Recruitment and retention remain a significant challenge for security teams, amid growing pressures on cyber professionals – Read More –
Author: Joe-W
If you can’t see your entire operational technology environment, you can’t defend it. New guidance from the NCSC will help you gain that visibility. – Read More – NCSC Feed
Cybersecurity researchers have discovered what has been described as the first-ever instance of a Model Context Protocol (MCP) server spotted in the wild, raising software supply chain risks. According to Koi Security, a legitimate-looking developer managed to slip in rogue code within an npm package called “postmark-mcp” that copied an official Postmark Labs library of … Read More “First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package – The Hacker News” »
Microsoft is calling attention to a new phishing campaign primarily aimed at U.S.-based organizations that has likely utilized code generated using large language models (LLMs) to obfuscate payloads and evade security defenses. “Appearing to be aided by a large language model (LLM), the activity obfuscated its behavior within an SVG file, leveraging business terminology and … Read More “Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security – The Hacker News” »
Akira ransomware attacks on SonicWall SSL VPN appliances are bypassing its MFA for rapid deployment – Read More –
Department store Harrods has notified e-commerce customers of a major data breach – Read More –
ThreatBook Launches Best-of-Breed Advanced Threat Intelligence Solution – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Singapore, Singapore, 29th September 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
India digital transformation of the financial ecosystem, the Reserve Bank of India (RBI) has announced its Cybersecurity Mandates 2025,… The post RBI’s Cybersecurity Mandates 2025: Securing India’s Digital Banks appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Medusa Ransomware Claims Comcast Data Breach, Demands $1.2M – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Medusa ransomware group claims 834 GB data theft from Comcast, demanding $1.2M ransom while sharing screenshots and file listings. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
On September 25, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in Google, WatchGuard, GoAnywhere, and SolarWinds products. On September 18, the MS-ISAC released an advisory for multiple vulnerabilities in Google Chrome, the most severe of which could allow for arbitrary code execution. On September 19, the … Read More “Threat Level – GUARDED – Cyber Threat Alert” »
WhatsApp Scams: The Latest Way Criminals Attack – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.
WhatsApp has become one of the most popular applications, with over 2 billion individuals using it for communication with friends and family. Unfortunately, this makes WhatsApp an easy way for cyber criminals to target unsuspecting individuals. Since the app is used for friendly methods, many assume that contact via WhatsApp can be trusted. It can’t … Read More “WhatsApp Scams: The Latest Way Criminals Attack – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.” »
China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks – The Hacker News
Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing campaign distributing a new variant of a known malware called PlugX (aka Korplug or SOGU). “The new variant’s features overlap with both the RainyDay and Turian backdoors, including abuse of the same legitimate applications for DLL side-loading, … Read More “China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks – The Hacker News” »
Hackers Use Fake Invoices to Spread XWorm RAT via Office Files – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Hackers are sending fake invoice emails with malicious Office files that install the XWorm RAT on Windows systems, allowing full remote access and data theft. Learn how the shellcode and process injection are used to steal data, and how to stay safe from this persistent threat. – Read More – Hackread – Latest Cybersecurity, Hacking … Read More “Hackers Use Fake Invoices to Spread XWorm RAT via Office Files – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto” »
The United Nations is making a push to more directly influence global policy on artificial intelligence, including the promotion of policymaking and technical standards around “safe, secure and trustworthy” AI. Last month, the world body finalized plans to create a new expert panel focused on developing scientific, technical and policy standards for the emerging technology. … Read More “UN seeks to build consensus on ‘safe, secure and trustworthy’ AI – CyberScoop” »
