Latest Cybersecurity News and Articles


ANU investigates possible hack after vice-chancellor’s account liked ‘highly offensive’ LinkedIn posts

04 June 2025
ANU investigates possible hack after vice-chancellor’s account liked ‘highly offensive’ LinkedIn posts University spokesperson says Genevieve Bell’s account had ‘liked’ posts she had never seen before about Julie Bishop and GazaGet our breaking news email, free app or daily news podcastThe Australian National University (ANU) has contacted authorities about a possible hacking incident after its vice-chancellor’s account liked a number of “highly offensive” LinkedIn posts about Gaza and Julie Bishop.One of the posts liked by Genevieve Bell’s account was an inflammatory post about Gaza, while another made negative comments about Bishop, the ANU chancellor and a former foreign minister.Sign up for Guardian Australia’s breaking news email Continue reading...

Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App

04 June 2025
Google has disclosed details of a financially motivated threat cluster that it said "specialises" in voice phishing (aka vishing) campaigns designed to breach organizations' Salesforce instances for large-scale data theft and subsequent extortion. The tech giant's threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with

Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers

04 June 2025
A financially motivated threat actor employing vishing to compromise Salesforce customers, and extort them. The post Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers appeared first on SecurityWeek.

Going Into the Deep End: Social Engineering and the AI Flood

04 June 2025
AI is transforming the cybersecurity landscape—empowering attackers with powerful new tools while offering defenders a chance to fight back. But without stronger awareness and strategy, organizations risk falling behind. The post Going Into the Deep End: Social Engineering and the AI Flood appeared first on SecurityWeek.

Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads

04 June 2025
Threat hunters are calling attention to a new variant of a remote access trojan (RAT) called Chaos RAT that has been used in recent attacks targeting Windows and Linux systems. According to findings from Acronis, the malware artifact may have been distributed by tricking victims into downloading a network troubleshooting utility for Linux environments. "Chaos RAT is an open-source RAT written in

Your SaaS Data Isn't Safe: Why Traditional DLP Solutions Fail in the Browser Era

04 June 2025
Traditional data leakage prevention (DLP) tools aren't keeping pace with the realities of how modern businesses use SaaS applications. Companies today rely heavily on SaaS platforms like Google Workspace, Salesforce, Slack, and generative AI tools, significantly altering the way sensitive information is handled. In these environments, data rarely appears as traditional files or crosses networks

Compyl Raises $12 Million for GRC Platform

04 June 2025
Compyl has raised $12 million in a Series A funding round that will be invested in go-to-market initiatives, hirings, and GRC platform expansion. The post Compyl Raises $12 Million for GRC Platform appeared first on SecurityWeek.

Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift

04 June 2025
Industrial giant Honeywell has published its 2025 Cybersecurity Threat Report with information on the latest trends. The post Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift appeared first on SecurityWeek.

Webinar Today: Redefining Vulnerability Management With Exposure Validation

04 June 2025
Learn why your security controls matter more than theoretical risk scores and how exposure validation helps slash massive patch lists down to the few vulnerabilities that truly demand action. The post Webinar Today: Redefining Vulnerability Management With Exposure Validation appeared first on SecurityWeek.

ThreatSpike Raises $14 Million in Series A Funding

04 June 2025
End-to-end cybersecurity provider ThreatSpike has raised $14 million in a Series A funding round led by Expedition Growth Capital, after being bootstrapped for 14 years. Founded in 2011, the London-based firm provides real-time detection and response and penetration testing capabilities in a single, unified platform that delivers enterprise-grade cybersecurity to mid-sized businesses. According to ThreatSpike, […] The post ThreatSpike Raises $14 Million in Series A Funding appeared first on SecurityWeek.

Victoria’s Secret Says It Will Postpone Earnings Report After Recent Security Breach

04 June 2025
Victoria’s Secret is postponing the release of its quarterly earnings following a security breach that disrupted the popular lingerie brand’s corporate operations. The post Victoria’s Secret Says It Will Postpone Earnings Report After Recent Security Breach appeared first on SecurityWeek.

Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks

04 June 2025
Several malicious packages have been uncovered across the npm, Python, and Ruby package repositories that drain funds from cryptocurrency wallets, erase entire codebases after installation, and exfiltrate Telegram API tokens, once again demonstrating the variety of supply chain threats lurking in open-source ecosystems. The findings come from multiple reports published by Checkmarx,

Thousands Hit by The North Face Credential Stuffing Attack

04 June 2025
Threat actors steal personal information from thenorthface.com user accounts in a recent credential stuffing campaign. The post Thousands Hit by The North Face Credential Stuffing Attack appeared first on SecurityWeek.

35,000 Solar Power Systems Exposed to Internet

04 June 2025
Researchers from Forescout have analyzed the prevalence of internet-exposed solar power devices and shared a list of the top vendors and devices. The post 35,000 Solar Power Systems Exposed to Internet appeared first on SecurityWeek.

HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass

04 June 2025
Hewlett Packard Enterprise (HPE) has released security updates to address as many as eight vulnerabilities in its StoreOnce data backup and deduplication solution that could result in an authentication bypass and remote code execution. "These vulnerabilities could be remotely exploited to allow remote code execution, disclosure of information, server-side request forgery, authentication bypass,

Trustifi Raises $25 Million for AI-Powered Email Security

04 June 2025
Trustifi has raised $25 million in Series A funding to accelerate its product roadmap and go-to-market initiatives. The post Trustifi Raises $25 Million for AI-Powered Email Security appeared first on SecurityWeek.

The UK Brings Cyberwarfare Out of the Closet

03 June 2025
The UK’s 2025 Strategic Defence Review outlines a unified approach to modern warfare, integrating cyber, AI, and electromagnetic capabilities across military domains. The post The UK Brings Cyberwarfare Out of the Closet appeared first on SecurityWeek.

Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack

03 June 2025
Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting users into executing malicious PowerShell scripts on their machines and infect them with the NetSupport RAT malware. The DomainTools Investigations (DTI) team said it identified "malicious multi-stage downloader Powershell scripts" hosted on lure websites that masquerade as Gitcode and DocuSign. "

Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones

03 June 2025
Mikko Hypponen has joined the Finnish anti-drone company Sensofusion as Chief Research Officer after three decades of fighting malware. The post Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones appeared first on SecurityWeek.

Why Scamming Can’t Be Stopped—But It Can Be Managed

03 June 2025
With crime-as-a-service lowering the barrier to entry and prosecution lagging behind, enterprise security teams must rethink their strategies to detect and disrupt scams at scale. The post Why Scamming Can’t Be Stopped—But It Can Be Managed appeared first on SecurityWeek.