Palo Alto Networks, Cloudflare and Zscaler were also among confirmed victims of the attack – Read More –
Author: Joe-W
Security researchers have discovered a new malicious campaign impacting hundreds of GitHub users – Read More –
When Attackers Get Hired: Today’s New Identity Crisis What if the star engineer you just hired isn’t actually an employee, but an attacker in disguise? This isn’t phishing; it’s infiltration by onboarding. Meet “Jordan from Colorado,” who has a strong resume, convincing references, a clean background check, even a digital footprint that checks out. On … Read More “You Didn’t Get Phished — You Onboarded the Attacker – The Hacker News” »
Zero Trust Micro-segmentation: Practical Deployment Tips for Modern Enterprises – JISA Softech Pvt Ltd
Zero Trust micro-segmentation is quickly becoming the standard for preventing breaches and improving network resilience. Without it, modern hybrid… The post Zero Trust Micro-segmentation: Practical Deployment Tips for Modern Enterprises appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Critical SAP S/4HANA vulnerability CVE-2025-42957 is being exploited in the wild – Read More –
Salesloft Drift Breach Traced to GitHub Compromise and Stolen OAuth Tokens – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Salesloft Drift breach traced to GitHub compromise and stolen OAuth tokens, Mandiant confirms breach contained and Salesforce data targeted. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector in Kazakhstan. The activity, codenamed Operation BarrelFire, is tied to a new threat group tracked by Seqrite Labs as Noisy Bear. The threat actor has been active since at least April 2025. “The campaign is … Read More “Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign – The Hacker News” »
Critical SAP Vulnerability CVE-2025-42957 Actively Exploited by Hackers – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Urgent security alert for SAP users! A critical vulnerability (CVE-2025-42957) allows attackers to take full control of your… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
GhostAction Attack Steals 3,325 Secrets from GitHub Projects – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
GhostAction supply chain attack hit 817 GitHub repositories, stealing 3,325 secrets including npm, PyPI, and DockerHub tokens. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A new set of four malicious packages have been discovered in the npm package registry with capabilities to steal cryptocurrency wallet credentials from Ethereum developers. “The packages masquerade as legitimate cryptographic utilities and Flashbots MEV infrastructure while secretly exfiltrating private keys and mnemonic seeds to a Telegram bot controlled by the threat actor,” Socket researcher … Read More “Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys – The Hacker News” »
The chairman of the Federal Trade Commission (FTC) last week sent a letter to Google’s CEO demanding to know why Gmail was blocking messages from Republican senders while allegedly failing to block similar missives supporting Democrats. The letter followed media reports accusing Gmail of disproportionately flagging messages from the GOP fundraising platform WinRed and sending … Read More “GOP Cries Censorship Over Spam Filters That Work – Krebs on Security” »
Bridgestone Confirms Cyberattack Disrupting North American Plants – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Bridgestone confirms a cyberattack that disrupted manufacturing plants. This article details the impact on employees, expert analysis, and… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution. … Read More “Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
Chess.com Hit by Limited Data Breach Linked to 3rd-Party File Transfer Tool – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Chess.com confirms a limited data breach affecting 4,500 users after a third-party file transfer tool was compromised. No… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation – The Hacker News
Federal Civilian Executive Branch (FCEB) agencies are being advised to update their Sitecore instances by September 25, 2025, following the discovery of a security flaw that has come under active exploitation in the wild. The vulnerability, tracked as CVE-2025-53690, carries a CVSS score of 9.0 out of a maximum of 10.0, indicating critical severity. “Sitecore … Read More “CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation – The Hacker News” »
Researchers at New York University have taken credit for creating a piece of malware found by third-party researchers that uses prompt injection to manipulate a large language model into assisting with a ransomware attack. Last month, researchers at ESET claimed to have discovered the first piece of “AI-powered ransomware” in the wild, flagging code found … Read More “NYU team behind AI-powered malware dubbed ‘PromptLock’ – CyberScoop” »
Parents are being reminded to exercise caution about the toys that they purchase their children, after the United States Federal Trade Commission (FTC) announced it had taken action against a robot toy maker. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
A 30‑year‑old man has been charged with launching a cyberattack on the German subsidiary of Russia’s state-owned oil giant Rosneft. The cyberattack, which happened in March 2022 in the aftermath of Russia’s invasion of Ukraine, crippled the company’s operations and cost millions of euros in damages. Read more in my article on the Exponential-e blog. … Read More “Germany charges hacker with Rosneft cyberattack in latest wake-up call for critical infrastructure – Graham Cluley” »
TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations – The Hacker News
The threat actor behind the malware-as-a-service (MaaS) framework and loader called CastleLoader has also developed a remote access trojan known as CastleRAT. “Available in both Python and C variants, CastleRAT’s core functionality consists of collecting system information, downloading and executing additional payloads, and executing commands via CMD and PowerShell,” Recorded Future Insikt Group – Read … Read More “TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations – The Hacker News” »
Bridgestone Americas confirmed the incident but has not detailed the scope of the attack – Read More –
An investigation has revealed that files were stolen in a data breach affecting a South Carolina school district – Read More –
Scammers Exploit Grok AI With Video Ad Scam to Push Malware on X – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Researchers at Guardio Labs have uncovered a new “Grokking” scam where attackers trick Grok AI into spreading malicious… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A critical security vulnerability impacting SAP S/4HANA, an Enterprise Resource Planning (ERP) software, has come under active exploitation in the wild. The command injection vulnerability, tracked as CVE-2025-42957 (CVSS score: 9.9), was fixed by SAP as part of its monthly updates last month. “SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability … Read More “SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild – The Hacker News” »
Trend Micro observed the attackers using terminal-based installation methods for the AMOS malware, luring macOS users into installing cracked versions of apps – Read More –
