Canadian hacker arrested for allegedly stealing data from Texas Republican Party
The prominent hacker Aubrey Cottle is accused of hacking into a third-party hosting company for the websites for the Texas Republican Party and the Texas Right to Life anti-abortion group.
Microsoft uses AI to find flaws in GRUB2, U-Boot, Barebox bootloaders
Microsoft used its AI-powered Security Copilot to discover 20 previously unknown vulnerabilities in the GRUB2, U-Boot, and Barebox open-source bootloaders.
Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks
A phishing-as-a-service (PhaaS) platform named 'Lucid' has been targeting 169 entities in 88 countries using well-crafted messages sent on iMessage (iOS) and RCS (Android).
Analyzing open-source bootloaders: Finding vulnerabilities faster with AI
Using Microsoft Security Copilot to expedite the discovery process, Microsoft has uncovered several vulnerabilities in multiple open-source bootloaders impacting all operating systems relying on Unified Extensible Firmware Interface (UEFI) Secure Boot. Through a series of prompts, we identified and refined security issues, ultimately uncovering an exploitable integer overflow vulnerability in the GRUB2, U-boot, and Barebox bootloaders.
The North Korea worker problem is bigger than you think | CyberScoop
The yearslong scheme goes much deeper than contract work, extending to roles beyond traditional IT and sometimes granting the insider threat “keys to the kingdom,” DTEX President Mohan Koo said.
North Korean hackers adopt ClickFix attacks to target crypto firms
The notorious North Korean Lazarus hacking group has reportedly adopted 'ClickFix' tactics to deploy malware targeting job seekers in the cryptocurrency industry, particularly centralized finance (CeFi).
CISA warns new malware targeting Ivanti zero-day vulnerability
CVE-2025-0282, a critical vulnerability that affects Ivanti’s Connect Secure, Policy Secure and ZTA Gateway products, was disclosed and patched in January.
Cybersécurité : OVHcloud décroche la qualification SecNumCloud pour son offre Bare Metal Pod
OVHcloud poursuit son objectif du "tout souverain" avec la qualification de son offre Bare Metal Pod, qui garantit une isolation complète. Le...-Cloud
Oracle alerte certains clients de santé d'une fuite de données, le FBI ouvre une enquête
La firme américaine a été victime d'une intrusion informatique depuis les systèmes d'Oracle Health, qui commercialise des logiciels SaaS de...-Cybersécurité
In this podcast, Joe, Hazel, Bill and Dave break down Talos' Year in Review 2024 and discuss how and why cybercriminals have been leaning so heavily on attacks that are routed in stealth in simplicity.
Unify Governance & Security with an Application Fabric | CSA
Application fabrics provide a governance layer that simplifies visibility, enabling enterprises to close gaps between identity & application management.
Welcome to the next generation of Burp Suite: elevate your testing with Burp AI
At PortSwigger, we believe AI has the power to transform penetration testing - not by replacing human testers, but by augmenting them. With the release of Burp Suite Professional 2025.2, we’re introdu
[FIC 2025] Les attaques par ransomware sont en baisse, d'après Cybermalveillance.gouv.fr
A quelques jours de l'ouverture de la 17ème édition du Forum InCyber à Lille, la plateforme d'aide et d'assistance aux victimes...-Cybersécurité
Download Talos' 2024 Year in Review now, and access key insights on the top targeted vulnerabilities of the year, network-based attacks, email threats, adversary toolsets, identity attacks, multi-factor authentication (MFA) abuse, ransomware and AI-based attacks.
The Signal Chat Leak and the NSA - Schneier on Security
US National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a US attack against the Yemen-based Houthis on March 15, is seemingly now suggesting that the secure messaging service Signal has security vulnerabilities. "I didn’t see this loser in the group," Waltz told Fox News about Atlantic editor in chief Jeffrey Goldberg, whom Waltz invited to the chat. "Whether he did it deliberately or it happened in some other technical mean, is something we’re trying to figure out." Waltz’s implication that Goldberg may have hacked his way in was followed by a ...
AI Software Supply Chain Risks Require Diligence | CSA
CISOs are on the look out for novel attack vectors or future breaches of the upstream assets partners use to deliver their cloud-delivered AI services.