Russia jails hacker for two years over cyberattack on local tech company

A Russian citizen has been sentenced to two years in a penal colony for launching a distributed denial-of-service (DDoS) attack against a local tech company.

The Record from Recorded Future News – ​Read More

State Bar of Texas Says Personal Information Stolen in Ransomware Attack

The State Bar of Texas is notifying thousands of individuals that their personal information was stolen in a February ransomware attack.

The post State Bar of Texas Says Personal Information Stolen in Ransomware Attack appeared first on SecurityWeek.

SecurityWeek – ​Read More

Trump fires head of National Security Agency and Cyber Command

Haugh’s firing has seemingly caught senior lawmakers by surprise

Security News | TechCrunch – ​Read More

Lawmakers seek to close loophole limiting Secret Service investigations into cyber laundering

Two U.S. senators reintroduced legislation on Thursday that would address limits on the ability of the Secret Service to investigate efforts to launder money made through cybercrime.

The Record from Recorded Future News – ​Read More

Secure Communications Evolve Beyond End-to-End Encryption

Signal, Wickr, WhatsApp, and Cape all have different approaches to security and privacy, yet most are finding ways to make secure communications more private.

darkreading – ​Read More

Critical Apache Parquet Vulnerability Leads to Remote Code Execution

A critical vulnerability in Apache Parquet can be exploited to execute arbitrary code remotely, leading to complete system compromise.

The post Critical Apache Parquet Vulnerability Leads to Remote Code Execution appeared first on SecurityWeek.

SecurityWeek – ​Read More

Oracle Confirms Cloud Hack

Oracle has confirmed suffering a data breach but the tech giant is apparently trying to downplay the impact of the incident.

The post Oracle Confirms Cloud Hack appeared first on SecurityWeek.

SecurityWeek – ​Read More

Have We Reached a Distroless Tipping Point?

There’s a virtuous cycle in technology that pushes the boundaries of what’s being built and how it’s being used. A new technology development emerges and captures the world’s attention. People start experimenting and discover novel applications, use cases, and approaches to maximize the innovation’s potential. These use cases generate significant value, fueling demand for the next iteration of

The Hacker News – ​Read More

Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack

Evidence shows a SpotBugs token compromised in December 2024 was used in the March 2025 GitHub Actions supply chain attack.

The post Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack appeared first on SecurityWeek.

SecurityWeek – ​Read More

North Korean Hackers Disguised as IT Workers Targeting UK, European Companies, Google Finds

The attackers pose as legitimate remote IT workers, looking to both generate revenue and access sensitive company data through employment. “Europe needs to wake up fast,” according to Google’s Jamie Collier.

Security | TechRepublic – ​Read More