Proliferation of on-premise GenAI platforms is widening security risks
04
Aug
2025

Proliferation of on-premise GenAI platforms is widening security risks

The three months to the end of May this year saw a 50% spike in the use of generative artificial…

AI is helping hackers automate and customize cyberattacks
04
Aug
2025

AI is helping hackers automate and customize cyberattacks

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

ClickTok header
04
Aug
2025

CTM360 spots Malicious ‘ClickTok’ Campaign Targeting TikTok Shop users

CTM360 has discovered a new global malware campaign dubbed “ClickTok” that spreads the SparkKitty spyware through fake TikTok shops to…

CNCERT Accuses of US Intelligence Agencies Attacking Chinese Military-Industrial Units
04
Aug
2025

CNCERT Accuses of US Intelligence Agencies Attacking Chinese Military-Industrial Units

Since mid-2022, Chinese military-industrial networks have reportedly been the target of highly sophisticated cyber intrusions attributed to US intelligence agencies….

Interlock Ransomware Uses ClickFix Exploit to Execute Malicious Commands on Windows
04
Aug
2025

Interlock Ransomware Uses ClickFix Exploit to Execute Malicious Commands on Windows

The Interlock ransomware group was connected to several sophisticated cyber incidents that targeted firms in North America and Europe, according…

Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally
04
Aug
2025

Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally

Aug 04, 2025Ravie LakshmananMalware / Browser Security Cybersecurity researchers are calling attention to a new wave of campaigns distributing a…

Nominate: Most Influential Women in UK Technology 2025
04
Aug
2025

Nominate: Most Influential Women in UK Technology 2025

Nominations are now open for the 2025 Computer Weekly list of the Most Influential Women in UK Technology. Women make…

Linux
04
Aug
2025

New Plague Linux malware stealthily maintains SSH access

A newly discovered Linux malware, which has evaded detection for over a year, allows attackers to gain persistent SSH access…

Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account
04
Aug
2025

Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account

Mozilla has issued an urgent security alert to its developer community following the detection of a sophisticated phishing campaign specifically…

Researchers Use 0-Day to Exploit Google kernelCTF and Debian 12
04
Aug
2025

Researchers Use 0-Day to Exploit Google kernelCTF and Debian 12

Security researchers have uncovered and weaponized a critical Use-After-Free vulnerability (CVE-2025-38001) in the Linux network packet scheduler’s HFSC queuing discipline,…

FUJIFILM Printers Vulnerability Let Attackers Trigger DoS Condition
04
Aug
2025

FUJIFILM Printers Vulnerability Let Attackers Trigger DoS Condition

A critical security vulnerability affecting multiple FUJIFILM printer models could allow attackers to trigger denial-of-service (DoS) conditions through malicious network…

$3.5B Stolen in Silent Breach
04
Aug
2025

$3.5B Stolen in Silent Breach

A massive cryptocurrency theft that remained hidden for over four years has been uncovered, revealing what may be the largest…