US government to take 10 percent equity stake in Intel in exchange for previously agreed funding, in latest direct intervention This article has been indexed from Silicon UK Read the original article: US Government To Take 10 Percent Stake In…
New macOS Installer Boasts Lightning-Fast Data Theft, Marketed on Dark Web
A novel macOS infostealer malware, designated as Mac.c, has emerged as a formidable contender in the underground malware-as-a-service (MaaS) ecosystem. Developed openly by a threat actor operating under the pseudonym “mentalpositive,” Mac.c represents a streamlined derivative of the notorious Atomic…
These 7 household gadgets were secretly driving up my power bill – unplugging them helped
You’ve likely heard of ‘vampire devices,’ but you might be shocked at how many gadgets in your home are silently draining power. This article has been indexed from Latest news Read the original article: These 7 household gadgets were secretly…
You should probably clean your AirPods right now (or else this happens)
Hearing health doesn’t only pertain to volume levels; it’s equally important to keep headphones and earbuds clean. This article has been indexed from Latest news Read the original article: You should probably clean your AirPods right now (or else this…
The best password manager for families in 2025: Expert tested and reviewed
This back-to-school season, set your family up for privacy and security success with a password manager. I tested lots of password management tools to help you choose the best fit for your family. This article has been indexed from Latest…
Pakistan-linked APT36 abuses Linux .desktop files to drop custom malware in new campaign
APT36 uses Linux .desktop files in new attacks on Indian gov & defense, aiming for data theft and persistent espionage access. Transparent Tribe (aka APT36, Operation C-Major, and Mythic Leopard), a Pakistan-linked threat actor, is using Linux .desktop files to…
Waymo Receives New York’s First Self-Driving Trial Permit
Waymo to begin trials of self-driving cars in New York City, with human test driver, in metropolis’ first robotaxi tests This article has been indexed from Silicon UK Read the original article: Waymo Receives New York’s First Self-Driving Trial Permit
Arch Linux Project Responding to Week-Long DDoS Attack
The Arch Linux Project has been targeted in a DDoS attack that disrupted its website, repository, and forums. The post Arch Linux Project Responding to Week-Long DDoS Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
IT Security News Hourly Summary 2025-08-25 09h : 7 posts
7 posts were published in the last hour 7:4 : UKGovernment Drops Demand for Apple iCloud Backdoor After US Pressure 7:4 : Grok AI Chats Appear In Public Searches 7:3 : NIST Releases Lightweight Cryptography Standard for IoT Security 7:3…
Nvidia ‘Tells Suppliers’ To Stop Work On H20 AI Chip
Nvidia reportedly orders suppliers including Amkor, Samsung and Foxconn to stop work on H20 AI chip, as China warns firms of data risks This article has been indexed from Silicon UK Read the original article: Nvidia ‘Tells Suppliers’ To Stop…
Hackers Exploit SendGrid to Steal User Login Credentials in Latest Attack
Cybersecurity researchers at the Cofense Phishing Defense Center (PDC) have uncovered a fresh surge in credential harvesting attacks that leverage the reputable cloud-based email service SendGrid to distribute phishing emails. Attackers are exploiting SendGrid’s trusted status, commonly used for transactional…
These 14 secret codes revealed hidden menus on my iPhone and Android
Dial these short codes on your phone to access hidden menus, secret screens, and extra features worth exploring. This article has been indexed from Latest news Read the original article: These 14 secret codes revealed hidden menus on my iPhone…
Electronics manufacturer Data I/O took offline operational systems following a ransomware attack
Electronics manufacturer Data I/O reports a ransomware attack to SEC, the company was forced to take offline operational systems. Electronics manufacturer Data I/O reported a ransomware attack to the US Securities and Exchange Commission (SEC). The company was forced to…
Android.Backdoor.916.origin malware targets Russian business executives
New Android spyware Android.Backdoor.916.origin is disguised as an antivirus linked to Russia’s intelligence agency FSB, and targets business executives. Doctor Web researchers observed a multifunctional backdoor Android.Backdoor.916.origin targeting Android devices belonging to representatives of Russian businesses. The malware executes attacker…
