lithos Twitter
Lithos Header
News DB:
 URL DB:
Last Updated
Age in hrs 
1
2
3
5
8
13
21
34
55

 Does Your Organization Need Deepfake Defenses?  - Picture this: you're scrolling through your company's social media feed, and suddenly a video shows your CEO endorsing a competitor's product. It looks real. The voice, the gestures, the background—it's all perfect. Or that same CEO calling you to urgently approve a strange payment. But you know, deep...

 GUEST ESSAY: Why IoT security must start at the module—a blueprint for scaling IoT security  - A few years ago, a casino was breached via a smart fish tank thermometer.

 Stop Remote Ransomware Attacks with Falcon Endpoint Security  - Ransomware is a rapidly evolving threat, with attackers increasingly turning to remote techniques that target network shares. To help defend against these tactics, CrowdStrike Falcon® Prevent endpoint[…]

 Interlock Ransomware Unleashes New RAT in Widespread Campaign  - Interlock ransomware continues to develop custom tooling and a new RAT has been detected by researchers

 North Korean Actors Expand Contagious Interview Campaign with New Malware Loader  - Socket has identified a new malware loader called XORIndex incorporated into malicious packages published to the npm registry, with over 9000 downloads so far

 Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors  - Cloudflare on Tuesday said it mitigated 7.3 million distributed denial-of-service (DDoS) attacks in the second quarter of 2025, a significant drop from 20.5 million DDoS attacks it fended off the previous quarter. "Overall, in Q2 2025, hyper-volumetric DDoS attacks skyrocketed," Omer Yoachimik and Jorge...

 JD Vance’s Disneyland vacation sparks outrage, mockery  - Users took to X to mock the United States Vice President JD Vance in a recent viral video of him at Disneyland. His vacation sparked outrage due to ongoing ICE raids and the mass deportation crisis in the US.

 Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub  - Cybersecurity researchers have discovered a serious security issue that allows leaked Laravel APP_KEYs to be weaponized to gain remote code execution capabilities on hundreds of applications. "Laravel's APP_KEY, essential for encrypting sensitive data, is often leaked publicly (e.g., on GitHub)," GitGuardian...

 Epstein-obsessed users feel “betrayed” by Trump, while “raw” prison video fuels new conspiracies  - The community that bolstered President Donald Trump during his election campaign feels betrayed after the release of Epstein’s client list turned out to be an empty promise.

 Retail Ransomware Attacks Jump 58% Globally in Q2 2025  - BlackFog found that publicly disclosed ransomware attacks on retail grew significantly in Q2 compared to Q1, with UK firms heavily targeted

 Police Arrest Four Linked To M&S, Co-op Attacks  - Police arrest three males and one woman in connection with cyber-attacks earlier this year that disrupted M&S and Co-op operations

 NCSC Launches Vulnerability Research Institute to Boost UK Resilience  - The NCSC’s new Vulnerability Research Institute will help it develop outreach with the external cybersecurity community

 Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot  - Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls.

 CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center  - India's Central Bureau of Investigation (CBI) has announced that it has taken steps to dismantle what it said was a transnational cybercrime syndicate that carried out "sophisticated" tech support scams targeting citizens of Australia and the United Kingdom. The fraudulent scheme is estimated to have...

 Grok 4 benchmark results: Tops math, ranks second in coding  - Grok 4 is a huge leap from Grok 3, but how good is it compared to other models in the market, such as Gemini 2.5 Pro? We now have answers, thanks to new independent benchmarks.

 OpenAI's image model gets built-in style feature on ChatGPT  - OpenAI's image gen model, which is available via ChatGPT for free, now lets you easily create AI images even if you're not familiar with trends or prompt engineering.

 AsyncRAT's Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe  - Cybersecurity researchers have charted the evolution of a widely used remote access trojan called AsyncRAT , which was first released on GitHub in January 2019 and has since served as the foundation for several other variants. "AsyncRAT has cemented its place as a cornerstone of modern malware and as...

 DOGE Denizen Marko Elez Leaked API Key for xAI  - Marko Elez , a 25-year-old employee at Elon Musk’s Department of Government Efficiency (DOGE), has been granted access to sensitive databases at the U.S. Social Security Administration, the Treasury and Justice departments, and the Department of Homeland Security. So it should fill all Americans with...

 Elmo has been hacked, claims Trump is in Epstein files, calls for Jews to be exterminated  - Over the weekend, Sesame Street star Elmo's verified account was apparently hijacked and used to post a string of profane messages, including one describing Donald Trump as a “child f****r” and referencing Jeffrey Epstein.

CyberSec News Aggregator Page: The freshest links are havested from the domains below.

cisa7 h
cisa30 m
vmray5 h