Microsoft to Enforce MFA for Azure Command-Line Tools Starting October 2025
Markus Kasanmascheff / winbuzzer - Microsoft will mandate Multi-Factor Authentication (MFA) for Azure CLI, PowerShell, and APIs starting Oct 1, 2025, to enhance security for developers.The post Microsoft to Enforce MFA for Azure Command-Line Tools Starting October 2025 appeared first on Wi…
Back to Top / Friday, August 29, 2025, 1:21 pm / permalink 13400 / 2 stories in 6 months
FBI, Dutch cops seize fake ID marketplace that sold identity docs for $9
Jessica Lyons / theregister - $6.4M VerifTools marketplace offline The FBI and Dutch police today said that they seized two domains and a blog tied to VerifTools, an international criminal marketplace that sold identity documents for as little as $9.…
Back to Top / Thursday, August 28, 2025, 3:21 pm / permalink 13328 / 2 stories in 6 months
High-severity vulnerability in Passwordstate credential manager. Patch now.
Dan Goodin / arstechnica - Vulnerability can be exploited to gain access to customers' crown jewels.
Back to Top / Thursday, August 28, 2025, 2:21 pm / permalink 13317 / 2 stories in 6 months
New research shows passkeys can be hijacked through malicious extensions
Duncan Riley / siliconangle - A new report out today from browser security company SquareX Ltd. reveals a critical flaw in passkeys, the widely promoted alternative to passwords, that could allow attackers to hijack accounts across banking, e-commerce and enterprise software-as-a-serv…
Back to Top / Thursday, August 28, 2025, 9:20 am / permalink 13275 / 2 stories in 6 months
TransUnion admits 4.5M affected after third-party support app breached
Connor Jones / theregister - Credit agency offers own services as compensation Credit scoring and monitoring biz TransUnion says that it recently suffered a breach affecting nearly 4.5 million individuals.…
Back to Top / Thursday, August 28, 2025, 9:20 am / permalink 13273 / 7 stories in 6 months
Covert Influence Operations in Greenland Exposed
Diplomatic tensions spiked after Danish officials summoned a U.S. diplomat amid revelations that individuals tied to Trump were allegedly orchestrating covert influence operations in Greenland. The episode has stirred international eyebrows and left policy watchers bemused by these clandestine maneuvers.
Back to Top / Wednesday, August 27, 2025, 5:21 pm / permalink 13243 / 1 stories in 6 months
FBI says China’s Salt Typhoon hacked at least 200 US companies
Zack Whittaker / techcrunch - The FBI's cyber chief says the long-running China-backed hacking campaign is "ongoing" and affecting companies all over the world.
Back to Top / Wednesday, August 27, 2025, 3:21 pm / permalink 13224 / 3 stories in 6 months
The intruder is in the house: Storm-0501 attacked Azure, stole data, demanded payment via Teams
Jessica Lyons / theregister - Don't let it happen to you Storm-0501, a financially motivated cybercrime crew, recently broke into a large enterprise's on-premises and cloud environments, ultimately exfiltrating and destroying data within the org's Azure environment. The criminals then…
Back to Top / Wednesday, August 27, 2025, 12:21 pm / permalink 13203 / 3 stories in 6 months
Anthropic Cybersecurity Team Warns ‘Agentic AI Has Been Weaponized’
PYMNTS / pymnts - Anthropic is warning of the growing use of artificial intelligence (AI) in cybercrime. “Agentic AI has been weaponized,” the company wrote Wednesday (Aug. 27) in an announcement accompanying its Threat Intelligence report. “AI models are now being used to…
Back to Top / Wednesday, August 27, 2025, 10:22 am / permalink 13186 / 8 stories in 6 months
The first AI-powered ransomware has been discovered — "PromptLock" uses local AI to foil heuristic detection and evade API tracking
tomshardware - Security firm ESET has discovered a new type of ransomware that uses a local AI model to generate malicious scripts and perform other illicit activities. Because of the variance of LLM output, this malware is harder to track than traditional attacks.
