Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42. The attack targeting TBK DVR devices has been found to exploit CVE-2024-3721 (CVSS score: 6.3), a medium-severity command injection vulnerability … Read More “Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet – The Hacker News” »
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; … Read More “Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Founder Liquidity Without Compromising on Growth – Hackread – Cybersecurity News, Data Breaches, AI and More
Founders can access liquidity without exiting by selling shares via secondary deals, reducing financial pressure while staying focused on long-term growth. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
New RecruitRat, SaferRat, Astrinox, Massiv Android Malware Found Targeting 800 Apps – Hackread – Cybersecurity News, Data Breaches, AI and More
New research from Zimperium reveals four active Android malware campaigns, RecruitRat, SaferRat, Astrinox, and Massiv, targeting over 800 banking apps globally. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The Race to Quantum-Proof the Internet Has Already Begun – Hackread – Cybersecurity News, Data Breaches, AI and More
The race to quantum-proof the internet is underway as experts warn of “harvest now, decrypt later” risks and slow migration to post-quantum security. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Congress is grappling with renewal of a surveillance law set to expire at the end of this month that critics say is a mystery on how much of a difference it has made for controversial government spying authorities — for better or worse. The 2024 law reauthorized so-called Section 702 powers of the Foreign Intelligence … Read More “The surveillance law Congress can’t quit — and can’t explain – CyberScoop” »
How the NCSC is reducing risk, improving detection, and helping to keep vital services running. – Read More – All Feed
New Mirai Variant Nexcorium Hijacks DVR Devices for DDoS Attacks – Hackread – Cybersecurity News, Data Breaches, AI and More
Cybersecurity researchers at Fortinet have discovered Nexcorium, a new Mirai-based malware targeting TBK DVR systems to turn them into a botnet for DDoS attacks. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three vulnerabilities that are codenamed BlueHammer (requires GitHub sign-in), RedSun, and UnDefend, all of which were released as zero-days by a researcher known as Chaotic Eclipse ( … Read More “Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched – The Hacker News” »
Coordinated action by FBI, Europol and others seizes infrastructure, makes arrests – and sends warning letters to known DDoS service users – Read More –
AI models are making rapid gains in vulnerability research and exploit development, raising new cybersecurity risks, a Forescout study finds – Read More –
New ZionSiphon Malware Discovered Targeting Israeli Water Systems – Hackread – Cybersecurity News, Data Breaches, AI and More
Researchers at Darktrace have identified ZionSiphon, a new malware targeting Israeli water treatment plants. Learn how this OT-focused… – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul – The Hacker News
Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally and suspended 24.9 million accounts in 2025. The new policy updates relate to contact and location permissions in Android, allowing third-party apps … Read More “Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul – The Hacker News” »
Have you ever taken a look at your Microsoft 365 mailbox rules? If not, it might be worth a few minutes of your time. Because newly released research reveals that hackers may already have beaten you to it. Read more in my article on the Fortra blog. – Read More – GRAHAM CLULEY
If you hold cryptocurrency, there’s a very simple golden rule that you should always follow. Never hand over your seed phrase. Garrett Dutton, better known as G. Love – the front man of blues-hip-hop outfit G. Love & Special Sauce – has learnt that lesson the hard way. Read more in my article on the … Read More “Singer loses life savings to fake wallet downloaded from the Apple App Store – GRAHAM CLULEY” »
New CGrabber and Direct-Sys Malware Spread Through GitHub ZIP Files – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers spread CGrabber and Direct-Sys malware through GitHub ZIP files, bypassing security tools to steal passwords, crypto wallets, and user data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals. The ongoing effort, dubbed Operation PowerOFF, disrupted access to the DDoS-for-hire services, took down the technical infrastructure supporting them, and obtained access to – Read … Read More “Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts – The Hacker News” »
The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain conditions owing to an explosion in CVE submissions. “CVEs that do not meet those criteria will still be … Read More “NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions – The Hacker News” »
A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency has added the vulnerability, tracked as CVE-2026-34197 (CVSS score: 8.8), to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian – Read More – The Hacker News
Two New Jersey men were sentenced Wednesday for facilitating North Korea’s long-running scheme to plant operatives inside U.S. businesses as employees, generating more than $5 million in illicit revenue for the regime, the Justice Department said. The U.S. nationals — Kejia Wang, also known as Tony Wang, and Zhenxing Wang, also known as Danny Wang … Read More “US nationals sentenced for aiding North Korea’s tech worker scheme – CyberScoop” »
Cybersecurity researchers have warned of an active malicious campaign that’s targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. “PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections,” Cisco Talos – Read More – The … Read More “Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic – The Hacker News” »
Authorities from 21 countries took down 53 domains and arrested four people allegedly involved in distributed denial-of-service operations used by more than 75,000 cybercriminals, Europol said Thursday. The globally coordinated effort dubbed “Operation PowerOFF” disrupted booter services and seized and dismantled infrastructure, including servers and databases, that supported the DDoS-for-hire services, officials said. Law enforcement … Read More “Officials seize 53 DDoS-for-hire domains in ongoing crackdown – CyberScoop” »
OpenAI Launches GPT-5.4-Cyber to Boost Defensive Cybersecurity – Hackread – Cybersecurity News, Data Breaches, AI and More
OpenAI unveils GPT-5.4-Cyber, a cybersecurity-focused model built to help defenders analyze malware and fix software bugs. The company is also expanding its Trusted Access for Cyber (TAC) program to thousands of verified experts. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
APK malformation tactic now appears in over 3000 Android malware samples evading static analysis – Read More –
US authorities jail two Americans for aiding North Korean laptop farm scams that infiltrated over 100 firms – Read More –
