Threat Actors Abuse Trust in Cloud Collaboration Platforms –
Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials – Read More –
Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials – Read More –
The Iris Experts Group is a forum for the discussion of technical questions of interest to USG agencies and their staff that are employing or may employ iris recognition to carry out their mission. This is the annual meeting. The presentations – Read More – News and Events Feed by Topic
The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor’s tradecraft. The activity, observed by Romanian cybersecurity company Bitdefender, involves the deployment of a never-before-seen ransomware strain dubbed QWCrypt. RedCurl, also called Earth Kapre and Red Wolf, has a history of orchestrating – Read More –...
The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as a zero-day to deliver a wide range of malware families, including backdoors and information stealers such as Rhadamanthys and StealC. “In this attack, the threat actor manipulates .msc files and the Multilingual User Interface Path (MUIPath) to download and execute malicious payload, – Read More ...
A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development environments – Read More –
“A boxer derives the greatest advantage from his sparring partner…” — Epictetus, 50–135 AD Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and circle. Red throws out three jabs, feints a fourth, and—BANG—lands a right hand on Blue down the center. This wasn’t Blue’s first day and despite his solid defense in...
Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of software supply chain attacks targeting the open-source ecosystem. The packages in question are ethers-provider2 and ethers-providerz, with the former downloaded 73 times to date since it was published on – Read More – The Hacker...
Veer Chetal, known online as “Wiz” and one of the key suspects in the massive $243 million cryptocurrency heist, has been apprehended by U.S. Marshals. – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Standards body ETSI has defined a scheme for key encapsulation mechanisms with access control (KEMAC), enabling quantum-secure encryption – Read More –
When people think of cybersecurity threats, they often picture external hackers breaking into networks. However, some of the most damaging breaches stem from within organizations. Whether through negligence or malicious intent, insiders can expose your organization to significant cybersecurity risks. According to Verizon’s 2024 Data Breach Investigations Report, 57% of companies experience over – Read More – The Hacker News
EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector – Read More –
The UK government’s new fraud minister will today announce plans for a newly expanded fraud strategy – Read More –
Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according to findings from Abnormal Security. Atlantis AIO “has emerged as a powerful weapon in the cybercriminal arsenal, enabling attackers to test millions of stolen credentials in rapid succession,” the cybersecurity company said in an analysis. Credential stuffing is a – Read More –...
Broadcom has issued security patches to address a high-severity security flaw in VMware Tools for Windows that could lead to an authentication bypass. Tracked as CVE-2025-22230, the vulnerability is rated 7.8 on the ten-point Common Vulnerability Scoring System (CVSS). “VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control,” Broadcom said in an – Read More ...
Google has released out-of-band fixes to address a high-severity security flaw in its Chrome browser for Windows that it said has been exploited in the wild as part of attacks targeting organizations in Russia. The vulnerability, tracked as CVE-2025-2783, has been described as a case of “incorrect handle provided in unspecified circumstances in Mojo on Windows.” Mojo refers to a ...
President Donald Trump issued an executive order Tuesday that threatens states with the loss of federal election grants unless they comply with a broad list of requirements concerning the administration of elections. The order makes numerous inaccurate and misleading claims about American elections, many of which mirror older allegations that Trump made regularly on the campaign trail. Those include claims...
Satellite navigation systems are under rising threat from jamming and spoofing attacks, risking aviation, maritime, and telecom safety worldwide, warn global agencies. – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Democratic senators hammered two top national security officials Tuesday about their participation in a Signal chat discussing war plans that reportedly included a journalist, but struggled to get specific answers to some of their questions about what happened and how. Director of National Intelligence Tulsi Gabbard wouldn’t even initially acknowledge her involvement in the chat group, where, as reported by The...
McAfee Labs reveals new Android malware exploiting .NET MAUI to steal user data. Learn about advanced evasion techniques and how to stay protected. – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user information through fake apps – Read More –
Cybercriminals are increasingly leveraging Atlantis AIO, which automates credential stuffing attacks across more than 140 platforms – Read More –
Alisa Viejo, United States, 25th March 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
In episode 43 of The AI Fix, our hosts discover a robot that isn’t terrifying, a newspaper shuns journalists in favour of AI, Graham watches a robot dog learn to stand, an AI computer programmer develops a familiar attitude, and New York tries to stop its humans arming their robots. Graham worries about AI vomit, a Norwegian man is falsely...
Governments should prioritize the use of privacy-boosting technologies like encryption, de-identification and hashing to prevent breaches and data misuse, a report that New America’s Open Technology Institute published Tuesday recommends. The study comes as cyber and privacy experts warn about the dangers of the Trump administration’s Department of Government Efficiency (DOGE) accessing sensitive information at federal agencies, also the subject...
Ramat Gan, Israel, 25th March 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
A new investigation has unearthed nearly 200 unique command-and-control (C2) domains associated with a malware called Raspberry Robin. “Raspberry Robin (also known as Roshtyak or Storm-0856) is a complex and evolving threat actor that provides initial access broker (IAB) services to numerous criminal groups, many of which have connections to Russia,” Silent Push said in a report shared with The ...
