Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Rubio Impersonator Signals Growing Security Threat From Deepfakes

An impostor who posed as the secretary of state in text and voice communications with diplomats and politicians demonstrates the increased sophistication of and national security threat posed by the AI technology.

DARKReading
Know Your Enemy: Understanding Dark Market Dynamics

To help counter crime, today's organizations require a cyber-defense strategy that incorporates the mindset of the cybercriminal.

SatanLock Next in Line for Ransomware Group Shutdowns

Though the victims list on its site has since been taken down, the group plans on leaking the rest of the files stolen from its victims.

South Korean Government Imposes Penalties on SK Telecom for Breach

Following a breach at the country's top mobile provider that exposed 27 million records, the South Korean government imposed a small monetary penalty but stiff regulatory requirements.

Unlock Security Operations Success With Data Analysis

From data fog to threat clarity: Automating security analytics helps security teams stop fighting phantoms and respond to what matters.

AI Trust Score Ranks LLM Security

Startup Tumeryk's AI Trust scorecard finds Google Gemini Pro 2.5 as the most trustworthy, with OpenAI's GPT-4o mini a close second and DeepSeek and Alibaba Qwen scoring lowest.

#google#alibaba
Microsoft Patches 137 CVEs in July, but No Zero-Days

Some 17 of the bugs are at high risk for exploits, including multiple remote code execution bugs in Office and SharePoint.

Malicious Open Source Packages Spike 188% YoY

Data exfiltration was the most common malware in Sonatype report, with more than 4,400 packages designed to steal secrets, personally identifiable information, credentials, and API tokens.

Suspected Hacker Linked to Silk Typhoon Arrested in Milan

The alleged Chinese state-sponsored hacker faces multiple charges, including wire fraud, aggravated identity theft, and unauthorized access to protected computers.

Hackers 'Shellter' Various Stealers in Red-Team Tool to Evade Detection

Researchers have uncovered multiple campaigns spreading Lumma, Arechclient2, and Rhadamanthys malware by leveraging key features of the AV/EDR evasion framework.