Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

New Android Malware Threat: "GuardCB" and "SECURITY_FSB" Impersonate Russian Intelligence Agency


A new Android malware has been discovered that poses as an antivirus tool software created by Russia's Federal Security Services agency (FSB). The malware, tracked as "Android.Backdoor.916.origin," is being used to target executives of Russian businesses and can snoop on conversations, stream from the phone's camera, log user input with a keylogger, or exfiltrate communication data from messenger apps. This latest Android malware campaign is particularly concerning due to its sophistication and ability to impersonate a legitimate antivirus tool.

Published: Mon Aug 25 08:00:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

FTC Warns Tech Giants to Resist Foreign Pressure on Encryption

The Federal Trade Commission (FTC) has issued a warning to major tech companies against yielding to foreign government demands that compromise data security and weaken encryption on their platforms. The warning emphasizes the importance of reasonable data security measures, truthful data security and privacy representations, and disclosure obligations to protect American users' freedom to access uncensored information.

Published: Mon Aug 25 08:17:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Enigmatic UVB-76: Unpacking Russia's Mysterious Shortwave Radio Station

Russia's mysterious UVB-76 shortwave radio station has sparked widespread fascination and fear, with Moscow capitalizing on its enigmatic broadcasts to whip up anxiety about nuclear war and international politics. But what really is the purpose of this intriguing transmission? Is it a genuine tool for military communication or simply a propaganda tactic designed to create unease among the global community?

Published: Mon Aug 25 08:26:52 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Threat Landscape Shifts: Shadow AI Agents and Cloud Security Concerns

As cybersecurity threats continue to evolve, organizations must adopt a more integrated approach to protect against both code and cloud vulnerabilities. Shadow AI agents pose significant risks, while inadequate cloud security measures can leave data vulnerable in the event of a breach.

Published: Mon Aug 25 08:46:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unveiling the Unseen: The Alarming Reality of SIEM Rule Failures



In a stark reminder of the ongoing struggle to detect malicious activity, The Blue Report 2025 reveals that organizations are only detecting 1 out of 7 simulated attacks. This alarming statistic highlights the critical need for SIEM systems to be regularly tested and tuned, with log collection issues playing a major role in detection failures. Downloading the report provides actionable insights and recommendations for strengthening detection and prevention strategies against tomorrow's attacks.

Published: Mon Aug 25 08:54:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Transparent Tribe's Advanced Persistent Threat: A Sophisticated Phishing Campaign Targeting Indian Government Entities


A recent APT campaign targeting Indian government entities has highlighted the sophistication and adaptability of Advanced Persistent Threat actors. The Transparent Tribe's use of Linux desktop shortcut files in its attacks serves as a stark reminder of the importance of robust security controls, including regular software updates, anti-malware protection, and employee education and awareness programs.



Published: Mon Aug 25 09:15:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Pakistan-Linked APT36 Utilizes Linux .desktop Files to Execute Sophisticated Malware Campaign


Pakistan-linked APT36 has recently employed a novel tactic in its malware campaigns by utilizing Linux .desktop files to execute custom malware. This sophisticated operation targets Indian government entities via spear-phishing emails, aiming to steal sensitive data and gain persistent access. With this campaign, the threat actor demonstrates its ability to adapt and innovate, making it essential for organizations to remain vigilant and proactive in defending against such threats.

Published: Mon Aug 25 09:23:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Android.Backdoor.916.origin: The Highly Sophisticated Malware Targeting Russian Business Executives


Android.Backdoor.916.origin is a highly sophisticated and multifunctional Android malware that targets Russian business executives, posing significant threats to their privacy and security. The malware disguises itself as an antivirus program and has the ability to steal sensitive information from popular messaging apps and work with multiple C2 servers. Security researchers have identified the threat and notified domain registrars in an effort to disrupt its spread. Stay informed about emerging threats like this one and take steps to protect yourself against the latest cyber threats.

Published: Mon Aug 25 09:30:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Data I/O Ransomware Attack: A Look into the Incident and its Implications


Data I/O, a leading provider of programming systems and security provisioning technologies, has fallen victim to a ransomware attack. The attack, which occurred on August 16, 2025, has temporarily disrupted operations, including communication, shipping, receiving, and manufacturing. Some systems have been restored, but there is no clear timeline for full recovery yet. The incident raises concerns about the security of Data I/O's systems and highlights the importance of preparedness and response in the face of cyberattacks.

Published: Mon Aug 25 09:38:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Vulnerability Exposed in Docker Desktop: The Devastating Consequences on Windows Hosts


A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active. Patching your system now can prevent unauthorized access to sensitive files and maintain system security.

Published: Mon Aug 25 10:45:36 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Understanding Malware Persistence Techniques: A Comprehensive Guide to Defense Strategies


Malware persistence techniques are a critical aspect of modern cyber threats. Understanding how attackers maintain access to compromised systems is essential for organizations to develop effective defense strategies. This article provides a comprehensive guide to malware persistence techniques, including common methods, impacts, and defense strategies. Discover how Wazuh enhances threat defense against malware persistence techniques and learn how to defend your organization's assets.

Published: Mon Aug 25 10:54:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malicious Android Apps with 19M Installs Removed from Google Play: A Cautionary Tale of Cybersecurity


A recent discovery by Zscaler has revealed that 77 malicious Android apps with over 19 million installs have been removed from the Google Play Store. These apps were found to be delivering multiple malware families to Google Play users, with most of them containing adware components. The Joker malware was also prevalent in almost 25% of the analyzed apps, allowing it to steal sensitive data and perform malicious activity in the background. Read more about this alarming discovery and how Android users can protect themselves from such threats.

Published: Mon Aug 25 12:10:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Phishing Campaign Exploits Trusted Infrastructure to Deliver UpCrypter-Infused RAT Payloads


A new phishing campaign has been discovered that utilizes fake voicemail messages and purchase orders to deliver a malware loader called UpCrypter. This malware is used to infect various sectors across the globe and provides attackers with remote access tools (RATs) to control compromised hosts. The attack leverages trusted infrastructure, such as Google Classroom, to bypass security systems and trick users into downloading malicious software.

Published: Mon Aug 25 13:21:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Farmers Insurance Data Breach: A Widespread Consequence of Salesforce Attack


A major data breach has affected over 1.1 million customers of Farmers Insurance, revealing a significant vulnerability in the company's customer database. The breach is attributed to a widespread Salesforce attack that highlights the need for robust cybersecurity measures and enhanced security protocols to prevent similar breaches in the future.

Published: Mon Aug 25 15:04:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Auchan Retailer Data Breach Exposes Sensitive Customer Information


A recent data breach at French retailer Auchan has exposed hundreds of thousands of customer records, including full names, addresses, and loyalty card numbers. The breach highlights the need for companies to prioritize data security and protect sensitive information from cyber threats.

Published: Mon Aug 25 15:10:53 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Uncovers the Sinister Plot: UNC6384's Captive Portal Hijacks Target Diplomats with PlugX Malware


A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the globe to advance Beijing's strategic interests. The campaign leverages advanced social engineering including valid code signing certificates, an adversary-in-the-middle (AitM) attack, and indirect execution techniques to evade detection.

Published: Mon Aug 25 15:19:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Docker Container Escape Vulnerability: A Critical Security Threat to Windows, macOS, and Linux Systems


Docker has released critical fixes to address a severe vulnerability (CVE-2025-9074) that affects its Docker Desktop application for Windows and macOS. The vulnerability allows an attacker to escape the confines of a container and potentially gain full access to the underlying host system. To protect your systems, it's essential to upgrade your Docker Desktop application as soon as possible.

Published: Mon Aug 25 15:29:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Play Removes 77 Malicious Apps with Over 19 Million Installs Due to Anatsa Banking Trojan and Other Malware


A recent study by Zscaler's ThreatLabs has revealed 77 malicious Android apps with over 19 million installs have been removed from Google Play due to the spread of Anatsa banking trojan and other malware. The removal of these malicious apps highlights the importance of mobile app security and user awareness, as well as the need for regular software updates to protect against potential threats.

Published: Mon Aug 25 15:36:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Senator Wyden Criticizes Federal Judiciary for Ignoring Basic Cybersecurity

US Senator Ron Wyden has criticized the federal judiciary for its negligence and incompetence in addressing basic cybersecurity measures following a recent hack that exposed confidential court documents. The breach highlights the need for the judiciary to prioritize cybersecurity and take steps to prevent similar incidents in the future.

Published: Mon Aug 25 16:48:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Docker's Container Conundrum: A Critical Vulnerability Exposed


Docker has recently issued a critical patch to address a severe vulnerability in its Desktop application for Windows and macOS. The identified flaw could allow attackers to escape the confines of a container, potentially leading to full host compromise. Users are advised to update their Docker Desktop application with the latest patch as soon as possible to prevent potential exploitation.

Published: Mon Aug 25 17:56:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Alert: Three Exploited Vulnerabilities Added to KEV Catalog


Cybersecurity Alert: Three Exploited Vulnerabilities Added to KEV Catalog

Three vulnerabilities have been added to the KEV catalog, including Citrix Session Recording and Git. These vulnerabilities can be exploited for privilege escalation, remote code execution, and arbitrary code execution. CISA has advised federal civilian executive branch agencies to apply necessary mitigations by September 15, 2025. Prioritize patching and securing your systems to prevent exploitation.


Published: Tue Aug 26 02:28:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malware Menace Lurking in Plain Sight: The Rise of Malicious Apps on Google Play Store

Google's Play Store has been hit with 19 million instances of malware-laden apps that evaded even the most advanced security scans. The discovery raises serious questions about Google's security procedures and the ease with which malicious code can be distributed through online platforms.

Published: Tue Aug 26 04:06:27 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hook Android Trojan: A Growing Threat to Financial Institutions and End-Users



A new variant of an Android banking trojan has been discovered, featuring a ransomware-style overlay screen designed to coerce victims into remitting a ransom payment. The HOOK Android Trojan has expanded its remote commands to 107, highlighting the growing sophistication of banking trojans and their increasing overlap with spyware and ransomware tactics.

Published: Tue Aug 26 05:15:21 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) Adds Citrix Session Recording and Git Flaws to Its Known Exploited Vulnerabilities Catalog, Highlighting the Importance of Patching and Addressing Emerging Threats


The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added Citrix Session Recording and two Git flaws to its Known Exploited Vulnerabilities catalog, highlighting the importance of patching and addressing emerging threats in the digital realm.

Published: Tue Aug 26 05:25:42 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Farmers Insurance Data Breach Exposes 1.1 Million Customers' Personal Information

Over 1.1 million Farmers Insurance customers' personal data has been exposed in a major data breach, leaving them vulnerable to phishing and fraud attempts.

Published: Tue Aug 26 06:35:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New ShadowCaptcha Campaign Spreads Ransomware, Info Stealers, and Crypto Miners Through Exploited WordPress Sites

A new large-scale campaign known as ShadowCaptcha has been identified as exploiting over 100 compromised WordPress sites to spread ransomware, information stealers, and cryptocurrency miners. This malicious operation utilizes a combination of social engineering tactics, living-off-the-land binaries (LOBins), and multi-stage payload delivery to gain and maintain control over targeted systems.

Published: Tue Aug 26 07:46:26 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

DSPRooth, Proxies, and the Threat of “Legal Botnets”

Exposing the Dark Truth Behind DSLRoot's "Legal Botnets": A Threat to Cybersecurity and National Security

Published: Tue Aug 26 09:58:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Violent Crypto Thief's Descent into Darkness: Remy Ra St Felix's International Crime Ring

Remy Ra St Felix, a 25-year-old crypto thief from West Palm Beach, Florida, has been sentenced to an additional six years and ten months in prison for his role as the ringleader of an international crime gang. The new sentence brings Felix's total imprisonment to over 53 years.

Published: Tue Aug 26 10:12:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unveiling the ZipLine Campaign: A Sophisticated Social Engineering Malware That Targets U.S. Supply Chain Manufacturers

Recently, a highly sophisticated social engineering malware attack known as ZipLine has been discovered targeting U.S.-based supply chain manufacturers. The attackers utilize legitimate business workflows to trick employees into starting conversations with the threat actors, which often leads to weeks of professional exchanges sealed with fake NDAs before delivering a weaponized ZIP file containing MixShell, an in-memory malware capable of stealthy operations.

Published: Tue Aug 26 10:21:53 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Auchan's Data Breach: A Cautionary Tale of Loyalty Card Security

Auchan has disclosed a data breach that exposed hundreds of thousands of customer details. The breach highlights the importance of cybersecurity measures and the need for effective protection of personal information.

Published: Tue Aug 26 10:32:43 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Warns of Active Exploitation of Critical Git Vulnerability



A critical warning from CISA highlights the need for immediate attention to a widely exploited Git vulnerability that poses significant risks to organizations relying on the distributed version control system. Hackers have already begun exploiting this vulnerability, emphasizing the urgent nature of this warning and the importance of swift action against known threats.



Published: Tue Aug 26 11:44:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Widespread Data Theft Campaign Targets Salesforce Instances via Salesloft Drift


A widespread data theft campaign targeting Salesforce instances via the Salesloft Drift third-party application has been reported by Google Threat Intelligence Group (GTIG). The campaign, carried out by a threat actor tracked as UNC6395, began on August 8, 2025, and continued through at least August 18, 2025. The actor systematically exported large volumes of data from numerous corporate Salesforce instances, targeting sensitive credentials such as AWS access keys, passwords, and Snowflake-related access tokens. Organizations are urged to take immediate remediation steps.

Published: Tue Aug 26 12:53:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Citrix Patches Trio of NetScaler Bugs Just as Attackers Have Exploited Them


Citrix Patches Trio of NetScaler Bugs Just as Attackers Have Exploited Them


Published: Tue Aug 26 13:01:09 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Citrix Patches Critical NetScaler Flaws Amid Widespread Exploitation

Citrix has patched critical NetScaler flaws amid widespread exploitation. The vulnerabilities were discovered by researchers who credited Citrix for their role in identifying the issues. Organizations relying on NetScaler ADC and Gateway systems must patch their software immediately.

Published: Tue Aug 26 13:11:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Sni5Gect Attack Unveiled: A Devastating Blow to 5G Security


A new attack has been discovered that can downgrade 5G connections without relying on rogue base stations, compromising the security of mobile devices worldwide.

Published: Tue Aug 26 13:24:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Salesloft Breach: ShinyHunters' OAuth Token Heist Exposes Salesforce CRM Instances to Data Theft


Salesloft, a sales automation platform, has been breached by the notorious threat actor group, ShinyHunters. The breach occurred due to the theft of OAuth tokens used for Salesloft's Drift chat agent integration with Salesforce. This attack is part of a larger wave of Salesforce data breaches linked to the ShinyHunters group. To protect themselves from these types of attacks, organizations must take steps to secure their credentials and educate their employees on the dangers of social engineering.

Published: Tue Aug 26 14:38:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Nevada's Cybersecurity Crisis: A State-Wide Disruption by a Sophisticated Attack

Nevada's state offices were forced to close after a sophisticated cyberattack disrupted its IT systems, leaving residents on high alert and officials scrambling to restore normal service.

Published: Tue Aug 26 14:46:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Trump Administration's Election Interference: A Threat to Democracy

Heather Honey, a longtime Republican activist, has been appointed as the Department of Homeland Security’s deputy assistant secretary of election integrity, sparking concerns about the Trump administration's intentions and the potential for election interference.

Published: Tue Aug 26 14:55:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

ZipLine Phishing Campaign: A Sophisticated Cybercrime Operation Targeting US Manufacturers and Supply-Chain Companies



The ZipLine phishing campaign is a sophisticated cybercrime operation targeting US manufacturers and supply-chain companies, using novel techniques such as the exploitation of public Contact Us forms and custom in-memory implants. The campaign has been notable for its use of AI-themed lures and old abandoned domains to bypass security filters and gain the trust of their targets. With over 80% of targeted organizations being US-based, this campaign serves as a wake-up call for businesses to be vigilant against phishing attacks and to take steps to protect themselves against these types of threats.

Published: Tue Aug 26 15:12:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Citrix Urgently Addresses Three Critical NetScaler Flaws Exploited in the Wild

Three critical vulnerabilities have been discovered in Citrix's NetScaler ADC and NetScaler Gateway products, with one of them actively being exploited in the wild. The company has issued urgent updates to secure its products, emphasizing the importance of prompt action to prevent potential security breaches.

Published: Tue Aug 26 15:25:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Emergence of PromptLock: The First AI-Powered Ransomware


The first known AI-powered ransomware, PromptLock, has been identified by ESET researchers, posing a significant threat to cybersecurity. This malware leverages OpenAI's gpt-oss-20b model to generate malicious Lua scripts, making detection more difficult. Despite its limited functionality at present, PromptLock highlights the rapidly evolving nature of cyber threats and underscores the importance of ongoing vigilance in the cybersecurity community.

Published: Tue Aug 26 16:39:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Unveils Comprehensive Silicon Security Layer for Azure Cloud Customers

Microsoft has unveiled a custom silicon security layer designed to enhance security and isolation for its cloud customers' data and workloads. With this new initiative, Microsoft aims to provide an additional layer of protection and security for its Azure cloud offerings.

Published: Tue Aug 26 17:00:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Social Security Data Breach: How DOGE's Unchecked Ambition Put America's Most Vulnerable Citizens at Risk

DOGE's reckless handling of critical Social Security database records has put millions of Americans at risk of identity theft, lost benefits, and other forms of exploitation. The Trump administration's cost-cutting unit has been accused of disregarding basic security protocols in favor of expediency and efficiency. A thorough investigation is now needed to determine the full extent of DOGE's wrongdoing.

Published: Tue Aug 26 17:14:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Farmers Insurance Discloses Widespread Data Breach Exposing 1.1 Million Customers' Personal Information


Farmers Insurance has disclosed a data breach impacting approximately 1.1 million customers, exposing sensitive personal information including names, addresses, dates of birth, driver's license numbers, and last four digits of Social Security numbers. The breach was linked to a wave of Salesforce attacks, and the company is taking steps to mitigate the incident and protect affected customers.

Published: Tue Aug 26 17:28:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Introduces Developer Verification to Block Malware on Google Play


Google has introduced a new Developer Verification program aimed at blocking malware on Google Play by requiring all developers to verify their identity. This move follows the introduction of D-U-N-S numbers for publishers on Google Play, which have already shown significant reductions in malware on the platform. With its implementation set to expand globally in 2027, this system aims to strengthen Android's security features and protect users from emerging threats.

