Showing 30 of 30 articles from 4 sources • Last updated
Krebs on Security krebsonsecurity.com

Canada Fines Cybercrime Friendly Cryptomus $176M

NEW

Financial regulators in Canada this week levied $176 million in fines against Cryptomus, a digital payments platform that supports dozens of Russian cryptocurrency exchanges and websites hawking cyber...

Bleeping Computer bleepingcomputer.com

TARmageddon flaw in abandoned Rust library enables RCE attacks

NEW

A high-severity vulnerability in the now-abandoned async-tar Rust library and its forks can be exploited to gain remote code execution on systems running unpatched software. [...]...

Bleeping Computer bleepingcomputer.com

FinWise data breach shows why encryption is your last defense

NEW

The FinWise breach shows that when insider threats strike, encryption is the last line of defense. Penta Security's D.AMO platform unites encryption, key management, and access control to keep sensiti...

Dark Reading darkreading.com

Russia Pivots, Cracks Down on Resident Hackers

NEW

Thanks to improving cybersecurity and law enforcement action from the West, Russia's government is reevaluating which cybercriminals it wants to give safe haven from the law....

Bleeping Computer bleepingcomputer.com

PhantomCaptcha ClickFix attack targets Ukraine war relief orgs

NEW

A spearphishing attack that lasted a single day targeted members of the Ukrainian regional government administration and organizations critical for the war relief effort in Ukraine, including the Inte...

The Hacker News thehackernews.com

Bridging the Remediation Gap: Introducing Pentera Resolve

NEW

From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed cloud asset. Within hours, five different tools alert you about it: your vulnerability scanner, ...

Bleeping Computer bleepingcomputer.com

Sharepoint ToolShell attacks targeted orgs across four continents

NEW

Hackers believed to be associated with China have leveraged the ToolShell vulnerability (CVE-2025-53770) in Microsoft SharePoint in attacks targeting government agencies, universities, telecommunicati...

Dark Reading darkreading.com

Verizon: Mobile Blindspot Leads to Needless Data Breaches

NEW

People habitually ignore cybersecurity on their phones. Instead of compensating for that, organizations are falling into the very same trap, even though available security options could cut smishing s...

The Hacker News thehackernews.com

Why You Should Swap Passwords for Passphrases

NEW

The advice didn't change for decades: use complex passwords with uppercase, lowercase, numbers, and symbols. The idea is to make passwords harder for hackers to crack via brute force methods. But more...

Bleeping Computer bleepingcomputer.com

Vidar Stealer 2.0 adds multi-threaded data theft, better evasion

NEW

The operators of Vidar Stealer, one of the most successful malware-as-a-service (MaaS) operations of the past decade, have released a new major version to reflect massive improvements in the malware. ...

Dark Reading darkreading.com

Electronic Warfare Puts Commercial GPS Users on Notice

NEW

Interference with the global positioning system (GPS) isn't just a problem for airlines, but for shipping, trucking, car navigation, agriculture, and even the financial sector....

Bleeping Computer bleepingcomputer.com

Cursor, Windsurf IDEs riddled with 94+ n-day Chromium vulnerabilities

NEW

The latest releases of Cursor and Windsurf integrated development environments are vulnerable to more than 94 known and patched security issues in the Chromium browser and the V8 JavaScript engine. [....

Bleeping Computer bleepingcomputer.com

Russian hackers evolve malware pushed in "I am not a robot" captchas

The Russian state-backed Star Blizzard hacker group has ramped up operations with new, constantly evolving malware families (NoRobot, MaybeRobot) deployed in complex delivery chains that start with Cl...

Bleeping Computer bleepingcomputer.com

Maximizing gateway security: Beyond the basic configuration

Gateways can do more than route traffic, they can also strengthen your entire security posture. Learn how NordLayer combines ZTNA, firewalls, and private gateways to secure hybrid teams and keep netwo...