When an organization’s credentials are leaked, the immediate consequences are rarely visible—but the long-term impact is far-reaching. Far from the cloak-and-dagger tactics seen in fiction, many real-world cyber breaches begin with something deceptively simple: a username and password. According to Verizon’s 2025 Data Breach Investigations Report, leaked credentials accounted for 22% of breaches – Read … Read More “Leaked Credentials Up 160%: What Attackers Are Doing With Them – The Hacker News” »
Author: [email protected] (The Hacker News)
TeaOnHer hasn’t stopped at copying the functionality of the original Tea app (albeit skewed towards men rating women). It also appears to have carelessly mimicked the Tea dating advice app’s recklessness when it comes to data security. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
The judiciary announced stronger protections for its case management system following reports of a major breach of sensitive court documents in multiple states – Read More –
Accelerated digitalization, embedded finance, and the clear regulatory environment have been precipitating the swift transformation of the fintech ecosystem… The post How India’s fintech fraud patterns are evolving in 2025 appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
A newly discovered campaign dubbed GreedyBear has leveraged over 150 malicious extensions to the Firefox marketplace that are designed to impersonate popular cryptocurrency wallets and steal more than $1 million in digital assets. The published browser add-ons masquerade as MetaMask, TronLink, Exodus, and Rabby Wallet, among others, Koi Security researcher Tuval Admoni said. What makes … Read More “GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions – The Hacker News” »
Bouygues Telecom revealed the attackers stole personal data of 6.4 million customers, including contact details, contractual data and international bank account numbers – Read More –
The post Federal courts to ramp up filing system security after ‘recent escalated cyberattacks’ appeared first on CyberScoop. – Read More – CyberScoop
The NSA’s CAPT program, launched in 2024 with Horizon3.ai, now benefits 1000 of the 300,000 US Defense Industrial Base companies – Read More –
LAS VEGAS — The Russian cybercrime group behind BlackSuit and Royal ransomware was more prolific and successful at extorting payments from its victims than previously known, according to an update Thursday from an investigative unit inside the Department of Homeland Security. “Since 2022, the Royal and BlackSuit ransomware groups have compromised over 450 known victims … Read More “BlackSuit, Royal ransomware group hit over 450 US victims before last month’s takedown – CyberScoop” »
SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others – The Hacker News
The threat actors behind the SocGholish malware have been observed leveraging Traffic Distribution Systems (TDSs) like Parrot TDS and Keitaro TDS to filter and redirect unsuspecting users to sketchy content. “The core of their operation is a sophisticated Malware-as-a-Service (MaaS) model, where infected systems are sold as initial access points to other cybercriminal organizations,” Silent … Read More “SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others – The Hacker News” »
Cybersecurity researchers have disclosed multiple security flaws in video surveillance products from Axis Communications that, if successfully exploited, could expose them to takeover attacks. “The attack results in pre-authentication remote code execution on Axis Device Manager, a server used to configure and manage fleets of cameras, and the Axis Camera Station, client software used to … Read More “6,500 Axis Servers Expose Remoting Protocol; 4,000 in U.S. Vulnerable to Exploits – The Hacker News” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Delta Electronics Equipment: DIAView Vulnerability: Improper Limitation of a Pathname to a Restricted Directory 2. RISK EVALUATION Successful exploitation of this vulnerability may allow a remote attacker to read or write files on the affected device. 3. TECHNICAL DETAILS 3.1 AFFECTED … Read More “Delta Electronics DIAView – All CISA Advisories” »
Today, CISA issued Emergency Directive (ED) 25-02: Mitigate Microsoft Exchange Vulnerability in response to CVE-2025-53786, a vulnerability in Microsoft Exchange server hybrid deployments. ED 25-02 directs all Federal Civilian Executive Branch (FCEB) agencies with Microsoft Exchange hybrid environments to implement required mitigations by 9:00 AM EDT on Monday, August 11, 2025. This vulnerability presents … Read More “CISA Issues ED 25-02: Mitigate Microsoft Exchange Vulnerability – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Packet Power Equipment: EMX, EG Vulnerability: Missing Authentication for Critical Function 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to gain full access to the device without authentication. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Packet … Read More “Packet Power EMX and EG – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.3 ATTENTION: Exploitable remotely/Low attack complexity Vendor: Yealink Equipment: IP Phones Vulnerability: Improper Restriction of Excessive Authentication Attempts, Allocation of Resources Without Limits or Throttling, Incorrect Authorization, Improper Certificate Validation 2. RISK EVALUATION Successful exploitation of these vulnerabilities could result in an information disclosure. 3. TECHNICAL DETAILS 3.1 … Read More “Yealink IP Phones and RPS (Redirect and Provisioning Service) – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/Low attack complexity Vendor: Burk Technology Equipment: ARC Solo Vulnerability: Missing Authentication for Critical Function 2. RISK EVALUATION Successful exploitation of this vulnerability could result in an attacker gaining access to the device, locking out authorized users, or disrupting operations. 3. TECHNICAL DETAILS 3.1 AFFECTED … Read More “Burk Technology ARC Solo – All CISA Advisories” »
