Category: Attack Feeds

0

Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability  – The Hacker News

Cybersecurity researchers have discovered a bypass for a now-patched security vulnerability in the NVIDIA Container Toolkit that could be exploited to break out of a container’s isolation protections and gain complete access to the underlying host. The new vulnerability is being tracked as CVE-2025-23359 (CVSS score: 8.3). It affects the following versions – NVIDIA Container Toolkit (All  – Read More ...

0

How to Steer AI Adoption: A CISO Guide  – The Hacker News

CISOs are finding themselves more involved in AI teams, often leading the cross-functional effort and AI strategy. But there aren’t many resources to guide them on what their role should look like or what they should bring to these meetings.  We’ve pulled together a framework for security leaders to help push AI teams and committees further in their AI adoption—providing...

0

North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack  – The Hacker News

The North Korea-linked threat actor known as Kimsuky has been observed using a new tactic that involves deceiving targets into running PowerShell as an administrator and then instructing them to paste and run malicious code provided by them. “To execute this tactic, the threat actor masquerades as a South Korean government official and over time builds rapport with a target...

0

Microsoft’s Patch Tuesday Fixes 63 Flaws, Including Two Under Active Exploitation  – The Hacker News

Microsoft on Tuesday released fixes for 63 security flaws impacting its software products, including two vulnerabilities that it said has come under active exploitation in the wild. Of the 63 vulnerabilities, three are rated Critical, 57 are rated Important, one is rated Moderate, and two are rated Low in severity. This is aside from the 23 flaws Microsoft addressed in...

0

Ivanti Patches Critical Flaws in Connect Secure and Policy Secure – Update Now  – The Hacker News

Ivanti has released security updates to address multiple security flaws impacting Connect Secure (ICS), Policy Secure (IPS), and Cloud Services Application (CSA) that could be exploited to achieve arbitrary code execution. The list of vulnerabilities is below – CVE-2024-38657 (CVSS score: 9.1) – External control of a file name in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy  –...

0

Microsoft Patch Tuesday, February 2025 Edition  – Krebs on Security

Microsoft today issued security updates to fix at least 56 vulnerabilities in its Windows operating systems and supported software, including two zero-day flaws that are being actively exploited. All supported Windows operating systems will receive an update this month for a buffer overflow vulnerability that carries the catchy name CVE-2025-21418. This patch should be a priority for enterprises, as Microsoft...

0

Trump picks Sean Cairncross for national cyber director  – CyberScoop

President Donald Trump has selected Sean Cairncross — a former White House and Republican National Committee official and the former CEO of the Millennium Challenge Corporation, a federal foreign aid agency — to be his national cyber director. Cairncross hasn’t held any major cyber-related positions, but during his time in the Trump White House as deputy assistant to the president...

0

U.S. adversaries increasingly turning to cybercriminals and their malware for help  – CyberScoop

Governments of the United States’ chief adversaries in cyberspace, especially Russia, have increasingly been relying on cybercriminals and their tools to advance their goals, according to a Google report published Tuesday. There’s long been overlap between government and criminal cyber operators, but governments are now enjoying the benefits of collaboration and borrowing more — both for the general boons they can...

0

Microsoft fixes 63 vulnerabilities, including 2 zero-days  – CyberScoop

Microsoft patched 63 vulnerabilities affecting some of its underlying systems and core products, the company said in its latest security update Tuesday, including Microsoft Excel, Microsoft Office, Windows CoreMessaging and Windows Storage. More than two-thirds of the vulnerabilities covered in the update are high-severity flaws on the CVSS scale. Vulnerabilities with high-severity base scores run across multiple Microsoft systems, impacting...

0

Bipartisan Senate bill would strengthen cybercrime penalties  – CyberScoop

Cybercrimes could be punished more harshly under a new bill from a pair of senators that seeks to amend U.S. criminal code on computer fraud. The Cyber Conspiracy Modernization Act from Sens. Mike Rounds, R-S.D., and Kirsten Gillibrand, D-N.Y., would modify the Computer Fraud and Abuse Act (CFAA) to establish a specific penalty for conspiracy and boost penalties for violators. ...

0

The February 2025 Security Update Review  – Zero Day Initiative – Blog

We’ve survived Pwn2Own Automotive and made it to the second Patch Tuesday of 2025. As always, Microsoft and Adobe have released their latest security patches. Take a break from your scheduled activities and join us as we review the details of their latest security alerts. If you’d rather watch the full video recap covering the entire release, you can check...

