HP Wolf has reported the use of multiple, uncommon binaries and novel uses of legitimate image files in recent malicious campaigns – Read More –
Author: Joe-W
Scattered Lapsus$ Hunters Hacker Group Announces Shutdown – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Scattered Lapsus$ Hunters, linked to the Jaguar Land Rover cyberattack, claims to shut down as experts suggest the… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting Dassault Systèmes DELMIA Apriso Manufacturing Operations Management (MOM) software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2025-5086, carries a CVSS score of 9.0 out of 10.0. According to – … Read More “Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning – The Hacker News” »
Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware, while also incorporating the ability to bypass the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems using a now-patched vulnerability disclosed earlier this year. Slovakian cybersecurity company ESET said the samples were uploaded – Read More – … Read More “New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit – The Hacker News” »
Muck Stealer Malware Used Alongside Phishing in New Attack Waves – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A new report from Cofense reveals that cybercriminals are blending phishing and malware, including Muck Stealer, Info Stealer,… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Apple has sent at least four notifications in 2025, according to the French national cybersecurity agency – Read More –
The security landscape for cloud-native applications is undergoing a profound transformation. Containers, Kubernetes, and serverless technologies are now the default for modern enterprises, accelerating delivery but also expanding the attack surface in ways traditional security models can’t keep up with. As adoption grows, so does complexity. Security teams are asked to monitor sprawling hybrid – … Read More “Cloud-Native Security in 2025: Why Runtime Visibility Must Take Center Stage – The Hacker News” »
ICO warned that growing hacks by children into school computer systems is setting them up for “a life of cybercrime” – Read More –
Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories – The Hacker News
A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when a maliciously crafted repository is opened using the program. The issue stems from the fact that an out-of-the-box security setting is disabled by default, opening the door for attackers to run arbitrary code on users’ … Read More “Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories – The Hacker News” »
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; … Read More “Critical Patches Issued for Microsoft Products, September 09, 2025 – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Ivanti products, the most severe of which could allow for remote code execution. Ivanti Endpoint Manager is a client-based unified endpoint management software Ivanti Connect Secure is an SSL VPN solution for remote and mobile users. Ivanti Policy Secure (IPS) is a network access control (NAC) solution which provides … Read More “Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe Acrobat Reader is a free software for viewing, printing, and annotating PDF files. Adobe After Effects is a digital software program used to create and composite visual effects, motion graphics, and animations for film, television, … Read More “Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
A top official at the Cybersecurity and Infrastructure Security Agency on Thursday rejected concerns that personnel and program cuts at CISA have hindered its work. Nick Andersen, who just began serving as executive assistant director of cybersecurity at CISA this month, said he’s seen the agency function at a high level from both the outside … Read More “CISA work not ‘degraded’ by Trump administration cuts, top agency official says – CyberScoop” »
New Google AppSheet Phishing Scam Deliver Fake Trademark Notices – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A phishing scam is exploiting Google’s trusted AppSheet platform to bypass email filters. Learn how hackers are using… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Senator Urges FTC Probe Into Microsoft After Ascension Ransomware Attack – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
US Senator Ron Wyden urges the FTC to investigate Microsoft after its software contributed to a major ransomware… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
In May 2025, the European Union levied financial sanctions on the owners of Stark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of Kremlin-linked cyberattacks and disinformation campaigns. But new findings show those sanctions have done little to stop Stark from simply rebranding … Read More “Bulletproof Host Stark Industries Evades EU Sanctions – Krebs on Security” »
F5, a Seattle-based application delivery and security company, announced Thursday it will acquire Dublin-based CalypsoAI for $180 million in cash, highlighting the mounting security challenges enterprises face as they rapidly integrate artificial intelligence into their operations. The acquisition comes as companies across industries rush to deploy generative AI systems while grappling with new categories of … Read More “F5 to acquire AI security firm CalypsoAI for $180 million – CyberScoop” »
Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence – The Hacker News
