A new sophisticated threat actor has emerged in the cybersecurity landscape, targeting critical infrastructure across the United States. The adversary, operating under the name WARP PANDA, has demonstrated remarkable technical capabilities in infiltrating VMware vCenter environments at legal, technology, and…
UK pushes ahead with facial recognition expansion despite civil liberties backlash
Plan would create statutory powers for police use of biometrics, prompting warnings of mass surveillance The UK government has kicked off plans to ramp up police use of facial recognition, undeterred by a mounting civil liberties backlash and fresh warnings…
Lumia Security Raises $18 Million for AI Security and Governance
The startup will invest in expanding its engineering and research teams, deepening product integrations, and scaling go-to-market efforts. The post Lumia Security Raises $18 Million for AI Security and Governance appeared first on SecurityWeek. This article has been indexed from…
ShadyPanda Takes its Time to Weaponize Legitimate Extensions
ShadyPanda spent seven years uploading trusted Chrome and Edge extensions, later weaponizing them for tracking, hijacking, and remote code execution. Learn how the campaign unfolded. The post ShadyPanda Takes its Time to Weaponize Legitimate Extensions appeared first on Security Boulevard.…
Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs. This article has been indexed from WeLiveSecurity Read the original article: Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
Aisuru Botnet Powers Record DDoS Attack Peaking at 29 Tbps
Cloudflare recently mitigated a new record-breaking Aisuru attack that peaked at 14.1 Bpps. The post Aisuru Botnet Powers Record DDoS Attack Peaking at 29 Tbps appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Ghost-Tap Scam Makes Payments Scarier
The BBB warns of a rising ghost-tap scam exploiting tap-to-pay cards and mobile wallets. How attackers use NFC proximity tricks. The post Ghost-Tap Scam Makes Payments Scarier appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Bots, bias, and bunk: How can you tell what’s real on the net?
You can improve the odds by combining skepticism, verification habits, and a few technical checks Opinion Liars, cranks, and con artists have always been with us. It’s just that nowadays their reach has gone from the local pub to the…
Helmet Security Emerges From Stealth Mode With $9 Million in Funding
Helmet Security has built an end-to-end platform that secures the infrastructure for agentic AI communication. The post Helmet Security Emerges From Stealth Mode With $9 Million in Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
CrowdStrike Extends Scope of AWS Cybersecurity Alliance
CrowdStrike deepens its AWS partnership with automated Falcon SIEM configuration, AI security capabilities, EventBridge integrations and new MSSP-focused advancements. The post CrowdStrike Extends Scope of AWS Cybersecurity Alliance appeared first on Security Boulevard. This article has been indexed from Security…
Meta Top Lawyer Appointed As Apple General Counsel
Apple’s latest executive shake-up sees Jennifer Newstead arriving from Meta, retirement of current heads of legal, policy This article has been indexed from Silicon UK Read the original article: Meta Top Lawyer Appointed As Apple General Counsel
ClayRat Android Malware Steals SMS Messages, Call Logs and Capture Victim Photos
A dangerous new Android spyware variant called ClayRat has emerged as a significant threat to mobile device security worldwide. First identified in October by the zLabs team, this malware represents a concerning evolution in mobile threats with capabilities that allow…
Cloudflare Outage Hits Internet with 500 Internal Server Error
Cloudflare has confirmed that it is currently experiencing a significant outage that is affecting the Cloudflare Dashboard and several Cloudflare API services. The issue began earlier today and has caused widespread disruptions for users who rely on Cloudflare’s management tools…
Predator Spyware Maker Intellexa Evades Sanctions, New Victims Identified
Data leaks have shed a new light on Intellexa’s flagship spyware infrastructure and attack vectors This article has been indexed from www.infosecurity-magazine.com Read the original article: Predator Spyware Maker Intellexa Evades Sanctions, New Victims Identified
EU Probes Meta Over WhatsApp AI Rules
European Commission says new rules governing third-party AI chatbots on WhatsApp Business may illegally limit competition This article has been indexed from Silicon UK Read the original article: EU Probes Meta Over WhatsApp AI Rules
CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of a backdoor named BRICKSTORM that has been put to use by state-sponsored threat actors from the People’s Republic of China (PRC) to maintain long-term persistence on compromised…
Waymo Cars Filmed Illegally Passing School Buses 19 Times
US highway regulator investigates latest Waymo blunder after automated taxis filmed repeatedly illegally passing school buses in Austin, Texas This article has been indexed from Silicon UK Read the original article: Waymo Cars Filmed Illegally Passing School Buses 19 Times
New Anonymous Phone Service
A new anonymous phone service allows you to sign up with just a zip code. This article has been indexed from Schneier on Security Read the original article: New Anonymous Phone Service
SEEDSNATCHER Android Malware Attacking Users to Exfiltrate Sensitive Data and Execute Malicious Commands
SeedSnatcher represents a significant threat to cryptocurrency users worldwide. Packaged under the seemingly innocent name “Coin” and distributed through Telegram, this Android malware has emerged as a sophisticated tool designed specifically to steal digital wallet recovery codes and execute remote…
Splunk Enterprise Vulnerabilities Allows Privileges Escalation Via Incorrect File Permissions
A high-severity vulnerability has been disclosed in Splunk affecting its Enterprise and Universal Forwarder products for Windows, stemming from incorrect file permissions during installation and upgrades. The vulnerability, tracked as CVE-2025-20386 for Splunk Enterprise and CVE-2025-20387 for Universal Forwarder. Allows…
Cacti Command Injection Vulnerability Let Attackers Execute Malicious Code Remotely
A critical command injection vulnerability in the open-source network monitoring tool Cacti allows authenticated attackers to execute arbitrary code remotely, potentially compromising the entire monitoring infrastructure. The flaw, tracked as CVE-2025-66399, affects all versions up to 1.2.28 and stems from…
Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer
A dangerous new wave of phishing attacks is targeting Solana users by changing wallet ownership permissions rather than stealing private keys. A victim lost more than USD 3 million in a single attack, with an additional USD 2 million locked…
Check Point introduces Quantum Firewall R82.10 with new AI and zero trust security capabilities
Check Point announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments, and simplify zero trust across hybrid networks. “As organizations embrace AI, security teams are under…
Predator spyware, Russia blocks FaceTime, US cyber strategy coming
Predator spyware spotted across several countries Russia blocks FaceTime Draft US cyber strategy set for January release Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What’s your 2 AM security worry? Is it “Do I have…