As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable from adjacent … Read More “Siemens VersiCharge AC Series EV Chargers – All CISA Advisories” »
Author: Joe-W
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.6 ATTENTION: Exploitable remotely/low attack complexity Vendor: ECOVACS Equipment: DEEBOT Vacuum and Base Station Vulnerabilities: Use of Hard-coded Cryptographic Key, Download of Code Without Integrity Check 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to send malicious updates to the devices or execute code. … Read More “ECOVACS DEEBOT Vacuum and Base Station – All CISA Advisories” »
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 10.0 ATTENTION: Exploitable remotely/low attack … Read More “Siemens IPC RS-828A – All CISA Advisories” »
Over the past few years, cybersecurity experts have increasingly said that nation-state operatives and cybercriminals often blur the boundaries between geopolitical and financial motivations. A new report released Wednesday shows how North Korea has flipped that idea on its head. North Korea has silently forged a global cyber operation that experts now liken to a … Read More “North Korea’s ‘state-run syndicate’ looks at cyber operations as a survival mechanism – CyberScoop” »
Post Content – Read More – IC3.gov News
Coinbase is offering a $20m reward to help catch the threat actor behind a cyber-attack that could cost it between $180-$400m – Read More –
FrigidStealer malware targets macOS users via fake browser updates, stealing passwords, crypto wallets, and notes using DNS-based data… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A stealthy fileless PowerShell attack using Remcos RAT bypassed antivirus by operating in memory – Read More –
Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data for a small subset of its customers. “Criminals targeted our customer support agents overseas,” the company said in a statement. “They used cash offers to convince a small group of insiders to copy data in our customer support … Read More “Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails – The Hacker News” »
The critical vulnerability is being exploited by BianLian, RansomwEXX and a Chinese nation-state actor known as Chaya_004 – Read More –
Dior confirmed a data breach compromising customer personal information, discovered on May 7 – Read More –
Credential protection is key to preventing breaches. Secure APIs, rotate secrets and train devs to handle credentials safely… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Researchers discovered over 3000 Linux vulnerabilities in 2024, the most of any category – Read More –
The voluntary cybersecurity charter asks NHS suppliers to commit to eight cybersecurity pledges, amid rising attacks on healthcare – Read More –
Cybercriminals aren’t so different from the rest of us — they live in the real world, and their spending and investment habits, though funded through crime, can look surprisingly ordinary. Luxury cars and lavish vacations may still grab headlines, but those perks are reserved for the most elite cybercriminals. In reality, everyday businesses — like pizza … Read More “Who needs VC funding? How cybercriminals spread their ill-gotten gains to everyday business ventures – CyberScoop” »
Police in Europe have shut down a fake online trading platform that scammed hundreds of victims out of… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance. In February, your development team deployed a routine software update. By April, attackers had already exploited a vulnerability introduced in that February update, gaining access to customer data weeks before being finally detected. This situation isn’t theoretical: it … Read More “Pen Testing for Compliance Only? It’s Time to Change Your Approach – The Hacker News” »
Over the years, many different technologies have transitioned to Cloud-based solutions, including ERP systems and email management platforms.… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as an operating system information utility to stealthily drop a next-stage payload onto compromised systems. “This campaign employs clever Unicode-based steganography to hide its initial malicious code and utilizes a Google Calendar event short link as a dynamic dropper for its final – … Read More “Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper – The Hacker News” »
A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon, and Zimbra via cross-site scripting (XSS) vulnerabilities, including a then-zero-day in MDaemon, according to new findings from ESET. The activity, which commenced in 2023, has been codenamed Operation RoundPress by the Slovak cybersecurity company. It … Read More “Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers – The Hacker News” »
Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even legitimate IT tools to infiltrate networks and launch ransomware attacks. In a chilling example, Microsoft recently disclosed how threat actors misused its Quick Assist remote assistance tool to deploy the destructive – … Read More “5 BCDR Essentials for Effective Ransomware Defense – The Hacker News” »
Welcome to the first day of Pwn2Own Berlin 2025! We have 11 different attempts, including our first ever AI attempts. We’ll be updating this blog with results as we have them. SUCCESS – Pumpkin (@u1f383) from DEVCORE Research Team used an integer overflow to escalate privs on Red Hat Linux. He earns $20,000 and 2 … Read More “Pwn2Own Berlin 2025: Day One Results – Zero Day Initiative – Blog” »
Fancy Bear campaign sought emails of high-level Ukrainians and their military suppliers – CyberScoop
Fancy Bear, the hacking group linked to Russia’s Main Intelligence Directorate (GRU), has been targeting the email accounts of high-ranking Ukrainian officials as well as executives at defense contractors located in other countries who sell weapons and equipment to Kyiv, according to new research from ESET. The campaign, ongoing since at least 2023, has taken … Read More “Fancy Bear campaign sought emails of high-level Ukrainians and their military suppliers – CyberScoop” »
Most online merchants now believe customers pose as big a threat as professional fraudsters – Read More –
The ransomware landscape is more fragmented than ever, with no “market leader,” says William Lyne, Head of Intelligence at the NCA – Read More –
New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy – The Hacker News
Google on Wednesday released updates to address four security issues in its Chrome web browser, including one for which it said there exists an exploit in the wild. The high-severity vulnerability, tracked as CVE-2025-4664 (CVSS score: 4.3), has been characterized as a case of insufficient policy enforcement in a component called Loader. “Insufficient policy enforcement … Read More “New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy – The Hacker News” »
