New ‘Chihuahua Stealer’ Targets Browser Data and Crypto Wallets

New ‘Chihuahua Stealer’ Targets Browser Data and Crypto Wallets

A new strain of infostealer blending standard malware techniques with unusually advanced features has been detected. First flagged by a Reddit user in April 2025, the malware, known as Chihuahua Stealer, was analyzed by G Data CyberDefense, which shared its findings in a May 13 report. While appearing unsophisticated on the surface, this .NET infostealer employs advanced methods, including stealthy loading, scheduled task persistence and a multi-staged payload. Multi-Stage PowerShell Script Infection On April 9,…

Read More

Tech leaders are rushing to deploy agentic AI, study shows

Tech leaders are rushing to deploy agentic AI, study shows

Piyawat Wuttichaikitcharoen / Getty Images Tech executives are moving swiftly to embrace AI agents, according to the latest Technology Pulse Poll from accounting firm Ernst & Young (EY). The poll, which surveyed more than 500 tech leaders in April, found about half (48%) of respondents have at least begun deploying agentic AI within their organizations. Slightly more (around 50%) said most of their companies’ internal AI operations will be fully autonomous within the next two…

Read More

INE Security Alert: Continuous CVE Practice Closes Critical Gap Between Vulnerability Alerts and Effective Defense

INE Security Alert: Continuous CVE Practice Closes Critical Gap Between Vulnerability Alerts and Effective Defense

INE Security, a global leader in hands-on cybersecurity training and certifications, today highlighted how ongoing real-world practice with the latest CVEs (Common Vulnerabilities and Exposures) is essential for transforming security teams from reactive to proactive defenders. With over 26,000 new CVEs documented in the past year, security teams are drowning in vulnerability alerts while facing exploit windows that have compressed to hours in many cases. “Reading CVE bulletins is not the same as knowing how…

Read More

European Police Bust €3m Investment Fraud Ring

European Police Bust €3m Investment Fraud Ring

Law enforcement agencies in five regions have joined forces to take down an organized crime group responsible for defrauding scores of victims, according to Europol. The European police group claimed that at least 100 victims have been defrauded to the tune of over €3m ($3.4m), by a criminal network offering them high returns on fake investment opportunities. The operation began nearly three years ago in Germany, when a married couple reportedly notified local police that…

Read More

Your car's USB port has hidden superpowers: 5 features you're not taking advantage of

Your car's USB port has hidden superpowers: 5 features you're not taking advantage of

Chris Bayer/ZDNET In 2005, about 3.3 million cars sold that year included at least one USB port. Twenty years later, more than 200 million cars have embedded connectivity outlets (USB-A), and these days, a significant portion of them have USB-C ports. Some vehicles have as many as nine ports! Even many newer-model motorcycles have USB outlets. Also: 5 Chromecast features you’re not using enough on your TV (including a smart home buff) Usually situated on the…

Read More

Who wants to be a chief AI officer? A new career path emerges

Who wants to be a chief AI officer? A new career path emerges

gremlin/Getty Images In the year ahead, nine out of 10 organizations are expected to hire talent with generative AI expertise, with a quarter of organizations forecasting that at least half of their new hires will need this skill. In addition, six in 10 companies now have a chief AI officer (CAIO) to guide the process. Also: Most CEOs find their C-suite lacks much-needed ‘AI-savvy’ These are the findings from a new survey of 3,739 executives…

Read More

Rebooting your phone daily is your best defense against zero-click attacks – here's why

Rebooting your phone daily is your best defense against zero-click attacks – here's why

Elyse Betters Picaro / ZDNET Over the past decade, spyware tools have been repeatedly found on the phones of journalists, activists, and politicians. This has raised concerns about the unprecedented proliferation of spyware technologies and the lack of protections within the tech sector. Also: Got a suspicious E-ZPass text? Don’t click the link (and what to do if you already did) Meta’s WhatsApp recently revealed it discovered a hacking campaign targeting about 90 users — mostly…

Read More

Meet the most important AI tool that no one is talking about – but everyone needs

Meet the most important AI tool that no one is talking about – but everyone needs

Adrienne Bresnahan/Getty Images Stop me if this sounds familiar. 😇 You’ve got ChatGPT open and working on a project, along with a few more tabs with different AI tools. One for writing. One for design. One for some automation. And so on. Each of them promises to save you time, but they never do. Rather than having your time back, you want your sanity back because keeping up with all these tools has left you…

Read More

The Forgotten Threat: How Supply Chain Attacks Are Targeting Small Businesses

The Forgotten Threat: How Supply Chain Attacks Are Targeting Small Businesses

When people hear “supply chain attack,” their minds often go to headline-grabbing breaches. But while analysts, CISOs, and journalists dissect those incidents, a more tactical and persistent wave of attacks has been unfolding in parallel; one that’s laser-focused on small businesses as the point of entry. This isn’t collateral damage. It’s by design. Cybercriminals aren’t always trying to figuratively kick down the front doors of well-defended enterprises. Instead, they’re probing the digital perimeter for softer…

Read More

Microsoft Fixes Seven Zero-Days in May Patch Tuesday

Microsoft Fixes Seven Zero-Days in May Patch Tuesday

Microsoft has released security updates to fix seven zero-day vulnerabilities, five of which are under active exploitation. This month’s Patch Tuesday saw the tech giant release fixes for over 70 vulnerabilities, including five actively exploited zero-days, which are: CVE-2025-32701: An elevation of privilege (EoP) vulnerability in Windows Common Log File System Driver  CVE-2025-32709: An EoP bug in Windows Ancillary Function Driver for WinSock  CVE-2025-30397: A remote code execution (RCE) vulnerability in Microsoft Scripting Engine CVE-2025-32706:…

Read More
1 66 67 68 69 70 4,402