Federal authorities on Thursday said they seized $7.74 million from North Korean nationals as they attempted to launder cryptocurrency obtained by IT workers who gained illegal employment and funneled the wages to the North Korean regime. The allegedly illegally obtained funds were linked to Sim Hyon Sop, a representative of North Korean Foreign Trade Bank, … Read More “DOJ seizes $7.7M from crypto funds linked to North Korea’s IT worker scheme – CyberScoop” »
Multiple Vulnerabilities have been discovered in HPE StoreOnce Software, which when chained together could allow for remote code execution, potentially leading to session hijacking and full system compromise. HPE StoreOnce is a data protection platform from Hewlett Packard Enterprise that uses deduplication to reduce backup storage requirements and improve backup and recovery speeds. Successful exploitation … Read More “Multiple Vulnerabilities in HPE StoreOnce Software Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
Post Content – Read More – IC3.gov News
Post Content – Read More – IC3.gov News
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-5419 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the … Read More “CISA Adds One Known Exploited Vulnerability to Catalog – All CISA Advisories” »
A massive data leak has put the personal information of over 3.6 million app creators, influencers, and entrepreneurs… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Sean Cairncross has policy coordination in mind if confirmed as national cyber director – CyberScoop
Sean Cairncross laid out his vision to senators Thursday for the Office of the National Cyber Director if he is confirmed to lead it. “A goal of mine is to make sure this office sits at the place that this committee and I believe Congress intended in the statute, and that is to lead cyber … Read More “Sean Cairncross has policy coordination in mind if confirmed as national cyber director – CyberScoop” »
2017 ransomware attack on shipping company A P Moller Maersk marked a turning point for the cybersecurity industry, according to its former CISO Adam Banks – Read More –
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: Relion 670, Relion 650, SAM600-IO Vulnerabilities: Integer Overflow or Wraparound 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to cause memory corruption on the products. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Hitachi Energy reports … Read More “Hitachi Energy Relion 670, 650 Series and SAM600-IO Product – All CISA Advisories” »
CISA released seven Industrial Control Systems (ICS) advisories on June 5, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-155-01 CyberData 011209 SIP Emergency Intercom ICSA-25-155-02 Hitachi Energy Relion 670, 650 series and SAM600-IO Product ICSA-21-049-02 Mitsubishi Electric FA Engineering Software Products (Update H) ICSA-25-133-02 Hitachi Energy Relion … Read More “CISA Releases Seven Industrial Control Systems Advisories – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: CyberData Equipment: 011209 SIP Emergency Intercom Vulnerabilities: Authentication Bypass Using an Alternate Path or Channel, Missing Authentication for Critical Function, SQL Injection, Insufficiently Protected Credentials, Path Traversal: ‘…/…//’ 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to … Read More “CyberData 011209 SIP Emergency Intercom – All CISA Advisories” »
Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks. “Several widely used extensions […] unintentionally transmit sensitive data over simple HTTP,” Yuanjing Guo, a security researcher in the Symantec’s Security Technology and Response … Read More “Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials – The Hacker News” »
Engagement with ransomware actors doesn’t necessarily mean payment; it’s about getting the best outcomes, a leading negotiator had argued – Read More –
During Infosecurity Europe 2025, Nick Woodcraft, from the UK Government, shared his experience in implementing measures to protect domains within the .gov.uk DNS namespace – Read More –
Cybersecurity experts warn of widespread data exposure as a recent investigation reveals a staggering number of internet cookies… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The threat actor known as Bitter has been assessed to be a state-backed hacking group that’s tasked with gathering intelligence that aligns with the interests of the Indian government. That’s according to new findings jointly published by Proofpoint and Threatray in an exhaustive two-part analysis. “Their diverse toolset shows consistent coding patterns across malware families, … Read More “Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands – The Hacker News” »
A panel of CISOs at Infosecurity Europe urged their peers to use risk management and clear communication to tame a chaotic cyber landscape – Read More –
Security technology company Cellebrite has announced plans to acquire Florida-based mobile testing startup Corellium for $170 million in cash, with an additional $20 million converted to equity at closing and the potential for $30 million more based on performance milestones. The Israel-headquartered Cellebrite, known for its forensic equipment that unlocks smartphones, said the acquisition would … Read More “Cellebrite to acquire mobile testing firm Corellium in $200 million deal – CyberScoop” »
Sophisticated nation-state and cybercriminal groups are using insiders to infect targets via hardware devices, despite a lack of reporting of this threat – Read More –
The chairman of the House Homeland Security subcommittee on cybersecurity is apprehensive about the Department of Homeland Security’s plans to end a program that vets mobile apps for federal agencies. Rep. Andrew Garbarino, R-N.Y., sent a letter to DHS Secretary Kristi Noem on Thursday saying that especially in light of the massive Salt Typhoon telecommunications … Read More “Rep. Garbarino: Ending CISA mobile app security program for feds sends ‘wrong signal’ – CyberScoop” »
Malicious actors are making more use of AI in attacks, even as governments look to boost AI investments – Read More –
Cofense Intelligence uncovers a surge in ClickFix email scams impersonating Booking.com, delivering RATs and info-stealers. Learn how these… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
An Iran-aligned hacking group has been attributed to a new set of cyber attacks targeting Kurdish and Iraqi government officials in early 2024. The activity is tied to a threat group ESET tracks as BladedFeline, which is assessed with medium confidence to be a sub-cluster within OilRig, a known Iranian nation-state cyber actor. It’s said … Read More “Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware – The Hacker News” »
Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the same question: what is the business getting in return? CISOs respond with reports on controls and vulnerability counts – but executives want to understand risk in terms of financial exposure, operational … Read More “Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation – The Hacker News” »
At Infosecurity Europe 2025, Axonius’ Jon Ridyard proposed seven best practices to build mature vulnerability management processes – Read More –
