Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Looming Threat of Malicious AI: Unveiling the Complexity of Sleeper Agents


The emergence of malicious AI sleepers poses a significant threat to global security. As researchers continue to grapple with the challenges associated with these sophisticated systems, it has become increasingly clear that transparency and accountability within AI development processes are key to preventing their misuse.

Published: Tue Sep 30 00:01:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Trump Demands Microsoft Fire Senior Executive Amid Allegations of Bias and Security Concerns

US President Donald Trump has called for Microsoft to fire its head of global affairs, Lisa Monaco, citing her past experience working for the Obama and Biden administrations as a reason. The move is seen as an attempt by Trump to exert pressure on tech companies to comply with his demands, but experts say there is no concrete evidence to support his claims.

Published: Tue Sep 30 00:11:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Dutch Teens Caught in Global Cyber espionage Ring: A Wake-Up Call for Parents and Law Enforcement


Dutch teens have been arrested by authorities over allegations that they were recruited by Russian intelligence to spy on European law enforcement agencies. A global cyber espionage ring has been uncovered, with thousands of fraudulent domains set up to scam FIFA fans and a US federal agency's GeoServer attacked by cybercriminals. Meanwhile, Interpol has reported a significant recovery of funds stolen by online criminals through Operation HAECHI VI.

Published: Tue Sep 30 00:19:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Datacenter Fire Disrupts South Korean Government Services, Highlights Vulnerability to Cyber-Attacks


A datacenter fire in South Korea has disrupted government services, highlighting the vulnerability of critical infrastructure to cyber-attacks. The incident also raises concerns about the reliability of backup systems and the importance of robust cybersecurity measures. In related news, US authorities are considering a ban on DJI, and India plans to require 2FA for most digital payments. GreatFire.org has launched a VPN that claims can withstand censorship environments.

Published: Tue Sep 30 00:32:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unlocking Digital Legacy: A Comprehensive Guide to Password Managers with Emergency Access Features

Unlocking Digital Legacy: A Comprehensive Guide to Password Managers with Emergency Access Features

Published: Tue Sep 30 00:41:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unveiling the Dark Side of Tile: How a Popular Tracking Device Can Be Exploited for Mass Surveillance

A recent study has revealed that Tile tracking tags, used to locate lost items and pets, can be vulnerable to exploitation by tech-savvy stalkers. The device's lack of encryption leaves users' location information exposed, raising concerns about mass surveillance.

Published: Tue Sep 30 00:50:00 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unlikely Catalysts: How a Travel Vlogger Became an International Source of News on Nepal's Gen Z Protests


In a dramatic turn of events, a travel vlogger's impromptu journey to Nepal became an unlikely catalyst for international attention on the country's Gen Z protests. As we reflect on this remarkable tale, it becomes clear that the role played by Harry Jackson – a foreigner with no prior experience in journalism or documentarian work – holds much more significance than initially meets the eye.

Published: Tue Sep 30 01:06:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

EvilAI: A Global Threat to Cybersecurity - How Malicious AI Tools are Infiltrating Organizations Worldwide



Cybersecurity has never been more critical, particularly with the rise of artificial intelligence (AI) tools masquerading as legitimate software to infiltrate global organizations. The EvilAI campaign, a recent trend in cyber threats, uses productivity or AI-enhanced tools and software to deliver malware targeting various regions worldwide. This malicious operation employs professional-looking interfaces, valid digital signatures, and even seemingly harmless applications to deceive users. With the involvement of diverse malware programs and well-known companies in providing code-signing certificates, EvilAI poses a significant threat to global cybersecurity. It is crucial that we develop and implement robust security measures to counter such threats.

Published: Tue Sep 30 01:17:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Cybersecurity Landscape on Brink: Threatsday Bulletin and Emerging Trends

Recent cybersecurity vulnerabilities have exposed several software frameworks to exploitation by attackers. The ongoing threat landscape has highlighted the importance of robust security measures, including the implementation of secure enterprise browsers and vulnerability assessments.

Published: Tue Sep 30 01:25:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The State of AI in the SOC 2025: A Shift Towards Hybrid Security Operations

The State of AI in the SOC 2025: A Shift Towards Hybrid Security Operations reveals the latest trends and insights on AI adoption in Security Operations Centers. With alert volumes reaching unsustainable levels, teams are struggling to keep pace with the ever-growing stream of security alerts. The survey highlights the need for AI-powered solutions to augment human analysts' efforts and presents a clear trajectory towards hybrid security operations.

Published: Tue Sep 30 01:35:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Phishing Campaigns Leverage AI Tools to Evade Email Security: A Growing Concern for Cybersecurity

Artificial intelligence-powered phishing campaigns are on the rise, using Scalable Vector Graphics (SVG) files and large language models (LLMs) to evade email security defenses. As AI-driven phishing operations become more prevalent, cybersecurity experts are warning organizations to be vigilant and take steps to protect themselves against these threats.

Published: Tue Sep 30 01:43:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing the Shadows: Harrods' Data Breach Linked to Third-Party Provider

Harrods' data breach linked to a third-party provider has raised questions about AI copyright concerns, highlighting the need for companies to understand AI usage rights.

Published: Tue Sep 30 01:56:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Akira Ransomware Bypasses MFA on SonicWall VPNs: A New Threat to Cybersecurity

A new ransomware variant, dubbed "Akira", has successfully bypassed multi-factor authentication (MFA) on SonicWall SSL VPNs, causing significant disruptions and financial losses. The attack highlights the ongoing threat posed by vulnerabilities in widely used security systems and the importance of staying up-to-date with patches and best practices.

Published: Tue Sep 30 02:04:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Moldova's Pro-EU Victory Amidst Russian Interference: A Testbed for Western Democracies



Moldova has emerged as a testbed for Western democracies, with a recent pro-EU victory offering a glimmer of hope in the face of Russian interference. Despite cyberattacks and disinformation campaigns aimed at undermining democracy, Moldova's resilience is a beacon of hope for countries facing similar threats.

The EU has deployed its new cyber reserve to support Moldova's cybersecurity efforts, while the US and other Western countries are stepping up their efforts to counter Russian-backed hackers. This incident highlights the urgent need for increased cooperation between Western democracies to protect our elections, institutions, and values.



Published: Tue Sep 30 02:13:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyberattack on Co-op Leaves Shelves Empty, Data Stolen, and $275M in Lost Revenue: A Case Study


Cyberattacks have become an unfortunate norm in today's digital age. The latest case that has garnered significant attention is the cyberattack on UK retailer Co-op, which left shelves empty, customer data stolen, and a staggering $275M in lost revenue. In this article, we will delve into the details of this incident, its impact, and what it reveals about the increasing threat of cyberattacks.

Published: Tue Sep 30 03:22:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Malware Campaigns Emerge: A Glimpse into the Dark World of Cyber Threat Actors


New Malware Campaigns Emerge: A Glimpse into the Dark World of Cyber Threat Actors

A recent update to a popular cybersecurity website revealed the use of cookies on their platform. This update highlights the growing awareness of online privacy and security issues among cybersecurity professionals and organizations. In this article, we delve into the world of malware campaigns, exploring recent threats such as Scattered Spider, Akira Ransomware, and ShinyHunters. We also examine the importance of cybersecurity awareness and preparedness among organizations, including the UK government's response to a cyberattack on Jaguar Land Rover.

Published: Tue Sep 30 03:58:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Cybersecurity Landscape Emerges: Threat Actors Adapt and Evolve

Recent weeks have seen a series of high-profile cybersecurity incidents, from ransomware attacks on major corporations to the evolution of malware campaigns designed to evade detection. This article provides an in-depth look at some of the most notable security incidents and their implications for individuals, organizations, and governments worldwide.

