Sen. Marsha Blackburn, R-Tenn., endorsed an aggressive effort by U.S. policymakers to help governments and businesses adapt to a future where quantum computers can break most standard forms of encryption. She also confirmed key details of a White House initiative on quantum technology previously reported by CyberScoop, while also promoting her own legislation on quantum … Read More “GOP senator confirms pending White House quantum push, touts legislative alternatives – CyberScoop” »
Author: djohnson
A new campaign has been observed using malicious Windows shortcuts in credential-themed ZIP files to deploy PowerShell script – Read More –
OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps – The Hacker News
A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if successfully exploited, could expose sensitive OpenID Connect (OIDC) application client secrets under certain circumstances. The vulnerability, tracked as CVE-2025-59363, has been assigned a CVSS score of 7.7 out of 10.0. It has been described as … Read More “OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps – The Hacker News” »
London Court Convicts Chinese Mastermind Behind £5bn Crypto Seizure – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Zhimin Qian, the ‘Bitcoin Queen,’ pleads guilty in the UK after police seized over £5 billion in stolen crypto, the world’s largest crypto seizure. Details on the Ponzi scam and fight for the funds. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Detour Dog’s DNS Hijacking Infects 30,000 Websites with Strela Stealer – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Infoblox reveals how the Detour Dog group used server-side DNS to compromise 30,000+ sites across 89 countries, installing the stealthy Strela Stealer malware. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain conditions. OpenShift AI is a platform for managing the lifecycle of predictive and generative artificial intelligence (GenAI) models at scale and across hybrid cloud environments. … Read More “Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover – The Hacker News” »
AI is changing automation—but not always for the better. That’s why we’re hosting a new webinar, “Workflow Clarity: Where AI Fits in Modern Automation,” with Thomas Kinsella, Co-founder & Chief Customer Officer at Tines, to explore how leading teams are cutting through the hype and building workflows that actually deliver.The rise of AI has changed … Read More “How Leading Security Teams Blend AI + Human Workflows (Free Webinar) – The Hacker News” »
Quantum Resistance and Coding for a Post-Quantum Bitcoin – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Bitcoin was created with strong cryptography, based on mathematical problems so complex that even the most powerful computers… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in European countries since at least February 2022. French cybersecurity company SEKOIA said the attackers are exploiting the cellular router’s API to send malicious SMS messages containing phishing URLs, with the campaigns primarily targeting … Read More “Hackers Exploit Milesight Routers to Send Phishing SMS to European Users – The Hacker News” »
2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising – The Hacker News
Bitdefender’s 2025 Cybersecurity Assessment Report paints a sobering picture of today’s cyber defense landscape: mounting pressure to remain silent after breaches, a gap between leadership and frontline teams, and a growing urgency to shrink the enterprise attack surface. The annual research combines insights from over 1,200 IT and security professionals across six countries, along with … Read More “2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising – The Hacker News” »
PwC found that AI security has become a top investment priority in cyber budgets over the next 12 months, ahead of cloud and network security – Read More –
Phantom Taurus is the latest formally identified cyber-espionage group aligned with Chinese state interest – Read More –
New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones – The Hacker News
A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections reported in Spain and Italy. Italian fraud prevention firm Cleafy, which discovered the sophisticated malware and remote access trojan (RAT) in late August 2025, said it leverages Hidden Virtual Network Computing (VNC) for remote control of … Read More “New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones – The Hacker News” »
The NCA warns that house buyers could face losses of over £80,000 from a type of BEC called payment diversion fraud – Read More –
Image-sharing platform Imgur has blocked its services within the UK, following a regulatory notice from the ICO – Read More –
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a backdoor called CABINETRAT. The activity, observed in September 2025, has been attributed to a threat cluster it tracks as UAC-0245. The agency said it spotted the attack following the discovery of software tools taking the … Read More “Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs – The Hacker News” »
DPDP Act 2023 has brought a new chapter to data privacy in India. In the case of the financial… The post DPDP: Powering Trusted Finance in 2025 appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
An elusive, persistent, newly confirmed China espionage group has hit almost 10 victims of geopolitical importance in the Middle East, Africa and Asia using specific tactics and extreme stealth to avoid detection, according to Palo Alto Networks’ Unit 42. Phantom Taurus uses tools and a distinct homegrown set of malware and backdoors that sets them … Read More “Palo Alto Networks spots new China espionage group showcasing advanced skills – CyberScoop” »
