The recent Salesloft Drift breach offered a sobering reminder of how easily trust can be weaponized in today’s SaaS and AI-integrated environments. In this incident, hackers exploited the Drift chatbot, stole OAuth tokens, and used them to obtain data from CRM systems before the tokens could be revoked. In the wake of the incident, many … Read More “When trust turns toxic: Lessons from the Salesloft Drift incident – CyberScoop” »
The US cybersecurity agency has added the critical flaw to its Known Exploited Vulnerabilities list – Read More –
Spanish airline Iberia has begun emailing its customers about a supplier data breach – Read More –
International cybercrime-fighting agencies, co-ordinated by Europol, took down over 1000 servers and seized 20 domains earlier this month as part of Operation Endgame 3.0. Their target? Three major malware platforms: the infostealer known as Rhadamanthys, the VenomRAT remote access trojan, and the Elysium botnet. Read more in my article on the Hot for Security blog. … Read More “Operation Endgame disrupts Rhadamanthys information-stealing malware – Graham Cluley” »
The International Defence Esports Games (IDEG) will help sharpen cyber and battlefield skills for allied soldiers – Read More –
An SME’s guide to selecting and working with managed service providers. – Read More – NCSC Feed
A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited by threat actors to distribute malware known as ShadowPad. “The attacker targeted Windows Servers with WSUS enabled, exploiting CVE-2025-59287 for initial access,” AhnLab Security Intelligence Center (ASEC) said in a report published last week. “They then used PowerCat, an open-source … Read More “ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access – The Hacker News” »
“It’s not just about compliance; it’s about confidence.” That’s the message from Isha Oswal, CEO of JISA Softech, as… The post Isha Oswal on Building Trust and Accountability in Cybersecurity appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Critical 7 Zip Vulnerability With Public Exploit Requires Manual Update – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
A critical security flaw (CVE-2025-11001) in 7-Zip has a public exploit. Learn why this high-risk vulnerability is dangerous and how to manually update to version 25.01 now. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
CrowdStrike Fires Worker Over Insider Leak to Scattered Lapsus Hunters – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
CrowdStrike fired an insider for selling internal screenshots to Scattered Lapsus$ Hunters for $25,000. Read how the security team detected the activity and protected customers. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services – The Hacker News
The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information technology (IT) sector between 2024 and 2025 while staying undetected for extended periods of time. “In the period from 2024 to 2025, the Russian IT sector, especially companies working as contractors and integrators of solutions … Read More “China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services – The Hacker News” »
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting Oracle Identity Manager to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability in question is CVE-2025-61757 (CVSS score: 9.8), a case of missing authentication for a critical function that can result in pre-authenticated – … Read More “CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability – The Hacker News” »
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks – The Hacker News
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2. “This browser-native, fileless framework leverages push notifications, fake alerts, and link redirects to target victims across operating systems,” Blackfog researcher Brenda Robb said in a Thursday report. … Read More “Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks – The Hacker News” »
A digital privacy group is suing the federal government to obtain records of its communications with technology and social media companies leading up to the removal of several apps and websites that were tracking the activities of Immigration and Customs Enforcement and other agencies. In a lawsuit filed Thursday, the non-profit Electronic Frontier Foundation names … Read More “Privacy group sues feds over talks with tech companies on ICE raid trackers – CyberScoop” »
New Sturnus Android Malware Reads WhatsApp, Telegram, Signal Chats via Accessibility Abuse – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Sturnus, an advanced Android banking trojan, has been discovered by ThreatFabric. Learn how this malware bypasses end-to-end encryption on Signal and WhatsApp, steals bank credentials using fake screens, and executes fraudulent transactions. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ShinyHunters Breach Gainsight Apps on Salesforce, Claim Data from 1000 Firms – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ShinyHunters breached Gainsight apps integrated with Salesforce, claiming access to data from 1000 firms using stolen credentials and compromised tokens. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation – The Hacker News
Grafana has released security updates to address a maximum severity security flaw that could allow privilege escalation or user impersonation under certain configurations. The vulnerability, tracked as CVE-2025-41115, carries a CVSS score of 10.0. It resides in the System for Cross-domain Identity Management (SCIM) component that allows automated user provisioning and management. First – Read … Read More “Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation – The Hacker News” »
Researchers at BlackFrog have uncovered Matrix Push C2, a malicious command-and-control system that abuses web browser push notifications to deliver malware – Read More –
Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security – The Hacker News