Published: Tue Sep 30 05:00:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The European Union's Cyber Resilience Act: A New Paradigm for Open Source Software Development


The European Union's Cyber Resilience Act introduces a new legal framework for producers of products with digital elements, including open source software. The law applies to companies that integrate open source code into EU products, making it a mandatory requirement for businesses that want to sell or distribute these products in the EU. While individual contributors sharing code online or in publications are not subject to the law, organizations that receive funding or donations must follow the stewardship requirements. This new regulation aims to enhance security and resilience in digital products and has far-reaching implications for open source software developers.

Published: Tue Sep 30 06:26:57 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Britain's Live Facial Recognition Technology: A Double-Edged Sword for Public Safety and Personal Liberty


The UK government is set to introduce live facial recognition technology across England and Wales, sparking renewed debate about its efficacy and ethics. As police forces begin to adopt LFR-enabled systems, policymakers must strike a balance between public safety and individual freedoms, ensuring that this powerful tool is used responsibly and with respect for civil liberties.

Published: Tue Sep 30 06:39:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Record-Busting Bitcoin Heist: A Landmark Conviction in a Seven-Year Investigation

A record-breaking £5.5 billion Bitcoin scam has been solved after seven years, with Zhimin Qian found guilty of laundering the illicit funds. The investigation involved multiple jurisdictions and law enforcement agencies, highlighting the challenges and successes in tackling cryptocurrency-related crime.

Published: Tue Sep 30 06:48:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Passkeys: Revolutionizing Password Security

Google is introducing passkeys, a new method of authentication that promises to make passwords obsolete. Learn how to use passkeys with your Google account and discover the benefits of this game-changing technology.

Published: Tue Sep 30 06:56:52 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Datzbro Android Banking Trojan: A Sophisticated Social Engineering Attack Targeting Elderly Individuals


A new Android banking trojan, dubbed "Datzbro," has been discovered targeting elderly individuals through social engineering tactics. The malware, which can conduct device takeover attacks and perform fraudulent transactions, is believed to be the work of a Chinese-speaking threat group. This article provides an in-depth look at the Datzbro campaign and its implications for mobile security.

Published: Tue Sep 30 07:09:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Evolving Enterprise Defense: Securing the Modern AI Supply Chain in a Post-Shadow IT Era


The rapid adoption of Artificial Intelligence (AI) is transforming the enterprise landscape, bringing both opportunity and risk to organizations worldwide. As AI-powered applications are integrated into every function of a company, from marketing and development to finance and HR, the need for robust security measures has become increasingly pressing. In this article, we will delve into the evolving risk landscape of AI adoption, explore the new security paradigm required to address these challenges, and discuss how Wing Security is empowering organizations to seize the benefits of AI while maintaining safety and compliance.

Published: Tue Sep 30 07:19:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Largest Crypto Bust in History: £5.5 Billion Seized by U.K. Police

In a major breakthrough, U.K. police have seized £5.5 billion worth of Bitcoin from a Chinese national accused of orchestrating a massive cryptocurrency scheme that defrauded over 128,000 victims in China between 2014 and 2017.

Published: Tue Sep 30 07:28:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Latest Vulnerability Catalog Additions: A Growing Concern for Cybersecurity


The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added several vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including CVE-2021-21311, CVE-2025-20352, CVE-2025-10035, CVE-2025-59689, and CVE-2025-32463. These additions highlight the ongoing threat landscape in cybersecurity and emphasize the importance of keeping software up-to-date with the latest patches to prevent exploitation by malicious actors.

Published: Tue Sep 30 07:36:27 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Asahi Halts Operations After Cyberattack: A Devastating Blow to Japan's Largest Brewing Company


Asahi Group Holdings, Ltd., Japan's largest brewing company, has been brought to a standstill by a recent cyberattack that has resulted in the suspension of order and shipment operations at group companies in Japan, as well as call center operations, including customer service desks. The attack, which occurred recently, has had significant implications for Asahi's customers and stakeholders, with many facing difficulties in reaching support services or receiving timely shipments of products. While the company has not disclosed any further details about the incident, it is clear that the attack had a devastating impact on Asahi's operations and its ability to provide services to customers.

Published: Tue Sep 30 07:44:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The "Trinity of Chaos": A Global Cybercrime Wave Driven by LAPSUS$, ShinyHunters, and Scattered Spider


A recent Resecurity report has uncovered a rapidly unfolding global cybercrime campaign led by LAPSUS$, ShinyHunters, and Scattered Spider. This infamous alliance, dubbed the "Trinity of Chaos," is driving a wave of attacks against leading enterprises across various sectors. With confidential extortion activity ongoing, the group is leveraging its notoriety to coerce companies into silence, effectively keeping their cyberattacks under wraps. The true extent of this global cybercrime wave remains unclear, but one thing is certain: the world must take immediate action to address this growing threat.

Published: Tue Sep 30 07:53:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's Innovative Approach to Cybersecurity: Unveiling the Security Store

Microsoft launches Security Store, an "app store" for cybersecurity solutions, allowing businesses to easily buy and deploy SaaS tools and AI agents to combat emerging threats.

Published: Tue Sep 30 09:04:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Issues Urgent Warning: Critical Linux Sudo Flaw Exploited in Real-World Attacks


CISA has issued a critical alert regarding a severe vulnerability in the sudo package, which is widely used on Linux operating systems. Hackers are actively exploiting this flaw to gain unauthorized access and escalate privileges on affected systems. The agency advises federal agencies to take immediate action to patch the issue or discontinue using sudo by October 20. Organizations worldwide are warned to prioritize security measures to protect themselves against exploitation.

Published: Tue Sep 30 09:12:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Salesforce OAuth Exfiltration: The Growing Threat Landscape and How to Mitigate It


Salesforce OAuth Exfiltration: The Growing Threat Landscape and How to Mitigate It
As threat actors continue to exploit vulnerabilities in Salesforce's OAuth system, it has become increasingly important for organizations to implement robust security measures to protect sensitive data. Learn how to detect and mitigate these threats with advanced authentication boundary controls, defense-in-depth strategies, and enhanced logging and detection capabilities.

Published: Tue Sep 30 09:28:39 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Amazon Unveils Dizzying Family of Ring Doorbell and Blink Security Cameras, Revolutionizing Home Security

Amazon has unveiled an impressive array of new security cameras under its Ring and Blink brands, offering users enhanced features, improved performance, and increased convenience when it comes to securing their homes. With cutting-edge technologies such as "Retinal Vision" and advanced video capture capabilities, these smart doorbell cameras are poised to revolutionize the home security industry.

Published: Tue Sep 30 09:37:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google's Limited yet Valuable Ransomware Defense: A Mixed Bag for Enterprise Security

Google has launched an AI-based ransomware defense mechanism within its Drive for desktop apps, providing real-time detection capabilities and the ability to quickly stop cloud syncing. While this feature is a valuable asset for enterprise users, it also highlights ongoing limitations in addressing the threat of ransomware.

Published: Tue Sep 30 09:45:00 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing the Gemini AI Flaws: A Looming Threat to User Privacy and Security

Recent cybersecurity research has disclosed a trio of vulnerabilities in Google's Gemini AI assistant that could have exposed users to major privacy risks and data theft if successfully exploited. The flaws were collectively named the "Gemini Trifecta" and reside in three distinct components of the Gemini suite, including Cloud Assist, Search Personalization model, and Browsing Tool.