INTERPOL has announced the arrest of 260 alleged romance scammers, sextortionists, and online fraudsters as part of a multi-national operation across Africa. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
Chinese APT Phantom Taurus Targeted MS Exchange Servers Over 3 Years – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cybersecurity researchers at Palo Alto Networks’ Unit 42 say Chinese APT Phantom Taurus breached Microsoft Exchange servers for years using a backdoor to spy on diplomats and defense data. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A group of academics from KU Leuven and the University of Birmingham has demonstrated a new vulnerability called Battering RAM to bypass the latest defenses on Intel and AMD cloud processors. “We built a simple, $50 interposer that sits quietly in the memory path, behaving transparently during startup and passing all trust checks,” researchers Jesse … Read More “$50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections – The Hacker News” »
DOJ, Georgia Tech affiliate company settle over alleged failure to meet DOD contract cyber requirements – CyberScoop
A company affiliated with the Georgia Institute of Technology agreed to pay $875,000 to the U.S. government to settle a case involving allegations that it knowingly failed to meet cybersecurity requirements for obtaining Pentagon contracts, the Justice Department announced Tuesday. Two Georgia Tech whistleblowers who worked on the university’s cybersecurity team first filed suit in … Read More “DOJ, Georgia Tech affiliate company settle over alleged failure to meet DOD contract cyber requirements – CyberScoop” »
Watchdog: Cyber threat information-sharing program’s future uncertain with expected expiration of 2015 law – CyberScoop
The Cybersecurity and Infrastructure Security Agency doesn’t have any plans in place for continuing a threat information-sharing program should a 2015 law that laid the groundwork for its creation expire Wednesday, according to a new watchdog report. The inspector general report points to yet more potential complications for threat data exchanges between industry and the … Read More “Watchdog: Cyber threat information-sharing program’s future uncertain with expected expiration of 2015 law – CyberScoop” »
Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware – The Hacker News
Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously undocumented China-aligned nation-state actor dubbed Phantom Taurus over the past two-and-a-half years. “Phantom Taurus’ main focus areas include ministries of foreign affairs, embassies, geopolitical events, and military operations,” Palo Alto Networks Unit 42 – Read More … Read More “Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware – The Hacker News” »
US Auto Insurance Platform ClaimPix Leaked 10.7TB of Records Online – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cybersecurity researcher Jeremiah Fowler discovered a massive 10.7TB ClaimPix leak exposing 5.1M customer files, vehicle data, and Power of Attorney documents. Read the full details. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Hack of US Surveillance Provider RemoteCOM Exposes Court Data – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A massive data breach at RemoteCOM exposed 14,000 personal files and police contacts from the SCOUT software. Learn what this aggressive spyware records, and the high risks for all involved parties. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
libgeotiff 1.7.4 Heap Buffer Overflow in geotifcp (libgeotiff) During 8-to-4 Bit Downsample with Odd Image Width – Full Disclosure
Posted by Ron E on Sep 30 A heap buffer overflow vulnerability exists in the geotifcp utility, distributed as part of libgeotiff. The flaw occurs in the function cpContig2ContigByRow_8_to_4 when processing TIFF images with an odd ImageWidth and using the -d option (downsampling from 8-bit to 4-bit). During conversion, the function iterates over pixels … Read More “libgeotiff 1.7.4 Heap Buffer Overflow in geotifcp (libgeotiff) During 8-to-4 Bit Downsample with Odd Image Width – Full Disclosure” »
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow – Full Disclosure
Posted by Ron E on Sep 30 In the samtools coverage subcommand, the -w / –n-bins option allows the user to specify how many “bins” to produce in the coverage histogram. The code computes: stats[tid].bin_width = (stats[tid].end – stats[tid].beg) / n_bins; When the number of bins (n_bins) is extremely large relative to the region … Read More “Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow – Full Disclosure” »
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib – Full Disclosure
Posted by Ron E on Sep 30 A denial-of-service vulnerability exists in Samtools and the underlying HTSlib when processing BED files containing extremely large interval values. The bed_index_core() function in bedidx.c uses the interval end coordinate to calculate allocation size without sufficient validation. By supplying a BED record with a crafted end coordinate (e.g., … Read More “Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Sep 30 APPLE-SA-09-29-2025-5 macOS Sonoma 14.8.1 macOS Sonoma 14.8.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/125330. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. FontParser Available for: macOS Sonoma Impact: Processing … Read More “APPLE-SA-09-29-2025-5 macOS Sonoma 14.8.1 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Sep 30 APPLE-SA-09-29-2025-6 visionOS 26.0.1 visionOS 26.0.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/125338. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. FontParser Available for: Apple Vision Pro Impact: Processing a … Read More “APPLE-SA-09-29-2025-6 visionOS 26.0.1 – Full Disclosure” »
New smishing attacks exploit Milesight routers to send phishing texts targeting Belgian users – Read More –
