Cyber experts ponder a non-government future for the CVE program
11
Aug
2025

Cyber experts ponder a non-government future for the CVE program

Listen to the article 6 min This audio is auto-generated. Please let us know if you have feedback. LAS VEGAS…

Announcing the winners of the 2025 CyberScoop 50 awards
11
Aug
2025

Announcing the winners of the 2025 CyberScoop 50 awards

Scoop News Group is thrilled to honor the standout winners of the 2025 CyberScoop 50 Awards, recognizing the leaders who…

Hand holding a cyber key
11
Aug
2025

MuddyWater’s DarkBit ransomware cracked for free data recovery

Cybersecurity firm Profero cracked the encryption of the DarkBit ransomware gang’s encryptors, allowing them to recover a victim’s files for…

AI Coding Assistant Creating a Perfect Blueprints for Attackers
11
Aug
2025

AI Coding Assistant Creating a Perfect Blueprints for Attackers

The cybersecurity landscape faces an unprecedented threat as artificial intelligence coding assistants inadvertently transform into reconnaissance tools for malicious actors….

The Hidden Danger: Secrets Sprawl Beyond the Codebase
11
Aug
2025

The Hidden Danger: Secrets Sprawl Beyond the Codebase

GitGuardian’s 2025 State of Secrets Sprawl Report reveals an alarming expansion of credential exposure across enterprise environments, with collaboration tools…

UAC-0099 Tactics, Techniques, Procedures and Attack Methods Revealed
11
Aug
2025

UAC-0099 Tactics, Techniques, Procedures and Attack Methods Revealed

UAC-0099, a persistent threat actor active since at least 2022, has conducted sophisticated cyber-espionage operations against Ukrainian government, military, and…

Why Intel’s woes shows the fragility of the European Chips Act
11
Aug
2025

Why Intel’s woes shows the fragility of the European Chips Act

Intel has found itself on the defensive following a social media post from US president Donald Trump, who last week…

Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware
11
Aug
2025

Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware

In recent weeks, a flurry of sponsored listings promising preorders for Tesla’s anticipated Optimus robots began appearing at the top…

Meta’s New Feature Turns Instagram into a Real-Time Location Broadcaster
11
Aug
2025

Meta’s New Feature Turns Instagram into a Real-Time Location Broadcaster

Meta has introduced a transformative update to Instagram, evolving the platform from a simple photo-sharing service into an always-on real-time…

car dealership
11
Aug
2025

Online portal exposed car and personal data, allowed anyone to remotely unlock cars

A carmaker’s online dealership portal has been found leaking the private information and vehicle data of its customers. This also…

Podcast: Key hurdles in AI from proof of concept to production
11
Aug
2025

Podcast: Key hurdles in AI from proof of concept to production

One of the biggest hurdles – and key points that failure can occur – in artificial intelligence (AI) in the…

Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks
11
Aug
2025

Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks

A critical vulnerability was uncovered that transforms ordinary Linux-powered webcams into weaponized BadUSB attack tools, enabling remote hackers to inject…