Hackers Using AI Agents To Validate Stolen Credit Cards
05
Feb
2025

Hackers Using AI Agents To Validate Stolen Credit Cards

Hackers have begun leveraging AI agents to validate stolen credit cards, marking a new era in the sophistication of financial…

Hackerone logo
05
Feb
2025

Welcome, Hackbots: How AI Is Shaping the Future of Vulnerability Discovery

In 2024, we saw the adoption of AI in hacking workflows take off. In a survey of over 2,000 security researchers…

Phishing
05
Feb
2025

Hackers spoof Microsoft ADFS login pages to steal credentials

A help desk phishing campaign targets an organization’s Microsoft Active Directory Federation Services (ADFS) using spoofed login pages to steal…

CISA Adds Actively Exploited Linux Kernel Vulnerability to Known Exploited Vuln Catalog
05
Feb
2025

CISA Adds Actively Exploited Linux Kernel Vulnerability to Known Exploited Vuln Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Linux kernel vulnerability, CVE-2024-53104, to its Known Exploited Vulnerabilities…

Google Cloud revenue soars as Alphabet continues to ride AI wave
05
Feb
2025

Google Cloud revenue soars as Alphabet continues to ride AI wave

Alphabet CEO Sundar Pichai has committed to continue investing in its cloud arm, as the firm’s fourth-quarter results confirmed Google…

Cryptocurrency falling
05
Feb
2025

Crypto-stealing apps found in Apple App Store for the first time

Android and iOS apps on the Google Play Store and Apple App Store contain a malicious software development kit (SDK)…

Multiple security Vulnerabilities in IBM Cloud Pak Let Attackers Execute Remote Code
05
Feb
2025

Multiple security Vulnerabilities in IBM Cloud Pak Let Attackers Execute Remote Code

IBM has released critical security updates addressing multiple vulnerabilities in its Cloud Pak for Business Automation software.  These vulnerabilities, if…

The Collapse of USAID Is Fueling Human Trafficking and Slavery at Scammer Compounds
05
Feb
2025

The Collapse of USAID Is Fueling Human Trafficking and Slavery at Scammer Compounds

“Our partners say that for some survivors they are in touch with inside the scam centers, even if they can…

CISA
05
Feb
2025

CISA tags Microsoft .NET and Apache OFBiz bugs as exploited in attacks

The US Cybersecurity & Infrastructure Security Agency (CISA) has added four vulnerabilities to its Known Exploited Vulnerabilities catalog, urging federal agencies…

Chinese Hackers Attacking Linux Devices With New SSH Backdoor
05
Feb
2025

Chinese Hackers Attacking Linux Devices With New SSH Backdoor

A new report from FortiGuard Labs reveals that Chinese hackers are actively targeting Linux devices with a sophisticated SSH backdoor…

Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
05
Feb
2025

Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)

XE Group, a cybercriminal outfit that has been active for over a decade, has been quietly exploiting zero-day vulnerabilities (CVE-2025-25181,…

Crowd-source testing helps drive Webex accessibility
05
Feb
2025

Crowd-source testing helps drive Webex accessibility

Applause, which provides digital quality and crowd-sourced testing, has worked with Cisco to ensure ongoing accessibility assessments of Webex Suite and…