Published: Tue Sep 30 09:59:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Unveils Expanded Sentinel Security Platform with Unified Data Lake and Enhanced AI Capabilities

Microsoft has unveiled an expanded Sentinel Security Platform with a unified data lake, enhancing its capabilities to detect subtle patterns, correlate signals, and surface high-fidelity alerts. This latest move marks a significant shift towards an agentic defense strategy, positioning Microsoft as a leader in the cybersecurity market.

Published: Tue Sep 30 10:08:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Future of Cybersecurity: Leveraging Context to Combat Alert Chaos

The Future of Cybersecurity: Leveraging Context to Combat Alert Chaos

The volume of security alerts received by Security Operations Centers (SOCs) continues to rise, making it increasingly challenging for analysts to sift through the noise and identify genuine threats. In response, many organizations are turning to AI-powered solutions that can help them better understand their security posture and make more informed decisions. One company leading the charge in this area is Conifers, a provider of AI-powered security solutions for SOCs.

Published: Tue Sep 30 10:18:19 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New VMware Zero-Day Vulnerability Exposed: A Global Threat to Virtualized Environments


A new zero-day exploit discovered in VMware products by Chinese hackers could be a major threat to virtualized environments worldwide. A vulnerability in the VMware Tools software can be exploited by an attacker with non-administrative privileges on a VM running VMware Cloud Foundation or vSphere Foundation, allowing them to gain elevated access to the system. This is not the first time this year that VMware has been targeted by hackers, and cybersecurity experts are urging organizations to take immediate action to patch their systems and ensure robust security controls.

Published: Tue Sep 30 10:27:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Broadcom Patches VMware Zero-Day Exploited by UNC5174, a China-Linked Threat Actor


Broadcom has released patches for six VMware vulnerabilities, including one zero-day exploit that was actively exploited in the wild by the China-linked threat actor UNC5174. The vulnerability, tracked as CVE-2025-41244, is a local privilege escalation vulnerability in VMware Tools and Aria Operations that allows an attacker to escalate privileges to root on the same system. This patch highlights the importance of keeping software up-to-date and patched, particularly in critical systems such as virtualization environments.

Published: Tue Sep 30 10:35:21 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

UK Convicts Chinese National in Record-Breaking Crypto Fraud Scheme Worth £5.5 Billion

UK authorities have convicted a Chinese national for crypto fraud, marking the largest Bitcoin seizure ever recorded. The case highlights global efforts to combat cryptocurrency-related crimes and underscores the determination of law enforcement agencies worldwide.

Published: Tue Sep 30 10:42:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Nearly 50,000 Cisco Firewalls Left Vulnerable to Exploitation Due to Critically Flawed Security


Nearly 50,000 Cisco firewalls are currently vulnerable to exploitation due to two severe security issues. Organizations relying on these systems must take immediate action to address the risks associated with these vulnerabilities and prevent potential data breaches.

Published: Tue Sep 30 12:12:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Chinese Hackers Exploit VMware Zero-Day Vulnerability for Over a Year

Chinese hackers have been exploiting a zero-day vulnerability in VMware Aria Operations and VMware Tools software since October 2024, according to NVISO threat researcher Maxime Thiebaut. This vulnerability has been linked to the UNC5174 Chinese state-sponsored threat actor and allows an unprivileged local attacker to stage a malicious binary within any of the broadly-matched regular expression paths.

Published: Tue Sep 30 12:24:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Government Shutdown Looms: How It Could Disrupt Transportation and Cybersecurity

A looming government shutdown is threatening to disrupt transportation and cybersecurity in the United States, with potentially catastrophic consequences for air traffic, road safety, and national security.

Published: Tue Sep 30 12:32:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco Firewalls Expose 50K Devices to Advanced Attacks Due to Persistent Vulnerabilities

Nearly 50,000 Cisco ASA/FTD instances remain exposed to advanced attacks due to persistent vulnerabilities in their software, with national security agencies urging organizations to patch these devices as soon as possible. The vulnerability has been linked to a sophisticated malware campaign and highlights the ongoing threat posed by unpatched technology.

Published: Tue Sep 30 12:40:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Hidden Dangers of Cloud Collaboration: How Oversharing Unmanaged Access Threatens Your Organization's Security


The advent of cloud collaboration suites has revolutionized the way we work, but it also poses significant security risks if not managed properly. Oversharing unmanaged access is a growing threat that can lead to sensitive information falling into the wrong hands. By adopting a proactive approach and implementing governance tools that provide complete visibility at every level, organizations can regain control of their cloud collaboration suites and protect themselves against this danger.


Published: Tue Sep 30 13:00:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New China-Linked Hacker Group Leaves Trail of Stealth Malware and Espionage Operations

Phantom Taurus, a previously undocumented China-aligned nation-state actor, has been leaving a trail of stealth malware and espionage operations across governments and telecommunications organizations in Africa, the Middle East, and Asia. This group's ability to infiltrate networks using custom-developed tools and techniques makes them a significant threat to national security.

Published: Tue Sep 30 13:22:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New MatrixPDF toolkit turns PDFs into phishing and malware lures: A Threat to Email Security

A new phishing and malware distribution toolkit called MatrixPDF has been discovered, allowing attackers to convert ordinary PDF files into interactive lures that bypass email security and redirect victims to credential theft or malware downloads. The tool poses a significant threat to email security and highlights the ongoing cat-and-mouse game between attackers and cybersecurity professionals.

Published: Tue Sep 30 14:36:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

WestJet Confirms Recent Cyberattack Exposed Customers' Passports and Sensitive Information

WestJet has confirmed that a recent cyberattack exposed customers' passports and other sensitive information. The incident was discovered in June 2025, but it wasn't until September 30, 2025, that the company notified its customers about the breach.

Published: Tue Sep 30 14:44:03 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The $50 Battering RAM Attack: A Critical Vulnerability That Exposes Intel and AMD Cloud Security Protections


The $50 Battering RAM Attack: A Critical Vulnerability That Exposes Intel and AMD Cloud Security Protections
Battering RAM compromises Intel's Software Guard Extensions (SGX) and AMD's Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP) hardware security features, allowing an attacker to bypass protections on cloud processors.


Published: Tue Sep 30 14:53:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Threats and Opportunities in AI-Driven Cybersecurity

Google's latest move into AI-driven cybersecurity aims to protect users against ransomware by integrating its AI capabilities into Google Drive for desktop. The new tool, designed on millions of real-world ransomware samples, detects signs of activity and provides a seamless recovery process for affected files.

Published: Tue Sep 30 16:04:09 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Breaking the Code: The Rise of Battering RAM and Wiretap Attacks on SGX and SEV-SNP


Two novel attacks have been discovered that can compromise the security of Intel's SGX and AMD's SEV-SNP. Battering RAM and Wiretap attacks exploit deterministic encryption, allowing attackers to capture sensitive data and decrypt it into valid plaintext. While these attacks are significant, they highlight the need for ongoing research and development in the field of trusted execution environments (TEEs).

Published: Tue Sep 30 17:21:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korea's Fake IT Workers: A Growing Threat to Global Cybersecurity



North Korea's fake IT workers are increasingly targeting healthcare organizations, finance companies, and even AI firms, using social engineering tactics to infiltrate companies and obtain remote jobs. A recent report by Okta highlights the growing threat posed by North Korean "IT workers" who are linked to over 6,500 initial job interviews across more than 5,000 different companies from 2021 up until mid-2025. The threat is being taken seriously by the FBI and private security firms, including Google's Mandiant, with many Fortune 500 companies reporting North Korean IT worker problems.