Published: Tue Aug 26 18:44:53 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Citrix Addresses Critical NetScaler RCE Flaw Exploited in Zero-Day Attacks


Citrix has addressed a critical remote code execution (RCE) flaw in their NetScaler ADC and Gateway products, which was exploited in zero-day attacks. The company strongly recommends customers upgrade their firmware to the latest versions containing the fix, as there are no available mitigations to protect against potential exploits.

Published: Tue Aug 26 18:52:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Silk Typhoon Hackers Hijack Diplomatic Network Captive Portals for Malicious Aims

State-sponsored hackers linked to the Silk Typhoon group have hijacked network captive portals in diplomatic attacks, compromising system information and uploading malicious files. This latest campaign highlights the increasing sophistication of Chinese-nexus espionage actors and the need for vigilance in detecting and responding to these types of attacks.

Published: Tue Aug 26 19:14:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Warns of State-Backed Web Hijack Attack: A New Layer of Cyber Threats

Google has warned customers of a suspected state-backed web hijack attack, which may be linked to a Chinese threat actor group called UNC6384. The attack involves malware disguised as Adobe plugins, designed to compromise networks and deliver other malicious software.

Published: Wed Aug 27 00:47:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The State of BGP Security: A Complex Web of Challenges and Solutions

As the Internet continues to evolve, securing BGP security is an ongoing challenge that requires cooperation among key stakeholders. Recent efforts have seen notable developments in Route Origin Validation (ROV) and Resource Public Key Infrastructure (RPKI), but further work remains to be done to address the root causes of BGP security vulnerabilities.

Published: Wed Aug 27 02:04:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Sophisticated APT Campaign: Uncovering the Anatomy of a Highly Advanced Adversary-In-The-Middle Attack

China-linked APT group Silk Typhoon has been implicated in a highly sophisticated adversary-in-the-middle attack, targeting high-ranking diplomats and government officials across Southeast Asia and globally. The attackers employed advanced evasion techniques and utilized legitimate Windows features to avoid detection, highlighting the significant threat posed by this group.

Published: Wed Aug 27 03:17:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Threats of Sophisticated AI: A Growing Concern for Cybersecurity


The threat of sophisticated AI is a growing concern for cybersecurity experts and organizations around the world. According to Anthropic’s new Threat Intelligence report, AI-powered chatbots like Claude are being used to conduct complex cybercrimes on their own, without human intervention. This includes "vibe-hacking," where cybercrime rings use AI-powered chatbots to extort data from organizations, as well as fraudulent job scams and other malicious activities.

Published: Wed Aug 27 05:28:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Identity Crisis in Cybersecurity: A Growing Concern Amidst Rising Login Attacks

Duo Security's latest report highlights the growing concern of identity crises in cybersecurity, with only 33% of cybersecurity leaders confident in their ability to protect user identities against phishing and AI-assisted attacks. The report emphasizes the need for a more integrated approach to identity security, prioritizing simplicity, visibility, and effectiveness over complexity and fragmentation.

Published: Wed Aug 27 05:43:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Uncanny Scale and Discipline of the UNC6395 Attacks: Unveiling a Sophisticated Supply Chain Threat


The UNC6395 group has launched a sophisticated attack campaign that targets Salesforce tenants and exploits OAuth tokens. The attackers' operational discipline and strategic approach underscore the need for organizations to prioritize supply chain security and implement robust threat intelligence strategies.

Published: Wed Aug 27 05:59:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Blind Eagle's Sophisticated Campaigns Target Colombia, Employing Dynamic DNS and RATs


Blind Eagle, a group linked to significant cyber-espionage and financially driven attacks in South America, has carried out campaigns employing dynamic DNS and remote access trojans (RATs) targeting government entities, educational institutions, financial sectors, and healthcare organizations across Colombia. This activity, monitored by Recorded Future Insikt Group, underscores the sophisticated tactics employed by this threat actor and highlights ongoing concerns over its true motivations.

Published: Wed Aug 27 06:10:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

ESET Uncovers the First AI-Driven Ransomware: PromptLock

Breaking News: ESET Uncovers the First AI-Driven Ransomware, Dubbed PromptLock, Which Uses OpenAI's gpt-oss:20b Model to Generate Malicious Lua Scripts on the Fly. The Implications are Far-Reaching and Highlight the Growing Sophistication of Cyber Attacks in Recent Years.

Published: Wed Aug 27 06:16:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Locks Down Building After Protesting Workers Enter CEO's Office

Protesting workers stormed into the office of Microsoft CEO Brad Smith on Tuesday, conducting a sit-in in response to allegations that the company's Azure cloud servers were being used for a massive surveillance program aimed at Palestinians. The protests come as part of a growing trend of activism aimed at disrupting the relationship between Big Tech and the Israeli government.

Published: Wed Aug 27 08:34:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Salesforce Data Breach Saga: Unpacking the Salesloft Connection

Google has linked recent Salesforce-related breaches to the Salesloft Drift app, citing attackers stealing OAuth tokens to access CRM data in a 'widespread campaign'. The breach is believed to have occurred between August 8 and 18, affecting multiple organizations.

Published: Wed Aug 27 08:46:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Era of AI-Generated Ransomware: A New Frontier for Cybercrime


Cybercriminals are increasingly leveraging generative AI tools to fuel their nefarious activities, as revealed by a recent report from Anthropic. This new frontier poses a significant challenge for law enforcement and cybersecurity professionals alike, highlighting the need for greater awareness and understanding of emerging threats.

Published: Wed Aug 27 08:57:32 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Multifaceted Menace: Unpacking the ShadowSilk Malware Campaign Targeting Central Asia and APAC

In recent weeks, a malicious campaign dubbed ShadowSilk has been targeting government entities, energy organizations, retail companies, and transportation sectors in Central Asia and APAC. This article delves into the tactics employed by the perpetrators, toolset utilized, and broader implications for regional security.

Published: Wed Aug 27 10:00:20 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Healthcare Services Group Data Breach: A Complex Incident Exposing the Vulnerabilities of a Large Healthcare Provider

Over 624,000 individuals have been affected by a data breach at Healthcare Services Group (HSGI), with their personal information exposed between September 27, 2024, and October 3, 2024. The breach highlights the need for healthcare organizations to prioritize their cybersecurity posture in order to protect sensitive information.

Published: Wed Aug 27 11:14:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

ShadowSilk: A Complex Cyber Threat Actor Targeting Government Entities Across Central Asia and APAC



A sophisticated threat actor known as ShadowSilk has been identified, targeting government entities across Central Asia and APAC. The group leverages various tactics, including spear-phishing emails, custom loaders hidden behind Telegram bots, and modifications to the Windows Registry to achieve persistence. With nearly three dozen victims identified, this complex cyber threat actor poses a significant risk to government sectors in the region.



Published: Wed Aug 27 12:26:32 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The 2024 Data Breach of Healthcare Services Group: A Comprehensive Analysis


The 2024 data breach of Healthcare Services Group has resulted in the theft of sensitive information from over 624,496 individuals. The breach highlights the importance of robust cybersecurity measures and the need for regulatory bodies to implement stricter guidelines to protect individual privacy.

Published: Wed Aug 27 12:34:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Swedish Municipalities Fall Prey to Large-Scale Cyberattack: A Look into the Details


Sweden has been impacted by a significant cyberattack that affected over 200 municipalities, causing accessibility issues and concerns about stolen sensitive data. The attack targeted an IT system supplier, Miljödata, which provides work environment and HR management systems to a substantial majority of Sweden's municipal systems. The incident highlights the importance of robust cybersecurity measures and underscores the need for continuous vigilance in protecting against increasingly sophisticated cyber threats.

Published: Wed Aug 27 13:58:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Salt Typhoon Phenomenon: Unpacking the Global Cyber Espionage Campaign Linked to Chinese Tech Firms


Global Salt Typhoon hacking campaigns linked to Chinese tech firms, revealing a complex web of cyber espionage operations targeting government networks and telecommunications companies worldwide.

Published: Wed Aug 27 14:16:53 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critically Vulnerable Citrix Devices Expose Over 28,000 Instances to Exploited RCE Flaw

Over 28,000 instances of vulnerable Citrix devices have been exposed due to a newly discovered RCE vulnerability (CVE-2025-7775), with some locations more severely affected than others. The exploitation is considered zero-day, highlighting the urgency for users to upgrade their firmware as soon as possible.

Published: Wed Aug 27 14:30:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google to Implement Developer Verification for Android Apps: A New Era in Mobile Security

Google has announced plans to implement developer verification for all Android apps as part of its efforts to enhance mobile security. Starting in 2026, all apps installed on certified devices must come from verified developers. The rollout marks a significant shift in the way Android security is managed and underscores the importance of mobile security in an increasingly connected world.

Published: Wed Aug 27 14:51:39 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

AI-Powered Cybercrime on the Rise: Anthropic Admits to Ransomware and Fake IT Expertise

AI-powered cybercrime is on the rise, with Anthropic's own tool being used in a sophisticated ransomware campaign. The company has taken steps to mitigate the misuse of its technology, but experts argue that its measures are ineffective in preventing AI-powered cybercrime.

Published: Wed Aug 27 16:01:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New AI-Powered Ransomware: A Threat to Cybersecurity

Researchers have discovered the first AI-powered ransomware, called PromptLock, which uses Lua scripts to steal and encrypt data on Windows, macOS, and Linux systems. The malware leverages OpenAI's gpt-oss:20b model to generate malicious scripts dynamically.

Published: Wed Aug 27 16:12:26 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

FreePBX Server Breach: A Zero-Day Vulnerability Exposes Critical PBX Infrastructure


The FreePBX community has been affected by a major security breach due to an actively exploited zero-day vulnerability in exposed FreePBX administrator control panels. The breach highlights the importance of maintaining up-to-date security measures, and administrators should take proactive steps to mitigate potential risks.

Published: Wed Aug 27 16:19:14 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ai-Powered Chatbot Used for Extensive Cybercrime Operation

A leading artificial intelligence chatbot has been used by hackers to orchestrate one of the most extensive and profitable cybercriminal schemes involving AI to date, highlighting the risks of using unregulated AI in malicious activities.

Published: Wed Aug 27 16:26:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korea's IT Worker Scam: A Threat to Global Cybersecurity

US Treasury Department sanctions two Asian companies and two individuals for their alleged involvement in North Korean IT worker scams that targeted US businesses, highlighting the ongoing threat posed by North Korea's use of cybercrime.

Published: Wed Aug 27 16:35:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Reliance on Fast-Glob: A Vulnerability in the US Department of Defense's Open-Source Software

The US Department of Defense's reliance on fast-glob, an open-source utility maintained by a Russian developer with ties to Yandex, has raised concerns about the agency's approach to system security. Despite the potential risks associated with this vulnerability, the DoD has thus far failed to respond with meaningful action.

Published: Wed Aug 27 17:07:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Nx NPM Packages Poisoned in AI-Assisted Supply Chain Attack

Nx NPM packages have been poisoned in an AI-assisted supply chain attack, resulting in the compromise of numerous developer credentials and sensitive information. The attack highlights the evolving sophistication of supply chain attacks and serves as a reminder of the importance of vigilance in software development and maintenance.

Published: Wed Aug 27 17:13:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadow in the Cloud: How Storm-0501 Revealed the Vulnerabilities of Hybrid Cloud Environments

Microsoft's threat intelligence team has revealed a new and alarming trend in ransomware attacks as Storm-0501, a financially motivated cybercrime crew, broke into a large enterprise's on-premises and cloud environments. The attackers used cloud-native capabilities to rapidly exfiltrate large volumes of data, destroy data and backups within the victim environment, and demand ransom - all without relying on traditional malware deployment.

Published: Wed Aug 27 17:27:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Swatting: How a Group on Telegram is Wreaking Havoc on US Universities

Swatting, a form of online harassment that involves making false reports of a violent incident to provoke law enforcement into sending officers to a target location, has taken the United States by storm. A group known as Purgatory, which operates primarily on Telegram and Discord platforms, has been responsible for a recent spate of swatting incidents targeting universities across the country.

Published: Wed Aug 27 17:39:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Storm-0501: The Hybrid Cloud Ransomware Threat Actor Targeting Government and Private Sector Organizations

Storm-0501: A New Breed of Hybrid Cloud Ransomware Threat Actor Targets US Government and Private Sector Organizations with Sophisticated Attacks. Read more about the threats this actor poses and how organizations can protect themselves.

Published: Wed Aug 27 17:47:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Emergence of PromptLock: A Game-Changing Ransomware Variant Leveraging AI-Powered Lua Scripts

The discovery of PromptLock marks a significant shift in the evolution of ransomware tactics, as attackers increasingly rely on artificial intelligence (AI) to generate malicious Lua scripts. This cutting-edge malware poses new challenges for threat detection and mitigation, highlighting the need for continued vigilance and investment in advanced security technologies.

Published: Wed Aug 27 17:59:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

28,200 Citrix Instances Exposed to Critical RCE Flaw: A Global Security Alert

Experts have sounded an alarm about over 28,200 exposed Citrix NetScaler ADC/Gateway instances that remain vulnerable to a critical RCE flaw known as CVE-2025-7775. The US CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, urging federal agencies to patch their systems immediately.

Published: Wed Aug 27 18:08:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Cloud-Based Ransomware: How Storm-0501's Shift to Cloud Attacks is Changing the Face of Cybersecurity

Storm-0501's cloud-based ransomware attack is changing the face of cybersecurity, with Microsoft reporting a significant increase in cloud-based threats in recent months. As organizations adapt to this new threat landscape, they must prioritize robust security measures and stay informed about the latest threat intelligence.

Published: Wed Aug 27 19:21:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

AI Bias in ChatGPT: The Hidden Guardrails that Shape User Experience

A new study has uncovered hidden guardrails in ChatGPT that shape user responses based on inferred politics and affiliations. The discovery highlights the importance of addressing AI biases in language processing models like ChatGPT.

Published: Wed Aug 27 19:30:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Attack on MATLAB Developer Exposes Data of 10,000 People


MATLAB developer reveals that a ransomware gang stole data of 10,000 people from their network in April, compromising various internal systems and applications. The breach is believed to have occurred more than a month before it was discovered by the company.

Published: Thu Aug 28 10:21:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

TransUnion Data Breach: 4.4 Million People's Personal Information Exposed

TransUnion has suffered a significant data breach, exposing the personal information of over 4.4 million people. The attack, which occurred on July 28, 2025, highlights the importance of robust cybersecurity measures and the need for companies to prioritize protecting sensitive customer data.

Published: Thu Aug 28 10:31:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

SK Telecom Fined Record $97 Million for Unprecedented Security Breach Exposed by Personal Information Protection Commission

South Korea's Personal Information Protection Commission has handed down a record-breaking fine of ₩134.5 billion ($97 million) to SK Telecom after discovering numerous bungled security measures that allowed hackers to infiltrate the company's systems and compromise sensitive subscriber information on an unprecedented scale.

Published: Thu Aug 28 10:43:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

TransUnion's Cybersecurity Breach Exposes Personal Data of 4.5 Million Individuals

TransUnion has suffered a major cybersecurity breach exposing sensitive data from nearly 4.5 million individuals. The breach highlights the growing trend of third-party attacks on supply chains and underscores the importance of robust security measures in protecting critical infrastructure.

Published: Thu Aug 28 11:06:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Citrix NetScaler Vulnerability: A Looming Threat to Enterprise Security

Thousands of Citrix NetScaler appliances remain vulnerable to exploitation despite patches being made available, posing a significant risk to organizations relying on these systems.

Published: Thu Aug 28 11:16:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Strike: The Vulnerability of Sweden's Municipal Governments



A devastating cyberattack has crippled approximately 200 out of 290 municipalities in Sweden, disrupting critical IT systems used for managing employee data, handling sick leave, and incident reporting. The attack on Miljödata, a popular HR software provider, highlights the vulnerability of centralized IT suppliers and underscores the need for robust cybersecurity measures to protect public services from exploitation by malicious actors.

Published: Thu Aug 28 11:35:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Euro Banks Block Billions in Rogue PayPal Direct Debits Amidst Fraud Glitch

PayPal's alleged failure in detecting fraudulent transactions led to billions of euros' worth of unauthorized direct debits being blocked by Euro banks. The issue has highlighted the importance of robust fraud-detection systems in preventing such incidents and protecting users' financial interests.

Published: Thu Aug 28 11:52:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Devastating Breach of Trust: London Law Firm Exposes Church of England Abuse Victim Details

London law firm accidentally exposes Church of England abuse victim details in email breach, sparking outrage and calls for improved security protocols.

Published: Thu Aug 28 12:00:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Enduring Menace of Salt Typhoon: A Persistent Threat to Global Cybersecurity



The Salt Typhoon threat highlights the need for continued vigilance in global cybersecurity efforts. This persistent actor has been linked to significant cyber-espionage campaigns targeting major telecommunications providers across multiple countries. The group's sophisticated methods of maintaining network persistence pose a significant threat to global cybersecurity, emphasizing the importance of patching vulnerabilities and adopting robust security practices.



Published: Thu Aug 28 12:20:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing the Vulnerability: Fast-Glob's Sole Maintainer Revealed to be a Yandex Dev


US Department of Defense (DoD) has been relying on fast-glob, a widely used utility software designed to find files and folders that match specific patterns. The sole maintainer of this package is a Yandex developer living in Russia, raising concerns about potential national security risks due to the lack of external oversight.

Published: Thu Aug 28 13:02:03 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Salt Typhoon Nightmare: How China-Linked Hackers Exploited Global Networks Using Cisco, Ivanti, and Palo Alto Vulnerabilities


A sophisticated cyber threat actor known as Salt Typhoon has breached over 600 organizations worldwide, including major telecommunications providers, government agencies, transportation systems, lodging facilities, and military infrastructure. Learn more about the tactics used by this group and how organizations can protect themselves against this type of threat.

Published: Thu Aug 28 13:19:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Hidden Dangers of Relying on Project Management Tools Alone: A Threat to Business Continuity


Relying solely on SaaS project management tools can have severe consequences for businesses. Learn how to protect your sensitive information and maintain business continuity with the help of cloud-based backup solutions like FluentPro Backup.

Published: Thu Aug 28 13:39:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

U.S. Treasury Imposes Sanctions on North Korean Remote IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits


The U.S. Treasury has imposed new sanctions on two individuals and two entities for their role in a North Korean remote information technology (IT) worker scheme, exposing $600K crypto transfers and $1M+ profits. The Office of Foreign Assets Control targeted Vitaliy Sergeyevich Andreyev, Kim Ung Sun, Shenyang Geumpungri Network Technology Co., Ltd, and Korea Sinjin Trading Corporation for their involvement in the scheme. These sanctions aim to curb the illicit activities of North Korean IT workers and disrupt the regime's efforts to generate illicit revenue through cryptocurrency theft.

