FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public

By: Ravie Lakshmanan β€” June 24th 2025 at 18:47
The United States Embassy in India has announced that applicants for F, M, and J nonimmigrant visas should make their social media accounts public. The new guideline seeks to help officials verify the identity and eligibility of applicants under U.S. law. The U.S. Embassy said every visa application review is a "national security decision." "Effective immediately, all individuals applying for an
☐ β˜† βœ‡ The Hacker News

Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue

By: Ravie Lakshmanan β€” June 24th 2025 at 14:17
Cybersecurity researchers have detailed two novel methods that can be used to disrupt cryptocurrency mining botnets. The methods take advantage of the design of various common mining topologies in order to shut down the mining process, Akamai said in a new report published today. "We developed two techniques by leveraging the mining topologies and pool policies that enable us to reduce a
☐ β˜† βœ‡ The Hacker News

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers

By: Ravie Lakshmanan β€” June 24th 2025 at 13:26
Unidentified threat actors have been observed targeting publicly exposed Microsoft Exchange servers to inject malicious code into the login pages that harvest their credentials. Positive Technologies, in a new analysis published last week, said it identified two different kinds of keylogger code written in JavaScript on the Outlook login page - Those that save collected data to a local file
☐ β˜† βœ‡ The Hacker News

Between Buzz and Reality: The CTEM Conversation We All Need

By: Ravie Lakshmanan β€” June 24th 2025 at 11:00
I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn’t have asked for a better kickoff panel: three cybersecurity leaders who don’t just talk security, they live it. Let me introduce them. Alex Delay, CISO at IDB Bank, knows what it means to defend a highly regulated environment. Ben Mead, Director of Cybersecurity at Avidity
☐ β˜† βœ‡ The Hacker News

Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network

By: Ravie Lakshmanan β€” June 24th 2025 at 09:57
Misconfigured Docker instances are the target of a campaign that employs the Tor anonymity network to stealthily mine cryptocurrency in susceptible environments. "Attackers are exploiting misconfigured Docker APIs to gain access to containerized environments, then using Tor to mask their activities while deploying crypto miners," Trend Micro researchers Sunil Bharti and Shubham Singh said in an
☐ β˜† βœ‡ The Hacker News

U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

By: Ravie Lakshmanan β€” June 24th 2025 at 09:16
The U.S. House of Representatives has formally banned congressional staff members from using WhatsApp on government-issued devices, citing security concerns. The development was first reported by Axios. The decision, according to the House Chief Administrative Officer (CAO), was motivated by worries about the app's security. "The Office of Cybersecurity has deemed WhatsApp a high-risk to users
☐ β˜† βœ‡ The Hacker News

APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

By: Ravie Lakshmanan β€” June 24th 2025 at 09:06
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new cyber attack campaign by the Russia-linked APT28 (aka UAC-0001) threat actors using Signal chat messages to deliver two new malware families dubbed BEARDSHELL and COVENANT. BEARDSHELL, per CERT-UA, is written in C++ and offers the ability to download and execute PowerShell scripts, as well as upload the results of the
☐ β˜† βœ‡ The Hacker News

China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

By: Ravie Lakshmanan β€” June 24th 2025 at 03:00
The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory warning of cyber attacks mounted by the China-linked Salt Typhoon actors to breach major global telecommunications providers as part of a cyber espionage campaign. The attackers exploited a critical Cisco IOS XE software (CVE-2023-20198, CVSS score: 10.0) to access configuration
☐ β˜† βœ‡ The Hacker News

Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content

By: Ravie Lakshmanan β€” June 23rd 2025 at 15:58
Cybersecurity researchers are calling attention to a new jailbreaking method called Echo Chamber that could be leveraged to trick popular large language models (LLMs) into generating undesirable responses, irrespective of the safeguards put in place. "Unlike traditional jailbreaks that rely on adversarial phrasing or character obfuscation, Echo Chamber weaponizes indirect references, semantic
☐ β˜† βœ‡ The Hacker News

