Security News > 2025 > February

Implementing Cryptography in AI Systems
2025-02-21 15:33

Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.” Abstract: The wide adoption of deep neural networks (DNNs) raises the question of how can we equip them with...

Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3
2025-02-21 13:03

The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying a new version that allows prospective customers and cyber crooks to clone any brand's legitimate...

Experts race to extract intel from Black Basta internal chat leaks
2025-02-21 12:56

Researchers say there's dissent in the ranks. Plus: An AI tool lets you have a go yourself at analysing the data Hundreds of thousands of internal messages from the Black Basta ransomware gang...

Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025
2025-02-21 11:40

In today’s rapidly evolving digital landscape, weak identity security isn’t just a flaw—it’s a major risk that can expose your business to breaches and costly downtime. Many organizations are...

AI-Powered Deception is a Menace to Our Societies
2025-02-21 11:00

Wherever there’s been conflict in the world, propaganda has never been far away. Travel back in time to 515 BC and read the Behistun Inscription, an autobiography by Persian King Darius that...

#AI
Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks
2025-02-21 07:38

Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login...

CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks
2025-02-21 07:26

A high-severity security flaw impacting the Craft content management system (CMS) has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited...

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws
2025-02-21 06:51

PoC exploit code shows why this is a patch priority Security engineers have released a proof-of-concept exploit for four critical Ivanti Endpoint Manager bugs, giving those who haven't already...

Mastering the cybersecurity tightrope of protection, detection, and response
2025-02-21 06:00

In this Help Net Security interview, Chester Wisniewski, Director and Global Field CISO at Sophos, discusses the shifting ransomware landscape, the risks posed by quantum decryption threats, and...

How to secure Notes on iOS and macOS
2025-02-21 05:30

Apple allows you to lock your notes using your iPhone passcode or a separate password, ensuring your private information stays protected across all your Apple devices, including iOS and macOS....