Tennessee’s CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data – Read More –
ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories – The Hacker News
You know that feeling when you open your feed on a Thursday morning and it’s just… a lot? Yeah. This week delivered. We’ve got hackers getting creative in ways that are almost impressive if you ignore the whole “crime” part, ancient vulnerabilities somehow still ruining people’s days, and enough supply chain drama to fill a season of television … Read More “ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories – The Hacker News” »
In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections, andOAuth grants. When projects end or employees leave, most – Read More – … Read More “[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment – The Hacker News” »
NIST’s National Vulnerability Database will now prioritize enriching new and exploited flaws to address the record growth of reported CVEs – Read More –
A bank approved a Taboola pixel. That pixel quietly redirected logged-in users to a Temu tracking endpoint. This occurred without the bank’s knowledge, without user consent, and without a single security control registering a violation. Read the full technical breakdown in the Security Intelligence Brief. Download now → The “First-Hop Bias” Blind Spot Most& – Read More – The Hacker News
Researchers Say Fiverr Left User Files Open to Google Search – Hackread – Cybersecurity News, Data Breaches, AI and More
Private Fiverr user documents, including tax records and IDs, were reportedly found in Google search results due to a storage configuration issue. Read more about the findings and the company’s response to the data exposure. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks – The Hacker News
A “novel” social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency sectors. Dubbed REF6598 by Elastic Security Labs, the activity has been found to leverage – Read More … Read More “Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks – The Hacker News” »
Cybersecurity Risks of Hiring a Virtual Assistant and How to Protect Your Business – Hackread – Cybersecurity News, Data Breaches, AI and More
Virtual assistants boost productivity but add cybersecurity risks. Poor access control, weak devices, and credential sharing can expose sensitive business data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution – The Hacker News
Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service. The details of the vulnerabilities are below – CVE-2026-20184 (CVSS score: 9.8) – An improper certificate validation in the integration of single sign-on … Read More “Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution – The Hacker News” »
Ox Security claims as many as 200,000 servers are exposed by newly discovered MCP vulnerability – Read More –
A company wakes up to a news story claiming it has suffered a major data breach. The details are specific, technical and convincing. But the breach didn’t happen. No systems were compromised. No data was taken. A language model generated the entire story, filling in plausible details from scratch. And before the company can figure … Read More “Ghost breaches: How AI-mediated narratives have become a new threat vector – CyberScoop” »
Halcyon says ransomware now accounts for more than two-fifths of cyber-attacks targeting carmakers – Read More –
Triad Nexus scales $200m scams, uses infrastructure laundering, localized fraud and US-access blocks – Read More –
The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and WhatsApp. The activity, which was observed between March and April – Read More – The Hacker News
Securing Remote Server Access: Why VPNs Matter for Administrators – Hackread – Cybersecurity News, Data Breaches, AI and More
VPNs help secure remote server access by encrypting traffic, restricting entry to authorized users, and reducing exposure of critical systems to the internet. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Anonymizing Network Traffic: A Dive into SOCKS5 and Data Encryption – Hackread – Cybersecurity News, Data Breaches, AI and More
SOCKS5 protocol explained: anonymize traffic, boost security with encryption, bypass restrictions, and enable reliable data collection for business use. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Smashing Security podcast #463: This AI company leaked its own code. It’s also built something terrifying – GRAHAM CLULEY
A hacking group claims to have broken into the flood defence system protecting Venice’s Piazza San Marco – and is offering to sell access to whoever wants it. The asking price? A frankly insulting $600. Meanwhile, Anthropic accidentally leaked the source code for Claude Code via a basic packaging mistake. Oh, and by the way, … Read More “Smashing Security podcast #463: This AI company leaked its own code. It’s also built something terrifying – GRAHAM CLULEY” »
Fake Claude AI Installer Targets Windows Users with PlugX Malware – Hackread – Cybersecurity News, Data Breaches, AI and More
Fake Claude AI installer mimicking Anthropic spreads PlugX malware on Windows, using DLL sideloading to gain persistent remote access to infected systems. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The federal agency tasked with analyzing security vulnerabilities is overwhelmed as it and other authorities struggle to keep pace with a flood of defects that grows every year. The National Institute of Standards and Technology announced Wednesday that it has capitulated to that deluge and narrowed the priorities for its National Vulnerability Database. NIST said … Read More “NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities – CyberScoop” »
Fake Ledger Live App on Apple Store Linked to $9.5M Crypto Theft – Hackread – Cybersecurity News, Data Breaches, AI and More
Apple approved a fake Ledger Live app on its App Store, allowing scammers to steal $9.5 million from more than 50 users. Did you install this app? – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
National Cyber Director Sean Cairncross expects more executive orders coming from the White House as part of implementing the national cybersecurity strategy, he said Wednesday. Staffers on Capitol Hill and others in the cyber world have been awaiting the implementation guidance the Trump administration had proclaimed would come to accompany the strategy published last month. … Read More “Executive orders likely ahead in next steps for national cyber strategy – CyberScoop” »
Threat actors have been observed weaponizing n8n, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads or fingerprint devices by sending automated emails. “By leveraging trusted infrastructure, these attackers bypass traditional security filters, turning productivity tools into delivery – Read More – The Hacker News
OpenAI’s new frontier model focused on cybersecurity comes following Anthropic’s launch of Claude Mythos Preview and Project Glasswing – Read More –
108 malicious Chrome extensions steal sessions, Google data, inject ads via single C2 infrastructure – Read More –
Huntress uncovers adware deploying AV-killing payloads via signed updates across 23,000 endpoints – Read More –





