Google is warning of a new credential theft campaign targeting Salesforce customers via Salesloft Drift – Read More –
Author: Joe-W
Abnormal AI said the campaign, which lures victims into downloading legitimate RMM software, marks a major evolution in phishing tactics – Read More –
Multiple vulnerabilities have been discovered in Commvault Backup & Recovery, which when chained together, could allow for remote code execution. Commvault Backup & Recovery is a comprehensive data protection solution that offers a range of services for safeguarding data across various environments, including on-premises, cloud, and hybrid setups. Successful exploitation of these vulnerabilities could allow … Read More “Multiple Vulnerabilities in Commvault Backup & Recovery Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
A vulnerability has been discovered in Apple products which could allow for arbitrary code execution. Successful exploitation could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with … Read More “A Vulnerability in Apple Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Mozilla Focus for iOS is a private mobile browser … Read More “Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user or exploited process. Depending on the privileges associated with the user or process, an … Read More “Multiple Vulnerabilities in Microsoft Products Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
Citrix NetScaler customers hit by third actively exploited zero-day vulnerability since June – CyberScoop
Citrix and cybersecurity researchers warn a critical, zero-day vulnerability affecting multiple versions of Citrix NetScaler products is under active exploitation. Citrix issued a security bulletin about the vulnerability — CVE-2025-7775 — and urged customers on affected versions to install upgrades Tuesday. The memory-overflow vulnerability, which has an initial CVSS rating of 9.2, can be exploited … Read More “Citrix NetScaler customers hit by third actively exploited zero-day vulnerability since June – CyberScoop” »
Hundreds of Salesforce customers impacted by attack spree linked to third-party AI agent – CyberScoop
Google Threat Intelligence Group warned about a “widespread data theft campaign” that compromised hundreds of Salesforce customers over a 10-day span earlier this month. According to a report published Thursday, researchers say a threat group Google tracks as UNC6395 stole large volumes of data from Salesforce customer instances by using stolen OAuth tokens from Salesloft … Read More “Hundreds of Salesforce customers impacted by attack spree linked to third-party AI agent – CyberScoop” »
DOGE employees uploaded Social Security database to ‘vulnerable’ cloud, agency whistleblower says – CyberScoop
The post DOGE employees uploaded Social Security database to ‘vulnerable’ cloud, agency whistleblower says appeared first on CyberScoop. – Read More – CyberScoop
Researchers at cybersecurity firm ESET claim to have identified the first piece of AI-powered ransomware in the wild. The malware, called PromptLock, essentially functions as a hard-coded prompt injection attack on a large language model, causing the model to assist in carrying out a ransomware attack. Written in Golang programming code, the malware sends its … Read More “Researchers flag code that uses AI systems to carry out ransomware attacks – CyberScoop” »
77 Malicious Android Apps With 19M Downloads Targeted 831 Banks Worldwide – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Zscaler reports 77 Android apps on Google Play with 19 million installs spread malware, hitting 831 banks and… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Court ruling in Epic-Google fight could have ‘catastrophic’ cyber consequences, former gov’t officials say – CyberScoop
A court injunction in the long fight between Fortnite publisher Epic Games and Google could have “catastrophic results for the nation’s security” and “risks creating massive cybersecurity vulnerabilities in the online ecosystem,” a group of former top government officials said in a filing Monday. At issue, they wrote, is a district court injunction requiring Google … Read More “Court ruling in Epic-Google fight could have ‘catastrophic’ cyber consequences, former gov’t officials say – CyberScoop” »
New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station – The Hacker News
A team of academics has devised a novel attack that can be used to downgrade a 5G connection to a lower generation without relying on a rogue base station (gNB). The attack, per the ASSET (Automated Systems SEcuriTy) Research Group at the Singapore University of Technology and Design (SUTD), relies on a new open-source software … Read More “New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station – The Hacker News” »
Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 – The Hacker News
Citrix has released fixes to address three security flaws in NetScaler ADC and NetScaler Gateway, including one that it said has been actively exploited in the wild. The vulnerabilities in question are listed below – CVE-2025-7775 (CVSS score: 9.2) – Memory overflow vulnerability leading to Remote Code Execution and/or Denial-of-Service CVE-2025-7776 (CVSS score: 8.8) – … Read More “Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 – The Hacker News” »
A new version of the Hook Android banking Trojan features 107 remote commands, including ransomware overlays – Read More –
