Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: attacks Clear Filter

One Vigilante, 22 Cell Tower Fires, and a World of Conspiracies

As dawn spread over San Antonio on September 9, 2021, almond-colored smoke began to fill the sky above the city’s Far West Side. The plumes were whorling off the top of a 132-foot-tall cell tower that overshadows an office park just north of SeaWorld. At a hotel a mile away, a paramedic snapped a photo of the spectacle and posted it to the r/sanantonio subreddit. “Cell tower on fire around 1604 and Culebra,” he wrote. In typical Reddit fashion, the comments section piled up with corny jokes. “B

One Vigilante, 22 Cell Towers, and a World of Conspiracies

As dawn spread over San Antonio on September 9, 2021, almond-colored smoke began to fill the sky above the city’s Far West Side. The plumes were whorling off the top of a 132-foot-tall cell tower that overshadows an office park just north of SeaWorld. At a hotel a mile away, a paramedic snapped a photo of the spectacle and posted it to the r/sanantonio subreddit. “Cell tower on fire around 1604 and Culebra,” he wrote. In typical Reddit fashion, the comments section piled up with corny jokes. “B

Apple warns customers targeted in recent spyware attacks

Apple warned customers last week that their devices were targeted in a new series of spyware attacks, according to the French national Computer Emergency Response Team (CERT-FR). CERT-FR is operated by ANSSI, the National Cybersecurity Agency, and is responsible for preventing and mitigating cybersecurity-related incidents impacting public and critical organizations. According to a Thursday advisory, CERT-FR is aware of at least four instances of Apple threat notifications alerting the company

US charges admin of LockerGoga, MegaCortex, Nefilim ransomware

The U.S. Department of Justice has charged Ukrainian national Volodymyr Viktorovich Tymoshchuk for his role as the administrator of the LockerGoga, MegaCortex, and Nefilim ransomware operations. Also known online as deadforz, Boba, msfv, and farnetwork, Tymoshchuk was involved in ransomware attacks that led to the breach of hundreds of companies, resulting in millions of dollars in damages, according to a superseding indictment unsealed today. Between July 2019 and June 2020, Tymoshchuk and hi

Some Heart Attacks Might Be Triggered by Germs

Germs might be even worse for us than we thought. New research suggests that certain infections could be a contributing factor to heart attacks. Scientists in Finland and the UK conducted the study, which examined arterial plaques taken from people who died from heart disease and others. They found these plaques often contained a dormant layer of bacterial biofilm; they also found evidence that bacteria released from this biofilm can then trigger heart attacks. Though not yet definitive, the st

They know where you are: Cybersecurity and the shadow world of geolocation

Tony Soprano knew. When one of his follow poker players in season 5, episode 4 of The Sopranos asks Tony how he likes his new Cadillac Escalade, the fictional mobster responds, “I love it. After I pulled out that global positioning [system].” OK, his language was a little more spicy than “system,” but the point is that Tony knew the dangers of being trackable. The rest of us might not have the same concerns Tony had about being findable just about anywhere, but we should all realize how danger

Cloudflare stops new world's largest DDoS attack over Labor Day weekend

Hollie Adams/Bloomberg via Getty Images Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways The biggest, baddest DDoS attack to date was just fended off. The attack used the trivial, but nasty, UDP flood attack. You must protect yourself against DDoS attacks. Over the Labor Day weekend, Cloudflare says it successfully stopped a record-breaking distributed denial-of-service (DDoS) attack that peaked at 11.5 terabits per second (Tbps). This came only a few months afte

This Common Heart Attack Drug May Actually Be Worthless for Most People

A common treatment given after heart attacks may not be worthwhile for a large segment of the population. New trial data finds that most people who suffer a heart attack do not benefit from taking beta-blockers afterward. A large international team of researchers conducted the trial, which compared the outcomes of nearly 10,000 heart attack patients who were either given beta-blocker therapy or not. “This trial will reshape all international clinical guidelines.’ On average, people with prese

Cloudflare blocks largest recorded DDoS attack peaking at 11.5 Tbps

Internet infrastructure company Cloudflare said it recently blocked the largest recorded volumetric distributed denial-of-service (DDoS) attack, which peaked at 11.5 terabits per second (Tbps). In volumetric DDoS attacks, attackers overwhelm the target with massive amounts of data, consuming the bandwidth or exhausting system resources, leaving legitimate users with no access to the targeted servers and services. "Cloudflare's defenses have been working overtime. Over the past few weeks, we've

Zscaler data breach exposes customer info after Salesloft Drift compromise

Cybersecurity company Zscaler warns it suffered a data breach after threat actors gained access to its Salesforce instance and stole customer information, including the contents of support cases. This warning follows the compromise of Salesloft Drift, an AI chat agent that integrates with Salesforce, in which attackers stole OAuth and refresh tokens, enabling them to gain access to customer Salesforce environments and exfiltrate sensitive data. In an advisory, Zscaler says that its Salesforce

Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks

Hackers breached sales automation platform Salesloft to steal OAuth and refresh tokens from its Drift chat agent integration with Salesforce to pivot to customer environments and exfiltrate data. The ShinyHunters extortion group claims responsibility for these additional Salesforce attacks. Salesloft's SalesDrift is a third-party platform that connects the Drift AI chat agent with a Salesforce instance, allowing organizations to sync conversations, leads, and support cases into their CRM. Acc

Farmers Insurance data breach impacts 1.1M people after Salesforce attack

U.S. insurance giant Farmers Insurance has disclosed a data breach impacting 1.1 million customers, with BleepingComputer learning that the data was stolen in the widespread Salesforce attacks. Farmers Insurance is a U.S.-based insurer that provides auto, home, life, and business insurance products. It operates through a network of agents and subsidiaries, serving more than 10 million households nationwide. The company disclosed the data breach in an advisory on its website, saying that its da

2.5B Gmail users endangered after Google database hack

How the phishing attacks work Initial reports of attempted attacks have already been seen on Reddit, which are likely related to the data leak. Users describe how alleged Google employees have contacted them by phone to inform them of a security breach in their accounts. In these scam attempts, attackers are trying to take over Gmail accounts by triggering alleged “account resets” and then intercepting passwords to subsequently lock out the account holders. Another attack method involves “dang

APT36 hackers abuse Linux .desktop files to install malware in new attacks

The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense entities in India. The activity, documented in reports by CYFIRMA and CloudSEK, aims at data exfiltration and persistent espionage access. APT 36 has previously used .desktop files to load malware in targeted espionage operations in South Asia. The attacks were first spotted on August 1, 2025, and based on the latest evidence, are still ongoing. Desktop file abuse Altho

Weaponizing image scaling against production AI systems

Picture this: you send a seemingly harmless image to an LLM and suddenly it exfiltrates all of your user data. By delivering a multi-modal prompt injection not visible to the user, we achieved data exfiltration on systems including the Google Gemini CLI. This attack works because AI systems often scale down large images before sending them to the model: when scaled, these images can reveal prompt injections that are not visible at full resolution. In this blog post, we’ll detail how attackers c

Onimusha: Way of the Sword might be a more forgiving kind of samurai epic

Capcom’s Onimusha series has been on a long hiatus. Combining Resident Evil-style rendered backgrounds with more agile characters, adding in demons, magic and a feudal Japan setting, the series span multiple sequels — and consoles — til the fourth entry in 2006. Roughly two decades (and console eras) later, Capcom has returned to the series, even getting the definitive samurai actor, Tom Cruise Mifune Toshiro, to play the hero, the legendary swordsman Miyamoto Musashi. At Gamescom, the company

Oregon Man Charged in ‘Rapper Bot’ DDoS Service

A 22-year-old Oregon man has been arrested on suspicion of operating “Rapper Bot,” a massive botnet used to power a service for launching distributed denial-of-service (DDoS) attacks against targets — including a March 2025 DDoS that knocked Twitter/X offline. The Justice Department asserts the suspect and an unidentified co-conspirator rented out the botnet to online extortionists, and tried to stay off the radar of law enforcement by ensuring that their botnet was never pointed at KrebsOnSecur

Prosecutors charge man who allegedly used botnet to take down X this spring

An Oregon man has been charged in a federal complaint today on allegations of operating a botnet for hire that conducted cyberattacks beginning at least in 2021. Ethan Foltz has been accused of running Rapper Bot, also known as Eleven Eleven Botnet and CowBot, and using it to execute coordinated distributed denial of service (DDoS) attacks. The complaint claims that Rapper Bot was used to target victims in more than 80 countries, and since April 2025, it has reportedly conducted more than 370,00

XenoRAT malware campaign hits multiple embassies in South Korea

A state-sponsored espionage campaign is targeting foreign embassies in South Korea to deploy XenoRAT malware from malicious GitHub repositories. According to Trellix researchers, the campaign has been running since March and is ongoing, having launched at least 19 spearphishing attacks against high-value targets. Although infrastructure and techniques match the pllaybook of North Korean actor Kimsuky (APT43), there are signs that better match China-based operatives, the researchers say. Multi

HR giant Workday discloses data breach after Salesforce attack

Human resources giant Workday has disclosed a data breach after attackers gained access to a third-party customer relationship management (CRM) platform in a recent social engineering attack. Headquartered in Pleasanton, California, Workday has over 19,300 employees in offices across North America, EMEA, and APJ. Workday's customer list comprises over 11,000 organizations across a diverse range of industries, including more than 60% of the Fortune 500 companies. As the company revealed in a Fr