U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to probe Microsoft and hold it responsible for what he called “gross cybersecurity negligence” that enabled ransomware attacks on U.S. critical infrastructure, including against healthcare networks. “Without timely action, Microsoft’s culture of negligent cybersecurity, combined with its de facto monopolization of the – … Read More “Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence – The Hacker News” »
Google on Tuesday announced that its new Google Pixel 10 phones support the Coalition for Content Provenance and Authenticity (C2PA) standard out of the box to verify the origin and history of digital content. To that end, support for C2PA’s Content Credentials has been added to Pixel Camera and Google Photos apps for Android. The … Read More “Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity – The Hacker News” »
The US cybersecurity agency called for the CVE program to remain publicly maintained and vendor-neutral while emphasizing the need for broader engagement – Read More –
A sophisticated fileless malware campaign has been observed using legitimate tools to deliver AsyncRAT executed in memory – Read More –
Senator Ron Wyden of Oregon has urged the FTC to investigate Microsoft for cybersecurity lapses linked to ransomware attacks on US critical infrastructure – Read More –
UK Rail Operator LNER Confirms Cyber Attack Exposing Passenger Data – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
LNER cyber attack exposes passenger contact details and journey data. No financial information or passwords were taken, but… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
In the highly connected modern world, security operations (SecOps) teams can be seen as the first line of defense… The post Building Security Operations That Scale and Don’t Burn Out appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Bitdefender said the sophisticated multi-stage operation allowed attackers to maintain persistent access and steal sensitive data from a Philippines military company – Read More –
ChillyHell macOS Malware Resurfaces, Using Google.com as a Decoy – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A previously dormant macOS threat, ChillyHell, is reviving. Read how this malware can bypass security checks, remain hidden,… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers – The Hacker News
Threat actors affiliated with the Akira ransomware group have continued to target SonicWall devices for initial access. Cybersecurity firm Rapid7 said it observed a spike in intrusions involving SonicWall appliances over the past month, particularly following reports about renewed Akira ransomware activity since late July 2025. SonicWall subsequently revealed the SSL VPN activity aimed at … Read More “SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers – The Hacker News” »
Compromised data includes personal data such as patients’ full names, ages, phone numbers and email addresses – Read More –
CISOs know their field. They understand the threat landscape. They understand how to build a strong and cost-effective security stack. They understand how to staff out their organization. They understand the intricacies of compliance. They understand what it takes to reduce risk. Yet one question comes up again and again in our conversations with these … Read More “Cracking the Boardroom Code: Helping CISOs Speak the Language of Business – The Hacker News” »
Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts – The Hacker News
Cybersecurity researchers have disclosed two new campaigns that are serving fake browser extensions using malicious ads and fake websites to steal sensitive data. The malvertising campaign, per Bitdefender, is designed to push fake “Meta Verified” browser extensions named SocialMetrics Pro that claim to unlock the blue check badge for Facebook and Instagram profiles. At least … Read More “Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts – The Hacker News” »
US offers $11m as LockerGoga ransomware suspect becomes one of Europe’s most wanted men – Read More –
1.5 billion packets per second DDoS attack detected with FastNetMon – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
London, United Kingdom, 11th September 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Government-run train operator LNER has revealed details of a supplier data breach – Read More –
Cybersecurity researchers have disclosed details of a new campaign that leverages ConnectWise ScreenConnect, a legitimate Remote Monitoring and Management (RMM) software, to deliver a fleshless loader that drops a remote access trojan (RAT) called AsyncRAT to steal sensitive data from compromised hosts. “The attacker used ScreenConnect to gain remote access, then executed a layered VBScript … Read More “AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto – The Hacker News” »
Re: Apple’s A17 Pro Chip: Critical Flaw Causes Dual Subsystem Failure & Forensic Log Loss – Full Disclosure
Posted by Matthew Fernandez on Sep 10 Can you elaborate on why you consider this high severity? From the description, it sounds as if this behaviour is fail-closed. That is, the effects are limited to DoS, with security properties preserved. – Read More – Full Disclosure
Posted by naphthalin via Fulldisclosure on Sep 10 “I know where your children go to school.” The web front end of the IServ school server from IServ GmbH allows user enumeration. Responses during failed login attempts differ, depending on if the user account exists, does not exist and other conditions. While this does not … Read More “User Enumeration in IServ Schoolserver Web Login – Full Disclosure” »
