House lawmakers take aim at education requirements for federal cyber jobs
21
Aug
2025

House lawmakers take aim at education requirements for federal cyber jobs

The top lawmakers on a key House cybersecurity panel are hoping to remove a barrier to entry for cyber jobs…

Threat Actors Exploiting Victims’ Machines for Bandwidth Monetization
21
Aug
2025

Threat Actors Exploiting Victims’ Machines for Bandwidth Monetization

Cybersecurity researchers have uncovered an ongoing campaign where threat actors exploit the critical CVE-2024-36401 vulnerability in GeoServer, a geospatial database,…

Moscow exploiting seven-year-old Cisco flaw, says FBI
21
Aug
2025

Moscow exploiting seven-year-old Cisco flaw, says FBI

Threat actors linked to the Russian government are falling back on a seven-year-old vulnerability in Cisco equipment that was first…

AI browsers fall for scams and phishing, security researchers say
21
Aug
2025

AI browsers fall for scams and phishing, security researchers say

Agentic artificial intelligence (AI) web browsers that can act autonomously on users’ behalf appear to be extremely gullible and unsafe…

Hackers Weaponize QR Codes With Malicious Links to Steal Sensitive Data
21
Aug
2025

Hackers Weaponize QR Codes With Malicious Links to Steal Sensitive Data

Quishing, a powerful form of phishing that uses malicious hyperlinks contained in QR codes to expose user credentials and sensitive…

Scale of MoD Afghan data breaches widens dramatically
21
Aug
2025

Scale of MoD Afghan data breaches widens dramatically

The Ministry of Defence (MoD) has admitted there have been more than 12 times as many data breaches linked to…

The Chinese national flag flies outside the Ministry of Foreign Affairs in Beijing on July 26, 2023. (Photo by GREG BAKER/AFP via Getty Images)
21
Aug
2025

CrowdStrike warns of uptick in Silk Typhoon attacks this summer

The Chinese state-backed threat group Silk Typhoon has raised the pace of attacks targeting government, technology, legal and professional services…

Kali Vagrant Rebuilt Released - Pre-configured DebOS VMs via Command Line
21
Aug
2025

Kali Vagrant Rebuilt Released – Pre-configured DebOS VMs via Command Line

The Kali Linux team has announced a significant enhancement of its Vagrant image build process, streamlining development and simplifying deployment…

Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies
21
Aug
2025

Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies

Researchers have discovered a complex campaign using trojanized software that uses authentic code-signing certificates to avoid detection and turn compromised…

Qilin Ransomware Gang Claims 4TB Data Breach at Nissan CBI
21
Aug
2025

Qilin Ransomware Gang Claims 4TB Data Breach at Nissan CBI

Qilin ransomware claims a 4TB data breach at Nissan CBI, leaking car design files, financial data, 3D models, and VR…

Derek B. Johnson
21
Aug
2025

FTC warns tech companies not to weaken encryption, free speech practices for foreign governments

Federal Trade Commission Chair Andrew Ferguson warned U.S. tech companies not to accede to laws in foreign countries that weaken…

APT MuddyWater Attacking CFOs Leveraging OpenSSH, Enables RDP, and Scheduled Task
21
Aug
2025

APT MuddyWater Attacking CFOs Leveraging OpenSSH, Enables RDP, and Scheduled Task

A sophisticated cyber espionage campaign attributed to APT MuddyWater has emerged targeting Chief Financial Officers and finance executives across Europe,…