Published: Thu Aug 28 13:49:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Era of Cybersecurity Threats: The Rise of AI-Powered Ransomware

A new AI-powered ransomware variant codenamed PromptLock has been discovered by Slovak cybersecurity company ESET, which leverages the power of large language models to generate malicious Lua scripts. This marks a significant milestone in the evolution of cyber attacks and highlights the growing capabilities of AI in the hands of cybercriminals.

Published: Thu Aug 28 14:04:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Cyberattack of Unprecedented Proportions: The Devastating Impact on Swedish Municipalities



A cyberattack of unprecedented proportions has left its mark on Sweden, with no fewer than 200 municipalities being impacted by this devastating incident. The IT provider responsible for serving these municipalities, Miljödata, found itself at the center of attention as it struggled to come to terms with the magnitude of the attack. This is a stark reminder that our reliance on technology cannot be overstated, and the stakes are higher than ever before.

Published: Thu Aug 28 14:12:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Massive Data Breach Exposes Personal Information of Over 4.4 Million TransUnion Customers



A massive data breach has exposed personal information of over 4.4 million TransUnion customers, raising concerns about the vulnerability of sensitive data within the credit reporting industry. The incident highlights the importance of prioritizing data security and transparency, and TransUnion's response serves as a model for companies to follow in addressing similar breaches.

Published: Thu Aug 28 14:19:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Tainted Networks: Exposing the Tactics, Techniques, and Procedures of Chinese State-Sponsored Actors


The recent joint Cybersecurity Advisory highlights the TTPs used by Chinese state-sponsored actors, commonly referred to as Salt Typhoon. These actors are targeting critical infrastructure worldwide, exploiting known vulnerabilities and adapting their techniques as new flaws emerge. The advisory emphasizes the importance of patching historically exploited CVEs and implementing robust security controls to mitigate the risks associated with these sophisticated attacks.

Published: Thu Aug 28 14:36:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The OAuth Token Theft Campaign: Uncovers UNC6395's Cunning Scheme to Exploit Drift-Salesforce Integration


The OAuth Token Theft Campaign: Uncovers UNC6395's Cunning Scheme to Exploit Drift-Salesforce Integration

In a recent phishing campaign, threat actor UNC6395 targeted the Salesloft platform integrated with Drift AI chat. The attackers exploited OAuth tokens to steal sensitive information from Salesforce customer instances, compromising numerous corporate entities worldwide. This article delves into the details of the attack and provides insights on how organizations can protect themselves against similar threats.

Published: Thu Aug 28 14:47:03 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

China-linked UNC6384 Targets Diplomats by Hijacking Web Traffic

China-linked UNC6384 has successfully targeted diplomats around the world by hijacking web traffic and delivering malware via a legitimate-looking Adobe plugin update. This sophisticated attack highlights the continued evolution of UNC6384's operational capabilities and the sophistication of PRC-nexus threat actors.

Published: Thu Aug 28 14:56:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A High-Severity Vulnerability in Passwordstate Credential Manager: A Wake-Up Call for Enterprise Organizations

A critical vulnerability has been discovered in Passwordstate, a popular password manager used by enterprise organizations worldwide. Read more about the severity of the issue, the recommended solution, and the importance of keeping software up-to-date with the latest patches.

Published: Thu Aug 28 16:20:52 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malware Devs Abuse Anthropic's Claude AI for Ransomware and Cybercrime: A Growing Concern

Malicious actors have been exploiting Anthropic's cutting-edge language model, Claude, to develop sophisticated ransomware packages. This has sent shockwaves through the cybersecurity community, highlighting the growing threat of AI-powered cybercrime.

Published: Thu Aug 28 16:30:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Passwordstate Dev Urges Users to Patch Auth Bypass Vulnerability Immediately

Click Studios has issued an urgent warning to its users regarding a high-severity authentication bypass vulnerability in their Passwordstate password manager, urging them to patch their systems with the latest update as soon as possible. The vulnerability poses significant risks to user credentials and requires immediate attention from IT professionals worldwide.

Published: Thu Aug 28 16:39:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Department of Homeland Security's Counter-Drone Tech Spending: A Comprehensive Analysis

The US Department of Homeland Security has announced plans to spend over $100 million on counter-drone technology, a move that has sparked both excitement and concern among experts in the field. Will this technology truly protect critical infrastructure and public safety? Or will it lead to unintended consequences? Only time will tell.

Published: Thu Aug 28 16:49:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBI and Dutch Police Seize Fake ID Marketplace VerifTools, Worth $6.4 Million

The FBI and Dutch police have seized VerifTools, a notorious online marketplace that sold fake identity documents for as little as $9. The platform's seizure is a major victory for law enforcement agencies, which identified the equivalent of approximately $6.4 million in illicit proceeds linked to its operations.

Published: Thu Aug 28 17:15:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Pentagon's Struggle to Protect America's Defense Secrets from China's Growing Cyber Threat


The US Defense Department is struggling to contain the rapid pace of Chinese cyber espionage, with the Director of the DCSA revealing that 30,000 suspicious incidents are reviewed annually. Despite efforts to secure defense networks, high-profile breaches and insider threats continue to pose a significant risk. To address this issue, the DCSA plans to increase facility clearances, engage in more personnel vetting, and conduct more training.

Published: Thu Aug 28 17:30:03 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Industrial Scale of Credential Chaos: A Wake-Up Call for Businesses to Upgrade Their Password Management

Industrially scaled credential theft has become a major concern, with 60% of breaches linked to human error. Businesses must upgrade their password management practices to protect against these high-profile breaches that can result in significant financial losses and reputational damage.

Published: Thu Aug 28 17:38:42 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Warns Salesloft Breach Impacted Some Google Workspace Accounts

Google has warned that a breach of Salesloft's Drift AI chat integration with Salesforce has compromised some Google Workspace accounts, urging all organizations using Drift to treat every authentication token stored in or connected to the platform as compromised. The breach was initially thought to be limited to Salesforce integrations but has since been revealed to impact other areas.

Published: Thu Aug 28 18:51:32 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Consequences of Salt Typhoon: A Global Cyber Espionage Crisis


The Consequences of Salt Typhoon: A Global Cyber Espionage Crisis
A shocking revelation from the FBI confirms that China's Salt Typhoon cyber espionage campaign has stolen information from nearly every American, with potential implications felt globally. The scope and impact of the breach raise serious questions about security measures in place to protect critical infrastructure networks.

Published: Thu Aug 28 20:21:57 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Dutch Intelligence Sounds Alarm: China-Linked APT Salt Typhoon Exploits Global Critical Infrastructure


Dutch intelligence agencies have warned that Chinese cyber spies linked to the APT group Salt Typhoon targeted local critical infrastructure in the Netherlands. The warning comes as part of a broader trend of Chinese state-sponsored actors using advanced persistent threat tactics to compromise networks worldwide and feed global espionage systems.

Published: Fri Aug 29 03:42:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great VerifTools Heist: A Masterclass in Cybercrime and the cat-and-mouse game between Law Enforcement and Cybercriminals


In a shocking turn of events, authorities from the Netherlands and the United States have successfully dismantled an illicit marketplace called VerifTools that peddled fraudulent identity documents to cybercriminals across the world. The operation highlights the cat-and-mouse game between law enforcement agencies and skilled cybercriminals, as well as the growing threat of identity theft in the digital age.

Published: Fri Aug 29 04:52:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

OAuth Token Theft Campaign: Salesloft Drift Breach Affects All Integrations


A recent breach at Salesloft Drift has exposed sensitive information from Salesforce instances due to a OAuth token theft campaign. The attack resulted in the theft of AWS access keys (AKIA) and Snowflake tokens, prompting organizations to re-examine their security measures.

Published: Fri Aug 29 05:01:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Click Studios Patches Critical Vulnerability in Passwordstate Authentication Bypass

Click Studios has patched an authentication bypass vulnerability in its Passwordstate software, addressing concerns about potential clickjacking attacks aimed at its browser extension. This move underscores the company's dedication to providing secure solutions for organizations worldwide.

Published: Fri Aug 29 06:09:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The FreePBX Zero-Day Vulnerability: A Wake-Up Call for Businesses and Call Centers


A recently discovered zero-day vulnerability in FreePBX has exposed multiple systems to remote code execution. The vulnerability affects versions 15 prior to 15.0.66, 16 prior to 16.0.89, and 17 prior to 17.0.3. Users are advised to upgrade to the latest supported versions of FreePBX and restrict public access to the administrator control panel. For more information on this vulnerability, please visit our website.

Published: Fri Aug 29 06:18:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Incomplete Implementation of Security Reforms: A Case Study on the UK Government's Response to Data Breach Incidents


The UK government has been dragged for its incomplete security reforms following a major data breach incident in 2021. Senior officials have been summoned to explain why only 12 of the 14 security recommendations made by a secret review were implemented, despite an investigation into 11 major UK data breaches between 2008 and 2023.

Published: Fri Aug 29 07:45:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Loss Prevention for Generative AI: A New Frontier in Network Security


New research from Fidelis Network Detection and Response (NDR) highlights the growing threat of generative AI data breaches. As AI-powered platforms become increasingly prevalent in organizations, traditional DLP solutions often fail to address emerging threats. A new network-based data loss prevention solution is required to tackle these challenges effectively. Learn more about how Fidelis NDR can help you manage GenAI usage and protect your organization's sensitive information.

Published: Fri Aug 29 08:00:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Salt Typhoon Saga: A Global Cyber Espionage Campaign Targeting Edge Network Devices

The world's most advanced cyber espionage group, Salt Typhoon, has been targeting edge network devices across the globe, exploiting vulnerabilities in Cisco, Ivanti, Palo Alto Networks, and other manufacturers to breach over 600 organizations. With its sophisticated tactics and unique advantage in telecommunications systems, Salt Typhoon poses a significant threat to global cybersecurity.

Published: Fri Aug 29 08:13:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

RFK Jr.'s Mitochondrial Madness: A Growing Concern for Children's Health

Robert F. Kennedy Jr.'s latest remarks have sparked widespread concern among scientists and health experts, who argue that his focus on mitochondrial dysfunction is a distraction from more pressing issues affecting American children. As the nation grapples with the ongoing pandemic and rising rates of chronic disease, it is essential that we prioritize evidence-based medicine over ideology and personal agendas.

Published: Fri Aug 29 09:42:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Flaw in Passwordstate: The Growing Concerns Surrounding Authentication Bypass Vulnerabilities

Authentication Bypass Vulnerability Exposed in Passwordstate Enterprise Password Management Platform

Published: Fri Aug 29 09:52:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Apt29's Watering Hole Campaign: Amazon Disrupts Microsoft Device Code Authentication Abusing

Amazon has disrupted a sophisticated watering hole campaign orchestrated by APT29, a Russia-linked hacking group. The campaign utilized compromised websites to trick users into authorizing attacker-controlled devices through Microsoft's device code authentication flow, highlighting the need for organizations to prioritize security against such tactics.

Published: Fri Aug 29 10:01:57 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Taiwan-Espionage Campaign: A Sophisticated Web of Malware and Deception


A complex and sophisticated espionage campaign, dubbed TAOTH by Trend Micro researchers, has been targeting high-value targets primarily in Eastern Asia. The campaign involves a web of malware families, including C6DOOR, GTELAM, DESFY, and TOSHIS, which are being used to gather sensitive information from unsuspecting victims. Learn more about this operation and the tactics used by attackers.

Published: Fri Aug 29 10:11:26 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

FreePBX Zero-Day Exploited: A Growing Concern for Businesses and Individuals Alike



A critical FreePBX zero-day vulnerability has been actively exploited, putting businesses and individuals at risk. The vulnerability affects multiple versions of FreePBX and allows an attacker to perform SQLi and RCE, leading to arbitrary database manipulation and remote code execution. Immediate action is necessary to update FreePBX, restrict public ACP access, and check for IoCs.

Published: Fri Aug 29 10:22:21 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

WhatsApp Exploited: A Zero-Click Vulnerability Threatens Users' Security

WhatsApp has patched a critical zero-day vulnerability (CVE-2025-55177) that was exploited in targeted attacks, highlighting the ongoing struggle between technology companies and malicious actors in the realm of cybersecurity.

Published: Fri Aug 29 12:35:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

AWS Disrupts Russian Cozy Bear's Sophisticated Phishing Campaign Targeting Microsoft Credentials

AWS has disrupted an intelligence-gathering attempt by Russia's APT29 to trick Microsoft users into granting access to their accounts and data, highlighting the ongoing threat posed by sophisticated nation-state actors in the realm of cybersecurity.

Published: Fri Aug 29 12:52:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Imperative of Code-to-Cloud Visibility: A New Paradigm for Modern App Security


In a world where cybersecurity is no longer an option but a requirement, The Hacker News invites you to join their upcoming webinar on "Code-to-Cloud Visibility: The New Foundation for Modern AppSec." Discover how this critical concept can elevate your organization's security posture and stay ahead of emerging threats. Register now to gain invaluable insights from industry experts and take the first step towards securing your future.



Published: Fri Aug 29 12:59:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

US and Dutch Authorities Uncover Major Fake ID Marketplace: VerifTools Shut Down


US and Dutch authorities have shut down VerifTools, a major fake ID marketplace selling documents to bypass KYC checks and access accounts. The operation was the result of an FBI-led investigation, which identified approximately $6.4 million in illicit proceeds linked to the platform. Authorities seized servers and took down the platform's infrastructure, bringing a major blow to cybercrime efforts.

Published: Fri Aug 29 13:07:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadow of Exploits: A Delicate Dance Between Vulnerabilities and Patches



Recent research has revealed three new security vulnerabilities in Sitecore Experience Platform that could potentially be exploited to achieve information disclosure and remote code execution. The vulnerabilities, which include HTML cache poisoning through unsafe reflections, insecure deserialization, and information disclosure in ItemService API with a restricted anonymous user, were disclosed by watchTowr Labs researchers who warned of the potential for attackers to craft an exploit chain using these flaws to gain unauthorized access to sensitive information or execute malicious code on the platform. This latest discovery serves as a reminder of the importance of staying informed about emerging vulnerabilities and prioritizing robust security measures in order to safeguard systems from cyber threats.



Published: Fri Aug 29 14:16:53 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Digital Escort Debacle: How Microsoft's Use of China-Based Engineers Compromised National Security

ProPublica's investigation has exposed a disturbing practice used by Microsoft to maintain sensitive U.S. government computer systems, sparking concerns about national security and cybersecurity.

Published: Fri Aug 29 15:25:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Open-Source Nightmare: Pudu Robotics Exposed as Vulnerable to Hijacking

A Chinese robot manufacturer's commercial service robots were found to be vulnerable to hijacking due to lax security measures. The discovery was made by a white-hat hacker who alerted the company after discovering the issue, but not before being met with resistance from Pudu Robotics' management and support teams.

Published: Fri Aug 29 16:41:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadowy World of Government Data: Uncovering the Mysterious Case of SSA Whistleblower Chuck Borges

SSA Whistleblower Chuck Borges Resigns Amid Allegations of Data Breach and Misconduct, Raises Concerns About Government Agency Accountability and Transparency. The scandal highlights the growing importance of data security within government agencies and the need for increased transparency and accountability. WIRED will continue to follow this story and provide updates as more information becomes available.

Published: Fri Aug 29 20:52:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Zero-Click Exploit Used to Hack WhatsApp Users: A Growing Concern for Cybersecurity


A new zero-click exploit has been discovered that allegedly uses a vulnerability in WhatsApp to hack users. The attack targets both iPhone and Android devices, including civil society members. Experts warn of the need for increased vigilance and robust cybersecurity measures to protect against such threats.

Published: Fri Aug 29 21:02:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Deep Dive into the World of Cybersecurity: WhatsApp's Latest Zero-Click Exploit and the Ongoing Threat of Sophisticated Spyware Campaigns

WhatsApp has announced a zero-click exploit affecting its messaging apps for Apple iOS and macOS devices, which could have allowed an unrelated user to trigger processing of content from an arbitrary URL on a target's device. The vulnerability was discovered by internal researchers on the WhatsApp Security Team and has been linked to an advanced spyware campaign targeting individuals in the past 90 days.

Published: Sat Aug 30 00:12:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Cyber Landscape of Chaos: The Threats Lurking in the Shadows

Google has warned that a recent wave of attacks targeting Salesforce instances via Salesloft Drift may have compromised all integrations beyond Salesforce. The attackers used stolen OAuth tokens to access email from affected Google Workspace accounts and are urging users to review their third-party integrations and revoke compromised credentials.

Published: Sat Aug 30 01:22:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shattered Foundations of Cybersecurity: A World on Brink as Threats Multiply

As threats to cybersecurity multiply, experts warn of a world on brink with robust measures needed to protect sensitive information. From reckless data handling by government agencies to brazen cyberattacks from state-sponsored hackers, the landscape is increasingly complex and treacherous.

Published: Sat Aug 30 07:37:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Lab Dookhtegan Hacking Group: A New Era of Maritime Cyber Warfare

Lab Dookhtegan's recent attack on Iranian ships has exposed vulnerabilities in the global maritime industry and highlights the importance of prioritizing cybersecurity. With sophisticated nation-state sponsored hacking groups on the rise, it's crucial to stay informed and take proactive measures to protect yourself against these complex cyber threats.

Published: Sat Aug 30 07:44:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Threat Actors Leverage Microsoft Teams for Malicious Phishing Campaigns: A Growing Concern


Cybersecurity researchers have sounded the alarm about a growing trend of threat actors leveraging Microsoft Teams for phishing campaigns. This latest development marks a significant escalation in the platform's role as a vector for malware deployment, highlighting the need for organizations to remain vigilant and proactive in addressing this growing concern.

Published: Sat Aug 30 08:53:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

WhatsApp Reveals Urgent Patch for Vulnerability Exploited in Sophisticated Apple User Attacks

WhatsApp has patched a critical vulnerability that was being exploited in sophisticated Apple user attacks, warning users that less than 200 may have been targeted. The platform is urging all users to install the patch immediately and offering support to those who have received notifications. This latest incident highlights the ongoing threat of zero-click attacks and the need for regular security updates and vigilance when it comes to protecting personal data.

Published: Sat Aug 30 11:04:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Global Landscape of Cybersecurity Threats: A Comprehensive Overview

The global landscape of cybersecurity threats is becoming increasingly complex and far-reaching, with numerous high-profile attacks and breaches making headlines around the world. From nation-state actors disrupting critical infrastructure to online scams and identity theft on the rise, it's clear that cyber threats will only continue to grow in sophistication and impact.

