Malicious npm Packages Target Crypto Developers to Steal Login Credentials
19
Aug
2025

Malicious npm Packages Target Crypto Developers to Steal Login Credentials

A sophisticated threat campaign dubbed “Solana-Scan” has emerged, deploying malicious npm packages aimed at infiltrating the Solana cryptocurrency ecosystem. Identified…

What happens when penetration testing goes virtual and gets an AI coach
19
Aug
2025

What happens when penetration testing goes virtual and gets an AI coach

Cybersecurity training often struggles to match the complexity of threats. A new approach combining digital twins and LLMs aims to…

Retail technology is evolving fast – but integration remains the real battleground
19
Aug
2025

Retail technology is evolving fast – but integration remains the real battleground

In retail, technology has never moved more quickly. But for many IT leaders, speed isn’t the problem – it’s direction….

Impostor uses AI to impersonate US top diplomat Rubio and contact foreign ministers
19
Aug
2025

Impostor uses AI to impersonate US top diplomat Rubio and contact foreign ministers

The US State Department has warned US diplomats of attempts to impersonate Secretary of State Marco Rubio and possibly other…

CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks
19
Aug
2025

CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks

CISA has issued a critical warning regarding a high-severity OS command injection vulnerability in Trend Micro Apex One Management Console…

CISA Alerts on Active Exploitation of Trend Micro Apex One Vulnerability
19
Aug
2025

CISA Alerts on Active Exploitation of Trend Micro Apex One Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Trend Micro Apex One vulnerability to its Known Exploited…

Git 2.51: Preparing for the future with SHA-256
19
Aug
2025

Git 2.51: Preparing for the future with SHA-256

Git 2.51 is out, and the release continues the long process of modernizing the version control system. The update includes…

"Don't think for a second that you can outsource your risk," warns Brennan's cyber chief
19
Aug
2025

“Don’t think for a second that you can outsource your risk,” warns Brennan’s cyber chief

With recent changes to Australian cybersecurity regulations, iTnews’ sister publication techpartner.news invited cybersecurity providers to nominate spokespeople to share their…

Hong Kong tech and telecoms giants unite to combat online fraud
19
Aug
2025

Hong Kong tech and telecoms giants unite to combat online fraud

Hong Kong’s major social media, messaging platform providers and telecoms firms have pledged to strengthen checks on advertisers’ identities and…

Hackers Weaponizing Cisco's Secure Links to Evade Link Scanning and By-Pass Network Filters
19
Aug
2025

Hackers Weaponizing Cisco’s Secure Links to Evade Link Scanning and By-Pass Network Filters

A sophisticated attack campaign uncovered where cybercriminals are weaponizing Cisco’s own security infrastructure to conduct phishing attacks.  The attackers are…

Hackers Exploit Cisco Secure Links to Evade Scanners and Bypass Filters
19
Aug
2025

Hackers Exploit Cisco Secure Links to Evade Scanners and Bypass Filters

Cybercriminals have discovered a sophisticated new attack vector that weaponizes Cisco’s security infrastructure against users, according to recent research from…

Phone scams in Hong Kong up 22% in first 5 months of year but losses down
19
Aug
2025

Phone scams in Hong Kong up 22% in first 5 months of year but losses down

The number of phone scam cases in Hong Kong rose by nearly 22 per cent between January and May compared…