Hackers Now Targeting US Retailers After UK Attacks, Google

Hackers from the Scattered Spider group, known for UK retail attacks, are now targeting US retailers, Google cybersecurity…

Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – ​Read More

From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth

The 15th edition of NATO’s Locked Shields cyber defense exercise brought together 4,000 experts from 41 countries.

The post From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth appeared first on SecurityWeek.

SecurityWeek – ​Read More

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

Researchers at ETH Zürich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data from memory, showing that the vulnerability known as Spectre continues to haunt computer systems after more than seven years.
The vulnerability, referred to as Branch Privilege Injection (BPI), “can be exploited to misuse the prediction

The Hacker News – ​Read More

FBI Warns of Deepfake Messages Impersonating Senior Officials

The FBI says former federal and state government officials are targeted with texts and AI-generated voice messages impersonating senior US officials.

The post FBI Warns of Deepfake Messages Impersonating Senior Officials appeared first on SecurityWeek.

SecurityWeek – ​Read More

I tested a TCL smart lock, and its palm vein recognition feature blew me away

The TCL D1 Pro is a palm vein smart lock with five other unlocking methods for ultimate convenience.

Latest stories for ZDNET in Security – ​Read More

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT.
“Threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents,” Qualys security researcher Akshay Thorve said in a technical report. “The attack chain leverages mshta.exe for

The Hacker News – ​Read More

Hackers Win $260,000 on First Day of Pwn2Own Berlin 2025

Pwn2Own participants have earned tens of thousands of dollars for Red Hat, Windows, Oracle VirtualBox, Docker Desktop, and AI exploits.

The post Hackers Win $260,000 on First Day of Pwn2Own Berlin 2025 appeared first on SecurityWeek.

SecurityWeek – ​Read More

[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late to cloud threats, and monitor SOC alerts only after damage is done.
Attackers don’t wait. They exploit vulnerabilities within hours. Yet most organizations take days to respond to critical cloud alerts. That delay isn’t

The Hacker News – ​Read More

Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List

Once a key figure in the Angler exploit kit underworld, Tarasov’s life has unraveled into detention, paranoia, and an unwanted return to the Russia he publicly despised.

The post Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List appeared first on SecurityWeek.

SecurityWeek – ​Read More

Big Steelmaker Halts Operations After Cyber Incident

Nucor made it clear its investigation is still in the early stages and didn’t specify the nature or scope of the breach, nor who the threat actor might be.

darkreading – ​Read More