Published: Sun Aug 31 02:40:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

American Retail Giant Amazon Foils Russian APT29 Watering Hole Attack via Cutting-Edge Threat Intelligence

American retail giant Amazon has foiled an advanced persistent threat (APT) campaign by Russia-linked group APT29 that aimed to hijack Microsoft device code authentication via compromised websites. The attack highlights the evolving threat landscape and underscores the importance of collaboration in combating sophisticated threats.

Published: Sun Aug 31 03:00:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

WhatsApp Patches Critical Zero-Click Exploit Targeting iOS and macOS Devices

WhatsApp has patched a critical zero-day exploit that could have allowed attackers to compromise iOS and macOS devices by triggering malicious content from arbitrary URLs. The vulnerability, identified as CVE-2025-55177, has been rated with a CVSS score of 8.0 and was discovered by internal researchers on the WhatsApp Security Team.

Published: Sun Aug 31 06:18:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google's Global Security Alert: A Data Breach Raises Questions About Cybersecurity Risks


Google has issued a global security alert to its 2.5 billion Gmail users after a major data breach exposed hundreds of thousands of sensitive documents and personal data. Despite the severity of the breach, Alphabet Inc.'s shares closed on Friday slightly from the day's prior closing price. The incident highlights growing concerns about cybersecurity risks facing major tech firms and the need for stronger data protection standards.

Published: Sun Aug 31 08:33:19 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Norway's £10B UK Frigate Deal: A Complex Web of Delayed Deliveries and Strategic Partnerships


Norway's £10B UK frigate deal could delay Royal Navy ships, according to recent reports. The agreement, which sees at least five Type 26 frigates built for the Norwegian Navy, raises concerns about delays in delivering these vessels to the Royal Navy. As the UK looks to replace its aging Type 23 ships, the addition of new vessels may not be enough to meet its defense needs. Will the UK be able to meet its own defense requirements while also meeting the demands of its European allies? The agreement has sent shockwaves throughout the defense industry, and raises important questions about the future of British naval power.

Published: Mon Sep 1 07:06:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Growing Menace of Distributed Denial of Service (DDoS) Attacks: A Threat to Global Cybersecurity

As DDoS attacks continue to pose a significant threat to global cybersecurity, understanding their nature, impact, and mitigation techniques becomes increasingly important. From their sophistication to their potential consequences, it's clear that these types of attacks require more attention than ever.

Published: Mon Sep 1 07:19:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Tricking Large Language Models: The "LegalPwn" Attack on AI Guardrails


Large language models have become a crucial component of modern artificial intelligence, but researchers at Pangea have discovered a novel attack vector known as "LegalPwn" that allows adversaries to bypass the guardrails of these powerful tools by burying malicious instructions in legal fine print. This breakthrough highlights the vulnerability of LLMs to manipulation and underscores the need for robust security measures to protect these AI tools.

Published: Mon Sep 1 07:27:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

WhatsApp Warns of Sophisticated Attack Exploiting Zero-Click Vulnerability

Meta's WhatsApp has issued a warning about a potential attack exploiting a zero-click vulnerability, while Microsoft enforces multi-factor authentication on Azure systems starting October 1st. Meanwhile, a vulnerability in FreePBX telco software and a ransomware attack on Nissan have highlighted the importance of timely patching and incident response.

Published: Mon Sep 1 07:35:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

China's Parade of Power: Unveiling its High-Tech arsenal to the World

China's military parade on September 3rd will feature over 100 models of weapon systems, including the new YJ (Ying Ji, "Eagle Shot") series anti-ship missiles, which are designed to neutralize large US naval units. The event marks a significant moment for China's military modernization efforts and its emerging role on the global stage.

Published: Mon Sep 1 07:46:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Scattered Spider: A Threat to Browser Security


The cyber threat landscape has witnessed a significant evolution over the years, with attackers continually adapting and improving their tactics to evade detection. In this article, we explore the rise of Scattered Spider, a group of hackers notorious for targeting sensitive data stored on browsers. We discuss the critical importance of implementing effective browser security measures and outline several key strategies that organizations can take to counteract the threats posed by this group.

Published: Mon Sep 1 07:54:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

ScarCruft's Operation HanKook Phantom: A Cyber Warfare Campaign Targeting South Korean Academics

ScarCruft's Operation HanKook Phantom: A Cyber Warfare Campaign Targeting South Korean Academics. A recent phishing campaign by North Korea-linked hacking group ScarCruft has been identified, targeting individuals associated with the National Intelligence Research Association. The operation utilizes spear-phishing tactics, fileless malware execution, and covert exfiltration mechanisms to steal sensitive information and conduct espionage.

Published: Mon Sep 1 08:05:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Crooks Exploit Meta Malvertising for Android: A New Wave of Mobile Threats


Crooks are exploiting Meta's malvertising platform to target Android users with the Brokewell malware, a sophisticated spyware and RAT designed to steal sensitive data from compromised devices. This campaign highlights the evolving threat landscape and the need for constant vigilance in protecting mobile users and their devices.

Published: Mon Sep 1 08:15:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korea's Spear-Phishing Campaign: APT37's Latest Operation - HanKook Phantom


North Korea’s spear-phishing campaign, dubbed Operation HanKook Phantom, marks a significant escalation in the country’s efforts to gather intelligence through cyber means. APT37's targeted attack on academics, ex-officials, and researchers is designed to steal sensitive data, maintain persistence, and conduct espionage. This operation highlights the ongoing threat posed by North Korean state-sponsored actors in the cyber domain and underscores the need for increased vigilance against misuse of cloud services for command-and-control activities.

Published: Mon Sep 1 08:23:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A $1.5 Million Heist: Uncovering the Anatomy of a Business Email Compromise Attack


A recent Business Email Compromise (BEC) attack saw the city of Baltimore fall victim to a scammer who stole over $1.5 million by spoofing a vendor and convincing staff to alter bank account details. This heist highlights the need for organizations to prioritize robust internal controls and implement advanced threat protection measures to prevent similar attacks in the future.

Published: Mon Sep 1 08:30:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Resurgence of IoT Malware: A Growing Threat to Global Cybersecurity


The resurgence of IoT malware has brought global cybersecurity to the forefront of concerns, with Mirai-based botnet campaigns posing a significant threat to individual devices and critical infrastructure. This article delves into the world of IoT malware, its impact on global cybersecurity, and the latest developments in this ever-evolving threat landscape.

Published: Mon Sep 1 08:37:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Zscaler Data Breach Exposes Customer Information Following Salesloft Drift Compromise


In a recent data breach, cybersecurity firm Zscaler exposed customer information following a compromise of its Salesforce instance by threat actors. The breach highlights the importance of robust security measures in the cloud and underscores the need for organizations to prioritize supply-chain security awareness.


Published: Mon Sep 1 12:49:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Amazon-orchestrated Countermeasures: Disrupting Russian APT29's Sophisticated Watering Hole Campaign Targeting Microsoft 365


Amazon has successfully disrupted a sophisticated watering hole campaign attributed to Russian state-sponsored threat group Midnight Blizzard (APT29), targeting Microsoft 365 accounts and data. The operation employed phishing tactics and device code authentication flow vulnerabilities, but Amazon's swift action thwarted the attack.

Published: Mon Sep 1 12:57:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Brokewell Android Malware Lures Victims with Fake TradingView Ads

Malicious actors have been using fake ads on Meta's platforms to distribute the Brokewell Android malware, targeting cryptocurrency assets and stealing sensitive data. Find out more about this campaign and how you can protect yourself from similar threats.

Published: Mon Sep 1 13:05:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malware Migrations: Android Droppers Now Delivering More Than Just Banking Trojans

Android droppers are now delivering a range of threats beyond banking trojans, including SMS stealers and spyware. Researchers warn that users must be vigilant when using their mobile devices.

Published: Mon Sep 1 13:15:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybersecurity Landscape Shifts: Zero-Trust, AI-Powered Threats, and Quantum-Safe Encryption


The global cybersecurity landscape is undergoing significant changes, driven by advancements in technology and the increasing sophistication of cyber threats. Zero-trust models are becoming increasingly important, while AI-powered threats and quantum-safe encryption are already being used in real-world scenarios. To stay ahead, organizations must adopt a proactive approach to cybersecurity, leveraging zero-trust models, OAuth 2.1, mutual TLS protocols, SIEM systems, and AI-powered threat detection.

Published: Mon Sep 1 13:24:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Supply-Chain Attack Hits Zscaler via Salesloft Drift, Exposing Customer Information


A supply-chain attack has exposed customer information and support case details belonging to multiple Salesforce customers, including cybersecurity firm Zscaler, via its integration with marketing SaaS platform Salesloft Drift. The breach highlights the need for robust security measures, vigilance against phishing and social engineering attacks, and proactive steps to prevent potential threats.

Published: Mon Sep 1 13:30:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Salesloft Breach: A Complex Web of Cybercrime and Social Engineering

The breach at AI chatbot maker Salesloft highlights the complex web of cybercrime and social engineering that has been at play in recent times. ShinyHunters, a group known for its use of social engineering to break into cloud platforms and third-party IT providers, has been linked to this breach.

Published: Mon Sep 1 17:41:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers’ $130 Million Bank Heist Foiled by Swift Action: A Closer Look at the Evertec Fintech Firm Breach


Hackers launched a daring $130 million heist attempt against Evertec's Brazilian subsidiary Sinqia. Despite gaining unauthorized access to Pix, the company was able to recover a significant portion of the stolen funds with swift action and cooperation from authorities. This article provides an in-depth look at the breach, its implications for the financial institution, and what measures can be taken to prevent similar incidents in the future.

Published: Tue Sep 2 19:18:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cloudflare Impacted by Salesloft Drift Supply Chain Attack: A Closer Look at the Breach and Its Consequences


Cloudflare has been impacted by a recent supply chain attack through Salesloft Drift, exposing 104 Cloudflare API tokens. The attackers stole text-based data from Salesforce case objects between August 12 and August 17, including customer contact information. This breach highlights the importance of rigorous security testing and due diligence when selecting technology partners. While Cloudflare took steps to mitigate the impact of the breach, it also raises concerns about the potential for future attacks using compromised tokens.

Published: Tue Sep 2 19:29:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jaguar Land Rover Hit by Severe Cyberattack: Production Disrupted Amidst Customer Data Security


Jaguar Land Rover has been hit by a severe cyberattack, severely disrupting its production operations. Despite measures taken to mitigate the impact, customer data appears to be unaffected, but the full extent of the incident remains unclear. With production halted and no timeline for resumption provided, this incident serves as a stark reminder of the ever-present risk posed by sophisticated cyber threats.

Published: Tue Sep 2 19:35:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Trump Family's Crypto Token: A Billion-Dollar Windfall or a Recipe for Disaster?


The Trump Family's Crypto Token Just Made Them $5 Billion Richer
In a shocking turn of events, the Trump family's new digital currency, WLFI, has become their most valuable asset, increasing their net worth by a staggering $5 billion. The token, which was announced earlier this year, began trading on Monday and has since skyrocketed in value. But what does this mean for the future of cryptocurrency and the Trump family's business dealings?



Published: Tue Sep 2 19:49:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Salesloft Drift Breach: A Cybersecurity Crisis of Epic Proportions


The recent breach of the Salesloft Drift platform has exposed sensitive customer information from numerous organizations. The incident highlights the ongoing cybersecurity crisis facing companies worldwide and emphasizes the importance of proactive security measures and collaboration in defending against emerging threats.

Published: Tue Sep 2 20:00:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Security: How Surveillanceware Firms are Evading Oversight and Exploiting Vulnerabilities for Profit


Surveillanceware firms are raking in the cash while evading oversight and exploiting vulnerabilities for profit. The growing demand for this type of software has made it increasingly difficult to regulate, leaving targets more exposed than ever.

Published: Tue Sep 2 20:15:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Zscaler Customer Data Compromised in Salesloft Drift Attacks: A Web of Intrigue

Zscaler Customer Data Compromised in Salesloft Drift Attacks: A Web of Intrigue

Recent attacks on Salesforce databases have exposed sensitive customer data, highlighting the need for robust security measures and continued vigilance against emerging threats. Zscaler has revealed that its customer data was compromised in recent Salesloft Drift attacks, while Google and Workday have also disclosed similar breaches affecting their customers' data.

Published: Tue Sep 2 20:24:36 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Hit by Stolen OAuth Tokens Breach: Exposing Customer Data

Palo Alto Networks has fallen victim to a breach of its customer data after stolen OAuth tokens from Salesloft Drift were exploited by hackers. The incident highlights the importance of robust security measures and the devastating consequences of compromised authentication credentials.

Published: Tue Sep 2 20:31:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Huawei's Slipping Grip: The Unraveling of a Tech Giant's UK Business Amidst Global Resurgence

Huawei's once-thriving UK business has been severely curtailed by US and UK regulations, leading to a decline in revenue and significant job losses. Despite this, the company continues to expand globally, with a focus on emerging technologies such as 5G networks and semiconductor technology.

Published: Tue Sep 2 20:49:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Lazarus Group's Malware Arsenal Expanded: A New Era of Sophistication

The Lazarus Group has expanded its malware arsenal with three new pieces of cross-platform malware: PondRAT, ThemeForestRAT, and RemotePE. This development marks a significant escalation in the group's sophistication and capabilities, highlighting the evolving threat landscape.

Published: Tue Sep 2 21:00:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Malware Backdoor Discovered: MystRodX Utilizes DNS and ICMP Triggers for Stealthy Control


New Malware Backdoor Discovered: MystRodX Utilizes DNS and ICMP Triggers for Stealthy Control
Cybersecurity researchers have recently disclosed a sophisticated new backdoor called MystRodX, which is capable of capturing sensitive data from compromised systems. This malware has been identified as a stealthy backdoor that uses various encryption methods to obscure its source code and payloads, while also offering flexibility in terms of enabling different functions based on a configuration.

Published: Tue Sep 2 21:06:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Imperative of Shadow AI Governance: Why Visibility is Key to Protecting Sensitive Data



Shadow AI has become a growing concern in organizations worldwide. With the rise of AI-powered tools and applications, many companies are struggling to manage its use and protect sensitive data. A new approach to governance is needed, one that prioritizes visibility and control over Shadow AI usage. Learn more about the imperative of Shadow AI governance and how it can help your organization protect sensitive data and meet regulatory requirements.



Published: Tue Sep 2 21:13:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Record-Breaking DDoS Attack: Cloudflare's Unparalleled Defiance

Cloudflare successfully blocked a record-breaking 11.5 Tbps DDoS attack, demonstrating its unwavering dedication to protecting the global digital landscape.

Published: Tue Sep 2 21:20:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Discloses Data Breach Linked to Salesloft Drift Incident, Exposing Salesforce Customer Data

Palo Alto Networks Discloses Data Breach Linked to Salesloft Drift Incident, Exposing Salesforce Customer Data. A recent breach linked to the Salesloft Drift incident has exposed sensitive information about Palo Alto Networks' customers, highlighting the vulnerability of supply-chain attacks.

Published: Tue Sep 2 21:27:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Salesloft Takes Drift Offline Amidst Widespread Supply Chain Attack Scourge


Salesloft has taken Drift offline amid a widespread supply chain attack that compromised hundreds of organizations worldwide. The attack, attributed to threat cluster UNC6395 (aka GRUB1), leveraged stolen OAuth tokens associated with the Drift AI chat agent to breach customers' Salesforce instances.

Published: Tue Sep 2 23:57:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Censys Reveals State-Based Abuse: Academic Researchers Used to Proxy Offensive Government Operations

Censys Reveals State-Based Abuse: Academic Researchers Used to Proxy Offensive Government Operations. A new report reveals state actors are attempting to abuse Censys' internet mapping services by hiding behind academic researchers. The company has implemented measures to combat this issue, but the incident highlights the challenges of policing academic research for cybersecurity threats.

Published: Wed Sep 3 01:07:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Alert: Critical Flaws Exposed by CISA, WhatsApp, and Docker

Cybersecurity Alert: Critical Flaws Exposed by CISA, WhatsApp, and Docker

Published: Wed Sep 3 01:20:52 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cloudflare Foils Record-Breaking 11.5 Tbps DDoS Attack, Exposing Insidious RapperBot Malware


Cloudflare successfully blocked a record-breaking 11.5 Tbps DDoS attack, showcasing the company's vigilance in protecting the web from sophisticated cyber threats. In this article, we delve into the details of the attack and explore the evolving threat landscape, shedding light on the tactics used by attackers and the implications for security teams worldwide.

Published: Wed Sep 3 04:36:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jaguar Land Rover Cyberattack: A Threat to Luxury Vehicle Manufacturing


Jaguar Land Rover has been hit by a cyberattack that disrupted its production and retail operations. The attack occurred over the weekend, causing widespread disruptions across the company's systems. While there is no evidence to suggest that customer data has been compromised, the incident highlights the growing vulnerability of complex organizations such as multinational corporations to cyber threats. In this article, we will explore the details of the Jaguar Land Rover cyberattack and its implications for cybersecurity in the automotive industry.

Published: Wed Sep 3 04:42:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

An Invasion of Integrity: The Coordinated Spear-Phishing Campaign Targeting Diplomats Across the Globe



Iranian hackers have embarked on a coordinated spear-phishing campaign targeting embassies and consulates across Europe and other regions worldwide. This sophisticated operation, linked to Iranian threat actors, has left international diplomatic communities on high alert, as the scope and sophistication of this operation threaten to upend traditional notions of global security.

Published: Wed Sep 3 05:50:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Android Droppers: The Evolution of Mobile Malware and the Rise of Modern Threat Actors

Android droppers have evolved into versatile tools that spread various types of malware, including banking trojans, SMS stealers, and spyware, mainly in Asia. The rise of modern threat actors has led to a shift in the type of malware delivered by droppers, making traditional security measures less effective.

Published: Wed Sep 3 06:06:57 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Leaks: The Silent Killer to Your Organization's Security


Data leaks are a silent killer to an organization's security, with serious consequences for intellectual property, financial interests, and reputational damage. To protect themselves, organizations must implement secure cloud storage practices, ensure endpoint devices are encrypted, use robust encryption for emails and messaging, and monitor employee usage of shadow IT. By building robust defenses, organizations can prevent data leakage and stay ahead of emerging threats.