Posted by Apple Product Security via Fulldisclosure on Sep 30 APPLE-SA-09-29-2025-1 iOS 26.0.1 and iPadOS 26.0.1 iOS 26.0.1 and iPadOS 26.0.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/125326. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. FontParser Available for: … Read More “APPLE-SA-09-29-2025-1 iOS 26.0.1 and iPadOS 26.0.1 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Sep 30 APPLE-SA-09-29-2025-2 iOS 18.7.1 and iPadOS 18.7.1 iOS 18.7.1 and iPadOS 18.7.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/125327. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. FontParser Available for: … Read More “APPLE-SA-09-29-2025-2 iOS 18.7.1 and iPadOS 18.7.1 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Sep 30 APPLE-SA-09-29-2025-3 macOS Tahoe 26.0.1 macOS Tahoe 26.0.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/125328. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. FontParser Available for: macOS Tahoe Impact: Processing … Read More “APPLE-SA-09-29-2025-3 macOS Tahoe 26.0.1 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Sep 30 APPLE-SA-09-29-2025-4 macOS Sequoia 15.7.1 macOS Sequoia 15.7.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/125329. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. FontParser Available for: macOS Sequoia Impact: Processing … Read More “APPLE-SA-09-29-2025-4 macOS Sequoia 15.7.1 – Full Disclosure” »
Anthropic’s new coding-focused large language model, Claude Sonnet 4.5, is being touted as one of the most advanced models on the market when it comes to safety and security, with the company claiming the additional effort put into the model will make it more difficult for bad actors to exploit and easier to leverage for … Read More “Anthropic touts safety, security improvements in Claude Sonnet 4.5 – CyberScoop” »
New Android RAT Klopatra is targeting financial institutions using advanced evasion techniques – Read More –
In episode 70 of The AI Fix, our hosts learn that AI makes people more dishonest, Waymo’s robo-cars save lives but get outsmarted by a bathroom mirror, a “rescue” bot slurps up victims head-first, and China shows off a fusion robot arm that can lift ten elephants (or 200,000 pigeons, if you’re scientific about it). … Read More “The AI Fix #70: AI behaves… until it knows you’re watching – Graham Cluley” »
Guidance for staff responsible for managing a cyber incident response within their organisation. – Read More – NCSC Feed
Microsoft Flags AI Phishing Attack Hiding in SVG Files – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Microsoft Threat Intelligence detected a new AI-powered phishing campaign using LLMs to hide malicious code inside SVG files disguised as business dashboards. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since mid-October 2024 by a threat actor called UNC5174, according to NVISO Labs. The vulnerability in question is CVE-2025-41244 (CVSS score: 7.8), a local privilege escalation bug affecting the following versions – VMware … Read More “Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 – The Hacker News” »
The Problem: Legacy SOCs and Endless Alert Noise Every SOC leader knows the feeling: hundreds of alerts pouring in, dashboards lighting up like a slot machine, analysts scrambling to keep pace. The harder they try to scale people or buy new tools, the faster the chaos multiplies. The problem is not just volume; it is … Read More “Stop Alert Chaos: Context Is the Key to Effective Incident Response – The Hacker News” »
Microsoft on Tuesday unveiled the expansion of its Sentinel Security Incidents and Event Management solution (SIEM) as a unified agentic platform with the general availability of the Sentinel data lake. In addition, the tech giant said it’s also releasing a public preview of Sentinel Graph and Sentinel Model Context Protocol (MCP) server. “With graph-based context, … Read More “Microsoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake – The Hacker News” »
Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits – The Hacker News
Cybersecurity researchers have disclosed three now-patched security vulnerabilities impacting Google’s Gemini artificial intelligence (AI) assistant that, if successfully exploited, could have exposed users to major privacy risks and data theft. “They made Gemini vulnerable to search-injection attacks on its Search Personalization Model; log-to-prompt injection attacks against Gemini Cloud – Read More – The Hacker News
The Trump administration wants CISA to transition to a “new model” for supporting local government agencies’ cyber strategy – Read More –
Tenable researchers have discovered three vulnerabilities in Google’s Gemini GenAI tool – Read More –
Two 17-year-olds have been arrested by Dutch authorities on suspicion of spying for pro-Russian hackers. The teenagers, who are said to have been recruited as “disposable agents” via Telegram, were reportedly arrested last week “on suspicion that are linked to government-sponsored interference.” Read more in my article on the Hot for Security blog. – Read … Read More “Dutch teens recruited on Telegram, accused of Russia-backed hacking plot – Graham Cluley” »
New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events – The Hacker News
Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO) attacks and perform fraudulent transactions by preying on the elderly. Dutch mobile security company ThreatFabric said it discovered the campaign in August 2025 after users in Australia reported scammers managing Facebook groups promoting “active senior – Read … Read More “New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events – The Hacker News” »
Japanese brewery giant Asahi revealed that a cyber-attack had caused a “system failure”, with order and shipment operations suspended in Japan – Read More –