Category: Attack Feeds

Researchers Expose NonEuclid RAT Using UAC Bypass and AMSI Evasion Techniques – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have shed light on a new remote access trojan called NonEuclid that allows bad actors to remotely control compromised Windows systems. “The NonEuclid remote access trojan (RAT), developed in C#, is a highly sophisticated malware offering unauthorised remote access with advanced evasion techniques,” Cyfirma said in a technical analysis published last week. “It employs”}]]  – Read More ...

Top 5 Malware Threats to Prepare Against in 2025 – [email protected] (The Hacker News)

– 2024 had its fair share of high-profile cyber attacks, with companies as big as Dell and TicketMaster falling victim to data breaches and other infrastructure compromises. In 2025, this trend will continue. So, to be prepared for any kind of malware attack, every organization needs to know its cyber enemy in advance. Here are 5 common malware families that...

Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks – [email protected] (The Hacker News)

– [[{“value”:”A Mirai botnet variant has been found exploiting a newly disclosed security flaw impacting Four-Faith industrial routers since early November 2024 with the goal of conducting distributed denial-of-service (DDoS) attacks. The botnet maintains approximately 15,000 daily active IP addresses, with the infections primarily scattered across China, Iran, Russia, Turkey, and the United States.”}]]  – Read More  – The Hacker...

FCC Launches ‘Cyber Trust Mark’ for IoT Devices to Certify Security Compliance – [email protected] (The Hacker News)

– [[{“value”:”The U.S. government on Tuesday announced the launch of the U.S. Cyber Trust Mark, a new cybersecurity safety label for Internet-of-Things (IoT) consumer devices. “IoT products can be susceptible to a range of security vulnerabilities,” the U.S. Federal Communications Commission (FCC) said. “Under this program, qualifying consumer smart products that meet robust cybersecurity standards will bear”}]]  – Read More ...

Google’s Willow Quantum Chip and Its Potential Threat to Current Encryption Standards – [email protected]

– [[{“value”:” Introduction: Google’s recent announcement of their Willow quantum processor marks a significant advancement in quantum computing technology while raising questions about the security and sustainability of current encryption methods. As quantum computers grow more powerful, cybersecurity experts grow increasingly concerned about their potential to break widely used encryption standards that protect sensitive data worldwide. Quantum vs. Traditional Computing:...

CISA Flags Critical Flaws in Mitel and Oracle Systems Amid Active Exploitation – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three flaws impacting Mitel MiCollab and Oracle WebLogic Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2024-41713 (CVSS score: 9.1) – A path traversal vulnerability in Mitel MiCollab that could allow an attacker”}]]  – Read...

National Cyber Director Harry Coker looks back (and ahead) on the Cyber Director office – Tim Starks

– [[{“value”:” Days after the four-year anniversary of the creation of the Office of the National Cyber Director and days before its current chief is set to depart, that man, Harry Coker Jr., looked both backward and forward at the office in a speech Tuesday and a separate interview with CyberScoop. Coker touched on software liability, regulations, the authorities of...

A Day in the Life of a Prolific Voice Phishing Crew – BrianKrebs

– [[{“value”:” Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. However, new details about the internal operations of a prolific voice phishing gang show the group routinely abuses legitimate services at Apple and Google to force a variety of outbound communications...

The AI Fix #32: Agentic AI, killer robot fridges, and the robosexual revolution – Graham Cluley

– [[{“value”:”In episode 32 of The AI Fix, our hosts learn the meaning of “poronkusema”, Mark discovers his dream job, a school tries using AI instead of teachers, the “Godfather of AI” says AI will see us as toddlers, and Graham lifts the lid on the hidden threat of killer robot fridges. Mark explains why 2025 is the year of...

White House launches cybersecurity label program for consumers – Greg Otto

– [[{“value”:” The White House announced Tuesday the official launch of the U.S. Cyber Trust Mark, a cybersecurity labeling initiative aimed at enhancing the security of internet-connected devices.  The initiative tackles rising consumer concerns about the security vulnerabilities of “smart” devices essential to modern homes. As households become more dependent on interconnected gadgets — with a 2023 Deloitte study revealing...

Android patches several vulnerabilities in first security update of 2025 – Greg Otto

– [[{“value”:” Android has released its first security update of the year, disclosing several critical and high-severity vulnerabilities that affect a wide range of Android devices.  The bulletin identifies five critical remote code execution (RCE) vulnerabilities affecting what Android categorizes as the “system,” which encompasses Android’s core components and underlying architecture. These vulnerabilities could allow attackers to execute code without...

Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have uncovered firmware security vulnerabilities in the Illumina iSeq 100 DNA sequencing instrument that, if successfully exploited, could permit attackers to brick or plant persistent malware on susceptible devices. “The Illumina iSeq 100 used a very outdated implementation of BIOS firmware using CSM [Compatibility Support Mode] mode and without Secure Boot or standard”}]]  – Read More  –...

Farewell to the Fallen: The Cybersecurity Stars We Lost Last Year – [email protected] (The Hacker News)

– It’s time once again to pay our respects to the once-famous cybersecurity solutions whose usefulness died in the past year. The cybercriminal world collectively mourns the loss of these solutions and the easy access they provide to victim organizations. These solutions, though celebrated in their prime, succumbed to the twin forces of time and advancing threats. Much like a...

CISA: No Wider Federal Impact from Treasury Cyber Attack, Investigation Ongoing – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday said there are no indications that the cyber attack targeting the Treasury Department impacted other federal agencies. The agency said it’s working closely with the Treasury Department and BeyondTrust to get a better understanding of the breach and mitigate its impacts. “The security of federal systems and the data...

New EAGERBEE Variant Targets ISPs and Governments with Advanced Backdoor Capabilities – [email protected] (The Hacker News)

– [[{“value”:”Internet service providers (ISPs) and governmental entities in the Middle East have been targeted using an updated variant of the EAGERBEE malware framework. The new variant of EAGERBEE (aka Thumtais) comes fitted with various components that allow the backdoor to deploy additional payloads, enumerate file systems, and execute commands shells, demonstrating a significant evolution. “The key”}]]  – Read More ...

Moxa Alerts Users to High-Severity Vulnerabilities in Cellular and Secure Routers – [email protected] (The Hacker News)

– [[{“value”:”Taiwan-based Moxa has warned of two security vulnerabilities impacting its cellular routers, secure routers, and network security appliances that could allow privilege escalation and command execution. The list of vulnerabilities is as follows – CVE-2024-9138 (CVSS 4.0 score: 8.6) – A hard-coded credentials vulnerability that could allow an authenticated user to escalate privileges and gain”}]]  – Read More  –...

Industrial networking manufacturer Moxa reports ‘critical’ router bugs – djohnson

– [[{“value”:” Firmware in cellular routers, secure routers and network security appliances made by Moxa are vulnerable to a pair of high severity bugs that can escalate privileges for an attacker, give root-level access or allow for unauthorized execution of commands. In a pair of CVEs published Jan. 3, Moxa called the flaws “critical” and warned they “pose a significant...

India Proposes Digital Data Rules with Tough Penalties and Cybersecurity Requirements – [email protected] (The Hacker News)

– [[{“value”:”The Indian government has published a draft version of the Digital Personal Data Protection (DPDP) Rules for public consultation. “Data fiduciaries must provide clear and accessible information about how personal data is processed, enabling informed consent,” India’s Press Information Bureau (PIB) said in a statement released Sunday. “Citizens are empowered with rights to demand data erasure,”}]]  – Read More ...

FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices – [email protected] (The Hacker News)

– [[{“value”:”An Android information stealing malware named FireScam has been found masquerading as a premium version of the Telegram messaging app to steal data and maintain persistent remote control over compromised devices. “Disguised as a fake ‘Telegram Premium’ app, it is distributed through a GitHub.io-hosted phishing site that impersonates RuStore – a popular app store in the Russian Federation,””}]]  –...

From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch – [email protected] (The Hacker News)

– In 2024, cyber threats targeting SaaS surged, with 7,000 password attacks blocked per second (just in Entra ID)—a 75% increase from last year—and phishing attempts up by 58%, causing $3.5 billion in losses (source: Microsoft Digital Defense Report 2024). SaaS attacks are increasing, with hackers often evading detection through legitimate usage patterns. The cyber threat arena saw standout  –...

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan] – [email protected] (The Hacker News)

– [[{“value”:”Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for attackers. The line between convenience and vulnerability has never been thinner. This week, we dive into the hidden risks,...

Russian-Speaking Attackers Target Ethereum Devs with Fake Hardhat npm Packages – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have revealed several malicious packages on the npm registry that have been found impersonating the Nomic Foundation’s Hardhat tool in order to steal sensitive data from developer systems. “By exploiting trust in open source plugins, attackers have infiltrated these platforms through malicious npm packages, exfiltrating critical data such as private keys, mnemonics,”}]]  – Read More  – The...

Tenable CEO Amit Yoran dies at 54 – Greg Otto

– [[{“value”:” Amit Yoran, an influential figure in cybersecurity and the CEO and chairman of Tenable, passed away on Friday at the age of 54.  Yoran’s death marks the end of a career characterized by significant contributions to the cybersecurity industry, marked leadership, and a dedicated pursuit of digital safety. A native of Virginia, Yoran succumbed to cancer after a...

Researchers Uncover Nuclei Vulnerability Enabling Signature Bypass and Code Execution – [email protected] (The Hacker News)

– [[{“value”:”A high-severity security flaw has been disclosed in ProjectDiscovery’s Nuclei, a widely-used open-source vulnerability scanner that, if successfully exploited, could allow attackers to bypass signature checks and potentially execute malicious code. Tracked as CVE-2024-43405, it carries a CVSS score of 7.4 out of a maximum of 10.0. It impacts all versions of Nuclei later than 3.0.0. “The”}]]  – Read...

PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have flagged a new malware called PLAYFULGHOST that comes with a wide range of information-gathering features like keylogging, screen capture, audio capture, remote shell, and file transfer/execution. The backdoor, according to Google’s Managed Defense team, shares functional overlaps with a known remote administration tool referred to as Gh0st RAT, which had its source”}]]  – Read More  –...

U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Friday issued sanctions against a Beijing-based cybersecurity company known as Integrity Technology Group, Incorporated for orchestrating several cyber attacks against U.S. victims. These attacks have been publicly attributed to a Chinese state-sponsored threat actor tracked as Flax Typhoon (aka Ethereal Panda or”}]]  – Read More  – The Hacker...

U.S. sanctions take aim at Chinese company said to aid hackers’ massive botnet – Tim Starks

– [[{“value”:” The U.S. government on Friday sanctioned a Chinese company that Western nations had connected to a Beijing-sponsored hacking group’s botnet, which had compromised hundreds of thousands of devices before a joint takedown operation last year. Flax Typhoon hackers made use of infrastructure at Integrity Technology Group to exploit victims, according to the Treasury Department’s Office of Foreign Assets...

Exit interview: FCC’s Jessica Rosenworcel discusses her legacy on cybersecurity, AI and regulation – djohnson

– [[{“value”:” On Jan. 20, Jessica Rosenworcel will leave the Federal Communications Commission, capping off a 12-year tenure that saw her rise from commissioner to chairwoman in 2021. Under her leadership, the agency has taken an aggressive approach to regulating cybersecurity, data privacy and emergent artificial intelligence use in the communications sector. Over the past four years, the FCC has...

Exit interview: FCC’s Jessica Rosenworcel discusses her legacy on cybersecurity, AI and regulation – djohnson

– [[{“value”:” On Jan. 20, Jessica Rosenworcel will leave the Federal Communications Commission, capping off a 12-year tenure that saw her rise from commissioner to chairwoman in 2021. Under her leadership, the agency has taken an aggressive approach to regulating cybersecurity, data privacy and emergent artificial intelligence use in the communications sector. Over the past four years, the FCC has...

NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT – Deeba Ahmed

– Researchers discovered a malicious package on the npm package registry that resembles a library for Ethereum smart contract vulnerabilities but actually drops an open-source remote access trojan called Quasar RAT onto developer systems.  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

New AI Jailbreak Method ‘Bad Likert Judge’ Boosts Attack Success Rates by Over 60% – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have shed light on a new jailbreak technique that could be used to get past a large language model’s (LLM) safety guardrails and produce potentially harmful or malicious responses. The multi-turn (aka many-shot) attack strategy has been codenamed Bad Likert Judge by Palo Alto Networks Unit 42 researchers Yongzhe Huang, Yang Ji, Wenjun Hu, Jay Chen, Akshata...