Microsoft has opened the Release Preview Channel to Windows Insiders for the forthcoming Windows 11, version 25H2 (Build 26200.5074) enablement package (eKB), offering an early look at this year’s annual feature update. Insiders can now opt in via Windows Update’s…
Apple Hints That iPhone 17 Is to Eliminate the Physical SIM Card
Apple appears to be laying the groundwork to remove the physical SIM card slot from its upcoming iPhone 17 models in more countries, with a significant push anticipated across the European Union. The move aligns with the company’s long-term strategy…
Travelers to the UK targeted in ETA scams
Some scammers are selling ETA documents at exaggerated prices, and others are after your personal and financial data. This article has been indexed from Malwarebytes Read the original article: Travelers to the UK targeted in ETA scams
Norway’s £10B UK frigate deal could delay Royal Navy ships
BAE’s sub hunter production line warms up – shame it’s not for Britain Norway has ordered British-made Type 26 frigates in a contract valued at roughly £10 billion to the UK economy, but this may delay the introduction of the…
IT Security News Hourly Summary 2025-09-01 12h : 22 posts
22 posts were published in the last hour 10:5 : Salesforce Publishes Forensic Guide After Series of Cyberattacks 10:5 : LegalPwn: Tricking LLMs by burying badness in lawyerly fine print 10:5 : Amazon Stops Russian APT29 Watering Hole Attack Exploiting…
MediaTek Issues Security Update to Patch Multiple Chipset Flaws
MediaTek today published its September 2025 Product Security Bulletin, disclosing and remediating a series of critical and moderate vulnerabilities in its modem and system components. The announcement highlights that all affected device OEMs have already received patches for at least…
The 15+ best Labor Day deals live now: Save on Apple, Samsung, Google and more
Labor Day has arrived, and we’ve rounded up our favorite sales and discounts, from Apple products to home appliances. Check out the best deals for tech online. This article has been indexed from Latest news Read the original article: The…
China Is About to Show Off Its New High-Tech Weapons to the World
On September 3, China will hold a “Victory Day” military parade in Tiananmen Square to celebrate the 80th anniversary of its victory over Japan—and to send the West a message. This article has been indexed from Security Latest Read the…
Giglio – 1,026,468 breached accounts
In August 2025, over 1M unique email addresses appeared in a breach allegedly obtained from Italian fashion designer Giglio. The data also included names, phone numbers and physical addresses. Giglio did not respond to repeated attempts to disclose the incident.…
DDoS is the neglected cybercrime that’s getting bigger. Let’s kill it off
Don’t worry, there’s a twist at the end Opinion Agatha Christie stuck a dagger in the notion that crime doesn’t pay. With sales of between two and four billion books – fittingly, the exact number is a mystery – she…
Hackers Register Domains to Target 2026 FIFA World Cup in Cyberattack
A concerning surge in malicious domain registrations designed to exploit the upcoming 2026 FIFA World Cup, with threat actors already positioning themselves more than a year before the tournament begins. A comprehensive investigation by PreCrime Labs, the threat research division…
Taiwan Indicts Three For Stealing TSMC Secrets
Three former TSMC staff allegedly conspired to steal secrets to help Tokyo Electron win more orders for TSMC’s 2-nanometre production lines This article has been indexed from Silicon UK Read the original article: Taiwan Indicts Three For Stealing TSMC Secrets
Salesforce Publishes Forensic Guide After Series of Cyberattacks
Salesforce has published a comprehensive forensic investigation guide aimed at empowering organizations to detect, analyze, and remediate security incidents within their Salesforce environments. The new guide distills best practices across three critical areas: activity logs, user permissions, and backup data—providing…
LegalPwn: Tricking LLMs by burying badness in lawyerly fine print
Trust and believe – AI models trained to see ‘legal’ doc as super legit Researchers at security firm Pangea have discovered yet another way to trivially trick large language models (LLMs) into ignoring their guardrails. Stick your adversarial instructions somewhere…
Amazon Stops Russian APT29 Watering Hole Attack Exploiting Microsoft Auth
The campaign shows APT29’s intentions to “cast a wider net in their intelligence collection efforts,” said Amazon This article has been indexed from www.infosecurity-magazine.com Read the original article: Amazon Stops Russian APT29 Watering Hole Attack Exploiting Microsoft Auth
WhatsApp fixes zero-click vulnerability in iOS and macOS which was used in targeted spyware attacks
WhatsApp has fixed a security flaw in its app for iOS and macOS. A zero-click exploit had been used by hackers to target users in spyware attacks. Last week, Apple released iOS […] Thank you for being a Ghacks reader.…
Google Likely To See Modest EU Adtech Fine
European Commission reportedly likely to give Google relatively modest penalty for alleged adtech abuses under new competition chief This article has been indexed from Silicon UK Read the original article: Google Likely To See Modest EU Adtech Fine
IBM Watsonx Vulnerability Enables SQL Injection Attacks
A critical vulnerability in the IBM Watsonx Orchestrate Cartridge for IBM Cloud Pak for Data has been disclosed, enabling blind SQL injection attacks that could compromise sensitive data. Tracked as CVE-2025-0165, this flaw allows authenticated attackers to inject malicious SQL statements, potentially leading to…
Hackers Exploit macOS Security Features to Spread Malware
A growing wave of sophisticated attacks is turning macOS’s built-in security defenses into avenues for malware distribution, according to recent security research. As macOS continues to gain market share, cybercriminals are adapting their strategies to exploit even the most robust…
Fraudulent Scholarship Apps Target Students in “Defarud” Scam Campaign
An Android malware tracker named SikkahBot, active since July 2024 and explicitly targeting students in Bangladesh. Disguised as applications from the Bangladesh Education Board, SikkahBot lures victims with promises of scholarships, coerces them into sharing sensitive information, and requests high-risk…
AI Waifu RAT Attacking Users With Novel Social Engineering Techniques
A sophisticated malware campaign targeting niche Large Language Model (LLM) role-playing communities has emerged, leveraging advanced social engineering tactics to distribute a dangerous Remote Access Trojan (RAT). The malware, dubbed “AI Waifu RAT” by security researchers, masquerades as an innovative…
Hackers Leverage Windows Defender Application Control Policies to Disable EDR Agents
Cybercriminals are exploiting Windows Defender Application Control (WDAC) policies to systematically disable Endpoint Detection and Response (EDR) agents, creating a dangerous blind spot in corporate security infrastructure. Real-world threat actors, including ransomware groups like Black Basta, have now adopted a…
Amazon Dismantles Russian APT 29 Infrastructure Used to Attack Users
Amazon’s threat intelligence team uncovered a sophisticated watering hole campaign in late August 2025, which is orchestrated by APT29, also known as Midnight Blizzard, a Russian Foreign Intelligence Service–linked actor. The operation relied on the compromise of legitimate websites to…
Infostealer Malware is Being Exploited by APT Groups for Targeted Attacks
Infostealer malware, initially designed to indiscriminately harvest credentials from compromised hosts, has evolved into a potent weapon for state-sponsored Advanced Persistent Threat (APT) groups. Emerging in early 2023, families such as RedLine, Lumma, and StealC quickly proliferated across phishing campaigns…