In episode 65 of The AI Fix, a pigeon gives a PowerPoint presentation, Mark plays Graham a song about the Transformer architecture, a robot dog delivers parcels, some robots fall over at the World Humanoid Robot Games, and Graham takes credit for one of computing’s greatest insights. Plus, Graham explains why Microsoft doesn’t want you … Read More “The AI Fix #65: Excel Copilot will wreck your data, and can AI fix social media? – Graham Cluley” »
A global phishing campaign has been identified using personalized emails and fake websites to deliver malware via UpCrypter – Read More –
Enhancing Hardware Security for the Future of National Defense and Emerging Technologies In an era of geopolitical uncertainty, global semiconductor disruptions, and a rising demand for digital sovereignty, hardware security has become a critical – Read More – News and Events Feed by Topic
The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they’d made with company called DSLRoot, which was paying $250 a month to plug a pair of laptops into the Redditor’s high-speed Internet connection in the United States. This … Read More “DSLRoot, Proxies, and the Threat of ‘Legal Botnets’ – Krebs on Security” »
A suspected hacker, believed to be the mastermind behind an organised campaign of attacks that stole millions of dollars worth of stocks from celebrities, including BTS singer Jung Kook, has been extradited to South Korea. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
Study Reveals TikTok, Alibaba, Temu Collect Extensive User Data in America – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Incogni finds top foreign apps downloaded in the US harvest names, locations, and emails, sharing them with third parties for ads and profiling. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers – The Hacker News
Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with an in-memory malware dubbed MixShell. The activity has been codenamed ZipLine by Check Point Research. “Instead of sending unsolicited phishing emails, attackers initiate contact through a company’s public ‘Contact Us’ form, tricking – Read More – The … Read More “MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers – The Hacker News” »
ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners – The Hacker News
A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to fake CAPTCHA verification pages that employ the ClickFix social engineering tactic to deliver information stealers, ransomware, and cryptocurrency miners. The large-scale cybercrime campaign, first detected in August 2025, has been codenamed ShadowCaptcha by the Israel National – … Read More “ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners – The Hacker News” »
New Android Hook Malware Variant Locks Devices With Ransomware – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Zimperium’s research reveals the Hook Android malware is now a hybrid threat, using ransomware and spyware to steal… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Silver Spring, USA / Maryland, 26th August 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
AccuKnox Awarded Patent for Runtime Security of Kernel Events – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Menlo Park, United States, 26th August 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
All previously scheduled mobility trips across Maryland for this week will be honored, said the state’s transportation administration – Read More –
Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay screens to display extortion messages. “A prominent characteristic of the latest variant is its capacity to deploy a full-screen ransomware overlay, which aims to coerce the victim into remitting a ransom payment,” Zimperium zLabs researcher Vishnu Pratapagiri … Read More “HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands – The Hacker News” »
A new CIISec poll finds the majority of industry professionals would prefer more rigorous cybersecurity laws – Read More –
Data I/O has revealed operational disruption following a ransomware breach that forced it to take some systems offline – Read More –
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws impacting Citrix Session Recording and Git to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2024-8068 (CVSS score: 5.1) – An improper privilege management vulnerability in Citrix Session Recording … Read More “CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git – The Hacker News” »
Google has announced plans to begin verifying the identity of all developers who distribute apps on Android, even for those who distribute their software outside the Play Store. “Android will require all apps to be registered by verified developers in order to be installed by users on certified Android devices,” the company said. “This creates … Read More “Google to Verify All Android Developers in 4 Countries to Block Malicious Apps – The Hacker News” »
As we step in 2025, once the major firewalls that define network safety for decades, now standing as a… The post The Death of Perimeter Security: Why Firewalls Are the Fax Machines of 2025 appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
How to Streamline Your Game Development Process: 4 Smart Solutions – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Development teams worldwide spend countless hours wrestling with the same persistent challenges: tight deadlines, resource constraints, and the… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Fake Voicemail Emails Install UpCrypter Malware on Windows – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
