All Articles (2743)

Sort by

30984543477?profile=RESIZE_400xState-backed hackers are for the first time deploying malware that uses large language models during execution, allowing them to dynamically generate malicious scripts and evade detection, according to new research.  Although cybersecurity experts have observed hackers use AI in recent years to do things like increase the number of victims they reach, researchers at Google said recently that they recently observed malware "that employed AI capabilities mid-execution to dynamically alter the malw

30984533660?profile=RESIZE_400xThe US cybersecurity agency CISA on 27 October 2025 warned that two recent vulnerabilities in DELMIA Apriso factory software have been exploited in attacks.  A manufacturing operations management (MOM) and manufacturing execution system (MES) software made by the French company Dassault Systèmes, DELMIA Apriso, enables the management of the entire manufacturing process.  The two flaws flagged as exploited are tracked as CVE-2025-6204 (CVSS score of 8.0) and CVE-2025-6205 (CVSS score of 9.1) and

30984532476?profile=RESIZE_400xThreat actors are impersonating critical and general services, online platforms, and cryptocurrency exchanges in a massive smishing campaign that has been ongoing since April 2024, according to a warning from Palo Alto Networks.  The cybersecurity firm first warned of the campaign in early March 2024, when it identified over 10,000 domains linked to the impersonation of toll and package delivery services.  Roughly a month later, it warned of over 91,500 root domains employed in these attacks.  S

13770346852?profile=RESIZE_400xMore than a quarter of maritime suppliers have been identified as having ‘high’ or ‘very high’ cyber vulnerabilities, according to new data released by Achilles Network.   The findings come as maritime procurement platform Procureship’s integration with Achilles goes live, enabling shipowners and operators to view verified ESG and cybersecurity indicators directly within their procurement workflows.

More than 1,000 global maritime suppliers were assessed over a 12-month period by the partners, w

30982930077?profile=RESIZE_400xFollowing intelligence shared by research partner Digital Security Lab of Ukraine, SentinelLABS conducted an investigation into a coordinated spearphishing campaign launched on October 8th, 2025, targeting organizations critical to Ukraine’s war relief efforts.

The campaign was initiated through emails that impersonated the Ukrainian President’s Office and contained a weaponized PDF attachment (SHA-256: e8d0943042e34a37ae8d79aeb4f9a2fa07b4a37955af2b0cc0e232b79c2e72f3) embedded with a malicious l

13770348457?profile=RESIZE_400xRansomware infections usually come from malicious hackers. But in a rarity, a string of attacks was sourced to a pair of cybersecurity employees out to extort millions from victims.  Kevin Tyler Martin, a ransomware threat negotiator at cybersecurity provider DigitalMint, and Ryan Clifford Goldberg from Sygnia Cybersecurity Services, are allegedly behind the scheme, according to the Chicago Sun-Times. 

A 12-page court document shows a federal grand jury indicted Goldberg and Martin last month fo

13770118697?profile=RESIZE_400xCybercriminals are targeting trucking and logistics companies with remote monitoring tools to hijack cargo freight, researchers at cybersecurity company Proofpoint have found.  The hackers are collaborating with organized crime groups to compromise companies involved in the freight supply chain, the report stated, further fueling a significant increase in cargo theft in recent years.  The theft of goods in transit in the US increased by 27% in 2024 and is expected to rise by another 22% this yea

13769429465?profile=RESIZE_400xIt is easy to forget that most of the world’s internet traffic does not traverse satellites or distant clouds, but lies beneath our oceans, coursing through thousands of kilometers of fiber-optic cables.  These lines, laid across the seabed, are the unacknowledged arteries of the modern economy.  They transmit trillions of dollars in financial data daily, underpin critical infrastructure, and form the backbone of global commerce and statecraft. Submarine cables carry more than 95% of global inte

13768318274?profile=RESIZE_400xIdentity compromise, as explained by Fortinet, remains one of the most pressing threats to cloud infrastructure today.  When attackers gain access to valid credentials, they can often bypass the traditional security controls designed to protect those environments.  In AWS, this type of compromise frequently manifests through abuse of the Simple Email Service (SES), one of the most common tactics observed in real-world intrusions.  SES offers adversaries a convenient and scalable way to conduct i

13770058857?profile=RESIZE_400xSouth Africa has seen its increases in social upheaval and other political struggles.  Cyber-attacks are an additional concern for South Africans to worry about.  South Africa has experienced 110 cybercrime incidents involving extortion, ransomware, and state hacking in the past five years, according to Orange Cyberdefense’s inaugural Security Navigator Africa report.  This is the highest number in Africa and more than double that of Egypt, which ranked second with 46 incidents between 2020 and

13769473276?profile=RESIZE_400xIn the war of propaganda, the sky’s the limit.  Pro-Hamas and anti-Israel messages were recently blasted through speakers at airports in the US and Canada following apparent cyber hacks, officials said.  One public address system at Harrisburg International Airport (HIA) in Pennsylvania was hacked for approximately 10 minutes.

