Security News
Latest Updates

Stay informed with the latest security trends and insights...

Latest Articles

Explore the most recent articles on security topics.

1. Security News – 2025-08-31

Sun Aug 31 2025 00:00:00 GMT+0000 (Coordinated Universal Time)

No relevant security news found from the specified time periods matching the keywords.

2. Security News – 2025-08-30

Sat Aug 30 2025 00:00:00 GMT+0000 (Coordinated Universal Time)

Found 19 relevant security news items from the last 3 days (daily news) and 14 days (research blogs) across 6 sources (max 10 entries per source).

The Hacker News

Cybersecurity news and insights

Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling - August 30, 2025

Cybersecurity researchers have called attention to a cyber attack in which unknown threat actors deployed an open-source endpoint monitoring and digital forensic tool called Velociraptor, illustrating ongoing abuse of legitimate software for malicious purposes. “In this incident, the threat actor used the tool to download and execute Visual Studio Code with the likely intention of creating a

WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices - August 30, 2025

WhatsApp has addressed a security vulnerability in its messaging apps for Apple iOS and macOS that it said may have been exploited in the wild in conjunction with a recently disclosed Apple flaw in targeted zero-day attacks. The vulnerability, CVE-2025-55177 (CVSS score: 8.0), relates to a case of insufficient authorization of linked device synchronization messages. Internal researchers on the

Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution - August 29, 2025

Three new security vulnerabilities have been disclosed in the Sitecore Experience Platform that could be exploited to achieve information disclosure and remote code execution.  The flaws, per watchTowr Labs, are listed below -

CVE-2025-53693 - HTML cache poisoning through unsafe reflections CVE-2025-53691 - Remote code execution (RCE) through insecure deserialization CVE-2025-53694 -

Webinar: Learn How to Unite Dev, Sec, and Ops Teams With One Shared Playbook - August 29, 2025

Picture this: Your team rolls out some new code, thinking everything’s fine. But hidden in there is a tiny flaw that explodes into a huge problem once it hits the cloud. Next thing you know, hackers are in, and your company is dealing with a mess that costs millions. Scary, right? In 2025, the average data breach hits businesses with a whopping $4.44 million bill globally. And guess what? A big

SecurityWeek

Latest cybersecurity news

In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks - August 29, 2025

Noteworthy stories that might have slipped under the radar: communications of dozens of Iranian ships disrupted, only apps from verified developers will run on Android devices, and AI used across multiple phases of malicious attacks.

The post In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks appeared first on SecurityWeek.

The Hacker News

Cybersecurity news and insights

Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign - August 29, 2025

An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an espionage campaign to deliver several malware families, including C6DOOR and GTELAM, in attacks primarily targeting users across Eastern Asia. “Attackers employed sophisticated infection chains, such as hijacked software updates and fake cloud storage or login

SecurityWeek

Latest cybersecurity news

Google Confirms Workspace Accounts Also Hit in Salesforce–Salesloft Drift Data Theft Campaign - August 29, 2025

Google says the same OAuth token compromise that enabled Salesforce data theft also let hackers access a small number of Workspace accounts via the Salesloft Drift integration.

The post Google Confirms Workspace Accounts Also Hit in Salesforce–Salesloft Drift Data Theft Campaign appeared first on SecurityWeek.

TransUnion Data Breach Impacts 4.4 Million - August 29, 2025

The credit reporting firm did not name the third-party application involved in the incident, only noting that it was used for its US consumer support operations.

The post TransUnion Data Breach Impacts 4.4 Million appeared first on SecurityWeek.

Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions - August 29, 2025

State officials confirm ransomware forced office closures, disrupted services, and led to data theft, as Nevada works with CISA and law enforcement to restore critical systems.

The post Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions appeared first on SecurityWeek.

Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks - August 29, 2025

Storm-0501 has been leveraging cloud-native capabilities for data exfiltration and deletion, without deploying file-encrypting malware.

The post Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks appeared first on SecurityWeek.

Schneier on Security

Security news and analysis by Bruce Schneier

Baggage Tag Scam - August 29, 2025

I just heard about this:

There’s a travel scam warning going around the internet right now: You should keep your baggage tags on your bags until you get home, then shred them, because scammers are using luggage tags to file fraudulent claims for missing baggage with the airline.