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

By: Ravie Lakshmanan β€” June 23rd 2025 at 15:14
The United States government has warned of cyber attacks mounted by pro-Iranian groups after it launched airstrikes on Iranian nuclear sites as part of the Iran–Israel war that commenced on June 13, 2025. Stating that the ongoing conflict has created a "heightened threat environment" in the country, the Department of Homeland Security (DHS) said in a bulletin that cyber actors are likely to
☐ β˜† βœ‡ The Hacker News

XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks

By: Ravie Lakshmanan β€” June 23rd 2025 at 13:12
Cybersecurity researchers have uncovered a Go-based malware called XDigo that has been used in attacks targeting Eastern European governmental entities in March 2025. The attack chains are said to have leveraged a collection of Windows shortcut (LNK) files as part of a multi-stage procedure to deploy the malware, French cybersecurity company HarfangLab said. XDSpy is the name assigned to a cyber
☐ β˜† βœ‡ The Hacker News

How AI-Enabled Workflow Automation Can Help SOCs Reduce Burnout

By: Unknown β€” June 23rd 2025 at 11:25
It sure is a hard time to be a SOC analyst. Every day, they are expected to solve high-consequence problems with half the data and twice the pressure. Analysts are overwhelmedβ€”not just by threats, but by the systems and processes in place that are meant to help them respond. Tooling is fragmented. Workflows are heavy. Context lives in five places, and alerts never slow down. What started as a
☐ β˜† βœ‡ The Hacker News

Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks

By: Ravie Lakshmanan β€” June 23rd 2025 at 10:46
Google has revealed the various safety measures that are being incorporated into its generative artificial intelligence (AI) systems to mitigate emerging attack vectors like indirect prompt injections and improve the overall security posture for agentic AI systems. "Unlike direct prompt injections, where an attacker directly inputs malicious commands into a prompt, indirect prompt injections
☐ β˜† βœ‡ The Hacker News

⚑ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More

By: Ravie Lakshmanan β€” June 23rd 2025 at 09:30
Not every risk looks like an attack. Some problems start as small glitches, strange logs, or quiet delays that don’t seem urgentβ€”until they are. What if your environment is already being tested, just not in ways you expected? Some of the most dangerous moves are hidden in plain sight. It’s worth asking: what patterns are we missing, and what signals are we ignoring because they don’t match old
☐ β˜† βœ‡ The Hacker News

Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages

By: Ravie Lakshmanan β€” June 21st 2025 at 09:44
The April 2025 cyber attacks targeting U.K. retailers Marks & Spencer and Co-op have been classified as a "single combined cyber event." That's according to an assessment from the Cyber Monitoring Centre (CMC), a U.K.-based independent, non-profit body set up by the insurance industry to categorize major cyber events. "Given that one threat actor claimed responsibility for both M&S and
☐ β˜† βœ‡ The Hacker News

Qilin Ransomware Adds "Call Lawyer" Feature to Pressure Victims for Larger Ransoms

By: Ravie Lakshmanan β€” June 20th 2025 at 16:35
The threat actors behind the Qilin ransomware-as-a-service (RaaS) scheme are now offering legal counsel for affiliates to put more pressure on victims to pay up, as the cybercrime group intensifies its activity and tries to fill the void left by its rivals. The new feature takes the form of a "Call Lawyer" feature on the affiliate panel, per Israeli cybersecurity company Cybereason. The
☐ β˜† βœ‡ The Hacker News

Iran's State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist

By: Ravie Lakshmanan β€” June 20th 2025 at 11:54
Iran's state-owned TV broadcaster was hacked Wednesday night to interrupt regular programming and air videos calling for street protests against the Iranian government, according to multiple reports. It's currently not known who is behind the attack, although Iran pointed fingers at Israel, per Iran International. "If you experience disruptions or irrelevant messages while watching various TV
☐ β˜† βœ‡ The Hacker News