New macOS Installer Promising Lightning-fast Data Exfiltration Advertised on Dark Web
A newly discovered macOS stealer, dubbed Mac.c, has surfaced on darknet forums, offering lightning-fast data exfiltration for just $1,500 per month. Developed by the threat actor “mentalpositive,” Mac.c is advertised as a streamlined alternative to the established AMOS stealer, targeting…
Happy Birthday Linux! Powering Numerous Devices Across the Globe for 34 Years
On August 25, 2025, the world celebrates the 34th anniversary of Linux, marking one of the most significant milestones in computing history. What began as a humble hobby project by a 21-year-old Finnish student has evolved into the backbone of…
DeepSeek Power-Efficient AI Tech Boosts Chinese Chip Stocks
Chinese semiconductor shares surge after AI start-up DeepSeek says UE8M0 FP8 tech in latest model could work well with ‘home-grown chips’ This article has been indexed from Silicon UK Read the original article: DeepSeek Power-Efficient AI Tech Boosts Chinese Chip…
A week in security (August 18 – August 24)
A list of topics we covered in the week of August 18 to August 24 of 2025 This article has been indexed from Malwarebytes Read the original article: A week in security (August 18 – August 24)
Malicious Go module, new Mirai botnet, Silk Typhoon exploits cloud
Malicious Go module steals credentials via Telegram Mirai-based botnet resurfaces targeting systems globally Silk Typhoon hackers exploit cloud trust to hack downstream customers Huge thanks to our sponsor, Prophet Security Ever feel like your security team is stuck in a…
From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today
Host David Shipley explores the latest in cybersecurity, including the rapid development of AI-generated exploits for critical vulnerabilities, record-high searches of digital devices at US borders, and a fired developer jailed for sabotaging his former employer. Additionally, the episode highlights…
UKGovernment Drops Demand for Apple iCloud Backdoor After US Pressure
UK ends push to force Apple to create iCloud backdoor for US citizens’ data after US opposition Introduction For months, the UK government attempted to… The post UKGovernment Drops Demand for Apple iCloud Backdoor After US Pressure appeared first on…
Grok AI Chats Appear In Public Searches
Hundreds of thousands of chats from xAI’s Grok chatbot appear on Google and other search engines, with no notice to users This article has been indexed from Silicon UK Read the original article: Grok AI Chats Appear In Public Searches
NIST Releases Lightweight Cryptography Standard for IoT Security
The National Institute of Standards and Technology (NIST) has formally published Special Publication 800-232, “Ascon-Based Lightweight Cryptography Standards for Constrained Devices,” establishing the first U.S. government benchmark for efficient cryptographic algorithms tailored to resource-constrained environments such as the Internet of…
Hackers Steal Windows Secrets and Credentials Undetected by EDR Detection
A cybersecurity researcher has unveiled a sophisticated new method for extracting Windows credentials and secrets that successfully evades detection by most Endpoint Detection and Response (EDR) solutions currently deployed in enterprise environments. The technique, dubbed “Silent Harvest,” leverages obscure Windows…
Happy Birthday Linux! 34 Years of Open-Source Power
August 25, 2025, marks the 34th anniversary of Linux, a project that began as a modest hobby and has grown into the bedrock of modern digital infrastructure. On this day in 1991, 21-year-old Finnish student Linus Torvalds posted to the…
Microsoft Copilot Agent Policy Flaw Lets Any User Access AI Agents
Microsoft has disclosed a critical flaw in its Copilot agents’ governance framework that allows any authenticated user to access and interact with AI agents within an organization—bypassing intended policy controls and exposing sensitive operations to unauthorized actors. At the core…
Farmers Insurance Data Breach Impacts Over 1 Million People
Farmers New World Life Insurance and Farmers Group have filed separate data breach notifications with state authorities. The post Farmers Insurance Data Breach Impacts Over 1 Million People appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…