Data Security News
The Hacker News
- FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operationsby [email protected] (The Hacker News)
Threat hunters have shed light on a "sophisticated and evolving malware toolkit" called Ragnar Loader that's used by various cybercrime and […]
- Microsoft Warns of Malvertising Campaign Infecting Over 1 Million Devices Worldwideby [email protected] (The Hacker News)
Microsoft has disclosed details of a large-scale malvertising campaign that's estimated to have impacted over one million devices globally as part of […]
- Webinar: Learn How ASPM Transforms Application Security from Reactive to Proactiveby [email protected] (The Hacker News)
Are you tired of dealing with outdated security tools that never seem to give you the full picture? You’re not alone. Many organizations struggle […]
- What PCI DSS v4 Really Means – Lessons from A&F Compliance Journeyby [email protected] (The Hacker News)
Access on-demand webinar here Avoid a $100,000/month Compliance Disaster March 31, 2025: The Clock is Ticking. What if a single overlooked script […]
- This Malicious PyPI Package Stole Ethereum Private Keys via Polygon RPC Transactionsby [email protected] (The Hacker News)
Cybersecurity researchers have discovered a malicious Python package on the Python Package Index (PyPI) repository that's equipped to steal a […]
- U.S. Secret Service Seizes Russian Garantex Crypto Exchange Websiteby [email protected] (The Hacker News)
A coalition of international law enforcement agencies has seized the website associated with the cryptocurrency exchange Garantex ("garantex[.]org"), […]
- Safe{Wallet} Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heistby [email protected] (The Hacker News)
Safe{Wallet} has revealed that the cybersecurity incident that led to the Bybit $1.5 billion crypto heist is a "highly sophisticated, state-sponsored […]
- PHP-CGI RCE Flaw Exploited in Attacks on Japan's Tech, Telecom, and E-Commerce Sectorsby [email protected] (The Hacker News)
Threat actors of unknown provenance have been attributed to a malicious campaign predominantly targeting organizations in Japan since January 2025. […]
Graham Cluley Blog
- Smashing Security podcast #407: HP’s hold music, and human traffickingby Graham Cluley
Journey with us to Myanmar's shadowy scam factories, where trafficked workers are forced to run romance-baiting and fake tech support scams, and find […]
- Cactus ransomware: what you need to knowby Graham Cluley
Cactus is a ransomware-as-a-service (RaaS) group that encrypts victim's data and demands a ransom for a decryption key. Read more about it in my […]
- Fake police call cryptocurrency investors to steal their fundsby Graham Cluley
Have you had a phone call from police about your cryptocurrency wallet? Be on your guard - you could be about to be scammed. Read more in my […]
- The AI Fix #40: ChatGPT saved my life, and making evil AIs by accidentby Graham Cluley
In episode 40 of the AI Fix, Graham meets a shape-shifting GOAT, a robot dog gets wet, Mark likes Claude 3.7 Sonnet, OpenAI releases its dullest […]
- CISA refutes claims it has been ordered to stop monitoring Russian cyber threatsby Graham Cluley
It's been a confusing few days in the world of American cybersecurity... Read more in my article on the Hot for Security blog.
- Stop targeting Russian hackers, Trump administration orders US Cyber Commandby Graham Cluley
The Trump administration has told US cyber command and CISA to stop following or reporting on Russian cyber threats. Yes, Russia! That country […]
- Warning issued as hackers offer firms fake cybersecurity audits to break into their systemsby Graham Cluley
Companies are being warned that malicious hackers are using a novel technique to break into businesses - by pretending to offer audits of the […]
- Smashing Security podcast #406: History’s biggest heist just happened, and online abuseby Graham Cluley
In episode 406 of the "Smashing Security" podcast, we explore how the cryptocurrency exchange Bybit has been hacked to the jaw-dropping tune of $1.5 […]
Infosecurity Magazine
- Ransomware Groups Favor Repeatable Access Over Mass Vulnerability Exploits
Travelers found that ransomware groups are focusing on targeting weak credentials on VPN and gateway accounts for initial access, marking a shift […]
- Majority of Orgs Hit by AI Cyber-Attacks as Detection Lags
AI-driven cyberattacks are rapidly escalating, with a vast majority of security professionals reporting encounters and anticipating a surge, while […]
- Medusa Ransomware Claims 40+ Victims in 2025, Confirmed Healthcare Attacks
Symantec found that Medusa has listed almost 400 victims on its data leaks site since early 2023, demanding ransom payments as high as $15m
- Vulnerability in Chaty Pro Plugin Exposes 18,000 WordPress Sites
An arbitrary file upload vulnerability in the Chaty Pro plugin has been identified, affecting 18,000 WordPress sites
- Attackers Target Japanese Firms with Cobalt Strike
Attackers are actively exploiting an RCE flaw in Windows PHP-CGI implementations to target Japanese firms, deploying Cobalt Strike for persistence
- Cybersecurity Job Satisfaction Plummets, Women Hit Hardest
Layoffs and cutbacks have been cited as major factors in a significant drop in job satisfaction among women working in cybersecurity, according to […]
- Six Critical Infrastructure Sectors Failing on NIS2 Compliance
Enisa identifies six sectors that it says must improve on NIS2 compliance
- US Charges Members of Chinese Hacker-for-Hire Group i-Soon
The DoJ has charged Chinese government and i-Soon employees for a series of for-profit data theft campaigns
Dark Reading News
- How Cyberattacks Affect Your Staffby Chris Butler
Businesses have a responsibility to safeguard their workforce, which is best achieved by preparing and equipping the whole organization to better […]
- Intel Maps New vPro Chips to MITRE's ATT&CK Frameworkby Agam Shah
The PC Security Stack Mappings project improves the security posture of corporate PCs by aligning each of the security features found in vPro PC and […]
- Armis Acquires Otorio to Expand OT Exposure Management Platformby Jeffrey Schwartz
Armis will integrate Otorio's Titan platform with its cloud-based Centrix, bringing an on-premises option to the cloud-only offering.
- 'EncryptHub' OPSEC Failures Reveal TTPs & Big Plansby Nate Nelson, Contributing Writer
Is EncryptHub the most prolific cybercriminal in recent history? Or, as new information suggests, a bumbling amateur?
- Under Pressure: US Charges China's APT-for-Hire Hackersby Alexander Culafi, Senior News Writer, Dark Reading
The US Justice Department on Wednesday announced charges against members of the Chinese-backed i-Soon "secret" APT and APT27, the latter implicated […]
- Women Faced the Brunt of Cybersecurity Cutbacks in 2024by Kristina Beek, Associate Editor, Dark Reading
Many women are finding that they are unhappy in their cybersecurity roles, largely due to the layoffs their companies are experiencing, cutbacks, and […]
- Enterprise AI Through a Data Security Lens: Balancing Productivity With Safetyby Adam Strange
Recently, 57 countries signed an agreement pledging an "open" and "inclusive" approach to AI's development. The US and UK were not among them, with […]
- CISA Cuts: A Dangerous Gamble in a Dangerous Worldby Steve Durbin
The Cybersecurity and Infrastructure Security Agency's role in risk management needs to expand, not shrink.