0

Cisco Rejects Kraken Ransomware’s Data Breach Claims  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News

Cisco denies recent data breach claims by the Kraken ransomware group, stating leaked credentials are from a resolved 2022 incident. Learn more about Cisco’s response and the details of the original attack.  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

U.S. sanctions bulletproof hosting provider for supplying LockBit infrastructure  – CyberScoop

A consortium of U.S., Australian and U.K. officials announced coordinated sanctions Tuesday against Zservers, a Russia-based bulletproof hosting provider. The action targets the company for its role in facilitating ransomware attacks, most notably those conducted by the LockBit ransomware-as-a-service (RaaS) group. Officials detailed that Zservers has long been linked to cybercriminal forums, where it has advertised services designed to evade...

0

Google Confirms Android SafetyCore Enables AI-Powered On-Device Content Classification  – The Hacker News

Google has stepped in to clarify that a newly introduced Android System SafetyCore app does not perform any client-side scanning of content. “Android provides many on-device protections that safeguard users against threats like malware, messaging spam and abuse protections, and phone scam protections, while preserving user privacy and keeping users in control of their data,” a spokesperson for  – Read...

0

4 Ways to Keep MFA From Becoming too Much of a Good Thing  – The Hacker News

Multi-factor authentication (MFA) has quickly become the standard for securing business accounts. Once a niche security measure, adoption is on the rise across industries. But while it’s undeniably effective at keeping bad actors out, the implementation of MFA solutions can be a tangled mess of competing designs and ideas. For businesses and employees, the reality is that MFA sometimes feels ...

0

Gcore DDoS Radar Reveals 56% YoY Increase in DDoS Attacks  – The Hacker News

Gcore’s latest DDoS Radar report analyzes attack data from Q3–Q4 2024, revealing a 56% YoY rise in the total number of DDoS attacks with the largest attack peaking at a record 2 Tbps. The financial services sector saw the most dramatic increase, with a 117% rise in attacks, while gaming remained the most-targeted industry. This period’s findings emphasize the need...

0

Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions  – The Hacker News

Progress Software has addressed multiple high-severity security flaws in its LoadMaster software that could be exploited by malicious actors to execute arbitrary system commands or download any file from the system. Kemp LoadMaster is a high-performance application delivery controller (ADC) and load balancer that provides availability, scalability, performance, and security for business-critical  – Read More  – The Hacker News 

0

Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks  – The Hacker News

Threat actors have observed the increasingly common ClickFix technique to deliver a remote access trojan named NetSupport RAT since early January 2025. NetSupport RAT, typically propagated via bogus websites and fake browser updates, grants attackers full control over the victim’s host, allowing them to monitor the device’s screen in real-time, control the keyboard and mouse, upload and download  – Read...

0

Protecting Your Software Supply Chain: Assessing the Risks Before Deployment  – The Hacker News

Imagine you’re considering a new car for your family. Before making a purchase, you evaluate its safety ratings, fuel efficiency, and reliability. You might even take it for a test drive to ensure it meets your needs. The same approach should be applied to software and hardware products before integrating them into an organization’s environment. Just as you wouldn’t buy...

0

8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation  – The Hacker News

Source: The Nation A coordinated law enforcement operation has taken down the dark web data leak and negotiation sites associated with the 8Base ransomware gang. Visitors to the data leak site are now greeted with a seizure banner that says: “This hidden site and the criminal content have been seized by the Bavarian State Criminal Police Office on behalf of...

0

Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update  – The Hacker News

Apple on Monday released out-of-band security updates to address a security flaw in iOS and iPadOS that it said has been exploited in the wild. Assigned the CVE identifier CVE-2025-24200, the vulnerability has been described as an authorization issue that could make it possible for a malicious actor to disable USB Restricted Mode on a locked device as part of...

0

Thai authorities detain four Europeans in ransomware crackdown  – CyberScoop

In a sweeping international law enforcement operation, Thai authorities arrested four Europeans in Phuket, accusing them of orchestrating ransomware attacks affecting Swiss companies worldwide. The suspects are allegedly tied to the 8Base ransomware-as-a-service (RaaS) gang, which extorted $16 million worth of Bitcoin from over 1,000 individuals. The operation, termed “Phobos Aetor,” reflected a tightly coordinated effort among law enforcement agencies...

