Latest Tech News

NIST Small Business Cybersecurity Webinar: Protecting Your Small Business from Phishing Risks (No image available)
Upcoming Event!

NIST Small Business Cybersecurity Webinar: Protecting Your Small Business from Phishing Risks

Phishing is one of the most common types of cyber crime. These scams use convincing emails or other messages, such as text messages or social media messages, to trick users into opening harmful links, downloading malicious software, or submitting
Iris Experts Group (IEG) Annual Meeting (No image available)
Upcoming Event!

Iris Experts Group (IEG) Annual Meeting

The Iris Experts Group is a forum for the discussion of technical questions of interest to USG agencies and their staff that are employing or may employ iris recognition to carry out their mission. This is the annual meeting. The presentations
CSF 2.0 Webinar Series: Deep-Dive into the CSF 2.0 Govern Function to Improve Cybersecurity (No image available)
Upcoming Event!

CSF 2.0 Webinar Series: Deep-Dive into the CSF 2.0 Govern Function to Improve Cybersecurity

One of the major updates to CSF 2.0 is the creation of the Govern Function, highlighting the importance of ensuring cybersecurity capabilities support the broader mission through Enterprise Risk Management (ERM). Governance is the process of
5th High-Performance Computing Security Workshop (No image available)
Upcoming Event!

5th High-Performance Computing Security Workshop

High-performance computing (HPC) systems provide fundamental computing infrastructure and play a pivotal role in economic competitiveness and scientific discovery. Security is an essential component of HPC. NIST HPC Security Working Group (WG) has
ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS. The IAB has been assessed with medium confidence to be a financially motivated threat actor, scanning for vulnerable systems and deploying a custom malware called LAGTOY (aka HOLERUN). "LAGTOY can be
Pete Hegseth’s Signal Scandal Spirals Out of Control (No image available)

Pete Hegseth’s Signal Scandal Spirals Out of Control

Plus: Cybercriminals stole a record-breaking fortune from US residents and businesses in 2024, and Google performs its final flip-flop in its yearslong quest to kill tracking cookies.
Windows 11's Recall AI is now rolling out on Copilot+ PCs (No image available)

Windows 11's Recall AI is now rolling out on Copilot+ PCs

Microsoft has confirmed that Windows Recall is rolling out to everyone with Windows 11 KB5055627 on Copilot+ PCs. [...]
Windows 11 KB5055627 update released with 30 new changes, fixes (No image available)

Windows 11 KB5055627 update released with 30 new changes, fixes

​​Microsoft has released the KB5055627 preview cumulative update for Windows 11 24H2 with many new features gradually rolling out, and some new bug fixes for everyone. [...]
Craft CMS RCE exploit chain used in zero-day attacks to steal data (No image available)

Craft CMS RCE exploit chain used in zero-day attacks to steal data

Two vulnerabilities impacting Craft CMS were chained together in zero-day attacks to breach servers and steal data, with exploitation ongoing, according to CERT Orange Cyberdefense. [...]
Marks & Spencer pauses online orders after cyberattack (No image available)

Marks & Spencer pauses online orders after cyberattack

British retailer giant Marks & Spencer (M&S) has suspended online orders while working to recover from a recently disclosed cyberattack. [...]
Mobile provider MTN says cyberattack compromised customer data (No image available)

Mobile provider MTN says cyberattack compromised customer data

African mobile giant MTN Group announced that a cybersecurity incident has compromised the personal information of some of its subscribers in certain countries. [...]
Windows "inetpub" security fix can be abused to block future updates (No image available)

Windows "inetpub" security fix can be abused to block future updates

A recent Windows security update that creates an 'inetpub' folder has introduced a new weakness allowing attackers to prevent the installation of future updates. [...]
Baltimore City Public Schools data breach affects over 31,000 people (No image available)

Baltimore City Public Schools data breach affects over 31,000 people

​Baltimore City Public Schools notified tens of thousands of employees and students of a data breach following an incident in February when unknown attackers hacked into its network. [...]
North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures

North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures

North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. "In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industry—BlockNovas LLC (blocknovas[.] com), Angeloper Agency (angeloper[.]com), and SoftGlide LLC (softglide[.]co)—to spread
SAP fixes suspected Netweaver zero-day exploited in attacks (No image available)

SAP fixes suspected Netweaver zero-day exploited in attacks

SAP has released out-of-band emergency NetWeaver updates to fix a suspected remote code execution (RCE) zero-day flaw actively exploited to hijack servers. [...]