Tag Directory / CYBERSECURITY     showing 321–340 of 554   RSS



Microsoft to Enforce MFA for Azure Command-Line Tools Starting October 2025

Markus Kasanmascheff / winbuzzer - Microsoft will mandate Multi-Factor Authentication (MFA) for Azure CLI, PowerShell, and APIs starting Oct 1, 2025, to enhance security for developers.The post Microsoft to Enforce MFA for Azure Command-Line Tools Starting October 2025 appeared first on Wi…

#cybersecurity #infosec #microsoft #azure

Back to Top / Friday, August 29, 2025, 1:21 pm / permalink 13400 / 2 stories in 6 months


FBI, Dutch cops seize fake ID marketplace that sold identity docs for $9

Jessica Lyons / theregister - $6.4M VerifTools marketplace offline The FBI and Dutch police today said that they seized two domains and a blog tied to VerifTools, an international criminal marketplace that sold identity documents for as little as $9.…

#cybersecurity #government #cybercrime #law

Back to Top / Thursday, August 28, 2025, 3:21 pm / permalink 13328 / 2 stories in 6 months


High-severity vulnerability in Passwordstate credential manager. Patch now.

Dan Goodin / arstechnica - Vulnerability can be exploited to gain access to customers' crown jewels.

#cybersecurity #software #infosec

Back to Top / Thursday, August 28, 2025, 2:21 pm / permalink 13317 / 2 stories in 6 months


New research shows passkeys can be hijacked through malicious extensions

Duncan Riley / siliconangle - A new report out today from browser security company SquareX Ltd. reveals a critical flaw in passkeys, the widely promoted alternative to passwords, that could allow attackers to hijack accounts across banking, e-commerce and enterprise software-as-a-serv…

#cybersecurity #infosec #privacy

Back to Top / Thursday, August 28, 2025, 9:20 am / permalink 13275 / 2 stories in 6 months


TransUnion admits 4.5M affected after third-party support app breached

Connor Jones / theregister - Credit agency offers own services as compensation Credit scoring and monitoring biz TransUnion says that it recently suffered a breach affecting nearly 4.5 million individuals.…

#cybersecurity #dataprivacy #business #finance

6 months / pymnts / PYMNTS


Back to Top / Thursday, August 28, 2025, 9:20 am / permalink 13273 / 7 stories in 6 months


Covert Influence Operations in Greenland Exposed

Diplomatic tensions spiked after Danish officials summoned a U.S. diplomat amid revelations that individuals tied to Trump were allegedly orchestrating covert influence operations in Greenland. The episode has stirred international eyebrows and left policy watchers bemused by these clandestine maneuvers.

#cybersecurity #defensetech #government #cia

Back to Top / Wednesday, August 27, 2025, 5:21 pm / permalink 13243 / 1 stories in 6 months


FBI says China’s Salt Typhoon hacked at least 200 US companies

Zack Whittaker / techcrunch - The FBI's cyber chief says the long-running China-backed hacking campaign is "ongoing" and affecting companies all over the world.

#cybersecurity #china #government #us

Back to Top / Wednesday, August 27, 2025, 3:21 pm / permalink 13224 / 3 stories in 6 months


The intruder is in the house: Storm-0501 attacked Azure, stole data, demanded payment via Teams

Jessica Lyons / theregister - Don't let it happen to you Storm-0501, a financially motivated cybercrime crew, recently broke into a large enterprise's on-premises and cloud environments, ultimately exfiltrating and destroying data within the org's Azure environment. The criminals then…

#cybersecurity #cloud #cybercrime

Back to Top / Wednesday, August 27, 2025, 12:21 pm / permalink 13203 / 3 stories in 6 months


Anthropic Cybersecurity Team Warns ‘Agentic AI Has Been Weaponized’

PYMNTS / pymnts - Anthropic is warning of the growing use of artificial intelligence (AI) in cybercrime. “Agentic AI has been weaponized,” the company wrote Wednesday (Aug. 27) in an announcement accompanying its Threat Intelligence report. “AI models are now being used to…

#ai #cybersecurity #anthropic #aiethics

6 months / bgr

6 months / pymnts / PYMNTS


Back to Top / Wednesday, August 27, 2025, 10:22 am / permalink 13186 / 8 stories in 6 months


The first AI-powered ransomware has been discovered — "PromptLock" uses local AI to foil heuristic detection and evade API tracking

tomshardware - Security firm ESET has discovered a new type of ransomware that uses a local AI model to generate malicious scripts and perform other illicit activities. Because of the variance of LLM output, this malware is harder to track than traditional attacks.

#ai #cybersecurity #infosec #cybercrime

6 months / tomshardware


Back to Top / Tuesday, August 26, 2025, 5:21 pm / permalink 13150 / 2 stories in 6 months


Nevada closes state offices as cyberattack disrupts IT systems

Lawrence Abrams / bleepingcomputer - Nevada remains two days into a cyberattack that began early Sunday, disrupting government websites, phone systems, and online platforms, and forcing all state offices to close on Monday. [...]

#cybersecurity #infosec #government #cybercrime

Back to Top / Tuesday, August 26, 2025, 1:21 pm / permalink 13122 / 2 stories in 6 months


Cloudflare introduces tools to manage AI risks and protect data

Wayne Williams / betanews - Cloudflare has launched new Zero Trust tools in its Cloudflare One platform to help businesses adopt artificial intelligence securely at scale. The features aim to give organizations better visibility into how AI is used, as well as protection from unappr…

#ai #cybersecurity #cloudsec #genai

Back to Top / Monday, August 25, 2025, 10:21 am / permalink 13021 / 3 stories in 6 months


Brave: Perplexity’s Comet obeyed hidden prompts, exposing logged-in accounts

Marcus Schuler / implicator - Brave discovered Perplexity's AI browser executes hidden malicious commands from web pages, bypassing decades of security protections. As every major browser adds AI agents, enterprises rush to buy secure alternatives.

