Operators behind RansomHouse, a ransomware-as-a-service (RaaS) group, have upgraded their encryption methods from single-phase to complex and layered. The post From Linear to Complex: An Upgrade in RansomHouse Encryption appeared first on Unit 42. This article has been indexed from…
Security by Design: Why Multi-Factor Authentication Matters More Than Ever
In an era marked by escalating cyber threats and evolving risk landscapes, organisations face mounting pressure to strengthen their security posture whilst maintaining seamless user experiences. At Thales, we recognise that robust security must be foundational – embedded into products…
Adaptive Security Raises $81 Million in Series B Funding
Led by Bain Capital Ventures, the investment round brings the total raised by the company to $146.5 million. The post Adaptive Security Raises $81 Million in Series B Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
IT Security News Hourly Summary 2025-12-17 12h : 13 posts
13 posts were published in the last hour 11:2 : Lexi DiScola’s guide to global teamwork and overflowing TBRs 11:2 : Waymo Car Filmed Driving Wrong Way In Austin 11:2 : Microsoft Will Finally Kill an Encryption Cipher That Enabled…
Lexi DiScola’s guide to global teamwork and overflowing TBRs
Lexi DiScola shares how her unconventional path led her to global cyber threat analysis and highlights the power of diverse backgrounds on an international team This article has been indexed from Cisco Talos Blog Read the original article: Lexi DiScola’s…
Waymo Car Filmed Driving Wrong Way In Austin
Autonomous car from Google sister company Waymo filmed driving wrong way on one-way road in Austin, amid ongoing school bus incidents This article has been indexed from Silicon UK Read the original article: Waymo Car Filmed Driving Wrong Way In…
Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks
The weak RC4 for administrative authentication has been a hacker holy grail for decades. This article has been indexed from Security Latest Read the original article: Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks
GhostPoster Firefox Extensions Hide Malware in Icons
The malware hijacks purchase commissions, tracks users, removes security headers, injects hidden iframes, and bypasses CAPTCHA. The post GhostPoster Firefox Extensions Hide Malware in Icons appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
US Autoparts Maker LKQ Confirms Oracle EBS Breach
LKQ confirmed that over 9000 individuals saw their personal data compromised because of the breach This article has been indexed from www.infosecurity-magazine.com Read the original article: US Autoparts Maker LKQ Confirms Oracle EBS Breach
App Developers Urge EU To Act On Apple Fees
App developer group says it remains disadvantaged by Apple fees six months after they were found to breach EU laws This article has been indexed from Silicon UK Read the original article: App Developers Urge EU To Act On Apple…
Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports
Kaspersky’s GReAT experts have uncovered a new wave of cyberattacks by the ForumTroll APT group, targeting Russian political scientists and delivering the Tuoni framework to their devices. This article has been indexed from Securelist Read the original article: Operation ForumTroll…
New GhostPoster Attack Leverages PNG Icon to Infect 50,000+ Firefox Users
A sophisticated new malware campaign dubbed “GhostPoster” has been uncovered, leveraging a clever steganography technique to compromise approximately 50,000 Firefox users. The attack vector primarily involves seemingly innocent browser extensions, such as “Free VPN Forever,” which conceal malicious payloads within…
NVIDIA Isaac Lab Vulnerability Let Attackers Execute Malicious Code
A critical security update addressing a dangerous deserialization vulnerability in NVIDIA Isaac Lab, a component of the NVIDIA Isaac Sim framework. The flaw could allow attackers to execute arbitrary code on affected systems, prompting the company to take immediate action.…
Cellik Android Malware with One-Click APK Builder Let Attackers Wrap its Payload Inside with Google Play Store Apps
Cellik represents a significant evolution in Android Remote Access Trojan capabilities, introducing sophisticated device control and surveillance features previously reserved for advanced spyware. This newly identified RAT combines full device takeover with an integrated Google Play Store connection, allowing attackers…
Chrome Zero-Day Vulnerabilities Exploited in 2025 – A Comprehensive Analysis
Throughout 2025, Google patched an unprecedented wave of actively exploited zero-day vulnerabilities affecting its Chrome browser, patching a total of eight critical flaws that threatened billions of users worldwide. These vulnerabilities, all classified as high severity with CVSS scores averaging…
England keeping pen and paper exams despite limited digital expansion
Regulator proposes strict limits on screen-based testing, cites infrastructure concerns and lack of evidence for benefits Most students taking school and college GCSE, A-level, and AS-level exams in England will continue to use pen and paper, according to proposals from…
European Investigators Disrupt $12m Call Center Fraud Ring
Eurojust reveals new policing operation which helped to smash a Ukraine-based call center fraud gang This article has been indexed from www.infosecurity-magazine.com Read the original article: European Investigators Disrupt $12m Call Center Fraud Ring
Waymo Said To Raise Funds At Valuation Of Around $100bn
Waymo reportedly in talks to raise more than $15bn from parent Alphabet and external investors, as it pushes aggressive expansion This article has been indexed from Silicon UK Read the original article: Waymo Said To Raise Funds At Valuation Of…
ESET Threat Report H2 2025
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts This article has been indexed from WeLiveSecurity Read the original article: ESET Threat Report H2 2025
GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads
A new campaign named GhostPoster has leveraged logo files associated with 17 Mozilla Firefox browser add-ons to embed malicious JavaScript code designed to hijack affiliate links, inject tracking code, and commit click and ad fraud. The extensions have been collectively…
Alternative Apps Surge After Australia Social Media Ban
Downloads jump for lower-profile apps such as ByteDance’s Lemon8 and Yope after Australia bans social media for under-16s This article has been indexed from Silicon UK Read the original article: Alternative Apps Surge After Australia Social Media Ban
Auto Parts Giant LKQ Confirms Oracle EBS Breach
LKQ said the personal information of thousands of individuals was compromised as a result of the hacker attack. The post Auto Parts Giant LKQ Confirms Oracle EBS Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Chinese Ink Dragon Group Hides in European Government Networks
China’s Ink Dragon is using European government networks to hide its espionage activity This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Ink Dragon Group Hides in European Government Networks
The Hidden Cyber Risks of BYOD: Why Conventional Defences Aren’t Enough
BYOD boosts flexibility and savings, but hidden mobile cyber risks expose organisations to breaches, compliance failures and national security threats. This article has been indexed from Silicon UK Read the original article: The Hidden Cyber Risks of BYOD: Why Conventional…