Crypto bitcoin hacker
19
Aug
2025

Nebraska man gets 1 year in prison for $3.5M cryptojacking scheme

A Nebraska man was sentenced to one year in prison for defrauding cloud computing providers of over $3.5 million to…

New ClickFix Attack Uses Fake BBC News Page and Fraudulent Cloudflare Verification to Trick Users
19
Aug
2025

New ClickFix Attack Uses Fake BBC News Page and Fraudulent Cloudflare Verification to Trick Users

A sophisticated new cyberthreat campaign has emerged that combines impersonation of trusted news sources with deceptive security verification prompts to…

Lockbit Linux ESXi Ransomware Variant Reveals Evasion Techniques and File Encryption Process
19
Aug
2025

Lockbit Linux ESXi Ransomware Variant Reveals Evasion Techniques and File Encryption Process

A recent reverse engineering analysis of a Lockbit ransomware variant targeting Linux-based ESXi servers has uncovered several sophisticated evasion techniques…

Tick-box approach to cybersecurity falls short, warns Spirit CTO
19
Aug
2025

Tick-box approach to cybersecurity falls short, warns Spirit CTO

A tick-box approach to cybersecurity falls short amid today’s threats and rising operational complexity, Spirit Group chief technology and information…

Opinion | As Hong Kong is learning, a deepfake crime epidemic is upon us
19
Aug
2025

Opinion | As Hong Kong is learning, a deepfake crime epidemic is upon us

It all started with a routine-looking link from a securities firm. Customers who clicked on it found their trading accounts…

US disrupts North Korean IT worker
19
Aug
2025

XenoRAT malware campaign hits multiple embassies in South Korea

A state-sponsored espionage campaign is targeting foreign embassies in South Korea to deploy XenoRAT malware from malicious GitHub repositories. According to Trellix…

PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware
19
Aug
2025

PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware

A sophisticated malware campaign has been identified, utilizing PipeMagic, a highly modular backdoor deployed by the financially motivated threat actor…

PipeMagic Malware Imitates ChatGPT App to Exploit Windows Vulnerability and Deploy Ransomware
19
Aug
2025

PipeMagic Malware Imitates ChatGPT App to Exploit Windows Vulnerability and Deploy Ransomware

The PipeMagic malware, which is credited to the financially motivated threat actor Storm-2460, is a remarkable illustration of how cyber…

Expired-Domain Emails
19
Aug
2025

PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks

Aug 19, 2025Ravie LakshmananSupply Chain Security The maintainers of the Python Package Index (PyPI) repository have announced that the package…

AI exposing pre-existing risks, warns Flame Tree Cyber's Kat McCrabb
19
Aug
2025

AI exposing pre-existing risks, warns Flame Tree Cyber’s Kat McCrabb

With AI use by organisations in Australia compounding privacy, legal and other risks, iTnews’ sister publication techpartner.news invited opinions from…

U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog
19
Aug
2025

U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini August 19, 2025 U.S. Cybersecurity…

US targets North Korean fake IT worker scheme with China and Russia links
19
Aug
2025

US targets North Korean fake IT worker scheme with China and Russia links

The US has slapped sanctions on individuals and companies linked to a scheme that involves recruiting North Koreans to pose…