As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation (RPA) has become a powerful tool for streamlining operations and enhancing security. However, since RPA bots have varying levels of access to sensitive information, enterprises must be prepared to mitigate a variety of challenges. In large organizations, bots are starting to outnumber … Read More “The Impact of Robotic Process Automation (RPA) on Identity and Access Management – The Hacker News” »
Category: Attack Feeds
INE Highlights Enterprise Shift Toward Hands-On Training Amid Widening Skills Gaps – Hackread – Cybersecurity News, Data Breaches, AI, and More
Cary, North Carolina, USA, 11th December 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Scammers Sent 40,000 E-Signature Phishing Emails to 6,000 Firms in Just 2 Weeks – Hackread – Cybersecurity News, Data Breaches, AI, and More
Phishing campaign: Scammers sent over 40,000 spoofed SharePoint, DocuSign and e-sign emails to companies, hiding malicious links behind trusted redirect services. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for command-and-control (C2) purposes. According to a report from Elastic Security Labs, the malware shares code similarities with another implant codenamed FINALDRAFT (aka Squidoor) that employs Microsoft Graph API for C2. FINALDRAFT is attributed to a … Read More “NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems – The Hacker News” »
ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories – The Hacker News
This week’s cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons, and even software updates people trust. Tech giants and governments are racing to plug new holes while arguing over privacy and control. And researchers keep uncovering just how much of our digital life … Read More “ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories – The Hacker News” »
Global cybersecurity agencies have issued the first unified guidance on applying artificial intelligence (AI) within critical infrastructure, signaling a major shift from theoretical debate to practical guardrails for safety and reliability. The release of joint guidance on Principles for the Secure Integration of Artificial Intelligence in Operational Technology marks a meaningful milestone for critical infrastructure … Read More “New cybersecurity guidance paves the way for AI in critical infrastructure – CyberScoop” »
Top 10 Data Anonymization Solutions for 2026 – Hackread – Cybersecurity News, Data Breaches, AI, and More
Every business today has to deal with private information – whether it is about customers, employees, or financial… – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
An advanced persistent threat (APT) known as WIRTE has been attributed to attacks targeting government and diplomatic entities across the Middle East with a previously undocumented malware suite dubbed AshTag since 2020. Palo Alto Networks is tracking the activity cluster under the name Ashen Lepus. Artifacts uploaded to the VirusTotal platform show that the threat … Read More “WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor – The Hacker News” »
Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw – The Hacker News
Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under active exploitation in the wild. The vulnerability, rated high in severity, is being tracked under the Chromium issue tracker ID “466192044.” Unlike other disclosures, Google has opted to keep information about the CVE … Read More “Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw – The Hacker News” »
CastleLoader Malware Now Uses Python Loader to Bypass Security – Hackread – Cybersecurity News, Data Breaches, AI, and More
Cybersecurity researchers at Blackpoint Cyber discovered a new, evasive CastleLoader malware variant using Python and ClickFix social engineering to deliver RATs and info-stealers directly from memory. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with more than 700 compromised instances accessible over the internet, according to new findings from Wiz. The flaw, tracked as CVE-2025-8110 (CVSS score: 8.7), is a case of file overwrite in the file update API of the Go-based self-hosted Git service. A fix … Read More “Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks – The Hacker News” »
SIM Pharm Cyber crime Escalates in South Africa – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.
