As the Linux kernel continues to power everything from cloud infrastructure to embedded devices, its security remains critical. In 2025, patching strategies face unprecedented challenges: a 3,529% year-over-year increase in CVEs since 2024, sophisticated exploitation techniques targeting virtualization subsystems, and kernel-level attacks…
Tag: EN
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack
A coordinated phishing campaign targeting Kuwait’s critical sectors has been exposed through a distinctive operational security lapse: the consistent reuse of SSH authentication keys across multiple attack servers. The campaign, which remains active as of May 2025, has deployed over…
Defamation case against DEF CON terminated with prejudice
‘We hope it makes attendees feel safe reporting violations’ A Seattle court this week dismissed with prejudice the defamation case brought against DEF CON and its organizer Jeff Moss by former conference stalwart Christopher Hadnagy.… This article has been indexed…
Coinbase Rejects $20M Ransom After Insider Data Leak, Faces Up to $400M in Fallout
Coinbase rejects $20M ransom after insider breach; customer data leaked, social scams follow. Fallout may cost up to $400M in reimbursements. The post Coinbase Rejects $20M Ransom After Insider Data Leak, Faces Up to $400M in Fallout appeared first on…
Ransomware Roundup – VanHelsing
The VanHelsing ransomware was first identified in March 2025 and uses TOR sites for ransom negotiations and data leaks. Learn more. This article has been indexed from Fortinet Threat Research Blog Read the original article: Ransomware Roundup – VanHelsing
Coordinated Action Targets DDoS-for-Hire Empire with Arrests and Seizures
The Polish authorities have succeeded in dismantling a sophisticated criminal network offering distributed denial-of-service (DDoS) for-hire services to hit the cybercrime infrastructure hard. As the result of a coordinated operation, four people were arrested who were suspected of operating…
Agentic AI Is Reshaping Cybersecurity Careers, Not Replacing Them
Agentic AI took center stage at the 2025 RSA Conference, signaling a major shift in how cybersecurity professionals will work in the near future. No longer a futuristic concept, agentic AI systems—capable of planning, acting, and learning independently—are already…
Unit 42 Develops Agentic AI Attack Framework
Threat actors are advancing AI strategies and outpacing traditional security. CXOs must critically examine AI weaponization across the attack chain. The post Unit 42 Develops Agentic AI Attack Framework appeared first on Palo Alto Networks Blog. This article has been…
FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign
The Federal Bureau of Investigation (FBI) issued an urgent warning Thursday about an ongoing malicious campaign where cybercriminals are impersonating senior US officials through text messages and AI-generated voice calls. The sophisticated attack, which began in April 2025, primarily targets…
Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia
In a significant setback for US cybercrime enforcement efforts, Russian hacker Andrei Tarasov has evaded extradition to the United States and successfully returned to his homeland, intelligence sources confirm. Tarasov, 33, known in cybercriminal circles by the aliases “Aels” and,…
Chinese Agent Impersonates as Stanford Student For Intelligence Gathering
A recent investigation has uncovered a concerning case of espionage at one of America’s premier academic institutions, where a Chinese intelligence agent posed as a Stanford University student to gather sensitive research information. The agent, operating under the alias “Charles…
New Vulnerability Affects All Intel Processors From The Last 6 Years
A newly discovered class of vulnerabilities in Intel processors, termed Branch Predictor Race Conditions (BPRC), allows attackers to systematically extract sensitive data from the cache and random-access memory (RAM) of other users sharing the same hardware. Affecting all Intel processors…
Google Warns UK Retailer Hackers Now Targeting US
Google says the hacking group behind the recent cyberattacks on UK retailers is now shifting focus to the US. The post Google Warns UK Retailer Hackers Now Targeting US appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
RSAC Conference 2025
Follow SearchSecurity’s RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world’s biggest infosec event. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article:…
In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach
A summary of noteworthy stories that might have slipped under the radar this week. The post In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Amazon Axes Jobs At Devices, Services Group – Again
Job cuts at Amazon group responsible for Alexa voice assistant, Echo devices, Kindle, and Zoox self-driving cars This article has been indexed from Silicon UK Read the original article: Amazon Axes Jobs At Devices, Services Group – Again
Windows 10 KB5058379 Update Causes PCs to Enter Recovery Mode and Prompt for BitLocker Key
Security update KB5058379 for Windows 10, released in May 2025, is causing significant technical issues for numerous systems. Users report their devices are unexpectedly booting into Windows Recovery mode and requiring BitLocker recovery keys following the update installation. Windows 10…
Communications Backdoor in Chinese Power Inverters
This is a weird story: U.S. energy officials are reassessing the risk posed by Chinese-made devices that play a critical role in renewable energy infrastructure after unexplained communication equipment was found inside some of them, two people familiar with the…
Hackers Actively Exploiting PowerShell to Evade Antivirus & EDR
Cybersecurity experts have identified a concerning trend in the malware landscape as threat actors increasingly leverage fileless techniques to circumvent traditional security measures. A sophisticated PowerShell-based shellcode loader executing Remcos Remote Access Trojan (RAT) has emerged as the latest example…
Hackers Attacking Industrial Automation Systems With 11,600+ Malware Families
Industrial automation systems worldwide are facing an unprecedented scale of cyber threats, with security researchers detecting a staggering 11,679 distinct malware families targeting critical infrastructure in the first quarter of 2025. This alarming figure, revealed in a comprehensive threat landscape…