Tick-box approach to cybersecurity falls short, warns Spirit CTO
19
Aug
2025

Tick-box approach to cybersecurity falls short, warns Spirit CTO

A tick-box approach to cybersecurity falls short amid today’s threats and rising operational complexity, Spirit Group chief technology and information…

Opinion | As Hong Kong is learning, a deepfake crime epidemic is upon us
19
Aug
2025

Opinion | As Hong Kong is learning, a deepfake crime epidemic is upon us

It all started with a routine-looking link from a securities firm. Customers who clicked on it found their trading accounts…

US disrupts North Korean IT worker
19
Aug
2025

XenoRAT malware campaign hits multiple embassies in South Korea

A state-sponsored espionage campaign is targeting foreign embassies in South Korea to deploy XenoRAT malware from malicious GitHub repositories. According to Trellix…

PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware
19
Aug
2025

PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware

A sophisticated malware campaign has been identified, utilizing PipeMagic, a highly modular backdoor deployed by the financially motivated threat actor…

PipeMagic Malware Imitates ChatGPT App to Exploit Windows Vulnerability and Deploy Ransomware
19
Aug
2025

PipeMagic Malware Imitates ChatGPT App to Exploit Windows Vulnerability and Deploy Ransomware

The PipeMagic malware, which is credited to the financially motivated threat actor Storm-2460, is a remarkable illustration of how cyber…

Expired-Domain Emails
19
Aug
2025

PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks

Aug 19, 2025Ravie LakshmananSupply Chain Security The maintainers of the Python Package Index (PyPI) repository have announced that the package…

AI exposing pre-existing risks, warns Flame Tree Cyber's Kat McCrabb
19
Aug
2025

AI exposing pre-existing risks, warns Flame Tree Cyber’s Kat McCrabb

With AI use by organisations in Australia compounding privacy, legal and other risks, iTnews’ sister publication techpartner.news invited opinions from…

U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog
19
Aug
2025

U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini August 19, 2025 U.S. Cybersecurity…

US targets North Korean fake IT worker scheme with China and Russia links
19
Aug
2025

US targets North Korean fake IT worker scheme with China and Russia links

The US has slapped sanctions on individuals and companies linked to a scheme that involves recruiting North Koreans to pose…

Allianz
19
Aug
2025

Massive Allianz Life data breach impacts 1.1 million people

Hackers have stolen the personal information of 1.1 million individuals in a Salesforce data theft attack, which impacted U.S. insurance…

Crypto Developers Attacked With Malicious npm Packages to Steal Login Details
19
Aug
2025

Crypto Developers Attacked With Malicious npm Packages to Steal Login Details

A sophisticated new threat campaign has emerged targeting cryptocurrency developers through malicious npm packages designed to steal sensitive credentials and…

Malicious npm Packages Target Crypto Developers to Steal Login Credentials
19
Aug
2025

Malicious npm Packages Target Crypto Developers to Steal Login Credentials

A sophisticated threat campaign dubbed “Solana-Scan” has emerged, deploying malicious npm packages aimed at infiltrating the Solana cryptocurrency ecosystem. Identified…