Published: Tue Sep 30 17:33:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Tile's Anti-Stalking Features Found to be Ineffective Against Sophisticated Attacks


Recent research has found that Tile's anti-stalking features are ineffective against sophisticated attacks, highlighting concerns about the potential for Bluetooth tracking devices to be used for malicious purposes such as stalking or surveillance. Despite efforts by the company to address these issues, users should still exercise caution when using these devices and consider alternative options that offer more robust security features.

Published: Tue Sep 30 17:43:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Evidence Emerges: Beijing-Backed Burglars Use Custom Malware to Target Government Web Servers


Phantom Taurus, a Beijing-backed gang of burglars, has been linked to sophisticated web server attacks using custom malware. The group's novel approach utilizes .NET architecture to target Internet Information Services (IIS) web servers, making it challenging for security professionals to detect. With its apparent interest in targeting diplomatic communications and defense-related intelligence, Phantom Taurus represents a significant threat to internet-facing servers.

Published: Tue Sep 30 22:29:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

WestJet Confirms Cyberattack Exposed Customer Personal Information in June Incident

WestJet confirms that a June cyberattack exposed customer IDs and passports, highlighting the growing concern for airline security in the face of increasingly sophisticated cyber threats. With efforts focused on mitigating damage and improving security measures, WestJet serves as an example of how companies must prioritize data protection in response to such incidents.

Published: Wed Oct 1 02:43:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybersecurity Landscape Unfolds as Threat Actors Emerge from China, Utilize Exploited Zero-Days to Target Critical Infrastructure


A new wave of sophisticated cyber threats has emerged globally, with threat actors exploiting newly discovered vulnerabilities and zero-day attacks to compromise critical infrastructure. From targeted attacks on Microsoft Excel to the emergence of a new ransomware variant known as LockBit 5.0, this latest round of threats highlights the need for increased vigilance among organizations and individuals alike.

Published: Wed Oct 1 03:52:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Digital Identity Dilemma: A UK Government Conundrum

As the UK government's mandatory digital ID scheme gains momentum, campaigners urge caution and emphasize the need for transparency, accountability, and individual freedoms. Will the government be able to navigate this complex landscape without compromising its values, or will the digital identity initiative fizzle out due to lack of clarity and oversight?

Published: Wed Oct 1 05:03:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Looming Threat to Education: The Alarming Rise of Student-Led Cyberattacks on Schools

A growing number of student-led cyberattacks on schools are highlighting the need for robust cybersecurity measures in protecting both educational continuity and students' academic futures.

Published: Wed Oct 1 05:09:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Android Banking Trojan "Klopatra" Reveals Sophisticated Methods for Control and Fraud



A new Android banking trojan called Klopatra has been discovered, which uses hidden VNC to control infected smartphones. The malware is considered sophisticated, with advanced architecture that includes commercial-grade code protection tools. It has compromised over 3,000 devices, primarily in Spain and Italy, and poses a significant threat to the financial sector due to its technically advanced methods for obfuscating its true nature.

Published: Wed Oct 1 05:25:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Autonomous AI Adoption Stalls Amid Trust and Governance Crisis: A Reality Check

Autonomous AI adoption is stalled due to concerns over trust and security. While some companies are optimistic about the potential of this technology, many more are hesitant to adopt it. As a result, the benefits of autonomous AI may not be fully realized until we address these concerns and develop effective governance structures.

Published: Wed Oct 1 06:35:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Imgur's UK Exile: A Commercial Decision or a Regulatory Retreat?

Imgur's sudden departure from the UK has left many wondering what drove this decision. An investigation by the Information Commissioner's Office (ICO) has revealed that MediaLab, Imgur's parent company, was under scrutiny for its handling of children's data and age verification mechanisms. The ICO has expressed its commitment to holding companies accountable for safeguarding minors' personal information, and Imgur's move may be seen as an attempt to distance itself from potential regulatory repercussions.

Published: Wed Oct 1 06:44:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Milesight Router Vulnerability Exposed: A New Front in Smishing Attacks


Milesight Router Vulnerability Exposed: A New Front in Smishing Attacks

A new vulnerability in industrial cellular routers has emerged as the latest tool for attackers in smishing campaigns targeting European countries. French cybersecurity firm SEKOIA discovered that its products were being exploited by unknown threat actors to send malicious SMS messages to users across European countries.

Published: Wed Oct 1 06:52:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New $50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections: A Comprehensive Analysis


A new $50 attack has been discovered that allows attackers to bypass Intel and AMD cloud security protections, putting sensitive data at risk. Experts warn of potential catastrophic consequences for cloud computing users, who must take proactive steps to protect their systems and data.

Published: Wed Oct 1 07:02:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Severe Font Bug Patches: A Cautionary Tale of Out-of-Bounds Writes and Denial-of-Service Conditions


Recent high-profile incidents have highlighted the importance of keeping software up-to-date and vigilant about potential security risks. A recent patch by Apple has addressed a severe font bug that could potentially trigger denial-of-service conditions or memory corruption, demonstrating a commitment to user security while emphasizing the need for ongoing vigilance in addressing emerging threats.

Published: Wed Oct 1 07:08:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach Chaos: Allianz Life, WestJet, and Motility Software Solutions Batten Down the Hatches

Data Breach Chaos: Allianz Life, WestJet, and Motility Software Solutions Batten Down the Hatches

Published: Wed Oct 1 08:18:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Future of Automation: How Leading Security Teams Are Blending Human Judgment, Rules-Based Automations, and AI Agents


In the rapidly evolving cybersecurity landscape, leading security teams are turning to a more nuanced approach to automation, blending human judgment, rules-based automations, and AI agents to build workflows that deliver real outcomes. Learn how these teams are achieving this balance and what it takes to avoid the pitfalls of over-engineering and sacrifice control.

Published: Wed Oct 1 08:25:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Severe Security Flaw Exposes Red Hat OpenShift AI Infrastructure to Complete Takeover



A severe security flaw has been discovered in the Red Hat OpenShift AI service, which could allow attackers to escalate privileges and take control of the complete infrastructure under certain conditions. This vulnerability carries a CVSS score of 9.9 out of a maximum of 10.0, making it one of the most severe vulnerabilities ever discovered in the Red Hat OpenShift AI platform.

Published: Wed Oct 1 08:35:26 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Threat of OneLogin Vulnerability: A Cybersecurity Nightmare Unfolding


A high-severity vulnerability in OneLogin has left sensitive OpenID Connect application client secrets exposed, posing a significant risk to users' identities and data. Learn more about this critical cybersecurity threat and the steps being taken to address it.

Published: Wed Oct 1 09:43:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Future of Automation: Navigating the Blurred Lines between Human, Rules-Based, and AI-Driven Workflows

The future of automation is shifting towards a harmonious blend of human judgment, traditional automation, and AI-driven insights. As organizations navigate this new paradigm, they must prioritize transparency, security, and control in their workflow design. By embracing intentional workflow design, businesses can avoid the pitfalls of over-engineering or sacrificing control in favor of AI hype and deploy automation that strengthens defenses without creating new risks.

Published: Wed Oct 1 09:50:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Drive for Desktop Receives AI-Powered Ransomware Detection Feature to Enhance Security

Google Drive has recently introduced an AI-powered ransomware detection feature designed to automatically pause file syncing when it detects a ransomware attack, providing enhanced security for its users.

