
Cyber security News
Stay up to date with all of the latest cyber security news and threats from around the world. CybrFunk is happy to have a place to harbor all of the latest in cyber security news and threats from reliable sources. Be sure to stop by our home for more resources to help you stay one step ahead of the game.
-
Middle East, North Africa Security Spending to Top $3B
Source: Dark Reading Published on: 2025-04-17
-
CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices
Source: TheHackerNews Published on: 2025-04-16
-
Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks
Source: TheHackerNews Published on: 2025-04-16
-
GPS Spoofing Attacks Spike in Middle East, Southeast Asia
Source: Dark Reading Published on: 2025-04-16
-
GPS Spoofing Attacks Spike in Middle East, Southeast Asia
Source: Dark Reading Published on: 2025-04-16
-
Multiple Groups Exploit NTLM Flaw in Microsoft Windows
Source: Dark Reading Published on: 2025-04-16
-
China-Linked Hackers Lay Brickstorm Backdoors on Euro Networks
Source: Dark Reading Published on: 2025-04-16
-
Ransomware gang 'CrazyHunter' Targets Critical Taiwanese Orgs
Source: Dark Reading Published on: 2025-04-16
-
Patch Now: NVDIA Flaws Expose AI Models, Critical Infrastructure
Source: Dark Reading Published on: 2025-04-16
-
Patch Now: NVDIA Flaws Expose AI Models, Critical Infrastructure
Source: Dark Reading Published on: 2025-04-16
-
Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler
Source: TheHackerNews Published on: 2025-04-16
-
Cloud, Cryptography Flaws in Mobile Apps Leak Enterprise Data
Source: Dark Reading Published on: 2025-04-16
-
Cloud, Cryptography Flaws in Mobile Apps Leak Enterprise Data
Source: Dark Reading Published on: 2025-04-16
-
Active Directory Recovery Can't Be an Afterthought
Source: Dark Reading Published on: 2025-04-16
-
Active Directory Recovery Can't Be an Afterthought
Source: Dark Reading Published on: 2025-04-16
-
Google Blocked 5.1B Harmful Ads and Suspended 39.2M Advertiser Accounts in 2024
Source: TheHackerNews Published on: 2025-04-16
-
Gamma AI Platform Abused in Phishing Chain to Spoof Microsoft SharePoint Logins
Source: TheHackerNews Published on: 2025-04-16
-
From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains
Source: TheHackerNews Published on: 2025-04-16
-
New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks
Source: TheHackerNews Published on: 2025-04-16
-
Product Walkthrough: A Look Inside Wing Security's Layered SaaS Identity Defense
Source: TheHackerNews Published on: 2025-04-16
-
Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users
Source: TheHackerNews Published on: 2025-04-16
-
U.S. Govt. Funding for MITRE's CVE Ends April 16, Cybersecurity Community on Alert
Source: TheHackerNews Published on: 2025-04-15
-
Funding Expires for Key Cyber Vulnerability Database
Source: Krebs on Security Published on: 2025-04-15
-
SN 1021: Device Bound Session Credentials - Hotpatching in Win 11, Apple vs. UK
Source: Twit.tv Published on: 2025-04-15
-
Accounting Firms Can't Skimp on Cybersecurity
Source: Dark Reading Published on: 2025-04-15
-
Max Severity Bug in Apache Roller Enabled Persistent Access
Source: Dark Reading Published on: 2025-04-15
-
With AI's Help, Bad Bots Are Taking Over the Web
Source: Dark Reading Published on: 2025-04-15
-
AI-Powered Presentation Tool Leveraged in Phishing Attacks
Source: Dark Reading Published on: 2025-04-15
-
Hertz Falls Victim to Cleo Zero-Day Attacks
Source: Dark Reading Published on: 2025-04-15
-
Wave of Wine-Inspired Phishing Attacks Targets EU Diplomats
Source: Dark Reading Published on: 2025-04-15
-
Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool
Source: TheHackerNews Published on: 2025-04-15
-
China-Backed Threat Actor 'UNC5174' Using Open Source Tools in Stealthy Attacks
Source: Dark Reading Published on: 2025-04-15
-
Are We Prioritizing the Wrong Security Metrics?
