Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities

The company’s latest security update contains the highest number of Android vulnerabilities patched in a single month since April 2018.

The post Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities appeared first on CyberScoop.

Continue reading Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities

Project Compass is Europol’s new playbook for taking on The Com

Officials said 30 perpetrators have been arrested in the past year, and global law enforcement cooperation is closing the gap.

The post Project Compass is Europol’s new playbook for taking on The Com appeared first on CyberScoop.

Continue reading Project Compass is Europol’s new playbook for taking on The Com

Governments issue warning over Cisco zero-day attacks dating back to 2023

The global campaign marks the second series of multiple actively exploited zero-day vulnerabilities in Cisco edge technology since last spring. The similarities don’t end there.

The post Governments issue warning over Cisco zero-day attacks dating back to 2023 appeared first on CyberScoop.

Continue reading Governments issue warning over Cisco zero-day attacks dating back to 2023

Vulnerabilities grew like weeds in 2025, but only 1% were weaponized in attacks

Too many defenders and researchers are paying attention to defects and unsubstantiated exploit concepts that aren’t worth their time, VulnCheck’s Caitlin Condon said.

The post Vulnerabilities grew like weeds in 2025, but only 1% were weaponized in attacks appeared first on CyberScoop.

Continue reading Vulnerabilities grew like weeds in 2025, but only 1% were weaponized in attacks

CrowdStrike says attackers are moving through networks in under 30 minutes

The average time from intrusion to network movement in 2025 was 29 minutes, a 65% increase in speed from the year prior.

The post CrowdStrike says attackers are moving through networks in under 30 minutes appeared first on CyberScoop.

Continue reading CrowdStrike says attackers are moving through networks in under 30 minutes

Ukrainian sentenced to 5 years in prison for facilitating North Korean remote worker scheme

Oleksandr Didenko ran laptop farms and provided forged or stolen identities to North Korean operatives who gained remote employment at 40 U.S. businesses.

The post Ukrainian sentenced to 5 years in prison for facilitating North Korean remote worker scheme appeared first on CyberScoop.

Continue reading Ukrainian sentenced to 5 years in prison for facilitating North Korean remote worker scheme

Nigerian man sentenced to 8 years in prison for running phony tax refund scheme

Matthew Akande was living in Mexico when he and at least four co-conspirators broke into the networks of tax preparation firms and filed more than 1,000 fraudulent tax returns seeking tax refunds.

The post Nigerian man sentenced to 8 years in prison for running phony tax refund scheme appeared first on CyberScoop.

Continue reading Nigerian man sentenced to 8 years in prison for running phony tax refund scheme

Chinese hackers exploited a Dell zero-day for 18 months before anyone noticed

Google researchers said Chinese attackers have been exploiting a zero-day since mid-2024, and they’ve moved on to a more advanced version of Brickstorm malware called Grimbolt.

The post Chinese hackers exploited a Dell zero-day for 18 months before anyone noticed appeared first on CyberScoop.

Continue reading Chinese hackers exploited a Dell zero-day for 18 months before anyone noticed

Polish authorities arrest alleged Phobos ransomware affiliate

The 47-year-old man, who was not identified, faces up to five years in prison for producing, obtaining and sharing computer programs used to conduct cyberattacks.

The post Polish authorities arrest alleged Phobos ransomware affiliate appeared first on CyberScoop.

Continue reading Polish authorities arrest alleged Phobos ransomware affiliate

Unit 42: Nearly two-thirds of breaches now start with identity abuse

Palo Alto Network’s incident response firm said identity-based attacks are exploding as poor security controls stretch across a widening mosaic of integrated tools and systems.

The post Unit 42: Nearly two-thirds of breaches now start with identity abuse appeared first on CyberScoop.

Continue reading Unit 42: Nearly two-thirds of breaches now start with identity abuse