Pentesting remains one of the most effective ways to identify real-world security weaknesses before adversaries do. But as the threat landscape has evolved, the way we deliver pentest results hasn’t kept pace. Most organizations still rely on traditional reporting methods—static PDFs, emailed documents, and spreadsheet-based tracking. The problem? These outdated workflows introduce delays, – Read … Read More “Automation Is Redefining Pentest Delivery – The Hacker News” »
The OPSWAT report found that insider breaches cost impacted firms $2.7m on average due to factors such as regulatory fines and diminished productivity – Read More –
VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages – The Hacker News
Cybersecurity researchers have flagged a new malware campaign that has leveraged Scalable Vector Graphics (SVG) files as part of phishing attacks impersonating the Colombian judicial system. The SVG files, according to VirusTotal, are distributed via email and designed to execute an embedded JavaScript payload, which then decodes and injects a Base64-encoded HTML phishing page masquerading … Read More “VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages – The Hacker News” »
Artificial intelligence (AI) redefines the financial landscape as it never happened before, getting approval of credits quicker in an… The post Why the World Needs Responsible AI for Financial Inclusion Now appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Russian APT28 Deploys “NotDoor” Backdoor Through Microsoft Outlook – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
APT28 hackers deploy NotDoor backdoor via Microsoft Outlook macros, using OneDrive sideloading to steal data and evade detection. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Model Namespace Reuse Flaw Hijacks AI Models on Google and Microsoft Platforms – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A new security vulnerability called ‘Model Namespace Reuse’ allows attackers to hijack AI models on Google, Microsoft, and… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module – The Hacker News
Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at least 65 Windows servers primarily located in Brazil, Thailand, and Vietnam. The attacks, per Slovak cybersecurity company ESET, led to the deployment of a passive C++ backdoor called Rungan and a native Internet Information Services … Read More “GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module – The Hacker News” »
Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries – The Hacker News
The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor “is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word,” S2 Grupo’s LAB52 threat intelligence team said. … Read More “Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries – The Hacker News” »
Artificial intelligence could be a key tool for helping organizations keep track of an ever-expanding catalog of identified software flaws, a top official at the Cybersecurity and Infrastructure Security Agency said Thursday. CISA sponsors the Common Vulnerabilities and Exposures (CVE) program, which publishes standardized data about known cyber vulnerabilities. The number of vulnerabilities the CVE … Read More “AI can help track an ever-growing body of vulnerabilities, CISA official says – CyberScoop” »
An attacker exploited a zero-day vulnerability in Sitecore stemming from a misconfiguration of public ASP.NET machine keys that customers implemented based on the vendor’s documentation, according to researchers. The critical zero-day defect — CVE-2025-53690 — was exploited by the attacker using exposed keys to achieve remote code execution, Mandiant Threat Defense said in a report … Read More “Sitecore zero-day vulnerability springs up from exposed machine key – CyberScoop” »
The joint guidance is a welcome first step towards a common, global adoption of SBOMs, experts argued – Read More –
A newly identified hacking group named GhostRedirector has compromised 65 Windows servers using previously unknown tools – Read More –
North Korean hackers have been observed exploiting cyber threat intelligence platforms in a campaign targeting job seekers with malware-laced lures – Read More –
New Malware Uses Windows Character Map for Cryptomining – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Darktrace reports new malware hijacking Windows Character Map for cryptomining, exposing risks of hidden attacks in everyday software… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Scattered Lapsus$ Hunters Demand Google Fire Security Experts or Face Data Leak – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Scattered Lapsus$ Hunters threaten Google, demanding that two security experts, Austin Larsen of Google’s Threat Intelligence Group and Charles Carmakal of Mandiant, be fired or they will leak alleged stolen Google data. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Sendmarc appoints Rob Bowker as North American Region Lead – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Wilmington, United States, 4th September 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Google Cloud’s Mandiant successfully disrupted an active ViewState deserialization attack affecting Sitecore deployments – Read More –
Post Content – Read More – IC3.gov News
JLR said it is investigating following claims by the actor “Scattered Lapsus$ Hunters” that it had stolen data from the firm and had issued an extortion demand – Read More –
