News
US sanctions alleged North Korean IT sweatshop leader
The US Treasury has imposed sanctions on 38-year-old Song Kum Hyok, a North Korean accused of attempting to hack the Treasury Department and posing as an IT worker to collect revenue and secret data for Pyongyang.…
AMD warns of new Meltdown, Spectre-like bugs affecting CPUs
AMD is warning users of a newly discovered form of side-channel attack affecting a broad range of its chips that could lead to information disclosure.…
The cloud-native imperative for effective cyber resilience
Partner content Every organization is investing in cyberresilience tools, training, and processes. Unfortunately, only some of them will be able to successfully respond and recover from an attack. Regardless of how hard they work, many IT and security teams are constrained by legacy technology architectures that were built for the challenges of 2015, not 2025.…
Reframing investments in security as investments in the business
Partner content Cybersecurity executives and their teams are under constant pressure and scrutiny. As the barrier to entry for attackers gets lower, organizations need to improve their defenses. As businesses get leaner, so do their security teams. There are increasingly high expectations and increasingly tougher challenges to meet them across people, processes, and platforms.…
Qantas begins telling some customers that mystery attackers have their home address
Qantas says that when cybercrooks attacked a "third party platform" used by the airline's contact center systems, they accessed the personal information and frequent flyer numbers of the "majority" of the circa 5.7 million people affected.…
Ingram Micro restarts orders – for some – following ransomware attack
Ingram Micro says it is gradually reactivating customer's ordering capabilities across the world, region by region, now its ransomware attack is thought to be "contained".…
Privacy campaigners pour cold water on London cops' 1,000 facial recognition arrests
Privacy activists are unimpressed with London's Metropolitan Police and its use of live facial recognition (LFR) to catch criminals, saying it is not effective use of taxpayer money and an overreach by government.…
Iranian ransomware crew reemerges, promises big bucks for attacks on US or Israel
An Iranian ransomware-as-a-service operation with ties to a government-backed cyber crew has reemerged after a nearly five-year hiatus, and is offering would-be cybercriminals cash to infect organizations in the US and Israel.…
Microsoft enjoys first Patch Tuesday of 2025 with no active exploits
For the first time this year, Microsoft has released a Patch Tuesday bundle with no exploited security problems, although one has been made public already, and there are ten critical flaws to fix.…
Massive browser hijacking campaign infects 2.3M Chrome, Edge users
A Chrome and Edge extension with more than 100,000 downloads that displays Google's verified badge does what it purports to do: It delivers a color picker to users. Unfortunately, it also hijacks every browser session, tracks activities across websites, and backdoors victims' web browsers, according to Koi Security researchers.…
The cloud-native imperative for effective cyber resilience
Partner content Every organization is investing in cyberresilience tools, training, and processes. Unfortunately, only some of them will be able to successfully respond and recover from an attack. Regardless of how hard they work, many IT and security teams are constrained by legacy technology architectures that were built for the challenges of 2015, not 2025.…
SUSE launching region-locked support for the sovereignty-conscious
Linux veteran SUSE has unveiled a new support package aimed at customers concerned about data sovereignty.…
Suspected Chinese cybersnoop grounded in Italy after US tipoff
A man who US authorities allege is a member of Chinese state-sponsored cyberespionage outfit Silk Typhoon was arrested in Milan last week following a tipoff from the US embassy.…
Is your password ecosystem ready for the regulators?
Sponsored feature It's 2025, and credential theft is a thing of the past.…
Suspected Scattered Spider domains target everyone from manufacturers to Chipotle
While the aviation industry has borne the brunt of Scattered Spider's latest round of social engineering attacks, the criminals aim to catch manufacturing and medical tech companies — and even Chipotle Mexican Grill — in tjeor web, as evidenced by hundreds of domains that security researchers say look a lot like phishing websites used by the criminal crews.…
CitrixBleed 2 exploits are on the loose as security researchers yell and wave their hands
Multiple exploits are circulating for CVE-2025-5777, a critical bug in Citrix NetScaler ADC and NetScaler Gateway dubbed CitrixBleed 2, and security analysts are warning a "significant portion" of users still haven't patched.…
Phishing platforms, infostealers blamed as identity attacks soar
A rise in advanced phishing kits and info-stealing malware are to blame for a 156 percent jump in cyberattacks targeting user logins, say researchers.…
Stalkerware firm gets scooped by SQL-slinging security snoop
Infosec In Brief A security researcher looking at samples of stalkerware discovered an SQL vulnerability that allowed him to steal a database of 62,000 user accounts. …
Ingram Micro confirms ransomware behind multi-day outage
Ingram Micro, one of the world’s largest distributors, has confirmed it is trying to restore systems following a ransomware attack.…
Massive spike in use of .es domains for phishing abuse
Cybersecurity experts are reporting a 19x increase in malicious campaigns being launched from .es domains, making it the third most common, behind only .com and .ru.…
Pages
