The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws impacting Citrix Session Recording and Git to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2024-8068 (CVSS score: 5.1) – An improper privilege management vulnerability in Citrix Session Recording … Read More “CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git – The Hacker News” »
Author: [email protected] (The Hacker News)
Google has announced plans to begin verifying the identity of all developers who distribute apps on Android, even for those who distribute their software outside the Play Store. “Android will require all apps to be registered by verified developers in order to be installed by users on certified Android devices,” the company said. “This creates … Read More “Google to Verify All Android Developers in 4 Countries to Block Malicious Apps – The Hacker News” »
As we step in 2025, once the major firewalls that define network safety for decades, now standing as a… The post The Death of Perimeter Security: Why Firewalls Are the Fax Machines of 2025 appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
How to Streamline Your Game Development Process: 4 Smart Solutions – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Development teams worldwide spend countless hours wrestling with the same persistent challenges: tight deadlines, resource constraints, and the… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Fake Voicemail Emails Install UpCrypter Malware on Windows – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
FortiGuard Labs warns of a global phishing campaign that delivers UpCrypter malware, giving hackers complete control of infected… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 – The Hacker News
Docker has released fixes to address a critical security flaw affecting the Docker Desktop app for Windows and macOS that could potentially allow an attacker to break out of the confines of a container. The vulnerability, tracked as CVE-2025-9074, carries a CVSS score of 9.3 out of 10.0. It has been addressed in version 4.44.3. … Read More “Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 – The Hacker News” »
UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats – The Hacker News
A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the globe to advance Beijing’s strategic interests. “This multi-stage attack chain leverages advanced social engineering including valid code signing certificates, an adversary-in-the-middle (AitM) attack, and indirect execution techniques to evade – … Read More “UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats – The Hacker News” »
The Federal Communications Commission announced Monday it has blocked more than 1,200 voice service providers from having access to the country’s phone network for failing to comply with anti-robocall regulations, marking the agency’s largest enforcement action against companies that facilitate illegal automated calls. The providers were disconnected after violating FCC rules requiring accurate certifications in … Read More “FCC removes 1,200 voice providers from telephone networks in major robocall crackdown – CyberScoop” »
Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware loader called UpCrypter. The campaign leverages “carefully crafted emails to deliver malicious URLs linked to convincing phishing pages,” Fortinet FortiGuard Labs researcher Cara Lin said. “These pages are designed to entice recipients into downloading JavaScript – … Read More “Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads – The Hacker News” »
Data I/O, an electronics manufacturer and software vendor for major automotive suppliers and tech firms, said its operations were disrupted in the wake of a ransomware attack earlier this month. The attack occurred Aug. 16, the company said in a regulatory filing Thursday. “The incident has temporarily impacted the company’s operations including internal and external … Read More “Data I/O reports business disruptions in wake of ransomware attack – CyberScoop” »
Blistering Wyden letter seeks review of federal court cybersecurity, citing ‘incompetence,’ ‘negligence’ – CyberScoop
Sen. Ron Wyden on Monday urged Supreme Court Chief Justice John Roberts to seek an independent review of federal court cybersecurity following the latest major hack, accusing the judiciary of “incompetence” and “covering up” its “negligence” over digital defenses. Wyden, D-Ore., wrote his letter in response to news this month that hackers had reportedly breached … Read More “Blistering Wyden letter seeks review of federal court cybersecurity, citing ‘incompetence,’ ‘negligence’ – CyberScoop” »
National Public Data Relaunches Despite 2.9 Billion SSNs Breach – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
It is business as usual at National Public Data (NPD) despite the breach that exposed 3 billion Social Security numbers and the subsequent leak. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Only 7 Days Left for Early Bird Registration to the OpenSSL Conference 2025 – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Newark, United States, 25th August 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A variant of the Atomic macOS Stealer (AMOS) targets macOS users via fake support sites in malvertising campaign – Read More –
⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More – The Hacker News
Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage, or shift who holds the upper hand. For leaders, this means defense isn’t just a matter of firewalls and patches—it’s about strategy. The strongest organizations aren’t the ones with the most tools, … Read More “⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More – The Hacker News” »
A Chinese developer has been sentenced to four years in prison after being found to deploy malicious code in his employer’s network, including a “kill switch” – Read More –
Cybercriminals Exploit Cheap VPS to Launch SaaS Hijacking Attacks – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Darktrace researchers have discovered a new wave of attacks where cybercriminals use cheap Virtual Private Servers (VPS) to… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations – The Hacker News