LAS VEGAS — Federal cyber authorities issued an alert Wednesday evening about a high-severity vulnerability affecting on-premises Microsoft Exchange servers shortly after a researcher presented findings of the defect at Black Hat. Microsoft also issued an advisory about the vulnerability — CVE-2025-53786 — and said it’s not aware of exploitation in the wild. While the … Read More “CISA, Microsoft warn organizations of high-severity Microsoft Exchange vulnerability – CyberScoop” »
A new Microsoft AI agent, named Project Ire, is able to autonomously classify malware at a global scale with a high level of precision – Read More –
Google Confirms Salesforce Data Breach by ShinyHunters via Vishing Scam – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Google confirms a data breach by ShinyHunters hackers, who used a vishing scam to access a Salesforce database with small business customer info. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Microsoft Exchange customers have been urged to apply fixes set out in a hybrid deployment security update published in April – Read More –
Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes – The Hacker News
Cybersecurity researchers have discovered a set of 11 malicious Go packages that are designed to download additional payloads from remote servers and execute them on both Windows and Linux systems. “At runtime the code silently spawns a shell, pulls a second-stage payload from an interchangeable set of .icu and .tech command-and-control (C2) endpoints, and executes … Read More “Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes – The Hacker News” »
Google confirms it was among the victims of an ongoing data theft campaign targeting Salesforce instances, where publicly available business names and contact details were retrieved by the threat actor – Read More –
AccuKnox partners with SecuVerse.ai to deliver Zero Trust CNAPP Security for National Gaming Infrastructure – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Menlo Park, California, USA, 7th August 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
ShinyHunters Target Chanel in Salesforce Linked Data Breach – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
ShinyHunters breached Chanel’s US client database via Salesforce-linked access, exposing limited customer details through social engineering tactics. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day – The Hacker News
SonicWall has revealed that the recent spike in activity targeting its Gen 7 and newer firewalls with SSL VPN enabled is related to an older, now-patched bug and password reuse. “We now have high confidence that the recent SSL VPN activity is not connected to a zero-day vulnerability,” the company said. “Instead, there is a … Read More “SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day – The Hacker News” »
Now that we are well into 2025, cloud attacks are evolving faster than ever and artificial intelligence (AI) is both a weapon and a shield. As AI rapidly changes how enterprises innovate, security teams are now tasked with a triple burden: Secure AI embedded in every part of the business. Use AI to defend faster … Read More “The AI-Powered Security Shift: What 2025 Is Teaching Us About Cloud Defense – The Hacker News” »
Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups – The Hacker News
Microsoft has released an advisory for a high-severity security flaw affecting on-premise versions of Exchange Server that could allow an attacker to gain elevated privileges under certain conditions. The vulnerability, tracked as CVE-2025-53786, carries a CVSS score of 8.0. Dirk-jan Mollema with Outsider Security has been acknowledged for reporting the bug. “In an Exchange hybrid … Read More “Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups – The Hacker News” »
New Promptware Attack Hijacks User’s Gemini AI Via Google Calendar Invite – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cybersecurity researchers demonstrate a new attack on Google Gemini AI for Workspace. Discover how a simple calendar invite can be used to perform phishing, steal emails, and even control home appliances. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
In the context of the current digital environment, the API has turned into the life force of the digital… The post Guarding the Data Goldmine: Strategies for API-Driven Security appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
A UK government initiative to tackle Companies House fraud has raised security concerns – Read More –
1.2 Million Healthcare Devices and Systems Found Exposed Online – Patient Records at Risk of Exposure, Latest Research from Modat – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The Hague, Netherlands, 7th August 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
SonicWall has claimed an uptick in Akira ransomware intrusions is due to legacy password use – Read More –
Python is everywhere in modern software. From machine learning models to production microservices, chances are your code—and your business—depends on Python packages you didn’t write. But in 2025, that trust comes with a serious risk. Every few weeks, we’re seeing fresh headlines about malicious packages uploaded to the Python Package Index (PyPI)—many going undetected until … Read More “Webinar: How to Stop Python Supply Chain Attacks—and the Expert Tools You Need – The Hacker News” »
