The Warlock ransomware has hit a number of organisations including government agencies and departments, and most recently UK-based telecoms firm Colt. Read more in my article on the Fortra blog. – Read More – Graham Cluley
Author: Graham Cluley
Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Frankfurt am Main, Germany, 20th August 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Fake Antivirus App Spreads Android Malware to Spy on Russian Users – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Doctor Web warns of Android.Backdoor.916.origin, a fake antivirus app that spies on Russian users by stealing data, streaming… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Indiana-based pharmaceutical research company Inotiv has confirmed it suffered a ransomware attack, disrupting operations and compromising data – Read More –
Russian cyber group exploits seven-year-old network vulnerabilities for long-term espionage – CyberScoop
A Russian state-sponsored espionage group has been systematically compromising network devices worldwide for over a decade, exploiting a seven-year-old vulnerability to steal sensitive data and establish persistent access to organizations across multiple sectors, according to new research from Cisco Talos Intelligence. The group, designated “Static Tundra” by Cisco Talos, is linked to the Russian Federal … Read More “Russian cyber group exploits seven-year-old network vulnerabilities for long-term espionage – CyberScoop” »
Russian cyber group exploits seven-year-old network vulnerabilities for long-term espionage – CyberScoop
A Russian state-sponsored espionage group has been systematically compromising network devices worldwide for over a decade, exploiting a seven-year-old vulnerability to steal sensitive data and establish persistent access to organizations across multiple sectors, according to new research from Cisco Talos Intelligence. The group, designated “Static Tundra” by Cisco Talos, is linked to the Russian Federal … Read More “Russian cyber group exploits seven-year-old network vulnerabilities for long-term espionage – CyberScoop” »
With Beacon Network, TRM Labs has brought together law enforcement and some of the largest crypto exchanges to fight against crypto crimes – Read More –
A new report has mapped the tactical evolution of mule operators in the META region from VPNs to advanced fraud networks – Read More –
New DripDropper Malware Exploits Linux Flaw Then Patches It Lock Rivals Out – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A new report from Red Canary reveals a clever Linux malware called DripDropper that exploits a flaw and… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts – The Hacker News
Cybersecurity researchers have demonstrated a new prompt injection technique called PromptFix that tricks a generative artificial intelligence (GenAI) model into carrying out intended actions by embedding the malicious instruction inside a fake CAPTCHA check on a web page. Described by Guardio Labs an “AI-era take on the ClickFix scam,” the attack technique demonstrates how AI-driven … Read More “Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts – The Hacker News” »
Russian Government Cyber Actors Targeting Networking Devices, Critical Infrastructure – IC3.gov News
Post Content – Read More – IC3.gov News
Researchers discovered two new phishing techniques where attackers split malicious QR codes or embed them into legitimate ones – Read More –
How to Automate Phishing Detection to Prevent Data Theft – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
AI Website Builder Lovable Abused for Phishing and Malware Scams – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Scammers have been spotted abusing AI site builder Lovable to mimic trusted brands, steal credentials, drain crypto wallets,… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
🕵️ Webinar: Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do – The Hacker News
Do you know how many AI agents are running inside your business right now? If the answer is “not sure,” you’re not alone—and that’s exactly the concern. Across industries, AI agents are being set up every day. Sometimes by IT, but often by business units moving fast to get results. That means agents are running … Read More “🕵️ Webinar: Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do – The Hacker News” »
Trend Micro highlighted a sophisticated post-compromise attack chain to deploy the Warlock ransomware in unpatched SharePoint on-prem environments – Read More –
Modern businesses face a rapidly evolving and expanding threat landscape, but what does this mean for your business? It means a growing number of risks, along with an increase in their frequency, variety, complexity, severity, and potential business impact. The real question is, “How do you tackle these rising threats?” The answer lies in having … Read More “From Impact to Action: Turning BIA Insights Into Resilient Recovery – The Hacker News” »
The Better Business Bureau is urging business owners and influencers not to fall for a new type of podcast scam – Read More –
The Committee on Foreign Investment in the United States just published its 2024 report, revealing once again that shielding U.S. tech from risky foreign investments was a critical focus for the interagency group that reviews investments in the United States for national security risks. But as U.S.-China tensions further intensify, bolstering these reviews is even … Read More “The U.S. should bolster investment reviews to combat China – CyberScoop” »
