News
Double whammy: Steaelite RAT bundles data theft, ransomware in one evil tool
A new remote access trojan (RAT) being sold on cybercrime networks enables double extortion attacks on Windows machines by bundling ransomware and data theft, along with credential and cryptocurrency stealers, live surveillance, and a whole host of other illicit capabilities, all controllable from a centralized dashboard.…
Suspected Nork digital intruders caught breaking into US healthcare, education orgs
Digital intruders with possible links to North Korea have been infecting US education and healthcare sectors with a never-before-seen backdoor since at least December, according to security researchers.…
Ransomware payments cratered in 2025, but attacks surged to record highs
Ransomware payments cratered in 2025, but it seems like the cybercrooks launching the attacks didn't get the memo.…
French DIY etailer ManoMano admits customer data stolen
French online marketplace ManoMano is warning customers their personal data was siphoned off after a cyberattack hit one of its customer support subcontractors – and criminals are already claiming the haul is far larger than the company's carefully worded notice suggests.…
Cops back Dutch telco Odido after second wave of ShinyHunters leaks
The Netherlands' national police is backing Odido's refusal to pay a ransom after ShinyHunters leaked a second round of records belonging to the telco.…
Rapid AI-driven development makes security unattainable, warns Veracode
Veracode has posted its annual State of Software Security report, based on data from 1.6 million applications tested on its cloud platform, finding that more vulnerabilities are being created than are being fixed, and that high-velocity development with AI is making comprehensive security unattainable.…
Scattered Lapsus$ Hunters auditioning female voices to sharpen social engineering
Prolific cybercrime crew Scattered Lapsus$ Hunters (SLSH) is reportedly recruiting women in the hope of improving its social engineering success.…
Five Eyes warn: Patch your Cisco SD-WAN or risk root takeover
The Five Eyes intelligence alliance is urgently warning defenders to patch two Cisco Catalyst SD-WAN vulnerabilities used in attacks.…
Claude collaboration tools left the door wide open to remote code execution
Security vulnerabilities in Claude Code could have allowed attackers to remotely execute code on users' machines and steal API keys by injecting malicious configurations into repositories, and then waiting for a developer to clone and open an untrustworthy project.…
Google catches Beijing spies using Sheets to spread espionage across 4 continents
A China-linked crew found a unique formula for attacking telcos and government orgs across the Americas, Asia, and Africa in its latest round of intrusions. Google's threat intelligence, along with unnamed industry partners, disrupted the gang, which used the Chocolate Factory's own spreadsheet tools as part of its exploits.…
Fake 'interview' repos lure Next.js devs into running secret-stealing malware
Next.js developers are once again in the crosshairs as hackers seed malicious repositories disguised as legitimate projects, according to Microsoft, which said a limited set of those repos were directly tied to observed compromises.…
Ex-L3Harris exec jailed 7 years for selling exploits to Russia
The former general manager of L3Harris's cyber arm will spend the next seven years behind bars for selling trade secrets to Russia.…
Wynn Resorts takes attacker's word for it that stolen staff data was deleted
Wynn Resorts has confirmed that employee data was stolen from its servers, and is taking the hackers' word that they've since deleted it.…
OpenAI says Chinese cops used ChatGPT to plan and track smear ops against opponents
A ChatGPT user with links to Chinese law enforcement tried to use the AI chatbot to run smear campaigns targeting the Japanese prime minister and other critics of the Chinese Communist Party, according to OpenAI's latest report on malicious uses of its models.…
Threat intelligence supply chain is full of weak links, researchers find
Researchers from Georgia Tech have found that the supply chain for threat intelligence data is susceptible to adversarial action, and proposed a method to improve data sharing that they think will make it stronger.…
AI has gotten good at finding bugs, not so good at swatting them
What good is finding a hole if you can't fix it? Anthropic last week talked up Claude Code's improved ability to find software vulnerabilities and propose patches. But security researchers say that's not enough.…
Patch these 4 critical, make-me-root SolarWinds bugs ASAP
If you run SolarWinds’ Serv-U, you should patch promptly. Four critical vulnerabilities in the file transfer software can allow attackers to execute code as root.…
North Korea's Lazarus Group targets healthcare orgs with Medusa ransomware
North Korea’s Lazarus Group appears to have added another tool to its kit. It has begun using Medusa ransomware in extortion attacks targeting at least one US healthcare organization and an unnamed victim in the Middle East, according to Symantec and Carbon Black threat hunters.…
Go library maintainer brands GitHub's Dependabot a 'noise machine'
A Go library maintainer has urged developers to turn off GitHub's Dependabot, arguing that false positives from the dependency-scanning tool "reduce security by causing alert fatigue."…
UK data watchdog fines Reddit £14.47M for letting kids slip past the gate
The UK's data protection regulator has fined social media giant Reddit £14.47 million ($19.5 million) over its use of children's data.…