Zero Trust Architecture (ZTA) is not a new thing, it is now a reality of the working world of… The post Building Zero Trust Architecture with Real-World Constraints appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting TP-Link wireless routers to its Known Exploited Vulnerabilities (KEV) catalog, noting that there is evidence of them being exploited in the wild. The vulnerabilities in question are listed below – CVE-2023-50224 (CVSS score: 6.5) – An authentication bypass by spoofing … Read More “CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited – The Hacker News” »
The French data protection authority has fined Google and Chinese e-commerce giant Shein $379 million (€325 million) and $175 million (€150 million), respectively, for violating cookie rules. Both companies set advertising cookies on users’ browsers without securing their consent, the National Commission on Informatics and Liberty (CNIL) said. Shein has since updated its systems to … Read More “Google Fined $379 Million by French Regulator for Cookie Consent Violations – The Hacker News” »
Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions – The Hacker News
Cybersecurity researchers have flagged a new technique that cybercriminals have adopted to bypass social media platform X’s malvertising protections and propagate malicious links using its artificial intelligence (AI) assistant Grok. The findings were highlighted by Nati Tal, head of Guardio Labs, in a series of posts on X. The technique has been codenamed Grokking. The … Read More “Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions – The Hacker News” »
CISA Adds TP-Link Wi-Fi and WhatsApp Spyware Flaws to KEV List – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
CISA updates its KEV List with TP-Link Wi-Fi extender and WhatsApp spyware flaws, urging users and agencies to… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; … Read More “Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Hackers are using legitimate red team tool Hexstrike-AI to simplify and speed up vulnerability exploitation – Read More –
A new Cobalt study finds healthcare organizations among the slowest at resolving serious vulnerabilities – Read More –
Your AI reads the small print, and that’s a problem. This week in episode 433 of “Smashing Security” we dig into LegalPwn – malicious instructions tucked into code comments and disclaimers that sweet-talks AI into rubber-stamping dangerous payloads (or even pretending they’re a harmless calculator). Meanwhile, new research from Anthropic reveals that hackers have already … Read More “Smashing Security podcast #433: How hackers turned AI into their new henchman – Graham Cluley” »
Jaguar Land Rover Cyberattack Disrupts Production and Sales Operations – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Jaguar Land Rover is restoring systems after a cyberattack disrupted production and sales, with a hacker group previously… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Streameast, world’s largest pirated live sports network, shut down by Egyptian authorities – CyberScoop
Streameast, the most popular and largest illicit live sports streaming network, was shut down following a coordinated law enforcement action conducted by Egyptian authorities last month, an antipiracy coalition of entertainment companies announced Wednesday. Egyptian authorities seized infrastructure powering Streameast and arrested two operators at their residences in El-Sheik Zaid, Egypt, a spokesperson for the … Read More “Streameast, world’s largest pirated live sports network, shut down by Egyptian authorities – CyberScoop” »
Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers – The Hacker News
Cybersecurity researchers have discovered two new malicious packages on the npm registry that make use of smart contracts for the Ethereum blockchain to carry out malicious actions on compromised systems, signaling the trend of threat actors constantly on the lookout for new ways to distribute malware and fly under the radar. “The two npm packages … Read More “Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers – The Hacker News” »
Israeli cybersecurity company Cato Networks has acquired AI security startup Aim Security in its first ever acquisition, reflecting the broader industry rush to address security challenges posed by artificial intelligence adoption. The deal combines Cato’s Secure Access Service Edge (SASE) networking platform with Aim’s AI security capabilities, allowing the company to protect customers from threats … Read More “Cato Networks acquires AI security startup Aim Security – CyberScoop” »
Compiling an “ingredients list” for software can help organizations reduce cyber risks, avoid fines and save time, among other benefits, a Cybersecurity and Infrastructure Security Agency-led guide published Wednesday advises. The CISA document, produced with the National Security Agency and cyber agencies from 14 other countries, aims to produce a shared vision on advancing the … Read More “CISA guide seeks a unified approach to software ‘ingredients lists’ – CyberScoop” »
House panel approves cyber information sharing, grant legislation as expiration deadlines loom – CyberScoop