Back to Top / Tuesday, August 26, 2025, 5:21 pm / permalink 13150 / 2 stories in 6 months
Nevada closes state offices as cyberattack disrupts IT systems
Lawrence Abrams / bleepingcomputer - Nevada remains two days into a cyberattack that began early Sunday, disrupting government websites, phone systems, and online platforms, and forcing all state offices to close on Monday. [...]
Back to Top / Tuesday, August 26, 2025, 1:21 pm / permalink 13122 / 2 stories in 6 months
Cloudflare introduces tools to manage AI risks and protect data
Wayne Williams / betanews - Cloudflare has launched new Zero Trust tools in its Cloudflare One platform to help businesses adopt artificial intelligence securely at scale. The features aim to give organizations better visibility into how AI is used, as well as protection from unappr…
Back to Top / Monday, August 25, 2025, 10:21 am / permalink 13021 / 3 stories in 6 months
Brave: Perplexity’s Comet obeyed hidden prompts, exposing logged-in accounts
Marcus Schuler / implicator - Brave discovered Perplexity's AI browser executes hidden malicious commands from web pages, bypassing decades of security protections. As every major browser adds AI agents, enterprises rush to buy secure alternatives.
Back to Top / Monday, August 25, 2025, 9:21 am / permalink 13017 / 5 stories in 6 months
Apple Sues Ex-Employee Who Allegedly Stole Apple Watch Secrets for Chinese Rival Oppo
Juli Clover / macrumors - Apple today filed a lawsuit in Northern California against Chen Shi, a former employee who left Apple and took a job at Chinese smartphone maker Oppo. According to Apple, Shi stole trade secrets relating to Apple Watch development and provided the informa…
Back to Top / Friday, August 22, 2025, 3:20 pm / permalink 12915 / 5 stories in 6 months
Arch Linux continues to feel the force of a DDoS attack after two brutal weeks — attackers yet to be identified as project struggles to restore full service
tomshardware - The Arch Linux project team are working to mitigate the impact, while keeping details of who, why and how close to its chest
Back to Top / Friday, August 22, 2025, 12:21 pm / permalink 12902 / 2 stories in 6 months
Dev plants kill switch in ex-employer's network that crashed servers and deleted files, gets four years in the slammer — kill switch triggered by dev's removal from Active Directory when fired
tomshardware - A software engineer called Davis Lu was sentenced to four years in prison for creating a kill switch in his former employer's network.
Back to Top / Friday, August 22, 2025, 11:21 am / permalink 12894 / 4 stories in 6 months
Developer jailed for taking down employer's network with kill switch malware
Iain Thomson / theregister - Pro tip: When taking revenge, don't use your real name A US court sentenced a former developer at power management biz Eaton to four years in prison after he installed malware on the company’s servers.…
Back to Top / Thursday, August 21, 2025, 8:20 pm / permalink 12862 / 2 stories in 6 months
Ukrainian suspect arrested in Italy over Nord Stream sabotage
Authorities in Italy have arrested a Ukrainian individual linked to the Nord Stream pipeline sabotage plot, codenamed “Operation Diameter.” This arrest comes as international investigations intensify over alleged acts of industrial sabotage against critical infrastructure, igniting a flurry of diplomatic and security concerns.
Back to Top / Thursday, August 21, 2025, 2:21 pm / permalink 12825 / 0 stories in 6 months
Perplexity's Comet browser naively processed pages with evil instructions
Thomas Claburn / theregister - Rival Brave flags prompt injection vulnerability, now patched To the surprise of no one in the security industry, processing untrusted, unvalidated input is a bad idea.…
Back to Top / Wednesday, August 20, 2025, 3:20 pm / permalink 12742 / 2 stories in 6 months
PyPI now blocks domain resurrection attacks used for hijacking accounts
Bill Toulas / bleepingcomputer - The Python Package Index (PyPI) has introduced new protections against domain resurrection attacks that enable hijacking accounts through password resets. [...]
Back to Top / Tuesday, August 19, 2025, 4:21 pm / permalink 12653 / 3 stories in 6 months