Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share “significant” source code overlaps with IcedID and Latrodectus. “The exact connection to YiBackdoor is not yet clear, but it may be used in conjunction with Latrodectus and IcedID during attacks,” Zscaler ThreatLabz said in a Tuesday report. … Read More “New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus – The Hacker News” »
Author: [email protected] (The Hacker News)
U.S. prosecutors last week levied criminal hacking charges against 19-year-old U.K. national Thalha Jubair for allegedly being a core member of Scattered Spider, a prolific cybercrime group blamed for extorting at least $115 million in ransom payments from victims. The charges came as Jubair and an alleged co-conspirator appeared in a London court to face … Read More “Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms – Krebs on Security” »
Most businesses don’t make it past their fifth birthday – studies show that roughly 50% of small businesses fail within the first five years. So when KNP Logistics Group (formerly Knights of Old) celebrated more than a century and a half of operations, it had mastered the art of survival. For 158 years, KNP adapted and endured, … Read More “How One Bad Password Ended a 158-Year-Old Business – The Hacker News” »
Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit checkout pages and steal credit card data by bypassing the very security policies designed to stop them. Download the complete iframe security guide here. TL;DR: iframe Security Exposed Payment iframes are being actively exploited by attackers … Read More “iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks – The Hacker News” »
Boyd Gaming Corporation has disclosed that an unauthorized actor removed data from its systems, including information about employees and other individuals – Read More –
A vulnerability has been discovered in SolarWinds Web Help Desk, which could allow for remote code execution. SolarWinds Web Help Desk (WHD) is a web-based software that provides IT help desk and asset management functionality, allowing IT teams to manage service requests, track IT assets, and offer self-service options to end-users. Successful exploitation of this … Read More “A Vulnerability in SolarWinds Web Help Desk Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
The equipment could be used to disable cell phone towers and conduct denial-of-services attacks across New York City – Read More –
FBI Warns of Fake IC3 Websites Designed to Steal Personal Data – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The FBI is warning internet users about fake versions of its official IC3 cybercrime reporting website. Learn how to spot these ‘spoofed’ sites, avoid scams where criminals impersonate agents, and protect your personal information by following the FBI’s crucial safety tips. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
An unnamed federal agency was hacked last year after threat actors exploited a critical GeoServer vulnerability – Read More –
Police have arrested five suspects linked to a €100m cryptocurrency fraud ring – Read More –
Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials – The Hacker News
Cloud security company Wiz has revealed that it uncovered in-the-wild exploitation of a security flaw in a Linux utility called Pandoc as part of attacks designed to infiltrate Amazon Web Services (AWS) Instance Metadata Service (IMDS). The vulnerability in question is CVE-2025-51591 (CVSS score: 6.5), which refers to a case of Server-Side Request Forgery (SSRF) … Read More “Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials – The Hacker News” »
Libraesva has released a security update to address a vulnerability in its Email Security Gateway (ESG) solution that it said has been exploited by state-sponsored threat actors. The vulnerability, tracked as CVE-2025-59689, carries a CVSS score of 6.1, indicating medium severity. “Libraesva ESG is affected by a command injection flaw that can be triggered by … Read More “State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability – The Hacker News” »
I have always thought that cybersecurity is not merely a technical protection since the Founder of JISA Softech, all… The post The Future of Cybersecurity in a Post-Quantum World appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Microsoft Fixed Entra ID Vulnerability Allowing Global Admin Impersonation – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Microsoft patched an Entra ID vulnerability that let attackers impersonate Global Admins across tenants, risking full Microsoft 365 and Azure takeover. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Researchers say a Russian group sanctioned by the European Union and wanted by the U.S. government is behind an influence operation targeting upcoming elections in Moldova. In a report released Tuesday, researchers at the Atlantic Council’s Digital Forensic Research Lab said that REST Media — an online news outlet launched in June whose posts have … Read More “Researchers say media outlet targeting Moldova is a Russian cutout – CyberScoop” »
Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security – The Hacker News
Cybersecurity researchers have disclosed details of two security vulnerabilities impacting Supermicro Baseboard Management Controller (BMC) firmware that could potentially allow attackers to bypass crucial verification steps and update the system with a specially crafted image. The medium-severity vulnerabilities, both of which stem from improper verification of a cryptographic signature, are – Read More – The … Read More “Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security – The Hacker News” »
Terminating their employment is the easy part. The rest is complicated. When enterprises discover they have inadvertently hired North Korean information technology workers, they face a cascade of urgent decisions involving sanctions law, cybersecurity protocols, and law enforcement cooperation that can expose them to significant legal and financial risks. Incident response experts and cybersecurity lawyers … Read More “What to do if your company discovers a North Korean worker in its ranks – CyberScoop” »
Law enforcement authorities in Europe have arrested five suspects in connection with an “elaborate” online investment fraud scheme that stole more than €100 million ($118 million) from over 100 victims in France, Germany, Italy, and Spain. According to Eurojust, the coordinated action saw searches in five places across Spain and Portugal, as well as in … Read More “Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries – The Hacker News” »
Iranian Hackers Use Fake Job Lures to Breach Europe’s Critical Industries – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
New research from Check Point Research reveals the Iranian cyber group Nimbus Manticore is targeting defence, telecom, and aerospace companies in Europe with fake job offers. Learn how they use advanced malware to steal sensitive data. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Pittsburg, United States, 23rd September 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
U.S. Secret Service Seizes 300 SIM Servers, 100K Cards Threatening U.S. Officials Near UN – The Hacker News
The U.S. Secret Service on Tuesday said it took down a network of electronic devices located across the New York tri-state area that were used to threaten U.S. government officials and posed an imminent threat to national security. “This protective intelligence investigation led to the discovery of more than 300 co-located SIM servers and 100,000 … Read More “U.S. Secret Service Seizes 300 SIM Servers, 100K Cards Threatening U.S. Officials Near UN – The Hacker News” »
Nimbus Manticore intensified European cyber-espionage, targeting aerospace, telecom, defense sectors – Read More –
In episode 69 of The AI Fix, our hosts discover brain rot, a shark wears trainers on its fins, an AI writes a terrible J-Pop song, Graham learns that ants don’t care about AI, Mark predicts the precise date of Graham’s demise, Norway trusts $1.9 trillion to an AI investor, and Florida thins out its … Read More “The AI Fix #69: How we really use ChatGPT, and will AI agents crash the economy? – Graham Cluley” »
The Secret Service said Tuesday that it disrupted a network of electronic devices in the New York City area that posed imminent telecommunications-based threats to U.S. government officials and potentially the United Nations General Assembly meeting currently underway. The range of threats included enabling encrypted communications between threat groups and criminals, or disabling cell towers … Read More “Secret Service says it dismantled extensive telecom threat in NYC area – CyberScoop” »
Gartner research found that 62% of organizations have experienced a deepfake attack in the past 12 months – Read More –
SpyCloud Report: 2/3 Orgs Extremely Concerned About Identity Attacks Yet Major Blind Spots Persist – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Austin, Texas, USA, 23rd September 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
SolarWinds has released hot fixes to address a critical security flaw impacting its Web Help Desk software that, if successfully exploited, could allow attackers to execute arbitrary commands on susceptible systems. The vulnerability, tracked as CVE-2025-26399 (CVSS score: 9.8), has been described as an instance of deserialization of untrusted data that could result in code … Read More “SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw – The Hacker News” »