Security Information and Event Management (SIEM) systems act as the primary tools for detecting suspicious activity in enterprise networks, helping organizations identify and respond to potential attacks in real time. However, the new Picus Blue Report 2025, based on over 160 million real-world attack simulations, revealed that organizations are only detecting 1 out of 7 … Read More “Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations – The Hacker News” »
Top EdTech Apps Delivering AI Skills – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
“AI isn’t coming, it’s already here. The question is, are you ready?” That’s the brutal reality of a… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The US Cybersecurity and Infrastructure Security Agency is planning to launch an update to a 2021 guideline for SBOM requirements – Read More –
Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing – The Hacker News
The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS (Bharat Operating System Solutions) Linux systems with malicious Desktop shortcut files in attacks targeting Indian Government entities. “Initial access is achieved through spear-phishing emails,” CYFIRMA said. “Linux BOSS environments are targeted via weaponized .desktop – Read More … Read More “Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing – The Hacker News” »
The semiconductor industry is at the epicentre of modern innovation, yet it is also a very complex and strategic… The post Top 5 Cyber Threats Facing Semiconductor Manufacturing appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
CTM360 Report Explains How Emotions Fuel Modern Fraud – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
CTM360 research reveals how scammers hook their victims through manipulative traps built on AI, stolen data, and brand… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot – The Hacker News
Cybersecurity researchers have discovered a malicious Go module that presents itself as a brute-force tool for SSH but actually contains functionality to discreetly exfiltrate credentials to its creator. “On the first successful login, the package sends the target IP address, username, and password to a hard-coded Telegram bot controlled by the threat actor,” Socket researcher … Read More “Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot – The Hacker News” »
Hackers Could Take Over Apple Devices Via Malicious Images – Patch Now! – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Apple fixes CVE-2025-43300, a flaw letting hackers hijack devices via malicious images. Users urged to update iPhone, iPad,… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Fake CoinMarketCap Journalists Targeting Crypto Executives in Spear-Phishing Campaign – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Fake CoinMarketCap journalist profiles used in spear-phishing target crypto execs via Zoom interviews, risking malware, data theft, and… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Critical infrastructure organisations are once again being warned of the threat posed by malicious cybercriminals, following a ransomware attack against a state-owned energy company in Pakistan. Read more in my article on the Exponential-e blog. – Read More – Graham Cluley
GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets – The Hacker News
Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose Redis servers to various malicious activities, including leveraging the compromised devices as IoT botnets, residential proxies, or cryptocurrency mining infrastructure. The first set of attacks entails the exploitation of CVE-2024-36401 (CVSS score: 9.8), a critical – Read More – The … Read More “GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets – The Hacker News” »
COOKIE SPIDER’s Malvertising Drops New SHAMOS macOS Malware – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
CrowdStrike reports COOKIE SPIDER using malvertising to spread SHAMOS macOS malware (a new variant of AMOS infostealer), stealing… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Scattered Spider Hacker Noah Michael Urban Jailed for 10 Years – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Noah Michael Urban, the 20-year-old hacker from the notorious Scattered Spider group, was sentenced to 10 years in… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Some cybersecurity news outlets were duped a few days ago by a claim that Europol was offering a $50,000 bounty for information about two members of the Qilin ransomware group. Turns out it was all a hoax. Read more details about what happened in my article on the Hot for Security blog – Read More … Read More “Europol says Telegram post about 50,000 Qilin ransomware award is fake – Graham Cluley” »
Interpol-led crackdown disrupts cybercrime networks in Africa that caused $485 million in losses – CyberScoop
A globally coordinated operation involving support from 18 countries in Africa, the United Kingdom and nine security organizations resulted in the arrest of 1,209 alleged cybercriminals, Interpol said Friday. Authorities said they recovered $97.4 million and dismantled 11,432 pieces of malicious infrastructure between June and August. Financial losses attributed to the crimes allegedly committed by … Read More “Interpol-led crackdown disrupts cybercrime networks in Africa that caused $485 million in losses – CyberScoop” »
Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called VShell. The “Linux-specific malware infection chain that starts with a spam email with a malicious RAR archive file,” Trellix researcher Sagar Bade said in a technical write-up. “The payload isn’t hidden inside the file content … Read More “Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection – The Hacker News” »
Operation Serengeti 2.0 operators helped recover $97.4m stolen by cybercriminals – Read More –
INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown – The Hacker News
