Category: securityweek

AI Hallucinations Create a New Software Supply Chain Threat

Researchers uncover new software supply chain threat from LLM-generated package hallucinations. The post AI Hallucinations Create a New Software Supply Chain Threat appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: AI Hallucinations Create…

Malicious NPM Packages Target Cryptocurrency, PayPal Users

Threat actors are publishing malicious NPM packages to steal PayPal credentials and hijack cryptocurrency transfers. The post Malicious NPM Packages Target Cryptocurrency, PayPal Users appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Malicious…

Hackers Breach Morocco’s Social Security Database

The hackers who posted the documents on Telegram said the attack was in response to alleged Moroccan “harassment” of Algeria on social media platforms. The post Hackers Breach Morocco’s Social Security Database appeared first on SecurityWeek. This article has been…

SonicWall Patches High-Severity Vulnerability in NetExtender

SonicWall has released fixes for three vulnerabilities in NetExtender for Windows, including a high-severity bug. The post SonicWall Patches High-Severity Vulnerability in NetExtender appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: SonicWall Patches…

Europol Targets Customers of Smokeloader Pay-Per-Install Botnet

Law enforcement agencies in multiple countries have announced the arrests of users of the malicious Smokeloader botnet. The post Europol Targets Customers of Smokeloader Pay-Per-Install Botnet appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Juniper Networks Patches Dozens of Junos Vulnerabilities

Juniper Networks has patched two dozen vulnerabilities in Junos OS and Junos OS Evolved, and dozens of flaws in Junos Space third-party dependencies. The post Juniper Networks Patches Dozens of Junos Vulnerabilities appeared first on SecurityWeek. This article has been…

GitHub Announces General Availability of Security Campaigns

GitHub security campaigns make it easier for developers and security teams to collaborate on fixing vulnerabilities in their applications. The post GitHub Announces General Availability of Security Campaigns appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Nissan Leaf Hacked for Remote Spying, Physical Takeover

Researchers find vulnerabilities that can be exploited to remotely take control of a Nissan Leaf’s functions, including physical controls. The post Nissan Leaf Hacked for Remote Spying, Physical Takeover appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

‘AkiraBot’ Spammed 80,000 Websites With AI-Generated Messages

CAPTCHA-evading Python framework AkiraBot has spammed over 80,000 websites with AI-generated spam messages. The post ‘AkiraBot’ Spammed 80,000 Websites With AI-Generated Messages appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: ‘AkiraBot’ Spammed 80,000…

Vulnerabilities Patched by Ivanti, VMware, Zoom

Ivanti, VMware, and Zoom released fixes for dozens of vulnerabilities in their products on April 2025 Patch Tuesday. The post Vulnerabilities Patched by Ivanti, VMware, Zoom  appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Fortinet Patches Critical FortiSwitch Vulnerability

Fortinet fixes a critical-severity bug in FortiSwitch that could allow an attacker to modify administrative passwords. The post Fortinet Patches Critical FortiSwitch Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Fortinet Patches…

Adobe Calls Urgent Attention to Critical ColdFusion Flaws

The Adobe Patch Tuesday rollout covers 54 vulnerabilities, including code execution issues in the oft-targeted Adobe ColdFusion software. The post Adobe Calls Urgent Attention to Critical ColdFusion Flaws appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Octane Raises $6.75M for Smart Contract Security Tech

San Francisco smart contract security startup closes a $6.75 million seed funding round led by Archetype and Winklevoss Capital. The post Octane Raises $6.75M for Smart Contract Security Tech appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

SAP Patches Critical Code Injection Vulnerabilities

SAP released 20 security notes on April 2025 patch day, including three addressing critical code injection and authentication bypass flaws. The post SAP Patches Critical Code Injection Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

ESET Vulnerability Exploited for Stealthy Malware Execution

A sophisticated APT tracked as ToddyCat has exploited an ESET DLL search order hijacking vulnerability for malware delivery. The post ESET Vulnerability Exploited for Stealthy Malware Execution appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Android Update Patches Two Exploited Vulnerabilities

Android’s latest security update resolves two exploited Kernel vulnerabilities, as well as critical-severity bugs. The post Android Update Patches Two Exploited Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Android Update Patches…

Google Pushing ‘Sec-Gemini’ AI Model for Threat-Intel Workflows

Experimental Sec-Gemini v1 touts a combination of Google’s Gemini LLM capabilities with real-time security data and tooling from Mandiant. The post Google Pushing ‘Sec-Gemini’ AI Model for Threat-Intel Workflows appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

CRM, Bulk Email Providers Targeted in Crypto Phishing Campaign

‘PoisonSeed’ phishing campaign targets CRM and bulk email providers to distribute “crypto seed phrase” messages. The post CRM, Bulk Email Providers Targeted in Crypto Phishing Campaign appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Suspected Scattered Spider Hacker Pleads Guilty

A 20-year-old arrested last year and charged alongside others believed to be members of Scattered Spider has pleaded guilty. The post Suspected Scattered Spider Hacker Pleads Guilty appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Call Records of Millions Exposed by Verizon App Vulnerability

A patch has been released for a serious information disclosure vulnerability affecting a Verizon call filtering application. The post Call Records of Millions Exposed by Verizon App Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Oracle Confirms Cloud Hack

Oracle has confirmed suffering a data breach but the tech giant is apparently trying to downplay the impact of the incident. The post Oracle Confirms Cloud Hack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Chinese APT Pounces on Misdiagnosed RCE in Ivanti VPN Appliances

