Elastic has rolled out security updates to address a critical security flaw impacting the Kibana data visualization dashboard software for Elasticsearch that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-25012, carries a CVSS score of 9.9 out of a maximum of 10.0. It has been described as a case of prototype pollution. … Read More “Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution – The Hacker News” »
Author: [email protected] (The Hacker News)
Layoffs and cutbacks have been cited as major factors in a significant drop in job satisfaction among women working in cybersecurity, according to ISC2 – Read More –
Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations can no longer rely on periodic assessments or static vulnerability lists to stay secure. Instead, they need a dynamic approach that provides real-time insights into how attackers move through their environment. This is where attack graphs come in. By mapping … Read More “Outsmarting Cyber Threats with Attack Graphs – The Hacker News” »
Journey with us to Myanmar’s shadowy scam factories, where trafficked workers are forced to run romance-baiting and fake tech support scams, and find out why a company’s mandatory hold time for tech support could lead to innocent users having their computers compromised. All this and more is discussed in the latest edition of the “Smashing … Read More “Smashing Security podcast #407: HP’s hold music, and human trafficking – Graham Cluley” »
Enisa identifies six sectors that it says must improve on NIS2 compliance – Read More –
Over 1,000 websites powered by WordPress have been infected with a third-party JavaScript code that injects four separate backdoors. “Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed,” c/side researcher Himanshu Anand said in a Wednesday analysis. The malicious JavaScript code has been found to be served … Read More “Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access – The Hacker News” »
The DoJ has charged Chinese government and i-Soon employees for a series of for-profit data theft campaigns – Read More –
How NCSC guidance can help organisations detect and protect themselves from credential abuse. – Read More – NCSC Feed
Vulnerability Scanning solutions offer a cost-effective way to discover and manage common security issues. – Read More – NCSC Feed
The U.S. Department of Justice (DoJ) has announced charges against 12 Chinese nationals for their alleged participation in a wide-ranging scheme designed to steal data and suppress free speech and dissent globally. The individuals include two officers of the People’s Republic of China’s (PRC) Ministry of Public Security (MPS), eight employees of an ostensibly private … Read More “U.S. Charges 12 Chinese Nationals in State-Backed Hacking Operations – The Hacker News” »
We publish the results of our ACD 2.0 external attack surface management (EASM) trials – Read More – NCSC Feed
The Justice Department on Wednesday indicted 12 Chinese nationals for their alleged involvement in an extensive nation-state-backed espionage campaign that included a spree of attacks on U.S. federal and state agencies, including the late 2024 attack targeting the Treasury Department. Officials accused the Chinese individuals, including two officers of China’s Ministry of Public Security, eight … Read More “US indicts 12 Chinese nationals for vast espionage attack spree – CyberScoop” »
Microsoft warns that Chinese espionage group Silk Typhoon now exploits IT tools like remote management apps and cloud services to breach networks. – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Threat actors became increasingly efficient last year, rapidly achieving lateral movement and swiftly stealing data at a faster clip than ever before, according to multiple threat intelligence firms. The reduced time frame is a clear indicator that cybercriminals are constantly improving their ability to be successful. With the abuse of legitimate system tools to help … Read More “Cybercriminals picked up the pace on attacks last year – CyberScoop” »
The generative AI revolution is leading to an explosion of chatbot personas that are specifically designed to promote harmful behaviors like anorexia, suicidal ideation and pedophilia, according to a new report from Graphika. Graphika’s research focuses on three distinct chatbot personas that have become particularly popular online: those portraying sexualized minors, advocates for eating disorders … Read More “Anorexia coaches, self-harm buddies and sexualized minors: How online communities are using AI chatbots for harmful behavior – CyberScoop” »
Open-source software security firm Chainguard announced Wednesday that it is now building FIPS-validated images for Apache Cassandra, achieving what it describes as a first-of-its-kind accomplishment in the open-source community. The project enables organizations in regulated industries — including government, health care, and finance — to deploy Cassandra with cryptographic libraries compliant with the National Institute … Read More “Chainguard’s FIPS-compliant Cassandra addresses security demand of federal and regulated markets – CyberScoop” »
Cactus is a ransomware-as-a-service (RaaS) group that encrypts victim’s data and demands a ransom for a decryption key. Read more about it in my article on the Tripwire State of Security blog. – Read More – Graham Cluley
Chinese espionage group Silk Typhoon is increasingly exploiting common IT solutions to infiltrate networks and exfiltrate data – Read More –
The NSA’s former top cybersecurity official told Congress on Wednesday that the Trump administration’s attempts to mass fire probationary federal employees will be “devastating” for U.S. cybersecurity operations. In testimony to the House Select Committee on the Chinese Communist Party, Rob Joyce, the former NSA cybersecurity director who retired from government service last year, warned … Read More “Former top NSA cyber official: Probationary firings ‘devastating’ to cyber, national security – CyberScoop” »
Phishing is one of the most common types of cyber crime. These scams use convincing emails or other messages, such as text messages or social media messages, to trick users into opening harmful links, downloading malicious software, or submitting – Read More – News and Events Feed by Topic
London, United Kingdom, 5th March 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Post Content – Read More – IC3.gov News
The China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology (IT) supply chain as a means to obtain initial access to corporate networks. That’s according to new findings from the Microsoft Threat Intelligence team, which said the Silk … Read More “China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access – The Hacker News” »
Nonprofits are facing a surge in cyber-attacks as email threats rise 35%, targeting donor data and transactions – Read More –