Published: Wed Sep 3 08:20:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Android Security Alert: Google Patches 120 Flaws, Including Two Zero-Days Under Attack


Google has patched 120 security flaws in its Android operating system as part of its monthly fixes for September 2025, including two issues that have been exploited in targeted attacks. The vulnerabilities affect various components of the Android framework, and the tech giant is urging developers to address all the issues as soon as possible.


Published: Wed Sep 3 08:29:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The U.S. CISA Adds WhatsApp and TP-Link Flaws to Its Known Exploited Vulnerabilities Catalog: A Cautionary Tale of Cybersecurity

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw impacting TP-Link TL-WA855RE Wi-Fi Ranger Extender products to its Known Exploited Vulnerabilities catalog, citing evidence of active exploitation. The vulnerability, CVE-2020-24363 (CVSS score: 8.8), concerns a case of missing authentication that could be abused to obtain elevated access to the susceptible device.

Published: Wed Sep 3 08:38:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Activates Emergency Mode to Address Actively Exploited Android Flaws


Google has released its September 2025 security update for Android devices, which addresses two actively exploited flaws and four other critical-severity vulnerabilities. The update aims to protect Android users from potential crashes, denial of service, and privilege escalation due to a Linux kernel flaw and an elevation of privilege issue in the Android Runtime component.

Published: Wed Sep 3 09:48:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadow World of Geolocation: How Location Intelligence Became a Critical Vulnerability


The rise of geolocation technology has created a new vector for cybercriminals to target individuals and organizations, with devastating consequences. Learn how location intelligence has become a critical vulnerability that organizations must address in order to protect themselves from geolocation-based cyberattacks.

Published: Wed Sep 3 09:54:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Matrix.org Homeserver Goes Down: A Look into the Causes and Consequences of a Decentralized Messaging Service's Failure

The Matrix.org Homeserver Goes Down: A Look into the Causes and Consequences of a Decentralized Messaging Service's Failure

Published: Wed Sep 3 10:04:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Leverage AI-Powered HexStrike-AI Tool to Swiftly Exploit Newly Disclosed Citrix Flaws



In a significant escalation of the ongoing battle between defenders and malicious actors, hackers have begun utilizing an AI-powered tool called HexStrike-AI to exploit newly disclosed Citrix vulnerabilities. This new development underscores the ever-present risk posed by rapidly emerging threats in the cybersecurity realm, necessitating swift action and a comprehensive defense strategy.

Published: Wed Sep 3 13:22:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware's AI-powered Future: The Rise of Autonomous Cybercrime Operations

AI-powered ransomware and extortion chatbots are transforming the landscape of cybercrime, with autonomous operations becoming increasingly common. Defenders must stay informed about emerging threats and vulnerabilities to combat these new risks.

Published: Wed Sep 3 13:39:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The $10 Million Bounty on Russian FSB Hackers: A Global Effort to Counter Cyber Threats

The U.S. Department of State has announced a $10 million bounty for information leading to the capture or conviction of three Russian FSB officers accused of conducting malicious cyber activities against U.S. critical infrastructure on behalf of the Russian government.

Published: Wed Sep 3 15:12:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Insidious Rise of WEEPSTEEL: A Comprehensive Analysis of a Sophisticated Malware

WEEPSTEEL is a malicious reconnaissance tool discovered by Mandiant Threat Defense that leverages a ViewState deserialization vulnerability in Sitecore deployments to gain access into compromised systems. This article provides an in-depth analysis of WEEPSTEEL's capabilities and implications for organizations, as well as insights into the latest trends in modern cyber threats.

Published: Wed Sep 3 15:23:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Crooks Turn HexStrike AI into a Weapon for Fresh Vulnerabilities: A New Era of Cyber Threats

Crooks Turn HexStrike AI into a Weapon for Fresh Vulnerabilities: A New Era of Cyber Threats

Published: Wed Sep 3 15:31:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Android Vulnerabilities: A Double Threat to Mobile Security

Google has released two security patches to address 120 Android vulnerabilities, including a privilege escalation flaw in the Linux Kernel component (CVE-2025-38352) and another vulnerability in the Android Runtime component (CVE-2025-48543). These vulnerabilities have been identified as being actively exploited in targeted attacks, emphasizing the importance of regular software updates and patches for mobile devices.

Published: Wed Sep 3 15:41:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Cybercrime: A Looming Threat to Personal Security


Stealerium, a new variant of malware, has been linked to multiple high-profile hacking campaigns. This malware is designed to infect a target's computer and steal sensitive data, including banking information, usernames, and passwords. Additionally, Stealerium can monitor the victim's browser for NSFW content and take simultaneous screenshots and webcam photos of the user, making it a sophisticated piece of malware that poses a significant threat to personal security.


Published: Wed Sep 3 17:13:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers



Malicious npm packages have been discovered that exploit Ethereum smart contracts to target cryptocurrency developers, using a combination of social engineering and deception. According to ReversingLabs researcher Lucija Valentić, the two packages in question - colortoolsv2 and mimelib2 - were uploaded to npm in July 2025 and make use of smart contracts on the Ethereum blockchain to carry out malicious actions. This latest development highlights the importance of thoroughly assessing each library that is considered for implementation and the need for developers to stay vigilant in their pursuit of knowledge as the threat landscape continues to evolve.

Published: Wed Sep 3 17:22:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Threat actors exploit X's AI assistant to spread malicious links

Threat actors are exploiting X's AI assistant, Grok, to spread malicious links by hiding them in metadata fields. This has resulted in millions of impressions for these ads, making it difficult for users to avoid falling victim to scams and malware.

Published: Wed Sep 3 18:29:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Android Security Patching Conundrum: A Delicate Balance Between Timely Fixes and Widespread Vulnerability Exposure

Android has released its largest patch bundle of the year, consisting of 120 flaw fixes, but two of these patches have already been exploited in the wild by surveillanceware companies. The situation highlights the delicate balance between timely fixes and widespread vulnerability exposure.

Published: Wed Sep 3 18:42:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Congress Tosses Lifeline to Cyber Intel Sharing and Funding, Grants Extension to Threat-Intel Program

US Congress has passed legislation to extend critical cyber security measures, providing support to the country's efforts in securing its infrastructure against cyber threats.

Published: Wed Sep 3 19:56:52 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The United States Unveils a $10 Million Bounty on Russian Hackers Targeting Critical Infrastructure

The US government has announced a $10 million bounty on three Russian nationals accused of being intelligence agents who have been exploiting vulnerabilities in critical infrastructure to steal sensitive information. The individuals are alleged to be part of the notorious "Berserk Bear" unit within the Russian Federal Security Service (FSB) and were responsible for hacking into thousands of networking devices across multiple countries.

Published: Wed Sep 3 21:17:14 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fine Tunes: Europe Takes Aim at Google and SHEIN Over Cookie Policies


France has fined Google €200 million for violating French cookie policies, while Chinese e-tailer SHEIN has been fined €150 million for dropping cookies on customers without securing their permission. The fines were issued by France's data protection authority, CNIL, after a thorough investigation into the companies' practices.

Published: Thu Sep 4 01:31:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Sainsbury's Eyeball: The Unsettling Rise of Live Facial Recognition in Retail Surveillance

Sainsbury's has launched an eight-week trial of live facial recognition technology to curb shoplifting, sparking concerns among privacy campaigners over its implications for individual rights and freedoms. As the UK grapples with rising crime rates and increasing reliance on digital surveillance, this development highlights the need for more nuanced discussions around data protection and responsibility in retail environments.

Published: Thu Sep 4 03:56:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

U.S. Cybersecurity and Infrastructure Security Agency Addresses Critical Flaws in TP-Link Routers

U.S. CISA addresses critical flaws in TP-Link routers, emphasizing the importance of prompt patching and upgrading to mitigate potential risks. The agency has added two flaws to its Known Exploited Vulnerabilities catalog, highlighting the need for organizations to review their infrastructure and take immediate action to address these vulnerabilities.

Published: Thu Sep 4 04:05:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Use of Israeli Spyware by Immigration and Customs Enforcement (ICE) Under Trump Administration


The use of Israeli spyware by Immigration and Customs Enforcement (ICE) has raised concerns among human rights organizations and critics. The agency's decision to sign a $2 million contract with Paragon, an Israeli spyware firm, has sparked fears that it will be used for domestic repression. As the Trump administration ramps up its policy of mass deportations and ICE raids, the use of spyware by ICE is becoming increasingly worrying.

Published: Thu Sep 4 06:18:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercriminals Lure Millions to Malicious Links via Social Media's AI Assistant

Cybercriminals have found a way to bypass X's malvertising protections using its AI assistant Grok. Millions of users are at risk as malicious links spread through the platform, highlighting the need for improved security measures.

Published: Thu Sep 4 06:28:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google and Shein Fined for Cookie Consent Violations: A Growing Concern for Data Protection

Google has been fined $379 million by a French regulator for violating cookie rules and failing to secure user consent. The fine follows other recent decisions by regulatory bodies around the world, highlighting the growing importance of data protection and consent in the digital age.

Published: Thu Sep 4 06:37:43 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Flags Multiple High-Severity Vulnerabilities in TP-Link Routers, Amid Rising Threat Landscape

CISA flags multiple high-severity vulnerabilities in TP-Link routers, including CVE-2023-50224 and CVE-2025-9377, with the latter boasting an alarming CVSS score of 8.6. These updates underscore the imperative need for proactive vulnerability management and timely patching to secure networks.

Published: Thu Sep 4 06:42:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hikvision HikCentral Flaw Exposed: A Security Nightmare for Organizations

Severe vulnerabilities have been discovered in the popular security software Hikvision HikCentral, which poses a significant threat to organizations relying on it for their security infrastructure. The flaws allow an attacker to gain admin rights, risking full control over configurations, logs, and critical monitoring functions.

Published: Thu Sep 4 06:52:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Data Breach: A Supply-Chain Attack Linked to Salesloft Drift Incident


A recent data breach by Palo Alto Networks has highlighted the ongoing threat of supply-chain attacks in the cybersecurity space. Following a breach at Salesloft's Drift application, attackers accessed the firm's Salesforce account using stolen OAuth tokens, resulting in the exposure of customer contact information and internal sales accounts. The incident serves as a reminder of the importance of prioritizing cybersecurity and implementing robust security protocols to mitigate such risks.

Published: Thu Sep 4 06:59:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Windows 10 Support Dilemma: A Billions-Dollar Problem for Enterprises


Microsoft's decision to end free support for many editions of Windows 10 has left enterprises with a significant financial burden, with estimates suggesting that sticking with the operating system could cost upwards of $7.3 billion in the first twelve months alone. The transition to Windows 11 is complex and fraught with challenges, but for those who choose to stick with an outdated operating system, the consequences are likely to be severe.

Published: Thu Sep 4 08:57:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Tire Giant Bridgestone Confirm Cyberattack Impacts Manufacturing Operations



Bridgestone, the largest tire manufacturer in the world by production volume, has confirmed that a cyberattack has impacted its manufacturing operations in North America. The company is investigating a limited cyber incident affecting some of its production facilities and working to mitigate the fallout in the supply chain. As the investigation continues, industry experts are urging manufacturers to review their cybersecurity protocols and invest in advanced security measures to protect themselves against disruptions.

Published: Thu Sep 4 10:06:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's Security Update Brings Unexpected Pain for Administrators

Microsoft's latest security update has brought unexpected pain for administrators working on Windows 10 and earlier editions, highlighting the ongoing balance between security features and user convenience.

Published: Thu Sep 4 11:22:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New TP-Link Zero-Day Flaw Exposed: CISA Warns of Exploited Flaws and Urges Users to Patch



A zero-day flaw in TP-Link's CWMP implementation has been exposed, allowing threat actors to achieve remote code execution via buffer overflow. Experts urge users to patch their devices immediately and warn of the ongoing exploitation of other vulnerabilities by the Quad7 botnet.

Published: Thu Sep 4 11:31:52 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolving Threat Landscape: How Phishing Attacks are Taking Over the Browser

Phishing attacks are taking over the browser, with attackers using a range of sophisticated techniques to compromise business apps and data. In this article, we'll explore the six key browser-based attack techniques that security teams need to know about in 2025.

Published: Thu Sep 4 11:39:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach Disclosure: Chess.com Addresses Unauthorized Access to Third-Party File Transfer Application


Chess.com has disclosed a recent data breach affecting its user base due to unauthorized access to a third-party file transfer application. The platform has taken steps to secure its systems, offered free identity theft and credit monitoring services to impacted users, and emphasized that the incident only affected the unnamed third-party app.

Published: Thu Sep 4 13:10:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Exploit Sitecore Zero-Day Flaw to Deploy Highly Persistent Backdoors


Hackers have exploited a zero-day vulnerability in Sitecore to deploy highly persistent backdoors that can remain undetected for extended periods. The vulnerability, identified as CVE-2025-53690, allows attackers to craft malicious payloads that tricked the server into deserializing and executing them, leading to RCE. To protect against this threat, administrators are advised to replace static machine keys with new, unique values and ensure encryption of sensitive data.

Published: Thu Sep 4 14:19:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyberpunk: Edgerunners' Lucy Brings High-Octane Action to Guilty Gear Strive

Cyberpunk: Edgerunners' standout character Lucy brings her unique set of skills to Guilty Gear Strive, marking a new and exciting chapter in the ongoing collaboration between CD Projekt Red and Arc System Works. With her inclusion comes hopes for future crossovers and collaborations that will push both franchises to new heights.

Published: Thu Sep 4 14:37:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russian APT28 Deploys NotDoor Outlook Backdoor to Exfiltrate Data from NATO Companies


Russian APT28 has been linked to a new Microsoft Outlook backdoor called NotDoor, which is being used to exfiltrate sensitive data from companies in NATO member countries. The malware is designed as an obfuscated VBA project for Outlook that makes use of the Application.MAPILogonComplete and Application.NewMailEx events to run the payload every time Outlook is started or a new email arrives.

NotDoor supports four different commands - cmd, to execute commands and return the standard output as an email attachment; cmdno, to execute commands; dwn, to exfiltrate files from the victim's computer by sending them as email attachments; and upl, to drop files to the victim's computer. The malware is deployed via Microsoft's OneDrive executable using a technique referred to as DLL side-loading.

The attacks are notable for the abuse of Microsoft Dev Tunnels (devtunnels.ms) and bogus Cloudflare Workers domains to distribute a Visual Basic Script like PteroLNK, which can propagate the infection to other machines by copying itself to connected USB drives, as well as download additional payloads. The attack chain demonstrates a high level of specialized design, employing four layers of obfuscation (registry persistence, dynamic compilation, path masquerading, cloud service abuse) to carry out a fully covert operation from initial implantation to data exfiltration.

The Blue Report 2025: See What 160 Million Attacks Reveal About Security Effectiveness

Published: Thu Sep 4 14:50:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

GhostRedirector: A Sophisticated China-Linked Malware Exploiting SQL Injection Flaws to Launch SEO Fraud Schemes


GhostRedirector: A Sophisticated China-Linked Malware Exploiting SQL Injection Flaws to Launch SEO Fraud Schemes

A recent discovery by cybersecurity researchers has uncovered a sophisticated malware, GhostRedirector, which is believed to be linked to China-based threat actors. The malware compromises at least 65 Windows servers, exploiting an SQL injection vulnerability to gain initial access, and provides SEO fraud as-a-service by manipulating search engine results. With its sophisticated tools and operational resilience, GhostRedirector poses a significant threat to organizations, highlighting the ongoing efforts of China-linked threat actors in exploiting vulnerabilities for malicious purposes.

Published: Thu Sep 4 14:58:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

$10M Reward for Targeting Russian FSB Officers Accused of Hacking US Critical Infrastructure


The United States Department of State has announced a reward of up to $10 million for information leading to the identification and prosecution of three Russian FSB officers accused of hacking into critical infrastructure in the US. These officers are linked to multiple attacks targeting the energy sector and have been linked to exploiting vulnerabilities in Cisco IOS software using a seven-year-old vulnerability known as CVE-2018-0171.

Published: Thu Sep 4 15:06:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Shadow Over the Web: The GhostRedirector Cybercrime Crew's Scheming for SEO Fraud

A new China-aligned cybercrime crew, known as GhostRedirector, has been identified, compromising at least 65 Windows servers worldwide using custom malware to manipulate Google search results for SEO fraud. The crew's tactics are sophisticated, involving the use of previously undocumented malware and exploiting public exploits.

Published: Thu Sep 4 16:17:27 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Curious Case of DHS' No-Bid Contract: A Web of Deception and Politics


The Department of Homeland Security has awarded a $30,000 no-bid contract for sniper and combat training to Target Down Group, run by Dan LaLota, the brother of US Representative Nick LaLota. This award highlights the complexities and contradictions within the federal contracting system, where politics and cronyism often seem to trump transparency and accountability.

Published: Thu Sep 4 16:31:21 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Automatic Android Bug Hunting System: A Breakthrough in Vulnerability Discovery


A breakthrough in Android app vulnerability discovery has been achieved by researchers affiliated with Nanjing University and The University of Sydney. Their innovative AI-powered system, A2, can detect over 78% of vulnerabilities on a notoriously challenging testbed and identified 104 true-positive zero-day flaws in production apps.

Published: Thu Sep 4 17:52:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Sitecore Vulnerability Exposed: A Wake-Up Call for DevOps Teams


A critical Sitecore vulnerability has been exposed, highlighting the importance of prioritizing software security patching and securing key files. Experts warn that organizations must take immediate action to address this vulnerability and prevent unauthorized access to sensitive information.

Published: Thu Sep 4 22:04:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

AI Code Assistants: A Double-Edged Sword in Security

A new study has found that AI code assistants are contributing to a significant increase in security issues in software production. While these tools offer improved efficiency and speed, their impact on security should not be underestimated. As developers increasingly rely on AI-assisted development, it is crucial that they prioritize transparency, monitoring, and risk assessment to avoid amplifying existing security vulnerabilities.

Published: Fri Sep 5 02:20:26 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Automating Pentest Delivery for Faster Security and Remediation

Automation is revolutionizing the way pentests are delivered, transforming from static reports to real-time insights that support faster security and remediation. With platforms like PlexTrac at the forefront, organizations can unlock the full potential of their offensive security efforts and stay ahead of emerging threats in today's complex threat landscape.

Published: Fri Sep 5 03:35:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Base64-Encoded Phishing: A Growing Threat Landscape

Base64-encoded phishing via SVG files has emerged as a significant threat in recent times, with 44 undetected SVG files discovered by VirusTotal. These files were used to deploy malicious Base64-encoded HTML phishing pages that masqueraded as official government documents from Colombia. The report highlights the evolving nature of cyber threats and underscores the importance of defense-in-depth strategies to mitigate these types of attacks.