US director of national intelligence, Tulsi Gabbard, stated that her government persuaded the UK to withdraw its controversial demand – Read More –
North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms – The Hacker News
North Korean threat actors have been attributed to a coordinated cyber espionage campaign targeting diplomatic missions in their southern counterpart between March and July 2025. The activity manifested in the form of at least 19 spear-phishing emails that impersonated trusted diplomatic contacts with the goal of luring embassy staff and foreign ministry personnel with convincing … Read More “North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms – The Hacker News” »
Microsoft has issued an emergency patch to fix Windows recovery problems for some users – Read More –
ISACA has launched the new AAISM certification to equip security leaders with AI risk management expertise – Read More –
A 22-year-old Oregon man has been arrested on suspicion of operating “Rapper Bot,” a massive botnet used to power a service for launching distributed denial-of-service (DDoS) attacks against targets — including a March 2025 DDoS that knocked Twitter/X offline. The Justice Department asserts the suspect and an unidentified co-conspirator rented out the botnet to online … Read More “Oregon Man Charged in ‘Rapper Bot’ DDoS Service – Krebs on Security” »
Generative AI (GenAI) is getting ahead of enterprises and changing them faster than even some of the most revolutionary… The post Securing GenAI Workloads: The New Priority for CISOs appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
A 22-year-old man from the U.S. state of Oregon has been charged with allegedly developing and overseeing a distributed denial-of-service (DDoS)-for-hire botnet called RapperBot. Ethan Foltz of Eugene, Oregon, has been identified as the administrator of the service, the U.S. Department of Justice (DoJ) said. The botnet has been used to carry out large-scale DDoS-for-hire … Read More “DOJ Charges 22-Year-Old for Running RapperBot Botnet Behind 370,000 DDoS Attacks – The Hacker News” »
Officials gain control of Rapper Bot DDoS botnet, charge lead developer and administrator – CyberScoop
Authorities claim they’ve gained control of Rapper Bot and stopped attacks emanating from what they described as “among the most powerful DDoS botnets to have ever existed.” The takeover and effective disruption of the botnet, also known as Eleven Eleven Botnet and CowBot, occurred after officials identified and served a warrant at the Oregon residence … Read More “Officials gain control of Rapper Bot DDoS botnet, charge lead developer and administrator – CyberScoop” »
Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems – The Hacker News
Threat actors are exploiting a nearly two-year-old security flaw in Apache ActiveMQ to gain persistent access to cloud Linux systems and deploy malware called DripDropper. But in an unusual twist, the unknown attackers have been observed patching the exploited vulnerability after securing initial access to prevent further exploitation by other adversaries and evade detection, Red … Read More “Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems – The Hacker News” »
Australian ISP iiNet Reports Data Breach, Customer Accounts Stolen – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Australian ISP iiNet confirms data breach as hackers stole 280,000 email accounts, phone numbers and user data using… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A hack of the Netherlands’ Public Prosecution Service has had an unusual side effect – causing some speed cameras to be no longer capturing evidence of motorists breaking the rules of the road. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
A critical flaw in SAP NetWeaver AS Java is being widely exploited, allowing unauthenticated remote code execution – Read More –
Citizen Lab Reports Hidden VPN Networks Sharing Ownership and Security Flaws – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Citizen Lab’s new report, Hidden Links, uncovers a network of VPN providers like Turbo VPN and VPN Monster… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The AI Fix #64: AI can be vaccinated against evil, and the “Rumble in the Silicon Jungle” – Graham Cluley
In episode 64 of The AI Fix, AI discovers new physics, a robot crab looks for love on the beaches of Portugal, the “Godfather of AI” thinks our only hope is to build motherly AI, a robot folds some laundry, the UK government has a terrible idea, and our hosts discover a long lost sixties … Read More “The AI Fix #64: AI can be vaccinated against evil, and the “Rumble in the Silicon Jungle” – Graham Cluley” »
Financial institutions like trading and brokerage firms are the target of a new campaign that delivers a previously unreported remote access trojan called GodRAT. The malicious activity involves the “distribution of malicious .SCR (screen saver) files disguised as financial documents via Skype messenger,” Kaspersky researcher Saurabh Sharma said in a technical analysis published today. The … Read More “New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Code – The Hacker News” »
