Latest news as of 5/14/2025, 1:31:33 AM
Dark Reading
CVE-2025-31324 is a maximum severity bug that attackers exploited weeks before SAP released a patch for it.
The Register
Homeland Security boss Noem added as last-minute keynote, mind you There's a notable absence from this year's RSA Conference that kicked off today in San Francisco: The NSA's State of the Hack panel.… RSAC
Bleeping Computer
Ongoing outages at British retail giant Marks & Spencer are caused by a ransomware attack believed to be conducted by a hacking collective known as "Scattered Spider" BleepingComputer has learned from multiple sources. [...]
Bleeping Computer
Hitachi Vantara, a subsidiary of Japanese multinational conglomerate Hitachi, was forced to take servers offline over the weekend to contain an Akira ransomware attack. [...]
The Register
Think of artificial intelligence as your embedded ally AI is reshaping cybersecurity in real time, raising the stakes on both sides of the battlefield. For defenders, it brings speed, precision, and automation at scale, helping security teams detect threats earlier and respond faster than ever. But adversaries aren’t standing still. They’re using AI to sharpen their own tactics, accelerating attacks and probing defenses with unprecedented sophistication.… Sponsored post
Bleeping Computer
Employee benefits administration firm VeriSource Services is warning that a data breach exposed the personal information of four million people. [...]
Bleeping Computer
Over 1,200 internet-exposed SAP NetWeaver instances are vulnerable to an actively exploited maximum severity unauthenticated file upload vulnerability that allows attackers to hijack servers. [...]
Bleeping Computer
Offensive Security warned Kali Linux users to manually install a new Kali repository signing key to avoid experiencing update failures. [...]
Bleeping Computer
Microsoft is working on fully mitigating issues causing Outlook on the web and SharePoint Online users to experience delays or failures when searching. [...]
Dark Reading
Attackers are leveraging the benefits of new technology and the availability of commodity tools, credentials, and other resources to develop sophisticated attacks more quickly than ever, putting defenders on their heels.