6 Steps to 24/7 In-House SOC Success

By: Unknown β€” June 20th 2025 at 10:00
Hackers never sleep, so why should enterprise defenses? Threat actors prefer to target businesses during off-hours. That’s when they can count on fewer security personnel monitoring systems, delaying response and remediation. When retail giant Marks & Spencer experienced a security event over Easter weekend, they were forced to shut down their online operations, which account for
☐ β˜† βœ‡ The Hacker News

Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider

By: Ravie Lakshmanan β€” June 20th 2025 at 09:36
Cloudflare on Thursday said it autonomously blocked the largest distributed denial-of-service (DDoS) attack ever recorded, which hit a peak of 7.3 terabits per second (Tbps). The attack, which was detected in mid-May 2025, targeted an unnamed hosting provider. "Hosting providers and critical Internet infrastructure have increasingly become targets of DDoS attacks," Cloudflare's Omer Yoachimik
☐ β˜† βœ‡ The Hacker News

200+ Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers

By: Ravie Lakshmanan β€” June 20th 2025 at 07:41
Cybersecurity researchers have uncovered a new campaign in which the threat actors have published more than 67 GitHub repositories that claim to offer Python-based hacking tools, but deliver trojanized payloads instead. The activity, codenamed Banana Squad by ReversingLabs, is assessed to be a continuation of a rogue Python campaign that was identified in 2023 as targeting the Python Package
☐ β˜† βœ‡ The Hacker News

New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud, and NFC Theft

By: Ravie Lakshmanan β€” June 19th 2025 at 17:23
Cybersecurity researchers have exposed the inner workings of an Android malware called AntiDot that has compromised over 3,775 devices as part of 273 unique campaigns. "Operated by the financially motivated threat actor LARVA-398, AntiDot is actively sold as a Malware-as-a-Service (MaaS) on underground forums and has been linked to a wide range of mobile campaigns," PRODAFT said in a report
☐ β˜† βœ‡ The Hacker News

BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with macOS Backdoor Malware

By: Ravie Lakshmanan β€” June 19th 2025 at 11:38
The North Korea-aligned threat actor known as BlueNoroff has been observed targeting an employee in the Web3 sector with deceptive Zoom calls featuring deepfaked company executives to trick them into installing malware on their Apple macOS devices. Huntress, which revealed details of the cyber intrusion, said the attack targeted an unnamed cryptocurrency foundation employee, who received a
☐ β˜† βœ‡ The Hacker News

Secure Vibe Coding: The Complete New Guide

By: Unknown β€” June 19th 2025 at 11:25
DALL-E for coders? That’s the promise behind vibe coding, a term describing the use of natural language to create software. While this ushers in a new era of AI-generated code, it introduces "silent killer" vulnerabilities: exploitable flaws that evade traditional security tools despite perfect test performance. A detailed analysis of secure vibe coding practices is available here. TL;DR: Secure
☐ β˜† βœ‡ The Hacker News

Uncover LOTS Attacks Hiding in Trusted Tools β€” Learn How in This Free Expert Session

By: Unknown β€” June 19th 2025 at 10:00
Most cyberattacks today don’t start with loud alarms or broken firewalls. They start quietlyβ€”inside tools and websites your business already trusts. It’s called β€œLiving Off Trusted Sites” (LOTS)β€”and it’s the new favorite strategy of modern attackers. Instead of breaking in, they blend in. Hackers are using well-known platforms like Google, Microsoft, Dropbox, and Slack as launchpads. They hide
☐ β˜† βœ‡ The Hacker News

Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

By: Ravie Lakshmanan β€” June 19th 2025 at 08:06
Threat actors with suspected ties to Russia have been observed taking advantage of a Google account feature called application specific passwords (or app passwords) as part of a novel social engineering tactic designed to gain access to victims' emails. Details of the highly targeted campaign were disclosed by Google Threat Intelligence Group (GTIG) and the Citizen Lab, stating the activity
☐ β˜† βœ‡ The Hacker News

Meta Adds Passkey Login Support to Facebook for Android and iOS Users

By: Ravie Lakshmanan β€” June 19th 2025 at 06:04
Meta Platforms on Wednesday announced that it's adding support for passkeys, the next-generation password standard, on Facebook. "Passkeys are a new way to verify your identity and login to your account that's easier and more secure than traditional passwords," the tech giant said in a post. Support for passkeys is expected to be available "soon" on Android and iOS mobile devices. The feature is
☐ β˜† βœ‡ The Hacker News