#ai #cybersecurity #browsers #security

6 months / cnet / Imad Khan

6 months / tomshardware


Back to Top / Monday, August 25, 2025, 9:21 am / permalink 13017 / 5 stories in 6 months


Apple Sues Ex-Employee Who Allegedly Stole Apple Watch Secrets for Chinese Rival Oppo

Juli Clover / macrumors - Apple today filed a lawsuit in Northern California against Chen Shi, a former employee who left Apple and took a job at Chinese smartphone maker Oppo. According to Apple, Shi stole trade secrets relating to Apple Watch development and provided the informa…

#cybersecurity #apple #asia #law

6 months / appleinsider


Back to Top / Friday, August 22, 2025, 3:20 pm / permalink 12915 / 5 stories in 6 months


Arch Linux continues to feel the force of a DDoS attack after two brutal weeks — attackers yet to be identified as project struggles to restore full service

tomshardware - The Arch Linux project team are working to mitigate the impact, while keeping details of who, why and how close to its chest

#cybersecurity #infosec #distributions #linux

6 months / tomshardware


Back to Top / Friday, August 22, 2025, 12:21 pm / permalink 12902 / 2 stories in 6 months


Dev plants kill switch in ex-employer's network that crashed servers and deleted files, gets four years in the slammer — kill switch triggered by dev's removal from Active Directory when fired

tomshardware - A software engineer called Davis Lu was sentenced to four years in prison for creating a kill switch in his former employer's network.

#cybersecurity #infosec #cybercrime #law

6 months / tomshardware


Back to Top / Friday, August 22, 2025, 11:21 am / permalink 12894 / 4 stories in 6 months


Developer jailed for taking down employer's network with kill switch malware

Iain Thomson / theregister - Pro tip: When taking revenge, don't use your real name A US court sentenced a former developer at power management biz Eaton to four years in prison after he installed malware on the company’s servers.…

#cybersecurity #cybercrime #security #law

Back to Top / Thursday, August 21, 2025, 8:20 pm / permalink 12862 / 2 stories in 6 months


Ukrainian suspect arrested in Italy over Nord Stream sabotage

Authorities in Italy have arrested a Ukrainian individual linked to the Nord Stream pipeline sabotage plot, codenamed “Operation Diameter.” This arrest comes as international investigations intensify over alleged acts of industrial sabotage against critical infrastructure, igniting a flurry of diplomatic and security concerns.

#cybersecurity #ukraine #europe #law

Back to Top / Thursday, August 21, 2025, 2:21 pm / permalink 12825 / 0 stories in 6 months


Perplexity's Comet browser naively processed pages with evil instructions

Thomas Claburn / theregister - Rival Brave flags prompt injection vulnerability, now patched To the surprise of no one in the security industry, processing untrusted, unvalidated input is a bad idea.…

#cybersecurity #software #infosec #browsers

Back to Top / Wednesday, August 20, 2025, 3:20 pm / permalink 12742 / 2 stories in 6 months


PyPI now blocks domain resurrection attacks used for hijacking accounts

Bill Toulas / bleepingcomputer - The Python Package Index (PyPI) has introduced new protections against domain resurrection attacks that enable hijacking accounts through password resets. [...]

#cybersecurity #opensource #infosec #python

Back to Top / Tuesday, August 19, 2025, 4:21 pm / permalink 12653 / 3 stories in 6 months


Back to Top


CYBERSECURITY Heatmap


90 days, weeks are vertical, left is older; hover for info, click to see that day's coverage.



More Top Stories...


Pentagon labels Anthropic a supply‑chain risk; company vows legal fight

The Pentagon has designated Anthropic and its products as a “supply‑chain risk,” prompting the company to announce a court challenge. Experts warn the move could chill collaboration and talent flows into AI, while Anthropic insists it will contest the determination to protect its operations and customers. More...


Oracle and OpenAI scrap Texas data-center expansion; Meta eyes the spare capacity

Oracle and OpenAI have abandoned plans to expand a flagship Texas data center, leaving substantial compute capacity up for grabs. Nvidia reportedly brokered interest from Meta to take the unused slots as OpenAI downscales that particular buildout, a move that rattled markets and highlights shifting demand for large-scale on-prem AI infrastructure. More...


SoftBank seeks massive $40B loan to back OpenAI investment, courting big risk

SoftBank is reportedly seeking up to a $40 billion loan to finance its planned stake in OpenAI, an audacious use of leverage to double down on the AI boom. The move would be one of the largest single‑company financing gambits in recent memory, raising questions about balance‑sheet strain versus potential upside. More...


OpenAI launches Codex Security agent to automatically detect software vulnerabilities

OpenAI rolled out Codex Security, an AI agent that scans codebases to find complex vulnerabilities, suggests actionable fixes, and uses sandbox testing to limit false positives. The tool has already flagged issues in major projects and aims to compete with traditional application security tooling by automating deep, contextual code review. More...


Google releases Workspace CLI enabling AI agents to access Gmail, Drive, Calendar

Google has shipped an open-source Workspace CLI that gives AI agents like OpenClaw programmatic access to Gmail, Drive, Calendar and other Workspace services via a built-in MCP server. The tool standardizes agent integration, making it easier — and slightly creepier — for automated assistants to act on users’ behalf across core productivity apps. More...



NorthFeed Inc.

Disclaimer: The information provided on this website is intended for general informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. Users are encouraged to verify all details independently. We accept no liability for errors, omissions, or any decisions made based on this information.