
Cyber security News
Stay up to date with all of the latest cyber security news and threats from around the world. CybrFunk is happy to have a place to harbor all of the latest in cyber security news and threats from reliable sources. Be sure to stop by our home for more resources to help you stay one step ahead of the game.
-
Wazuh for Regulatory Compliance
Source: TheHackerNews Published on: 2025-08-18
-
ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure
Source: TheHackerNews Published on: 2025-08-16
-
Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware
Source: TheHackerNews Published on: 2025-08-15
-
RealDefense Opens $10M Fund to Help OEMs Monetize Installs With SmartScan Cybersecurity SDK
Source: Dark Reading Published on: 2025-08-15
-
New Crypto24 Ransomware Attacks Bypass EDR
Source: Dark Reading Published on: 2025-08-15
-
Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme
Source: Krebs on Security Published on: 2025-08-15
-
Colt Telecommunications Struggles in Wake of Cyber Incident
Source: Dark Reading Published on: 2025-08-15
-
Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools
Source: TheHackerNews Published on: 2025-08-15
-
Using Security Expertise to Bridge the Communication Gap
Source: Dark Reading Published on: 2025-08-15
-
Water Systems Under Attack: Norway, Poland Blame Russia Actors
Source: Dark Reading Published on: 2025-08-15
-
U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions
Source: TheHackerNews Published on: 2025-08-15
-
Zero Trust + AI: Privacy in the Age of Agentic AI
Source: TheHackerNews Published on: 2025-08-15
-
Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution
Source: TheHackerNews Published on: 2025-08-15
-
Downgrade Attack Allows Phishing Kits to Bypass FIDO
Source: Dark Reading Published on: 2025-08-14
-
State and Local Leaders Lobby Congress for Cybersecurity Resources
Source: Dark Reading Published on: 2025-08-14
-
Agentic AI Use Cases for Security Soar, but Risks Demand Close Attention
Source: Dark Reading Published on: 2025-08-14
-
Google Chrome Enterprise: Advanced Browser Security for the Modern Workforce
Source: Dark Reading Published on: 2025-08-14
-
Police & Government Email Access for Sale on Dark Web
Source: Dark Reading Published on: 2025-08-14
-
NIST Digital Identity Guidelines Evolve With Threat Landscape
Source: Dark Reading Published on: 2025-08-14
-
CISA Warns N-able Bugs Under Attack, Patch Now
Source: Dark Reading Published on: 2025-08-14
-
Cybersecurity Spending Slows & Security Teams Shrink
Source: Dark Reading Published on: 2025-08-14
-
Google Chrome Enterprise: Extend Protections From Browser to OS
Source: Dark Reading Published on: 2025-08-14
-
New HTTP/2 'MadeYouReset' Vulnerability Enables Large-Scale DoS Attacks
Source: TheHackerNews Published on: 2025-08-14
-
Navigating the Cybersecurity Budget Tug-of-War
Source: Dark Reading Published on: 2025-08-14
-
Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS
Source: TheHackerNews Published on: 2025-08-14
-
Have You Turned Off Your Virtual Oven?
Source: TheHackerNews Published on: 2025-08-14
-
New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits
Source: TheHackerNews Published on: 2025-08-14
-
Simple Steps for Attack Surface Reduction
Source: TheHackerNews Published on: 2025-08-14
-
Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses
Source: TheHackerNews Published on: 2025-08-14
-
CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog
Source: TheHackerNews Published on: 2025-08-13
-
North Korea Attacks South Koreans With Ransomware
Source: Dark Reading Published on: 2025-08-13
-
North Korea Attacks South Koreans With Ransomware
Source: Dark Reading Published on: 2025-08-13
-
Fortinet Products Are in the Crosshairs Again
Source: Dark Reading Published on: 2025-08-13
-
Whispers of XZ Utils Backdoor Live on in Old Docker Images
Source: Dark Reading Published on: 2025-08-13
-
Popular AI Systems Still a Work-in-Progress for Security
Source: Dark Reading Published on: 2025-08-13
-
Patch Now: Attackers Target OT Networks via Critical RCE Flaw
Source: Dark Reading Published on: 2025-08-13
-
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
Source: TheHackerNews Published on: 2025-08-13
-
What the LockBit 4.0 Leak Reveals About RaaS Groups
Source: Dark Reading Published on: 2025-08-13
-
How an AI-Based 'Pen Tester' Became a Top Bug Hunter on HackerOne
Source: Dark Reading Published on: 2025-08-13
-
Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws
Source: TheHackerNews Published on: 2025-08-13
-
Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code
Source: TheHackerNews Published on: 2025-08-13
-
AI SOC 101: Key Capabilities Security Leaders Need to Know
Source: TheHackerNews Published on: 2025-08-13
-
Webinar: What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive
Source: TheHackerNews Published on: 2025-08-13
-
Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws
Source: TheHackerNews Published on: 2025-08-13
-
Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics
Source: TheHackerNews Published on: 2025-08-12
-
SN 1038: Perplexity's Duplicity - Malicious Repository Libraries
Source: Twit.tv Published on: 2025-08-12
-
China Questions Security of AI Chips From Nvidia, AMD
Source: Dark Reading Published on: 2025-08-12
-
Microsoft Patch Tuesday, August 2025 Edition
Source: Krebs on Security Published on: 2025-08-12
-
Elevation-of-Privilege Vulns Dominate Microsoft's Patch Tuesday
Source: Dark Reading Published on: 2025-08-12
-
Elevation-of-Privilege Vulns Dominate Microsoft's Patch Tuesday