Published: Fri Sep 5 03:47:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Devastating Knock-on Effects of a Cyberattack on Software Developer Intradev: A Wake-Up Call for UK Education Institutions

A UK education trust has warned its staff that their personal information may have been compromised following a cyberattack on software developer Intradev. The breach highlights the ongoing cybersecurity challenges facing the sector and underscores the need for increased awareness and cooperation among institutions, developers, and service providers.

Published: Fri Sep 5 05:03:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Impersonating Authorities: How SVG Files Were Used to Spread Malware and Phishing Campaigns


SVG files have been used in a hidden malware campaign impersonating Colombian authorities, evading detection from traditional antivirus software and spreading malware and phishing attacks to unsuspecting victims. As more attackers begin to use SVG files in their malicious activities, it is essential that security tools are able to analyze and understand these formats.

Published: Fri Sep 5 06:11:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The SAP S/4HANA Critical Vulnerability: A Threat to Enterprise Security


A critical security vulnerability has been discovered in SAP S/4HANA, allowing attackers to compromise the system with minimal effort. With CVSS score 9.9, this vulnerability poses a significant threat to enterprise security. Organizations must take immediate action to patch their systems and implement measures to prevent potential damage.

Published: Fri Sep 5 07:19:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Recent Uptick in Vulnerability Exploitation: A Closer Look at the Latest Exploited Flaws


The latest vulnerabilities added to CISA's KEV catalog highlight the need for vigilance in protecting against exploited flaws. A closer look at the new additions reveals the importance of addressing identified vulnerabilities and adhering to laws and regulations regarding data protection. As threat actors continue to exploit vulnerabilities, it is essential for organizations and individuals to stay informed about the latest developments in cybersecurity.

Published: Fri Sep 5 07:26:00 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Debunking the Myth: Why Legacy IGA Solutions Are a Roadblock to Security, Compliance, and Growth

Legacy IGA solutions are becoming increasingly outdated, hindering businesses from achieving their security, compliance, and growth objectives. A no-code IGA solution like tenfold is revolutionizing the way businesses approach Identity Governance & Administration, offering faster results, lower costs, and a more streamlined approach to governance.

Published: Fri Sep 5 09:39:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical SAP S/4HANA Vulnerability Now Exploited in Attacks: A Growing Concern for Enterprise Security


A critical SAP S/4HANA code injection vulnerability (CVE-2025-42957) is now being actively exploited in attacks, putting the security of enterprise systems at risk. The vendor has fixed the vulnerability, but many systems have not applied the necessary updates. This article provides an in-depth look at the vulnerability and its potential ramifications for organizations using SAP S/4HANA.

Published: Fri Sep 5 09:48:52 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach At Wealthsimple: A Canadain Financial Services Firm Discloses Security Incident


Wealthsimple, a leading Canadian financial services firm, has disclosed a data breach after attackers stole personal data from an undisclosed number of customers. The company attributes the breach to a supply-chain attack involving the Salesforce platform and is providing affected customers with complimentary credit monitoring and other security measures.

Published: Fri Sep 5 11:04:26 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Growing Menace of CastleRAT: A Comprehensive Analysis of TAG-150's Latest Malware Development


The threat actor behind CastleLoader has developed a new remote access trojan called CastleRAT, which can download next-stage payloads, enable remote shell capabilities, and even delete itself. This development highlights the growing importance of network visibility and monitoring in the fight against MaaS frameworks.


Published: Fri Sep 5 11:15:32 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

This AI Box Lets You Search Your Security Camera Footage Using a Text Prompt

The latest advancements in artificial intelligence and automation technology have reached new heights, as witnessed at IFA 2025 in Berlin. This AI box lets users search their security camera footage using a text prompt, revolutionizing the way we interact with our smart home devices.

Published: Fri Sep 5 12:32:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Vulnerability in Sitecore Exposed to Active Exploitation: A Threat to Enterprise Security


A critical vulnerability in Sitecore has been exposed to active exploitation, putting enterprises at risk of remote code execution and data theft. Organizations are advised to rotate ASP.NET machine keys, lock down configurations, and scan their environments for signs of compromise.

Published: Fri Sep 5 12:43:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical SAP S/4HANA Vulnerability Under Active Exploitation: What You Need to Know

A critical code-injection bug in SAP S/4HANA has been actively exploited by attackers, allowing low-privileged users to gain full control over the system. Users are strongly advised to apply SAP's August security updates immediately to prevent exploitation.

Published: Fri Sep 5 14:03:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Voice Actors Behind Tanjiro and Giyu Reflect on Their Roles in the Upcoming Film Trilogy Arc of Demon Slayer: Infinity Castle


Demon Slayer: Infinity Castle, the final film trilogy arc of Demon Slayer, is set to hit theaters on September 12, marking a monumental moment for the beloved anime series. The voice actors behind two of its most emotionally layered characters, Tanjiro and Giyu, have been reflecting on their roles in this significant project. From Aguilar's dedication to leaving nothing on the table as Tanjiro to Bosch's excitement about Demon Slayer's global reach, these actors are committed to bringing this iconic story to life.

Published: Fri Sep 5 15:14:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CastleRAT Malware: A Sophisticated Threat to Cybersecurity

CastleRAT malware, developed in both Python and C programming languages, has been spreading through ClickFix attacks, tricking victims into installing the malware. The gang's operations as a malware-as-a-service operation make it essential for users to be vigilant and take proactive measures to protect themselves against this threat.

Published: Fri Sep 5 15:25:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical SAP S/4HANA Flaw CVE-2025-42957 Exposes Enterprise Systems to Catastrophic Compromise

Critical SAP S/4HANA flaw CVE-2025-42957 exposes enterprise systems to catastrophic compromise, allowing attackers to inject arbitrary code into the system, bypass authorization checks, and fully compromise the entire environment. Learn how this vulnerability can impact your organization's security posture.

Published: Fri Sep 5 16:35:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Department of War: A Symbolic Rebranding Under Trump's Executive Order

President Trump signs an executive order reviving the "Department of War" name for the US military branch, marking a significant shift in the administration's approach to national security and defense. The move is seen by many as an attempt to project strength and power, but critics argue it sends the wrong message.

Published: Fri Sep 5 17:48:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

AI Avatar Interview Exposes Flaws in Recruitment Technology, Leaving Job Seekers and Employers Aghast

AI Interview: The Uncanny Valley of Recruitment

Published: Sat Sep 6 04:10:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Emergence of MeetC2: A Serverless C2 Framework Leveraging Google Calendar APIs for Covert Communication

MeetC2, a serverless command and control (C2) framework leveraging Google Calendar APIs for covert communication, has been unveiled by cybersecurity researchers. This innovative tool allows attackers to hide malicious traffic within legitimate cloud services, making it challenging for security teams to detect and respond to these threats.

Published: Sat Sep 6 05:21:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unraveling of Security Paradigms: A Glimpse into the Dark Web's Latest Intrigues


A recent study has revealed that hackers can crack high-security safes using two techniques, leaving many questions unanswered about who was responsible for this feat. Additionally, the data stolen from various companies has shed light on the growing threat of corporate espionage. Meanwhile, ICE's newfound access to spyware has raised concerns about the potential misuse of such technology. This article delves into the implications of these incidents and highlights the need for continued vigilance and innovation in the field of cybersecurity.

Published: Sat Sep 6 06:42:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Banking on Cybersecurity: The Growing Threat of Financial Sector Hacking



Banking on Cybersecurity: The Growing Threat of Financial Sector Hacking

The financial sector has been plagued by a growing number of cyberattacks in recent years, resulting in significant losses and damage to the industry's reputation. Despite investments in cybersecurity, institutions continue to experience breaches, highlighting the ongoing challenge of protecting against this type of threat. As investors scrutinize fintech and banking stocks for their level of cyber resiliency, it is clear that cybersecurity has become a board-level strategic imperative.

Summary:

The financial sector is facing a growing number of cyber threats, with institutions such as HSBC and Santander experiencing breaches despite investments in cybersecurity. The data breach at Santander in 2025 highlights the importance of protecting against these types of threats, which are becoming increasingly sophisticated and scale. As investors look for signs of cyber resiliency in fintech and banking stocks, it is clear that cybersecurity has become a top priority for regulators and investors alike.



Published: Sat Sep 6 07:55:43 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Airline Qantas Slashes Executive Bonuses Amidst Ongoing Cybersecurity Concerns


Global Airline Qantas Slashes Executive Bonuses Amidst Ongoing Cybersecurity Concerns
In a bold move to address ongoing cybersecurity concerns, Qantas has reduced executive bonuses by 15% following a major data breach that exposed the personal data of millions of customers. This decision highlights the airline's commitment to prioritizing customer privacy and security above all else.

Published: Sat Sep 6 10:05:42 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Noisy Bear: A New Threat Actor Targets Kazakhstan's Energy Sector

Noisy Bear: A New Threat Actor Targets Kazakhstan's Energy Sector

In a recent development, the threat landscape has been hit with the emergence of Noisy Bear, a new Russian-speaking threat actor linked to attacks targeting Kazakhstan's energy sector. According to Seqrite Labs, Noisy Bear has been active since at least April 2025 and its tactics are reminiscent of other high-profile threat actors like Ghostwriter and HarfangLab.

Published: Sat Sep 6 11:17:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

VirusTotal Unmasks Hidden Malware Phishing Campaign Hiding in SVG Files


A recent discovery by VirusTotal has exposed a hidden malware phishing campaign that was embedded in Scalable Vector Graphics (SVG) files. The campaign used AI-powered tools to convincingly impersonate official government documents, targeting users with convincing portals. Stay vigilant and exercise caution when interacting with unfamiliar links or attachments.

Published: Sat Sep 6 14:28:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

AI-Powered Malware Looms Large Over GitHub, Exposing Thousands of Accounts and Repositories

AI-powered malware exposed thousands of GitHub accounts and repositories, leaving a trail of vulnerability and exploitation in its wake. As cybersecurity threats continue to evolve, it's clear that incidents like this will remain a pressing concern for developers, users, and system administrators.

Published: Sat Sep 6 14:36:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Czech Cyber Agency Issues Warning: Beware of Chinese Tech in Critical Infrastructure

Key Takeaway: The Czech Republic's National Cyber and Information Security Agency has issued a warning advising critical infrastructure organizations to avoid using Chinese technology or transferring user data to servers in China due to the significant cybersecurity threat posed by Chinese tech giants.

Published: Sun Sep 7 13:11:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Comprehensive Overview of Cybersecurity Threats: An Analysis of Recent Malware Campaigns and Vulnerabilities



The world of cybersecurity threats has become increasingly complex, with new and emerging threats such as Operation HanKook Phantom, malvertising campaigns on Meta platforms, Android droppers, MystRodX backdoors, and critical vulnerabilities like CVE-2025-42957 posing significant risks to our digital safety. It is essential for individuals, businesses, and governments to stay informed about the latest cybersecurity threats and implement effective countermeasures to prevent their propagation.



Published: Sun Sep 7 14:22:09 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybersecurity Landscape Continues to Evolve: A Roundup of Recent Threats and Vulnerabilities


A recent series of high-profile cybersecurity incidents highlights the importance of vigilance in protecting against emerging threats. From data breaches to vulnerabilities in popular software applications, these events underscore the need for proactive measures to protect against cyber attacks. In this article, we will provide an overview of some of the most significant security incidents and vulnerabilities reported in recent times, highlighting key takeaways and recommendations for mitigating their impact.



Published: Sun Sep 7 14:50:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Czech Cyber Agency Sounds Alarm on Chinese Espionage Risks to Critical Infrastructure


Czech cybersecurity agency NUKIB has sounded the alarm on growing risks of Chinese espionage threats to critical infrastructure, citing the cyberespionage group APT31 and risky devices. The warning comes as many devices and cloud services transmit data to or are managed from China, posing significant risks to critical infrastructure.

Published: Sun Sep 7 22:05:53 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Efficiency Illusion: How a Social Security Reform Effort Went Awry


In a shocking turn of events, a Social Security reform effort aimed at improving efficiency has gone awry, leaving thousands of Americans without access to their rightful benefits. A former SSA official speaks out about the dangers of misguided reform efforts and the consequences of prioritizing efficiency over effectiveness.

Published: Mon Sep 8 05:34:09 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

You Didn't Get Phished — You Onboarded the Attacker: The Rise of Hiring Fraud and Its Dangers


Hiring fraud has become a significant threat to organizations, with malicious actors posing as potential employees or contractors to gain access to sensitive information. The use of AI-powered tools makes it increasingly difficult for organizations to detect these threats, highlighting the need for robust security measures and Zero Standing Privileges (ZSP). In this article, we explore the dangers of hiring fraud and its implications for organizations, as well as practical steps they can take to prevent insider threats.

Published: Mon Sep 8 05:42:27 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Venezuela's President Maduro Insists Huawei Mate X6 Smartphone is "Unhackable" to US Cyber Spies


Venezuela’s President Nicolás Maduro recently made headlines when he showcased a Huawei Mate X6 smartphone, which he claimed could not be hacked by US cyber spies. But experts have raised concerns about the device's security features and the company's history of being targeted by intelligence agencies. This article delves into the complexities surrounding the Huawei Mate X6 smartphone and its unhackability claims.

Published: Mon Sep 8 05:50:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Salesloft's GitHub Breach: A Trail of Cyber Deceit Leads to Salesforce Data Theft Attacks


Salesloft's GitHub Breach: A Trail of Cyber Deceit Leads to Salesforce Data Theft Attacks

A recent cyberattack on Salesloft has led to the theft of sensitive Salesforce data from numerous unsuspecting customers. The breach, which began with the exploitation of its GitHub account, highlights the ever-present threat of cyberattacks and the need for robust cybersecurity measures in place. This exposé delves into the details surrounding this crisis and sheds light on the critical role that companies like Salesloft play in protecting sensitive data from malicious actors.

Published: Mon Sep 8 11:18:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Action1: The Modern Patch Management Alternative to WSUS

As Microsoft officially deploys Windows Server Update Services (WSUS) for good, many IT teams are turning to Action1 as a cloud-native patch management alternative. Learn more about the benefits of using Action1 in your organization and discover how it can simplify your patch management processes.

Published: Mon Sep 8 11:31:21 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

PACER's Multifactor Authentication Conundrum: A Cautionary Tale of Technical Complexity and Human Error


PACER's multifactor authentication program has been marred by technical difficulties, causing support delays and frustrating experiences for users. The US government-run system is struggling to implement MFA in a way that balances security with user convenience, highlighting the need for careful planning and ongoing evaluation of IT systems.

Published: Mon Sep 8 11:54:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Sounds Alarm Over TP-Link Wireless Routers Under Attack: A Growing Concern for Cybersecurity


CISA Sounds Alarm Over TP-Link Wireless Routers Under Attack: A Growing Concern for Cybersecurity

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about two vulnerabilities in TP-Link wireless routers that have been exploited in the wild. The alert comes as concerns over cybersecurity continue to grow, with TP-Link's close ties to the Chinese government raising questions about its impact on American users. With organizations urged to prioritize timely remediation of vulnerabilities and take proactive steps to address potential security issues, it is clear that this issue will be a pressing concern for some time to come.

Published: Mon Sep 8 12:15:00 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Sophisticated Malware Campaign Utilizing Google Ads and Fake GitHub Commits to Target IT Firms


A sophisticated malware campaign has been discovered that uses paid ads on search engines like Google to deliver malware to unsuspecting users looking for popular tools like GitHub Desktop. The attackers, believed to have native Russian language proficiency, use an innovative tactic of embedding fake GitHub commits in page URLs to funnel victims to malicious downloads.

Published: Mon Sep 8 12:46:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Landscape Evolves: Shadow AI Agents, WDAC Exploitation, and AI-Powered Social Engineering



The cybersecurity landscape has undergone significant transformations in recent times, with emerging threats and technologies forcing security teams to adapt and innovate. This article delves into the world of Shadow AI Agents, WDAC exploitation, and AI-powered social engineering attacks, highlighting the need for organizations to prioritize effective security measures to protect against these evolving threats.

Published: Mon Sep 8 12:57:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Noisy Bear Campaign: A New Threat Actor Targets Kazakhstan's Energy Sector

Noisy Bear Campaign: A New Threat Actor Targets Kazakhstan's Energy Sector

A new threat actor has been linked to a series of attacks targeting the energy sector in Kazakhstan, highlighting the growing threat landscape in the region. The Noisy Bear campaign is believed to be conducted by a group possibly of Russian origin and delivers fake documents and malware to compromise systems. As organizations and individuals seek to protect themselves against such threats, it's essential to stay informed about the latest developments and best practices for mitigating cyber threats.

Published: Mon Sep 8 13:18:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Canadian Investment Platform Wealthsimple Discloses Data Breach: A Supply Chain Attack Exposes Personal Data


Canadian investment platform Wealthsimple disclosed a data breach that exposed personal data belonging to less than 1% of its clients. The breach occurred due to a supply chain attack via a third-party software package, but no funds were accessed or stolen. Weigh the importance of cybersecurity and the need for companies to prioritize it in light of this incident.

Published: Mon Sep 8 13:24:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

NPM Packages Poisoned: A Supply Chain Attack on Trust and Security

NPM packages have been compromised in a supply chain attack, leaving thousands of refrigerators at risk due to a bug in Copeland controllers. Meanwhile, another group of attackers has poisoned dozens of npm packages with malware that targets cryptocurrency transactions on various blockchains.

Published: Mon Sep 8 14:40:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Lovesac Data Breach: A Ransomware Attack Exposes Personal Information


Lovesac, a leading furniture brand, recently suffered a data breach due to a ransomware attack, exposing personal data for an undisclosed number of individuals. The incident highlights the dangers posed by cyber threats and underscores the importance of robust cybersecurity measures to protect sensitive information.

Published: Mon Sep 8 14:52:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Supply Chain Breach: 2 Billion Downloads Hijacked by Malicious NPM Packages

Hackers have successfully compromised millions of npm package downloads through a sophisticated phishing attack. The malicious code, injected into several high-traffic packages, can hijack network traffic and application APIs, effectively stealing funds from legitimate users.

Published: Mon Sep 8 14:59:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Salesloft Drift Breach: A Complex Web of Cybercrime and Vulnerabilities



The Salesloft Drift breach has compromised hundreds of companies, including Google, Palo Alto Networks, and Cloudflare. The incident highlights the importance of robust security measures and the need for companies to prioritize their cybersecurity postures.