Rising hardware, API, and network flaws expose organizations to new risks in an AI-driven landscape – Read More –
ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service – The Hacker News
Cybersecurity researchers have disclosed details of a new botnet that customers can rent access to conduct distributed denial-of-service (DDoS) attacks against targets of interest. The ShadowV2 botnet, according to Darktrace, predominantly targets misconfigured Docker containers on Amazon Web Services (AWS) cloud servers to deploy a Go-based malware that turns infected systems into attack nodes – … Read More “ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service – The Hacker News” »
Big companies are getting smaller, and their CEOs want everyone to know it. Wells Fargo has cut its workforce by 23% over five years, Bank of America has shed 88,000 employees since 2010, and Verizon’s CEO recently boasted that headcount is “going down all the time.” What was once a sign of corporate distress has … Read More “Lean Teams, Higher Stakes: Why CISOs Must Rethink Incident Remediation – The Hacker News” »
Inc Ransomware Group Claims 5.7 TB Theft from Pennsylvania Attorney General’s Office – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The Inc ransomware gang claims to have stolen 5.7 TB of data from the Pennsylvania Attorney General’s office in an August 2025 attack. Find out how the breach unfolded, why government agencies are a top target, and what this means for citizens. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & … Read More “Inc Ransomware Group Claims 5.7 TB Theft from Pennsylvania Attorney General’s Office – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto” »
How Major SOCs Achieve Early Threat Detection in 3 Steps – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Every SOC leader understands that faster threat detection is better. But the difference between knowing it and building… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
ReliaQuest report claims time from initial access to lateral movement has shrunk to just 18 minutes – Read More –
GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security – The Hacker News
GitHub on Monday announced that it will be changing its authentication and publishing options “in the near future” in response to a recent wave of supply chain attacks targeting the npm ecosystem, including the Shai-Hulud attack. This includes steps to address threats posed by token abuse and self-replicating malware by allowing local publishing with required … Read More “GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security – The Hacker News” »
Stellantis confirmed that customers’ personal information was potentially exposed – Read More –
Cybersecurity researchers are calling attention to a search engine optimization (SEO) poisoning campaign likely undertaken by a Chinese-speaking threat actor using a malware called BadIIS in attacks targeting East and Southeast Asia, particularly with a focus on Vietnam. The activity, dubbed Operation Rewrite, is being tracked by Palo Alto Networks Unit 42 under the moniker … Read More “BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells – The Hacker News” »
UK carmaker Jaguar Land Rover has said production will remain shuttered until October 1 – Read More –
In a world where information is the currency, its security has become the foundation of faith, development and creativity…. The post Why Tokenization is the Future of Data Security appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
The Aadhaar system has always been the hallmark of secure citizen authentication in the realm of the digital identity… The post UIDAI 2025 Guidelines: Ensuring Aadhaar Data Compliance appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Posted by Burning River Cyber Con via Fulldisclosure on Sep 22 Burning River CyberCon is seeking submissions for our 2025 conference. We’re looking for presentations on all things infosec, from vulnerability research and exploit development to red teaming and security automation. Key Details: – CFP Link: https://burningrivercybercon.com/call-for-papers – CFP Closes: October 1, 2025 – … Read More “[CFP] Burning River Cyber Con ’25 – Cleveland, OH – Full Disclosure” »
Posted by Andrey Stoykov on Sep 22 # Exploit Title: Current Password not Required When Changing Password – flatpressv1.4.1 # Date: 09/2025 # Exploit Author: Andrey Stoykov # Version: 1.4.1 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/2025/09/friday-fun-pentest-series-42-current.html Current Password not Required When Changing Password: Steps to Reproduce: – Login with admin user and … Read More “Current Password not Required When Changing Password – flatpressv1.4.1 – Full Disclosure” »