Just when you thought there couldn’t be another type of cyber thief, they develop new and devious methods to steal valuable information and finances. Over the last few yearsthere has been an uptick in “SIM pharm” crimes. This form of crime has encompassed avariety of scams including theft of banking credentials, impersonation, investment fraud,and online … Read More “SIM Pharm Cyber crime Escalates in South Africa – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.” »
Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution – The Hacker News
Huntress is warning of a new actively exploited vulnerability in Gladinet’s CentreStack and Triofox products stemming from the use of hard-coded cryptographic keys that have affected nine organizations so far. “Threat actors can potentially abuse this as a way to access the web.config file, opening the door for deserialization and remote code execution,” security researcher … Read More “Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution – The Hacker News” »
Smashing Security podcast #447: Grok the stalker, the Louvre heist, and Microsoft 365 mayhem – Graham Cluley
On this week’s show we learn that AI really can be a stalker’s best friend, as we explore a strange tale that starts with a manatee-shaped mailbox on a millionaire’s lawn and ends with Grok happily doxxing real people, mapping out stalking “strategies,” and handing out revenge-porn tips. Then we go inside the Louvre heist, … Read More “Smashing Security podcast #447: Grok the stalker, the Louvre heist, and Microsoft 365 mayhem – Graham Cluley” »
Security experts have observed a steady increase in malicious activity from a widening pool of attackers seeking to exploit React2Shell, a critical vulnerability disclosed last week in React Server Components. Authorities are also responding to heightened concern about the defect, with the Cybersecurity and Infrastructure Security Agency shortening the deadline for agencies to patch the … Read More “Attacks pinned to critical React2Shell defect surge, surpass 50 confirmed victims – CyberScoop” »
Torrent for DiCaprio’s “One Battle After Another” Movie Drops Agent Tesla – Hackread – Cybersecurity News, Data Breaches, AI, and More
Bitdefender researchers warn that the torrent for Leonardo DiCaprio’s One Battle After Another is a trap deploying Agent Tesla malware. Learn how the fileless LOTL attack targets unsuspecting Windows users. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
As the Trump administration considers loosening restrictions on the sale of high-performance computer chips that power modern artificial intelligence systems to China, his Department of Justice continues to prosecute businesses and individuals who sell or divert these same technologies to companies based in China. On Monday, federal prosecutors announced that it had secured a guilty … Read More “As White House moves to send AI chips to China, Trump’s DOJ prosecutes chip smugglers – CyberScoop” »
React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors – The Hacker News
React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of previously undocumented malware families, according to new findings from Huntress. This includes a Linux backdoor called PeerBlight, a reverse proxy tunnel named CowTunnel, and a Go-based – Read … Read More “React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors – The Hacker News” »
.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL – The Hacker News
New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to achieve remote code execution. WatchTowr Labs, which has codenamed the “invalid cast vulnerability” SOAPwn, said the issue impacts Barracuda Service Center RMM, Ivanti Endpoint Manager (EPM), and Umbraco 8. But the number of affected vendors is likely … Read More “.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL – The Hacker News” »
A new report from the United States’s Financial Crimes Enforcement Network (FinCEN) has shone a revealing light on the state of the criminal industry of ransomware. The report, which examines ransomware incidents from 2022 to 2024, reveals that attackers extorted more than $2.1 billion over the three-year period. Yes, that number is enormous – but … Read More “Ransomware may have extorted over $2.1 billion between 2022-2024, but it’s not all bad news, claims FinCEN report – Graham Cluley” »
North Korean Hackers Deploy EtherRAT Malware in React2Shell Exploits – Hackread – Cybersecurity News, Data Breaches, AI, and More
Sysdig discovered North Korea-linked EtherRAT, a stealthy new backdoor using Ethereum smart contracts for C2 after exploiting the critical React2Shell vulnerability (CVE-2025-55182). – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE) protocol specification that could expose a local attacker to serious risks. The flaws impact PCIe Base Specification Revision 5.0 and onwards in the protocol mechanism introduced by the IDE Engineering Change Notice (ECN), according to the PCI … Read More “Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling – The Hacker News” »
The Justice Department has charged a Ukrainian national with conducting cyberattacks on critical infrastructure worldwide as part of two Russian state-sponsored hacking operations that targeted water systems, food processing facilities and government networks across the United States and allied nations. Victoria Eduardovna Dubranova, 33, was arraigned on a second indictment Tuesday after being extradited to … Read More “US charges hacker tied to Russian groups that targeted water systems and meat plants – CyberScoop” »