NIST has urged more research and emphasis on developing mitigations for attacks on AI and ML systems – Read More –
A major telecommunications company located in Asia was allegedly breached by Chinese state-sponsored hackers who spent over four years inside its systems, according to a new report from incident response firm Sygnia. The cybersecurity company is tracking the activity under the name Weaver Ant, describing the threat actor as stealthy and highly persistent. The name of the telecom provider was...
Cybercriminals exploit AbyssWorker driver to disable EDR systems, deploying MEDUSA ransomware with revoked certificates for stealthy attacks. – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Sygnia has uncovered Weaver Ant, a Chinese threat actor that spied on telecommunications networks for years – Read More –
Kela researchers detect a 200%+ increase in dark web chatter about malicious AI tools – Read More –
Organizations now use an average of 112 SaaS applications—a number that keeps growing. In a 2024 study, 49% of 644 respondents who frequently used Microsoft 365 believed that they had less than 10 apps connected to the platform, despite the fact that aggregated data indicated over 1,000+ Microsoft 365 SaaS-to-SaaS connections on average per deployment. And that’s just one major...
Cybersecurity researchers are calling attention to an Android malware campaign that leverages Microsoft’s .NET Multi-platform App UI (.NET MAUI) framework to create bogus banking and social media apps targeting Indian and Chinese-speaking users. “These threats disguise themselves as legitimate apps, targeting users to steal sensitive information,” McAfee Labs researcher Dexter Shin said. .NET – Read More – The Hacker News
Wiz Security finds four critical RCE vulnerabilities in the Ingress NGINX Controller for Kubernetes – Read More –
Law enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation codenamed Red Card that took place between November 2024 and February 2025. The coordinated effort “aims to disrupt and dismantle cross-border criminal networks which cause significant harm to individuals and businesses,” INTERPOL said, adding it – Read More –...
Principles-based guidance for organisations setting up a PAW solution. – Read More – NCSC Feed
Posted by Andrey Stoykov on Mar 24 # Exploit Title: Stored XSS via Send Message Functionality – dolphin.prov7.4.2 # Date: 03/2025 # Exploit Author: Andrey Stoykov # Version: 7.4.2 # Date: 03/2025 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/2025/03/friday-fun-pentest-series-20-stored-xss.html Stored XSS via Send Message Functionality: Steps to Reproduce: 1. Login and visit “http://192.168.58.170/dolphinCMS/mail.php?mode=compose" 2. Add… – Read More –...
Posted by Andrey Stoykov on Mar 24 # Exploit Title: SQL Injection in Admin Functionality – dolphin.prov7.4.2 # Date: 03/2025 # Exploit Author: Andrey Stoykov # Version: 7.4.2 # Date: 03/2025 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/2025/03/friday-fun-pentest-series-21-sql.html SQL Injection in Admin Functionality: Steps to Reproduce: 1. Login as admin user and visit the page of “ http://192.168.58.170/dolphinCMS/administration/index.php?cat="...
In-game skins are more than just cosmetic upgrades, they’re a core part of gaming culture. Whether you’re looking… – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Researchers warn that attackers could exploit a recently discovered critical vulnerability in the open-source JavaScript framework Next.js to bypass authorization in middleware and gain access to targeted systems. Vercel, the San Francisco-based company that created and maintains Next.js, released a patch for CVE-2025-29927 in Next.js 15.2.3 on March 18 and published a security advisory on March 21. Researchers Allam Rachid...
When you think of malware, your mind probably jumps to malicious downloads or email attachments. But it turns… – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Oracle is caught up in a cybersecurity mess right now, with claims about a massive data breach affecting… – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
A set of five critical security shortcomings have been disclosed in the Ingress NGINX Controller for Kubernetes that could result in unauthenticated remote code execution, putting over 6,500 clusters at immediate risk by exposing the component to the public internet. The vulnerabilities (CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, and CVE-2025-1974 ), assigned a CVSS score of – Read More – The Hacker...
Genetic testing business 23andMe filed for bankruptcy Sunday, amplifying fears from privacy advocates that the DNA records and personal information of its 15 million customers could soon be up for sale to the highest bidder. 23andMe, which was once valued at $6 billion, has been experiencing financial distress and declining profits since going public in 2021. As part of the...
Cary, NC, 24th March 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
LayerX Labs reports a sophisticated macOS phishing campaign, evading security measures. Learn how attackers adapt and steal credentials from Mac users. – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
A Canadian citizen is one step closer to standing trial in the United States for his alleged involvement in a series of attacks targeting as many as 165 Snowflake customers, one of the most widespread and damaging attack sprees on record. Connor Moucka consented to extradition on Friday to face 20 federal charges, including conspiracy to commit computer fraud, accessing...
VanHelsingRaaS, a new ransomware-as-a-service program, infected three victims within two weeks of release, demanding ransoms of $500,000 – Read More –
Microsoft on Monday announced a new feature called inline data protection for its enterprise-focused Edge for Business web browser. The native data security control is designed to prevent employees from sharing sensitive company-related data into consumer generative artificial intelligence (GenAI) apps like OpenAI ChatGPT, Google Gemini, and DeepSeek. The list will be expanded over time to – Read More –...
Ukraine’s national railway company has suffered a “large-scale” cyber-attack, disrupting online services and operations – Read More –