China- and North Korea-aligned groups account for more than half of global attacks, and an increasing number of countries look to cyber to balance power in the region.
FIs Must Invest in AI-Fueled Behavioral Biometrics to Go Beyond Static Credentials Scammers are increasingly turning to account takeover fraud, as financial institutions ramp up their defenses. Instead of luring victims into making authorized transactions, cybercriminals are bypassing them altogether, hijacking their digital identities and draining accounts from within.
Homeland Security Secretary Says Trump Budget Strengthens Cybersecurity Senate Democrats Tuesday pushed Homeland Security Secretary Kristi Noem on the Trump administration's cuts to the cybersecurity component of the U.S. federal department she leads. Noem told senators the U.S. Cybersecurity and Infrastructure Agency will "continue to fulfill" its statutory obligations.
Scattered Spider Stole Tata Consulting Services Employee Login Details for Hack British retailer Marks & Spencer was reportedly compromised by cybercrime group Scattered Spider using stolen employee credentials from a third-party IT company. Citing an unidentified source, Reuters reported hackers used the M&S login credentials of two Tata Consulting Services employees.
Georgia Court Allows Claims of Fraud, Trespass Over Falcon Software Update Delta can proceed with its lawsuit against CrowdStrike over a July 2024 update that allegedly bypassed Microsoft safeguards and crashed thousands of systems. The judge found that Delta sufficiently alleged fraud, computer trespass and gross negligence, allowing key claims to move forward.
A vulnerability classified as problematic has been found in Linux Kernel up to 5.10.234/6.6.82/6.12.17/6.13.5. Affected is the function early_memmap of the file mm/early_ioremap.c. The manipulation leads to excessive iteration.
This vulnerability is traded as CVE-2025-21872. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.79/6.12.16/6.13.4/6.14-rc3. It has been classified as problematic. Affected is an unknown function of the component io_uring. The manipulation leads to privilege escalation.
This vulnerability is traded as CVE-2025-21863. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.79/6.12.16/6.13.4/6.14-rc3 and classified as critical. This issue affects the function bpf_local_storage_map_free. The manipulation leads to deadlock.
The identification of this vulnerability is CVE-2024-58088. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.16/6.13.4/6.14-rc3. It has been rated as critical. Affected by this issue is the function arena_map_free. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2025-21851. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.12.16/6.13.4. Affected by this issue is the function copy_to_kernel_nofault of the component Kernel Memory Handler. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2025-21869. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.78/6.12.15/6.13.3/6.14-rc2 and classified as critical. This vulnerability affects unknown code of the component etas_es58x. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2025-21773. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.