Using AI to find web app vulnerabilities: hacking expert John Hammond takes Burp AI for a spin | Blog
30
Apr
2025

Using AI to find web app vulnerabilities: hacking expert John Hammond takes Burp AI for a spin | Blog

Amelia Coen | 30 April 2025 at 13:23 UTC 1000s of pentesters are currently using Burp AI features to hack…

Ascension
30
Apr
2025

Ascension discloses new data breach after third-party hacking incident

​Ascension, one of the largest private healthcare systems in the United States, is notifying patients that their personal and health…

Researchers Uncovered RansomHub operation and it's Relation With Qilin ransomware
30
Apr
2025

Researchers Uncovered RansomHub operation and it’s Relation With Qilin ransomware

Security researchers have identified significant connections between two major ransomware-as-a-service (RaaS) operations, with evidence suggesting affiliates from the recently-disabled RansomHub…

UK Retail Giant Co-op Shuts Down IT Systems After Cyberattack Attempt
30
Apr
2025

UK Retail Giant Co-op Shuts Down IT Systems After Cyberattack Attempt

The Co-operative Group has confirmed it shut down parts of its IT network after detecting an attempted cyberattack, in what…

Airplay-enabled devices open to attack via "AirBorne" vulnerabilities
30
Apr
2025

Airplay-enabled devices open to attack via “AirBorne” vulnerabilities

Vulnerabilities in Apple’s AirPlay Protocol, AirPlay Software Development Kits (SDKs), and the CarPlay Communication Plug-in could allow attackers to compromise…

Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool
30
Apr
2025

Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool

Apr 30, 2025Ravie LakshmananMalware / DNS Security A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to…

New WordPress Malware Disguised as Anti-Malware Plugin Takes Full Control of Websites
30
Apr
2025

New WordPress Malware Disguised as Anti-Malware Plugin Takes Full Control of Websites

The Wordfence Threat Intelligence team has identified a new strain of WordPress malware that masquerades as a legitimate plugin, often…

Google Introduces Agentic AI to Combat Cybersecurity Threats
30
Apr
2025

Google Introduces Agentic AI to Combat Cybersecurity Threats

Google enhances cybersecurity with Agentic AI, launching Unified Security to fight zero-day exploits, enterprise threats, and credential-based attacks. Google’s Threat…

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats
30
Apr
2025

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

Apr 30, 2025The Hacker News How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore….

Firefox 138 Launches with Patches for Several High-Severity Flaws
30
Apr
2025

Firefox 138 Launches with Patches for Several High-Severity Flaws

Mozilla has officially released Firefox 138, marking a significant update focused on user security. The new version addresses multiple high-severity…

China Hackers Used Trojanized UyghurEditPP App to Target Uyghur Activists
30
Apr
2025

China Hackers Used Trojanized UyghurEditPP App to Target Uyghur Activists

China-linked hackers targeted Uyghur activists using a Trojanized UyghurEditPP app in a spear-phishing campaign, Citizen Lab researchers reveal. Citizen Lab…

Property renters targeted in simple BEC scam
30
Apr
2025

Property renters targeted in simple BEC scam

Emails purportedly sent by rental property management firms are being used to steal money from people in France and Canada,…