In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple’s equipment AirDrop, allowing users to more easily share files and photos between Android and iPhone devices. The cross-platform sharing feature is currently limited to the Pixel 10 lineup and works with iPhone, … Read More “Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security – The Hacker News” »
A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent remote access to compromised networks as part of a nearly three-year campaign. “While earlier operations relied on broad strategic web compromises to compromise legitimate websites, APT24 has recently pivoted to using more sophisticated vectors targeting … Read More “APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains – The Hacker News” »
Ever wonder how some IT teams keep corporate data safe without slowing down employees? Of course you have. Mobile devices are essential for modern work—but with mobility comes risk. IT admins, like you, juggle protecting sensitive data while keeping teams productive. That’s why more enterprises are turning to Samsung for mobile security. Hey—you’re busy, so … Read More “Why IT Admins Choose Samsung for Mobile Security – The Hacker News” »
Federal, state, and local government agencies face a critical vulnerability hiding in plain sight: outdated web forms collecting citizen data through insecure channels. While agencies invest in perimeter security and threat detection, many continue using legacy forms built years ago without modern encryption, authentication, or compliance capabilities. These aging systems collect Social Security numbers, financial … Read More “Legacy web forms are the weakest link in government data security – CyberScoop” »
Federal, state, and local government agencies face a critical vulnerability hiding in plain sight: outdated web forms collecting citizen data through insecure channels. While agencies invest in perimeter security and threat detection, many continue using legacy forms built years ago without modern encryption, authentication, or compliance capabilities. These aging systems collect Social Security numbers, financial … Read More “Legacy web forms are the weakest link in government data security – CyberScoop” »
Salesforce believes there has been unauthorized access to its customers’ data through the Gainsight app’s connection to its platform – Read More –
The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer, alleging that the company had misled investors about the security practices that led to the 2020 supply chain attack. In a joint motion filed November 20, 2025, the SEC, along with SolarWinds and its CISO Timothy … Read More “SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny – The Hacker News” »
The race toward quantum computing supremacy is no longer confined to research labs, it’s entering boardrooms, policy discussions, and… The post Quantum-Ready HSM: Is Your Business Prepared? appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Salesforce has warned of detected “unusual activity” related to Gainsight-published applications connected to the platform. “Our investigation indicates this activity may have enabled unauthorized access to certain customers’ Salesforce data through the app’s connection,” the company said in an advisory. The cloud services firm said it has taken the step of revoking all active access … Read More “Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity – The Hacker News” »
NSO Group argued in a court filing this week that the court should pause the permanent injunction preventing it from targeting WhatsApp with its spyware while the company appeals the decision. According to the company, enforcing the injunction would cause irreparable harm to its business and prevent the U.S. government from using its products. Those … Read More “NSO Group argues WhatsApp injunction threatens existence, future U.S. government work – CyberScoop” »
Salesforce said yet another breach involving a third-party vendor has compromised customers’ data, warning in a security advisory late Wednesday that it detected unusual activity in Gainsight applications connected to Salesforce customer environments. “Google Threat Intelligence Group is aware of more than 200 potentially affected Salesforce instances,” Austin Larsen, principal analyst at GTIG, told CyberScoop. … Read More “Hundreds of Salesforce customers hit by yet another third-party vendor breach – CyberScoop” »
The Securities and Exchange Commission on Thursday dropped its case against SolarWinds and its chief information security officer over its handling of an alleged Russian cyberespionage campaign uncovered in 2020, an incident that penetrated at least nine federal agencies and hundreds of companies. The SEC’s decision brings to a halt one of the more divisive … Read More “SEC drops case against SolarWinds tied to monumental breach – CyberScoop” »
In March 2024, Mozilla said it was winding down its collaboration with Onerep — an identity protection service offered with the Firefox web browser that promises to remove users from hundreds of people-search sites — after KrebsOnSecurity revealed Onerep’s founder had created dozens of people-search services and was continuing to operate at least one of … Read More “Mozilla Says It’s Finally Done With Two-Faced Onerep – Krebs on Security” »
After years of delays, the UK government has finally introduced landmark cybersecurity legislation that could reshape how British organisations defend against digital attacks. Read more in my article on the Fortra blog. – Read More – Graham Cluley
Everest Ransomware Says It Breached Brazilian Energy Giant Petrobras – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Everest ransomware claims to have stolen over 180GB of seismic survey data from Petrobras, demanding contact through qTox with a countdown in place. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Top Senate Intel Dem warns of ‘catastrophic’ cyber consequences of Trump admin national security firings, politicization – CyberScoop
