MI5 Warns Lawmakers That Chinese Spies Are Trying to Reach Them via LinkedIn

Britain’s domestic intelligence agency warned that Chinese nationals were ”using LinkedIn profiles to conduct outreach at scale” on behalf of the Chinese Ministry of State Security.

The post MI5 Warns Lawmakers That Chinese Spies Are Trying to Reach Them via LinkedIn appeared first on SecurityWeek.

SecurityWeek – ​Read More

Microsoft is packing more AI into Windows, ready or not – here’s what’s new

Microsoft is clearly excited about all this AI infiltrating Windows, but are its users as excited? Not quite. Here’s why.

Latest news – ​Read More

Microsoft’s new AI agents create your Word, Excel, and PowerPoint projects now

They can generate documents, spreadsheets, and presentations from simple text prompts. Here’s how to make the most of them.

Latest news – ​Read More

Google just added Gemini 3 to Search – here’s who can access it

The company’s new-and-improved search engine is designed to detect what you need and offer visual aids in responses.

Latest news – ​Read More

SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2026

Austin, TX/USA, 18th November 2025, CyberNewsWire

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More – ​Read More

A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers

By plugging tens of billions of phone numbers into WhatsApp’s contact discovery tool, researchers found “the most extensive exposure of phone numbers” ever—along with profile photos and more.

Security Latest – ​Read More

This ex-Bose engineer just launched smart earrings that actually look like jewelry

The Lumia 2 earrings track blood flow, exercise, and sleep. They come with a clever, customizable design.

Latest news – ​Read More

New in Snort3: Enhanced rule grouping for greater flexibility and control

New in Snort3: Enhanced rule grouping for greater flexibility and control

Today, Cisco Talos is introducing new capabilities for Snort3 users within Cisco Secure Firewall. These enhancements are designed to give you greater flexibility in how you manage, organize, and prioritize detection rules. They also make it easier to align SNORT® rules with your organization’s specific security needs.

The new “Severity” rule group

In Snort3, rule groups let you organize and manage detection rules according to specific criteria. Previously, only two top-level groups were available:

  • Rule Category: groups rules by Snort2 categories such as FILE-OTHER, MALWARE-CNC, etc.
  • MITRE ATT&CK: groups rules by attacker behaviors and techniques

These groups allow you to set a security level from 0 (all rules disabled) to 4 (all rules enabled).

The new Severity rule group introduces a third way to organize rules — by vulnerability severity, using CVSS scores. Rules are grouped as low, medium, high, or critical, allowing your team to prioritize detection based on the impact and urgency of vulnerabilities, rather than just category or behavior.

This makes it easier to focus attention and resources where they matter most.

Flexible rule group creation based on time range

With the Severity group, you can define how far back in time you want your coverage to extend:

Level 

Coverage 

Description 

None 

No rules enabled 

Last 2 years 

Focuses on recent, high-impact vulnerabilities 

Last 5 years 

Balanced coverage of recent and mid-term threats

Last 10 years 

Broad coverage for long-lived environments 

All 

Includes all vulnerabilities detected to date 

This approach gives you precise control over rule selection and volume. It helps optimize performance while ensuring your detection policies match your organization’s patching cycles, compliance requirements, and risk profile.

We’re also looking to develop more top-level groupings in the coming quarters. More details will be shared in due course.

What this means for your environment

Configuring Snort3 previously required enabling rules individually or applying a predefined ruleset and then tuning manually. We know this wasn’t the most time-efficient process, so the Snort analyst team worked to simplify it with the new features announced today.

You can now:

  • Enable rule groups aligned with your own internal policies
  • Scale configurations across multiple environments without managing individual rules
  • Adjust detection depth easily by time range or severity level

These capabilities make it simpler to maintain consistent, targeted detection coverage — whether you’re running large, distributed networks or smaller environments with tailored security priorities.

Conclusion

The new Severity rule group and expanded rule group model give Snort3 users more flexibility and control.

By organizing rules based on vulnerability severity and timeframe, you can focus detection where it has the greatest impact, improving both efficiency and accuracy in threat management.

Cisco Talos Blog – ​Read More

The top 10 robot vacuums and mowers ZDNET readers bought in 2025

I review dozens of robot vacuums and at least a handful of robot mowers each year. Read on to see which were the most popular among our readers in 2025.

Latest news – ​Read More

What if your romantic AI chatbot can’t keep a secret?

Does your chatbot know too much? Think twice before you tell your AI companion everything.

WeLiveSecurity – ​Read More