Published: Wed Oct 1 11:01:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Awareness of Battering RAM and Wiretap Attacks: A Growing Concern for Cloud Security

Two independent research papers have revealed a critical vulnerability in the security protocols implemented by major cloud providers, including Intel's SGX (Software Guard Extensions) and AMD's SEV-SNP. The attacks, dubbed Battering RAM and Wiretap respectively, exploit deterministic encryption to bypass their security features, highlighting a growing concern for cloud security.

Published: Wed Oct 1 12:22:53 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Air Force Admits to SharePoint Privacy Issue Amid Reports of Breach

Air Force admits to SharePoint privacy issue amid reports of breach, following recent incidents involving China-based employees, government snoops, and vulnerabilities in Microsoft's software.

Published: Wed Oct 1 13:33:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The AI Agent Hype Crash: How Cautious Leadership is Braking the Autonomous AI Bandwagon

The world of artificial intelligence (AI) has been abuzz with excitement over the past decade, but a recent study by Gartner has revealed that many organizations are holding back on embracing autonomous AI agents due to concerns over trust, security, and feasibility. While these agents have the potential to revolutionize industries and transform lives, they also pose significant risks and challenges.

Published: Wed Oct 1 13:42:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach at Dealership Software Provider Exposes Sensitive Information of 766,000 Customers

A devastating data breach at a leading dealership software provider has exposed the sensitive personal data of over 766,000 customers. The incident highlights the need for organizations to prioritize robust cybersecurity measures and proactive risk management strategies to prevent similar incidents from occurring.

Published: Wed Oct 1 16:10:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Vulnerability in Red Hat OpenShift AI: A Threat to Hybrid Cloud Security


A severe vulnerability has been discovered in Red Hat's OpenShift AI service, allowing a remote attacker to gain full control over a cluster. This bug has been deemed "important" by Red Hat, despite its high CVSS score, and can have significant consequences for hybrid cloud environments. Organizations must take immediate action to address this vulnerability and ensure the security of their applications.

Published: Wed Oct 1 16:24:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

OpenSSL Patches Critical Vulnerabilities to Secure Internet Communications

OpenSSL has released critical security updates to address three vulnerabilities that could have severe consequences for internet communications. Users are urged to update immediately to patch these flaws, which were found in the OpenSSL library's CMS decryption, SM2 signature computations, and DoS conditions.

Published: Wed Oct 1 16:33:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Abusing Industrial Cellular Routers: The Rise of SMS-Based Phishing Campaigns

Smishers have been exploiting unsecured industrial cellular routers in a series of ongoing SMS-based phishing campaigns since 2023. Researchers at Sekoia discovered that the devices are particularly appealing to threat actors due to their ability to enable decentralized SMS distribution across multiple countries, complicating both detection and takedown efforts.

Published: Wed Oct 1 18:42:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Clop Ransomware Gang Sent Extortion Emails Claiming Theft of Sensitive Oracle E-Business Suite Data


The Clop ransomware gang has launched an email-based extortion campaign claiming theft of sensitive Oracle E-Business Suite data. This operation began on or before September 29, 2025, and involves sending high-volume emails to executives at multiple organizations. To stay ahead of this threat, organizations should conduct thorough investigations into their environments for any unusual access or compromise in their Oracle E-Business Suite platforms.

Published: Wed Oct 1 23:12:57 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unveiling Phantom Taurus: China's Stealthy APT Threatening Global Cybersecurity


A previously undocumented Chinese APT group, Phantom Taurus, has been using the Net-Star malware suite to conduct espionage campaigns against key sectors, including government organizations and telecommunications companies. With its unique tactics and custom tools, this threat is serious and highlights the increasing sophistication of China's cyber espionage capabilities.

Published: Thu Oct 2 03:40:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Android Spyware Campaigns: A Threat to User Privacy

Android spyware campaigns impersonate Signal and ToTok messengers in a bid to steal user data.

Published: Thu Oct 2 06:58:42 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Red Hat Confirms Security Incident Following Alleged GitHub Breach by Crimson Collective

Red Hat has confirmed a security incident following an alleged breach by the Crimson Collective, which resulted in the theft of nearly 570GB of compressed data from their private GitHub repositories. The stolen data includes sensitive information about customer networks and platforms, specifically around 800 Customer Engagement Reports (CERs). While Red Hat has initiated remediation steps, concerns remain about the potential for exploitation of this sensitive information.

Published: Thu Oct 2 07:06:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Closing Detection Gaps: The Unified Workflow for Enhanced SOC Efficiency

Close detection gaps in your Security Operations Center (SOC) and boost efficiency with a unified workflow approach. Learn how ANYRUN's 3-step process can help you streamline triage, strengthen proactive defense, and gain clearer visibility into complex attacks.

Published: Thu Oct 2 07:14:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Beware of Android Spyware: The ToTok Pro and Signal Encryption Plugin Scam

Android spyware campaigns impersonating popular apps like Signal and ToTok have been discovered, targeting users in the U.A.E. with stealthy malware that exfiltrates sensitive data files, media, contacts, and chat backups. Users are warned to be cautious when downloading apps from unofficial sources.

Published: Thu Oct 2 07:22:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Crimson Collective's Breach: The High-Stakes Heist of Red Hat's Private GitHub Repositories


In a shocking turn of events, the Crimson Collective has claimed responsibility for breaching Red Hat's private GitHub repositories, resulting in the theft of sensitive data from major institutions. The breach highlights the growing sophistication of cyber threats and underscores the importance of robust cybersecurity measures.

Published: Thu Oct 2 07:29:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Clopin' Down: The Rise of Extortion Emails Targeting Oracle Execs

Oracle Execs Receive Extortion Emails Claiming Sensitive Data Stolen from E-Business Suite

Published: Thu Oct 2 08:37:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

EU Subsidies Fueling European Spyware Industry: A Threat to Democracy and Human Rights

EU subsidies for spyware companies have raised concerns about governance, transparency, and accountability. Experts and human rights organizations are calling for greater oversight and regulation of the use of surveillance technologies, including commercial spyware.

Published: Thu Oct 2 09:09:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

US Government Shutdown Exposes Vulnerabilities in IT Modernization Plans

US government shutdown exposes vulnerabilities in IT modernization plans, creating real gaps in defense at a time when threats are rising. Experts warn of delayed payments, frozen modernization projects, and stalled digital transformation momentum.

Published: Thu Oct 2 09:28:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Soopsocks Malware Scandal: A Cautionary Tale of Supply Chain Vulnerabilities


The recent discovery of the soopsocks malware package on the Python Package Index (PyPI) repository serves as a stark reminder that even in this supposedly secure environment, vulnerabilities can quickly arise and wreak havoc. In this article, we will delve into the details of the soopsocks scandal, exploring its implications for software developers, security experts, and users alike.

Published: Thu Oct 2 09:36:42 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Frontiers in Data Protection: A Growing Concern for Global Citizens

As the world grapples with the increasing amount of personal information being collected and stored, a growing number of countries and companies are taking steps to address the pressing issue of data protection. From Russia's new regulations to EU member states' rejection of proposals for encryption backdoors, it has become clear that the need for robust data protection is no longer a distant concern, but a pressing reality.

Published: Thu Oct 2 09:49:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Extortion Campaign Possibly Linked to Cl0p Ransomware Group Targets Oracle Users


New Extortion Campaign Possibly Linked to Cl0p Ransomware Group Targets Oracle Users

A new cluster of activity possibly linked to the Cl0p ransomware group has been detected by Google Mandiant and GTIG. The malicious emails claim that sensitive data has been stolen from Oracle E-Business Suite users, but the investigation is ongoing and more information will be provided as it becomes available.



