Cybersecurity researchers have uncovered that the Russian hacking group RomCom exploited a previously unknown flaw in WinRAR, tracked as CVE-2025-8088, in a series of zero-day attacks. The vulnerability was identified as a path traversal bug that enabled attackers to…
AWS successfully completed its 2024-25 NHS DSPT assessment
Amazon Web Services (AWS) is pleased to announce its successful completion of the NHS Data Security and Protection Toolkit (NHS DSPT) assessment audit and achieving a status of Standards Exceeded. The NHS DSPT is an assessment that allows organizations to…
IT Security News Hourly Summary 2025-08-19 18h : 3 posts
3 posts were published in the last hour 15:33 : Over a Million Healthcare Devices Hit by Cyberattack 15:33 : Profero Cracks DarkBit Ransomware Encryption After Israel-Iran Cyberattack Links 15:33 : New GodRAT Trojan Targets Trading Firms Using Steganography and…
Australian ISP iiNet Reports Data Breach, Customer Accounts Stolen
Australian ISP iiNet confirms data breach as hackers stole 280,000 email accounts, phone numbers and user data using… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Australian ISP…
New ClickFix Attack Deploys Fake BBC News Page and Fake Cloudflare Verification to Deceive Users
Cybersecurity researchers have uncovered a novel ClickFix attack variant that impersonates trusted BBC news content while leveraging counterfeit Cloudflare Turnstile verification interfaces to coerce users into executing malicious PowerShell commands. This campaign, detailed in recent analyses from sources like Cybersecurity…
10 open-source apps I recommend every Windows user download – for free
Open-source might not be the first thing you think of with Windows, but these free tools can seriously boost your productivity. This article has been indexed from Latest news Read the original article: 10 open-source apps I recommend every Windows…
UK Has Dropped Apple Backdoor Request, US Spy Chief Says
US Director of National Intelligence Tulsi Gabbard confirmed the news. This article has been indexed from Security | TechRepublic Read the original article: UK Has Dropped Apple Backdoor Request, US Spy Chief Says
Highly Sensitive Medical Cannabis Patient Data Exposed by Unsecured Database
Nearly a million records, which appear to be linked to a medical cannabis card company in Ohio, included Social Security numbers, government IDs, health conditions, and more. This article has been indexed from Security Latest Read the original article: Highly…
Siemens Desigo CC Product Family and SENTRON Powermanager
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services…
CISA Releases Four Industrial Control Systems Advisories
CISA released four Industrial Control Systems (ICS) advisories on August 19, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-231-01 Siemens Desigo CC Product Family and SENTRON Powermanager ICSA-25-231-02 Siemens Mendix SAML Module…
Siemens Mendix SAML Module
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services…
AI-powered stuffed animals: A good alternative for screen time?
Startups are ready to bring AI powered toys to the market as an alternative for screen time. But is that really progress? This article has been indexed from Malwarebytes Read the original article: AI-powered stuffed animals: A good alternative for…
UK Quietly Drops ‘Think of the Children’ Apple iCloud Crypto Crack Call
ADP E2EE vs. UK: Brits agree to change course, but Tim still shtum. The post UK Quietly Drops ‘Think of the Children’ Apple iCloud Crypto Crack Call appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Facial Recognition’s False Promise: More Sham Than Security
Despite the rapid integration of facial recognition technology (FRT) into daily life, its effectiveness is often overstated, creating a misleading picture of its true capabilities. While developers frequently tout accuracy rates as high as 99.95%, these figures are typically…
Google unveils new AI and cloud security capabilities at Security Summit
Google used its Cloud Security Summit 2025 today to introduce a wide range of updates aimed at securing AI innovation and strengthening enterprise defenses. The announcements span protections for AI agents, new tools for security operations centers, enhancements in cloud…
Weaponized Copyright Documents Used by Threat Actors to Target Key Employees with Noodlophile Stealer
The Noodlophile Stealer malware, initially uncovered in campaigns leveraging fake AI video generation platforms, has evolved into a targeted spear-phishing operation that weaponizes copyright infringement notices to infiltrate enterprises with substantial Facebook presences. This updated variant, active for over a…
This new C-suite role is more important than ever in the AI era – here’s why
Cisco’s chief customer experience officer explains the challenges and opportunities of this emerging role. This article has been indexed from Latest news Read the original article: This new C-suite role is more important than ever in the AI era –…
The best Apple TV VPNs of 2025: Expert tested and reviewed
You can securely stream your favorite Apple TV shows and movies without drastic speed loss. ZDNET has tested and ranked the best VPN solutions you can use. This article has been indexed from Latest news Read the original article: The…
iPhone users may finally be able to send encrypted texts to Android friends with iOS 26
The ability to encrypt texts between iPhones and Android devices may be coming soon. This article has been indexed from Latest news Read the original article: iPhone users may finally be able to send encrypted texts to Android friends with…
I tested Sony’s new premium gaming headphones, and can’t go back to boring audio
Sony’s new InZone H9 II gaming headphones have fantastic spatial audio and ANC, with some quality-of-life features gamers will appreciate. This article has been indexed from Latest news Read the original article: I tested Sony’s new premium gaming headphones, and…
Workday Hit by Social Engineering Attack, Third-Party Data Exposed
Workday’s recent data breach might be tied to ShinyHunters, a group accused of exploiting Salesforce CRM at firms like Google, Adidas, Qantas, and Louis Vuitton. This article has been indexed from Security | TechRepublic Read the original article: Workday Hit…
North Korean Kimsuky Hackers Leveraged GitHub to Attack Foreign Embassies with XenoRAT Malware
A sophisticated espionage campaign targeting diplomatic missions in South Korea has exposed the evolving tactics of North Korean state-sponsored hackers. Between March and July 2025, threat actors linked to the notorious Kimsuky group conducted at least 19 spear-phishing attacks against…
MCDonald’s Free Nuggets Hack Leads to Expose of Confidential Data
A series of alarming vulnerabilities in McDonald’s digital infrastructure, from free food exploits to exposed executive data. What started as a simple app glitch developed into a months-long trial, culminating in the researcher, BobDaHacker, cold-calling the company’s headquarters while mentioning…
Threat Actors Attacking Organizations Key Employees With Weaponized Copyright Documents to Deliver Noodlophile Stealer
A sophisticated phishing campaign has emerged targeting enterprises with significant social media footprints, leveraging weaponized copyright infringement notices to deliver the evolved Noodlophile Stealer malware. This highly targeted threat represents a significant escalation from previous iterations, exploiting enterprises’ reliance on…