Google Ads Used to Spread Trojan Disguised as TradingView Premium – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Bitdefender warns that the TradingView Premium ad scam now targets Google ads and YouTube, hijacking verified channels to spread spyware. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A new campaign has been observed impersonating Ukrainian government agencies in phishing attacks to deliver CountLoader, which is then used to drop Amatera Stealer and PureMiner. “The phishing emails contain malicious Scalable Vector Graphics (SVG) files designed to trick recipients into opening harmful attachments,” Fortinet FortiGuard Labs researcher Yurren Wan said in a report shared … Read More “Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam – The Hacker News” »
Fake Ukraine Police Notices Spread New Amatera Stealer and PureMiner – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
FortiGuard Labs exposes a high-severity phishing campaign impersonating the National Police of Ukraine to deliver Amatera Stealer (data theft) and PureMiner (cryptojacking) to Windows PCs. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Threat intelligence professionals have a sense of foreboding about a maximum-severity vulnerability Forta disclosed last week in its file-transfer service GoAnywhere MFT, as they steel themselves for active exploitation and signs of compromise. Forta has not declared the defect actively exploited and did not answer questions to that effect from CyberScoop. Yet, researchers at watchTowr … Read More “Worries mount over max-severity GoAnywhere defect – CyberScoop” »
The Singapore police said Facebook is the top platform for online scams in the country – Read More –
New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks – The Hacker News
The Russian advanced persistent threat (APT) group known as COLDRIVER has been attributed to a fresh round of ClickFix-style attacks designed to deliver two new “lightweight” malware families tracked as BAITSWITCH and SIMPLEFIX. Zscaler ThreatLabz, which detected the new multi-stage ClickFix campaign earlier this month, described BAITSWITCH as a downloader that ultimately drops SIMPLEFIX, a … Read More “New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks – The Hacker News” »
Archer Health Data Leak Exposes 23GB of Medical Records – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
California-based Archer Health exposed 23GB of patient records, including SSNs, IDs, and medical files, after an unprotected database was found online. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Car makers don’t trust blueprints. They smash prototypes into walls. Again and again. In controlled conditions. Because design specs don’t prove survival. Crash tests do. They separate theory from reality. Cybersecurity is no different. Dashboards overflow with “critical” exposure alerts. Compliance reports tick every box. But none of that proves what matters most to a … Read More “Crash Tests for Security: Why BAS Is Proof of Defense, Not Assumptions – The Hacker News” »
An attack campaign has been identified which exploits vulnerabilities in Cisco Adaptive Security Appliance software – Read More –
The effort, named Operation Contender 3.0, led to the arrest of 260 suspected cybercriminals – Read More –
Cybersecurity researchers have discovered an updated version of a known Apple macOS malware called XCSSET that has been observed in limited attacks. “This new variant of XCSSET brings key changes related to browser targeting, clipboard hijacking, and persistence mechanisms,” the Microsoft Threat Intelligence team said in a Thursday report. “It employs sophisticated encryption and obfuscation … Read More “New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module – The Hacker News” »
Cybersecurity company watchTowr Labs has disclosed that it has “credible evidence” of active exploitation of the recently disclosed security flaw in Fortra GoAnywhere Managed File Transfer (MFT) software as early as September 10, 2025, a whole week before it was publicly disclosed. “This is not ‘just’ a CVSS 10.0 flaw in a solution long favored … Read More “Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure – The Hacker News” »
JLR said it is in a position to start clearing its backlog of payments for suppliers, while its parts logistics center is returning to full operations – Read More –
Trend Micro highlighted the new LockBit version’s improved technical improvements and cross-platform functionality compared to previous iterations – Read More –
The financial ecosystem in the world is on the edge of new unprecedented changes. We all enter a new… The post Charting a new decade of shared progress in global finance appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
