Latest Cybersecurity News and Articles


66% of CISOs are worried cybersecurity threats surpass their defenses

21 April 2025
While 21% of C-suite leaders currently invest more than 10% of their IT budget in cybersecurity, this number is expected to roughly double next year.

Kenzo Security Raises $4.5 Million for Agentic AI Security Operations Platform

21 April 2025
Kenzo Security has emerged from stealth mode after 18 months of developing its agentic AI security platform. The post Kenzo Security Raises $4.5 Million for Agentic AI Security Operations Platform appeared first on SecurityWeek.

Bot Traffic Surpasses Humans Online—Driven by AI and Criminal Innovation

21 April 2025
With 51% of internet traffic now bot-driven and a growing share of it malicious, organizations must prepare for an era of more evasive, AI-assisted automation. The post Bot Traffic Surpasses Humans Online—Driven by AI and Criminal Innovation appeared first on SecurityWeek.

Emails delivering infostealers rose by 84% year-over-year

21 April 2025
Malicious cyber actors are increasingly utilizing stealthier tactics. 

5 Reasons Device Management Isn't Device Trust​

21 April 2025
The problem is simple: all breaches start with initial access, and initial access comes down to two primary attack vectors – credentials and devices. This is not news; every report you can find on the threat landscape depicts the same picture.  The solution is more complex. For this article, we’ll focus on the device threat vector. The risk they pose is significant, which is why device

Countries Shore Up Their Digital Defenses as Global Tensions Raise the Threat of Cyberwarfare

21 April 2025
Countries around the world are preparing for greater digital conflict as increasing global tensions and a looming trade war have raised the stakes. The post Countries Shore Up Their Digital Defenses as Global Tensions Raise the Threat of Cyberwarfare appeared first on SecurityWeek.

⚡ THN Weekly Recap: iOS Zero-Days, 4Chan Breach, NTLM Exploits, WhatsApp Spyware & More

21 April 2025
Can a harmless click really lead to a full-blown cyberattack? Surprisingly, yes — and that’s exactly what we saw in last week’s activity. Hackers are getting better at hiding inside everyday actions: opening a file, running a project, or logging in like normal. No loud alerts. No obvious red flags. Just quiet entry through small gaps — like a misconfigured pipeline, a trusted browser feature,

Industry Moves for the week of April 21, 2025 - SecurityWeek

21 April 2025
Explore industry moves and significant changes in the industry for the week of April 21, 2025. Stay updated with the latest industry trends and shifts.

Lantronix Device Used in Critical Infrastructure Exposes Systems to Remote Hacking

21 April 2025
Lantronix’s XPort device is affected by a critical vulnerability that can be used for takeover and disruption, including in the energy sector. The post Lantronix Device Used in Critical Infrastructure Exposes Systems to Remote Hacking appeared first on SecurityWeek.

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

21 April 2025
Cybersecurity researchers have disclosed a surge in "mass scanning, credential brute-forcing, and exploitation attempts" originating from IP addresses associated with a Russian bulletproof hosting service provider named Proton66. The activity, detected since January 8, 2025, targeted organizations worldwide, according to a two-part analysis published by Trustwave SpiderLabs last week.  "Net

APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

20 April 2025
The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting diplomatic entities across Europe with a new variant of WINELOADER and a previously unreported malware loader codenamed GRAPELOADER. "While the improved WINELOADER variant is still a modular backdoor used in later stages, GRAPELOADER is a newly observed initial-stage tool

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

19 April 2025
Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as a popular Telegram bot library but harbor SSH backdoors and data exfiltration capabilities. The packages in question are listed below - node-telegram-utils (132 downloads) node-telegram-bots-api (82 downloads) node-telegram-util (73 downloads) According to supply chain

ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware

19 April 2025
ASUS has disclosed a critical security flaw impacting routers with AiCloud enabled that could permit remote attackers to perform unauthorized execution of functions on susceptible devices. The vulnerability, tracked as CVE-2025-2492, has a CVSS score of 9.2 out of a maximum of 10.0. "An improper authentication control vulnerability exists in certain ASUS router firmware series,"

The Shadow AI Surge: Study Finds 50% of Workers Use Unapproved AI Tools

18 April 2025
With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise. The post The Shadow AI Surge: Study Finds 50% of Workers Use Unapproved AI Tools appeared first on SecurityWeek.

Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States

18 April 2025
Cybersecurity researchers are warning of a "widespread and ongoing" SMS phishing campaign that's been targeting toll road users in the United States for financial theft since mid-October 2024. "The toll road smishing attacks are being carried out by multiple financially motivated threat actors using the smishing kit developed by 'Wang Duo Yu,'" Cisco Talos researchers Azim Khodjibaev, Chetan

Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader

18 April 2025
A new multi-stage attack has been observed delivering malware families like Agent Tesla variants, Remcos RAT, and XLoader. "Attackers increasingly rely on such complex delivery mechanisms to evade detection, bypass traditional sandboxes, and ensure successful payload delivery and execution," Palo Alto Networks Unit 42 researcher Saqib Khanzada said in a technical write-up of the campaign. The

Bill introduced to extend the Cybersecurity Information Sharing Act

18 April 2025
Security leaders share their thoughts on extending the Cybersecurity Information Sharing Act. 

In Other News: 4chan Hacked, Android Auto-Reboot, Nemesis Admin Charged

18 April 2025
Noteworthy stories that might have slipped under the radar: 4chan hacked, auto-reboot security feature coming to Android, Iranian administrator of Nemesis charged in US. The post In Other News: 4chan Hacked, Android Auto-Reboot, Nemesis Admin Charged appeared first on SecurityWeek.

Cy4Data Labs Raises $10 Million to Secure Data in Use

18 April 2025
Data protection firm Cy4Data Labs has raised $10 million in a Series A funding round led by Pelion Venture Partners. The post Cy4Data Labs Raises $10 Million to Secure Data in Use appeared first on SecurityWeek.

Live Events Giant Legends International Hacked

18 April 2025
Legends International says the personal information of employees and customers was compromised as a result of a cyberattack. The post Live Events Giant Legends International Hacked appeared first on SecurityWeek.