A House panel advanced legislation Wednesday that would reauthorize a major cyber threat information sharing law and a big-dollar state and local cyber grant program before they’re set to expire at the end of this month. Trump administration officials and nominees, as well as cybersecurity organizations and experts, have voiced support for renewing them both … Read More “House panel approves cyber information sharing, grant legislation as expiration deadlines loom – CyberScoop” »
Why Users and Businesses Are Choosing to Get Paid in USDT Instead of Local Currency – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Discover why USDT stablecoin payments are becoming popular worldwide. Learn the benefits, risks, and practical tips for using… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The Federal Trade Commission announced a settlement Tuesday with a Chinese robot toy manufacturer, following an investigation that charged the company with illegally collecting the location data of U.S. children who buy its products. In a complaint filed in the U.S. Northern District Court of California, the Department of Justice on behalf of the FTC … Read More “FTC announces settlement with toy robot makers that tracked location of children – CyberScoop” »
The FBI’s Internet Crime Complaint Center (IC3) says that the elderly are more at risk from falling victim to online fraud and internet scammers than ever before. Read more in my article on the Fortra blog. – Read More – Graham Cluley
Governance-Driven Automation: How Flowable Is Redefining Digital Process Management – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A newly published independent research report highlights Flowable’s rise in the digital process automation market. Built on open-source… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cloudflare Mitigates Largest Ever Recorded DDoS Attack at 11.5 Tbps – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cloudflare mitigated the largest DDoS attack ever recorded, an 11.5 Tbps flood that lasted 35 seconds without disrupting… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals – The Hacker News
Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately secured by a platform capable of not just keeping pace, … Read More “AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals – The Hacker News” »
Google warned that two actively exploited zero-day vulnerabilities affecting Android devices have been patched in its September security update, which addresses 120 software defects total. The zero-days — CVE-2025-38352 affecting the kernel and CVE-2025-48543 affecting Android Runtime — are both high-severity defects that don’t require user interaction for exploitation and could lead to escalation of … Read More “Google patches two Android zero-days, 120 defects total in September security update – CyberScoop” »
For the second time, a court has ruled that President Donald Trump’s attempted firing of Federal Trade Commission members Rebecca Slaughter and Alvaro Bedoya was illegal and ordered the agency to reinstate the commissioners. By law, the FTC governs by a bipartisan 3-2 split, with the president’s party getting an extra seat and controlling the … Read More “Court rules ‘fired’ FTC commissioners be reinstated — again – CyberScoop” »
A malicious campaign using Ethereum smart contracts has been observed targeting developers via npm and GitHub – Read More –
The backdoor is a sophisticated VBA-based malware targeting Microsoft Outlook – Read More –
A massive IPTV privacy network has been uncovered distributing unlicensed content from major brands including Apple TV, Disney+, HBO, Netflix and more – Read More –
Android Security Alert: Google Patches 120 Flaws, Including Two Zero-Days Under Attack – The Hacker News
Google has shipped security updates to address 120 security flaws in its Android operating system as part of its monthly fixes for September 2025, including two issues that it said have been exploited in targeted attacks. The vulnerabilities are listed below – CVE-2025-38352 (CVSS score: 7.4) – A privilege escalation flaw in the Linux Kernel … Read More “Android Security Alert: Google Patches 120 Flaws, Including Two Zero-Days Under Attack – The Hacker News” »
In January 2025, cybersecurity experts at Wiz Research found that Chinese AI specialist DeepSeek had suffered a data leak, putting more than 1 million sensitive log streams at risk. According to the Wiz Research team, they identified a publicly accessible ClickHouse database belonging to DeepSeek. This allowed “full control over database operations, including the ability … Read More “Detecting Data Leaks Before Disaster – The Hacker News” »
Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure – The Hacker News
Threat actors are attempting to leverage a newly released artificial intelligence (AI) offensive security tool called HexStrike AI to exploit recently disclosed security flaws. HexStrike AI, according to its website, is pitched as an AI‑driven security platform to automate reconnaissance and vulnerability discovery with an aim to accelerate authorized red teaming operations, bug bounty hunting, … Read More “Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure – The Hacker News” »
Misconfigured Server Leaks 378GB of Navy Federal Credit Union Files – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cybersecurity researcher Jeremiah Fowler discovered an unsecured and misconfigured server exposing 378 GB of internal Navy Federal Credit… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cloudflare has notified customers that hackers may have accessed their data as part of the Salesloft Drift campaign – Read More –