Google has announced the rollout of artificial intelligence (AI)-powered scam detection features to secure Android device users and their personal information. “These features specifically target conversational scams, which can often appear initially harmless before evolving into harmful situations,” Google said. “And more phone calling scammers are using spoofing techniques to hide their real – Read … Read More “Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud – The Hacker News” »
Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America – The Hacker News
The threat actor known as Dark Caracal has been attributed to a campaign that deployed a remote access trojan called Poco RAT in attacks targeting Spanish-speaking targets in Latin America in 2024. The findings come from Russian cybersecurity company Positive Technologies, which described the malware as loaded with a “full suite of espionage features.” “It … Read More “Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America – The Hacker News” »
USB drive attacks constitute a significant cybersecurity risk, taking advantage of the everyday use of USB devices to deliver malware and circumvent traditional network security measures. These attacks lead to data breaches, financial losses, and operational disruptions, with lasting impacts on an organization’s reputation. An example is the Stuxnet worm discovered in 2010, a malware … Read More “Defending against USB drive attacks with Wazuh – The Hacker News” »
With Android Scam Detection for messages and calls, Google wants to push scam detection further than traditional spam detection – Read More –
Have you had a phone call from police about your cryptocurrency wallet? Be on your guard – you could be about to be scammed. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
The rapid adoption of cloud services, SaaS applications, and the shift to remote work have fundamentally reshaped how enterprises operate. These technological advances have created a world of opportunity but also brought about complexities that pose significant security threats. At the core of these vulnerabilities lies Identity—the gateway to enterprise security and the number one … Read More “Identity: The New Cybersecurity Battleground – The Hacker News” »
The threat actor known as Lotus Panda has been observed targeting government, manufacturing, telecommunications, and media sectors in the Philippines, Vietnam, Hong Kong, and Taiwan with updated versions of a known backdoor called Sagerunex. “Lotus Blossom has been using the Sagerunex backdoor since at least 2016 and is increasingly employing long-term persistence command shells and … Read More “Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants – The Hacker News” »
ISACA identified factors such as heavy workload and long hours as the primary causes of stress, while there has been high turnover of IT professionals in the past two years – Read More –
Cofense uncovers new LinkedIn phishing scam delivering ConnectWise RAT. Learn how attackers bypass security with fake InMail emails… – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Veriti Research reveals 40% of networks allow ‘any/any’ cloud access, exposing critical vulnerabilities. Learn how malware like XWorm… – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Malicious hacking groups pay close attention to public documents related to criminal prosecutions, and the lack of standardized names for those groups hampers U.S. federal law enforcement, an investigator said in a recent speech. The investigator, who could not be named under the conditions of the speech, said those are just two of many problems … Read More “Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement – CyberScoop” »
New SANS Institute research finds that 50% of global organizations were hit by an OT security incident in the past year – Read More –
Compromise of your software build pipeline can have wide-reaching impact; here’s how to tackle the problem. – Read More – NCSC Feed
Zero trust architecture design principles 1.0 launched. – Read More – NCSC Feed
Chris Ensor highlights some important elements of the NCSC’s new Technology Assurance strategy. – Read More – NCSC Feed
GuidePoint Security has received reports of multiple organizations receiving ransom letters in the mail – Read More –
Multiple vulnerabilities have been discovered in VMware ESXi, Workstation, and Fusion could allow for local code execution. VMware ESXi, Workstation, and Fusion are all virtualization products that allow users to run virtual machines (VMs) on their computers. Successful exploitation of these vulnerability could allow for local code execution in the context of the administrator account. An … Read More “Multiple vulnerabilities have been discovered in VMware ESXi, Workstation, and Fusion which could allow for local code execution. – Cyber Security Advisories – MS-ISAC” »
Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS systems. “The threat actor has published at least seven packages impersonating widely used Go libraries, including one (github[.]com/shallowmulti/hypert) that appears to target financial-sector developers – Read More … Read More “Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems – The Hacker News” »
As Salt Typhoon and other hacking groups continue targeting U.S. telecoms, a bipartisan bill that cleared a key House panel Tuesday aims to formalize a more cyber-focused role for the federal agency focused on those wireless networks. The National Telecommunications and Information Administration Organization Act would establish an Office of Policy Development and Cybersecurity within … Read More “Congress eyes bigger cyber role for NTIA amid telecom attacks – CyberScoop” »
Scammers are impersonating BianLian ransomware, and mailing fake ransom letters to businesses. Learn the red flags and how… – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Boston and Tel Aviv, United States, 4th March 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Unit 42 uncovers JavaGhost’s evolving AWS attacks. Learn how this threat actor uses phishing, IAM abuse, and advanced… – Read More – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News
A cyber-espionage campaign targeting UAE aviation and transport has been identified by researchers, using customized lures to deploy Sosano malware – Read More –
Private 5G networks face security risks amid AI adoption and a lack of specialized expertise – Read More –
Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) module for maintaining persistent control over infected hosts, a sign that affiliates previously associated with Black Basta may have transitioned to CACTUS. “Once infiltrated, it grants attackers a wide range of remote control capabilities, allowing … Read More “Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates – The Hacker News” »
In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Simon Humbert and Guy Lederfein of the Trend Micro Research Team detail a recently patched code execution vulnerability in the Microsoft Windows Key Distribution Center (KDC) Proxy. This bug was originally discovered by k0shl and Wei in Kunlun Lab with Cyber KunLun. Successful … Read More “CVE-2024-43639: Remote Code Execution in Microsoft Windows KDC Proxy – Zero Day Initiative – Blog” »