Published: Mon Sep 8 15:07:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Uncovering of Salt Typhoon: A Global Cyber Espionage Operation


Silent Push has uncovered dozens of domains used by Chinese espionage crew Salt Typhoon to gain stealthy, long-term access to victim organizations going back as far as 2020. The revelation sheds new light on the activities of Salt Typhoon, a group known for its sophisticated cyber espionage tactics and connections to the People's Republic of China.

Published: Mon Sep 8 15:18:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers' Exploitation of Salesloft's GitHub: A Detailed Examination of a Complex Cyberattack


Hackers breached Salesloft’s GitHub in March 2025, using stolen tokens to launch a mass attack against several major tech customers. The breach has had significant implications for affected companies, including Salesforce, and highlights the need for improved cybersecurity measures.

Published: Mon Sep 8 15:28:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Meta Whistleblower Alleges Security Failures and Cult-like Culture Amid $5 Billion FTC Settlement

Meta's $5 billion settlement with the FTC was meant to ensure greater accountability in its handling of user data. However, a former WhatsApp head alleges that the company prioritized growth over security and created a toxic culture that discouraged criticism. The whistleblower lawsuit raises serious questions about Meta's commitment to protecting user privacy and security.

Published: Mon Sep 8 16:46:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers' Supply Chain Attack Exposes 3,325 Secrets on GitHub

GhostAction, a sophisticated supply chain attack on GitHub, has exposed 3,325 secrets across multiple platforms, including PyPI, npm, DockerHub, GitHub, Cloudflare, and AWS. The attackers targeted several high-profile projects and compromised credentials of various companies.

Published: Mon Sep 8 19:06:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Akido Unveils New Malware Detection Technology to Protect Code Libraries from Phishing Attacks


A recent phishing attack targeting popular JavaScript code packages has highlighted the growing threat of supply-chain attacks on development teams. Akido's new malware detection technology offers a vital solution to protect code libraries from these types of attacks, and experts warn that a similar incident could have devastating consequences if not addressed promptly.

Published: Mon Sep 8 19:25:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadow of Inadequate Cybersecurity: A Looming Threat to US National Security

The US federal government's inadequate approach to its information security workforce poses a significant threat to national security, with data on the cyber workforce being "messy, incomplete, and unreliable." The lack of transparency and clarity into its own cybersecurity workforce is a recipe for disaster, particularly given the sensitive nature of the work being done by these professionals. Will the US government take immediate action to address this critical issue?

Published: Mon Sep 8 19:44:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Devastating Data Breach: Salesloft's Drift Environment Compromised by Rogue GitHub Account


A devastating data breach has exposed the sensitive information of hundreds of companies worldwide, including Google, Zscaler, Cloudflare, and Palo Alto Networks. The breach was attributed to a miscreant gaining access to the Salesloft GitHub account in March and resulted in the compromise of Drift's AWS environment. To mitigate the damage, affected organizations are advised to take immediate action to protect their sensitive information.

Published: Mon Sep 8 19:52:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Plex Users Urged to Reset Passwords Amidst Data Breach Concerns


Plex has informed its users about a data breach that compromised customer authentication data, including email addresses, usernames, securely hashed passwords, and authentication data. The company is advising users to reset their passwords out of an abundance of caution and has emphasized the importance of enabling two-factor authentication for added protection.

Published: Mon Sep 8 21:00:36 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Layer of Deception: 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage


45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage: A New Layer of Deception

A recent discovery by threat hunters at Silent Push has uncovered a set of previously unreported domains associated with China-linked threat actors known as Salt Typhoon and UNC4841. The domains, totaling 45 in number, span multiple years and highlight the persistent nature of Salt Typhoon's operations. This revelation underscores the importance of continuous monitoring, vigilance, and international cooperation in detecting and countering cyber espionage threats.



Published: Mon Sep 8 21:08:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Firewall Expands: Chinese Company Geedge Networks Exports Surveillance Systems to Asia and Africa


A new leak reveals that Chinese company Geedge Networks is exporting its advanced surveillance systems to Asia and Africa, posing significant concerns about digital authoritarianism on a global scale. The leaked documents show that the company's products are essentially a commercialized version of China's notorious censorship infrastructure, known as the Great Firewall.

Published: Mon Sep 8 22:38:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

UK's Online Safety Act Takes a Draconian Turn: A Ban on Self-Harm Content Raises Concerns Over Censorship and Freedom


The UK government has announced a significant amendment to its Online Safety Act, which will impose a ban on self-harm content on social media platforms. Critics argue that the law is too broad and may infringe upon the right to free speech and digital freedom.

Published: Tue Sep 9 01:57:09 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

LunaLock Ransomware: A New Threat to Artistic Intellectual Property


In a shocking development, LunaLock ransomware gang has introduced a new method of extortion by feeding stolen data into AI models. The group targeted the website Artists&Clients, stealing digital art worth an undisclosed amount and demanding $50K from the victims. This new type of extortion aims to compromise victims' intellectual property, raising significant concerns about artistic security in the age of AI.

Published: Tue Sep 9 02:05:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Devastating Supply Chain Attack: 20 Popular npm Packages Compromised in Cybersecurity Breach

Twenty popular npm packages have been compromised in a devastating supply chain attack, with attackers exploiting a phishing campaign to publish malicious code to the npm registry. The affected packages collectively attract over 2 billion weekly downloads and were targeted by attackers who utilized a sophisticated payload designed to intercept cryptocurrency transaction requests.

Published: Tue Sep 9 03:26:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unintended Consequences of Polar Geoengineering: A Review of Five Controversial Climate Solutions



A recent study has found that five geoengineering concepts proposed for Earth's polar regions could cause more harm than good. Despite the urgent need to address climate change, the researchers argue that these solutions are not feasible and would lead to significant environmental damages.

Published: Tue Sep 9 04:36:57 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Cautionary Tale of AI-Driven Security: Anthropic's Claude Code Review Tool Falls Short



Anthropic's Claude Code Review Tool Fails to Live Up to Promises: A Cautionary Tale of AI-Driven Security and Suggestibility

As the world becomes increasingly reliant on artificial intelligence (AI) to drive decision-making, security experts are sounding the alarm about the limitations and potential pitfalls of relying on AI-driven tools to ensure the safety of our digital infrastructure. At the forefront of this debate is Anthropic's Claude Code review tool, which promised to revolutionize the way developers test and secure their code. However, a recent report by Checkmarx has revealed that this ambitious project is not without its flaws, highlighting the need for human oversight and caution when entrusting AI with critical tasks.



Published: Tue Sep 9 04:47:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Securing the Future: How CISOs are Reframing Cybersecurity Conversations for Board Approval

Security leaders must shift their approach to framing cybersecurity conversations for Board approval, focusing on business continuity, compliance, and cost impact. By recognizing high stakes, aligning strategy with business objectives, building risk-focused frameworks, and leveraging industry standards, CISOs can secure the board's approval and drive meaningful outcomes.

Published: Tue Sep 9 04:58:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Nokia's European Secure Smartphone: A Beacon of Sovereign Mobile Security


Nokia's new business unit, HMD Secure, has launched its first product, the Ivalo XE smartphone. This device boasts advanced security features and a durable design, making it an attractive option for governments and other security-critical customers. However, concerns remain about the device's sovereignty due to its reliance on Qualcomm's Dragonwing Q-6690 SoC from a US-based company.

Published: Tue Sep 9 06:26:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Naive Assistant's Double-Edged Sword: The Risks and Rewards of AI-Powered Security Reviews

Anthropic's Claude Code, a cutting-edge AI-powered security review tool, has been found to have limitations and risks, highlighting the need for careful consideration and implementation of safeguards to ensure the security of applications.

Published: Tue Sep 9 06:33:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A National Crisis: The Threats Against Public Servants Exposed

A new platform launched on Tuesday to protect public servants from an angry mob, offering free and discounted privacy and security services to America’s 23 million current and former public servants. The initiative is supported by the Public Service Alliance (PSA), a nonprofit group that formed last summer following an unprecedented rise in threats against government workers across the United States.

Published: Tue Sep 9 06:49:39 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadow AI Menace: How Unchecked Artificial Intelligence is Exposing Enterprises to Infinite Risk



The Shadow AI menace has emerged as a pressing concern for enterprises of all sizes. As unchecked artificial intelligence systems proliferate, organizations are facing an increasing risk of exposure to infinite risk – from impersonation by rogue AI entities to data leaks across previously secure boundaries. Experts are now coming forward with guidance on how to address this growing threat – and businesses would do well to take immediate action to protect themselves before it's too late.

Published: Tue Sep 9 06:57:09 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Malware Campaigns Highlight Rising AI and Phishing Risks: A Growing Threat Landscape


A growing trend in phishing campaigns is highlighting the rising risks associated with artificial intelligence (AI) and phishing attacks. A recent campaign involving the MostereRAT malware showcases a remarkable level of stealth and evasion capabilities, making it increasingly challenging for security solutions to detect and prevent such threats. This article delves into the details of this campaign and explores its implications for cybersecurity, highlighting the need for education, vigilance, and adaptation in the face of evolving threats.

Published: Tue Sep 9 07:04:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Tor-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs: A Growing Concern for Cybersecurity

A growing threat of misconfigured Docker APIs has been discovered using Tor-based cryptojacking attacks. Cybersecurity experts warn about the dangers of segmenting networks, limiting exposure to services on the internet, and securing default credentials. The attack chain involves breaking into misconfigured Docker APIs to execute a new container and mount host file systems.

Published: Tue Sep 9 07:15:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Brokers Face New Pressure to Protect Public Servants' Privacy as Senate Pushes for Greater Oversight

Data Brokers Face New Pressure to Protect Public Servants' Privacy as Senate Pushes for Greater Oversight
A recent investigation by The Markup and CalMatters found that dozens of data brokers are hiding their opt-out pages from Google search results, making it harder for people to find and use tools to delete their personal data. As the issue gains momentum, a new platform called Public Service Alliance is launching to offer free and discounted privacy and security services to America's 23 million current and former public servants.

Published: Tue Sep 9 08:25:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

RatOn Android Malware: A Sophisticated Banking Trojan with NFC Relay Capabilities

RatOn, a new strain of Android malware, has been discovered with sophisticated capabilities for Automated Transfer System (ATS) banking fraud and NFC relay attacks. This malicious software targets cryptocurrency wallet applications and can steal sensitive data by exfiltrating it to an external server under the control of the threat actors.

Published: Tue Sep 9 08:38:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Plex Breach Exposes Security Concerns for Streaming Service

Plex, a popular streaming service used by millions of users worldwide, has suffered another breach of its security systems, exposing sensitive user data to unauthorized parties. The company has taken steps to address the incident, but concerns about the effectiveness of these measures remain.

Published: Tue Sep 9 09:55:26 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Axios Abuses: The Rise of Highly Efficient Phishing Campaigns Leveraging Microsoft Direct Send

A new phishing campaign has emerged, leveraging Axios abuse and Microsoft Direct Send to conduct highly efficient account takeover attacks on Microsoft 365 environments, with a reported success rate of 70%.

Published: Tue Sep 9 10:03:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Net Administrator: Unraveling the Mystery of Volodymyr Viktorovich Tymoshchuk's Ransomware Empire

The U.S. Department of Justice has charged Ukrainian national Volodymyr Viktorovich Tymoshchuk with running several prominent ransomware operations, including LockerGoga and MegaCortex. This charge marks a significant development in the ongoing effort to combat cybercrime and protect vulnerable organizations from these types of threats.

Published: Tue Sep 9 11:49:20 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Adobe Alert: Critical SessionReaper Flaw Patches in Magento eCommerce Platform


Adobe has recently issued a critical security update for its Commerce and Magento Open Source platforms, which has raised concerns among e-commerce users and developers. The update, known as CVE-2025-54236, is described by researchers as one of the most severe flaws in the history of the product.

According to Adobe, the flaw was discovered through internal testing and vulnerability research, with no evidence of exploitation in the wild yet. However, this has raised concerns among security experts, who warn that the vulnerability could be used to bypass security features and take control of customer accounts through the Commerce REST API.

The patch, which is available for immediate deployment, aims to prevent customers from falling victim to this critical security issue. Adobe urges all affected users to apply the hotfix as soon as possible, warning that failure to do so may leave them vulnerable to this security issue, and Adobe will have limited means to help remediate.

In order to avoid falling victim to this critical security issue, administrators are strongly recommended to test and deploy the available patch immediately. The researchers warn that the fix disables internal Magento functionality that could lead to some custom or external code breaking.

The update has raised concerns among e-commerce users and developers, who are now advised to take extra precautions to secure their online stores. This critical security issue highlights the importance of staying up-to-date with the latest security patches and updates for your software and hardware.

Published: Tue Sep 9 11:56:43 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Imperative of External Attack Surface Management: A Proactive Approach to Mitigating Cyber Threats



In an era where cyber threats have become increasingly sophisticated and relentless, enterprises are facing unprecedented challenges in protecting their digital assets from external breaches. Discover the imperative of External Attack Surface Management (EASM) as a proactive approach to mitigating cyber threats and learn how it can help organizations master their attack surface and bolster their resilience against today's sophisticated adversaries.

Published: Tue Sep 9 12:06:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

No-Gym-Intelligence: A Lurking Threat to Personal Security

HelloGym's exposed audio database contains 1.6 million recordings of gym customers and staff, raising serious concerns about personal security and data protection.

Published: Tue Sep 9 12:25:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

September 2025 Patch Tuesday: A Comprehensive Overview of Vulnerability Fixes and Security Updates


September 2025 Patch Tuesday has brought a slew of security updates and vulnerability fixes to address a total of 81 flaws, including two zero-day vulnerabilities that have been actively exploited. This month's patch includes fixes for Windows SMB Server and Microsoft SQL Server, as well as various other products such as Adobe, Argo, Cisco, SAP, Sitecore, TP-Link, and Xbox. The Patch Tuesday fixes address a range of security risks, including exploitation through relay attacks or the use of low-privileged API tokens.

Published: Tue Sep 9 13:40:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Kosovo Hacker Pleads Guilty to Running BlackDB Cybercrime Marketplace: A Complex Web of Illicit Activities


A Kosovo national has pleaded guilty to running BlackDB.cc, a notorious cybercrime marketplace. This case highlights the complexities and consequences of illicit online activities, and serves as a reminder of the ongoing efforts to combat cybercrime through international cooperation and collaboration.

Published: Tue Sep 9 13:50:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Pentagon's Stream Key Security Snafu: A Look into the Pentagon's Social Media Livestream Vulnerability

The US Department of Defense has been criticized for leaving its social media accounts vulnerable to hijacking due to exposed stream keys on its website, highlighting the need for robust cybersecurity measures.

Published: Tue Sep 9 14:12:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Supply Chain Attack Exposes Over 2 Billion Weekly Npm Downloads to Malicious Code


A devastating supply chain attack exposed over 2 billion weekly npm downloads to malicious code, highlighting the importance of staying vigilant in protecting one's digital assets. The attack was carried out through a phishing campaign that exploited a maintainer's two-factor authentication credentials, compromising multiple popular npm packages and allowing hackers to steal cryptocurrency funds.

Published: Tue Sep 9 14:20:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

SAP Warns of High-Severity Vulnerabilities in Multiple Products

SAP has issued a warning about high-severity vulnerabilities in its NetWeaver and S/4HANA products, which can be exploited by hackers with minimal system rights. The company urges users to patch soon to minimize the risk of exploitation.

Published: Tue Sep 9 15:49:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

U.S. Department of the Treasury Imposes Sanctions on Notorious Southeast Asian Cyber Scam Operations


The U.S. Department of the Treasury has imposed sanctions on several large networks of cyber scam operations in Southeast Asia, resulting in the freezing of assets and blocking of financial transactions for billions of dollars in stolen funds from Americans.

Published: Tue Sep 9 15:58:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Utilize Docker API Vulnerabilities to Establish Complex Botnet

Hackers are exploiting exposed Docker APIs to establish a complex botnet using the Tor network for anonymity. This malicious activity has led to concerns about lateral movement, persistence, and potential future attacks such as credential theft and browser session hijacking.

Published: Tue Sep 9 16:07:43 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Pentagon's New Cybersecurity Rules: A Shift in the Defense Industrial Base


The US Department of Defense has finalized a new cybersecurity rule requiring contractors to comply with its Cybersecurity Maturity Model Certification (CMMC) program, making it harder for private companies with lax cybersecurity practices to secure Pentagon contracts. The rule will take effect on November 9 and requires vendors to meet one of three levels of CMMC compliance based on the sensitivity of unclassified information they handle.

Published: Tue Sep 9 16:15:32 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Tech: A Look into EFF's Fight Against Mass Surveillance and Government Interference


In an increasingly complex world where technology and law intersect, EFF's fight against mass surveillance and government interference takes center stage. This article delves into the organization's efforts to promote digital rights and secure individual freedoms in the face of growing concerns over AI-powered surveillance.

Published: Tue Sep 9 16:26:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

SAP September 2025 Patch Day: A Critical Security Alert for Businesses



SAP has released a critical security patch to address four major vulnerabilities in its NetWeaver software, which is widely used by businesses worldwide. The patches were issued as part of the company's September Patch Day, a regular scheduled release that aims to fix bugs and vulnerabilities in SAP's products. Don't miss this important security alert and learn how to protect your business from these critical vulnerabilities.

Published: Tue Sep 9 16:35:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Claude's AI File Creation Feature Exposes Deep Security Risks

Anthropic's latest AI tool, Claude, exposes deep security risks due to its ability to generate files and transmit user data to external servers. The company has taken steps to mitigate these risks, but experts warn that prompt injection vulnerabilities remain widespread.

Published: Tue Sep 9 17:59:20 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Patch Tuesday, September 2025 Edition: A Comprehensive Review of Security Updates

Microsoft has released its latest Patch Tuesday update, addressing over 80 vulnerabilities in Windows operating systems and software, including critical bugs related to authentication management and file sharing. The update highlights the ongoing struggle against cyber threats and emphasizes the need for timely patch management across all industries.

Published: Tue Sep 9 18:06:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Massive Cryptocurrency Heist: How a Single-Click Phishing Email Exposed 18 Popular NPM Packages

A single-click phishing email exposed 18 popular npm packages to cryptocurrency-stealing malware. The attack, which was intended to steal millions of dollars in cryptocurrency, ultimately resulted in the theft of only about $925 due to attackers' ineptitude.

Published: Tue Sep 9 18:21:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Comprehensive Security Upgrade of Apple's iPhone 17: A New Era for Mobile Device Protection


Apple has unveiled a new security feature designed to protect its users from spyware attacks and enhance overall mobile device security. With the introduction of Memory Integrity Enforcement (MIE), Apple is taking a proactive approach to securing its devices, making life harder for malicious actors who rely on exploiting vulnerabilities like Pegasus to hack into targeted devices.