The hacker can be heard saying "Free Palestine" and "F--- Netanyahu and Trump" over the speaker, according to videos circulating on social media.  "An unauthorized user ga

13766440697?profile=RESIZE_400xA recent open letter calling for the prohibition of the development of superintelligent AI was announced with the signatures of more than 700 celebrities, AI scientists, faith leaders, and policymakers.  Among the signatories are five Nobel laureates; two so-called “Godfathers of AI;” Steve Wozniak, a co-founder of Apple; Steve Bannon, a close ally of President Trump; Paolo Benanti, an adviser to the Pope; and even Harry and Meghan, the Duke and Duchess of Sussex.[1]

The open letter says, in ful

13766450088?profile=RESIZE_400xHundreds of thousands of people were left unable to access critical services on 29 October, as Microsoft Azure unexpectedly crashed.  The massive outage came just nine days after an Amazon Web Services outage brought 'half the internet' to a standstill.  Some experts have shown alarming realities of the Internet blackout.  Microsoft and Amazon are the world's two largest providers of 'cloud computing'.  The vast majority of internet services: including apps, social media platforms, and websites

13766452295?profile=RESIZE_400xA Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive job seekers and digital marketing professionals to deliver a previously undocumented malware called Vampire Bot.  "The attackers pose as recruiters, distributing malicious files disguised as job descriptions and corporate documents," Aryaka Threat Research Labs researchers Aditya K Sood and Varadharajan K said in a report shared with The Hacker News. "When opened,

13766430880?profile=RESIZE_400xA cut to federal food assistance is looming, but residents have been struggling with the program for months.  A cyber-attack in July targeted a phone system that lets people call about their account information.  When Julia Smith, 33, qualified for the federal Supplemental Nutrition Assistance Program in late August, she expected to be able to use her benefits.  But obtaining access to her card was complicated by a disruption at a call center a month earlier.  Suzanna Smith, 30, who lives with h

13758037456?profile=RESIZE_400xThe cybersecurity community recently received an urgent signal from Darktrace's research team about a sophisticated intrusion campaign linked to Salt Typhoon, a persistent threat actor with ties to China.  The core of this campaign: the exploitation of a critical vulnerability in the Citrix NetScaler Gateway (formerly Citrix ADC/Gateway).  This is not just another vulnerability report; it is a live-fire case study highlighting the strategic importance of patching perimeter devices and the necess

13758240872?profile=RESIZE_400xCompanies should improve the resilience of their software supply chains against ransomware, according to guidance the International Counter Ransomware Initiative (CRI) published recently after its fifth annual summit in Singapore.  The new guidance, developed by the United Kingdom and Singapore as the CRI’s policy leads, aims to raise awareness of the ransomware threat across supply chains, as well as promote good cyber hygiene that will see supply chain vulnerabilities factored into organizatio

13761558060?profile=RESIZE_400xNew AI-powered web browsers, such as OpenAI’s ChatGPT Atlas and Perplexity’s Comet, are attempting to unseat Google Chrome as the primary gateway to the Internet for billions of users.  A key selling point of these products is their web browsing AI agents, which promise to complete tasks on a user’s behalf by navigating websites and filling out forms.  However, consumers may not be aware of the significant risks to user privacy associated with agentic browsing, a problem that the entire tech ind

13758034869?profile=RESIZE_400xFor decades, online security has relied on cryptographic systems that are robust against classical computers.  But quantum computing changes the game.  It threatens to undermine the mathematical foundations of widely used encryption methods, exposing sensitive data captured today to future decryption and exploitation.  This looming threat has catalyzed a global effort to build quantum-safe cryptography, and a recent survey by Chhetri et al. offers a sweeping and useful view of how post-quantum c

13758236464?profile=RESIZE_400xSpaceX says it has disabled more than 2,000 Starlink devices connected to scam compounds in Myanmar after politicians and others called on the company to crack down on scammers using its kits for fast satellite internet.  The vice-president of Starlink’s business operations, said in a post on X last week that the company “proactively identified and disabled over 2,500 Starlink Kits in the vicinity of suspected ‘scam centers’” in Myanmar.  She cited the takedowns as an example of how the company