0

CISA election, disinformation officials placed on administrative leave, sources say  – CyberScoop

The Cybersecurity and Infrastructure Security Agency placed several members of its election security group on administrative leave last week, multiple sources familiar with the situation told CyberScoop. According to one source, the moves happened Thursday and Friday of last week and were targeted at employees focused on CISA’s mis-, dis- and malinformation teams. The moves include four employees currently working...

0

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores  – The Hacker News

Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit card skimmer malware targeting Magento-based e-commerce websites. Website security company Sucuri said the code, while appearing to be a typical GTM and Google Analytics script used for website analytics and advertising purposes, contains an obfuscated backdoor capable of providing attackers with persistent  – Read More  – The...

0

Projecting the next decade of software supply chain security  – CyberScoop

With the rapid pace of innovation accelerating under a new administration, discussions over whether software security will be sidelined in favor of speed are heating up. However, security leaders have long been saying that security protocols shouldn’t slow down development plans — and they don’t when done correctly. This perception must be adopted more widely so that innovation and security...

0

Projecting the next decade of software supply chain security  – CyberScoop

With the rapid pace of innovation accelerating under a new administration, discussions over whether software security will be sidelined in favor of speed are heating up. However, security leaders have long been saying that security protocols shouldn’t slow down development plans — and they don’t when done correctly. This perception must be adopted more widely so that innovation and security...

0

How These Decentralized AI Solutions Secure Their Services in a Disruptive Industry  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News

This article looks at the measures AI solutions take to secure their offering with insights from platforms like OORT and Filecoin who are creating new security models for their AI infrastructure.  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]  – The Hacker News

In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucket—each one seems minor until it becomes the entry point for an attack. This week, we’ve seen cybercriminals turn overlooked weaknesses into major security threats, proving once again that no system is too small to be...

0

Don’t Overlook These 6 Critical Okta Security Configurations  – The Hacker News

Given Okta’s role as a critical part of identity infrastructure, strengthening Okta security is essential. This article covers six key Okta security settings that provide a strong starting point, along with recommendations for implementing continuous monitoring of your Okta security posture. With over 18,000 customers, Okta serves as the cornerstone of identity governance and security for  – Read More  –...

0

DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects  – The Hacker News

Threat actors have been observed targeting Internet Information Services (IIS) servers in Asia as part of a search engine optimization (SEO) manipulation campaign designed to install BadIIS malware. “It is likely that the campaign is financially motivated since redirecting users to illegal gambling websites shows that attackers deploy BadIIS for profit,” Trend Micro researchers Ted Lee and  – Read More ...

0

Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities  – The Hacker News

Zimbra has released software updates to address critical security flaws in its Collaboration software that, if successfully exploited, could result in information disclosure under certain conditions. The vulnerability, tracked as CVE-2025-25064, carries a CVSS score of 9.8 out of a maximum of 10.0. It has been described as an SQL injection bug in the ZimbraSync Service SOAP endpoint affecting  –...

0

XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells  – The Hacker News

Threat actors have been observed exploiting multiple security flaws in various software products, including Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore, to drop reverse shells and web shells, and maintain persistent remote access to compromised systems. The zero-day exploitation of security flaws in VeraCore has been attributed to a threat actor known as XE Group, a cybercrime  –...

0

Teen Hacker “Natohub” Caught for NATO, UN, and US Army Breaches  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News

A joint operation by Spanish law enforcement has resulted in the apprehension of Natohub, a “dangerous hacker” suspected of orchestrating numerous cyberattacks against prominent organizations in Spain and internationally.   – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection  – The Hacker News

Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an unusual technique of “broken” pickle files to evade detection. “The pickle files extracted from the mentioned PyTorch archives revealed the malicious Python content at the beginning of the file,” ReversingLabs researcher Karlo Zanki said in a report shared with The Hacker News. ”  –...

0

Teen on Musk’s DOGE Team Graduated from ‘The Com’  – Krebs on Security

Wired reported this week that a 19-year-old working for Elon Musk‘s so-called Department of Government Efficiency (DOGE) was given access to sensitive US government systems even though his past association with cybercrime communities should have precluded him from gaining the necessary security clearances to do so. As today’s story explores, the DOGE teen is a former denizen of ‘The Com,’...