Pentesting remains one of the most effective ways to identify real-world security weaknesses before adversaries do. But as the threat landscape has evolved, the way we deliver pentest results hasn’t kept pace. Most organizations still rely on traditional reporting methods—static PDFs, emailed documents, and spreadsheet-based tracking. The problem? These outdated workflows introduce delays, – Read … Read More “Automation Is Redefining Pentest Delivery – The Hacker News” »
The OPSWAT report found that insider breaches cost impacted firms $2.7m on average due to factors such as regulatory fines and diminished productivity – Read More –
VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages – The Hacker News
Cybersecurity researchers have flagged a new malware campaign that has leveraged Scalable Vector Graphics (SVG) files as part of phishing attacks impersonating the Colombian judicial system. The SVG files, according to VirusTotal, are distributed via email and designed to execute an embedded JavaScript payload, which then decodes and injects a Base64-encoded HTML phishing page masquerading … Read More “VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages – The Hacker News” »
Artificial intelligence (AI) redefines the financial landscape as it never happened before, getting approval of credits quicker in an… The post Why the World Needs Responsible AI for Financial Inclusion Now appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Russian APT28 Deploys “NotDoor” Backdoor Through Microsoft Outlook – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
APT28 hackers deploy NotDoor backdoor via Microsoft Outlook macros, using OneDrive sideloading to steal data and evade detection. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Model Namespace Reuse Flaw Hijacks AI Models on Google and Microsoft Platforms – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A new security vulnerability called ‘Model Namespace Reuse’ allows attackers to hijack AI models on Google, Microsoft, and… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module – The Hacker News
Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at least 65 Windows servers primarily located in Brazil, Thailand, and Vietnam. The attacks, per Slovak cybersecurity company ESET, led to the deployment of a passive C++ backdoor called Rungan and a native Internet Information Services … Read More “GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module – The Hacker News” »
Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries – The Hacker News
The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor “is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word,” S2 Grupo’s LAB52 threat intelligence team said. … Read More “Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries – The Hacker News” »
Artificial intelligence could be a key tool for helping organizations keep track of an ever-expanding catalog of identified software flaws, a top official at the Cybersecurity and Infrastructure Security Agency said Thursday. CISA sponsors the Common Vulnerabilities and Exposures (CVE) program, which publishes standardized data about known cyber vulnerabilities. The number of vulnerabilities the CVE … Read More “AI can help track an ever-growing body of vulnerabilities, CISA official says – CyberScoop” »
An attacker exploited a zero-day vulnerability in Sitecore stemming from a misconfiguration of public ASP.NET machine keys that customers implemented based on the vendor’s documentation, according to researchers. The critical zero-day defect — CVE-2025-53690 — was exploited by the attacker using exposed keys to achieve remote code execution, Mandiant Threat Defense said in a report … Read More “Sitecore zero-day vulnerability springs up from exposed machine key – CyberScoop” »
The joint guidance is a welcome first step towards a common, global adoption of SBOMs, experts argued – Read More –
A newly identified hacking group named GhostRedirector has compromised 65 Windows servers using previously unknown tools – Read More –
North Korean hackers have been observed exploiting cyber threat intelligence platforms in a campaign targeting job seekers with malware-laced lures – Read More –
New Malware Uses Windows Character Map for Cryptomining – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Darktrace reports new malware hijacking Windows Character Map for cryptomining, exposing risks of hidden attacks in everyday software… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Scattered Lapsus$ Hunters Demand Google Fire Security Experts or Face Data Leak – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Scattered Lapsus$ Hunters threaten Google, demanding that two security experts, Austin Larsen of Google’s Threat Intelligence Group and Charles Carmakal of Mandiant, be fired or they will leak alleged stolen Google data. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Sendmarc appoints Rob Bowker as North American Region Lead – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Wilmington, United States, 4th September 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Google Cloud’s Mandiant successfully disrupted an active ViewState deserialization attack affecting Sitecore deployments – Read More –
Post Content – Read More – IC3.gov News
JLR said it is investigating following claims by the actor “Scattered Lapsus$ Hunters” that it had stolen data from the firm and had issued an extortion demand – Read More –
Zero Trust Architecture (ZTA) is not a new thing, it is now a reality of the working world of… The post Building Zero Trust Architecture with Real-World Constraints appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting TP-Link wireless routers to its Known Exploited Vulnerabilities (KEV) catalog, noting that there is evidence of them being exploited in the wild. The vulnerabilities in question are listed below – CVE-2023-50224 (CVSS score: 6.5) – An authentication bypass by spoofing … Read More “CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited – The Hacker News” »
The French data protection authority has fined Google and Chinese e-commerce giant Shein $379 million (€325 million) and $175 million (€150 million), respectively, for violating cookie rules. Both companies set advertising cookies on users’ browsers without securing their consent, the National Commission on Informatics and Liberty (CNIL) said. Shein has since updated its systems to … Read More “Google Fined $379 Million by French Regulator for Cookie Consent Violations – The Hacker News” »
Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions – The Hacker News
Cybersecurity researchers have flagged a new technique that cybercriminals have adopted to bypass social media platform X’s malvertising protections and propagate malicious links using its artificial intelligence (AI) assistant Grok. The findings were highlighted by Nati Tal, head of Guardio Labs, in a series of posts on X. The technique has been codenamed Grokking. The … Read More “Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions – The Hacker News” »
CISA Adds TP-Link Wi-Fi and WhatsApp Spyware Flaws to KEV List – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
CISA updates its KEV List with TP-Link Wi-Fi extender and WhatsApp spyware flaws, urging users and agencies to… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; … Read More “Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Hackers are using legitimate red team tool Hexstrike-AI to simplify and speed up vulnerability exploitation – Read More –