ACT Education breaks seven-year Lenovo spree in device refresh
The ACT has ended its seven-year run of supplying Lenovo Chromebooks to public schools, opting instead for devices from ASUS in its latest refresh. The…
The ACT has ended its seven-year run of supplying Lenovo Chromebooks to public schools, opting instead for devices from ASUS in its latest refresh. The…
OpenAI admitted that it can be confusing for users to choose between all the different models, but the company has quietly published a document that…
The creators of StealC, a widely-used information stealer and malware downloader, have released its second major version, bringing multiple stealth and data theft enhancements. The…
Malicious Go Modules designed to wipe Linux systems Pierluigi Paganini May 04, 2025 Researchers found 3 malicious Go modules with hidden code that can download…
Claude AI, developed by Anthropic, has been exploited by malicious actors in a range of adversarial operations, most notably a financially motivated “influence-as-a-service” campaign. This…
Security Affairs newsletter Round 522 by Pierluigi Paganini – INTERNATIONAL EDITION Pierluigi Paganini May 04, 2025 A new round of the weekly SecurityAffairs newsletter arrived!…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RSAC 2025 ConferenceRSAC 2025 Conference took place at the Moscone…
As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting U.S. citizens, according to a detailed report from Seqrite Labs. Security…
Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the notorious financially motivated threat actor Golden Chickens, also known as Venom…
Global cybersecurity landscape is undergoing a significant transformation, as state-sponsored hacktivism gains traction amid ongoing conflicts. In 2024, Forescout Technologies Inc. documented 780 hacktivist attacks,…
North Korean nationals have successfully infiltrated the employee ranks of major global corporations at a scale previously underestimated, creating a pervasive threat to IT infrastructure…
Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem in April 2025. Hackers have weaponized three malicious Go modules-github[.]com/truthfulpharm/prototransform, github[.]com/blankloggia/go-mcp,…