4 posts were published in the last hour 7:36 : Tor Browser 15.0.1 Update Patches Several High-Risk Security Flaws 7:36 : Chrome Patches High-severity Implementation Vulnerability in V8 JavaScript engine 7:36 : New Google Study Reveals Threat Protection Against Text…
Tor Browser 15.0.1 Update Patches Several High-Risk Security Flaws
The Tor Project has released a fresh update for its privacy-focused web browser. Tor Browser 15.0.1 is now available and addresses several high-risk security issues that could have compromised users’ privacy. This update is recommended for all users who want…
Chrome Patches High-severity Implementation Vulnerability in V8 JavaScript engine
Google has released Chrome version 142.0.7444.162/.163 to address a high-severity security vulnerability in the V8 JavaScript engine. The stable channel update is now rolling out across Windows, Mac, and Linux platforms over the coming days and weeks. The security fix…
New Google Study Reveals Threat Protection Against Text Scams
As Cybersecurity Awareness Month comes to an end, we’re concentrating on mobile scams, one of the most prevalent digital threats of our day. Over $400 billion in funds have been stolen globally in the past 12 months as a result…
University of Pennsylvania Hit by Hackers: Fake Emails, Data Leak Threats, and Political Backlash
The University of Pennsylvania is investigating a cybersecurity incident after unknown hackers gained access to internal email accounts and sent thousands of misleading messages to students, alumni, and staff on Friday morning. The fraudulent emails, which appeared to come…
Google regulation by the CMA in the UK
Google may soon be forced to make significant changes to its search engine in the UK, following regulatory action by the UK’s Competition and Markets… The post Google regulation by the CMA in the UK appeared first on Panda Security…
New Phishing Scam Targets iPhone Owners After Device Loss
Losing an iPhone is stressful enough without becoming the target of sophisticated scammers. A new phishing campaign is exploiting device owners’ distress by impersonating Apple and claiming that their lost iPhones have been recovered. These attacks combine social engineering with…
The Future of AI in Security: From Reactive to Proactive Protection
Explore how AI is transforming cybersecurity from reactive threat response to proactive, predictive protection — while addressing ethics, privacy, and the human-AI balance. The post The Future of AI in Security: From Reactive to Proactive Protection appeared first on Security…
Bringing AI to the SOC is not Intended to Replace Humans
Learn how to transform your traditional SOC into an AI-powered security hub with multi-agent collaboration, contextual intelligence, and business risk–driven insights. The post Bringing AI to the SOC is not Intended to Replace Humans appeared first on Security Boulevard. This…
When every day is threat assessment day
In this Help Net Security interview, Paul J. Mocarski, VP & CISO at Sammons Financial Group, discusses how insurance carriers are adapting their cybersecurity strategies. He explains how ongoing threat assessments, AI-driven automation, and third-party risk management help maintain readiness.…
Lite XL Vulnerability Allows Attackers to Execute Arbitrary Code
Lite XL, a lightweight text editor written in Lua and C that runs on Windows, Linux, and macOS, has been found to contain a high vulnerability that could enable arbitrary code execution. Security researchers have identified flaws in how the…
Microsoft Patch Tuesday security updates for November 2025 fixed an actively exploited Windows Kernel bug
Microsoft fixed over 60 flaws, including an actively exploited Windows kernel zero-day, in its latest Patch Tuesday updates. Microsoft’s Patch Tuesday security updates for November 2025 addressed 63 vulnerabilities impacting Windows and Windows Components, Office and Office Components, Microsoft Edge…
ProxyBridge: Open-source proxy routing for Windows applications
ProxyBridge is a lightweight, open-source tool that lets Windows users route network traffic from specific applications through SOCKS5 or HTTP proxies. It can redirect both TCP and UDP traffic and gives users the option to route, block, or allow connections…
Autonomous AI could challenge how we define criminal behavior
Whether we ever build AI that thinks like a person is still uncertain. What seems more realistic is a future with more independent machines. These systems already work across many industries and digital environments. Alongside human-to-human and human-to-machine contact, communication…
Phishing Attack Impersonates Travel Brands Using 4,300 Malicious Domains
A Russian-speaking threat actor has orchestrated an extensive phishing campaign that has registered over 4,300 malicious domains targeting travelers since the beginning of 2025. The sophisticated operation customizes phishing pages to impersonate legitimate travel industry giants including Airbnb, Booking.com, Expedia,…
Ferocious Kitten APT Deploying MarkiRAT to Capture Keystroke and Clipboard Logging
Ferocious Kitten has emerged as a significant cyber-espionage threat targeting Persian-speaking individuals within Iran since at least 2015. The Iranian-linked advanced persistent threat group operates with a highly focused objective, utilizing politically themed decoy documents to manipulate victims into executing…
AI is forcing boards to rethink how they govern security
Boards are spending more time on cybersecurity but still struggle to show how investments improve business performance. The focus has shifted from whether to fund protection to how to measure its return and ensure it supports growth. AI, automation, and…
Shadow AI risk: Navigating the growing threat of ungoverned AI adoption
AI is transforming how businesses operate, but it’s also creating new, often hidden risks. As employees and business units eagerly embrace and experiment with AI solutions, many organizations are losing control over where and how AI is being used. A…
Industrial Phishing Kit QRR Discovered: New Cyber Threats Unveiled | Cybersecurity Today
In this episode of Cybersecurity Today, host David Shipley covers the latest threats in the cybersecurity landscape. Highlights include the emergence of the quantum root redirect (QRR) phishing kit, a sophisticated automated phishing platform targeting Microsoft 365 credentials across 90…
Windows Kernel 0-Day Under Active Exploitation for Privilege Escalation
Microsoft has disclosed a critical Windows Kernel vulnerability that is currently under active exploitation in the wild. Tracked as CVE-2025-62215, the flaw enables attackers to escalate privileges and gain elevated access on vulnerable Windows systems. Attribute Details CVE ID CVE-2025-62215…
What the latest data reveals about hard drive reliability
What really counts as a hard drive failure? That’s the question at the center of Backblaze’s Q3 2025 Drive Stats report, which tracks the performance of 328,348 hard drives across its global data centers. The latest findings build on more…
IT Security News Hourly Summary 2025-11-12 06h : 4 posts
4 posts were published in the last hour 5:4 : Chinese National Sentenced for Laundering Over £5 Billion from 128,000 Victims 5:4 : Mozilla Issues Urgent Firefox Update to Patch Critical Code Execution Flaws 5:4 : China hates crypto and…
Chinese National Sentenced for Laundering Over £5 Billion from 128,000 Victims
A landmark Metropolitan Police investigation has concluded with the sentencing of two individuals involved in one of the world’s largest cryptocurrency seizures, which recovered over 61,000 Bitcoin, worth approximately £5 billion, from a sophisticated international fraud operation. A seven-year investigation…
Mozilla Issues Urgent Firefox Update to Patch Critical Code Execution Flaws
The Mozilla Foundation released three critical security advisories on November 11, 2025, addressing 16 unique vulnerabilities across multiple Firefox versions and platforms. The updates target Firefox 145, Firefox ESR 115.30, and Firefox ESR 140.5, with 12 vulnerabilities rated High impact and an…