WhatsApp has fixed a zero-day vulnerability linked to a sophisticated cyber-attack – Read More –
Author: Joe-W
Large Language Models (LLMs) like GPT-4 and Claude are changing how businesses handle data, serve customers, and manage daily… The post Beyond Encryption: How to Secure LLM Inputs and Outputs appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Feds Seize VerifTools.Net, Operators Relaunch with VerifTools.com – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Authorities in the United States and the Netherlands have seized VerifTools, a marketplace selling fake IDs for cybercrime.… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
WhatsApp 0-Day Exploited in Attacks on Targeted iOS and macOS Users – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
WhatsApp has patched a critical 0-day (CVE-2025-55177) that allowed zero-click spyware attacks on iOS and Mac users. The… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Hackers Exploit CrushFTP Zero-Day to Take Over Servers – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
WatchTowr Labs uncovers a zero-day exploit (CVE-2025-54309) in CrushFTP. The vulnerability lets hackers gain admin access via the… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling – The Hacker News
Cybersecurity researchers have called attention to a cyber attack in which unknown threat actors deployed an open-source endpoint monitoring and digital forensic tool called Velociraptor, illustrating ongoing abuse of legitimate software for malicious purposes. “In this incident, the threat actor used the tool to download and execute Visual Studio Code with the likely intention of … Read More “Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling – The Hacker News” »
WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices – The Hacker News
WhatsApp has addressed a security vulnerability in its messaging apps for Apple iOS and macOS that it said may have been exploited in the wild in conjunction with a recently disclosed Apple flaw in targeted zero-day attacks. The vulnerability, CVE-2025-55177 (CVSS score: 8.0), relates to a case of insufficient authorization of linked device synchronization messages. … Read More “WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices – The Hacker News” »
8 Malicious NPM Packages Stole Chrome User Data on Windows – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
JFrog researchers found eight malicious NPM packages using 70 layers of obfuscation to steal data from Chrome browser… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Dexter: Resurrection Finale Leaks Online in Russian Dub – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Dexter: Resurrection finale leaks in Russian dub ahead of release. Episodes 9 and 10 surface online, echoing past… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution – The Hacker News
Three new security vulnerabilities have been disclosed in the Sitecore Experience Platform that could be exploited to achieve information disclosure and remote code execution. The flaws, per watchTowr Labs, are listed below – CVE-2025-53693 – HTML cache poisoning through unsafe reflections CVE-2025-53691 – Remote code execution (RCE) through insecure deserialization CVE-2025-53694 – – Read More … Read More “Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution – The Hacker News” »
The Federal Trade Commission thinks AI detectors might be BS. The agency announced a consent order this week with Workado, an Arizona-based company that makes an AI content detector tool. The order forces the company to retract its public claims about the tool’s effectiveness and to notify its customers. The settlement follows an investigation by … Read More “Workado settles with FTC over allegations it inflated its AI detectors’ capabilities – CyberScoop” »
The Federal Trade Commission thinks AI detectors might be BS. The agency announced a consent order this week with Workado, an Arizona-based company that makes an AI content detector tool. The order forces the company to retract its public claims about the tool’s effectiveness and to notify its customers. The settlement follows an investigation by … Read More “Workado settles with FTC over allegations it inflated its AI detectors’ capabilities – CyberScoop” »
Municipal government organisations across Sweden have found themselves impacted after a ransomware attack at a third-party software service supplier. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
Fake Facebook Ads Push Brokewell Spyware to Android Users – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A Facebook malvertising campaign is spreading the Brokewell spyware to Android users via fake TradingView ads. The malware… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
TransUnion Data Breach: 4.4 Million US Consumers’ Data Stolen – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A TransUnion data breach exposed 4.4 million US consumers’ Social Security numbers via a Salesforce hack. The attack… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Pyongyang-backed hacking group APT37 leveraged an internal South Korean intelligence briefing in a spear phishing campaign – Read More –
Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign – The Hacker News
An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an espionage campaign to deliver several malware families, including C6DOOR and GTELAM, in attacks primarily targeting users across Eastern Asia. “Attackers employed sophisticated infection chains, such as hijacked software updates and fake cloud storage … Read More “Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign – The Hacker News” »
Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication – The Hacker News
Amazon on Friday said it flagged and disrupted what it described as an opportunistic watering hole campaign orchestrated by the Russia-linked APT29 actors as part of their intelligence gathering efforts. The campaign used “compromised websites to redirect visitors to malicious infrastructure designed to trick users into authorizing attacker-controlled devices through Microsoft’s device code – Read … Read More “Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication – The Hacker News” »