Source: Dark Reading Published on: 2025-08-12
-
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks
Source: TheHackerNews Published on: 2025-08-12
-
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks
Source: TheHackerNews Published on: 2025-08-12
-
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks
Source: TheHackerNews Published on: 2025-08-12
-
Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager
Source: TheHackerNews Published on: 2025-08-12
-
Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses
Source: TheHackerNews Published on: 2025-08-12
-
Charon Ransomware Emerges With APT-Style Tactics
Source: Dark Reading Published on: 2025-08-12
-
Supply-chain dependencies: Check your resilience blind spot
Source: We live Security Published on: 2025-08-12
-
Supply-chain dependencies: Check your resilience blind spot
Source: We live Security Published on: 2025-08-12
-
How to Stay a Step Ahead of a Non-Obvious Threat
Source: Dark Reading Published on: 2025-08-12
-
New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova Attacks
Source: TheHackerNews Published on: 2025-08-12
-
ShinyHunters Tactics Now Mirror Scattered Spider
Source: Dark Reading Published on: 2025-08-12
-
The Ultimate Battle: Enterprise Browsers vs. Secure Browser Extensions
Source: TheHackerNews Published on: 2025-08-12
-
How the always-on generation can level up its cybersecurity game
Source: We live Security Published on: 2025-08-12
-
How the always-on generation can level up its cybersecurity game
Source: We live Security Published on: 2025-08-12
-
Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors
Source: TheHackerNews Published on: 2025-08-12
-
BlackSuit Ransomware Takes an Infrastructure Hit From Law Enforcement
Source: Dark Reading Published on: 2025-08-11
-
REvil Actor Accuses Russia of Planning 2021 Kaseya Attack
Source: Dark Reading Published on: 2025-08-11
-
Black Hat NOC Expands AI Implementation Across Security Operations
Source: Dark Reading Published on: 2025-08-11
-
WinRAR zero-day exploited in espionage attacks against high-value targets
Source: We live Security Published on: 2025-08-11
-
Researchers Warn of 'Hidden Risks' in Passwordless Account Recovery
Source: Dark Reading Published on: 2025-08-11
-
Echo Chamber, Prompts Used to Jailbreak GPT-5 in 24 Hours
Source: Dark Reading Published on: 2025-08-11
-
New TETRA Radio Encryption Flaws Expose Law Enforcement Communications
Source: TheHackerNews Published on: 2025-08-11
-
Utilities, Factories at Risk From Encryption Holes in Industrial Protocol
Source: Dark Reading Published on: 2025-08-11
-
Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
Source: TheHackerNews Published on: 2025-08-11
-
Will Secure AI Be the Hottest Career Path in Cybersecurity?
Source: Dark Reading Published on: 2025-08-11
-
⚡ Weekly Recap: BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More
Source: TheHackerNews Published on: 2025-08-11
-
6 Lessons Learned: Focusing Security Where Business Value Lives
Source: TheHackerNews Published on: 2025-08-11
-
Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability
Source: We live Security Published on: 2025-08-11
-
How Maclaren Racing Gets From the Browser to the Track
Source: Dark Reading Published on: 2025-08-11
-
Google Chrome Enterprise: Keeping Businesses Safe From Threats on the Web
Source: Dark Reading Published on: 2025-08-11
-
Google Chrome Enterprise: Keeping Businesses Safe From Threats on the Web
Source: Dark Reading Published on: 2025-08-11
-
WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately
Source: TheHackerNews Published on: 2025-08-10
-
New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP
Source: TheHackerNews Published on: 2025-08-10
-
Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation
Source: TheHackerNews Published on: 2025-08-10
-
Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
Source: TheHackerNews Published on: 2025-08-09
-
Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models
Source: TheHackerNews Published on: 2025-08-09
-
Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems
Source: TheHackerNews Published on: 2025-08-09
-
CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials
Source: TheHackerNews Published on: 2025-08-08
-
KrebsOnSecurity in New ‘Most Wanted’ HBO Max Series
Source: Krebs on Security Published on: 2025-08-08
-
60 RubyGems Packages Steal Data From Annoying Spammers
Source: Dark Reading Published on: 2025-08-08
-
BigID Launches Shadow AI Discovery to Uncover Rogue Models and Risky AI Data
Source: Dark Reading Published on: 2025-08-08
-
PwC Announces Addition of Morgan Adamski to Leadership of Cyber, Data & Technology Risk Platform
Source: Dark Reading Published on: 2025-08-08
-
Ransomware Attacks Fall by Almost Half in Q2
Source: Dark Reading Published on: 2025-08-08
-
Cybersecurity Incident at Allianz Life Exposes Personal Information of Hundreds of Thousands
Source: Dark Reading Published on: 2025-08-08
-
AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims
Source: TheHackerNews Published on: 2025-08-08
-
860K Compromised in Columbia University Data Breach
Source: Dark Reading Published on: 2025-08-08
-
Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?
Source: We live Security Published on: 2025-08-08
-
Redefining the Role: What Makes a CISO Great
Source: Dark Reading Published on: 2025-08-08
-
Data Dump From APT Actor Yields Clues to Attacker Capabilities
Source: Dark Reading Published on: 2025-08-08
-
Attackers Target the Foundations of Crypto: Smart Contracts
Source: Dark Reading Published on: 2025-08-08