New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions

By: Ravie Lakshmanan β€” June 19th 2025 at 03:33
Cybersecurity researchers have uncovered two local privilege escalation (LPE) flaws that could be exploited to gain root privileges on machines running major Linux distributions. The vulnerabilities, discovered by Qualys, are listed below - CVE-2025-6018 - LPE from unprivileged to allow_active in SUSE 15's Pluggable Authentication Modules (PAM) CVE-2025-6019 - LPE from allow_active to root in
☐ β˜† βœ‡ The Hacker News

New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains

By: Ravie Lakshmanan β€” June 18th 2025 at 15:41
A new campaign is making use of Cloudflare Tunnel subdomains to host malicious payloads and deliver them via malicious attachments embedded in phishing emails. The ongoing campaign has been codenamed SERPENTINE#CLOUD by Securonix. It leverages "the Cloudflare Tunnel infrastructure and Python-based loaders to deliver memory-injected payloads through a chain of shortcut files and obfuscated
☐ β˜† βœ‡ The Hacker News

1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub

By: Ravie Lakshmanan β€” June 18th 2025 at 14:18
A new multi-stage malware campaign is targeting Minecraft users with a Java-based malware that employs a distribution-as-service (DaaS) offering called Stargazers Ghost Network. "The campaigns resulted in a multi-stage attack chain targeting Minecraft users specifically," Check Point researchers JaromΓ­r HoΕ™ejΕ‘Γ­ and Antonis Terefos said in a report shared with The Hacker News. "The malware was
☐ β˜† βœ‡ The Hacker News

FedRAMP at Startup Speed: Lessons Learned

By: Unknown β€” June 18th 2025 at 11:00
For organizations eyeing the federal market, FedRAMP can feel like a gated fortress. With strict compliance requirements and a notoriously long runway, many companies assume the path to authorization is reserved for the well-resourced enterprise. But that’s changing. In this post, we break down how fast-moving startups can realistically achieve FedRAMP Moderate authorization without derailing
☐ β˜† βœ‡ The Hacker News

Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign

By: Ravie Lakshmanan β€” June 18th 2025 at 10:47
Cybersecurity researchers have exposed a previously unknown threat actor known as Water Curse that relies on weaponized GitHub repositories to deliver multi-stage malware. "The malware enables data exfiltration (including credentials, browser data, and session tokens), remote access, and long-term persistence on infected systems," Trend Micro researchers Jovit Samaniego, Aira Marcelo, Mohamed
☐ β˜† βœ‡ The Hacker News

Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

By: Ravie Lakshmanan β€” June 18th 2025 at 06:43
A former U.S. Central Intelligence Agency (CIA) analyst has been sentenced to little more than three years in prison for unlawfully retaining and transmitting top secret National Defense Information (NDI) to people who were not entitled to receive them and for attempting to cover up the malicious activity. Asif William Rahman, 34, of Vienna, has been sentenced today to 37 months on charges of
☐ β˜† βœ‡ The Hacker News

CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability

By: Ravie Lakshmanan β€” June 18th 2025 at 06:43
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed a security flaw impacting the Linux kernel in its Known Exploited Vulnerabilities (KEV) catalog, stating it has been actively exploited in the wild. The vulnerability, CVE-2023-0386 (CVSS score: 7.8), is an improper ownership bug in the Linux kernel that could be exploited to escalate privileges on susceptible
☐ β˜† βœ‡ The Hacker News

Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

By: Ravie Lakshmanan β€” June 18th 2025 at 05:49
Veeam has rolled out patches to contain a critical security flaw impacting its Backup & Replication software that could result in remote code execution under certain conditions. The security defect, tracked as CVE-2025-23121, carries a CVSS score of 9.9 out of a maximum of 10.0. "A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user," the
☐ β˜† βœ‡ The Hacker News

Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict

By: Ravie Lakshmanan β€” June 18th 2025 at 05:35
Iran has throttled internet access in the country in a purported attempt to hamper Israel's ability to conduct covert cyber operations, days after the latter launched an unprecedented attack on the country, escalating geopolitical tensions in the region. Fatemeh Mohajerani, the spokesperson of the Iranian Government, and the Iranian Cyber Police, FATA, said the internet slowdown was designed to
☐ β˜† βœ‡ The Hacker News

Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor

By: Ravie Lakshmanan β€” June 17th 2025 at 19:16
A now-patched security flaw in Google Chrome was exploited as a zero-day by a threat actor known as TaxOff to deploy a backdoor codenamed Trinper. The attack, observed in mid-March 2025 by Positive Technologies, involved the use of a sandbox escape vulnerability tracked as CVE-2025-2783 (CVSS score: 8.3). Google addressed the flaw later that month after Kaspersky reported in-the-wild
☐ β˜† βœ‡ The Hacker News

LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents

By: Ravie Lakshmanan β€” June 17th 2025 at 17:33
Cybersecurity researchers have disclosed a now-patched security flaw in LangChain's LangSmith platform that could be exploited to capture sensitive data, including API keys and user prompts. The vulnerability, which carries a CVSS score of 8.8 out of a maximum of 10.0, has been codenamed AgentSmith by Noma Security. LangSmith is an observability and evaluation platform that allows users to
☐ β˜† βœ‡ The Hacker News

Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware

By: Ravie Lakshmanan β€” June 17th 2025 at 13:28
Cybersecurity researchers are warning of a new phishing campaign that's targeting users in Taiwan with malware families such as HoldingHands RAT and Gh0stCringe. The activity is part of a broader campaign that delivered the Winos 4.0 malware framework earlier this January by sending phishing messages impersonating Taiwan's National Taxation Bureau, Fortinet FortiGuard Labs said in a report
☐ β˜† βœ‡ The Hacker News

Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms

By: Ravie Lakshmanan β€” June 17th 2025 at 12:53
The notorious cybercrime group known as Scattered Spider (aka UNC3944) that recently targeted various U.K. and U.S. retailers has begun to target major insurance companies, according to Google Threat Intelligence Group (GTIG). "Google Threat Intelligence Group is now aware of multiple intrusions in the U.S. which bear all the hallmarks of Scattered Spider activity," John Hultquist, chief analyst
☐ β˜† βœ‡ The Hacker News

Are Forgotten AD Service Accounts Leaving You at Risk?

By: Unknown β€” June 17th 2025 at 11:25
For many organizations, Active Directory (AD) service accounts are quiet afterthoughts, persisting in the background long after their original purpose has been forgotten. To make matters worse, these orphaned service accounts (created for legacy applications, scheduled tasks, automation scripts, or test environments) are often left active with non-expiring or stale passwords. It’s no surprise
☐ β˜† βœ‡ The Hacker News

Hard-Coded 'b' Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments

By: Ravie Lakshmanan β€” June 17th 2025 at 10:33
Cybersecurity researchers have disclosed three security flaws in the popular Sitecore Experience Platform (XP) that could be chained to achieve pre-authenticated remote code execution. Sitecore Experience Platform is an enterprise-oriented software that provides users with tools for content management, digital marketing, and analytics and reports. The list of vulnerabilities is as follows -
☐ β˜† βœ‡ The Hacker News

Backups Are Under Attack: How to Protect Your Backups

By: Unknown β€” June 17th 2025 at 10:30
Ransomware has become a highly coordinated and pervasive threat, and traditional defenses are increasingly struggling to neutralize it. Today’s ransomware attacks initially target your last line of defense β€” your backup infrastructure. Before locking up your production environment, cybercriminals go after your backups to cripple your ability to recover, increasing the odds of a ransom payout.
☐ β˜† βœ‡ The Hacker News