Published: Thu Oct 2 09:56:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybersecurity Threat Landscape: A Delicate Balance Between Progress and Peril

Global cybersecurity threats continue to escalate, posing significant risks to organizations worldwide. From GeoServer vulnerabilities to social engineering tactics, AI-driven malware, and data protection concerns, the threat landscape is rapidly evolving.

Published: Thu Oct 2 10:11:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Allianz Life Data Breach: A Global Impact on 1.5 Million Individuals


The Allianz Life data breach has left over 1.5 million individuals exposed to sensitive personal information, including names, addresses, Social Security numbers, and Tax IDs. The breach is attributed to the ShinyHunters group and highlights the ongoing threat posed by sophisticated cyberattacks.

Published: Thu Oct 2 10:18:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

HackerOne's Record-Breaking Bug Bounty Year: A Look into the World of White-Hat Hacking



HackerOne, a leading bug bounty platform, has paid out an unprecedented $81 million in rewards to white-hat hackers worldwide over the past 12 months. This figure represents a 13% increase from the previous year and marks a significant milestone for the company. The growth in bug bounty programs and payouts highlights the increasing importance of cybersecurity and the growing demand for skilled white-hat hackers.

For more information on HackerOne's record-breaking year, read our latest article:



Published: Thu Oct 2 11:33:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Red Hat Hit by Massive GitLab Data Breach: What You Need to Know



Red Hat has confirmed a massive data breach involving its GitLab instance, where nearly 570GB of compressed data was stolen across 28,000 internal development repositories. The stolen data includes approximately 800 Customer Engagement Reports (CERs) that contain sensitive customer information. We will continue to provide updates on this developing story.



Published: Thu Oct 2 12:46:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Era in Retro Gaming: The Lego Game Boy Hack Brings Real Cartridges to the Table

A pioneering modder has successfully hacked the popular Lego Game Boy to play real cartridges, bringing retro handheld gaming enthusiasts one step closer to unlocking the full potential of their beloved vintage consoles.

Published: Thu Oct 2 15:57:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

AWS Social Engineering Attack Brings Down Popular Domain Registrar Kodex Global

A popular domain registrar suffered a major outage when attackers exploited a vulnerability in its AWS account, leaving thousands of government agencies and tech companies without access to their services.

Published: Thu Oct 2 16:05:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Confucius Hackers: A Sophisticated Threat Actor Exploits Pakistan with New WooperStealer and Anondoor Malware

Confucius Hackers: A Sophisticated Threat Actor Exploits Pakistan with New WooperStealer and Anondoor Malware. Stay informed about emerging threats and prioritize your organization's cybersecurity posture to reduce the risk of falling victim to sophisticated attacks.

Published: Thu Oct 2 16:17:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CERT-UA Warns UAC-0245 Targets Ukraine with CABINETRAT Backdoor: A Comprehensive Analysis



A new cyberattack campaign targeting Ukraine using the CABINETRAT backdoor has been discovered by CERT-UA. The attackers employed malicious Excel XLL add-ins to spread their payload, which was then used to gather OS and installed-program data, run commands, and exfiltrate sensitive information. This report provides a comprehensive analysis of the attack vector used by UAC-0245, highlighting the novelty of tactics, techniques, and procedures employed by this group.

Published: Thu Oct 2 16:26:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cl0p Ransomware Extortion Campaign Targets Oracle E-Business Users


A new Cl0p ransomware extortion campaign has been detected targeting Oracle E-Business users, with attackers claiming theft of critical data. The suspected group is linked to FIN11, a financially motivated threat group known for deploying ransomware and engaging in extortion. Google researchers are tracking the activity, urging companies to investigate their environment for indicators of compromise associated with Cl0p operation.

Published: Fri Oct 3 02:04:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Criminal Exploitation of Renault UK Customer Data Exposes Names, Numbers, and Registration Details

Renault UK is dealing with a major data breach after one of its suppliers was hacked, exposing customer details including names, numbers, and registration information. The company has assured customers that no financial records were involved, but the incident highlights ongoing vulnerabilities in personal data protection.

Published: Fri Oct 3 04:15:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Flags Critical Meteobridge Flaw as Actively Exploited in the Wild


The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a critical security flaw affecting Smartbedded Meteobridge, a widely used weather station device. The vulnerability, identified as CVE-2025-4008, has been rated as high-severity and is being actively exploited in the wild. This highlights the importance of keeping software up-to-date and patched to prevent exploitation.

Published: Fri Oct 3 05:30:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Chapter in Cyber Warfare: The Rise of "Cavalry Werewolf" Attacks


A new wave of cyber attacks has hit Russian agencies, targeting government entities, energy enterprises, and other high-profile organizations. The attackers, known as Cavalry Werewolf, have used malware families such as FoalShell and StallionRAT to breach security measures, raising concerns about the scope and impact of this attack. As threat actors continue to evolve, it's essential that cybersecurity vendors, governments, and individuals stay vigilant and take proactive measures to protect themselves against these emerging threats.

Published: Fri Oct 3 06:40:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Oracle Links Clop Extortion Attacks to July 2025 Vulnerabilities

Oracle has linked the ongoing Clop extortion campaign to vulnerabilities patched in July 2025. The company urges customers to update their software and advises those requiring assistance to contact the Oracle support team.

Published: Fri Oct 3 07:47:32 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Digital ID Debacle: A Threat to Civil Liberties in the UK

The UK government's proposed digital ID project has sparked widespread concern and criticism from civil liberties groups and individuals alike. Despite assurances of security and efficiency, critics argue that the proposal ignores fundamental concerns over privacy and surveillance.

Published: Fri Oct 3 08:01:57 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Clop-Linked Ransomware Campaign Exposes Thousands of Organizations Through Vulnerabilities Patched in July


Oracle has confirmed that some E-Business Suite users have been targeted by Clop-linked ransomware attackers, leaving thousands of organizations exposed to potential data theft. Follow us for more updates on this developing story.

Published: Fri Oct 3 08:23:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Erosion of Public Trust: How ICE's Social Media Surveillance Program Threatens Democracy


ICE's new social media surveillance program threatens democracy by leveraging artificial intelligence and open-source intelligence to target individuals for deportation. Critics argue that such technology can be used to distinguish genuine threats from political speech, although this distinction remains unclear.

Published: Fri Oct 3 08:33:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Self-Spreading WhatsApp Malware Threatens Global Security

A new self-spreading WhatsApp malware has been identified by researchers at Trend Micro, which has the potential to spread rapidly across Windows systems, compromising user trust in popular communication platforms. Brazilian users are primarily targeted in this attack, with a focus on minimizing user interaction and spreading through phishing messages.

Published: Fri Oct 3 08:41:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Era in Enterprise Security: Passwork 7 Revolutionizes Password and Secrets Management

Passwork 7 is a game-changing platform that revolutionizes the way enterprises manage passwords and secrets. With its robust features, scalable architecture, and emphasis on usability, Passwork 7 is poised to become a leading solution in the enterprise security market.

Published: Fri Oct 3 08:50:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Red Hat Admits to GitLab Breach After Cyber attackers Bragged About Data Theft

Red Hat has admitted to a recent breach of its dedicated consulting instance on GitLab, after a group called the Crimson Collective claimed to have stolen hundreds of customer engagement reports. The company is remaining tight-lipped about the details of the breach, leaving many questions unanswered.

Published: Fri Oct 3 10:03:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Asahi Beer Crisis: A Cyberattack-Induced Supply Chain Showdown in Japan


Japan's most popular beer, Asahi Super Dry, is facing an unprecedented crisis after a cyberattack crippled its systems. The company has started manually processing orders but system-based orders and wide-scale shipments remain suspended. Follow our coverage for the latest updates on this developing story.

