AI chip maker Nvidia buys 2.6 percent stake in chip-design software maker Synopsys, in latest deal linking tech companies together This article has been indexed from Silicon UK Read the original article: Nvidia Buys $2bn Stake In Synopsys
Chrome 143 Patches High-Severity Vulnerabilities
Chrome 143 stable was released with patches for 13 vulnerabilities, including a high-severity flaw in the V8 JavaScript engine. The post Chrome 143 Patches High-Severity Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
BlackFog releases ADX Vision to block data loss from unapproved AI use
BlackFog announced the availability of its newest solution, ADX Vision. Designed to secure every endpoint and every LLM interaction, ADX Vision gives organizations the visibility and control needed to manage AI securely. Operating directly on the device, it detects shadow…
Wasabi Covert Copy strengthens cloud storage security
Wasabi has expanded its cyber resilient cloud storage capabilities with Covert Copy, a patent pending, ransomware-resistant storage solution that allows users to create a locked, hidden copy of storage buckets to ensure critical data remains untouchable, even in the event…
British MP Calls For Australia-Style Social Media Ban
Suffolk MP Jess Asato calls for online age of consent to be raised from 13 to 16 amid fears of a ‘lost generation’ due to social media This article has been indexed from Silicon UK Read the original article: British…
Morphisec enhances Anti-Ransomware Suite to block evasive attacks across key blind spots
Morphisec announced an expansion of its Anti-Ransomware Assurance Suite, adding new capabilities that include Network Share Ransomware Protection for Windows and Linux, Identity Risk Visibility, and enhancements to its existing EDR Tampering Protection. These updates strengthen enterprise defenses against the…
Microsoft Defender outage disrupts threats, Apple resists India’s app order, MuddyWater strikes Israel
Microsoft Defender outage disrupts threats Apple resists India’s state-run app order MuddyWater strikes Israel with MuddyViper Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What’s your 2 AM security worry? Is it “Do I have the…
Apple AI Chief Giannandrea To Step Down
Apple’s chief of AI efforts, including Siri, to leave company in spring as company struggles to catch up to rivals This article has been indexed from Silicon UK Read the original article: Apple AI Chief Giannandrea To Step Down
Bank Of England Warns Of AI Risk To Financial Stability
Central bank warns of risks from ‘stretched’ valuations of AI-focused tech companies in US, UK, increased reliance on debt This article has been indexed from Silicon UK Read the original article: Bank Of England Warns Of AI Risk To Financial…
Datadog introduces Bits AI SRE to automate alert investigation and root cause analysis
Datadog has launched Bits AI SRE, an AI agent aware of telemetry, architecture, and organizational context that investigates alerts and surfaces action able root cause in minutes, giving engineers the information they need to confidently resolve incidents faster, save engineering…
IT Security News Hourly Summary 2025-12-03 09h : 6 posts
6 posts were published in the last hour 7:32 : Researchers Catch Lazarus Group’s Recruitment Workflow on Camera via Honeypot 7:32 : Multiple Django Vulnerability Expose Applications to SQL Injection and DoS Attacks 7:32 : CISA Alerts on Iskra iHUB…
Researchers Catch Lazarus Group’s Recruitment Workflow on Camera via Honeypot
A groundbreaking collaborative investigation by Mauro Eldritch of BCA LTD, ANYRUN, and NorthScan has lifted the curtain on North Korean threat actors from the Lazarus Group, revealing their recruitment tactics and operational methods in unprecedented detail. The research team documented…
Multiple Django Vulnerability Expose Applications to SQL Injection and DoS Attacks
The Django development team has released critical security patches for three major versions of the popular Python web framework, addressing two significant vulnerabilities that could expose applications to SQL injection attacks and denial-of-service conditions. The updates, issued on December 2,…
CISA Alerts on Iskra iHUB Authentication Flaw Allowing Remote Device Reconfiguration
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a severe authentication vulnerability affecting Iskra iHUB and iHUB Lite intelligent metering gateways worldwide. Assigned CVE-2025-13510 with a CVSS score of 9.3, this vulnerability represents a significant…
Water Saci Hackers Exploit AI Tools to Target WhatsApp Web Users
The Water Saci campaign targeting Brazilian users has escalated significantly, with threat actors demonstrating remarkable technical sophistication by employing artificial intelligence to enhance their malware propagation capabilities. Security researchers have identified a critical shift in the group’s attack methodology: the…
Multiple Django Vulnerabilities Enables SQL Injection and Denial-of-Service Attacks
The development team has officially released essential security updates to address two significant vulnerabilities found in the popular web framework. These issues range from high to moderate severity. They could allow attackers to compromise database integrity or crash servers through…
Panaseer IQ Suite uses generative AI to explain risk changes and guide remediation
Panaseer has released the Panaseer IQ Suite, a new family of GenAI powered tools designed for organizations facing growing attack surfaces and attackers using AI to expand their reach and precision. By turning cybersecurity controls data into actionable remediation across…
Here’s your worst nightmare: E-tailer can only resume partial sales 45 days after ransomware attack
Japan’s Askul still can’t run all its sites, but at least the fax line held up OK Japanese e-tailer Askul has resumed online sales, 45 days after a ransomware attack.… This article has been indexed from The Register – Security…
Global law enforcement actions put pressure on cybercrime networks
In 2025, law enforcement agencies disrupted the infrastructure and operations of established cybercriminal groups. These groups shift across borders, and the agencies pursuing them are adjusting to that. International operations target cybercrime rings worldwide US investigators carried out one of…
Chrome 143 Released With Fix for 13 Vulnerabilities that Enable Arbitrary Code Execution
Google has officially promoted Chrome 143 to the Stable channel, rolling out version 143.0.7499.40 for Linux and 143.0.7499.40/41 for Windows and Mac. This significant update addresses 13 security vulnerabilities, including several high-severity flaws that could allow attackers to execute arbitrary…
Portmaster: Open-source application firewall
Portmaster is a free and open source application firewall built to monitor and control network activity on Windows and Linux. The project is developed in the EU and is designed to give users stronger privacy without asking them to manage…
Chrome 143 Update Patches 13 Security Vulnerabilities Allowing Arbitrary Code Execution
Google has released Chrome 143 to the stable channel, addressing 13 security vulnerabilities that could allow attackers to execute arbitrary code on affected systems. The update is now rolling out to Windows, Mac, and Linux users worldwide. The latest version,…
BPFDoor and Symbiote: Advanced eBPF-Based Rootkits Target Linux Systems
Extended Berkeley Packet Filter (eBPF) represents one of Linux’s most powerful kernel technologies, enabling users to load sandboxed programs directly into the kernel for network packet inspection and system call monitoring. Introduced in 2015 to modernize the 1992 BPF architecture,…
Living off the Land Attacks and Emerging Cyber Threats
 This episode of Cybersecurity Today, hosted by Jim Love, delves into various cybersecurity threats and latest news. Topics include ‘living off the land’ attacks using Microsoft’s native utilities, spoofing Calendly invites for phishing Google and Meta credentials, a significant…