The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of cryptocurrency funds and about 145 clearnet and dark web domains associated with an illicit carding marketplace called BidenCash. “The operators of the BidenCash marketplace use the platform to simplify the process of buying and selling stolen credit cards and associated personal information,” the … Read More “DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global Takedown – The Hacker News” »
Endpoint and network security is still essential, even as malicious actors turn to supply chains, identities and AI – Read More –
On June 4, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in Google Chrome. On June 3, the MS-ISAC released an advisory for multiple vulnerabilities in Google Chrome, the most severe of which could allow for arbitrary code execution. Organizations and users are advised to update and … Read More “Threat Level – GUARDED – Cyber Threat Alert” »
Cisco has released security patches to address a critical security flaw impacting the Identity Services Engine (ISE) that, if successfully exploited, could allow unauthenticated actors to carry out malicious actions on susceptible systems. The security defect, tracked as CVE-2025-20286, carries a CVSS score of 9.9 out of 10.0. It has been described as a static … Read More “Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI – The Hacker News” »
University spokesperson says Genevieve Bell’s account had ‘liked’ posts she had never seen before about Julie Bishop and Gaza Get our breaking news email, free app or daily news podcast The Australian National University (ANU) has contacted authorities about a possible hacking incident after its vice-chancellor’s account liked a number of “highly offensive” LinkedIn posts … Read More “ANU investigates possible hack after vice-chancellor’s account liked ‘highly offensive’ LinkedIn posts – Data and computer security | The Guardian” »
After three years of peddling stolen data, BidenCash, one of the web’s most brazen cybercrime hubs is offline, and authorities say they’re just getting started. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Federal authorities on Wednesday announced the seizure of about 145 domains and cryptocurrency funds linked to BidenCash, a cybercrime marketplace for stolen credit cards, compromised credentials and other personal information. BidenCash was used by more than 117,000 customers, resulting in the trafficking of more than 15 million credit card numbers and personally identifiable information, the … Read More “Feds seize 145 domains associated with BidenCash cybercrime platform – CyberScoop” »
Software powers the world, and soon, the bulk of the work making it may be done by machines. As generative AI tools have gotten more proficient at coding, their use in software development has exploded. Proponents say the tools have made it dramatically easier for individual entrepreneurs or companies to create the kind of slick, … Read More “Vibe coding is here to stay. Can it ever be secure? – CyberScoop” »
CISA, the Federal Bureau of Investigation (FBI), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) have issued an updated advisory on Play ransomware, also known as Playcrypt. This advisory highlights new tactics, techniques, and procedures used by the Play ransomware group and provides updated indicators of compromise (IOCs) to enhance threat detection. Since … Read More “Updated Guidance on Play Ransomware – All CISA Advisories” »
Hackers leak data of 88 million AT&T customers with decrypted SSNs; latest breach raises questions about links to earlier Snowflake-related attack. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A financially motivated threat group posing as IT support has intruded the systems of about 20 organizations by duping employees into installing a malicious, illegitimate version of Salesforce’s Data Loader and granting broader access to cloud-based environments, Google Threat Intelligence Group said in a threat report released Wednesday. The attacks, which Google attributes to UNC6040, … Read More “Salesforce customers duped by series of social-engineering attacks – CyberScoop” »
Moving to cloud-native architecture and modern platforms is allowing enterprises to automate operations and improve security – Read More –
Google has disclosed details of a financially motivated threat cluster that it said “specialises” in voice phishing (aka vishing) campaigns designed to breach organizations’ Salesforce instances for large-scale data theft and subsequent extortion. The tech giant’s threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with … Read More “Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App – The Hacker News” »
What comes to your mind when you think of Photoshop? A tool for editing and retouching photos –… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Experts argue the case for “communities of support” to boost SMB cyber-resilience – Read More –
Experts argue that CISOs should avoid product duplication and simplify their language to ensure budget is spent wisely – Read More –
Threat hunters are calling attention to a new variant of a remote access trojan (RAT) called Chaos RAT that has been used in recent attacks targeting Windows and Linux systems. According to findings from Acronis, the malware artifact may have been distributed by tricking victims into downloading a network troubleshooting utility for Linux environments. “Chaos … Read More “Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads – The Hacker News” »
Agentic AI systems could threaten security and data privacy, unless organizations test each model and component – Read More –
The attacks on UK retailers are “a wake-up call” for the industry, said River Island’s Information Security Officer – Read More –
A phishing campaign spoofing Booking.com has been observed targeting hospitality sector, using ClickFix to install malware – Read More –
Traditional data leakage prevention (DLP) tools aren’t keeping pace with the realities of how modern businesses use SaaS applications. Companies today rely heavily on SaaS platforms like Google Workspace, Salesforce, Slack, and generative AI tools, significantly altering the way sensitive information is handled. In these environments, data rarely appears as traditional files or crosses networks … Read More “Your SaaS Data Isn’t Safe: Why Traditional DLP Solutions Fail in the Browser Era – The Hacker News” »
Sophos has uncovered a scheme planting malicious code in 130+ GitHub repositories, targeting hackers and gamers – Read More –
Today, your internet presence is much more than just a website or social media profile, it’s like your… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Stolen devices are a bigger cause of data loss than stolen credentials or ransomware, according to a new Blancco study – Read More –
Several malicious packages have been uncovered across the npm, Python, and Ruby package repositories that drain funds from cryptocurrency wallets, erase entire codebases after installation, and exfiltrate Telegram API tokens, once again demonstrating the variety of supply chain threats lurking in open-source ecosystems. The findings come from multiple reports published by Checkmarx, – Read More … Read More “Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks – The Hacker News” »