One of the hacked organizations reportedly includes the U.S. agency responsible for maintaining the country’s stockpile of nuclear weapons. China-backed hackers have been observed carrying out the hacks targeting SharePoint servers. This article has been indexed from Security News |…
Author: IT Security News Bot
$380M lawsuit claims intruder got Clorox’s passwords from Cognizant simply by asking
Hand us the mind bleach, we want to flush our memories of attack Clorox is suing its service desk provider, Cognizant, for $380 million in a California state court, alleging the IT support crew “enabled a cybercriminal to gain a…
Bitdefender boosts protection across major content platforms
Bitdefender expanded support for Facebook and Instagram for Bitdefender Security for Creators, a dedicated cybersecurity solution for digital content creators, social media influencers, and online creatives. With this expansion, the service delivers powerful, multi-platform protection across YouTube, Instagram, and Facebook,…
Cyberattack on Germany’s AMEOS Hospital Network Exposes Patient Data
Germany’s AMEOS Hospital Network has confirmed a sophisticated cyberattack that compromised its IT infrastructure, leading to unauthorized access and potential exposure of sensitive data. Despite robust defenses including multi-factor authentication, intrusion detection systems, and regular vulnerability assessments, attackers managed to…
Silicon Valley Engineer Pleads Guilty in U.S. Missile Detection Data Theft Case
A Silicon Valley engineer with dual U.S.-China citizenship pleaded guilty to stealing critical defense technologies worth hundreds of millions of dollars, including classified systems designed to detect nuclear missile launches and track hypersonic weapons. The case highlights growing concerns about…
Stopping Ransomware: How a Hybrid Mesh Architecture Disrupts the Attack Chain Part Three
In parts one and two, we explored the ransomware attack chain, the shortcomings of fragmented defenses, and the advantages of a unified hybrid mesh approach. In part three, Pete Nicoletti joins us to share practical steps CISOs can take right…
How to clear your TV cache (and why it matters so much to performance)
Clearing your TV’s cache can give its performance a noticeable lift – here’s how to do it on popular brands like Samsung, LG, and more. This article has been indexed from Latest news Read the original article: How to clear…
How to set up and use passkeys across your iPhone, iPad, and Mac
Looking to move from passwords to passkeys across all your Apple devices? Here’s how to do it. This article has been indexed from Latest news Read the original article: How to set up and use passkeys across your iPhone, iPad,…
Copilot Vision on Windows 11 sends data to Microsoft servers
Total Recall: Capturing everything you do on your PC screen to become a ‘true companion’ Microsoft is again throwing AI at Windows 11 to see what sticks, releasing features including the even more eyebrow-raising successor to its controversial Recall, a…
OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking
AI voice clones can impersonate people in a way that Altman said is increasingly “indistinguishable from reality” and will require new methods for verification. The post OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking appeared first on…
BforeAI Identifies Phishing Campaign Using Same Infrastructure Across Multiple Domains
BforeAI today disclosed the discovery of a phishing campaign that is leveraging the same core infrastructure to spoof multiple domains. The post BforeAI Identifies Phishing Campaign Using Same Infrastructure Across Multiple Domains appeared first on Security Boulevard. This article has…
PlexTrac Workflow Automation Engine enhancements accelerate time to remediation
PlexTrac launched enhanced Workflow Automation Engine, a major product update designed to standardize workflows across the vulnerability lifecycle, automate pentest findings delivery, accelerate time to remediation, and increase operational efficiency. By leveraging the unified security data already centralized in PlexTrac,…
New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials
The Windows banking trojan known as Coyote has become the first known malware strain to exploit the Windows accessibility framework called UI Automation (UIA) to harvest sensitive information. “The new Coyote variant is targeting Brazilian users, and uses UIA to…
Suspected Admin of XSS.IS Cybercrime Forum Arrested in Ukraine
Suspected admin of XSS.IS, a major Russian-language cybercrime forum, arrested in Ukraine after years of running malware and data trade operations. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original…
Malicious LNK File Posing as Credit Card Security Email Steals User Data
Threat actors have deployed a malicious LNK file masquerading as a credit card company’s security email authentication pop-up to pilfer sensitive user information. The file, named “card_detail_20250610.html.lnk,” cleverly disguises itself as a legitimate HTML document from a financial institution, exploiting…
US Nuclear Weapons Data Compromised via SharePoint Zero-Day Attack
A significant cybersecurity breach has exposed vulnerabilities in critical US government infrastructure, as the National Nuclear Security Administration (NNSA) was reportedly compromised through a Microsoft SharePoint zero-day exploit linked to Chinese government-affiliated hacking groups. Chinese Hackers Target Critical Infrastructure The…
A Special Mission to Nowhere
Following the Israel-Iran ceasefire, FortiGuard Labs uncovered a phishing campaign posing as a private jet evacuation service from Tel Aviv to New York. Learn how attackers used crisis-driven fear to steal personal and financial data. This article has been…
France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine
French authorities announced that an alleged admin of XSS.is, one of the longest-running cybercrime forums, has been arrested in Ukraine. The post France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine appeared first on SecurityWeek. This article has been…
Should We Trust AI? Three Approaches to AI Fallibility
Experts unpack the risks of trusting agentic AI, arguing that fallibility, hype, and a lack of transparency demand caution—before automation outpaces our understanding. The post Should We Trust AI? Three Approaches to AI Fallibility appeared first on SecurityWeek. This article…
Lumma Stealer Masquerades as Pirated Apps to Steal Logins and Data
Lumma Stealer, a notorious information-stealing malware-as-a-service (MaaS) platform, has swiftly reemerged after a coordinated global law enforcement operation in May 2025. The U.S. Department of Justice, alongside international partners, seized approximately 2,300 malicious domains integral to Lumma’s command-and-control (C&C) infrastructure,…