Ivanti misdiagnoses a remote code execution vulnerability and Mandiant reports that Chinese hackers are launching in-the-wild exploits. The post Chinese APT Pounces on Misdiagnosed RCE in Ivanti VPN Appliances  appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Hunters International Ransomware Gang Rebranding, Shifting Focus

The notorious cybercrime group Hunters International is dropping ransomware to focus on data theft and extortion. The post Hunters International Ransomware Gang Rebranding, Shifting Focus appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Cybersecurity M&A Roundup: 23 Deals Announced in March 2025

Less than two dozen cybersecurity merger and acquisition (M&A) deals were announced in March 2025. The post Cybersecurity M&A Roundup: 23 Deals Announced in March 2025 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

39 Million Secrets Leaked on GitHub in 2024

GitHub has announced new capabilities to help organizations and developers keep secrets in their code protected. The post 39 Million Secrets Leaked on GitHub in 2024 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Vulnerabilities Expose Jan AI Systems to Remote Manipulation

Vulnerabilities in open source ChatGPT alternative Jan AI expose systems to remote, unauthenticated manipulation. The post Vulnerabilities Expose Jan AI Systems to Remote Manipulation appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Vulnerabilities…

AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor

The rise of zero-knowledge threat actors powered by AI marks a turning point in the business of cybercrime where sophisticated attacks are no longer confined to skilled attackers. The post AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor appeared first…

North Korea’s IT Operatives Are Exploiting Remote Work Globally

The global rise of North Korean IT worker infiltration poses a serious cybersecurity risk—using fake identities, remote access, and extortion to compromise organizations. The post North Korea’s IT Operatives Are Exploiting Remote Work Globally appeared first on SecurityWeek. This article…

Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks

North Korea’s Lazarus hackers are using the ClickFix technique for malware deployment in fresh attacks targeting the cryptocurrency ecosystem. The post Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks appeared first on SecurityWeek. This article has been indexed from…

Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities

Chrome 135 and Firefox 137 were released on Tuesday with fixes for several high-severity memory safety vulnerabilities. The post Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Microsoft Using AI to Uncover Critical Bootloader Vulnerabilities

Using the Security Copilot tool, Microsoft discovered 20 critical vulnerabilities in widely deployed open-source bootloaders. The post Microsoft Using AI to Uncover Critical Bootloader Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Ransomware Group Takes Credit for National Presto Industries Attack

A ransomware group has claimed responsibility for a March cyberattack on National Presto Industries subsidiary National Defense Corporation. The post Ransomware Group Takes Credit for National Presto Industries Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Critical Vulnerability Found in Canon Printer Drivers

Microsoft’s offensive security team warned Canon about a critical code execution vulnerability in printer drivers.  The post Critical Vulnerability Found in Canon Printer Drivers appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Critical…

Check Point Responds to Hacking Claims

Check Point has responded to a hacker’s claims of sensitive data theft, confirming an incident but saying that it had limited impact. The post Check Point Responds to Hacking Claims appeared first on SecurityWeek. This article has been indexed from…

Apple Patches Recent Zero-Days in Older iPhones

Apple has released a hefty round of security updates for its desktop and mobile products, patching two recent zero-days in older iPhone models. The post Apple Patches Recent Zero-Days in Older iPhones appeared first on SecurityWeek. This article has been…

Hacker Leaks Samsung Customer Data

Hacker leaks 270,000 customer tickets allegedly stolen from Samsung Germany using long-compromised credentials. The post Hacker Leaks Samsung Customer Data appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Hacker Leaks Samsung Customer Data

9-Year-Old NPM Crypto Package Hijacked for Information Theft

Nearly a dozen crypto packages on NPM, including one published 9 years ago, have been hijacked to deliver infostealers. The post 9-Year-Old NPM Crypto Package Hijacked for Information Theft appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

New Issuance Requirements Improve HTTPS Certificate Validation

HTTPS certificate issuance now requires Multi-Perspective Issuance Corroboration and linting to improve validation. The post New Issuance Requirements Improve HTTPS Certificate Validation appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: New Issuance Requirements…

Morphing Meerkat Phishing Kits Target Over 100 Brands

A threat actor tracked as Morphing Meerkat abuses DNS mail exchange (MX) records to deliver spoofed login pages. The post Morphing Meerkat Phishing Kits Target Over 100 Brands appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Splunk Patches Dozens of Vulnerabilities

Splunk patches high-severity remote code execution and information disclosure flaws in Splunk Enterprise and Secure Gateway App. The post Splunk Patches Dozens of Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Splunk…

Russian Espionage Group Using Ransomware in Attacks

Russian-speaking espionage group RedCurl has been deploying ransomware on victims’ networks in a recent campaign. The post Russian Espionage Group Using Ransomware in Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Russian…

The Importance of Allyship for Women in Cyber

Interview with Taylor Pyle, a Cybersecurity Engineer at Viasat on her experience with both cyber and mentorship. The post The Importance of Allyship for Women in Cyber appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

The Importance of Allyship For Women in Cyber

Interview with Taylor Pyle, a Cybersecurity Engineer at Viasat on her experience with both cyber and mentorship. The post The Importance of Allyship For Women in Cyber appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

GetReal Security Raises $17.5 Million to Tackle Gen-AI Threats

GetReal Security has raised $17.5 million in series A funding to combat deepfakes, impersonation, and other AI-generated threats. The post GetReal Security Raises $17.5 Million to Tackle Gen-AI Threats appeared first on SecurityWeek. This article has been indexed from SecurityWeek…