Politicization of intelligence in the Trump administration, as well as the “hollowing out” of government expertise, is leaving the United States dangerously vulnerable to cyberattacks and other threats, the top Democrat on the Senate Intelligence Committee said in a floor speech Thursday. Mark Warner of Virginia chastised the president over what he called the politically-motivated … Read More “Top Senate Intel Dem warns of ‘catastrophic’ cyber consequences of Trump admin national security firings, politicization – CyberScoop” »
Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device takeover to conduct financial fraud. “A key differentiator is its ability to bypass encrypted messaging,” ThreatFabric said in a report shared with The Hacker News. “By capturing content directly from the device screen after decryption, … Read More “New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices – The Hacker News” »
Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that’s targeting Windows users. Active since mid-2025, the threat is designed to execute arbitrary JavaScript code retrieved from a command-and-control (C2) server, Kaspersky researcher Lisandro Ubiedo said in an analysis published today. There are currently no details on how the botnet malware is propagated; … Read More “Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows – The Hacker News” »
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet – The Hacker News
Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in the Ray open-source artificial intelligence (AI) framework to turn infected clusters with NVIDIA GPUs into a self-replicating cryptocurrency mining botnet. The activity, codenamed ShadowRay 2.0, is an evolution of a prior wave that was observed between September 2023 and March 2024. The … Read More “ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet – The Hacker News” »
A multi-year ATM fraud campaign by UNC2891 targeted two Indonesian banks, cloning cards, recruiting money mules and coordinating cash withdrawals – Read More –
CISA launches guide to combat cybercrime via bulletproof hosting, recommending measures for ISPs – Read More –
New Eternidade Stealer Uses WhatsApp to Steal Banking Data – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Trustwave SpiderLabs warns of Eternidade Stealer, a new banking trojan spreading via personalised WhatsApp messages. Find out how this malicious software bypasses security checks and deploys fake login screens for major banks and wallets. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Despite a growing maturity of third-party risk management programs, supply chain attacks impacted more organizations in 2025 than in previous years – Read More –
The Federal Communications Commission is set to vote Thursday on whether to rescind a set of last-minute Biden administration regulations following a massive Chinese compromise of U.S. telecommunications infrastructure last year. Chair Brendan Carr has called the rule ineffective and unlawful, and with the likely support of newly confirmed commissioner Olivia Trusty, there is a … Read More “Why Anna Gomez believes the FCC is letting telecoms off easy after Salt Typhoon – CyberScoop” »
Comet Browser Flaw Lets Hidden API Run Commands on Users’ Devices – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
SquareX warns Perplexity’s Comet AI browser contains a hidden MCP API that bypasses security, allowing attackers to install malware and seize full device control. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves – The Hacker News
This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we’ve seen arrests, spies at work, and big power moves online. Hackers are getting caught. Spies are getting better at their jobs. Even simple things like browser add-ons and smart home gadgets are being used … Read More “ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves – The Hacker News” »
CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide via a network of deceptive authentication portals and impersonation pages. The campaign, internally dubbed HackOnChat, abuses WhatsApp’s familiar web interface, using social engineering tactics to trick users into compromising their accounts. Investigators identified thousands of malicious URLs – Read More – The Hacker … Read More “CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat – The Hacker News” »
Stop the press – a company has actually said “sorry” after a data breach, and hotels are helping hackers phish their own guests. We examine a refreshingly honest breach response (and why legacy systems are still going to ruin your week), dig into a nasty hotel-booking malware campaign that abuses trust in apps and CAPTCHAs, … Read More “Smashing Security podcast #444: We’re sorry. Wait, did a company actually say that? – Graham Cluley” »
A technical manager at a Dutch wind farm operator has been sentenced after it was discovered he had secretly installed cryptocurrency mining rigs at two wind farm sites – just as the company was recovering from a ransomware attack. Read more in my article on the Hot for Security blog. – Read More – Graham … Read More “Wind farm worker sentenced after turning turbines into a secret crypto mine – Graham Cluley” »
Gartner predicts that two-fifths of organizations will suffer security and compliance incidents due to shadow AI by 2030 – Read More –
Allies sanction bulletproof hoster Media Land and four executives – Read More –
Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt – The Hacker News
Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend that Amazon has called cyber-enabled kinetic targeting. The development is a sign that the lines between state-sponsored cyber attacks and kinetic warfare are increasingly blurring, necessitating the need for a new category … Read More “Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt – The Hacker News” »




