The US seeks information on the leader of Emennet Pasargad, Mohammad Bagher Shirinkar, and long-time employee Fatemeh Sedighian Kashi. The post US Posts $10 Million Bounty for Iranian Hackers appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
AI vs. Human Drivers
Two competing arguments are making the rounds. The first is by a neurosurgeon in the New York Times. In an op-ed that honestly sounds like it was paid for by Waymo, the author calls driverless cars a “public health breakthrough”:…
Proofpoint Completes $1.8 Billion Acquisition of Hornetsecurity
Enterprise cybersecurity giant Proofpoint has completed the acquisition of Germany-based Microsoft 365 security solutions provider Hornetsecurity. Financial details were not officially disclosed when news of the transaction came to light, but it was reported that Proofpoint would be paying $1…
New Black Kite module offers product-level insight into software supply chain vulnerabilities
Black Kite released its new Product Analysis module, which allows security teams to evaluate the risks of third-party software products at a granular level. As the first TPRM platform to offer this capability, Black Kite provides a more detailed view…
Nudge Security expands platform with new AI governance capabilities
Nudge Security announced an expansion of its platform to address the need for organizations to mitigate AI data security risks while supporting workforce AI use. New capabilities include: AI conversation monitoring: Detect sensitive data shared via file uploads and conversations…
Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats
Google on Monday announced a set of new security features in Chrome, following the company’s addition of agentic artificial intelligence (AI) capabilities to the web browser. To that end, the tech giant said it has implemented layered defenses to make…
How to Streamline Zero Trust Using the Shared Signals Framework
Zero Trust helps organizations shrink their attack surface and respond to threats faster, but many still struggle to implement it because their security tools don’t share signals reliably. 88% of organizations admit they’ve suffered significant challenges in trying to implement…
Deepfakes, AI resumes, and the growing threat of fake applicants
Attackers are blending automation, impersonation, and social engineering to get inside organizations. Here’s how to spot the signs. This article has been indexed from Malwarebytes Read the original article: Deepfakes, AI resumes, and the growing threat of fake applicants
New ‘Broadside’ Botnet Poses Risk to Shipping Companies
The botnet attempts to steal credentials from infected TBK DVR devices, in addition to abusing them to launch DDoS attacks. The post New ‘Broadside’ Botnet Poses Risk to Shipping Companies appeared first on SecurityWeek. This article has been indexed from…
watchTowr Active Defense delivers automated protection from exposure to defense
watchTowr announced major capability enhancements, including the launch of Active Defense, a new capability that closes the gap between discovery and protection. Active Defense delivers automated, intelligence-driven protection the moment a validated exposure is identified, providing defenders with near-instant coverage…
New Black Kite module delivers product-level insight into software supply chain vulnerabilities
Black Kite released its new Product Analysis module, which allows security teams to evaluate the risks of third-party software products at a granular level. As the first TPRM platform to offer this capability, Black Kite provides a more detailed view…
Goodbye, dark Telegram: Blocks are pushing the underground out
Kaspersky researchers analyze changes in the lifespan of a shadow Telegram channel, blocks, and migration to other platforms. This article has been indexed from Securelist Read the original article: Goodbye, dark Telegram: Blocks are pushing the underground out
UK NCSC Raises Alarms Over Prompt Injection Attacks
The UK’s National Cyber Security Centre has warned of the dangers of comparing prompt injection to SQL injection This article has been indexed from www.infosecurity-magazine.com Read the original article: UK NCSC Raises Alarms Over Prompt Injection Attacks
IT Security News Hourly Summary 2025-12-09 12h : 11 posts
11 posts were published in the last hour 11:2 : New BYOVD loader behind DeadLock ransomware attack 11:2 : Gartner: Carmakers’ AI Investments Set For Sharp Decline 11:2 : Polish Police arrest 3 Ukrainians for possessing advanced hacking tools 11:2…
New BYOVD loader behind DeadLock ransomware attack
Cisco Talos has uncovered a new DeadLock ransomware campaign using a previously unknown BYOVD loader to exploit a Baidu Antivirus driver vulnerability, letting threat actors disable EDR defenses and escalate attacks. This article has been indexed from Cisco Talos Blog…
Gartner: Carmakers’ AI Investments Set For Sharp Decline
Gartner predicts only 5 percent of auto manufacturers to maintain ambitious AI investments by 2029, down from 95 percent today This article has been indexed from Silicon UK Read the original article: Gartner: Carmakers’ AI Investments Set For Sharp Decline
Polish Police arrest 3 Ukrainians for possessing advanced hacking tools
Poland arrested three Ukrainian nationals accused of using hacking devices to target IT systems and obtain sensitive defense-related data. Polish police arrested three Ukrainian nationals for allegedly trying to damage IT systems and obtaining sensitive defense-related data using advanced hacking…
Equixly Raises $11 Million for AI-Powered API Penetration Testing
The Italian startup will use the investment to build proprietary AI models, accelerate global expansion, and hire new talent. The post Equixly Raises $11 Million for AI-Powered API Penetration Testing appeared first on SecurityWeek. This article has been indexed from…
EU Moves Toward Resolution Of Meta Data-Collection Probe
European Commission says Meta changes that use less personalised data ‘good step forward’ as probe moves toward conclusion This article has been indexed from Silicon UK Read the original article: EU Moves Toward Resolution Of Meta Data-Collection Probe
CISA Warns of D-Link Routers Buffer Overflow Vulnerability Exploited in Attacks
A critical buffer overflow vulnerability affecting D-Link routers has been added to the CISA catalog of Known Exploited Vulnerabilities, indicating active exploitation in the wild. The flaw, tracked as CVE-2022-37055, poses severe risks to organizations and enterprise networks relying on…
New Multi-stage JS#SMUGGLER Malware Attack Delivers ‘NetSupport RAT’ to Gain Full System Control
A new malware campaign using multiple attack stages has been discovered that delivers NetSupport RAT through hidden web-based redirects and obfuscated code. The attack unfolds in three stages, starting with a JavaScript loader injected into compromised websites. This first stage…
Operation FrostBeacon Attacking Finance and Legal Departments with Cobalt Strike Malware
A sophisticated malware campaign has emerged targeting financial and legal sectors in the Russian Federation, delivering the notorious Cobalt Strike remote access tool to organizations handling sensitive business transactions. Security researchers have identified over twenty initial infection files involved in…
Authorities Arrested Hackers With Specialized FLIPPER Hacking Equipment Used to Attack IT Systems
Authorities in Warsaw have arrested three suspected hackers found carrying specialized FLIPPER hacking equipment. Other tools are allegedly intended to attack IT and telecommunications systems. The suspects, all Ukrainian citizens aged 43, 42, and 39, were detained during a routine…
AI-Powered Free Security-Audit Checklist for 2026 – ISO 27001, SOC 2, NIST, NIS 2 and GDPR Compliance
In many companies, audit preparation in 2025 still feels like 2005: Excel lists, scattered evidence, copy & paste from old answers, long coordination loops. At the same time, requirements are increasing – ISO 27001:2022, SOC 2, NIST CSF, NIS 2,…