by Syndicated News Feed | Oct 24, 2025 | IT Security
The Pwn2Own Ireland 2025 hacking competition has ended with security researchers collecting $1,024,750 in cash awards after exploiting 73 zero-day vulnerabilities. At Pwn2Own Ireland 2025, competitors targeted products in eight categories, including printers, network...
by Syndicated News Feed | Oct 24, 2025 | IT Security
Iran’s favorite muddy-footed cyberespionage crew is at it again, this time breaching more than 100 government entities across the Middle East and North Africa, according to researchers at Group-IB. The campaign, which began in August, used a compromised...
by Syndicated News Feed | Oct 23, 2025 | IT Security
Federal prosecutors have charged a former general manager of US government defense contractor L3Harris’s cyber arm Trenchant with selling secrets to an unidentified Russian buyer for $1.3 million. According to the Justice Department, Peter Williams stole seven...
by Syndicated News Feed | Oct 23, 2025 | IT Security
The Canadian outpost of retailer Toys R Us on Thursday notified customers that attackers accessed a database, stole some of their personal information, then posted the data online. In a Thursday breach disclosure notice emailed to affected customers and shared on...
by Syndicated News Feed | Oct 23, 2025 | IT Security
Today, Microsoft introduced Mico, a new and more personal avatar for the AI-powered Copilot digital assistant, which the company describes as human-centered. This new avatar is designed to be more supportive and empathetic, but will also push back when presented with...
by Syndicated News Feed | Oct 23, 2025 | IT Security
Google has taken down thousands of YouTube videos that were quietly spreading password-stealing malware disguised as cracked software and game cheats. Researchers at Check Point say the so-called “YouTube Ghost Network” hijacked and weaponized legitimate...
by Syndicated News Feed | Oct 22, 2025 | IT Security
State-sponsored Iranian hacker group MuddyWater has targeted more than 100 government entities in attacks that deployed version 4 of the Phoenix backdoor. The threat actor is also known as Static Kitten, Mercury, and Seedworm, and it typically targets government and...
by Syndicated News Feed | Oct 22, 2025 | IT Security
Security researchers collected $792,750 in cash after exploiting 56 unique zero-day vulnerabilities during the second day of the Pwn2Own Ireland 2025 hacking competition. Today’s highlight was Ken Gannon of Mobile Hacking Lab and Dimitrios Valsamaras of...
by Syndicated News Feed | Oct 22, 2025 | IT Security
Partner Content In a world where one wrong click can set off a catastrophic breach, organizations must control what their users have access to if they want to stop mission-critical assets from being leaked or stolen. Identity governance and administration (IGA) is as...
by Syndicated News Feed | Oct 22, 2025 | IT Security
A spearphishing attack that lasted a single day targeted members of the Ukrainian regional government administration and organizations critical for the war relief effort in Ukraine, including the International Committee of the Red Cross, UNICEF, and various NGOs....