INTERPOL on Friday announced that authorities from 18 countries across Africa have arrested 1,209 cybercriminals who targeted 88,000 victims. “The crackdown recovered $97.4 million and dismantled 11,432 malicious infrastructures, underscoring the global reach of cybercrime and the urgent need for cross-border cooperation,” the agency said. The effort is the second phase of an ongoing law … Read More “INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown – The Hacker News” »
Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage – The Hacker News
Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus cyber espionage group known as Murky Panda that involves abusing trusted relationships in the cloud to breach enterprise networks. “The adversary has also shown considerable ability to quickly weaponize N-day and zero-day vulnerabilities and frequently achieves initial access to their targets by – … Read More “Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage – The Hacker News” »
Darktrace observed a coordinated campaign on customer SaaS accounts, all of which involved logins from IP addresses linked to VPS providers – Read More –
Pentesting remains one of the most effective ways to identify real-world security weaknesses before adversaries do. But as the threat landscape has evolved, the way we deliver pentest results hasn’t kept pace. Most organizations still rely on traditional reporting methods—static PDFs, emailed documents, and spreadsheet-based tracking. The problem? These outdated workflows introduce delays, – Read … Read More “Automation Is Redefining Pentest Delivery – The Hacker News” »
All Apple users are encouraged to update their iPhones, iPads and macOS devices – Read More –
Microsoft has set out a roadmap to complete transition to PQC in all its products and services by 2033, with roll out beginning by 2029 – Read More –
Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware – The Hacker News
A 55-year-old Chinese national has been sentenced to four years in prison and three years of supervised release for sabotaging his former employer’s network with custom malware and deploying a kill switch that locked out employees when his account was disabled. Davis Lu, 55, of Houston, Texas, was convicted of causing intentional damage to protected … Read More “Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware – The Hacker News” »
In today’s connected economy, data no longer respects national boundaries. A customer in Singapore can access a service hosted… The post Cross-Border Compliance: The New Imperative for Global Businesses appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Apple rushed an emergency software update to its customers Wednesday to address an actively exploited zero-day vulnerability affecting the software powering the company’s most popular devices. The out-of-bounds write defect — CVE-2025-43300 — allows attackers to process a malicious image file resulting in memory corruption. “Apple is aware of a report that this issue may … Read More “Apple discloses actively exploited zero-day affecting iOS, iPadOS and macOS – CyberScoop” »
The top lawmakers on a key House cybersecurity panel are hoping to remove a barrier to entry for cyber jobs in the federal government. Introduced this week, the Cybersecurity Hiring Modernization Act from Reps. Nancy Mace, R-S.C., and Shontel Brown, D-Ohio, would prioritize skills-based hiring over educational requirements for cyber jobs at federal agencies. Mace … Read More “House lawmakers take aim at education requirements for federal cyber jobs – CyberScoop” »
Europol Denies $50K Reward for Qilin Ransomware, Calls It a Scam – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Europol has confirmed that a widely reported $50,000 reward for information on the Qilin ransomware group is a… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Qilin Ransomware Gang Claims 4TB Data Breach at Nissan CBI – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Qilin ransomware claims a 4TB data breach at Nissan CBI, leaking car design files, financial data, 3D models,… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The Chinese state-backed threat group Silk Typhoon has raised the pace of attacks targeting government, technology, legal and professional services in North America since late spring, according to CrowdStrike. “We were calling this jokingly, ‘the summer of Murky Panda,’ because we’ve seen so much activity from them over the last couple of months,” said Adam … Read More “CrowdStrike warns of uptick in Silk Typhoon attacks this summer – CyberScoop” »
FTC warns tech companies not to weaken encryption, free speech practices for foreign governments – CyberScoop
Federal Trade Commission Chair Andrew Ferguson warned U.S. tech companies not to accede to laws in foreign countries that weaken Americans’ free speech or data privacy rights. Specifically, Ferguson cited laws like the European Union’s Digital Service Act and the U.K.’s Online Safety Act as statutes that incentivize U.S. tech companies “to censor speech, including … Read More “FTC warns tech companies not to weaken encryption, free speech practices for foreign governments – CyberScoop” »
The Chinese state-backed threat group Silk Typhoon has raised the pace of attacks targeting government, technology, legal and professional services in North America since late spring, according to CrowdStrike. “We were calling this jokingly, ‘the summer of Murky Panda,’ because we’ve seen so much activity from them over the last couple of months,” said Adam … Read More “CrowdStrike warns of uptick in Silk Typhoon attacks this summer – CyberScoop” »
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks – The Hacker News
Commvault has released updates to address four security gaps that could be exploited to achieve remote code execution on susceptible instances. The list of vulnerabilities, identified in Commvault versions before 11.36.60, is as follows – CVE-2025-57788 (CVSS score: 6.9) – A vulnerability in a known login mechanism allows unauthenticated attackers to execute API calls without … Read More “Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks – The Hacker News” »