The U.K. National Cyber Security Centre (NCSC) has revealed that threat actors have exploited the recently disclosed security flaws impacting Cisco firewalls as part of zero-day attacks to deliver previously undocumented malware families like RayInitiator and LINE VIPER. “The RayInitiator and LINE VIPER malware represent a significant evolution on that used in the previous campaign, … Read More “Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware – The Hacker News” »
The Cybersecurity and Infrastructure Security Agency acknowledged it’s yet to get a complete handle on the scope and impact of attacks involving Cisco zero-day vulnerabilities that prompted it to release an emergency directive Thursday. The attack timeline dates back almost a year, according to an investigation Cisco and federal authorities did behind the scenes to … Read More “CISA says it observed nearly year-old activity tied to Cisco zero-day attacks – CyberScoop” »
SEC Consult SA-20250925-0 :: Multiple Vulnerabilities in iMonitorSoft EAM employee monitoring #CVE-2025-10540 #CVE-2025-10541 #CVE-2025-10542 – Full Disclosure
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Sep 25 SEC Consult Vulnerability Lab Security Advisory < 20250925-0 > ======================================================================= title: Multiple Vulnerabilities product: iMonitorSoft EAM vulnerable version: iMonitor EAM 9.6394 fixed version: – CVE number: CVE-2025-10540, CVE-2025-10541, CVE-2025-10542 impact: Critical homepage:… – Read More – Full Disclosure
Posted by Antoine Martin via Fulldisclosure on Sep 25 1) About Xpra Xpra is known as “screen for X11”. https://xpra.org/ “Xpra forwards and synchronizes many extra desktop features, which allows remote applications to integrate transparently into the client’s desktop environment: audio input and output, printers, clipboard, system trays, notifications, webcams, etc.” 2) Vulnerability Using … Read More “xpra server information disclosure – Full Disclosure” »
CyberDanube Security Research 20250909-0 | Cross-Site Scripting in Schneider ATV 630 – Full Disclosure
Posted by Thomas Weber | CyberDanube via Fulldisclosure on Sep 25 CyberDanube Security Research 20250909-0 ——————————————————————————- title| Reflected XSS product| ATV 630 vulnerable version| “see Vulnerable versions” fixed version| none CVE number| CVE-2025-7746 impact| Medium homepage| https://www.se.com/ found| 2025-03-11 by| T…. – Read More – Full Disclosure
CyberDanube Security Research 20250919-0 | Multiple Vulnerabilities in Novakon P series – Full Disclosure
Posted by Thomas Weber | CyberDanube via Fulldisclosure on Sep 25 CyberDanube Security Research 20250919-0 ——————————————————————————- title| Multiple Vulnerabilities in Novakon HMI Series product| Novakon Touch Screen HMI P Series vulnerable version| P – V2001.A.c518o2 fixed version| – CVE number| CVE-2025-9962, CVE-2025-9963, CVE-2025-9964, | CVE-2025-9965, CVE-2025-9966… – Read More – Full Disclosure
SEC Consult SA-20250923-0 :: Missing Certificate Validation leading to RCE in CleverControl employee monitoring software #CVE-2025-10548 – Full Disclosure
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Sep 25 SEC Consult Vulnerability Lab Security Advisory < 20250923-0 > ======================================================================= title: Missing Certificate Validation leading to RCE product: CleverControl employee monitoring software vulnerable version: 11.5.1041.6 fixed version: – CVE number: CVE-2025-10548 impact: high homepage: https://clevercontrol.com… – Read More – Full Disclosure
A vulnerability has been discovered in Nx (build system) Package, which could allow for sensitive data exfiltration. Nx is a smart, fast, and extensible build system designed for managing monorepos efficiently by providing features like dependency graph analysis, computation caching, distributed task execution, and codebase upgrades. Successful exploitation of this vulnerability could allow an attacker … Read More “A Vulnerability in Nx (build system) Package Could Allow for Sensitive Data Exfiltration – Cyber Security Advisories – MS-ISAC” »
Federal cyber authorities sounded a rare alarm Thursday, issuing an emergency directive about an ongoing and widespread attack spree involving actively exploited zero-day vulnerabilities affecting Cisco firewalls. Cisco said it began investigating attacks on multiple government agencies linked to the state-sponsored campaign in May. The vendor, which attributes the attacks to the same threat group … Read More “CISA alerts federal agencies of widespread attacks using Cisco zero-days – CyberScoop” »
Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Austin / TX, United States, 25th September 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Hackers reportedly steal details of 8,000 children from Kido nursery chain – Data and computer security | The Guardian
Firm, which has 18 sites around London and more in US, India and China, has received ransom demand, say reports The names, pictures and addresses of about 8,000 children have reportedly been stolen from the Kido nursery chain by a gang of cybercriminals. The criminals have demanded a ransom from the company – which has … Read More “Hackers reportedly steal details of 8,000 children from Kido nursery chain – Data and computer security | The Guardian” »
Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network – The Hacker News
The threat actor known as Vane Viper has been outed as a purveyor of malicious ad technology (adtech), while relying on a tangled web of shell companies and opaque ownership structures to deliberately evade responsibility. “Vane Viper has provided core infrastructure in widespread malvertising, ad fraud, and cyberthreat proliferation for at least a decade,” Infoblox … Read More “Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network – The Hacker News” »
Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive – The Hacker News
Cisco is urging customers to patch two security flaws impacting the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software, which it said have been exploited in the wild. The zero-day vulnerabilities in question are listed below – CVE-2025-20333 (CVSS score: 9.9) – An … Read More “Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive – The Hacker News” »
Keir Starmer expected to announce plans for digital ID cards – Data and computer security | The Guardian
As government looks for ways to tackle illegal immigration, move will spark battle with civil liberties campaigners All working adults will need digital ID cards under plans to be announced by Keir Starmer in a move that will spark a battle with civil liberties campaigners. The prime minister will set out the plans on Friday … Read More “Keir Starmer expected to announce plans for digital ID cards – Data and computer security | The Guardian” »
Digital ID cards: a versatile and useful tool, or a worrying cybersecurity risk? – Data and computer security | The Guardian
As Keir Starmer appear poised to introduce such a scheme, we look at the arguments for and against it It is 21 years since Tony Blair’s government made proposals for an ID card system to tackle illegal working and immigration, and to make it more convenient for the public to access services. The same issues … Read More “Digital ID cards: a versatile and useful tool, or a worrying cybersecurity risk? – Data and computer security | The Guardian” »
Dem report concludes Department of Government Efficiency violates cybersecurity, privacy rules – CyberScoop
Department of Government Efficiency practices at three federal agencies “violate statutory requirements, creating unprecedented privacy and cybersecurity risks,” according to a report that Senate Homeland Security and Governmental Affairs Committee Democrats published Thursday. The report — drawn from a mix of media reports, legal filings, whistleblower disclosures to the committee and staff visits to the … Read More “Dem report concludes Department of Government Efficiency violates cybersecurity, privacy rules – CyberScoop” »
Vietnamese Hackers Use Fake Copyright Notices to Spread Lone None Stealer – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
New Lone None Stealer uses Telegram C2 and DLL side-loading to grab passwords, credit cards, and crypto. Find out how to spot this highly evasive phishing scam. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
ForcedLeak Flaw in Salesforce Agentforce AI Agent Exposed CRM Data – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cybersecurity firm Noma Security reveals ForcedLeak, a critical flaw in Salesforce Agentforce that allowed data theft. Learn what companies need to do now to secure AI agents. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Critical flaw ForcedLeak in Salesforce’s AgentForce allows CRM data theft via prompt injection – Read More –
Cisco Systems has issued security updates to address a critical vulnerability in its widely deployed IOS and IOS XE network operating systems, after confirming the flaw is being exploited in active attacks. Designated CVE-2025-20352, the vulnerability resides in the Simple Network Management Protocol (SNMP) subsystem of Cisco’s core network software. According to Cisco, the weakness … Read More “Cisco uncovers new SNMP vulnerability used in attacks on IOS devices – CyberScoop” »
The security researchers who discovered the malicious npm package called it the “first malicious MCP in the wild” – Read More –