Data breach at healthcare services firm Episource affects 5.4M
The incident, one of the largest breaches reported to federal regulators this year, came after a cybercriminal accessed data on the company’s computer systems over the winter.
Swiss nonprofit health organization breached by Sarcoma ransomware group
Sarcoma, a recently emerged cybercrime group, was responsible for a data breach of Swiss health nonprofit Radix, according to a statement by the Zurich-based organization.
Europol helps disrupt $540 million crypto investment fraud ring
Spanish authorities have arrested five individuals in Madrid and the Canary Islands, suspected of laundering $540 million (€460 million) from illegal cryptocurrency investment schemes and defrauding more than 5,000 victims.
FBI: Cybercriminals steal health data posing as fraud investigators
The Federal Bureau of Investigation (FBI) has warned Americans of cybercriminals impersonating health fraud investigators to steal their sensitive information.
'Disgruntled' British IT worker jailed for hacking employer after being suspended
A U.K. man is serving a seven-month jail term because he changed access credentials and did other damage to his employer's systems after he was suspended from the job.
Over 1,200 Citrix servers unpatched against critical auth bypass flaw
Over 1,200 Citrix NetScaler ADC and NetScaler Gateway appliances exposed online are unpatched against a critical vulnerability believed to be actively exploited, allowing threat actors to bypass authentication by hijacking user sessions.
How Cybersecurity Fears Affect Confidence in Voting Systems - Schneier on Security
American democracy runs on trust, and that trust is cracking. Nearly half of Americans, both Democrats and Republicans, question whether elections are conducted fairly. Some voters accept election results only when their side wins. The problem isn’t just political polarization—it’s a creeping erosion of trust in the machinery of democracy itself. Commentators blame ideological tribalism, misinformation campaigns and partisan echo chambers for this crisis of trust. But these explanations miss a critical piece of the puzzle: a growing unease with the digital infrastructure that now underpins nearly every aspect of how Americans vote...
⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more
⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against cyberattacks and software vulnerabilities.
Discover how deterministic AI empowers DevSecOps by automating secure, policy-aligned remediations and shifting from detection to proactive enforcement.
Le géant chinois de la vidéosurveillance a été expulsé du Canada pour des raisons de sécurité nationale
Le Canada a officiellement ordonné, le 28 Juin 2025, au fabricant chinois de caméras de surveillance Hikvision de cesser toutes ses activités sur son territoire. Une décision prise à la suite d’un examen approfondi des appareils mené par les services de renseignement canadiens. Elles représenteraient de 32 à 35 % des
L’histoire cachée derrière les noms des hackers qui font trembler des États entiers
Fancy Bear, Brass Typhoon… Les noms des groupes APT (Advanced Persistant Threat) font régulièrement la Une. Mais derrière ces appellations obscures, se cache une réalité peu connue : dans la plupart des cas, ces groupes réputés pour être affiliés à des États ne choisissent pas leurs noms. Explications. Suivre
Connected vehicles (CVs) carry cyber security risks that vary depending on their level of connectivity. Learn about the risks before buying a CV and how to stay more secure when using these vehicles.
Hide Your RDP: Password Spray Leads to RansomHub Deployment
Key Takeaways Initial access was via a password spray attack against an exposed RDP server, targeting numerous accounts over a four-hour period. Mimikatz and Nirsoft were used to harvest credential…
Let's Encrypt has announced it will no longer notify users about imminent certificate expirations via email due to high costs, privacy concerns, and unnecessary complexities.
Bluetooth flaws could let hackers spy through your microphone
Vulnerabilities affecting a Bluetooth chipset present in more than two dozen audio devices from ten vendors can be exploited for eavesdropping or stealing sensitive information.