Latest Cybersecurity News and Articles


Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards

19 May 2025
Mozilla has released security updates to address two critical security flaws in its Firefox browser that could be potentially exploited to access sensitive data or achieve code execution. The vulnerabilities, both of which were exploited as a zero-day at Pwn2Own Berlin, are listed below - CVE-2025-4918 - An out-of-bounds access vulnerability when resolving Promise objects that could allow an

Spiking Neural Networks: Brain-Inspired Chips That Could Keep Your Data Safe

19 May 2025
Neuromorphic computing is moving from theory to reality, with brain-inspired processors offering real-time intelligence, low power consumption, and built-in privacy—ushering in a new era for edge devices and cybersecurity. The post Spiking Neural Networks: Brain-Inspired Chips That Could Keep Your Data Safe appeared first on SecurityWeek.

200,000 Harbin Clinic Patients Impacted by NRS Data Breach

19 May 2025
Harbin Clinic says the information of over 200,000 patients was stolen in a July 2024 data breach at Nationwide Recovery Services. The post 200,000 Harbin Clinic Patients Impacted by NRS Data Breach appeared first on SecurityWeek.

⚡ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More

19 May 2025
Cybersecurity leaders aren’t just dealing with attacks—they’re also protecting trust, keeping systems running, and maintaining their organization’s reputation. This week’s developments highlight a bigger issue: as we rely more on digital tools, hidden weaknesses can quietly grow.  Just fixing problems isn’t enough anymore—resilience needs to be built into everything from the ground up.

Prison Sentence for Man Involved in SEC X Account Hack

19 May 2025
Eric Council Jr. was sentenced to prison for hacking SEC’s official X account and publishing fraudulent posts increasing Bitcoin value. The post Prison Sentence for Man Involved in SEC X Account Hack appeared first on SecurityWeek.

Hackers Earn Over $1 Million at Pwn2Own Berlin 2025

19 May 2025
Pwn2Own participants demonstrated exploits against VMs, AI, browsers, servers, containers, and operating systems. The post Hackers Earn Over $1 Million at Pwn2Own Berlin 2025 appeared first on SecurityWeek.

Data Security Risk: Analysis of AI Tools Reveals 84% Breached

16 May 2025
84% of AI tools have been breached, suggesting enterprises using these tools (knowingly or unknowingly) may have data at risk. 

Google Warns UK Retailer Hackers Now Targeting US

16 May 2025
Google says the hacking group behind the recent cyberattacks on UK retailers is now shifting focus to the US. The post Google Warns UK Retailer Hackers Now Targeting US appeared first on SecurityWeek.

In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach

16 May 2025
A summary of noteworthy stories that might have slipped under the radar this week. The post In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach appeared first on SecurityWeek.

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors

16 May 2025
Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry, as well as technology companies and educational institutions in China. "Over the past few months, it has expanded aggressively, continuously leveraging infected devices to launch external attacks," NSFOCUS said in a report published this week. "By

From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth

16 May 2025
The 15th edition of NATO’s Locked Shields cyber defense exercise brought together 4,000 experts from 41 countries. The post From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth appeared first on SecurityWeek.

Top 10 Best Practices for Effective Data Protection

16 May 2025
Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly and data privacy regulations tightening, organizations must stay vigilant and proactive to safeguard their most valuable assets. But how do you build an effective data protection framework? In this article, we'll explore data protection best practices from meeting

Russian APT Exploiting Mail Servers Against Government, Defense Organizations

16 May 2025
Russia-linked APT28 has been exploiting mail server vulnerabilities against government and defense entities since September 2023. The post Russian APT Exploiting Mail Servers Against Government, Defense Organizations appeared first on SecurityWeek.

FBI Warns of Deepfake Messages Impersonating Senior Officials

16 May 2025
The FBI says former federal and state government officials are targeted with texts and AI-generated voice messages impersonating senior US officials. The post FBI Warns of Deepfake Messages Impersonating Senior Officials appeared first on SecurityWeek.

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

16 May 2025
Researchers at ETH Zürich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data from memory, showing that the vulnerability known as Spectre continues to haunt computer systems after more than seven years. The vulnerability, referred to as Branch Privilege Injection (BPI), "can be exploited to misuse the prediction

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

16 May 2025
Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT. "Threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents," Qualys security researcher Akshay Thorve said in a technical report. "The attack chain leverages mshta.exe for

[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

16 May 2025
Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late to cloud threats, and monitor SOC alerts only after damage is done. Attackers don’t wait. They exploit vulnerabilities within hours. Yet most organizations take days to respond to critical cloud alerts. That delay isn’t

Hackers Win $260,000 on First Day of Pwn2Own Berlin 2025

16 May 2025
Pwn2Own participants have earned tens of thousands of dollars for Red Hat, Windows, Oracle VirtualBox, Docker Desktop, and AI exploits. The post Hackers Win $260,000 on First Day of Pwn2Own Berlin 2025 appeared first on SecurityWeek.

Update on Marks & Spencer Cyberattack

16 May 2025
Marks & Spencer (M&S) has provided an update on the cyberattack it recently experienced. 

Credential Harvesting Becomes Top Retail Data Threat

16 May 2025
Cybercriminals target retail credentials.