China’s reliance on domestic technology companies to carry out large-scale hacking operations—as highlighted by the U.S. government and its allies this week—is a weakness that poses risks for Beijing, a top FBI official told CyberScoop. Cyber agencies from around the world published an alert Wednesday about what officials have described as an indiscriminate cyberespionage campaign … Read More “Top FBI official says Chinese reliance on domestic firms for hacking is a weakness – CyberScoop” »
Generative AI platforms like ChatGPT, Gemini, Copilot, and Claude are increasingly common in organizations. While these solutions improve efficiency across tasks, they also present new data leak prevention for generative AI challenges. Sensitive information may be shared through chat prompts, files uploaded for AI-driven summarization, or browser plugins that bypass familiar security controls. – Read … Read More “Can Your Security Stack See ChatGPT? Why Network Visibility Matters – The Hacker News” »
A software supply chain attack targeting Nx marks the first known case where attackers have leveraged developer AI assistants, according to StepSecurity – Read More –
The NIST National Cybersecurity Center of Excellence (NCCoE) has published the final version of NIST Internal Report (IR) 8349, Methodology for Characterizing Network Behavior of Internet of Things (IoT) Devices. Characterizing and understanding the – Read More – News and Events Feed by Topic
Recorded Future highlighted the vast capabilities of state actors to rapidly weaponize newly disclosed vulnerabilities for geopolitical purposes – Read More –
The Sangoma FreePBX Security Team has issued an advisory warning about an actively exploited FreePBX zero-day vulnerability that impacts systems with an administrator control panel (ACP) exposed to the public internet. FreePBX is an open-source private branch exchange (PBX) platform widely used by businesses, call centers, and service providers to manage voice communications. It’s built … Read More “FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available – The Hacker News” »
Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page – The Hacker News
Click Studios, the developer of enterprise-focused password management solution Passwordstate, said it has released security updates to address an authentication bypass vulnerability in its software. The issue, which is yet to be assigned a CVE identifier, has been addressed in Passwordstate 9.9 (Build 9972), released August 28, 2025. The Australian company said it fixed a … Read More “Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page – The Hacker News” »
Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain – The Hacker News
Authorities from the Netherlands and the United States have announced the dismantling of an illicit marketplace called VerifTools that peddled fraudulent identity documents to cybercriminals across the world. To that end, two marketplace domains (verif[.]tools and veriftools[.]net) and one blog have been taken down, redirecting site visitors to a splash page stating the action was … Read More “Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain – The Hacker News” »
The credit rating giant revealed that the breach, which occurred on July 28, was caused by unauthorized access to a third-party application – Read More –
Southeast Asia’s Hidden Crisis – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.
The UN Reveals Widespread Trafficking into Online Scam Operations Every day, thousands of lives are torn apart in the shadows of Southeast Asia. A harrowing UN Human Rights Office (OHCHR) report from 29 August 2023 reveals that hundreds of thousands of individuals have been trafficked and forced into online scam operations, often under brutal and … Read More “Southeast Asia’s Hidden Crisis – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.” »
Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations – The Hacker News
Google has revealed that the recent wave of attacks targeting Salesforce instances via Salesloft Drift is much broader in scope than previously thought, stating it impacts all integrations. “We now advise all Salesloft Drift customers to treat any and all authentication tokens stored in or connected to the Drift platform as potentially compromised,” Google Threat … Read More “Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations – The Hacker News” »
The semiconductor industry has become the throbbing heart of the current technology, and the tech ecosystem runs on it… The post Building Cyber Resilience in the Semiconductor Ecosystem appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Cybersecurity researchers have discovered a cybercrime campaign that’s using malvertising tricks to direct victims to fraudulent sites to deliver a new information stealer called TamperedChef. “The objective is to lure victims into downloading and installing a trojanized PDF editor, which includes an information-stealing malware dubbed TamperedChef,” Truesec researchers Mattias Wåhlén, Nicklas – Read More – … Read More “TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies – The Hacker News” »
CISA Adds Citrix and Git Flaws to KEV Catalogue Amid Active Exploitation – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
CISA has added three actively exploited vulnerabilities in Citrix and Git to its KEV Catalogue. Federal agencies must… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Salesloft Drift customers are compromised in a much more expansive downstream attack spree than previously thought, potentially ensnaring any user that integrated the AI chat agent platform to another service. “We’re telling organizations to treat any Drift integration into any platform as potentially compromised, so that increases the scope of victims,” Mandiant Consulting CTO Charles … Read More “Salesloft Drift compromised en masse, impacting all third-party integrations – CyberScoop” »
Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names – The Hacker News
Cybersecurity researchers have discovered a loophole in the Visual Studio Code Marketplace that allows threat actors to reuse names of previously removed extensions. Software supply chain security outfit ReversingLabs said it made the discovery after it identified a malicious extension named “ahbanC.shiba” that functioned similarly to two other extensions – ahban.shiba and ahban.cychelloworld – – … Read More “Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names – The Hacker News” »
Last month, KrebsOnSecurity tracked the sudden emergence of hundreds of polished online gaming and wagering websites that lure people with free credits and eventually abscond with any cryptocurrency funds deposited by players. We’ve since learned that these scam gambling sites have proliferated thanks to a new Russian affiliate program called “Gambler Panel” that bills itself … Read More “Affiliates Flock to ‘Soulless’ Scam Gambling Machine – Krebs on Security” »
Halo Security Enhances Platform with Custom Dashboards and Reports – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Miami, United States, 28th August 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Thousands of Developer Credentials Stolen in macOS “s1ngularity” Attack – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A supply chain attack called “s1ngularity” on Nx versions 20.9.0-21.8.0 stole thousands of developer credentials. The attack targeted… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Trump administration setting the stage for elections power grab, voting rights group warns – CyberScoop
Election officials should brace for direct attacks from the Trump administration and its state GOP allies on the integrity of U.S. elections — and plan for the possibility that federal agencies once charged with protecting elections will leverage their authorities to interfere in the process, a voting rights nonprofit warned. In a report released Wednesday, … Read More “Trump administration setting the stage for elections power grab, voting rights group warns – CyberScoop” »
Election officials should brace for direct attacks from the Trump administration and its state GOP allies on the integrity of U.S. elections — and plan for the possibility that federal agencies once charged with protecting elections will leverage their authorities to interfere in the process, a voting rights nonprofit warned. In a report released Wednesday, … Read More “Trump administration setting the stage for elections power grab, voting rights group warns – CyberScoop” »
Fake IT support lures are being used to trick employees into installing remote‑access tools via Microsoft Teams – Read More –
Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide – The Hacker News
The China-linked advanced persistent threat (APT) actor known as Salt Typhoon has continued its attacks targeting networks across the world, including organizations in the telecommunications, government, transportation, lodging, and military infrastructure sectors. “While these actors focus on large backbone routers of major telecommunications providers, as well as provider edge (PE) and – Read More – … Read More “Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide – The Hacker News” »
UK and US Blame Three Chinese Tech Firms for Global Cyberattacks – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A coalition of international cybersecurity agencies led by the UK’s National Cyber Security Centre (NCSC) has publicly linked… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Salt Typhoon’s primary Dutch targets were small internet service providers and hosting providers – Read More –
Picture this: Your team rolls out some new code, thinking everything’s fine. But hidden in there is a tiny flaw that explodes into a huge problem once it hits the cloud. Next thing you know, hackers are in, and your company is dealing with a mess that costs millions. Scary, right? In 2025, the average … Read More “Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec – The Hacker News” »
Visual Studio Code extensions have been identified exploiting a loophole that allows reuse of names from removed packages – Read More –
The Role of Enterprise Email Security in Modern Cybersecurity Strategies – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Email has always been a double-edged sword in the world of business. On one hand, it’s the fastest,… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Google Big Sleep AI Tool Finds Critical Chrome Vulnerability – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Make sure your Chrome browser is updated to the latest version to stay protected. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Nevada’s CIO confirmed in a press conference that ransomware actors had exfiltrated data from state networks, amid an ongoing incident investigation – Read More –
Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them – The Hacker News
Every day, businesses, teams, and project managers trust platforms like Trello, Asana, etc., to collaborate and manage tasks. But what happens when that trust is broken? According to a recent report by Statista, the average cost of a data breach worldwide was about $4.88 million. Also, in 2024, the private data of over 15 million … Read More “Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them – The Hacker News” »
Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials – The Hacker News
The maintainers of the nx build system have alerted users to a supply chain attack that allowed attackers to publish malicious versions of the popular npm package and other auxiliary plugins with data-gathering capabilities. “Malicious versions of the nx package, as well as some supporting plugin packages, were published to npm, containing code that scans … Read More “Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials – The Hacker News” »