AttackFeed Cybersecurity News

0

FCC commissioner blasts Trump administration censorship policies  – CyberScoop

When Donald Trump was on the campaign trail, he argued that coordination by the Biden administration and social media companies on disinformation during the COVID-19 pandemic and elections amounted to political censorship. He claimed that supposed censorship stifled the free and unencumbered exchange of ideas essential to democracy, and posed a clear threat to the First Amendment. “After years and...

0

Coinbase flips $20M extortion demand into bounty for info on attackers  – CyberScoop

Coinbase responded to a security incident with combative measures Thursday after the company said cybercriminals bribed some of the cryptocurrency exchange’s international support staff to steal data on customers. The unnamed threat group stole personally identifiable information and other sensitive data on less than 1% of Coinbase’s monthly users, the company said in a blog post. The cybercriminals contacted customers...

0

Consensus forms on reauthorizing 2015 cyber info-sharing law now, upgrading it later  – CyberScoop

The message was consistent at a House cybersecurity hearing Thursday: pass legislation extending an expiring information-sharing law before it lapses in September, and worry about improving it later. Both lawmakers and witnesses at the hearing of the Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection shared that view about the pending expiration of the 2015 Cybersecurity Information Sharing Act, which...

0

Preparing for the post-quantum era: a CIO’s guide to securing the future of encryption  – CyberScoop

Quantum computing is on the verge of revolutionizing the technology landscape, much like AI did in 2024. By the end of 2025, quantum computing will emerge as a defining force, ushering in a new era filled with both unprecedented opportunities and significant challenges in securing digital assets. While state-of-the-art quantum computers aren’t yet capable of threatening cryptographic systems, predictions suggest...

0

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors  – The Hacker News

Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry, as well as technology companies and educational institutions in China. “Over the past few months, it has expanded aggressively, continuously leveraging infected devices to launch external attacks,” NSFOCUS said in a report published this week. “By  –...

0

Top 10 Best Practices for Effective Data Protection  – The Hacker News

Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly and data privacy regulations tightening, organizations must stay vigilant and proactive to safeguard their most valuable assets. But how do you build an effective data protection framework? In this article, we’ll explore data protection best practices from meeting  – Read...

0

Pwn2Own Berlin 2025: Day Two Results  – Zero Day Initiative – Blog

Welcome to the second day of our first ever Pwn2OwnBerlin. Yesterday, we awarded $260,000 for some amazing research. Today looks to be even better, with more AI on the line, plus SharePoint and VMware ESXi. As always, we’ll be updating this blog with results as we have them. COLLISION – Mohand Acherir & Patrick Ventuzelo (@pat_ventuzelo) of FuzzingLabs (@fuzzinglabs) exploited...

0

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks  – The Hacker News

Researchers at ETH Zürich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data from memory, showing that the vulnerability known as Spectre continues to haunt computer systems after more than seven years. The vulnerability, referred to as Branch Privilege Injection (BPI), “can be exploited to misuse the prediction ...

0

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks  – The Hacker News

Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT. “Threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents,” Qualys security researcher Akshay Thorve said in a technical report. “The attack chain leverages mshta.exe for  – Read...

0

[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications  – The Hacker News

Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late to cloud threats, and monitor SOC alerts only after damage is done. Attackers don’t wait. They exploit vulnerabilities within hours. Yet most organizations take days to respond to critical cloud...

0

 FTC wants a new, segregated software system to police deepfake porn   – CyberScoop

The head of the Federal Trade Commission described to lawmakers Thursday new technology, personnel and infrastructure the agency needs as it prepares to implement and enforce the Take It Down Act, placing the FTC’s enforcement wing at the forefront of the fight against nonconsensual deepfake pornography. The FTC’s proposed budget holds funding at $425.7 million, the same as last fiscal...

0

Proofpoint to acquire Hornetsecurity for over $1 billion  – CyberScoop

Proofpoint has entered into an agreement to acquire Hornetsecurity Group, a Germany-based provider of Microsoft 365 security services, in a deal reportedly valued at more than $1 billion. The acquisition, described as the largest in Proofpoint’s history, comes amid accelerating consolidation in the cybersecurity industry as companies seek to broaden their offerings to enterprise customers of all sizes. While Proofpoint...

0

A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution  – Cyber Security Advisories – MS-ISAC

A vulnerability has been discovered in Google Chrome which could allow for arbitrary code execution. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user...

0

Breachforums Boss to Pay $700k in Healthcare Breach  – Krebs on Security

In what experts are calling a novel legal outcome, the 22-year-old former administrator of the cybercrime community Breachforums will forfeit nearly $700,000 to settle a civil lawsuit from a health insurance company whose customer data was posted for sale on the forum in 2023. Conor Brian Fitzpatrick, a.k.a. “Pompompurin,” is slated for resentencing next month after pleading guilty to access...

