16 Sep

Self-propagating worm fuels latest npm supply chain compromise

The npm platform is the target of another supply chain attack, with crims already compromising 187 packages and counting. According to Charlie Eriksen, malware researcher

Author rabih
16 Sep

‘FileFix’ attacks use fake Facebook security alerts to trick victims into running infostealers

An attack called FileFix is masquerading as a Facebook security alert before ultimately dropping the widely used StealC infostealer and malware downloader. FileFix is a

Author rabih
16 Sep

HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality 16 Sep 2025 ESET researchers have uncovered a new

Author rabih
16 Sep

JLR stuck in neutral as losses skyrocket amid cyberattack cleanup

Jaguar Land Rover (JLR) has announced a further extension to its multi-site global shutdown, bringing its cyber-related downtime to nearly four weeks. The carmaker said

Author rabih
16 Sep

China slaps 1-hour deadline on reporting serious cyber incidents

Beijing will soon expect Chinese network operators to ‘fess up to serious cyber incidents within an hour of spotting them – or risk penalties for

Author rabih
15 Sep

Careless engineer stored recovery codes in plaintext, got whole org pwned

Failing to encrypt sensitive data leaves you wide open to attack. During the recent SonicWall attack spree, intruders bypassed multi-factor authentication (MFA) in at least

Author rabih
15 Sep

Security begins with visibility: How IGA brings hidden access risks to light

Partner Content From the moment users log onto their machines, access rights shape their experience. Access rights determine which apps they can run, which directories

Author rabih
15 Sep

Former FinWise employee may have accessed nearly 700K customer records

A US fintech biz is writing to nearly 700,000 customers because a former employee may have accessed or acquired their data after leaving the company.

Author rabih
15 Sep

Nork snoops whip up fake South Korean military ID with help from ChatGPT

North Korean spies used ChatGPT to generate a fake military ID for use in an espionage campaign against a South Korean defense-related institution, according to

Author rabih
15 Sep

China turns the screws on Nvidia with antitrust probe

China has dealt Nvidia another blow, finding the chipmaker in violation of the country’s anti-monopoly Law and escalating a long-running regulatory headache into a full

Author rabih
15 Sep

Jaguar Land Rover supply chain workers must get Covid-style support, says union

The UK’s chief automotive workers’ union is calling on the government to establish a Covid-esque furlough scheme for the thousands of individuals who face losing

Author rabih
15 Sep

UK Lords take aim at Ofcom’s ‘child-protection’ upgrades to Online Safety Act

The House of Lords is about to put the latest child-protection plans of UK regulator the Office of Communications (Ofcom) under the microscope. On Tuesday,

Author rabih
15 Sep

Cyber-scam camp operators shift operations to vulnerable countries as sanctions strike

Criminals appear to be moving cyber-scam centers to vulnerable countries. The United Nations Office on Drugs and Crime (UNDOC) last week warned it had found

Author rabih
14 Sep

15 ransomware gangs ‘go dark’ to enjoy ‘golden parachutes’

Infosec In Brief 15 ransomware gangs, including Scattered Spider and Lapsus$, have announced that they are going dark, and say no more attacks will be

Author rabih
14 Sep

15 ransomware gangs ‘go dark’ to enjoy ‘golden parachutes’

Infosec In Brief 15 ransomware gangs, including Scattered Spider and Lapsus$, have announced that they are going dark, and say no more attacks will be

Author rabih
14 Sep

Data destruction done wrong could cost your company millions

With the end of Windows 10’s regular support cycle fast approaching, and a good five years since the COVID pandemic spurred a wave of hardware

Author rabih
12 Sep

HybridPetya: More proof that Secure Boot bypasses are not just an urban legend

A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot on unrevoked Windows

Author rabih
12 Sep

Samsung fixes Android 0-day that may have been used to spy on WhatsApp messages

Samsung has fixed a critical flaw that affects its Android devices – but not before attackers found and exploited the bug, which could allow remote

Author rabih
Load moreLoadingAll items loaded