Financial institutions like trading and brokerage firms are the target of a new campaign that delivers a previously unreported remote access trojan called GodRAT. The malicious activity involves the “distribution of malicious .SCR (screen saver) files disguised as financial documents via Skype messenger,” Kaspersky researcher Saurabh Sharma said in a technical analysis published today. The … Read More “New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Code – The Hacker News” »
A cyber-attack on Allianz Life, linked to the ShinyHunters group, has exposed the personal information of 1.1 million customers – Read More –
The Canadian Investment Regulatory Organization (CIRO) said it will work to identify the personal information breached and notify those affected – Read More –
The United Kingdom has withdrawn its demand that Apple create a backdoor to its encrypted cloud systems following months of diplomatic pressure from the United States, according to a statement from Director of National Intelligence Tulsi Gabbard. Gabbard announced the decision Monday on X, stating that the U.S. government had worked closely with British partners … Read More “UK abandons Apple backdoor demand after US diplomatic pressure – CyberScoop” »
96,000 UK Police Bodycam Videos Lost After Data Transfer Mishap – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The UK’s South Yorkshire Police lost 96,000 bodycam videos in a data transfer mishap, impacting 126 cases. Poor… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution – The Hacker News
A new exploit combining two critical, now-patched security flaws in SAP NetWeaver has emerged in the wild, putting organizations at risk of system compromise and data theft. The exploit in question chains together CVE-2025-31324 and CVE-2025-42999 to bypass authentication and achieve remote code execution, SAP security company Onapsis said. CVE-2025-31324 (CVSS score: 10.0) – Missing … Read More “Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution – The Hacker News” »
Red Canary observed the novel tactic in a cluster of activity targeting a legacy vulnerability to access cloud-based Linux systems – Read More –
Researchers detected that FreeVPN.One, a longstanding Chrome Web Store VPN extension, recently turned into spyware – Read More –
After two decades of developing increasingly mature security architectures, organizations are running up against a hard truth: tools and technologies alone are not enough to mitigate cyber risk. As tech stacks have grown more sophisticated and capable, attackers have shifted their focus. They are no longer focusing on infrastructure vulnerabilities alone. Instead, they are increasingly … Read More “Why Your Security Culture is Critical to Mitigating Cyber Risk – The Hacker News” »
U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback – The Hacker News
The U.K. government has apparently abandoned its plans to force Apple to weaken encryption protections and include a backdoor that would have enabled access to the protected data of U.S. citizens. U.S. Director of National Intelligence (DNI) Tulsi Gabbard, in a statement posted on X, said the U.S. government had been working with its partners … Read More “U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback – The Hacker News” »
Empowering Future Innovators: NIST CTL Connects Cybersecurity Students with Real-World Research – News and Events Feed by Topic
As digital infrastructure increasingly influences our daily lives, the National Institute of Standards and Technology (NIST) is committed to advancing cybersecurity research while also inspiring the next generation of STEM talent. Recently, the NIST – Read More – News and Events Feed by Topic
South Yorkshire Police have been reprimanded by the ICO after deleting 96,000 pieces of evidence from officers’ bodycams – Read More –
Over 280,000 customers of Australian ISP iiNet have been impacted by a data breach – Read More –
PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks – The Hacker News
The maintainers of the Python Package Index (PyPI) repository have announced that the package manager now checks for expired domains to prevent supply chain attacks. “These changes improve PyPI’s overall account security posture, making it harder for attackers to exploit expired domain names to gain unauthorized access to accounts,” Mike Fiedler, PyPI safety and security … Read More “PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks – The Hacker News” »
Compliance is no longer an empty regulatory requirement, but it is a business necessity in the era of digitalizing… The post Fintech x Compliance: How to turn a headache into a competitive edge appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Insufficient Resource Allocation Limits in nopCommerce v4.10 and v4.80.3 Excel Import Functionality – Full Disclosure
Posted by Ron E on Aug 18 nopCommerce is vulnerable to Insufficient Resource Allocation Limits when handling large Excel file imports. Although the application provides a warning message recommending that users avoid importing more than 500–1,000 records at once due to memory constraints, the system does not enforce hard limits on file size, record … Read More “Insufficient Resource Allocation Limits in nopCommerce v4.10 and v4.80.3 Excel Import Functionality – Full Disclosure” »