Source: Dark Reading Published on: 2025-04-15
-
Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence
Source: TheHackerNews Published on: 2025-04-15
-
Malicious PyPI Package Targets MEXC Trading API to Steal Credentials and Redirect Orders
Source: TheHackerNews Published on: 2025-04-15
-
Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds
Source: TheHackerNews Published on: 2025-04-15
-
Crypto Developers Targeted by Python Malware Disguised as Coding Challenges
Source: TheHackerNews Published on: 2025-04-15
-
Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability
Source: TheHackerNews Published on: 2025-04-14
-
Meta Resumes E.U. AI Training Using Public User Data After Regulator Approval
Source: TheHackerNews Published on: 2025-04-14
-
Trump Revenge Tour Targets Cyber Leaders, Elections
Source: Krebs on Security Published on: 2025-04-14
-
AI Code Tools Widely Hallucinate Packages
Source: Dark Reading Published on: 2025-04-14
-
Threat Intel Firm Offers Crypto in Exchange for Dark Web Accounts
Source: Dark Reading Published on: 2025-04-14
-
Fortinet Zero-Day Bug May Lead to Arbitrary Code Execution
Source: Dark Reading Published on: 2025-04-14
-
Chinese APTs Exploit EDR 'Visibility Gap' for Cyber Espionage
Source: Dark Reading Published on: 2025-04-14
-
ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading
Source: TheHackerNews Published on: 2025-04-14
-
A New 'It RAT': Stealthy 'Resolver' Malware Burrows In
Source: Dark Reading Published on: 2025-04-14
-
7 RSAC 2025 Cloud Security Sessions You Don't Want to Miss
Source: Dark Reading Published on: 2025-04-14
-
Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft
Source: TheHackerNews Published on: 2025-04-14
-
How DigitalOcean Moved Away From Manual Identity Management
Source: Dark Reading Published on: 2025-04-14
-
⚡ Weekly Recap: Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and More
Source: TheHackerNews Published on: 2025-04-14
-
Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind
Source: TheHackerNews Published on: 2025-04-14
-
Attacks on the education sector are surging: How can cyber-defenders respond?
Source: We live Security Published on: 2025-04-14
-
Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT
Source: TheHackerNews Published on: 2025-04-14
-
Morocco Investigates Social Security Agency Data Leak
Source: Dark Reading Published on: 2025-04-14
-
Pall Mall Process Progresses but Leads to More Questions
Source: Dark Reading Published on: 2025-04-11
-
Pall Mall Process Progresses but Leads to More Questions
Source: Dark Reading Published on: 2025-04-11
-
Paper Werewolf Threat Actor Targets Flash Drives With New Malware
Source: Dark Reading Published on: 2025-04-11
-
Paper Werewolf Threat Actor Targets Flash Drives With New Malware
Source: Dark Reading Published on: 2025-04-11
-
Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit
Source: TheHackerNews Published on: 2025-04-11
-
Financial Fraud, With a Third-Party Twist, Dominates Cyber Claims
Source: Dark Reading Published on: 2025-04-11
-
Using Third-Party ID Providers Without Losing Zero Trust
Source: Dark Reading Published on: 2025-04-11
-
Organizations Lack Incident Response Plans, But Answers Are on the Way
Source: Dark Reading Published on: 2025-04-11
-
Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors
Source: TheHackerNews Published on: 2025-04-11
-
11 Bugs Found in Perplexity AI's Chatbot Android App
Source: Dark Reading Published on: 2025-04-11
-
Initial Access Brokers Shift Tactics, Selling More for Less
Source: TheHackerNews Published on: 2025-04-11
-
Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways
Source: TheHackerNews Published on: 2025-04-11
-
Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways
Source: TheHackerNews Published on: 2025-04-11
-
SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps
Source: TheHackerNews Published on: 2025-04-11
-
SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps
Source: TheHackerNews Published on: 2025-04-11
-
OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation
Source: TheHackerNews Published on: 2025-04-10
-
Zero-Day in CentreStack File Sharing Platform Under Attack
Source: Dark Reading Published on: 2025-04-10
-
AuthZEN Aims to Harmonize Fractured Authorization Controls
Source: Dark Reading Published on: 2025-04-10
-
Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board
Source: Dark Reading Published on: 2025-04-10
-
Digital Asset Management Platform Liminal Raises $4.7M Funding Led by Elevation Capital
Source: Dark Reading Published on: 2025-04-10
-
Trump's DoJ Targets Krebs, Revokes SentinelOne Security Clearance
Source: Dark Reading Published on: 2025-04-10
-
What Should the US Do About Salt Typhoon?