Remember when a notorious ransomware gang hit the Irish Health Service back in May 2021? Four years on, and it seems victims who had their data exposed will finally receive compensation. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes – The Hacker News
Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code. Standard security tools often miss these threats because they look like normal activity. To stop them, you need to see exactly how these attacks happen in the real world. … Read More “Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes – The Hacker News” »
Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and compression utility to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2025-6218 (CVSS score: 7.8), is a path traversal bug that could enable code execution. However, for exploitation … Read More “Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups – The Hacker News” »
For decades, the United States government and private sector have worked tirelessly to secure cyberspace, yet our nation remains frighteningly vulnerable to a litany of cyberthreats posed by cybercriminals and foreign adversaries alike. Daily news reports of cyber intrusions ranging from criminal ransomware attacks to foreign state-sponsored intrusions into power, water, and other critical infrastructure systems … Read More “The ten key reforms that can close America’s cybersecurity gaps – CyberScoop” »
Ukrainian Woman in US Custody for Aiding Russian NoName057 Hacker Group – Hackread – Cybersecurity News, Data Breaches, AI, and More
Ukrainian national Victoria Dubranova is in U.S. custody, accused of supporting Russian hacker group NoName057 in cyberattacks on critical infrastructure. She has pleaded not guilty. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days – The Hacker News
Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that has been actively exploited in the wild. Of the 56 flaws, three are rated Critical, and 53 are rated Important in severity. Two other defects are listed as publicly known at the time of … Read More “Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days – The Hacker News” »
New Portuguese Law Shields Ethical Hackers from Prosecution – Hackread – Cybersecurity News, Data Breaches, AI, and More
Portugal updates its cybercrime law (Decree Law 125/2025) to grant ethical hackers a ‘safe harbour’ from prosecution. Learn the strict rules researchers must follow, including immediate disclosure to the CNCS, and how other nations are following this trend. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws – The Hacker News
Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully exploited, could result in an authentication bypass and code execution. The Fortinet vulnerabilities affect FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager and relate to a case of improper verification of a cryptographic signature. They are tracked as CVE-2025-59718 and – … Read More “Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws – The Hacker News” »
Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of 2025 tackles one zero-day bug that is already being exploited, as well as two publicly disclosed vulnerabilities. Despite releasing a lower-than-normal number of security updates these past few months, Microsoft patched … Read More “Microsoft Patch Tuesday, December 2025 Edition – Krebs on Security” »
Synthetic media, including AI-generated deepfake audio and video, has been increasingly leveraged by criminals, scammers and spies to deceive individuals and businesses. Sometimes they do so by imitating an employee’s CEO, urging them to transfer large sums of money or provide them access to work accounts. Other times this fake media is created by a … Read More “Organizations can now buy cyber insurance that covers deepfakes – CyberScoop” »
The Dark Web Economy Behind Ad Fraud: What Marketers Don’t See – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Ad fraud networks use bots, deepfakes and spoofed traffic to drain PPC budgets. This report shows how fake clicks distort performance data. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Spiderman Phishing Kit Targets European Banks with Real-Time Credential Theft – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Varonis threat analysts warn about Spiderman, a dangerous new kit that automates attacks against European banks and crypto customers, stealing a victim’s full identity profile. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Microsoft addressed 57 vulnerabilities affecting its various products for business operations and core systems, including one actively exploited zero-day, the company said in its latest monthly security update. The zero-day vulnerability — CVE-2025-62221 — affects the Windows Cloud Files Mini Filter Driver and has a CVSS rating of 7.8. Attackers could exploit the use-after-free defect … Read More “Microsoft’s last Patch Tuesday of 2025 addresses 57 defects, including one zero-day – CyberScoop” »
Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical security React2Shell flaw in React Server Components (RSC) to deliver a previously undocumented remote access trojan dubbed EtherRAT. “EtherRAT leverages Ethereum smart contracts for command-and-control (C2) resolution, deploys five independent Linux persistence mechanisms, and – Read More … Read More “North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware – The Hacker News” »