Posted by Andrey Stoykov on Sep 22 # Exploit Title: Stored HTML Injection – flatpressv1.4.1 # Date: 09/2025 # Exploit Author: Andrey Stoykov # Version: 1.4.1 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/2025/09/friday-fun-pentest-series-41-stored.html Stored HTML Injection: Steps to Reproduce: – Login with admin user and visit “Main” > “New Entry” > “Write Entry” … Read More “Stored HTML Injection – flatpressv1.4.1 – Full Disclosure” »
libelf 0.8.12 Stack-based buffer overflow in gmo2msg (libelf) via unbounded sprintf of lang argument – Full Disclosure
Posted by Ron E on Sep 22 gmo2msg in libelf contains a stack-based buffer overflow in po/gmo2msg.c when constructing filenames from the first program argument (lang). The program uses a fixed-size local buffer (char buf[1024]) and writes into it using sprintf(buf, “%s.gmo”, lang) and sprintf(buf, “%s.msg”, lang) without validating the length of lang. Supplying … Read More “libelf 0.8.12 Stack-based buffer overflow in gmo2msg (libelf) via unbounded sprintf of lang argument – Full Disclosure” »
Defense in depth — the Microsoft way (part 93): SRP/SAFER whitelisting goes black on Windows 11 – Full Disclosure
Posted by Stefan Kanthak via Fulldisclosure on Sep 22 Hi @ll, more than 2.5 years ago I posted “Defense in depth — the Microsoft way (part 82): INVALID/BOGUS AppLocker rules disable SAFER on Windows 11 22H2″ <https://seclists.org/fulldisclosure/2023/Feb/13> In “SRP on Windows 11” <https://seclists.org/fulldisclosure/2023/Mar/1> Andy Ful presented a persistent correction some days later. Since several … Read More “Defense in depth — the Microsoft way (part 93): SRP/SAFER whitelisting goes black on Windows 11 – Full Disclosure” »
Posted by Stefan Kanthak via Fulldisclosure on Sep 22 Hi @ll, since several years Microsoft installs the DLLs domain_actions.dll and well_known_domains.dll as part of their Edge browser as well as Windows’ WebView component into each and every user profile, UNPROTECTED against tampering. On Windows 11 24H2 their paths are currently “%LOCALAPPDATA%MicrosoftEdgeUser DataDomain Actions3.0.0.16domain_actions.dll” “%LOCALAPPDATA%MicrosoftEdgeUser … Read More “Defense in depth — the Microsoft way (part 94): BACKDOOR planted in AppLocker – Full Disclosure” »
Posted by Stefan Kanthak via Fulldisclosure on Sep 22 Hi @ll, since several years Microsoft installs the DLLs domain_actions.dll and well_known_domains.dll as part of their Edge browser as well as Windows’ WebView component into each and every user profile, UNPROTECTED against tampering. On Windows 11 24H2 their paths are currently “%LOCALAPPDATA%MicrosoftEdgeUser DataDomain Actions3.0.0.16domain_actions.dll” “%LOCALAPPDATA%MicrosoftEdgeUser … Read More “Defense in depth — the Microsoft way (part 94): BACKDOOR planted in AppLocker – Full Disclosure” »
Jeep and Dodge Parent Company Stellantis Confirms Customer Data Breach – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Stellantis, parent of Jeep, Chrysler, Dodge and FIAT, confirms data breach through third-party vendor. Contact info exposed, financial data not affected. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Hackers are increasingly adopting the techniques of the Chinese group that successfully infiltrated major telecommunications providers in attacks that made headlines last year by looking for unconventional weak spots, an AT&T executive said Monday. AT&T was one of the major providers to fall victim to the sweeping campaign from the group, known as Salt Typhoon, … Read More “Telecom exec: Salt Typhoon inspiring other hackers to use unconventional techniques – CyberScoop” »
A teenage boy suspected of participating in cyberattacks on multiple Las Vegas casinos in late 2023 was arrested last week. The Las Vegas Metropolitan Police Department said the minor turned himself in Wednesday at the Clark County Juvenile Detention Center, where he was booked on multiple charges. The suspect, who is unnamed because he’s a … Read More “Las Vegas police arrest minor accused of high-profile 2023 casino attacks – CyberScoop” »
Fake Ukrainian Police Emails Spread New CountLoader Malware Loader – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A new malware loader, CountLoader, has been discovered by cybersecurity firm Silent Push. This threat is linked to prominent Russian ransomware gangs, including LockBit, BlackBasta, and Qilin, and is being used as an initial access broker. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto