WarLock Ransomware group Claims Breach at Colt Telecom and Hitachi
18
Aug
2025

WarLock Ransomware group Claims Breach at Colt Telecom and Hitachi

WarLock ransomware claims breach at Colt and Hitachi, with Colt investigating and working to restore systems while experts review the…

Cybersecurity crime losses in Hong Kong up 15% year on year in first half of 2025
18
Aug
2025

Cybersecurity crime losses in Hong Kong up 15% year on year in first half of 2025

Financial losses through cybersecurity crimes in Hong Kong hit HK$3.04 billion (US$387.3 million) in the first half of 2025, marking…

What is Use-After-Free Vulnerability? - Impact and Mitigation
18
Aug
2025

What is Use-After-Free Vulnerability? – Impact and Mitigation

Use-after-free (UAF) vulnerabilities represent one of the most critical and prevalent security threats in modern software systems, particularly affecting applications…

New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards
18
Aug
2025

New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards

Chinese-speaking cybercriminals are using ghost-tapping techniques to take advantage of Near Field Communication (NFC) relay tactics in a sophisticated evolution…

Wazuh for Regulatory Compliance
18
Aug
2025

Wazuh for Regulatory Compliance

Aug 18, 2025The Hacker NewsData Breach / Regulatory Compliance Organizations handling various forms of sensitive data or personally identifiable information…

Here’s what could happen if CISA 2015 expires next month
18
Aug
2025

Here’s what could happen if CISA 2015 expires next month

Expiration of a 2015 law at the end of September could dramatically reduce cyber threat information sharing within industry, as…

People walk past an Nvidia display advertisement in Taipei during the Computex 2025 trade show on May 19, 2025. Photo: AFP
18
Aug
2025

Chinese semiconductor, AI firms form pact as Nvidia faces inquiry on H20 chip’s security

The alliance reflected the growing efforts in the country’s semiconductor industry and nascent AI sector to push forward Beijing’s tech…

Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code
18
Aug
2025

Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been discovered in Rockwell Automation’s ControlLogix Ethernet communication modules, potentially allowing remote attackers to execute…

North Korean Hackers’ Secret Linux Malware Surfaces Online
18
Aug
2025

North Korean Hackers’ Secret Linux Malware Surfaces Online

Phrack Magazine’s latest issue #72 has unveiled a significant data leak from a suspected North Korean hacking operation, including exploit…

Card Payments, Credit Card Fraud, ACCC, AES Encryption
18
Aug
2025

Australia To Roll-Out Encryption Upgrade For Card Payments

In a forward-looking proposal introduced last week, the Australian Competition and Consumer Commission (ACCC) has invited public submissions on a…

By gutting its cyber staff, State Department ignores congressional directives
18
Aug
2025

By gutting its cyber staff, State Department ignores congressional directives

The State Department has demonstrated it does not understand that cyber power is critical to geopolitical power. In the course…

‘How can we trust you?’: China’s state media calls on Nvidia to prove safety of H20 chip
18
Aug
2025

‘How can we trust you?’: China’s state media calls on Nvidia to prove safety of H20 chip

The article, entitled “How can we trust you, Nvidia”, called on the US company to “comply with requests and provide…