Security News > 2025

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery
2025-04-21 07:01

Cybersecurity researchers have disclosed a surge in "mass scanning, credential brute-forcing, and exploitation attempts" originating from IP addresses associated with a Russian bulletproof hosting...

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
2025-04-21 05:30

Hawk Eye is an open-source tool that helps find sensitive data before it leaks. It runs from the command line and checks many types of storage for PII and secrets: passwords, API keys, and...

Cybercriminals blend AI and social engineering to bypass detection
2025-04-21 05:00

Attackers are focusing more on stealing identities. Because of this, companies need to use zero trust principles. They should also verify user identities more carefully, says DirectDefense....

Cyber threats now a daily reality for one in three businesses
2025-04-21 04:30

Businesses are losing out on an average of $98.5 million a year as a consequence of cyber threats, fraud, regulatory hurdles and operational inefficiencies, according to research from FIS and...

Why CISOs are watching the GenAI supply chain shift closely
2025-04-21 04:00

In supply chain operations, GenAI is gaining traction. But according to Logility’s Supply Chain Horizons 2025 report, many security leaders remain uneasy about what that means for data protection,...

Phishers abuse Google OAuth to spoof Google in DKIM replay attack
2025-04-20 17:31

In a rather clever attack, hackers leveraged a weakness that allowed them to send a fake email that seemed delivered from Google's systems, passing all verifications but pointing to a fraudulent...

State-sponsored hackers embrace ClickFix social engineering tactic
2025-04-20 14:14

ClickFix attacks are being increasingly adopted by threat actors of all levels, with researchers now seeing multiple advanced persistent threat (APT) groups from North Korea, Iran, and Russia...

Week in review: LLM package hallucinations harm supply chains, Nagios Log Server flaws fixed
2025-04-20 08:00

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Apple plugs zero-day holes used in targeted iPhone attacks (CVE-2025-31200, CVE-2025-31201) Apple...

APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures
2025-04-20 04:58

The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting diplomatic entities across Europe with a new variant of WINELOADER and a...

Widespread Microsoft Entra lockouts tied to new security feature rollout
2025-04-19 22:04

Windows administrators from numerous organizations report widespread account lockouts triggered by false positives in the rollout of a new Microsoft Entra ID's "leaked credentials" detection app...