Lawmakers seek to close loophole limiting Secret Service investigations into cyber laundering

Two U.S. senators reintroduced legislation on Thursday that would address limits on the ability of the Secret Service to investigate efforts to launder money made through cybercrime.

The Record from Recorded Future News – ​Read More

Secure Communications Evolve Beyond End-to-End Encryption

Signal, Wickr, WhatsApp, and Cape all have different approaches to security and privacy, yet most are finding ways to make secure communications more private.

darkreading – ​Read More

Critical Apache Parquet Vulnerability Leads to Remote Code Execution

A critical vulnerability in Apache Parquet can be exploited to execute arbitrary code remotely, leading to complete system compromise.

The post Critical Apache Parquet Vulnerability Leads to Remote Code Execution appeared first on SecurityWeek.

SecurityWeek – ​Read More

Oracle Confirms Cloud Hack

Oracle has confirmed suffering a data breach but the tech giant is apparently trying to downplay the impact of the incident.

The post Oracle Confirms Cloud Hack appeared first on SecurityWeek.

SecurityWeek – ​Read More

Have We Reached a Distroless Tipping Point?

There’s a virtuous cycle in technology that pushes the boundaries of what’s being built and how it’s being used. A new technology development emerges and captures the world’s attention. People start experimenting and discover novel applications, use cases, and approaches to maximize the innovation’s potential. These use cases generate significant value, fueling demand for the next iteration of

The Hacker News – ​Read More

Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack

Evidence shows a SpotBugs token compromised in December 2024 was used in the March 2025 GitHub Actions supply chain attack.

The post Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack appeared first on SecurityWeek.

SecurityWeek – ​Read More

North Korean Hackers Disguised as IT Workers Targeting UK, European Companies, Google Finds

The attackers pose as legitimate remote IT workers, looking to both generate revenue and access sensitive company data through employment. “Europe needs to wake up fast,” according to Google’s Jamie Collier.

Security | TechRepublic – ​Read More

Benchmarks Find ‘DeepSeek-V3-0324 Is More Vulnerable Than Qwen2.5-Max’

While the latest iteration of Qwen2.5-Max outperforms DeepSeek-V3 on security, the AI model lags behind its competition in several other areas.

Security | TechRepublic – ​Read More

Windows 11 Forces Microsoft Account Sign In & Removes Bypass Trick Option

Microsoft is killing the Windows 11 bypass trick — soon, all setups will require internet and a Microsoft Account, leaving privacy-conscious users with fewer options.

Security | TechRepublic – ​Read More

Critical Ivanti Flaw Actively Exploited to Deploy TRAILBLAZE and BRUSHFIRE Malware

Ivanti has disclosed details of a now-patched critical security vulnerability impacting its Connect Secure that has come under active exploitation in the wild.
The vulnerability, tracked as CVE-2025-22457 (CVSS score: 9.0), concerns a case of a stack-based buffer overflow that could be exploited to execute arbitrary code on affected systems.
“A stack-based buffer overflow in Ivanti Connect

The Hacker News – ​Read More