First, the scam is possible. I had a bag destroyed by baggage handlers on a recent flight, and all the information I needed to file a claim was on my luggage tag. I have no idea if I will successfully get any money from the airline, or what form it will be in, or how it will be tied to my name, but at least the first step is possible...

The Hacker News

Cybersecurity news and insights

Can Your Security Stack See ChatGPT? Why Network Visibility Matters - August 29, 2025

Generative AI platforms like ChatGPT, Gemini, Copilot, and Claude are increasingly common in organizations. While these solutions improve efficiency across tasks, they also present new data leak prevention for generative AI challenges. Sensitive information may be shared through chat prompts, files uploaded for AI-driven summarization, or browser plugins that bypass familiar security controls.

Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page - August 29, 2025

Click Studios, the developer of enterprise-focused password management solution Passwordstate, said it has released security updates to address an authentication bypass vulnerability in its software. The high-severity issue, which is yet to be assigned a CVE identifier, has been addressed in Passwordstate 9.9 (Build 9972), released August 28, 2025. The Australian company said it fixed a “

FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available - August 29, 2025

The Sangoma FreePBX Security Team has issued an advisory warning about an actively exploited FreePBX zero-day vulnerability that impacts systems with an administrator control panel (ACP) exposed to the public internet. FreePBX is an open-source private branch exchange (PBX) platform widely used by businesses, call centers, and service providers to manage voice communications. It’s built on top

Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain - August 29, 2025

Authorities from the Netherlands and the United States have announced the dismantling of an illicit marketplace called VerifTools that peddled fraudulent identity documents to cybercriminals across the world. To that end, two marketplace domains (verif[.]tools and veriftools[.]net) and one blog have been taken down, redirecting site visitors to a splash page stating the action was undertaken by

Schneier on Security

Security news and analysis by Bruce Schneier

The UK May Be Dropping Its Backdoor Mandate - August 28, 2025

The US Director of National Intelligence is reporting that the UK government is dropping its backdoor mandate against the Apple iPhone. For now, at least, assuming that Tulsi Gabbard is reporting this accurately.

Trail of Bits Blog

Security research and insights from Trail of Bits

Intern projects that outlived the internship - August 28, 2025

Our business operations intern at Trail of Bits built two AI-powered tools that became permanent company resources—a podcast workflow that saves 1,250 hours annually and a Slack exporter that enables efficient knowledge retrieval across the organization.

Weaponizing image scaling against production AI systems - August 21, 2025

In this blog post, we’ll detail how attackers can exploit image scaling on Gemini CLI, Vertex AI Studio, Gemini’s web and API interfaces, Google Assistant, Genspark, and other production AI systems. We’ll also explain how to mitigate and defend against these attacks, and we’ll introduce Anamorpher, our open-source tool that lets you explore and generate these crafted images.

Marshal madness: A brief history of Ruby deserialization exploits - August 19, 2025

This post traces the decade-long evolution of Ruby Marshal deserialization exploits, demonstrating how security researchers have repeatedly bypassed patches and why fundamental changes to the Ruby ecosystem are needed rather than continued patch-and-hope approaches.

3. Security News – 2025-08-29

Fri Aug 29 2025 00:00:00 GMT+0000 (Coordinated Universal Time)

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years

China-linked APT ‘Salt Typhoon’ exploited known router flaws to maintain persistent access across telecom, government, and military networks, giving Beijing’s intelligence services global surveillance reach.

The post China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years appeared first on SecurityWeek.

CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry

CrowdStrike says the acquisition will bring valuable technology to enhance its Falcon Next-Gen SIEM.

The post CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry appeared first on SecurityWeek.

Webinar Today: Ransomware Defense That Meets Evolving Compliance Mandates

Join this live discussion to learn how organizations can strengthen ransomware defenses while staying ahead of tightening compliance requirements.

The post Webinar Today: Ransomware Defense That Meets Evolving Compliance Mandates appeared first on SecurityWeek.

With more than 4 million weekly downloads, the Nx build platform became the first known supply chain breach where hackers weaponized AI assistants for data theft.

The post Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack appeared first on SecurityWeek.

Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect

AI-powered phishing attacks leverage ConnectWise ScreenConnect for remote access, underscoring their sophistication.

The post Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect appeared first on SecurityWeek.

View All Security News

Upcoming Events

Check out the upcoming security conferences and webinars.

Security Tools

Discover the latest tools and resources for enhancing security.