Google has filed a lawsuit against the Badbox 2.0 botnet operators, after identifying over 10 million infected Android devices.
The post Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet appeared first on SecurityWeek.
Google has filed a lawsuit against the Badbox 2.0 botnet operators, after identifying over 10 million infected Android devices.
The post Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet appeared first on SecurityWeek.
Chinese hacking group Salt Typhoon targeted a National Guard unit’s network and tapped into communications with other units.
The post China’s Salt Typhoon Hacked US National Guard appeared first on SecurityWeek.
Louis Vuitton customers in the UK, South Korea, Turkey and possibly other countries are being notified of a data breach.
The post Louis Vuitton Data Breach Hits Customers in Several Countries appeared first on SecurityWeek.
The latest release of the xAI LLM, Grok-4, has already fallen to a sophisticated jailbreak.
The post Grok-4 Falls to a Jailbreak Two days After Its Release appeared first on SecurityWeek.
PCA Cyber Security has discovered critical vulnerabilities in the BlueSDK Bluetooth stack that could have allowed remote code execution on car systems.
The post Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack appeared first on SecurityWeek.
Xu Zewei has been arrested on charges that he is a member of the Chinese state-sponsored hacking group Hafnium (Silk Typhoon).
The post Alleged Chinese State Hacker Wanted by US Arrested in Italy appeared first on SecurityWeek.
As organizations rush to adopt agentic AI, security leaders must confront the growing risk of invisible threats and new attack vectors.
The post The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore appeared first on SecurityWeek.
Researchers released technical information and exploit code targeting a critical vulnerability (CVE-2025-5777) in Citrix NetScaler.
The post Exploits, Technical Details Released for CitrixBleed2 Vulnerability appeared first on SecurityWeek.
The notorious Hive successor ceases ransomware operations but pivots to pure data extortion under the new World Leaks brand.
The post Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks appeared first on SecurityWeek.
The IT products and services giant did not say how the intrusion occurred or whether any data was stolen from its systems.
The post Ingram Micro Scrambling to Restore Systems After Ransomware Attack appeared first on SecurityWeek.