Archive for the Uncategorized Category

By Ionut Arghire

Pakistani state-sponsored hacking group APT36 is targeting Linux systems in a fresh campaign aimed at Indian government entities.

The post Pakistani Hackers Back at Targeting Indian Government Entities appeared first on SecurityWeek.

…read more

Source:: securityweek

By Ionut Arghire

Zero-day exploited in the wild forces Citrix and CISA to push emergency patch deadlines for federal agencies.

The post Citrix Patches Exploited NetScaler Zero-Day appeared first on SecurityWeek.

…read more

Source:: securityweek

By Mike Lennon

State officials confirm ransomware forced office closures, disrupted services, and led to data theft, as Nevada works with CISA and law enforcement to restore critical systems.

The post Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions appeared first on SecurityWeek.

…read more

Source:: securityweek

By Ionut Arghire

The Midnight Blizzard cyberspies used compromised websites to trick users into authorizing devices they controlled.

The post Amazon Disrupts Russian Hacking Campaign Targeting Microsoft Users appeared first on SecurityWeek.

…read more

Source:: securityweek

By Ionut Arghire

Elevation of privilege flaws in Android Runtime (CVE-2025-48543) and Linux kernel (CVE-2025-38352) have been exploited in targeted attacks.

The post Two Exploited Vulnerabilities Patched in Android appeared first on SecurityWeek.

…read more

Source:: securityweek

By SecurityWeek News

Noteworthy stories that might have slipped under the radar: Google fined €325 million, City of Baltimore sent $1.5 million to scammer, Bridgestone targeted in cyberattack.

The post In Other News: Scammers Abuse Grok, US Manufacturing Attacks, Gmail Security Claims Debunked appeared first on SecurityWeek.

…read more

Source:: securityweek

91% of Teens Use Generative AI

| August 25th, 2025

A recent survey found that when presented with an online safety issue, most teen respondents will ask for help from a parent or other trusted adult.

…read more

Source:: Security magazin

By Kevin Townsend

Competition among malware-as-a-service developers has transformed infostealers into refined, accessible tools for cybercriminals worldwide.

The post Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime appeared first on SecurityWeek.

…read more

Source:: securityweek

By Ionut Arghire

US Treasury sanctions Russian and Chinese entities tied to North Korea’s use of fake IT workers, who exploited stolen identities, AI, and malware to funnel millions back to Pyongyang.

The post US Sanctions Russian National, Chinese Firm Aiding North Korean IT Workers appeared first on SecurityWeek.

…read more

Source:: securityweek

By Ionut Arghire

Part of a wave of DDoS attacks that lasted for weeks, the assault was a UDP flood mainly originating from Google Cloud.

The post Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack appeared first on SecurityWeek.

…read more

Source:: securityweek