
Cyber security News
Stay up to date with all of the latest cyber security news and threats from around the world. CybrFunk is happy to have a place to harbor all of the latest in cyber security news and threats from reliable sources. Be sure to stop by our home for more resources to help you stay one step ahead of the game.
-
Big Tech’s Mixed Response to U.S. Treasury Sanctions
Source: Krebs on Security Published on: 2025-07-03
-
Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
Source: TheHackerNews Published on: 2025-07-03
-
New Cyber Blueprint Aims to Guide Organizations on AI Journey
Source: Dark Reading Published on: 2025-07-03
-
Dark Web Vendors Shift to Third Parties, Supply Chains
Source: Dark Reading Published on: 2025-07-03
-
Criminals Sending QR Codes in Phishing, Malware Campaigns
Source: Dark Reading Published on: 2025-07-03
-
IDE Extensions Pose Hidden Risks to Software Supply Chain
Source: Dark Reading Published on: 2025-07-03
-
Attackers Impersonate Top Brands in Callback Phishing
Source: Dark Reading Published on: 2025-07-03
-
Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
Source: TheHackerNews Published on: 2025-07-03
-
The Hidden Weaknesses in AI SOC Tools that No One Talks About
Source: TheHackerNews Published on: 2025-07-03
-
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
Source: TheHackerNews Published on: 2025-07-03
-
Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
Source: TheHackerNews Published on: 2025-07-02
-
Qantas Airlines Breached, Impacting 6M Customers
Source: Dark Reading Published on: 2025-07-02
-
Browser Extensions Pose Heightened, but Manageable, Security Risks
Source: Dark Reading Published on: 2025-07-02
-
Initial Access Broker Self-Patches Zero Days as Turf Control
Source: Dark Reading Published on: 2025-07-02
-
US Treasury Sanctions BPH Provider Aeza Group
Source: Dark Reading Published on: 2025-07-02
-
AI Tackles Binary Code Challenges to Fortify Supply Chain Security
Source: Dark Reading Published on: 2025-07-02
-
Russian APT 'Gamaredon' Hits Ukraine With Fierce Phishing
Source: Dark Reading Published on: 2025-07-02
-
ClickFix Spin-off Attack Bypasses Key Browser Safeguards
Source: Dark Reading Published on: 2025-07-02
-
North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign
Source: TheHackerNews Published on: 2025-07-02
-
1 Year Later: Lessons Learned From the CrowdStrike Outage
Source: Dark Reading Published on: 2025-07-02
-
FileFix Attack Chain Enables Malicious Script Execution
Source: Dark Reading Published on: 2025-07-02
-
That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat
Source: TheHackerNews Published on: 2025-07-02
-
Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
Source: TheHackerNews Published on: 2025-07-02
-
Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset
Source: We live Security Published on: 2025-07-02
-
U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware
Source: TheHackerNews Published on: 2025-07-02
-
Vercel's v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale
Source: TheHackerNews Published on: 2025-07-01
-
SN 1032: Pervasive Web Fingerprinting - How Websites Tracks You Despite Cookie Blocks
Source: Twit.tv Published on: 2025-07-01
-
Silver Fox Suspected in Taiwanese Campaign Using DeepSeek Lure
Source: Dark Reading Published on: 2025-07-01
-
Like SEO, LLMs May Soon Fall Prey to Phishing Scams
Source: Dark Reading Published on: 2025-07-01
-
LevelBlue Acquires Trustwave, Forms World's Largest Independent MSSP
Source: Dark Reading Published on: 2025-07-01
-
Scope, Scale of Spurious North Korean IT Workers Emerges
Source: Dark Reading Published on: 2025-07-01
-
Ransomware Reshaped How Cyber Insurers Perform Security Assessments
Source: Dark Reading Published on: 2025-07-01
-
We've All Been Wrong: Phishing Training Doesn't Work
Source: Dark Reading Published on: 2025-07-01
-
DoJ Disrupts North Korean IT Worker Scheme Across Multiple US States
Source: Dark Reading Published on: 2025-07-01
-
Critical Vulnerability in Anthropic's MCP Exposes Developer Machines to Remote Exploits
Source: TheHackerNews Published on: 2025-07-01
-
TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns
Source: TheHackerNews Published on: 2025-07-01
-
Chrome Zero-Day, 'FoxyWallet' Firefox Attacks Threaten Browsers
Source: Dark Reading Published on: 2025-07-01
-
How Businesses Can Align Cyber Defenses With Real Threats
Source: Dark Reading Published on: 2025-07-01
-
New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status
Source: TheHackerNews Published on: 2025-07-01
-
ESET Threat Report H1 2025: Key findings
Source: We live Security Published on: 2025-07-01
-
A New Maturity Model for Browser Security: Closing the Last-Mile Risk
Source: TheHackerNews Published on: 2025-07-01
-
A New Maturity Model for Browser Security: Closing the Last-Mile Risk
Source: TheHackerNews Published on: 2025-07-01
-
A New Maturity Model for Browser Security: Closing the Last-Mile Risk
Source: TheHackerNews Published on: 2025-07-01
-
ESET APT Activity Report Q4 2024–Q1 2025: Malware sharing, wipers and exploits
Source: We live Security Published on: 2025-07-01
-
Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation
Source: TheHackerNews Published on: 2025-07-01
-
U.S. Arrests Facilitator in North Korean IT Worker Scheme; Seizes 29 Domains and Raids 21 Laptop Farms
Source: TheHackerNews Published on: 2025-07-01
-
Microsoft Removes Password Management from Authenticator App Starting August 2025
Source: TheHackerNews Published on: 2025-06-30
-
Scattered Spider Hacking Spree Continues With Airline Sector Attacks
