Aggregator
Hacker steals record $1.46 billion from Bybit ETH cold wallet
США создаёт спецгруппу для контроля ИИ и криптовалют
China Claim That NSA Allegedly Hacked Northwestern Polytechnical University
Chinese cybersecurity authorities have alleged that the U.S. National Security Agency (NSA) breached Northwestern Polytechnical University (NPU), a leading institution in aerospace and defense research, in a multi-year cyber espionage campaign. According to joint reports published on February 18, 2025, by China’s National Computer Virus Emergency Response Center (CVERC) and cybersecurity firm Qihoo 360, the […]
The post China Claim That NSA Allegedly Hacked Northwestern Polytechnical University appeared first on Cyber Security News.
A Threat Actor Claims to be Selling VPN Access to an Unidentified Electronics Company in the USA
Apple Drops iCloud's Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands
Из жертвы в охотника: Япония кардинально меняет стратегию киберзащиты
Data Leak Exposes TopSec's Role in China’s Censorship-as-a-Service Operations
Akira
Investing.com Data Breach Exposes 6.5 Million User Accounts
Irans Largest Messaging App Nazdika Breached Exposing Private Conversations
Akira
Security and privacy concerns challenge public sector’s efforts to modernize
For most public sector organizations, digital transformation is a work in progress, with the complexity of integrating new systems and privacy and security concerns remaining key barriers, according to a report by SolarWinds. Only 6% of respondents report having fully completed their digital transformation journey, while most indicate they are somewhere along the journey, with efforts either well underway (41%) or beginning implementation in some areas with limited progress (42%). “As the public sector navigates … More →
The post Security and privacy concerns challenge public sector’s efforts to modernize appeared first on Help Net Security.
Rust rising: Navigating the ecosystem and adoption challenges
Rust continues to gain traction as a powerful programming language, balancing high performance with memory safety.
The post Rust rising: Navigating the ecosystem and adoption challenges appeared first on Security Boulevard.
DEF CON 32 – Incubated ML Exploits: Backdooring ML Pipelines With Input Handling Bugs
Authors/Presenters: Suha Hussain
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – Incubated ML Exploits: Backdooring ML Pipelines With Input Handling Bugs appeared first on Security Boulevard.
SecWiki News 2025-02-21 Review
CISA flags Craft CMS code injection flaw as exploited in attacks
ACRStealer Malware Exploiting Google Docs as C2 To Steal Login Credentials
A newly identified malware variant dubbed ACRStealer has been observed leveraging Google Docs as a command-and-control (C2) server to bypass traditional security defenses and harvest sensitive login credentials. This sophisticated attack vector exploits the trusted reputation of Google’s infrastructure to evade detection, marking a significant escalation in credential-theft campaigns. Cybersecurity firm ThreatSec disclosed the campaign […]
The post ACRStealer Malware Exploiting Google Docs as C2 To Steal Login Credentials appeared first on Cyber Security News.