Latest Cybersecurity News

Real-time cybersecurity news aggregation: CVE alerts, malware analysis, ransomware updates, data breaches, AI security and threat intelligence from 50+ trusted sources.

U.S. DoJ Charges 12 Chinese Nationals in Massive State-Linked Cyber Espionage Campaign

The U.S. Department of Justice (DoJ) has charged 12 Chinese nationals, including government officers and hackers, for their roles in a global cyber espionage campaign. This coordinated effort involved data theft and suppression of dissent, targeting U.S. critics, Asian governments, and key U.S. agencies. The indictment reveals the intricate web of state-sponsored hacking and the U.S. response to safeguard national security.

#cybersecurity & data protection #chinese hackers #data theft

Read full article →

Webinar Learn How ASPM Transforms Application Security from Reactive to Proactive

Are you tired of dealing with outdated security tools that never seem to give you the full picture? You're not alone. Many organizations struggle with piecing together scattered information, leaving your apps vulnerable to modern threats. That's why we're excited to introduce a smarter, unified approach: Application Security Posture Management (ASPM). ASPM brings together the best of both worlds by combining proactive measures with reactive strategies to enhance your security posture.

#application security #cybersecurity #proactive measures

Read full article →

FBI Alerts: Cybercriminals Impersonate 'BianLian Group' to Extort Corporate Executives

The FBI's Internet Crime Complaint Center (IC3) has issued a critical alert about a data extortion scam targeting corporate executives. Cybercriminals, posing as the 'BianLian Group,' send threatening letters demanding payment to prevent the release of sensitive information. Learn how to protect your organization and report incidents to CISA.

#cybersecurity & data protection #data extortion #corporate executives

Read full article →

CISA Adds 8 Actively Exploited Vulnerabilities to KEV Catalog

CISA added 8 actively exploited vulnerabilities to its KEV Catalog, including flaws in PaperCut, JetBrains TeamCity, Kentico Xperience, Quest KACE, Synacor Zimbra, and Cisco Catalyst SD-WAN Manager. These vulnerabilities pose critical risks to federal and private networks, requiring immediate patching to prevent cyberattacks, data breaches, and unauthorized access.

CVEs: CVE-2023-27351, CVE-2024-27199, CVE-2025-2749, CVE-2025-32975, CVE-2025-48700

#cisa #kev catalog #cybersecurity #vulnerabilities #cve

Read full article →

Axios npm Supply Chain Attack: Malicious Package Drops Remote Access Trojan

A supply chain attack compromised versions 1.14.1 and 0.30.4 of the Axios npm package by injecting the malicious dependency '[email protected]', which deployed multi-stage payloads including a remote access trojan (RAT). This affects developers and organizations using the compromised Axios versions, potentially leading to unauthorized system access and data exfiltration. Immediate code audits and dependency reviews are critical to mitigate risks.

#axios #npm #supply-chain-attack #malware #remote-access-trojan

Read full article →

Belarus and European security: From a garage to a launchpad for Russia's military action?

• NewsAPI.org

Belarus and European security: From a garage to a launchpad for Russia's military action?

The Belarusian regime's reliance on Russian cyber and military support has led to deeper sovereignty loss, creating a vulnerable environment for state-sponsored cyber operations. This geopolitical shift affects European security by enabling Russia to use Belarus as a launchpad for military and cyber actions. The consolidation of authority in Belarus increases the risk of coordinated cyberattacks targeting critical infrastructure in Europe.

#RCE

Read full article →

agent-zoo 0.1.4

• NewsAPI.org

Security tool 'agent-zoo 0.1.4' introduces a new security harness for AI coding agents with potential TOML policy bypass and MITM proxy vulnerabilities. Organizations using AI-driven development tools like Claude Code or Codex CLI could face unauthorized access or policy manipulation. Immediate evaluation of affected deployments is advised.

#security #news

Read full article →