New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks

By: Ravie Lakshmanan β€” June 17th 2025 at 09:32
Cybersecurity researchers have called attention to a new campaign that's actively exploiting a recently disclosed critical security flaw in Langflow to deliver the Flodrix botnet malware. "Attackers use the vulnerability to execute downloader scripts on compromised Langflow servers, which in turn fetch and install the Flodrix malware," Trend Micro researchers Aliakbar Zahravi, Ahmed Mohamed
☐ β˜† βœ‡ The Hacker News

TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert

By: Ravie Lakshmanan β€” June 17th 2025 at 08:12
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a high-severity security flaw in TP-Link wireless routers to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.Β  The vulnerability in question is CVE-2023-33538 (CVSS score: 8.8), a command injection bug that could result in the execution of arbitrary system commands when
☐ β˜† βœ‡ The Hacker News

Meta Starts Showing Ads on WhatsApp After 6-Year Delay From 2018 Announcement

By: Ravie Lakshmanan β€” June 17th 2025 at 04:53
Meta Platforms on Monday announced that it's bringing advertising to WhatsApp, but emphasized that the ads are "built with privacy in mind." The ads are expected to be displayed on the Updates tab through its Stories-like Status feature, which allows ephemeral sharing of photos, videos, voice notes, and text for 24 hours. These efforts are "rolling out gradually," per the company. The social
☐ β˜† βœ‡ The Hacker News

U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network

By: Ravie Lakshmanan β€” June 16th 2025 at 17:49
The U.S. Department of Justice (DoJ) said it has filed a civil forfeiture complaint in federal court that targets over $7.74 million in cryptocurrency, non-fungible tokens (NFTs), and other digital assets allegedly linked to a global IT worker scheme orchestrated by North Korea. "For years, North Korea has exploited global remote IT contracting and cryptocurrency ecosystems to evade U.S.
☐ β˜† βœ‡ The Hacker News

Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment

By: Ravie Lakshmanan β€” June 16th 2025 at 14:21
An emerging ransomware strain has been discovered incorporating capabilities to encrypt files as well as permanently erase them, a development that has been described as a "rare dual-threat." "The ransomware features a 'wipe mode,' which permanently erases files, rendering recovery impossible even if the ransom is paid," Trend Micro researchers Maristel Policarpio, Sarah Pearl Camiling, and
☐ β˜† βœ‡ The Hacker News

⚑ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More

By: Ravie Lakshmanan β€” June 16th 2025 at 11:29
Some of the biggest security problems start quietly. No alerts. No warnings. Just small actions that seem normal but aren't. Attackers now know how to stay hidden by blending in, and that makes it hard to tell when something’s wrong. This week’s stories aren’t just about what was attackedβ€”but how easily it happened. If we’re only looking for the obvious signs, what are we missing right in front
☐ β˜† βœ‡ The Hacker News

Playbook: Transforming Your Cybersecurity Practice Into An MRR Machine

By: Unknown β€” June 16th 2025 at 11:25
Introduction The cybersecurity landscape is evolving rapidly, and so are the cyber needs of organizations worldwide. While businesses face mounting pressure from regulators, insurers, and rising threats, many still treat cybersecurity as an afterthought. As a result, providers may struggle to move beyond tactical services like one-off assessments or compliance checklists, and demonstrate
☐ β˜† βœ‡ The Hacker News

PyPI, npm, and AI Tools Exploited in Malware Surge Targeting DevOps and Cloud Environments

By: Ravie Lakshmanan β€” June 16th 2025 at 06:45
Cybersecurity researchers fromΒ SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compat (676 Downloads) ts-runtime-compat-check (1,588 Downloads) solders (983 Downloads) @mediawave/lib (386 Downloads) All the identified npm
☐ β˜† βœ‡ The Hacker News

Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

By: Ravie Lakshmanan β€” June 14th 2025 at 02:45
A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan. "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix
☐ β˜† βœ‡ The Hacker News

Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month

By: Ravie Lakshmanan β€” June 13th 2025 at 14:12
Cybersecurity researchers are calling attention to a "large-scale campaign" that has been observed compromising legitimate websites with malicious JavaScript injections. According to Palo Alto Networks Unit 42, these malicious injects are obfuscated using JSFuck, which refers to an "esoteric and educational programming style" that uses only a limited set of characters to write and execute
☐ β˜† βœ‡ The Hacker News

Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion

By: Ravie Lakshmanan β€” June 13th 2025 at 11:02
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday disclosed that ransomware actors are targeting unpatched SimpleHelp Remote Monitoring and Management (RMM) instances to compromise customers of an unnamed utility billing software provider. "This incident reflects a broader pattern of ransomware actors targeting organizations through unpatched versions of SimpleHelp
☐ β˜† βœ‡ The Hacker News

CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk

By: The Hacker News β€” June 13th 2025 at 10:30
Introduction: Security at a Tipping Point Security Operations Centers (SOCs) were built for a different era, one defined by perimeter-based thinking, known threats, and manageable alert volumes. But today’s threat landscape doesn’t play by those rules. The sheer volume of telemetry, overlapping tools, and automated alerts has pushed traditional SOCs to the edge. Security teams are overwhelmed,
☐ β˜† βœ‡ The Hacker News

Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

By: Ravie Lakshmanan β€” June 13th 2025 at 07:03
Apple has disclosed that a now-patched security flaw present in its Messages app was actively exploited in the wild to target civil society members in sophisticated cyber attacks. The vulnerability, tracked as CVE-2025-43200, was addressed on February 10, 2025, as part of iOS 18.3.1, iPadOS 18.3.1, iPadOS 17.7.5, macOS Sequoia 15.3.1, macOS Sonoma 14.7.4, macOS Ventura 13.7.4, watchOS 11.3.1,
☐ β˜† βœ‡ The Hacker News

WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network

By: Ravie Lakshmanan β€” June 12th 2025 at 17:47
The threat actors behind the VexTrio Viper Traffic Distribution Service (TDS) have been linked to other TDS services like Help TDS and Disposable TDS, indicating that the sophisticated cybercriminal operation is a sprawling enterprise of its own that's designed to distribute malicious content. "VexTrio is a group of malicious adtech companies that distribute scams and harmful software via
☐ β˜† βœ‡ The Hacker News

New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes

By: Ravie Lakshmanan β€” June 12th 2025 at 13:52
Cybersecurity researchers have discovered a novel attack technique called TokenBreak that can be used to bypass a large language model's (LLM) safety and content moderation guardrails with just a single character change. "The TokenBreak attack targets a text classification model's tokenization strategy to induce false negatives, leaving end targets vulnerable to attacks that the implemented
☐ β˜† βœ‡ The Hacker News

AI Agents Run on Secret Accounts β€” Learn How to Secure Them in This Webinar

By: Unknown β€” June 12th 2025 at 13:06
AI is changing everything β€” from how we code, to how we sell, to how we secure. But while most conversations focus on what AI can do, this one focuses on what AI can break β€” if you’re not paying attention. Behind every AI agent, chatbot, or automation script lies a growing number of non-human identities β€” API keys, service accounts, OAuth tokens β€” silently operating in the background. And here’s
☐ β˜† βœ‡ The Hacker News

Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction

By: Ravie Lakshmanan β€” June 12th 2025 at 11:11
A novel attack technique named EchoLeak has been characterized as a "zero-click" artificial intelligence (AI) vulnerability that allows bad actors to exfiltrate sensitive data from Microsoft 365 (M365) Copilot's context sans any user interaction. The critical-rated vulnerability has been assigned the CVE identifier CVE-2025-32711 (CVSS score: 9.3). It requires no customer action and has been
☐ β˜† βœ‡ The Hacker News

Non-Human Identities: How to Address the Expanding Security Risk

By: Unknown β€” June 12th 2025 at 11:00
Human identities management and control is pretty well done with its set of dedicated tools, frameworks, and best practices. This is a very different world when it comes to Non-human identities also referred to as machine identities. GitGuardian’s end-to-end NHI security platform is here to close the gap. Enterprises are Losing Track of Their Machine Identities Machine identities–service
❌