
News

News From the Web

Cybersecurity News Latest news on cybersecurity, including data breaches, security vulnerabilities, cyberattacks, malware and phishing attacks, data privacy and compliance, cybersecurity conferences and more.
- Transport Solution Company Scania Confirms Cybersecurity Incidentby algerj@bnpmedia.com (Jordyn Alger) on 19 June 2025 at 16:00
Scania, a transport solution organization, has confirmed it faced a cybersecurity incident.
- From Retail to Insurance, Scattered Spider Changes Targetsby algerj@bnpmedia.com (Jordyn Alger) on 19 June 2025 at 13:00
Scattered Spider, who is believed to be responsible for several cyberattacks against the retail sector in recent months, has apparently shifted targets to the insurance sector.
- New Research: Multi-Stage Malware Attack on Python Package Index Discoveredby algerj@bnpmedia.com (Jordyn Alger) on 18 June 2025 at 12:00
Researchers have discovered that the Python Package Index (PyPI) has a malicious package in its repository.
- Washington Post Journalists Targeted in Cyberattackby algerj@bnpmedia.com (Jordyn Alger) on 17 June 2025 at 16:00
The Washington Post was the subject of a cyberattack.
- 170,000 Records Exposed in Real Estate Investment and Management Databaseon 17 June 2025 at 12:00
Research has identified an unencrypted, non-password-protected database containing 170,360 records.
- Fog Ransomware Group Uses Unconventional Toolset, New Research Findsby algerj@bnpmedia.com (Jordyn Alger) on 16 June 2025 at 09:00
The Fog ransomware group utilizes an uncommon toolset, including open-source pentesting utilities and an employee monitoring software.
- Former CIA Analyst Unlawfully Transmits National Defense Data, Sentenced to Prisonon 13 June 2025 at 16:00
A former CIA analyst was sentenced to three years and one month in prison for transmitting sensitive data.
- 40,000 IoT Security Cameras Are Exposed Onlineby algerj@bnpmedia.com (Jordyn Alger) on 13 June 2025 at 12:00
Research shows that more than 40,000 security cameras across the globe are exposed to the internet.
Biz & IT – Ars Technica Serving the Technologist since 1998. News, reviews, and analysis.
- Israel-tied Predatory Sparrow hackers are waging cyberwar on Iran’s financial systemby Andy Greenberg, WIRED.com on 19 June 2025 at 14:40
The hacker group has destroyed more than $90 million held at an Iranian crypto exchange.
- Address bar shows hp.com. Browser displays scammers’ malicious text anyway.by Dan Goodin on 18 June 2025 at 21:10
Microsoft, Apple, Bank of America, and many more sites all targeted.
- Scientists once hoarded pre-nuclear steel; now we’re hoarding pre-AI contentby Benj Edwards on 18 June 2025 at 11:15
Newly announced catalog collects pre-2022 sources untouched by ChatGPT and AI contamination.
- Cybersecurity takes a big hit in new Trump executive orderby Dan Goodin on 17 June 2025 at 21:33
Provisions on secure software, quantum–resistant crypto, and more are scrapped.
- OpenAI weighs “nuclear option” of antitrust complaint against Microsoftby Benj Edwards on 17 June 2025 at 16:26
WSJ report says OpenAI mulling federal complaint as Microsoft stalls restructuring plan.
- Vandals cut fiber-optic lines, causing outage for Spectrum Internet subscribersby Dan Goodin on 16 June 2025 at 20:15
The soaring price of copper makes networks tempting targets for thieves.
- Coming to Apple OSes: A seamless, secure way to import and export passkeysby Dan Goodin on 12 June 2025 at 20:26
Apple OSes will soon transfer passkeys seamlessly and securely across platforms.
- Hollywood studios target AI image generator in copyright lawsuitby Benj Edwards on 11 June 2025 at 18:58
Multiple-studio complaint cites AI image outputs as evidence of “bottomless pit of plagiarism.”
- With the launch of o3-pro, let’s talk about what AI “reasoning” actually doesby Benj Edwards on 11 June 2025 at 16:58
New studies reveal pattern-matching reality behind the AI industry’s reasoning claims.
- Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.by Dan Goodin on 10 June 2025 at 19:00
The publicly available exploits provide a near-universal way to bypass key protections.