Nucor made it clear its investigation is still in the early stages and didn’t specify the nature or scope of the breach, nor who the threat actor might be. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
Author Archives: Onsite Computing, Inc.
Fraudsters worldwide apply for money from the US government using stolen and forged identities, making off with hundreds of billions of dollars annually. Go to Source Author: Nate Nelson, Contributing Writer
Hackers are running a worldwide cyberespionage campaign dubbed ‘RoundPress,’ leveraging zero-day and n-day flaws in webmail servers to steal email from high-value government organizations. […] Go to Source Author: Bill Toulas
CVE-2025-4632, a patch bypass for a Samsung MagicInfo 9 Server vulnerability disclosed last year, has been exploited by threat actors in the wild. Go to Source Author: Alexander Culafi, Senior News Writer, Dark Reading
The FBI warned that cybercriminals using AI-generated audio deepfakes to target U.S. officials in voice phishing attacks that started in April. […] Go to Source Author: Sergiu Gatlan
As threat actors continue to hop on the train of exploiting CVE-2025-31324, researchers are recommending that SAP administrators patch as soon as possible so that they don’t fall victim next. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if it proceeds with its plans to train users’ data for training its artificial intelligence (AI) models without an explicit opt-in. The move comes weeks after the social media behemoth announced […]
Nova Scotia Power confirms it suffered a data breach after threat actors stole sensitive customer data in a cybersecurity incident discovered last month. […] Go to Source Author: Bill Toulas
On the first day of Pwn2Own Berlin 2025, security researchers were awarded $260,000 after successfully demonstrating zero-day exploits for Windows 11, Red Hat Linux, Docker Desktop, and Oracle VirtualBox. […] Go to Source Author: Sergiu Gatlan
Tor has announced Oniux, a new command-line tool for routing any Linux application securely through the Tor network for anonymized network connections. […] Go to Source Author: Bill Toulas