0

FBI warns of fake texts, deepfake calls impersonating senior U.S. officials  – CyberScoop

The FBI said Thursday that malicious actors have been impersonating senior U.S. government officials in a text and voice messaging campaign, using phishing texts and AI-generated audio to trick other government officials into giving up access to their personal accounts. The warning provided few details about the campaign, which started in April and appears to be ongoing. The messages have...

0

Siemens SCALANCE LPE9403  – All CISA Advisories

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Exploitable from adjacent network/low attack complexity Vendor: Siemens...

0

SAP cyberattack widens, drawing Salt Typhoon and Volt Typhoon comparisons  – CyberScoop

Hundreds of victims are surfacing across the world from zero-day cyberattacks on Europe’s biggest software manufacturer and company, in a campaign that one leading cyber expert is comparing to the vast Chinese government-linked Salt Typhoon and Volt Typhoon breaches of critical infrastructure. The zero-days — vulnerabilities previously unknown to researchers or companies, but that malicious hackers have discovered — got...

0

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit  – The Hacker News

Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if it proceeds with its plans to train users’ data for training its artificial intelligence (AI) models without an explicit opt-in. The move comes weeks after the social media behemoth announced its plans to train its...

0

Siemens SIRIUS 3SK2 Safety Relays and 3RK3 Modular Safety Systems  – All CISA Advisories

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SIRIUS...

0

Multiple Vulnerabilities in Ivanti Endpoint Manager Mobile Could Allow for Remote Code Execution  – Cyber Security Advisories – MS-ISAC

Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager Mobile, the most severe of which could allow for remote code execution. Ivanti Endpoint Manager Mobile (EPMM) is a unified endpoint management solution that enables organizations to securely manage and monitor mobile devices, applications, and content across multiple platforms from a centralized interface. Successful exploitation of the most severe of these...

0

CISA Releases Twenty-Two Industrial Control Systems Advisories  – All CISA Advisories

CISA released twenty-two Industrial Control Systems (ICS) advisories on May 15, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-135-01 Siemens RUGGEDCOM APE1808 Devices ICSA-25-135-02 Siemens INTRALOG WMS ICSA-25-135-03 Siemens BACnet ATEC Devices ICSA-25-135-04 Siemens Desigo ICSA-25-135-05 Siemens SIPROTEC and SICAM ICSA-25-135-06 Siemens Teamcenter Visualization ICSA-25-135-07 Siemens IPC RS-828A ICSA-25-135-08 Siemens VersiCharge AC...

0

Siemens Mendix OIDC SSO  – All CISA Advisories

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 2.1 ATTENTION: Exploitable remotely Vendor: Siemens Equipment: Mendix OIDC SSO...

0

Siemens VersiCharge AC Series EV Chargers  – All CISA Advisories

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable from adjacent network/low attack complexity Vendor: Siemens...

0

ECOVACS DEEBOT Vacuum and Base Station  – All CISA Advisories

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.6 ATTENTION: Exploitable remotely/low attack complexity Vendor: ECOVACS Equipment: DEEBOT Vacuum and Base Station Vulnerabilities: Use of Hard-coded Cryptographic Key, Download of Code Without Integrity Check 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to send malicious updates to the devices or execute code. 3. TECHNICAL DETAILS 3.1 AFFECTED...

0

Siemens IPC RS-828A  – All CISA Advisories

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: IPC...

0

North Korea’s ‘state-run syndicate’ looks at cyber operations as a survival mechanism  – CyberScoop

Over the past few years, cybersecurity experts have increasingly said that nation-state operatives and cybercriminals often blur the boundaries between geopolitical and financial motivations. A new report released Wednesday shows how North Korea has flipped that idea on its head.  North Korea has silently forged a global cyber operation that experts now liken to a mafia syndicate, with tactics and...

0

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails  – The Hacker News

Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data for a small subset of its customers. “Criminals targeted our customer support agents overseas,” the company said in a statement. “They used cash offers to convince a small group of insiders to copy data in our customer support tools for less than 1%...

0

Who needs VC funding? How cybercriminals spread their ill-gotten gains to everyday business ventures  – CyberScoop

Cybercriminals aren’t so different from the rest of us — they live in the real world, and their spending and investment habits, though funded through crime, can look surprisingly ordinary. Luxury cars and lavish vacations may still grab headlines, but those perks are reserved for the most elite cybercriminals. In reality, everyday businesses — like pizza delivery, construction supplies, or tattoo...

AttackFeed by Joe Wagner
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.