of at least 18 widely used npm packages were uploaded to the npm Registry on Monday, following the compromise of their maintainer’s account. “The packages were updated to contain a piece of code that would…
-
NetApp StorageGRID 12.0 powers AI and data-intensive workloads
NetApp StorageGRID 12.0 powers AI and data-intensive workloads 2025-09-09 at 16:39 By Industry News NetApp has released NetApp StorageGRID 12.0, a scalable, software-defined object storage solution designed for unstructured data. This latest version of StorageGRID introduces new capabilities designed to enhance AI initiatives, improve data security, and modernize organizations’ data infrastructure. Whether businesses are in…
-
Ransomware Losses Climb as AI Pushes Phishing to New Heights
Ransomware Losses Climb as AI Pushes Phishing to New Heights 2025-09-09 at 16:39 By Kevin Townsend Based on real-world insurance claims, Resilience’s midyear report shows vendor risk is declining but costly, ransomware is evolving with triple extortion, and social engineering attacks are accelerating through AI. The post Ransomware Losses Climb as AI Pushes Phishing to…
-
Ex-WhatsApp Security Chief Sues Meta Over Vulnerabilities, Retaliation
Ex-WhatsApp Security Chief Sues Meta Over Vulnerabilities, Retaliation 2025-09-09 at 16:39 By Eduard Kovacs Attaullah Baig has filed a lawsuit against Meta and its executives, accusing them of retaliation over critical cybersecurity failures. The post Ex-WhatsApp Security Chief Sues Meta Over Vulnerabilities, Retaliation appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View…
-
RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities
RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities 2025-09-09 at 16:27 By A new Android malware called RatOn evolved from a basic tool capable of conducting Near Field Communication (NFC) attacks to a sophisticated remote access trojan with Automated Transfer System (ATS) capabilities to conduct device fraud. “RatOn merges traditional overlay…
-
Download: Cyber defense guide for the financial sector
Download: Cyber defense guide for the financial sector 2025-09-09 at 15:46 By Help Net Security Data breaches cost more for financial organizations than they do for those in many other industries. In attempting to strengthen your financial organization’s cybersecurity, you must contend with evolving regulatory obligations, outdated IT infrastructure, and other challenges. How do you…
-
160,000 Impacted by Wayne Memorial Hospital Data Breach
160,000 Impacted by Wayne Memorial Hospital Data Breach 2025-09-09 at 15:00 By Ionut Arghire In May 2024, hackers stole names, Social Security numbers, financial information, and protected health information from the hospital’s systems. The post 160,000 Impacted by Wayne Memorial Hospital Data Breach appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View…
-
SpaceX bulks up Starlink Direct to Cell with $17B EchoStar spectrum deal
SpaceX bulks up Starlink Direct to Cell with $17B EchoStar spectrum deal 2025-09-09 at 14:47 By Richard Speed Dreams of one satellite constellation die so another can live EchoStar has agreed to sell the company’s AWS-4 and H-block spectrum licenses to SpaceX in a transaction worth $17 billion.… This article is an excerpt from The…
-
UK Home Office dangles £1.3M prize for algorithm that guesses your age
UK Home Office dangles £1.3M prize for algorithm that guesses your age 2025-09-09 at 14:47 By Connor Jones Contract tender follows ‘alarming’ safeguarding failure at border with undocumented kids The UK’s Home Office is offering £1.3 million ($1.7 million) to developers of age-determining software – a tech it wants to deploy widely across its systems.……
-
[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them
[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them 2025-09-09 at 14:47 By ⚠️ One click is all it takes. An engineer spins up an “experimental” AI Agent to test a workflow. A business unit connects to automate reporting. A cloud platform quietly enables a new agent behind the scenes.…
-
Bitcoin taps $113K as analysis sees ‘return to highs’ on Fed rate cut
Bitcoin taps $113K as analysis sees ‘return to highs’ on Fed rate cut 2025-09-09 at 14:00 By Cointelegraph by William Suberg BTC price strength starts to convince traders that new highs are back on the table, but Bitcoin still needs spot-market support. This article is an excerpt from Cointelegraph.com News View Original Source React to…
-
BBVA taps Ripple for institutional Bitcoin, Ether custody in Europe
BBVA taps Ripple for institutional Bitcoin, Ether custody in Europe 2025-09-09 at 14:00 By Cointelegraph by Adrian Zmudzinski Ripple will provide crypto custody services to Spain’s BBVA bank, expanding its existing partnership amid MiCA-driven adoption by European banks. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:
-
How high can DOGE price go when a Dogecoin ETF is approved?
How high can DOGE price go when a Dogecoin ETF is approved? 2025-09-09 at 14:00 By Cointelegraph by Nancy Lubale Dogecoin price could rise toward $0.50 next, then $1 or higher once a spot DOGE ETF is launched, unlocking institutional capital. This article is an excerpt from Cointelegraph.com News View Original Source React to this…
-
Nokia successor HMD spawns secure device biz with Euro-made smartphone
Nokia successor HMD spawns secure device biz with Euro-made smartphone 2025-09-09 at 14:00 By Dan Robinson Ivalo XE handset targets governments and security critical sectors, though Qualcomm silicon keeps it tied to the US Finnish phone maker HMD Global is launching a business unit called HMD Secure to target governments and other security-critical customers, and…
-
Silobreaker Requirements enables teams to improve threat intelligence
Silobreaker Requirements enables teams to improve threat intelligence 2025-09-09 at 14:00 By Industry News Silobreaker has launched Requirements, a new way for threat intelligence (TI) teams to define, operationalize and measure Priority Intelligence Requirements (PIRs). The new capability combines a PIR library with integrated monitoring tools and performance metrics, covering use cases across cyber threat…
-
Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations
Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations 2025-09-09 at 14:00 By Ionut Arghire The attacker deployed multiple malware families, including two backdoors and a proxy tunneller, and various reconnaissance tools. The post Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations appeared first on SecurityWeek. This article is an excerpt from…
-
Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion
Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion 2025-09-09 at 14:00 By Eduard Kovacs The industrial cybersecurity firm will become a wholly owned subsidiary of Mitsubishi Electric. The post Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source…
-
From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks
From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks 2025-09-09 at 13:54 By Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote access trojan called MostereRAT. The phishing attack incorporates a number of advanced evasion techniques to gain complete control over compromised systems, siphon sensitive…
-
TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs
TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs 2025-09-09 at 13:54 By Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks targeting exposed Docker APIs. Akamai, which discovered the latest activity last month, said it’s designed to block other actors from accessing the Docker API…
-
[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them
[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them 2025-09-09 at 13:54 By ⚠️ One click is all it takes. An engineer spins up an “experimental” AI Agent to test a workflow. A business unit connects to automate reporting. A cloud platform quietly enables a new agent behind the scenes.…
-
Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed
Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed 2025-09-09 at 13:08 By An analysis of the Gentlemen ransomware group, which employs advanced, adaptive tactics, techniques, and procedure to target critical industries worldwide. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:
-
Robinhood’s S&P 500 debut extends crypto’s reach to index investors
Robinhood’s S&P 500 debut extends crypto’s reach to index investors 2025-09-09 at 12:32 By Cointelegraph by Amin Haqshanas Robinhood joins Coinbase in the S&P 500, expanding crypto access for index funds, pensions and institutions amid rising institutional interest. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:
-
Anthropic’s Claude Code runs code to test it if is safe – which might be a big mistake
Anthropic’s Claude Code runs code to test it if is safe – which might be a big mistake 2025-09-09 at 12:32 By Tim Anderson AI security reviews add new risks, say researchers App security outfit Checkmarx says automated reviews in Anthropic’s Claude Code can catch some bugs but miss others – and sometimes create new…
-
How Leading CISOs are Getting Budget Approval
How Leading CISOs are Getting Budget Approval 2025-09-09 at 12:32 By It’s budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you’re a CISO or security leader, you’ve likely found yourself explaining why your program matters, why a given tool or headcount is essential, and how the next breach is one blind…
-
AI Darwin Awards launch to celebrate spectacularly bad deployments
AI Darwin Awards launch to celebrate spectacularly bad deployments 2025-09-09 at 11:53 By Richard Speed From fast food fiascos to botched databases, there are fresh honors for machine learning misadventures It was bound to happen. The Darwin Awards are being extended to include examples of misadventures involving overzealous applications of AI.… This article is an…
-
Plex Urges Password Resets Following Data Breach
Plex Urges Password Resets Following Data Breach 2025-09-09 at 11:53 By Ionut Arghire Hackers accessed emails, usernames, password hashes, and authentication data stored in a Plex database. The post Plex Urges Password Resets Following Data Breach appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:
Browse older archives
- September 2025
- August 2025
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023