Source: Dark Reading Published on: 2025-06-30
-
Hired Hacker Assists Drug Cartel in Finding, Killing FBI Sources
Source: Dark Reading Published on: 2025-06-30
-
Chinese Company Hikvision Banned By Canadian Government
Source: Dark Reading Published on: 2025-06-30
-
Rethinking Cyber-Risk as Traditional Models Fall Short
Source: Dark Reading Published on: 2025-06-30
-
Airoha Chip Vulns Put Sony, Bose Earbuds & Headphones at Risk
Source: Dark Reading Published on: 2025-06-30
-
Senator Chides FBI for Weak Advice on Mobile Security
Source: Krebs on Security Published on: 2025-06-30
-
U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure
Source: TheHackerNews Published on: 2025-06-30
-
Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects
Source: TheHackerNews Published on: 2025-06-30
-
AI-Themed SEO Poisoning Attacks Spread Info, Crypto Stealers
Source: Dark Reading Published on: 2025-06-30
-
Why Cybersecurity Should Come Before AI in Schools
Source: Dark Reading Published on: 2025-06-30
-
Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks
Source: TheHackerNews Published on: 2025-06-30
-
Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories
Source: TheHackerNews Published on: 2025-06-30
-
⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more
Source: TheHackerNews Published on: 2025-06-30
-
FBI Warns of Scattered Spider's Expanding Attacks on Airlines Using Social Engineering
Source: TheHackerNews Published on: 2025-06-28
-
GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool
Source: TheHackerNews Published on: 2025-06-28
-
This month in security with Tony Anscombe – June 2025 edition
Source: We live Security Published on: 2025-06-28
-
Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns
Source: TheHackerNews Published on: 2025-06-28
-
Top Apple, Google VPN Apps May Help China Spy on Users
Source: Dark Reading Published on: 2025-06-27
-
'CitrixBleed 2' Shows Signs of Active Exploitation
Source: Dark Reading Published on: 2025-06-27
-
Scattered Spider Taps CFO Credentials in 'Scorched Earth' Attack
Source: Dark Reading Published on: 2025-06-27
-
Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign
Source: TheHackerNews Published on: 2025-06-27
-
Hackers Make Hay? Smart Tractors Vulnerable to Full Takeover
Source: Dark Reading Published on: 2025-06-27
-
Vulnerability Debt: How Do You Put a Price on What to Fix?
Source: Dark Reading Published on: 2025-06-27
-
PUBLOAD and Pubshell Malware Used in Mustang Panda's Tibet-Specific Attack
Source: TheHackerNews Published on: 2025-06-27
-
US Falling Behind China in Exploit Production
Source: Dark Reading Published on: 2025-06-27
-
Business Case for Agentic AI SOC Analysts
Source: TheHackerNews Published on: 2025-06-27
-
Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit
Source: TheHackerNews Published on: 2025-06-27
-
MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted
Source: TheHackerNews Published on: 2025-06-27
-
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors
Source: TheHackerNews Published on: 2025-06-27
-
'Cyber Fattah' Hacktivist Group Leaks Saudi Games Data
Source: Dark Reading Published on: 2025-06-27
-
'IntelBroker' Suspect Arrested, Charged in High-Profile Breaches
Source: Dark Reading Published on: 2025-06-26
-
Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks
Source: TheHackerNews Published on: 2025-06-26
-
How Geopolitical Tensions Are Shaping Cyber Warfare
Source: Dark Reading Published on: 2025-06-26
-
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access
Source: TheHackerNews Published on: 2025-06-26
-
New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks
Source: TheHackerNews Published on: 2025-06-26
-
Taming Agentic AI Risks Requires Securing Non-Human Identities
Source: Dark Reading Published on: 2025-06-26
-
The Hidden Risks of SaaS: Why Built-In Protections Aren't Enough for Modern Data Resilience
Source: TheHackerNews Published on: 2025-06-26
-
ESET Threat Report H1 2025
Source: We live Security Published on: 2025-06-26
-
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks
Source: TheHackerNews Published on: 2025-06-26
-
Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa
Source: TheHackerNews Published on: 2025-06-26
-
CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet
Source: TheHackerNews Published on: 2025-06-26
-
Charming Kitten APT Tries Spying on Israeli Cybersecurity Experts
Source: Dark Reading Published on: 2025-06-26
-
WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews
Source: TheHackerNews Published on: 2025-06-25
-
Cloud Repatriation Driven by AI, Cost, and Security
Source: Dark Reading Published on: 2025-06-25
-
And Now Malware That Tells AI to Ignore It?
Source: Dark Reading Published on: 2025-06-25
-
Millions of Brother Printers Hit by Critical, Unpatchable Bug
Source: Dark Reading Published on: 2025-06-25
-
CISA Is Shrinking: What Does It Mean for Cyber?
Source: Dark Reading Published on: 2025-06-25
-
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
Source: TheHackerNews Published on: 2025-06-25
-
Dire Wolf Ransomware Comes Out Snarling, Bites Technology, Manufacturing
Source: Dark Reading Published on: 2025-06-25
-
Hundreds of MCP Servers Expose AI Models to Abuse, RCE
Source: Dark Reading Published on: 2025-06-25
-
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC
Source: TheHackerNews Published on: 2025-06-25
-
Generative AI Exacerbates Software Supply Chain Risks
Source: Dark Reading Published on: 2025-06-25
-
Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure
Source: TheHackerNews Published on: 2025-06-25