It’s the final patch Tuesday of 2025, but that doesn’t make it any less exciting. Put aside your holiday planning for just a moment as we review the latest security offering from Adobe and Microsoft. If you’d rather watch the full video recap covering the entire release, you can check out the Patch Report webcast … Read More “The December 2025 Security Update Review – Zero Day Initiative – Blog” »
Police Dismantle EUR 700 Million Crypto Scam That Used Deepfakes – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Europol and Eurojust led a massive international police operation that successfully dismantled a crypto fraud network that laundered over €700M using deepfake ads. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure – The Hacker News
Four distinct threat activity clusters have been observed leveraging a malware loader known as CastleLoader, strengthening the previous assessment that the tool is offered to other threat actors under a malware-as-a-service (MaaS) model. The threat actor behind CastleLoader has been assigned the name GrayBravo by Recorded Future’s Insikt Group, which was previously tracking it as … Read More “Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure – The Hacker News” »
The AI Fix #80: DeepSeek’s cheap GPT-5 rival, Antigravity fails, and why being rude to AI makes it smarter – Graham Cluley
In episode 80 of The AI Fix, your hosts look at DeepSeek 3.2 “Speciale”, the bargain-basement model that claims GPT-5-level brains at 10% of the price, Jensen Huang’s reassuring vision of a robot fashion industry, and a 75kg T-800 style humanoid that can do flying kicks because robot-marketing departments have clearly learned nothing from Terminator. … Read More “The AI Fix #80: DeepSeek’s cheap GPT-5 rival, Antigravity fails, and why being rude to AI makes it smarter – Graham Cluley” »
California man admits role in $263 million cryptocurrency theft that funded lavish lifestyle – Graham Cluley
When you spend half a million dollars in a single night at a nightclub, purchase exotic cars worth millions, and rent mansions under false names, you are risking drawing attention to yourself… Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
SimpleX Chat X Account Hacked, Fake Site Promotes Crypto Wallet Scam – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
SimpleX Chat’s X account hacked to promote fake crypto site urging users to connect wallets. Site mimicked official design to steal funds. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading – The Hacker News
The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker to adopt a combination of more advanced tactics like domain spoofing, DLL side-loading, and fileless PowerShell execution to facilitate ransomware attacks. “These methods allow them to bypass defenses, infiltrate networks, maintain persistence, and operate undetected, raising serious concerns … Read More “Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading – The Hacker News” »
New GeminiJack 0-Click Flaw in Gemini AI Exposed Users to Data Leaks – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Google AI systems (Gemini Enterprise) had a critical ‘GeminiJack’ security flaw allowing attackers to steal Gmail, Docs, and Calendar data with no clicks. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Google on Monday announced a set of new security features in Chrome, following the company’s addition of agentic artificial intelligence (AI) capabilities to the web browser. To that end, the tech giant said it has implemented layered defenses to make it harder for bad actors to exploit indirect prompt injections that arise as a result … Read More “Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats – The Hacker News” »
Zero Trust helps organizations shrink their attack surface and respond to threats faster, but many still struggle to implement it because their security tools don’t share signals reliably. 88% of organizations admit they’ve suffered significant challenges in trying to implement such approaches, according to Accenture. When products can’t communicate, real-time access decisions break down. The … Read More “How to Streamline Zero Trust Using the Shared Signals Framework – The Hacker News” »
STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware – The Hacker News
Canadian organizations have emerged as the focus of a targeted cyber campaign orchestrated by a threat activity cluster known as STAC6565. Cybersecurity company Sophos said it investigated almost 40 intrusions linked to the threat actor between February 2024 and August 2025. The campaign is assessed with high confidence to share overlaps with a hacking group … Read More “STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware – The Hacker News” »
Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data – The Hacker News
Cybersecurity researchers have discovered two new extensions on Microsoft Visual Studio Code (VS Code) Marketplace that are designed to infect developer machines with stealer malware. The VS Code extensions masquerade as a premium dark theme and an artificial intelligence (AI)-powered coding assistant, but, in actuality, harbor covert functionality to download additional payloads, take – Read … Read More “Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data – The Hacker News” »
The State Department is seeking help to locate a pair of hackers allegedly working for Shahid Shushtari, a malicious cyber unit operating under Iran’s Revolutionary Guard Corps Cyber-Electronic Command. Officials are offering a reward up to $10 million for information about Mohammad Bagher Shirinkar and Fatemeh Sedighian Kashi. “Help us take the smile off their … Read More “Officials offer $10M reward for information on IRGC-linked leader and close associate – CyberScoop” »