Source: Dark Reading Published on: 2025-04-10
-
Open Source Poisoned Patches Infect Local Software
Source: Dark Reading Published on: 2025-04-10
-
Open Source Poisoned Patches Infect Local Software
Source: Dark Reading Published on: 2025-04-10
-
China-based SMS Phishing Triad Pivots to Banks
Source: Krebs on Security Published on: 2025-04-10
-
Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes
Source: TheHackerNews Published on: 2025-04-10
-
Why Data Privacy Isn't the Same as Data Security
Source: Dark Reading Published on: 2025-04-10
-
Threat Actors Use 'Spam Bombing' Technique to Hide Malicious Motives
Source: Dark Reading Published on: 2025-04-10
-
Malicious npm Package Targets Atomic Wallet, Exodus Users by Swapping Crypto Addresses
Source: TheHackerNews Published on: 2025-04-10
-
PlayPraetor Reloaded: CTM360 Uncovers a Play Masquerading Party
Source: TheHackerNews Published on: 2025-04-10
-
The Identities Behind AI Agents: A Deep Dive Into AI & NHI
Source: TheHackerNews Published on: 2025-04-10
-
Gamaredon Uses Infected Removable Drives to Breach Western Military Mission in Ukraine
Source: TheHackerNews Published on: 2025-04-10
-
Europol Arrests Five SmokeLoader Clients Linked by Seized Database Evidence
Source: TheHackerNews Published on: 2025-04-10
-
Watch out for these traps lurking in search results
Source: We live Security Published on: 2025-04-10
-
AkiraBot Targets 420,000 Sites with OpenAI-Generated Spam, Bypassing CAPTCHA Protections
Source: TheHackerNews Published on: 2025-04-10
-
Google Merges Security Offerings Into a Cohesive Suite
Source: Dark Reading Published on: 2025-04-09
-
Advanced Preparation Was Key to a Secure Paris Olympics
Source: Dark Reading Published on: 2025-04-09
-
US Comptroller Cyber 'Incident' Compromises Org's Emails
Source: Dark Reading Published on: 2025-04-09
-
CrushFTP Exploitation Continues Amid Disclosure Dispute
Source: Dark Reading Published on: 2025-04-09
-
Tariffs May Prompt Increase in Global Cyberattacks
Source: Dark Reading Published on: 2025-04-09
-
Oracle Appears to Admit Breach of 2 'Obsolete' Servers
Source: Dark Reading Published on: 2025-04-09
-
China-Linked Hackers Continue Harassing Ethnic Groups With Spyware
Source: Dark Reading Published on: 2025-04-09
-
Lovable AI Found Most Vulnerable to VibeScamming — Enabling Anyone to Build Live Scam Pages
Source: TheHackerNews Published on: 2025-04-09
-
Using Post-Quantum Planning to Improve Security Hygiene
Source: Dark Reading Published on: 2025-04-09
-
New TCESB Malware Found in Active Attacks Exploiting ESET Security Scanner
Source: TheHackerNews Published on: 2025-04-09
-
Explosive Growth of Non-Human Identities Creating Massive Security Blind Spots
Source: TheHackerNews Published on: 2025-04-09