Pen tester on ScreenConnect bug: This one ‘terrifies’ me ConnectWise has brought in the big guns to investigate a “sophisticated nation state actor” that broke into its IT environment and then breached some of its customers.… This article has been…
Category: EN
A Hacker May Have Deepfaked Trump’s Chief of Staff in a Phishing Campaign
Plus: An Iranian man pleads guilty to a Baltimore ransomware attack, Russia’s nuclear blueprints get leaked, a Texas sheriff uses license plate readers to track a woman who got an abortion, and more. This article has been indexed from Security…
She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> In a chilling sign of how far law enforcement surveillance has encroached on personal liberties, 404 Media recently revealed that a sheriff’s office in Texas searched data…
Deadline Extended: More Time to Submit Your Proposal for the OpenSSL Conference 2025
The OpenSSL Conference 2025 is extending its Call for Papers (CFP) deadline to June 22, 2025. We understand that the best proposals often come from teams deep in the trenches of real-world security work. You now have additional time to…
Feds arrest DoD techie, claim he dumped top secret files in park for foreign spies to find
28-year-old alleged to have made multiple drops to folks who turned out to be undercover FBI agents A Defense Intelligence Agency (DIA) IT specialist is scheduled to appear in court today after being caught by the FBI trying to surreptitiously…
Detecting Evolving Phishing Campaigns in 2025 Cyber Environments
Cybersecurity experts are warning of a dramatic shift in phishing attack strategies in 2025. Threat actors are leveraging artificial intelligence to create hyper-targeted campaigns that bypass traditional security measures. While overall phishing volume has dropped 20% compared to 2024, attacks…
Million-dollar Salaries, Board Influence Mark the CISO’s Rise
Five years post-pandemic, half of CISOs at enterprises with revenue of $20 billion or more now hold EVP- or SVP-level titles. The post Million-dollar Salaries, Board Influence Mark the CISO’s Rise appeared first on Security Boulevard. This article has been…
Ransomware Attack Disrupts Kettering Health Network, Elective Procedures Canceled Across 14 Ohio Facilities
A ransomware incident has caused a significant “system-wide technology outage” at a network of over a dozen medical centers in Ohio, resulting in the cancellation of both inpatient and outpatient elective procedures. This information comes from a statement released…
US medical org pays $50M+ to settle case after crims raided data and threatened to swat cancer patients
Cash splashed on damages, infrastructure improvements, and fraud monitoring A Seattle cancer facility has agreed to fork out around $52.5 million as part of a class action settlement linked to a Thanksgiving 2023 cyberattack where criminals directly threatened cancer patients…
BSidesLV24 – PasswordsCon – Cloud Attack: Dissecting Attack Paths With Graph-Mode
Author/Presenter: Filipi Pires Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24…
Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments
A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra ID and Azure environments, where attackers can exploit lesser-known billing roles to escalate privileges within organizational tenants. This sophisticated attack vector leverages the ability of guest…
Meta – yep, Facebook Meta – is now a defense contractor
Giving people the power to build community and bring the world closer together so we can shoot them Meta has partnered with Anduril Industries to build augmented and virtual reality devices for the military, eight years after it fired the…
British supermarkets’ Supplier of Refrigerated Goods Hit by a Ransomware Attack
Peter Green Chilled, a logistics firm, has announced that it has been attacked by a ransomware attack, interrupting deliveries of refrigerated goods to some of the country’s top supermarkets. Customers — largely smaller producers who provide food to regional…
Cops in Germany Claim They’ve ID’d the Mysterious Trickbot Ransomware Kingpin
The elusive boss of the Trickbot and Conti cybercriminal groups has been known only as “Stern.” Now, German law enforcement has published his alleged identity—and it’s a familiar face. This article has been indexed from Security Latest Read the original…
Eight things we learned from WhatsApp vs. NSO Group spyware lawsuit
The landmark trial between WhatsApp and NSO Group unearthed several new revelations. This article has been indexed from Security News | TechCrunch Read the original article: Eight things we learned from WhatsApp vs. NSO Group spyware lawsuit
Sustaining Digital Certificate Security – Upcoming Changes to the Chrome Root Store
Posted by Chrome Root Program, Chrome Security Team Note: Google Chrome communicated its removal of default trust of Chunghwa Telecom and Netlock in the public forum on May 30, 2025. The Chrome Root Program Policy states that Certification Authority (CA)…
Microsoft Unit In Russia To File For Bankruptcy
Overdue retreat? One of Microsoft’s subsidiary operations in Russia is reportedly preparing to file for bankruptcy This article has been indexed from Silicon UK Read the original article: Microsoft Unit In Russia To File For Bankruptcy
Threat Actors Exploit Google Apps Script to Host Phishing Sites
The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages Google Apps Script a legitimate development platform within Google’s ecosystem to host deceptive phishing pages. This attack, masquerading as an invoice email, exploits the inherent trust…
White House investigating how Trump’s chief of staff’s phone was hacked
Hackers reportedly accessed Wiles’ phone contacts, which were used to impersonate her. This article has been indexed from Security News | TechCrunch Read the original article: White House investigating how Trump’s chief of staff’s phone was hacked
Detecting Deepfake Threats in Authentication and Verification Systems
As digital transformation accelerates, the integrity of authentication and verification systems faces an unprecedented challenge: hyper-realistic deepfakes. These AI-generated forgeries, which manipulate faces, voices, and documents, have evolved from niche curiosities to sophisticated tools for bypassing security protocols. By mid-2025,…