US offers $10M for Russian FSB officers Tyukov, Gavrilov & Akulov, accused of attacking US critical infrastructure and over 500 energy firms worldwide. The US Department of State is offering up to $10M for info on FSB officers Pavel Aleksandrovich…
Sandboxed to Compromised: New Research Exposes Credential Exfiltration Paths in AWS Code Interpreters
In my first article on Bedrock AgentCore Code Interpreters, I demonstrated that custom code interpreters can be coerced into performing AWS control plane actions by non-agentic identities. This presented a novel path to privilege escalation, whereby any user with access…
IT Security News Hourly Summary 2025-09-04 21h : 18 posts
18 posts were published in the last hour 19:4 : Philips Hue Bridge Pro just made it easy to add motion sensing to your old smart lights 19:4 : Got AI skills? You can earn 43% more in your next…
An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps
Trend™ Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware family targeting macOS users. Attackers disguise the malware as “cracked” versions of legitimate apps, luring users into installation. This article has been indexed from Trend Micro Research, News…
The fastest growing AI chatbot lately? It’s not ChatGPT or Gemini
Though ChatGPT, Gemini, and Copilot all enjoyed growth this year, one left the other two in the dust – and it’s not the one you’re thinking. This article has been indexed from Latest news Read the original article: The fastest…
Is this the most promising Chromebook yet? This Acer has specs that almost rival my MacBook
The Acer Chromebook Plus Spin 514 combines an ARM-compatible processor and 16GB of RAM with a convertible form factor. This article has been indexed from Latest news Read the original article: Is this the most promising Chromebook yet? This Acer…
Google’s new Androidify app turns you into an adorable Android bot – try it for free
If you’re an Android superfan, here’s your chance to show it. This article has been indexed from Latest news Read the original article: Google’s new Androidify app turns you into an adorable Android bot – try it for free
5 Best Free VPNs You Can Trust (And the Premium Trials Worth Trying)
Skip the traps. Discover the top free VPNs of 2025, featuring no logs, unlimited bandwidth, and regular audits, where available. Tested, secure, and ready to use. The post 5 Best Free VPNs You Can Trust (And the Premium Trials Worth…
Chess.com Data Breach – Hackers Breached External System and Gained Internal Access
Online chess giant Chess.com has disclosed a data breach that compromised the personal information of 4,541 individuals, according to a filing with the Maine Attorney General’s Office. The cyber incident took place on June 5, 2025 and was discovered nearly two weeks later on June 19,…
Innovator Spotlight: SwissBit
Securing the Digital Frontier: How Micro Storage Technology is Rewriting Cybersecurity Protocols The physical security of digital assets has long been the forgotten stepchild of cybersecurity strategy. While CISOs obsess… The post Innovator Spotlight: SwissBit appeared first on Cyber Defense…
Philips Hue Bridge Pro just made it easy to add motion sensing to your old smart lights
The company also launched a video doorbell and a budget-friendly Hue Essentials range at IFA 2025. This article has been indexed from Latest news Read the original article: Philips Hue Bridge Pro just made it easy to add motion sensing…
Got AI skills? You can earn 43% more in your next job – and not just for tech work
A recent study of more than a year’s worth of job postings suggests that even a single AI skill makes a huge difference in the salary offered across a range of sectors. This article has been indexed from Latest news…
Seriously, Acer’s new 16-inch featherweight laptop makes the MacBook Air seem heavy
The Acer Swift Air 16 starts at 2.1 pounds and features some interesting design choices, but comes with potentially big trade-offs. This article has been indexed from Latest news Read the original article: Seriously, Acer’s new 16-inch featherweight laptop makes…
Finally, a smartwatch for fishing enthusiasts – my verdict after taking it on the river
Coros’ new rugged Nomad smartwatch stands out with extensive support for fly fishing and hiking, along with a host of other outdoor activities. This article has been indexed from Latest news Read the original article: Finally, a smartwatch for fishing…
Innovator Spotlight: 360 Privacy
The Future of Cyber Resilience The algorithms are hunting us. Not with malicious code, but with something far more insidious. During a recent Black Hat Conference roundtable hosted by Chuck… The post Innovator Spotlight: 360 Privacy appeared first on Cyber…
Use free ChatGPT? You just got a powerful projects upgrade once exclusive to paid users
Upload your notes, PDFs, and slides, and then have ChatGPT answer you in the same project. This article has been indexed from Latest news Read the original article: Use free ChatGPT? You just got a powerful projects upgrade once exclusive…
Copilot, Gemini, and ChatGPT use surge, but one AI tool is outshining the rest
What’s behind the Microsoft chatbot’s hot growth, especially among mobile users? This article has been indexed from Latest news Read the original article: Copilot, Gemini, and ChatGPT use surge, but one AI tool is outshining the rest
New Phishing Tactic Targets PayPal’s 434M Users
A new PayPal phishing scam adds attackers as secondary users, letting them drain accounts while evading traditional detection. The post New Phishing Tactic Targets PayPal’s 434M Users appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-38352 Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability CVE-2025-48543 Android Runtime Unspecified Vulnerability CVE-2025-53690 Sitecore Multiple Products Deserialization of Untrusted Data…
GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at least 65 Windows servers primarily located in Brazil, Thailand, and Vietnam. The attacks, per Slovak cybersecurity company ESET, led to…
Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries
The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor “is a VBA macro for Outlook designed to…
From summer camp to grind season
Bill takes thoughtful look at the transition from summer camp to grind season, explores the importance of mental health and reflects on AI psychiatry. This article has been indexed from Cisco Talos Blog Read the original article: From summer camp…
CI/CD in the Age of Supply Chain Attacks: How to Secure Every Commit
The digital infrastructure we’ve built resembles a house of cards. One compromised dependency, one malicious commit, one overlooked vulnerability and the entire edifice comes tumbling down. In March 2024, security researchers discovered something terrifying: a backdoor lurking within XZ Utils,…
The most impressive piece of tech hardware I’ve tested in 2025
I test a lot of phones. The most surprising one I’ve put my hands on this year completely changed my mind on foldables. Here’s why. This article has been indexed from Latest news Read the original article: The most impressive…