French authorities extradited a 39-year-old Nigerian national to the United States Monday for allegedly hacking into tax preparation businesses and participating in a years-long conspiracy to defraud the Internal Revenue Service and state tax agencies. Chukwuemeka Victor Amachukwu and his Nigeria-based co-conspirators, including Kinglsey Uchelue Utulu, are accused of obtaining about $2.5 million in fraudulent … Read More “Nigerian accused of hacking tax preparation businesses extradited to US – CyberScoop” »
Note: This Alert may be updated to reflect new guidance issued by CISA or other parties. CISA is aware of the newly disclosed high-severity vulnerability, CVE-2025-53786, that allows a cyber threat actor with administrative access to an on-premise Microsoft Exchange server to escalate privileges by exploiting vulnerable hybrid-joined configurations. This vulnerability, if not addressed, could impact … Read More “Microsoft Releases Guidance on High-Severity Vulnerability (CVE-2025-53786) in Hybrid Exchange Deployments – All CISA Advisories” »
Chinese Groups Stole 115 Million US Cards in 16-Month Smishing Campaign – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A SecAlliance report reveals Chinese smishing syndicates compromised 115M US payment cards by bypassing MFA to exploit Apple Pay and Google Wallet. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft – The Hacker News
Cybersecurity researchers have demonstrated an “end-to-end privilege escalation chain” in Amazon Elastic Container Service (ECS) that could be exploited by an attacker to conduct lateral movement, access sensitive data, and seize control of the cloud environment. The attack technique has been codenamed ECScape by Sweet Security researcher Naor Haziz, who presented the findings today at … Read More “Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft – The Hacker News” »
Claroty researchers have uncovered four vulnerabilities in a proprietary protocol used by surveillance equipment manufacturer Axis Communications – Read More –
Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams – The Hacker News
The malicious ad tech purveyor known as VexTrio Viper has been observed developing several malicious apps that have been published on Apple and Google’s official app storefronts under the guise of seemingly useful applications. These apps masquerade as VPNs, device “monitoring” apps, RAM cleaners, dating services, and spam blockers, DNS threat intelligence firm Infoblox said … Read More “Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams – The Hacker News” »
According to Infoblox’s new report, the VexTrio cybercrime-enabling network originates from Italy and Eastern Europe – Read More –
New National Cyber Director Cairncross faces challenges on policy, bureaucracy, threats – CyberScoop
Sean Cairncross took his post this week as national cyber director at what many agree is a “pivotal” time for the office, giving him a chance to shape its future role in the bureaucracy, tackle difficult policy issues, shore up industry relations and take on key threats. The former White House official, Republican National Committee … Read More “New National Cyber Director Cairncross faces challenges on policy, bureaucracy, threats – CyberScoop” »
Hacker Accesses Millions of IMDataCenter Records from Exposed AWS Bucket – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Florida firm IMDataCenter exposed 38GB of sensitive data including names, emails and ownership info. At least one hacker accessed and downloaded the files. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Collapsed company’s founder says that its fortunes were hampered by the refusal of authorities to release the criminals’ seized funds to victims. Read more in my article on the Fortra blog. – Read More – Graham Cluley
The incident, reported to be ransomware-related, has resulted in attackers stealing sensitive personal and clinical data, including lab test results – Read More –
Notification This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise. This document is marked TLP:CLEAR–Recipients may share this information … Read More “MAR-251132.c1.v1 Exploitation of SharePoint Vulnerabilities – All CISA Advisories” »
CISA published a Malware Analysis Report (MAR) with analysis and associated detection signatures on files related to Microsoft SharePoint vulnerabilities: CVE-2025-49704 [CWE-94: Code Injection], CVE-2025-49706 [CWE-287: Improper Authentication], CVE-2025-53770 [CWE-502: Deserialization of Untrusted Data], and CVE-2025-53771 [CWE-287: Improper Authentication] Cyber threat actors have chained CVE-2025-49704 and CVE-2025-49706 (in an exploit chain publicly known as “ToolShell”) … Read More “CISA Releases Malware Analysis Report Associated with Microsoft SharePoint Vulnerabilities – All CISA Advisories” »
Ukraine’s Defence Intelligence agency (HUR) claims that its hackers have successfully stolen secret files and classified data on a state-of-the-art Russian nuclear submarine, the “Knyaz Pozharsky.” Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
A Nigerian man accused of hacking, fraud and identity theft has been extradited from France to the US to face charges – Read More –
The Role of Security Policies in Shaping Organisational Culture and Risk Awareness – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Organisational culture, as we know it, isn’t built overnight. It takes shape over time through decisions, habits and… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
GenAI company OpenAI has launched its first-ever open-weight models alongside a red teaming challenge – Read More –