Featured

Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks

Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks 2025-08-29 at 16:25 By Ionut Arghire Storm-0501 has been leveraging cloud-native capabilities for data exfiltration and deletion, without deploying file-encrypting malware. The post Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks appeared first on SecurityWeek. This article […]

React to this headline:

Loading spinner

Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks Read More »

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years 2025-08-28 at 17:21 By Ionut Arghire China-linked APT ‘Salt Typhoon’ exploited known router flaws to maintain persistent access across telecom, government, and military networks, giving Beijing’s intelligence services global surveillance reach. The post China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years appeared first on SecurityWeek.

React to this headline:

Loading spinner

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years Read More »

Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack

Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack 2025-08-28 at 13:55 By Ionut Arghire With more than 4 million weekly downloads, the Nx build platform became the first known supply chain breach where hackers weaponized AI assistants for data theft. The post Hackers Target Popular Nx Build System in First AI-Weaponized

React to this headline:

Loading spinner

Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack Read More »

PromptLock: First AI-Powered Ransomware Emerges

PromptLock: First AI-Powered Ransomware Emerges 2025-08-27 at 14:51 By Ionut Arghire Proof-of-concept ransomware uses AI models to generate attack scripts in real time. The post PromptLock: First AI-Powered Ransomware Emerges appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

PromptLock: First AI-Powered Ransomware Emerges Read More »

OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail

OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail 2025-08-25 at 20:17 By Kevin Townsend Researchers unveil OneFlip, a Rowhammer-based attack that flips a single bit in neural network weights to stealthily backdoor AI systems without degrading performance. The post OneFlip: An Emerging Threat to AI that Could Make

React to this headline:

Loading spinner

OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail Read More »

Farmers Insurance Data Breach Impacts Over 1 Million People

Farmers Insurance Data Breach Impacts Over 1 Million People 2025-08-25 at 09:35 By Eduard Kovacs Farmers New World Life Insurance and Farmers Group have filed separate data breach notifications with state authorities.  The post Farmers Insurance Data Breach Impacts Over 1 Million People appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Farmers Insurance Data Breach Impacts Over 1 Million People Read More »

Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects

Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects 2025-08-22 at 19:04 By Associated Press Dubbed Operation Serengeti 2.0, the operation took place between June and August. The post Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects Read More »

GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models

GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models 2025-08-20 at 17:52 By Kevin Townsend Instead of GPT-5 Pro, your query could be quietly redirected to an older, weaker model, opening the door to jailbreaks, hallucinations, and unsafe outputs. The post GPT-5 Has a Vulnerability: Its Router Can Send You

React to this headline:

Loading spinner

GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models Read More »

Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield

Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield 2025-08-19 at 08:35 By Associated Press From hacked satellites to nuclear threats in orbit, the battle for dominance beyond Earth is redefining modern warfare and national security. The post Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space

React to this headline:

Loading spinner

Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield Read More »

US Seizes $2.8 Million From Zeppelin Ransomware Operator

US Seizes $2.8 Million From Zeppelin Ransomware Operator 2025-08-18 at 14:06 By Ionut Arghire The US has indicted Zeppelin ransomware operator Ianis Antropenko, seizing over $2.8 million in cryptocurrency from his wallet. The post US Seizes $2.8 Million From Zeppelin Ransomware Operator appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

US Seizes $2.8 Million From Zeppelin Ransomware Operator Read More »

Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event)

Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) 2025-08-16 at 16:58 By SecurityWeek News CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained. The post Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) appeared

React to this headline:

Loading spinner

Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) Read More »

Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense

Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense 2025-08-15 at 13:07 By Kevin Townsend With cybersecurity budgets strained, organizations are turning to AI-powered automation to plug staffing gaps, maintain defenses, and survive escalating threats. The post Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense Read More »

Passkey Login Bypassed via WebAuthn Process Manipulation

Passkey Login Bypassed via WebAuthn Process Manipulation 2025-08-14 at 12:21 By Eduard Kovacs Researchers at enterprise browser security firm SquareX showed how an attacker can impersonate a user and bypass passkey security.  The post Passkey Login Bypassed via WebAuthn Process Manipulation appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Passkey Login Bypassed via WebAuthn Process Manipulation Read More »

Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia

Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia 2025-08-13 at 15:35 By Eduard Kovacs Intel, AMD and Nvidia have published security advisories describing vulnerabilities found recently in their products. The post Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia Read More »

CodeSecCon Is Today: Where Software Security’s Next Chapter Unfolds (Virtual Event)

CodeSecCon Is Today: Where Software Security’s Next Chapter Unfolds (Virtual Event) 2025-08-12 at 15:35 By SecurityWeek News Taking place August 12-13, CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained. The post CodeSecCon Is Today: Where Software Security’s Next Chapter Unfolds (Virtual

React to this headline:

Loading spinner

CodeSecCon Is Today: Where Software Security’s Next Chapter Unfolds (Virtual Event) Read More »

Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise

Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise 2025-08-08 at 21:34 By Kevin Townsend Researchers demonstrate how multi-turn “storytelling” attacks bypass prompt-level filters, exposing systemic weaknesses in GPT-5’s defenses. The post Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise Read More »

CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds

CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds 2025-08-08 at 19:52 By SecurityWeek News Taking place August 12-13, CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained. The post CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds appeared first on SecurityWeek. This

React to this headline:

Loading spinner

CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds Read More »

Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass

Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass 2025-08-06 at 14:57 By Ionut Arghire ReVault vulnerabilities in the ControlVault3 firmware in Dell laptops could lead to firmware modifications or Windows login bypass. The post Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass Read More »

Black Hat USA 2025 – Summary of Vendor Announcements (Part 1)

Black Hat USA 2025 – Summary of Vendor Announcements (Part 1) 2025-08-05 at 17:19 By SecurityWeek News Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas. The post Black Hat USA 2025 – Summary of Vendor Announcements (Part 1) appeared first on

React to this headline:

Loading spinner

Black Hat USA 2025 – Summary of Vendor Announcements (Part 1) Read More »

SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation

SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation 2025-08-05 at 10:58 By Ionut Arghire Threat actors might be exploiting a zero-day vulnerability in SonicWall firewalls in a fresh wave of ransomware attacks. The post SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation Read More »

Scroll to Top