Don’t get duped, doxxed, or drained! In this episode of “Smashing Security” we dive into the creepy world of sextortion scams, and investigate how crypto wallet firm Ledger’s Discord server was hijacked in an attempt to phish for cryptocurrency recovery phrases. All this and more is discussed in the latest edition of the award-winning “Smashing … Read More “Smashing Security podcast #417: Hello, Pervert! – Sextortion scams and Discord disasters – Graham Cluley” »
The Consumer Financial Protection Bureau is set to withdraw a Biden-era rule aimed at cracking down on data brokers and their selling of Americans’ personal and financial information. In a notice set to publish Thursday in the Federal Register, the CFPB said legislative rulemaking on the data broker industry “is not necessary or appropriate at … Read More “CFPB to withdraw rule targeting data brokers – CyberScoop” »
There is a lot of money in cyberattacks like ransomware, and unfortunately for organizations of all sizes, the… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The Department of Homeland Security won’t tell Congress how many employees at the Cybersecurity and Infrastructure Security Agency it has fired or pushed to leave, a top congressional Democrat said Wednesday. “You’ve overseen mass reductions in the workforce at CISA and” the Federal Emergency Management Agency, Mississippi Rep. Bennie Thompson, the top Democrat on the … Read More “DHS won’t tell Congress how many people it’s cut from CISA – CyberScoop” »
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-32756 Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk … Read More “CISA Adds One Known Exploited Vulnerability to Catalog – All CISA Advisories” »
Flashpoint uncovers how North Korean hackers used fake identities to secure remote IT jobs in the US, siphoning… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
At least two different cybercrime groups BianLian and RansomExx are said to have exploited a recently disclosed security flaw in SAP NetWeaver, indicating that multiple threat actors are taking advantage of the bug. Cybersecurity firm ReliaQuest, in a new update published today, said it uncovered evidence suggesting involvement from the BianLian data extortion crew and … Read More “BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan – The Hacker News” »
Samsung has released software updates to address a critical security flaw in MagicINFO 9 Server that has been actively exploited in the wild. The vulnerability, tracked as CVE-2025-4632 (CVSS score: 9.8), has been described as a path traversal flaw. “Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version … Read More “Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit – The Hacker News” »
A Chinese-language, Telegram-based marketplace called Xinbi Guarantee has facilitated no less than $8.4 billion in transactions since 2022, making it the second major black market to be exposed after HuiOne Guarantee. According to a report published by blockchain analytics firm Elliptic, merchants on the marketplace have been found to peddle technology, personal data, and money … Read More “Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering – The Hacker News” »
Willkommen and welcome to the inuaguaral Pwn2Own Berlin! Not only is this our first time at the OffensiveCon conference, but it’s also our first time including an AI category in the event. We’ve assembled some of the finest security researchers in the world to test the security of these systems, and we can’t wait to … Read More “Pwn2Own Berlin: The Full Schedule – Zero Day Initiative – Blog” »
Android Enterprise introduced Device Trust to enhance mobile security on Android devices – Read More –
Weak passwords continue to be a major vulnerability for FTP servers. Specops’ latest report highlights the most frequent… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A new global phishing threat called “Meta Mirage” has been uncovered, targeting businesses using Meta’s Business Suite. This campaign specifically aims at hijacking high-value accounts, including those managing advertising and official brand pages. Cybersecurity researchers at CTM360 revealed that attackers behind Meta Mirage impersonate official Meta communications, tricking users into handing – Read More – … Read More “CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users – The Hacker News” »
CISA paused plans to overhaul its advisory system after backlash from the infosec community – Read More –
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install … Read More “Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Did Siri record you? Apple is paying $95 million over Siri snooping allegations. Find out if you’re eligible… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Microsoft on Tuesday released software updates to fix at least 70 vulnerabilities in Windows and related products, including five zero-day flaws that are already seeing active exploitation. Adding to the sense of urgency with this month’s patch batch from Redmond are fixes for two other weaknesses that now have public proof-of-concept exploits available. Microsoft and … Read More “Patch Tuesday, May 2025 Edition – Krebs on Security” »
Fortinet and Ivanti published advisories on the same day revealing that attackers are exploiting new zero days, one of which is rated critical – Read More –
Cybersecurity researchers have discovered a new phishing campaign that’s being used to distribute malware called Horabot targeting Windows users in Latin American countries like Mexico, Guatemala, Colombia, Peru, Chile, and Argentina. The campaign is “using crafted emails that impersonate invoices or financial documents to trick victims into opening malicious attachments and can steal email – … Read More “Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails – The Hacker News” »
Organizations across industries are experiencing significant escalations in cyberattacks, particularly targeting critical infrastructure providers and cloud-based enterprises. Verizon’s recently released 2025 Data Breach Investigations Report found an 18% YoY increase in confirmed breaches, with the exploitation of vulnerabilities as an initial access step growing by 34%. As attacks rise – Read More – The Hacker … Read More “Learning How to Hack: Why Offensive Security Training Benefits Your Entire Security Team – The Hacker News” »
A cyber espionage group known as Earth Ammit has been linked to two related but distinct campaigns from 2023 to 2024 targeting various entities in Taiwan and South Korea, including military, satellite, heavy industry, media, technology, software services, and healthcare sectors. Cybersecurity firm Trend Micro said the first wave, codenamed VENOM, mainly targeted software service … Read More “Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns – The Hacker News” »
While appearing unsophisticated on the surface, Chihuahua Stealer uses advanced methods – Read More –
Scammers impersonate government agencies on WhatsApp to target job seekers with fake offers, phishing sites, and identity theft… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cary, North Carolina, 14th May 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto