Category: Attack Feeds

Smashing Security podcast #401: Hacks on the high seas, and how your home can be stolen under your nose  – Graham Cluley

An Italian hacker makes the grade and ends up in choppy waters, and hear true stories of title deed transfer scams. All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault. Plus – don’t miss our featured interview with Avery Pennarun of Tailscale.  – Read...

Removal of Cyber Safety Review Board members sparks alarm from cyber pros, key lawmaker  – CyberScoop

The top Democrat on the House Homeland Security Committee and a number of cyber professionals on Wednesday lamented the Trump administration’s decision to purge a cyber incident investigation board of its membership. But the move had some supporters, including the chairman of that same committee. Acting Department of Homeland Security Secretary Benjamine Huffman issued a memorandum Monday that strips all...

BreachForums founder to be resentenced after court vacates previous punishment  – CyberScoop

A U.S. appeals court has vacated the initial sentence given to Conor Brian Fitzpatrick, who pleaded guilty in 2023 for charges related to his work as founder of the notorious BreachForums website. The appeal, filed by the U.S. government, signals that a new sentence could be much more harsh than the one initially issued last year.  Fitzpatrick, operating under the...

‘Severe’ bug in ChatGPT’s API could be used to DDoS websites  – CyberScoop

A vulnerability in ChatGPT’s API can generate DDoS attacks against targeted websites, but the security researcher who discovered it says the flaw has since been addressed by OpenAI. In a security advisory posted to the developer platform GitHub, German security researcher Benjamin Flesch detailed the bug, which occurs when the API is processing HTTP POST requests to the back-end server....

CloudFlare detected (and blocked) the biggest DDoS attack on record  – CyberScoop

Web infrastructure and security company Cloudflare says it detected the biggest Distributed Denial-of-Service (DDoS) attack ever recorded, a 5.6 terabits per second (Tbps) attack directed at an internet service provider (ISP) in Eastern Asia. Despite the staggering volume of the attack, Cloudflare successfully managed and mitigated it without human intervention. The company said in research released Tuesday that the attack,...

Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review  – The Hacker News

The new Trump administration has terminated all memberships of advisory committees that report to the Department of Homeland Security (DHS).  “In alignment with the Department of Homeland Security’s (DHS) commitment to eliminating the misuse of resources and ensuring that DHS activities prioritize our national security, I am directing the termination of all current memberships on advisory  – Read More  –...

MasterCard DNS Error Went Unnoticed for Years  – Krebs on Security

The payment card giant MasterCard just fixed a glaring error in its domain name server settings that could have allowed anyone to intercept or divert Internet traffic for the company by registering an unused domain name. The misconfiguration persisted for nearly five years until a security researcher spent $300 to register the domain and prevent it from being grabbed by...

Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet  – The Hacker News

Threat actors are exploiting an unspecified zero-day vulnerability in Cambium Networks cnPilot routers to deploy a variant of the AISURU botnet called AIRASHI to carry out distributed denial-of-service (DDoS) attacks. According to QiAnXin XLab, the attacks have leveraged the security flaw since June 2024. Additional details about the shortcomings have been withheld to prevent further abuse. Some  – Read More ...

Government battles against tech could leave consumers less secure  – CyberScoop

Regulators around the globe are seeing the market power of consumer-facing tech companies and bringing cases against some of the industry’s biggest household names. They portray these legal fights as the conflicts of giants: the companies versus government regulators. Regulators have an essential mission to ensure companies play by the rules, preserving competition and giving people choices within those markets....

President Trump Pardons Silk Road Creator Ross Ulbricht After 11 Years in Prison  – The Hacker News

U.S. President Donald Trump on Tuesday granted a “full and unconditional pardon” to Ross Ulbricht, the creator of the infamous Silk Road drug marketplace, after spending 11 years behind bars. “I just called the mother of Ross William Ulbricht to let her know that in honor of her and the Libertarian Movement, which supported me so strongly, it was my...

Discover Hidden Browsing Threats: Free Risk Assessment for GenAI, Identity, Web, and SaaS Risks  – The Hacker News

As GenAI tools and SaaS platforms become a staple component in the employee toolkit, the risks associated with data exposure, identity vulnerabilities, and unmonitored browsing behavior have skyrocketed. Forward-thinking security teams are looking for security controls and strategies to address these risks, but they do not always know which risks to prioritize. In some cases, they might have  – Read...

PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack  – The Hacker News

A previously undocumented China-aligned advanced persistent threat (APT) group named PlushDaemon has been linked to a supply chain attack targeting a South Korean virtual private network (VPN) provider in 2023, according to new findings from ESET. “The attackers replaced the legitimate installer with one that also deployed the group’s signature implant that we have named SlowStepper – a  – Read...

Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products  – The Hacker News

Oracle is urging customers to apply its January 2025 Critical Patch Update (CPU) to address 318 new security vulnerabilities spanning its products and services. The most severe of the flaws is a bug in the Oracle Agile Product Lifecycle Management (PLM) Framework (CVE-2025-21556, CVSS score: 9.9) that could allow an attacker to seize control of susceptible instances. “Easily exploitable  –...

Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Device  – The Hacker News

Web infrastructure and security company Cloudflare on Tuesday said it detected and blocked a 5.6 Terabit per second (Tbps) distributed denial-of-service (DDoS) attack, the largest ever attack to be reported to date. The UDP protocol-based attack took place on October 29, 2024, targeting one of its customers, an unnamed internet service provider (ISP) from Eastern Asia. The activity originated  –...

Ransomware groups pose as fake tech support over Teams  – CyberScoop

Researchers at cybersecurity firm Sophos are tracking multiple clusters of hacking activity leveraging Microsoft 365 instances, Microsoft Teams and email bombing tactics to deliver ransomware. In new research released Tuesday, the company said it had identified at least two distinct clusters of hacking activity using the tactics to infect targets between November and December 2024. First, several individuals at an...

Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers  – The Hacker News

Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras and Huawei HG532 routers to rope the devices into a Mirai botnet variant dubbed Murdoc_Botnet. The ongoing activity “demonstrates enhanced capabilities, exploiting vulnerabilities to compromise devices and establish expansive botnet networks,” Qualys security researcher Shilpesh  – Read More  – The Hacker News 

From qualitative to quantifiable: Transforming cyber risk management for critical infrastructure  – CyberScoop

Around the world, attacks against critical infrastructure have become increasingly common. More and more, these aggressions are carried out via mice and keyboards rather than bombs and missiles, such as with the 2021 ransomware attack on Colonial Pipeline. From a military strategy perspective, it’s easy to understand why, as cyberattacks against infrastructure can be executed remotely, cheaply, and with comparatively...

13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks  – The Hacker News

A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate malware via spam campaigns, the latest addition to a list of botnets powered by MikroTik devices. The activity “take[s] advantage of misconfigured DNS records to pass email protection techniques,” Infoblox security researcher David Brunsdon said in a technical report published last week. “This ...

Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties  – The Hacker News

A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National Defense Information (NDI) to individuals who did not have the necessary authorization to receive it and attempted to cover up the activity. Asif William Rahman, 34, of Vienna, was an employee of the CIA since 2016 and had a Top Secret security...

HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects  – The Hacker News

Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, “Were all functionalities of the web app tested?” or ” Were there any security issues that could have been identified during testing?” often go unresolved, raising concerns about the thoroughness of the security testing. This frustration is common among many security teams. Pentest  –...

Pwn2Own Automotive 2025: The Full Schedule  – Zero Day Initiative – Blog

こんにちは and welcome to the second annual Pwn2Own Automotive competition. We are at Automotive World in Tokyo, and we’ve brought together some of the best researchers in the world to test the latest automotive components. We had our random drawing for the order of events earlier today, and from that, we have put together the following schedule. Please note that...

Product Walkthrough: How Satori Secures Sensitive Data From Production to AI  – The Hacker News

Every week seems to bring news of another data breach, and it’s no surprise why: securing sensitive data has become harder than ever. And it’s not just because companies are dealing with orders of magnitude more data. Data flows and user roles are constantly shifting, and data is stored across multiple technologies and cloud environments. Not to mention, compliance requirements...

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers  – The Hacker News

Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China with a known malware called ValleyRAT. The attacks leverage a multi-stage loader dubbed PNGPlug to deliver the ValleyRAT payload, Intezer said in a technical report published last week. The infection chain commences with a phishing  – Read...

CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits  – The Hacker News

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors to impersonate the cybersecurity agency by sending AnyDesk connection requests. The AnyDesk requests claim to be for conducting an audit to assess the “level of security,” CERT-UA added, cautioning organizations to be on the lookout for such social engineering attempts that seek to ...

DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection  – The Hacker News

The Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targeted cyber attacks. The artifacts in question, named Tanzeem (meaning “organization” in Urdu) and Tanzeem Update, were spotted in October and December 2024 by cybersecurity company Cyfirma. The apps in question have been found to incorporate identical functions, barring minor modifications...

Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers  – The Hacker News

New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a wide range of attacks. “Internet hosts that accept tunneling packets without verifying the sender’s identity can be hijacked to perform anonymous attacks and provide access to their networks,” Top10VPN said in a study, as part of a collaboration with KU Leuven professor  –...

Looking at the Attack Surfaces of the Pioneer DMH-WT7600NEX IVI  – Zero Day Initiative – Blog

For the upcoming Pwn2Own Automotive contest, a total of four in-vehicle infotainment (IVI) head units have been selected as targets. One of these is the single-DIN Pioneer DMH-WT7600NEX. This unit offers a variety of functionality, such as wired and wireless Android Auto and Apple CarPlay, USB media playback, and more. This blog post aims to detail some of the attack...

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]  – The Hacker News

As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to fade. Recent cyber sanctions and intelligence moves show a reality where malware and fake news are used as tools in global politics. Every cyberattack now seems to have deeper political consequences. Governments are facing new, unpredictable threats that can’t be fought with  –...

Mobile Cybercrime in South Africa  – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.

Cybercrime can be defined as “criminal activities carried out by means of computers or the Internet.” With the growing use of smartphones, mobile devices have become an integral part of this definition, significantly expanding the scope of potential cyber threats. Recent Incidents of Mobile Cybercrime In a notable case, twelve people were recently arrested in […] The post Mobile Cybercrime...

Copier and Printer Identity Theft  – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.

A Hidden Goldmine for Identity ThievesCopier and Printer Identity Theft Printers, fax machines, and copiers—once considered harmless office staples—have become unexpected goldmines for identity thieves. These devices often contain hard drives that store sensitive and personal information, creating significant vulnerabilities for individuals and businesses alike. The Hidden Threat in Office Equipment Since 2002, nearly all […] The post Copier and...

Ponzi Scams continue to entrap South Africans  – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.

Ponzi schemes of all sorts are over 150 years old and the reason that they have held such great success is that people continue to fall for them. This is no more true than the uptick in Ponzi schemes in SA, and for every criminal busted by the FSCA (Financial Sector Conduct Authority), it seems […] The post Ponzi Scams...

Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP  – The Hacker News

Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI) repository that come with capabilities to steal data and even delete sensitive data from infected systems. The list of identified packages is below – @async-mutex/mutex, a typosquat of async-mute (npm) dexscreener, which masquerades as a library for accessing liquidity pool  – Read More ...

TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025  – The Hacker News

Popular video-sharing social network TikTok has officially gone dark in the United States, 2025, as a federal ban on the app comes into effect on January 19, 2025. “We regret that a U.S. law banning TikTok will take effect on January 19 and force us to make our services temporarily unavailable,” the company said in a pop-up message. “We’re working...

AttackFeed by Joe Wagner
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.