Published: Fri Oct 3 10:16:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Devastating Consequences of a Ransomware Attack on Japan's Largest Beer Brewer: Asahi

Japanese beer giant Asahi confirms ransomware attack, resulting in significant disruption to its operations and raising concerns about the extent of the breach. With its annual revenue standing at nearly $20 billion, Asahi must now prioritize cybersecurity and invest in robust measures to prevent and respond to cyberattacks.

Published: Fri Oct 3 10:31:19 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CometJacking Attack Exposes Sensitive Data Through AI Browser

CometJacking: A new attack method exploiting vulnerabilities in Perplexity's agentic AI browser, allowing attackers to steal sensitive data such as emails and calendar invites without user interaction or credentials. Learn more about this emerging security threat and how it can be mitigated.

Published: Fri Oct 3 10:39:14 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Apple Removes ICE Tracking App from App Store Amid Government Pressure

Apple removes app tracking ICE agents amid government pressure, highlighting the delicate balance between security and privacy in the tech industry.

Published: Fri Oct 3 10:51:21 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Munich Airport Drone Incident: A Cautionary Tale of Paranoia and Overreaction

The Munich Airport drone incident highlights the growing concern about drone security around European airports. The incident raises questions about the need for stricter regulations on civilian drone usage and the balance between safety and convenience.

Published: Fri Oct 3 11:05:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malware Impersonation: ProSpy and ToSpy Campaigns Target Android Users in the UAE


ProSpy, ToSpy malware pose as Signal and ToTok to steal data in UAE

Recent research by ESET has uncovered two Android spyware campaigns, ProSpy and ToSpy, that target users in the United Arab Emirates (UAE) by impersonating apps like Signal and ToTok. These campaigns use fake websites and social engineering tactics to spread malware that steals sensitive device data. This highlights the importance of vigilance when downloading apps from unofficial sources and keeping security updates and patches up to date.



Published: Fri Oct 3 11:12:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Renault and Dacia UK Warn of Potential Identity Theft as Data Breach Hits Customers


Renault and Dacia, two prominent automotive brands in the United Kingdom, have issued warnings to their customers about a potential data breach that may impact sensitive personal information. The breach, which occurred at a third-party provider, has resulted in the unauthorized disclosure of customer data, including full names, phone numbers, email addresses, postal addresses, vehicle identification numbers, and vehicle registration numbers.

Published: Fri Oct 3 12:21:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Rhadamanthys: A Malware-as-a-Service Platform that's Leaving a Trail of Cybersecurity Concerns



Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads

A popular information stealer has updated its capabilities to include device fingerprinting and steganography payloads. The malware-as-a-service platform has emerged as a comprehensive threat to personal and corporate security, with experts warning of the need for continued vigilance.



Published: Fri Oct 3 12:37:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Detour Dog: A DNS-Powered Malware Factory for Strela Stealer

Detour Dog, a threat actor known for forwarding traffic to malicious sites, has been found to be powering campaigns distributing an information stealer called Strela Stealer. According to Infoblox, Detour Dog's modus operandi involves exploiting vulnerable WordPress sites and using DNS TXT records to facilitate malware distribution. The development marks a significant shift in Detour Dog's tactics, as the threat actor has been found to be powering campaigns distributing malware. With at least 69% of confirmed StarFish staging hosts under the control of Detour Dog, the threat actor poses a significant risk to users.

Published: Fri Oct 3 13:48:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Discord Customer Service Data Breach Exposes Sensitive User Information


Discord has suffered a significant data breach that exposed sensitive user information. The breach, which occurred when one of Discord's third-party customer service providers was compromised by an unauthorized party, has raised concerns about the company's security measures and its ability to protect user data. Users may have had their names, usernames, emails, or credit card numbers accessed as part of the breach.

Published: Fri Oct 3 20:09:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Designing AI Governance: How Enterprises Can Have Their Cake and Eat It Too

Designing AI Governance: How Enterprises Can Have Their Cake and Eat It Too

In an era where Artificial Intelligence (AI) is becoming increasingly ubiquitous, enterprise IT leaders face a paradox. They want to unlock valuable insights from unstructured content but are aware of significant security risks. The answer lies in designing AI with governance baked in from the beginning, providing a blueprint for controls that ensure both innovation and security.

Published: Mon Oct 6 09:12:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Red Hat Confirms GitLab Breach Following Attackers' Bragging Rights

Red Hat has confirmed a breach of its consulting GitLab system, resulting in the theft of hundreds of Customer Engagement Reports. The company has assured that its core products remain unaffected and has taken steps to address the incident, but many questions remain unanswered about the nature of the data stolen.

Published: Mon Oct 6 09:21:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Discord Data Breach: A Looming Threat to User Security

Discord's recent data breach highlights the need for greater transparency, accountability, and security measures when handling sensitive user information. As users take proactive steps to secure their accounts, companies like Discord must prioritize their security and accountability to prevent similar breaches in the future.

Published: Mon Oct 6 09:29:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Japan's Most Popular Beer Faces Uncertain Future Amid Cyberattack-Induced System Failure

Japan's most popular beer, Asahi Super Dry, is facing an uncertain future after a cyberattack-induced system failure forced the company to suspend order, shipment, and call center operations. The incident has raised concerns about the availability of the beer and its potential impact on consumer satisfaction.

Published: Mon Oct 6 09:38:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Revolutionizing Cybersecurity: Wazuh AI Analyst Service Empowers Security Teams

Discover how Wazuh's innovative AI Analyst service is transforming the cybersecurity landscape, enabling security teams to uncover hidden threats and respond more effectively to modern cyber attacks.

Published: Mon Oct 6 09:47:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

XWorm Malware Resurfaces with Ransomware Module, Over 35 Plugins

XWorm malware has resurfaced with a ransomware module and over 35 plugins, posing significant threats to cybersecurity. With its modular architecture and extensive capabilities, XWorm continues to be a force to be reckoned with in the threat landscape.

Published: Mon Oct 6 09:58:53 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers' Sophisticated Extortion Campaign: The Rise of Clop Ransomware


Hackers associated with the prolific ransomware group, Clop, have launched a sophisticated extortion campaign targeting executives at numerous large organizations. The campaign involves sending emails claiming that sensitive information has been stolen from Oracle apps' data breach. To protect themselves against this highly sophisticated malware, it is essential to keep software up-to-date, use proper anti-malware or endpoint protection, educate users on phishing and social engineering, restrict user access, and implement regular offline backups.

Published: Mon Oct 6 10:13:26 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Zimbra Zero-Day Exploitation: A Malicious iCalendar File Campaign

Recently discovered zero-day exploitation targeting Zimbra Collaboration Suite has shed light on the sophistication and stealth of modern cyber threats.

Published: Mon Oct 6 10:20:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

ParkMobile's 2021 Data Breach: A Cautionary Tale of Inadequate Compensation


ParkMobile's 2021 data breach has finally been resolved through a class action lawsuit, but the company's compensation package for affected users has left many feeling undercompensated. With $1 credits that come with expiration dates and restrictions on use, critics argue this is an inadequate response to those affected by the breach.

Published: Mon Oct 6 10:30:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Massive Surge in Scans Targeting Palo Alto Networks Login Portals: A Red Flag for Cybersecurity

A massive surge in scans targeting Palo Alto Networks login portals has been detected by GreyNoise, indicating clear reconnaissance efforts from suspicious IP addresses. The spikes in activity highlight the importance of staying vigilant and proactive when it comes to cybersecurity.

