Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Police Disrupt 'Cryptomixer,' Seize Millions in Crypto

Multiple European law enforcement agencies recently disrupted Cryptomixer, a service allegedly used by cybercriminals to launder ill-gotten gains from ransomware and other cyber activities.

DARKReading
Shai-hulud 2.0 Variant Threatens Cloud Ecosystem

The latest attack from the self-replicating npm-package poisoning worm can also steal credentials and secrets from AWS, Google Cloud Platform, and Azure.

#google#nodejs#aws
Digital Fraud at Industrial Scale: 2025 Wasn't Great

Advanced fraud attacks surged 180% in 2025 as cyber scammers used generative AI to churn out flawless IDs, deepfakes, and autonomous bots at levels never before seen.

'Dark LLMs' Aid Petty Criminals, But Underwhelm Technically

As in the wider world, AI is not quite living up to the hype in the cyber underground. But it's definitely helping low-level cybercriminals do competent work.

Prompt Injections Loom Large Over ChatGPT's Atlas Browser

It's the law of unintended consequences: equipping browsers with agentic AI opens the door to an exponential volume of prompt injections.

How Malware Authors Are Incorporating LLMs to Evade Detection

Cyberattackers are integrating large language models (LLMs) into malware, running prompts at runtime to evade detection and augment their code on demand.

Enterprises Aren't Confident They Can Secure Non-Human Identities (NHIs)

More than half of organizations surveyed aren't sure they can secure non-human identities (NHIs), underscoring the lag between the rollout of these identities and the tools to protect them.

Iran Exploits Cyber Domain to Aid Kinetic Strikes

The country deploys "cyber-enabled kinetic targeting" prior to — and following — real-world missile attacks against ships and land-based targets.

Advanced Security Isn't Stopping Ancient Phishing Tactics

New research reveals that sophisticated phishing attacks consistently bypass traditional enterprise security measures.

Cheap Hardware Module Bypasses AMD, Intel Memory Encryption

Researchers built an inexpensive device that circumvents chipmakers' confidential computing protections and reveals weaknesses in scalable memory encryption.