A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through a highly sophisticated phishing-based attack. Cybersecurity researchers have uncovered a multi-stage infection chain that begins with a deceptive PDF document titled “Pay Adjustment.” This document lures…
Category: EN
Details of 1.1 Million Job Applicants Leaked by a Major Recruitment Platform
While looking for a new job can be enjoyable, it is surely not fun to lose your personal information in the process. In the meantime, the Cybernews investigation team found an unprotected GCS bucket belonging to the talent pool…
The best Bluetooth trackers of 2025: Expert tested
Whether you’re team iOS or Android, we’ve tested, reviewed, and sourced the best Bluetooth trackers on the market to ensure your valuables are easy to locate. This article has been indexed from Latest stories for ZDNET in Security Read the…
Ransomware attacks on education sector go unreported for months
Countries like the United Kingdom, the United States, Australia, and Canada have established cyber laws that require organizations affected by ransomware attacks to report these incidents within a specific time frame. These mandatory reporting windows typically range between 48 to…
Pro-Ukraine Group Targets Russian Developers with Python Backdoor
ReversingLabs discovers dbgpkg, a fake Python debugger that secretly backdoors systems to steal data. Researchers suspect a pro-Ukraine… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Pro-Ukraine Group…
Linux Kernel Patching and Preventing Exploits in 2025
As the Linux kernel continues to power everything from cloud infrastructure to embedded devices, its security remains critical. In 2025, patching strategies face unprecedented challenges: a 3,529% year-over-year increase in CVEs since 2024, sophisticated exploitation techniques targeting virtualization subsystems, and kernel-level attacks…
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack
A coordinated phishing campaign targeting Kuwait’s critical sectors has been exposed through a distinctive operational security lapse: the consistent reuse of SSH authentication keys across multiple attack servers. The campaign, which remains active as of May 2025, has deployed over…
Defamation case against DEF CON terminated with prejudice
‘We hope it makes attendees feel safe reporting violations’ A Seattle court this week dismissed with prejudice the defamation case brought against DEF CON and its organizer Jeff Moss by former conference stalwart Christopher Hadnagy.… This article has been indexed…
Coinbase Rejects $20M Ransom After Insider Data Leak, Faces Up to $400M in Fallout
Coinbase rejects $20M ransom after insider breach; customer data leaked, social scams follow. Fallout may cost up to $400M in reimbursements. The post Coinbase Rejects $20M Ransom After Insider Data Leak, Faces Up to $400M in Fallout appeared first on…
Ransomware Roundup – VanHelsing
The VanHelsing ransomware was first identified in March 2025 and uses TOR sites for ransom negotiations and data leaks. Learn more. This article has been indexed from Fortinet Threat Research Blog Read the original article: Ransomware Roundup – VanHelsing
Coordinated Action Targets DDoS-for-Hire Empire with Arrests and Seizures
The Polish authorities have succeeded in dismantling a sophisticated criminal network offering distributed denial-of-service (DDoS) for-hire services to hit the cybercrime infrastructure hard. As the result of a coordinated operation, four people were arrested who were suspected of operating…
Agentic AI Is Reshaping Cybersecurity Careers, Not Replacing Them
Agentic AI took center stage at the 2025 RSA Conference, signaling a major shift in how cybersecurity professionals will work in the near future. No longer a futuristic concept, agentic AI systems—capable of planning, acting, and learning independently—are already…
Unit 42 Develops Agentic AI Attack Framework
Threat actors are advancing AI strategies and outpacing traditional security. CXOs must critically examine AI weaponization across the attack chain. The post Unit 42 Develops Agentic AI Attack Framework appeared first on Palo Alto Networks Blog. This article has been…
FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign
The Federal Bureau of Investigation (FBI) issued an urgent warning Thursday about an ongoing malicious campaign where cybercriminals are impersonating senior US officials through text messages and AI-generated voice calls. The sophisticated attack, which began in April 2025, primarily targets…
Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia
In a significant setback for US cybercrime enforcement efforts, Russian hacker Andrei Tarasov has evaded extradition to the United States and successfully returned to his homeland, intelligence sources confirm. Tarasov, 33, known in cybercriminal circles by the aliases “Aels” and,…
Chinese Agent Impersonates as Stanford Student For Intelligence Gathering
A recent investigation has uncovered a concerning case of espionage at one of America’s premier academic institutions, where a Chinese intelligence agent posed as a Stanford University student to gather sensitive research information. The agent, operating under the alias “Charles…
New Vulnerability Affects All Intel Processors From The Last 6 Years
A newly discovered class of vulnerabilities in Intel processors, termed Branch Predictor Race Conditions (BPRC), allows attackers to systematically extract sensitive data from the cache and random-access memory (RAM) of other users sharing the same hardware. Affecting all Intel processors…
Google Warns UK Retailer Hackers Now Targeting US
Google says the hacking group behind the recent cyberattacks on UK retailers is now shifting focus to the US. The post Google Warns UK Retailer Hackers Now Targeting US appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
RSAC Conference 2025
Follow SearchSecurity’s RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world’s biggest infosec event. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article:…
In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach
A summary of noteworthy stories that might have slipped under the radar this week. The post In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…