lithos Twitter
Lithos Header
News DB:
 URL DB:
Last Updated
Age in hrs 
1
2
3
5
8
13
21
34
55

 MY TAKE: Have you noticed how your phone’s AI assistant is starting to remap what you trust?  - This morning, I tried to power down my Samsung S23 smartphone.

 Investment Scams Spread Across Asia With International Reach  - A surge in fake investment platforms targeting cryptocurrency and forex markets has been driving a new wave of financial crime in Asia

 Dataset used to train NSFW detection models contained child abuse material  - A huge dataset used to train AI tools that detect not-safe-for-work (NSFW) content contained child sexual abuse material (CSAM), until a child protection charity got its hands on it.

 Myanmar Military Raids Notorious Scam Centre  - Myanmar military raids scam farm KK Park amidst growth of lucrative investment-scam industry in southeast Asia

 Qilin Ransomware Group Publishes Over 40 Cases Monthly  - Qilin ransomware activity has surged in late 2025, threatening data leaks via double extortion tactics

 JLR Attack Drags UK Car Production Down By More Than A Quarter  - UK car production falls by 27 percent in September after cyber-atack on Jaguar Land Rover shuts down factories

 Mem3nt0 mori – The Hacking Team is back!  - Kaspersky researchers discovered previously unidentified commercial Dante spyware developed by Memento Labs (formerly Hacking Team) and linked it to the ForumTroll APT attacks.

 New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves  - A group of academic researchers from Georgia Tech, Purdue University, and Synkhronix have developed a side-channel attack called TEE.Fail that allows for the extraction of secrets from the trusted execution environment (TEE) in a computer's main processor, including Intel's Software Guard eXtensions (SGX)...

 The AI Fix #74: AGI, LLM brain rot, and how to scam an AI browser  - In episode 74 of The AI Fix, we meet Amazon's AI-powered delivery glasses, an AI TV presenter who doesn't exist, and an Ohio lawmaker who wants to stop people from marrying their chatbot. Also, we learn how Geoffrey Hinton and Steve Wozniak have teamed up with the unlikely coupling of will.i.am and Steve...

 Is Your Google Workspace as Secure as You Think it is?  - The New Reality for Lean Security Teams If you're the first security or IT hire at a fast-growing startup, you've likely inherited a mandate that's both simple and maddeningly complex: secure the business without slowing it down. Most organizations using Google Workspace start with an environment built...

 X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts  - Social media platform X is urging users who have enrolled for two-factor authentication (2FA) using passkeys and hardware security keys like Yubikeys to re-enroll their key to ensure continued access to the service. To that end, users are being asked to complete the re-enrollment , either using their...

 Your AI Agent Is Now a Target for Email Phishing  - New tools can help thwart the attacks

 Critical WordPress Plugin Bugs Exploited En Masse  - Wordfence says threat actors are trying to exploit three critical vulnerabilities from 2024

 New Webinar: Endpoint Security Evolution — Detection and Response in the Web Browser  - Today's workforce spends more time in the browser than ever, with work shifting to SaaS and cloud services. But security controls haven't kept up.

 How to Land a Job in Quantum Computing  - Break into the field with these five tips

 Actively Exploited WSUS Bug Added to CISA KEV List  - Sysadmins are urged to patch WSUS vulnerability CVE-2025-59287 as soon as possible, with federal agencies required to update by November 14

 Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs  - Kaspersky GReAT experts dive deep into the BlueNoroff APT's GhostCall and GhostHire campaigns. Extensive research detailing multiple malware chains targeting macOS, including a stealer suite, fake Zoom and Microsoft Teams clients and ChatGPT-enhanced images.

 CrowdStrike Named the Leader in 2025 Frost Radar for SaaS Security Posture Management  - We're proud to announce that CrowdStrike has been recognized as the Growth and Innovation Leader in the 2025 Frost Radar™ for SaaS Security Posture Management (SSPM) for the second consecutive time. T[…]

 ⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens  - Security, trust, and stability — once the pillars of our digital world — are now the tools attackers turn against us. From stolen accounts to fake job offers, cybercriminals keep finding new ways to exploit both system flaws and human behavior. Each new breach proves a harsh truth: in cybersecurity,...

 Hackers steal Discord accounts with RedTiger-based infostealer  - Attackers are using the open-source red-team tool RedTiger to build an infostealer that collects Discord account data and payment information.

CyberSec News Aggregator Page: The freshest links are havested from the domains below.

cisa3 h
cisa2 h
vmray6 h