FortiGuard Labs warns of a global phishing campaign that delivers UpCrypter malware, giving hackers complete control of infected… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 – The Hacker News
Docker has released fixes to address a critical security flaw affecting the Docker Desktop app for Windows and macOS that could potentially allow an attacker to break out of the confines of a container. The vulnerability, tracked as CVE-2025-9074, carries a CVSS score of 9.3 out of 10.0. It has been addressed in version 4.44.3. … Read More “Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 – The Hacker News” »
UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats – The Hacker News
A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the globe to advance Beijing’s strategic interests. “This multi-stage attack chain leverages advanced social engineering including valid code signing certificates, an adversary-in-the-middle (AitM) attack, and indirect execution techniques to evade – … Read More “UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats – The Hacker News” »
The Federal Communications Commission announced Monday it has blocked more than 1,200 voice service providers from having access to the country’s phone network for failing to comply with anti-robocall regulations, marking the agency’s largest enforcement action against companies that facilitate illegal automated calls. The providers were disconnected after violating FCC rules requiring accurate certifications in … Read More “FCC removes 1,200 voice providers from telephone networks in major robocall crackdown – CyberScoop” »
Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware loader called UpCrypter. The campaign leverages “carefully crafted emails to deliver malicious URLs linked to convincing phishing pages,” Fortinet FortiGuard Labs researcher Cara Lin said. “These pages are designed to entice recipients into downloading JavaScript – … Read More “Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads – The Hacker News” »
Data I/O, an electronics manufacturer and software vendor for major automotive suppliers and tech firms, said its operations were disrupted in the wake of a ransomware attack earlier this month. The attack occurred Aug. 16, the company said in a regulatory filing Thursday. “The incident has temporarily impacted the company’s operations including internal and external … Read More “Data I/O reports business disruptions in wake of ransomware attack – CyberScoop” »
Blistering Wyden letter seeks review of federal court cybersecurity, citing ‘incompetence,’ ‘negligence’ – CyberScoop
Sen. Ron Wyden on Monday urged Supreme Court Chief Justice John Roberts to seek an independent review of federal court cybersecurity following the latest major hack, accusing the judiciary of “incompetence” and “covering up” its “negligence” over digital defenses. Wyden, D-Ore., wrote his letter in response to news this month that hackers had reportedly breached … Read More “Blistering Wyden letter seeks review of federal court cybersecurity, citing ‘incompetence,’ ‘negligence’ – CyberScoop” »
National Public Data Relaunches Despite 2.9 Billion SSNs Breach – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
It is business as usual at National Public Data (NPD) despite the breach that exposed 3 billion Social Security numbers and the subsequent leak. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Only 7 Days Left for Early Bird Registration to the OpenSSL Conference 2025 – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Newark, United States, 25th August 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A variant of the Atomic macOS Stealer (AMOS) targets macOS users via fake support sites in malvertising campaign – Read More –
⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More – The Hacker News
Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage, or shift who holds the upper hand. For leaders, this means defense isn’t just a matter of firewalls and patches—it’s about strategy. The strongest organizations aren’t the ones with the most tools, … Read More “⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More – The Hacker News” »
A Chinese developer has been sentenced to four years in prison after being found to deploy malicious code in his employer’s network, including a “kill switch” – Read More –
Cybercriminals Exploit Cheap VPS to Launch SaaS Hijacking Attacks – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Darktrace researchers have discovered a new wave of attacks where cybercriminals use cheap Virtual Private Servers (VPS) to… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations – The Hacker News
Security Information and Event Management (SIEM) systems act as the primary tools for detecting suspicious activity in enterprise networks, helping organizations identify and respond to potential attacks in real time. However, the new Picus Blue Report 2025, based on over 160 million real-world attack simulations, revealed that organizations are only detecting 1 out of 7 … Read More “Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations – The Hacker News” »
Top EdTech Apps Delivering AI Skills – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
“AI isn’t coming, it’s already here. The question is, are you ready?” That’s the brutal reality of a… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The US Cybersecurity and Infrastructure Security Agency is planning to launch an update to a 2021 guideline for SBOM requirements – Read More –