Latest Cybersecurity News and Articles
01 July 2025
Many Citrix NetScaler systems are exposed to attacks exploiting the vulnerabilities tracked as CVE-2025-5777 and CVE-2025-6543.
The post Thousands of Citrix NetScaler Instances Unpatched Against Exploited Vulnerabilities appeared first on SecurityWeek.
01 July 2025
The US government is again warning about potential Iranian cyberattacks as researchers find that hackers’ favorite ICS targets remain exposed.
The post Iranian Hackers’ Preferred ICS Targets Left Open Amid Fresh US Attack Warning appeared first on SecurityWeek.
01 July 2025
Google has released security updates to address a vulnerability in its Chrome browser for which an exploit exists in the wild.
The zero-day vulnerability, tracked as CVE-2025-6554 (CVSS score: N/A), has been described as a type confusing flaw in the V8 JavaScript and WebAssembly engine.
"Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary
01 July 2025
The US has made 29 searches of known or suspected laptop farms supporting North Korean individuals posing as US IT workers.
The post US Storms 29 Laptop Farms in Crackdown on North Korean IT Worker Schemes appeared first on SecurityWeek.
01 July 2025
The U.S. Department of Justice (DoJ) on Monday announced sweeping actions targeting the North Korean information technology (IT) worker scheme, leading to the arrest of one individual and the seizure of 29 financial accounts, 21 fraudulent websites, and nearly 200 computers.
The coordinated action saw searches of 21 known or suspected "laptop farms" across 14 states in the U.S. that were put to
01 July 2025
Google has released a Chrome 138 update that patches a high-severity vulnerability with an exploit in the wild.
The post Chrome 138 Update Patches Zero-Day Vulnerability appeared first on SecurityWeek.
01 July 2025
Microsoft has said that it's ending support for passwords in its Authenticator app starting August 1, 2025.
The changes, the company said, are part of its efforts to streamline autofill in the two-factor authentication (2FA) app.
"Starting July 2025, the autofill feature in Authenticator will stop working, and from August 2025, passwords will no longer be accessible in Authenticator," Microsoft
30 June 2025
Founded in 2015, the Tel Aviv based company has now raised more than $1 billion and claims more than 3,500 customers.
The post Cato Networks Raises $359 Million to Expand SASE Business appeared first on SecurityWeek.
30 June 2025
Agents with the Federal Bureau of Investigation (FBI) briefed Capitol Hill staff recently on hardening the security of their mobile devices, after a contacts list stolen from the personal phone of the White House Chief of Staff Susie Wiles was reportedly used to fuel a series of text messages and phone calls impersonating her to U.S. lawmakers. But in a letter this week to the FBI, one of the Senate's most tech-savvy lawmakers says the feds aren't doing enough to recommend more appropriate security protections that are already built into most consumer mobile devices.
30 June 2025
61M Verizon customers may be at risk of having their data sold.
30 June 2025
U.S. cybersecurity and intelligence agencies have issued a joint advisory warning of potential cyber-attacks from Iranian state-sponsored or affiliated threat actors.
"Over the past several months, there has been increasing activity from hacktivists and Iranian government-affiliated actors, which is expected to escalate due to recent events," the agencies said.
"These cyber actors often
30 June 2025
Europol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered €460 million ($540 million) from more than 5,000 victims across the world.
The operation, the agency said, was carried out by the Spanish Guardia Civil, along with support from law enforcement authorities from Estonia, France, and the United States. Europol said the investigation into the syndicate
30 June 2025
Apple and Google app stores are offering private browsing apps owned by Chinese companies.
30 June 2025
NASA needs to perform an agency-wide cybersecurity risk assessment and to complete important cybersecurity tasks for each of its projects.
The post NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO appeared first on SecurityWeek.
30 June 2025
The threat actor known as Blind Eagle has been attributed with high confidence to the use of the Russian bulletproof hosting service Proton66.
Trustwave SpiderLabs, in a report published last week, said it was able to make this connection by pivoting from Proton66-linked digital assets, leading to the discovery of an active threat cluster that leverages Visual Basic Script (VBS) files as its
30 June 2025
Rachel Tobac is a cyber social engineer. She is skilled at persuading people to do what she wants, rather than what they know they ought to do.
The post Hacker Conversations: Rachel Tobac and the Art of Social Engineering appeared first on SecurityWeek.
30 June 2025
Casie Antalis is the new executive director of the Cybersecurity and Infrastructure Security Agency after the departure of Bridget Bean.
The post Casie Antalis Named Executive Director of CISA appeared first on SecurityWeek.
30 June 2025
Vulnerabilities in Airoha Bluetooth SoCs expose headphone and earbud products from multiple vendors to takeover attacks.
The post Airoha Chip Vulnerabilities Expose Headphones to Takeover appeared first on SecurityWeek.
30 June 2025
Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain access to resources and sensitive data have been increasing in number and frequency over the last few years. Some recent reports estimate that 83% of attacks involve compromised secrets. According to reports such as the Verizon DBIR, attackers are more commonly using stolen
30 June 2025
Ever wonder what happens when attackers don’t break the rules—they just follow them better than we do? When systems work exactly as they’re built to, but that “by design” behavior quietly opens the door to risk?
This week brings stories that make you stop and rethink what’s truly under control. It’s not always about a broken firewall or missed patch—it’s about the small choices, default settings