Malicious Chrome extensions can spoof password managers in new attack
Federal Contractor Cybersecurity Bill Passes House
The House of Representatives has passed a bill aimed at requiring federal contractors to have a Vulnerability Disclosure Policy (VDP).
The post Federal Contractor Cybersecurity Bill Passes House appeared first on SecurityWeek.
Nigerian Accused of Hacking Tax Preparation Firms Extradited to US
Matthew Akande was extradited to the US to face charges for his role in hacking into Massachusetts tax preparation firms’ networks.
The post Nigerian Accused of Hacking Tax Preparation Firms Extradited to US appeared first on SecurityWeek.
Financial Organizations Urge CISA to Revise Proposed CIRCIA Implementation
A group of financial organizations is asking CISA to rescind and reissue its proposed implementation of CIRCIA.
The post Financial Organizations Urge CISA to Revise Proposed CIRCIA Implementation appeared first on SecurityWeek.
Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution
The vulnerability, tracked as CVE-2025-25012, carries a CVSS score of 9.9 out of a maximum of 10.0. It has been described as a case of prototype pollution.
“Prototype pollution in Kibana leads to
BadBox Botnet Powered by 1 Million Android Devices Disrupted
A second iteration of the BadBox botnet that affected over one million Android devices has been partially disrupted.
The post BadBox Botnet Powered by 1 Million Android Devices Disrupted appeared first on SecurityWeek.
EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing
“EncryptHub has been observed targeting users of popular applications, by distributing trojanized versions,” Outpost24 KrakenLabs said in a new report shared with The
AIceberg Gets $10 Million in Seed Funding for AI Security Platform
AIceberg has launched a solution that helps governments and enterprises with the safe, secure and compliant adoption of AI.
The post AIceberg Gets $10 Million in Seed Funding for AI Security Platform appeared first on SecurityWeek.
Outsmarting Cyber Threats with Attack Graphs
This is where attack graphs come in. By mapping potential attack paths