HR giant Workday discloses data breach amid Salesforce attacks

Human resources giant Workday has disclosed a data breach after attackers gained access to a third-party customer relationship management (CRM) platform in a recent social engineering attack. Headquartered in Pleasanton, California, Workday has over 19,300 employees in offices across North America, EMEA, and APJ. Workday's customer list comprises over 11,000 organizations across a diverse range of industries, including more than 60% of the Fortune 500 companies. As the company revealed in a Fr

Rain: Transiently Leaking Data from Public Clouds Using Old Vulnerabilities

OpenReview Anonymous Preprint Submission696 Authors Keywords : Cloud computing security; Hardware security; Systems security TL;DR : Leaking memory across virtual machine boundaries at a public cloud provider, bypassing mitigations against these types of attacks. Abstract : Given their vital importance for governments and enterprises around the world, we need to trust public clouds to provide strong security guarantees even in the face of advanced attacks and hardware vulnerabilities. While t

Hackers leak Allianz Life data stolen in Salesforce attacks

Hackers have released stolen data belonging to US insurance giant Allianz Life, exposing 2.8 million records with sensitive information on business partners and customers in ongoing Salesforce data theft attacks. Last month, Allianz Life disclosed that it suffered a data breach when the personal information for the "majority" of its 1.4 million customers was stolen from a third-party, cloud-based CRM system on July 16th. While the company did not name the provider, BleepingComputer first repor

Over 3,000 NetScaler devices left unpatched against CitrixBleed 2 bug

Over 3,300 Citrix NetScaler devices remain unpatched against a critical vulnerability that allows attackers to bypass authentication by hijacking user sessions, nearly two months after patches were released. Tracked as CVE-2025-5777 and referred to as CitrixBleed 2, this out-of-bounds memory read vulnerability results from insufficient input validation, enabling unauthenticated attackers to access restricted memory regions remotely on devices configured as a Gateway (VPN virtual server, ICA Pro

High-severity WinRAR 0-day exploited for weeks by 2 groups

A high-severity zero-day in the widely used WinRAR file compressor is under active exploitation by two Russian cybercrime groups. The attacks backdoor computers that open malicious archives attached to phishing messages, some of which are personalized. Security firm ESET said Monday that it first detected the attacks on July 18, when its telemetry spotted a file in an unusual directory path. By July 24, ESET determined that the behavior was linked to the exploitation of an unknown vulnerability

Don't fall for AI-powered disinformation attacks online - here's how to stay sharp

JuSun/Getty Images ZDNET's key takeaways AI-powered narrative attacks, or misinformation campaigns, are on the rise. These can create real business, brand, personal, and financial harm. Here are expert tips on how to spot and protect yourself against them. Last month, an old friend forwarded me a video that made my stomach drop. In it, what appeared to be violent protesters streaming down the streets of a major city, holding signs accusing the government and business officials of "censoring

High-severity WinRAR 0-day exploited for weeks by 2 groups

A high-severity zero-day in the widely used WinRAR file compressor is under active exploitation by two Russian cybercrime groups. The attacks backdoor computers that open malicious archives attached to phishing messages, some of which are personalized. Security firm ESET said Monday that it first detected the attacks on July 18, when its telemetry spotted a file in an unusual directory path. By July 24, ESET determined that the behavior was linked to the exploitation of an unknown vulnerability

Connex Credit Union data breach impacts 172,000 members

Connex, one of Connecticut's largest credit unions, warned tens of thousands of members that unknown attackers had stolen their personal and financial information after breaching its systems in early June. Founded in 1940, this member-owned organization is a non-profit with over $1 billion in assets, providing banking, insurance, and credit card services to more than 70,000 members across eight branches throughout the greater New Haven area, including New Haven, Hartford, Middlesex, and Fairfie

WinRAR zero-day exploited to plant malware on archive extraction

A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the RomCom malware. The flaw is a directory traversal vulnerability that was fixed in WinRAR 7.13, which allows specially crafted archives to extract files into a file path selected by the attacker. "When extracting a file, previous versions of WinRAR, Windows versions of RAR, UnRAR, portable UnRAR source code and UnRAR.dll can be tricked into using a path, defined in a spe

WinRAR zero-day flaw exploited by RomCom hackers in phishing attacks

A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the RomCom malware. The flaw is a directory traversal vulnerability that was fixed in WinRAR 7.13, which allows specially crafted archives to extract files into a file path selected by the attacker. "When extracting a file, previous versions of WinRAR, Windows versions of RAR, UnRAR, portable UnRAR source code and UnRAR.dll can be tricked into using a path, defined in a spe