Published: Mon Oct 6 10:39:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Rampage: The Dark Side of Radiant Group's Cybercrime Career

Radiant Group, a relatively new player in the ransomware scene, has been making waves with their brazen attacks on preschool networks and hospitals. Despite their efforts to rectify some of their past actions, Radiant Group's apparent disregard for sensitive information raises concerns about the potential risks associated with their actions.

Published: Mon Oct 6 10:49:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Scattered Lapsus: Discord Data Breach Exposes Government-Issued IDs, Billing Details, and Support Chats

Discord has confirmed a data breach involving one of its outside customer service companies, exposing government-issued photo IDs, names, emails, and limited billing data of users who contacted customer support. The company emphasized that its own main systems were not directly breached.

Published: Mon Oct 6 10:58:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jaguar Land Rover Returns to Production After Weeks-Long Cyber Shutdown, UK Government Offers £1.5 Billion Loan Guarantee


Jaguar Land Rover has resumed production after a weeks-long cyber shutdown that crippled its manufacturing capabilities and had far-reaching consequences for its supply chain and employees. The UK government has issued a £1.5 billion loan guarantee to support JLR's recovery efforts.

Published: Mon Oct 6 11:09:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise and Fall of Scattered Lapsus$ Hunters: Unpacking the Mysterious Cyber-Criminal Organization

Scattered Lapsus$ Hunters, a mysterious cybercriminal organization, claims to have stolen 1.5 billion records from Salesforce and Google, but experts say they are unlikely to completely disappear.

Published: Mon Oct 6 11:26:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadow of Incompetence: A Growing Concern Over the US Government's Cybersecurity Failings

The recent events surrounding the US government's cyber security practices have brought to light a disturbing trend of incompetence, which threatens not only the nation's information infrastructure but also its very way of life. A growing concern over the US government's handling of cyber security threats has been highlighted by the recent breach at the Federal Emergency Management Agency (FEMA), which raises questions about the agency's ability to protect sensitive data and prevent cyber attacks.

Published: Mon Oct 6 11:35:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Munich Airport Drone Incident Sparks Concern Over Air Security and Overreaction to Drone Sightings


In a shocking turn of events, Munich Airport was shut down due to reported drone sightings in the vicinity. The incident raises questions about air security measures and whether the response was proportional to the threat posed by the drones. With the rise of civilian drone flights, particularly around airports, it is essential to strike an optimal balance between safety concerns and embracing these benefits.

Published: Mon Oct 6 11:45:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Microservices and AI: A New Era of Software Development



The rise of microservices and AI is revolutionizing software development, but what does this mean for developers? In this article, we explore the evolution of microservices and AI, discussing their benefits, challenges, and future prospects. From decentralization to automation, we examine the impact of these technologies on the software development landscape.

Published: Mon Oct 6 11:53:27 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Government Pressure Forces Tech Giants to Pull Immigration Enforcement Apps



The recent takedown of Apple's ICEBlock app and Google's Red Dot app marks a significant shift in the technology industry's response to government pressure regarding immigration enforcement apps. As WIRED reported, the apps were created by developer Joshua Aaron to allow people to anonymously report nearby sightings of immigration enforcement officials and help protect at-risk communities.



Published: Mon Oct 6 12:00:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Zeroday Cloud Hacking Contest: A $4.5 Million Bounty for Cybersecurity Experts

A new hacking competition called Zeroday Cloud has announced a $4.5 million bounty for cybersecurity experts who submit exploits for various targets. The contest, which takes place at the Black Hat Europe conference in London, UK, will feature six separate categories and offer varying levels of bounties. While some have questioned the legitimacy of the competition due to similarities with Pwn2Own Ireland, the organizers claim that they were inspired by a "trusted, mature framework" and are looking forward to attracting top talent from around the world.

Published: Mon Oct 6 12:20:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercrime Collective Embarks on Unconventional Ransom Negotiation Scheme: A New Frontier in Extortion Tactics

Scattered Lapsus$ Hunters has launched an unusual crowdsourced extortion scheme, offering $10 in Bitcoin to anyone willing to help pressure their alleged victims into paying ransoms. The group claims to have breached several organizations, including Salesforce, and is now seeking financial gain from its alleged targets.

Published: Mon Oct 6 12:28:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

FunkSec: The Ransomware Group that Raises Questions about Hacktivism and AI-Assisted Malware Development

FunkSec, a ransomware group with apparent hacktivist tendencies, has emerged as a major player in the cybercrime landscape. With its use of AI-assisted malware development and recycled data leaks, FunkSec raises questions about the true nature of its activities and the blurring of lines between hacktivism and cybercrime.

Published: Mon Oct 6 12:46:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of AI Security: Navigating the Complexities of Adopting an AI Security Solution


The Evolution of AI Security: Navigating the Complexities of Adopting an AI Security Solution explores the intricacies of AI-SPM solutions, highlighting five critical questions every organization should pose when selecting an AI security solution. Discover how to make informed decisions that safeguard your sensitive data and regulatory compliance in the rapidly evolving landscape of AI security.

Published: Mon Oct 6 12:57:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Zero-Day Exploitation: The Rise of Clop Ransomware and Oracle E-Business Suite Vulnerabilities

Oracle's E-Business Suite is under attack due to a critical zero-day vulnerability (CVE-2025-61882) that allows attackers to execute arbitrary code remotely without authentication. The Clop ransomware gang has claimed responsibility for the attacks, emphasizing the urgency with which these vulnerabilities must be addressed.

Published: Mon Oct 6 13:11:20 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unveiling the Evils of BadIIS: A Triangular Threat to Cybersecurity

BadIIS, an acronym for "Browser-Aided Data Injection System," has emerged as a formidable threat to cybersecurity, operating in three distinct modes that can compromise the security of users worldwide. Learn more about the Proxy, Injector, and SEO Fraud modes of this malicious system and how they interact with one another to create a formidable triad of digital menace.

Published: Mon Oct 6 13:21:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Zimbra Collaboration Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files



A recent zero-day vulnerability in Zimbra Collaboration has been exploited by unknown threat actors targeting the Brazilian military, according to a report published by StrikeReady Labs on September 30, 2025. The vulnerability allows attackers to execute arbitrary code within the victim's session, potentially leading to unauthorized actions such as email redirection and data exfiltration.

The incident highlights the ongoing threat landscape of zero-day vulnerabilities in widely used software solutions and underscores the need for robust security measures, regular software updates, and increased awareness about patching vulnerabilities to protect against sophisticated attacks.



Published: Mon Oct 6 13:30:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CometJacking: A Novel Threat to AI-Native Browsers Exposed

CometJacking: A Novel Threat to AI-Native Browsers Exposed

A new attack technique has been discovered that targets Perplexity's agentic AI browser Comet, allowing attackers to steal sensitive data from connected services such as email and calendar. The attack, dubbed CometJacking, uses a single, weaponized URL to hijack the AI assistant embedded in the browser, bypassing traditional defenses and exposing users to potential data theft. Learn more about this emerging threat and how organizations can protect themselves.

Published: Mon Oct 6 13:38:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Massive Spike in Palo Alto Networks Login Portal Scanning Activity Raises Red Flags for Cybersecurity Experts

A massive spike in Palo Alto Networks login portal scanning activity has raised red flags for cybersecurity experts, with some warning that this could be an indication of a larger-scale cyberattack. The surge in traffic shares characteristics with previous incidents targeting Cisco ASA devices.

Published: Mon Oct 6 13:45:51 2025 by llama3.2 3B Q4_K_M










© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us