Ever wondered what would happen if Burger King left the keys to the kingdom lying around for anyone to use? Ethical hackers did – and uncovered drive-thru recordings, hard-coded passwords, and even the power to open a Whopper outlet on the moon. Meanwhile, over in Silicon Valley, one AI wunderkind managed to turn a $7 … Read More “Smashing Security podcast #434: Whopper Hackers, and AI Whoppers – Graham Cluley” »
A US federal court has unssealed charges against a Ukrainian national who authorities allege was a key figure behind several strains of ransomware, including LockerGoga, MegaCortex, and Nefilim. Read more in my article on the Fortra blog. – Read More – Graham Cluley
Wyden calls on FTC to investigate Microsoft for ‘gross cybersecurity negligence’ in protecting critical infrastructure – CyberScoop
Sen. Ron Wyden, D-Ore., on Wednesday called for the Federal Trade Commission to investigate Microsoft, saying the company’s default configurations are leaving customers vulnerable and contributing to ransomware, hacking and other threats. That includes the 2024 Ascension hospital ransomware attack, which resulted in the theft of personal data, medical data, payment information, insurance information and … Read More “Wyden calls on FTC to investigate Microsoft for ‘gross cybersecurity negligence’ in protecting critical infrastructure – CyberScoop” »
Major cyber intrusions by the Chinese hacking groups known as Salt Typhoon and Volt Typhoon have forced the FBI to change its methods of hunting sophisticated threats, a top FBI cyber official said Wednesday. U.S. officials, allied governments and threat researchers have identified Salt Typhoon as the group behind the massive telecommunications hack revealed last … Read More “China’s ‘Typhoons’ changing the way FBI hunts sophisticated threats – CyberScoop” »
New Fileless Malware Attack Uses AsyncRAT for Credential Theft – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
LevelBlue Labs reports AsyncRAT delivered through a fileless attack chain using ScreenConnect, enabling credential theft and persistence. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Chinese APT Hits Philippine Military Firm with New EggStreme Fileless Malware – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Bitdefender uncovers EggStreme, a fileless malware by a China-based APT targeting the Philippine military and APAC organisations. Cybersecurity… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems – The Hacker News
An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a previously undocumented fileless malware framework called EggStreme. “This multi-stage toolset achieves persistent, low-profile espionage by injecting malicious code directly into memory and leveraging DLL sideloading to execute payloads,” Bitdefender – Read More – The … Read More “Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems – The Hacker News” »
A joint investigative sweep across three states kicked off this week aimed at identifying companies that aren’t following opt-out laws for collecting consumer data. The efforts, led by the state attorneys general, the California Privacy Protection Agency and other state regulators, will involve contacting businesses across all three states who may not be processing opt-out … Read More “Three states team up in investigative sweep of companies flouting data opt-out laws – CyberScoop” »
A ransomware attack by KillSec on Brazil software provider MedicSolution threatens healthcare, impacting providers and patients – Read More –
Kikimora Announces Launch of Kikimora Agent: Accessible AI-Powered Cybersecurity Platform for SME Security – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Sofia, Bulgaria, 10th September 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Security professionals and observers across the industry got swept into a pit of fear Monday when an attacker took over and injected malicious code into a series of widely used open-source packages in the node.js package manager, or npm. Despite all that worry, the disaster that many presumed a foregone conclusion was averted and the … Read More “The npm incident frightened everyone, but ended up being nothing to fret about – CyberScoop” »
Apple’s new Memory Integrity Enforcement system deals a huge blow to spyware developers – CyberScoop
Apple has unveiled a comprehensive security system called Memory Integrity Enforcement (MIE) that represents a five-year engineering effort to combat sophisticated cyberattacks targeting individual users through memory corruption vulnerabilities. The technology is built into Apple’s new iPhone 17 and iPhone Air devices, as well as the A19 and A19 Pro chips. It combines custom-designed hardware … Read More “Apple’s new Memory Integrity Enforcement system deals a huge blow to spyware developers – CyberScoop” »
The post Acting federal cyber chief outlines his three priorities for the next year appeared first on CyberScoop. – Read More – CyberScoop
CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems – The Hacker News
Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called CHILLYHELL and a Go-based remote access trojan (RAT) named ZynorRAT that can target both Windows and Linux systems. According to an analysis from Jamf Threat Labs, ChillyHell is written in C++ and is developed for Intel architectures. CHILLYHELL is the … Read More “CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems – The Hacker News” »