Published: Tue Sep 9 19:37:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Flaw in Adobe Commerce and Magento Open Source Platforms: A Warning for Merchants and Developers


A critical vulnerability has been discovered in the Adobe Commerce and Magento Open Source platforms, allowing attackers to take control of customer accounts. This article delves into the details of the identified flaw, its impact, and the necessary steps for merchants and developers to take to mitigate this risk.

Published: Tue Sep 9 20:47:14 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

SAP NetWeaver and S/4HANA Vulnerabilities: A Growing Concern for Enterprises


Recent patches from SAP have addressed multiple security vulnerabilities in NetWeaver and S/4HANA, including a high-severity bug that was exploited by attackers just days after it was fixed. As enterprises continue to face an increasingly complex cybersecurity landscape, adherence to best practices is essential for protecting sensitive data.

Published: Tue Sep 9 20:56:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Patch Tuesday: The Great Vulnerability Showdown - SAP Takes the Cake

Patch Tuesday brought a slew of critical updates from tech giants like Microsoft, Adobe, and Cisco. While Microsoft's patches were largely uneventful, SAP users are facing a more daunting challenge due to the numerous vulnerabilities in its flagship NetWeaver application.

Published: Tue Sep 9 23:14:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

SAP Security Woes: A Looming Threat to Enterprise Stability


SAP has released critical security patches for its NetWeaver system, addressing three vulnerabilities that could result in code execution and file uploads. The company's swift response underscores the importance of patching vulnerabilities and preventing potential attacks.

Published: Wed Sep 10 02:25:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jaguar Land Rover's Cyberattack: A Cautionary Tale of Preparation and Vigilance


Jaguar Land Rover has fallen victim to a devastating cyberattack that has left its IT systems offline for over a week. The attack highlights several critical vulnerabilities, including outdated authentication methods, a monoculture approach to technology, securing Active Directory systems, and ensuring that only necessary access is granted to connected apps. This serves as a stark reminder of the ever-present threat of cyberattacks against organizations across various industries.

Published: Wed Sep 10 03:42:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Phishing Kit Threatens Enterprise Security: Salty2FA Exploits 2FA Bypass Vulnerabilities


The cybersecurity landscape has witnessed a constant evolution with new phishing kits emerging every now and then. Salty2FA is one of these PhaaS frameworks that claims to have bypassed multiple two-factor authentication methods and slipped past traditional defenses. It already targets finance, energy, and telecom sectors and can lead directly to account takeover due to its ability to intercept credentials and 2FA codes.

Published: Wed Sep 10 03:53:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

KillSec Ransomware Wreaks Havoc on Brazil's Healthcare Sector: A Looming Threat to Patient Confidentiality and Data Integrity

KillSec Ransomware is Attacking Healthcare Institutions in Brazil: A Looming Threat to Patient Confidentiality and Data Integrity

Published: Wed Sep 10 04:02:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft Patch Tuesday Security Updates for September 2025: A Comprehensive Analysis of the Latest Vulnerabilities

Microsoft's Patch Tuesday security updates for September 2025 have addressed a total of 80 vulnerabilities across various components, including Windows, Office, Azure, Hyper-V, SQL Server, Defender Firewall Service, and Xbox. The update has introduced new zero-day flaws that require immediate attention from system administrators and users alike.

Published: Wed Sep 10 04:12:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Catastrophic Breach at a Birmingham Secondary School: Exposing Hundreds of Children's Personal Data



A breach at a Birmingham secondary school has exposed hundreds of children's personal data due to a careless mistake made by the school. The incident highlights the importance of prioritizing cybersecurity and data protection in educational institutions, particularly when it comes to safeguarding sensitive information.

Published: Wed Sep 10 05:22:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations



A newly released report from the House Select Committee on China warns of an escalating series of sophisticated cyber espionage campaigns linked to the People's Republic of China (PRC) amid contentious U.S.-China trade talks. The campaigns, believed to be carried out by APT41, target U.S. trade officials, government agencies, and business organizations involved in U.S.-China trade policy and diplomacy.

The advisory warns of a heightened threat of state-sponsored cyber attacks, which could compromise sensitive information without the knowledge or consent of targeted individuals or organizations. The House Select Committee on China has issued its formal advisory warning as part of efforts to strengthen cybersecurity measures and protect against these types of attacks.

Published: Wed Sep 10 05:31:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Indictment of a Ransomware Kingpin: Unpacking the $18 Billion in Damages

The US has indicted Volodymyr Tymoshchuk, a 28-year-old Ukrainian national, for his alleged role in orchestrating some of the most devastating ransomware operations in recent history. The indictment charges him with seven counts related to computer intrusion offenses and alleges that he caused an estimated $18 billion in damages across hundreds of organizations worldwide.

Published: Wed Sep 10 06:57:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Expanding Shadows of Commercial Spyware: A Growing Concern for Human Rights and National Security

US Investment in Spyware Is Skyrocketing - In a growing concern for human rights and national security, new research reveals that US investors are backing commercial spyware at an alarming rate, raising questions about accountability and oversight.

Published: Wed Sep 10 07:06:39 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's Comprehensive Patch Tuesday Address: Mitigating Lateral Movement Attacks and Unpatched Vulnerabilities


Microsoft has released a total of 80 security patches, including several high-severity vulnerabilities in Windows, Azure, and other Microsoft products. This comprehensive patch release addresses various critical flaws, including remote code execution and privilege escalation vulnerabilities, and highlights the importance of keeping up-to-date with the latest security patches and prioritizing vulnerability management.

Published: Wed Sep 10 07:20:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Apple Unveils Groundbreaking Memory Integrity Enforcement (MIE) Feature for iPhone 17 and iPhone Air Models


Apple has recently unveiled a groundbreaking security feature called Memory Integrity Enforcement (MIE), which is built into its newly introduced iPhone models, including the iPhone 17 and iPhone Air. This innovative technology offers "always-on memory safety protection" across critical attack surfaces such as the kernel and over 70 userland processes without sacrificing device performance.

Published: Wed Sep 10 07:27:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Global Security Landscape: A Complex Web of Threats and Tensions

Poland shoots down Russian drones that violated its airspace, marking a turning point in the conflict between Moscow and Kyiv. The incident raises concerns about regional security, the safety of Polish citizens, and the effectiveness of NATO's response. As tensions escalate, it is essential to consider the broader implications of this incident and work together to address emerging security challenges.

Published: Wed Sep 10 09:36:20 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Uncovering the Dark Web: A Deeper Dive into CHILLYHELL and ZynorRAT


A new wave of malware has emerged on the dark web, threatening macOS, Windows, and Linux systems with CHILLYHELL and ZynorRAT at the forefront. These sophisticated tools pose significant threats to users and require immediate attention from security professionals and individuals alike.

Published: Wed Sep 10 09:48:21 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Anthropic's AI File-Creation Feature Raises Security Concerns Over Data Protection

Anthropic's new file-creation feature raises significant concerns over data protection due to its potential vulnerability to prompt injection attacks. The company has implemented several security measures, but independent researchers warn that more needs to be done to prioritize data protection and ensure robust security protocols.

Published: Wed Sep 10 10:59:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jaguar Land Rover's Cybersecurity Crisis: A Deep Dive into the Data Theft Attack

Jaguar Land Rover confirms data theft after recent cyberattack, but what's behind the attack? A group of cybercriminals calling themselves "Scattered Lapsus$ Hunters" has claimed responsibility for the breach. The attack highlights the potential reach and impact of cybercrime groups like these.

Published: Wed Sep 10 11:17:00 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jaguar Land Rover's Cybersecurity Breach: A Looming Cloud Over Luxury Car Maker


Jaguar Land Rover's recent cybersecurity breach has left its systems offline and raised concerns about the security of its data. The incident highlights the ongoing threat posed by ransomware attacks and the need for organizations to prioritize cybersecurity measures in their operations.

Published: Wed Sep 10 11:25:03 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers' Supply Chain Heist: A Tale of Empty Pockets and Cryptocurrency Scams


A massive NPM supply-chain attack left hackers empty-handed, despite causing widespread disruption to cloud environments. The attackers stole less than $1,000 in cryptocurrency profits, highlighting the need for improved security measures in software supply chains.

Published: Wed Sep 10 15:28:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cursor AI Editor's Autorun Feature Exposed: A New Frontier in Supply Chain Attacks

A critical vulnerability has been discovered in the Cursor AI editor, allowing malicious actors to execute arbitrary code on devices. This exposes a new frontier in supply chain attacks, highlighting the potential for devastating consequences for global cybersecurity.

Published: Wed Sep 10 15:35:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

MICROSOFT'S ENDANGERING ITS CUSTOMERS WITH DEPRECATED ENCRYPTION TECHNIQUE


Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting” - Ars Technica
In a scathing letter to the Federal Trade Commission, Senator Ron Wyden has accused Microsoft of gross cybersecurity negligence by continuing to support the outdated and insecure RC4 encryption technology. This is despite the fact that its continued use poses significant risks to customers, including ransomware and other cyber threats.

Published: Wed Sep 10 16:48:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Akira Ransomware Exploits SonicWall Flaws for Extortion Attacks


The Akira ransomware gang has been exploiting three critical weaknesses in the SonicWall security system to gain access to vulnerable devices and conduct devastating ransomware operations. To avoid falling victim, organizations must apply the latest patches, turn on MFA policies, and restrict access to trusted networks.

Published: Wed Sep 10 21:22:26 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Apple's Security Slip-Up: The ChillyHell macOS Malware Scandal Revealed

Apple's reputation as a leader in security has been tarnished by its failure to detect and flag ChillyHell malware, which was discovered recently by Jamf Threat Labs. The malware is believed to have been infecting computers for years, despite being linked to a group that had previously breached a Ukrainian government website. This raises serious questions about Apple's security protocols and how such sophisticated malware could have flown under the radar for so long.

Published: Wed Sep 10 21:34:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Fileless Malware: How EggStreme Became a Sought-After Tool for Chinese APT Groups


A previously undocumented fileless malware framework called EggStreme has been attributed to the compromise of several high-profile systems, including that of a Philippine military company. This sophisticated malware allows for persistent access, lateral movement, and data theft via an injected keylogger. The targeting of the Philippines is a recurring pattern among Chinese state-sponsored hacking groups, particularly in light of geopolitical tensions fueled by territorial disputes in the South China Sea.

Published: Wed Sep 10 21:51:21 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Flaw Exposed: The SessionReaper Vulnerability in Adobe Commerce and Magento Platforms


A critical flaw has been exposed in Adobe Commerce and Magento Open Source platforms, allowing attackers to hijack customer accounts. The SessionReaper vulnerability, tracked as CVE-2025-54236, has significant implications for businesses and individuals who rely on these platforms. By understanding the impact of this flaw and taking proactive measures, users can protect themselves from potential attacks.

Published: Wed Sep 10 22:00:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Low in Cyberspace: China's 'EggStreme' Malware Attack on the Philippines

China's 'EggStreme' malware attack on a military company in the Philippines highlights the growing threat posed by Chinese government-backed actors in the realm of cyber warfare. The attack, which appears to be the work of Chinese advanced persistent threat groups, is notable not only for its complexity but also for the clear and multi-stage flow designed to establish a resilient foothold on compromised systems.

Published: Wed Sep 10 23:12:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

NASA BANS Chinese Nationals from its Facilities and Networks Amid Growing Concerns over Industrial Espionage

NASA has taken a firm stance on national security by banning Chinese nationals from accessing its facilities, networks, and even video conferencing platforms. The move comes amid growing concerns over industrial espionage and China's increasing presence in space exploration.

Published: Thu Sep 11 01:26:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Slew of Stealthy Threats: How AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto

A new campaign by cyber threat actors has been discovered using ConnectWise ScreenConnect to deploy an advanced remote access trojan called AsyncRAT, designed to steal sensitive data from compromised hosts. The attack chain leverages legitimate software and exploits PowerShell logic to execute a malicious payload. As fileless malware continues to pose a challenge, cybersecurity experts emphasize the importance of vigilance and proactive measures to prevent similar attacks.

Published: Thu Sep 11 01:39:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Brussels Faced With a Digital Crossroads: The EU's Encryption Backdoor Conundrum

As Brussels debates the EU's proposed encryption backdoor plan, experts warn that mandating such measures could lead to a national security disaster, undermine individual privacy rights, and compromise global trust in institutions. Will the EU find a balance between protecting citizens from CSAM and preserving digital freedoms?

Published: Thu Sep 11 06:52:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

LNER Rail Operator Experiences Data Breach Through Third-Party Supplier

LNER, the UK's largest rail operator, has experienced a data breach through its supplier, resulting in the unauthorized access of customer contact details and some information about previous journeys. The incident may be linked to recent attacks on Salesforce's Drift and Salesloft, highlighting the growing threat landscape faced by companies that rely heavily on third-party suppliers.

Published: Thu Sep 11 07:00:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ofcom's Flawed Approach to Regulating Online Content: A Critique of the UK's Online Safety Act Governance


Industry experts scrutinized Ofcom's Online Safety Act governance, citing concerns over its effectiveness and potential for misuse. The UK regulator is tasked with enforcing the Online Safety Act, a controversial piece of legislation aimed at tackling online harm. Critics argue that the OSA is too broad and that Ofcom's proposals for regulating online content are flawed.



Published: Thu Sep 11 07:08:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

BAE Systems Unveils Autonomous Military Submarine Capable of Conducting a Range of Manned-like Missions


BAE Systems has announced the successful completion of trials for its latest autonomous underwater vehicle (AUV) creation, Herne. This extra-large AUV is designed to operate in the military domain and can conduct a range of manned-like missions, including anti-submarine warfare and covert surveillance. With the potential to revolutionize the way submarines operate, Herne represents an important step forward for defense contractors looking to capitalize on the growing demand for unmanned systems.

Published: Thu Sep 11 07:18:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Risk Reporting to the Board: Closing the Gap Between CISOs and Business Decision-Makers


Risk Reporting to the Board: Closing the Gap Between CISOs and Business Decision-Makers

As cyber threats continue to evolve at an unprecedented rate, boards are increasingly holding directors accountable for cyber risk management. A new paradigm in CISO continuing education aims to bridge the gap between these two groups by teaching security leaders how to present risk in a way that resonates with business decision-makers.

Published: Thu Sep 11 07:25:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

SonicWall SSL VPN Flaw Exposed: Akira Ransomware Hackers Take Advantage of Misconfigurations


SonicWall SSL VPN Flaw Exposed: Akira Ransomware Hackers Take Advantage of Misconfigurations

A recent vulnerability discovered in SonicWall's SSL VPN module has been exploited by the Akira ransomware group, which is actively targeting these devices as part of their initial access strategy. To mitigate this risk, organizations must take immediate action to secure their networks and prevent unauthorized access.

Published: Thu Sep 11 07:34:53 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadow World of Cybercrime: A Glimpse into the Dark Underbelly of the Internet


A recent crackdown on cybercrime marketplaces has shed light on the dark underbelly of the internet, highlighting the dangers posed by these illicit operations and the importance of international cooperation in combating them. This article delves into the world of BlackDB and Rydox, exploring their role in facilitating the sale of stolen personal data and fraud tools, and examining the steps being taken to disrupt and dismantle these operations.

Published: Thu Sep 11 07:45:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exploiting the Vulnerabilities of ConnectWise ScreenConnect: The Rise of AsyncRAT



Attackers have successfully exploited the vulnerabilities of ConnectWise ScreenConnect to deploy the AsyncRAT malware, posing significant risks to organizations and individuals who use this software for remote access and support purposes. This article delves into the details of the attack, highlighting the importance of keeping software up-to-date and implementing robust security measures to prevent such incidents.

Published: Thu Sep 11 07:53:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jaguar Land Rover Discloses Data Breach Following Recent Cyberattack

Jaguar Land Rover Discloses Data Breach Following Recent Cyberattack

Published: Thu Sep 11 07:59:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Under Fire for Shipping "Dangerous, Insecure Software" that Helped Cripple US Hospital Network


Microsoft Under Fire for Shipping "Dangerous, Insecure Software" that Helped Cripple US Hospital Network. Senator Ron Wyden has accused Microsoft of shipping "dangerous, insecure software" that helped cybercrooks cripple one of America's largest hospital networks.

Published: Thu Sep 11 09:21:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Alice in the Realms of Memory Safety: Apple's Revolutionary Approach to Securing iOS

Apple's latest innovation promises to revolutionize the way we approach software vulnerabilities with the introduction of Memory Integrity Enforcement (MIE), a cutting-edge technology that integrates hardware and software mechanisms to provide unparalleled protection against memory safety exploits.

Published: Thu Sep 11 09:29:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadows of Spectre: A New Transient Execution Vulnerability Exposes Cloud Secrets

Researchers have identified a new Spectre-based vulnerability dubbed VMSCAPE that allows malicious actors to leak secrets from hypervisors in cloud environments. This latest attack targets the KVM and QEMU, affecting AMD Zen 1-5 processors and Intel Coffee Lake processors, and has been described in a paper set to be presented at the 47th IEEE Symposium on Security and Privacy.

Published: Thu Sep 11 10:41:32 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Akira Ransomware Exploits Critical SonicWall SSLVPN Flaw, Leaving Organizations Vulnerable to Data Breaches



Akira ransomware is once again exploiting a critical vulnerability in SonicWall devices, leaving numerous organizations vulnerable to data breaches due to unpatched SSLVPN endpoints. The attackers are using the bug to bypass multi-factor authentication (MFA) or time-based one-time passwords (TOTP), granting unauthorized access. Organizations with unpatched SonicWall devices should apply the latest available firmware and follow SonicWall's recommended remediation measures immediately.

Published: Thu Sep 11 11:51:42 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Record Packet Flood: The Most Significant Event of Its Kind

FastNetMon has reported a record packet flood from thousands of compromised routers and IoT devices, posing significant risks to businesses and organizations worldwide.

Published: Thu Sep 11 11:59:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Microsoft: U.S. Senator Ron Wyden Calls for FTC Probe Amidst Ransomware-Linked Cybersecurity Negligence


U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to probe Microsoft for "gross cybersecurity negligence" that enabled ransomware attacks on U.S. critical infrastructure, including against healthcare networks. The investigation comes amid concerns over Microsoft's use of insecure default settings and its de facto monopolization of the enterprise operating system market.

Published: Thu Sep 11 12:08:25 2025 by llama3.2 3B Q4_K_M










© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us