Malicious actors have been observed exploiting a now-patched critical security flaw impacting Erlang/Open Telecom Platform (OTP) SSH as early as beginning of May 2025, with about 70% of detections originating from firewalls protecting operational technology (OT) networks. The vulnerability in question is CVE-2025-32433 (CVSS score: 10.0), a missing authentication issue that could be abused by … Read More “Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls – The Hacker News” »
A cyber-attack at Connex Credit Union has compromised data of 172,000 individuals, including sensitive information – Read More –
A flaw in WinRAR, tracked as CVE-2025-8088, has been exploited by the RomCom group to deploy malware – Read More –
Hackers Leak 9GB of Data from Alleged North Korean Hacker’s Computer – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Hackers release 9GB of stolen files from the computer of an alleged North Korean hacker, revealing tools, logs,… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The cybersecurity world stands immeasurably stronger because of the vision, expertise, and leadership of Amit Yoran. Throughout his distinguished career, Amit fundamentally shaped the field of cybersecurity, setting new standards for excellence, innovation, and resilience. We are proud to honor Amit’s life with our first-ever lifetime CyberScoop 50 award. Amit made an extraordinary impact on … Read More “CyberScoop 50 reveals 2025 winners; honors Amit Yoran with lifetime award – CyberScoop” »
Scoop News Group is thrilled to honor the standout winners of the 2025 CyberScoop 50 Awards, recognizing the leaders who protect our networks, data, and infrastructure while driving innovation across cybersecurity. Over three months, voters nationwide nominated and selected trailblazers who demonstrated exceptional dedication, creativity, and resilience. With more than 800,000 votes across five categories, … Read More “Announcing the winners of the 2025 CyberScoop 50 awards – CyberScoop” »
NIST Releases Test Tools to Accelerate Adoption of Emerging Route Leak Mitigation Standards – News and Events Feed by Topic
NIST has released NIST BGP RPKI IO (BRIO) – an open-source testing framework designed to facilitate test and experimentation with emerging Border Gateway Protocol (BGP) security and resilience mechanisms that leverage the Resource Public Key – Read More – News and Events Feed by Topic
North Korean Group ScarCruft Expands From Spying to Ransomware Attacks – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
North Korean hackers ScarCruft shift from spying to ransomware, using VCD malware in phishing attacks, targeting South Korea… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
⚡ Weekly Recap: BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More – The Hacker News
This week, cyber attackers are moving quickly, and businesses need to stay alert. They’re finding new weaknesses in popular software and coming up with clever ways to get around security. Even one unpatched flaw could let attackers in, leading to data theft or even taking control of your systems. The clock is ticking—if defenses aren’t … Read More “⚡ Weekly Recap: BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More – The Hacker News” »
The Evolution of Exposure Management Most security teams have a good sense of what’s critical in their environment. What’s harder to pin down is what’s business-critical. These are the assets that support the processes the business can’t function without. They’re not always the loudest or most exposed. They’re the ones tied to revenue, operations, and … Read More “6 Lessons Learned: Focusing Security Where Business Value Lives – The Hacker News” »
Four senior members of a Ghana-based criminal network have been indicted for stealing over $100 million through romance scams and BEC frau – Read More –
TRM Labs observed crypto payments worth $34.2m moved from victims addresses to a range of destinations likely associated with the group – Read More –
Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
London, United Kingdom, 11th August 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Eight European countries have yet to transpose NIS2 into law, exposing them to regulatory action – Read More –
Commercial red team experts believe AI’s current impact on cyber is overstated – Read More –
INE Named to Training Industry’s 2025 Top 20 Online Learning Library List – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cary, United States, 11th August 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The Unified Payments Interface (UPI) is the pulse of India’s Digital Economy with more than 13 billion transactions per… The post Protecting UPI: How Tokenization Keeps Real-Time Payments Safe appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
The maintainers of the WinRAR file archiving utility have released an update to address an actively exploited zero-day vulnerability. Tracked as CVE-2025-8088 (CVSS score: 8.8), the issue has been described as a case of path traversal affecting the Windows version of the tool that could be exploited to obtain arbitrary code execution by crafting malicious … Read More “WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately – The Hacker News” »
New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP – The Hacker News
A novel attack technique could be weaponized to rope thousands of public domain controllers (DCs) around the world to create a malicious botnet and use it to conduct power distributed denial-of-service (DDoS) attacks. The approach has been codenamed Win-DDoS by SafeBreach researchers Or Yair and Shahak Morag, who presented their findings at the DEF CON … Read More “New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP – The Hacker News” »
Bouygues Telecom Hit by Cyberattack, 6.4 Million Customers Affected – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A cyberattack on Bouygues Telecom exposed data for 6.4 million customers. Find out what information was compromised and… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation – The Hacker News
Cybersecurity researchers have presented new findings related to a now-patched security issue in Microsoft’s Windows Remote Procedure Call (RPC) communication protocol that could be abused by an attacker to conduct spoofing attacks and impersonate a known server. The vulnerability, tracked as CVE-2025-49760 (CVSS score: 3.5), has been described by the tech giant as a Windows … Read More “Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation – The Hacker News” »
AgentFlayer 0-click exploit abuses ChatGPT Connectors to Steal 3rd-party app data – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
AgentFlayer is a critical vulnerability in ChatGPT Connectors. Learn how this zero-click attack uses indirect prompt injection to… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models – The Hacker News
Cybersecurity researchers have uncovered multiple security flaws in Dell’s ControlVault3 firmware and its associated Windows APIs that could have been abused by attackers to bypass Windows login, extract cryptographic keys, as well as maintain access even after a fresh operating system install by deploying undetectable malicious implants into the firmware. The vulnerabilities have been codenamed … Read More “Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models – The Hacker News” »
Cybersecurity researchers have disclosed vulnerabilities in select model webcams from Lenovo that could turn them into BadUSB attack devices. “This allows remote attackers to inject keystrokes covertly and launch attacks independent of the host operating system,” Eclypsium researchers Paul Asadoorian, Mickey Shkatov, and Jesse Michael said in a report shared with The Hacker News. The … Read More “Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks – The Hacker News” »
Nigerian man extradited from France to US over hacking and fraud allegations – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A Nigerian man has been extradited from France to face hacking, identity theft, and fraud charges in the… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A vulnerability has been discovered in SonicWall SonicOS Management Access and SSLVPN, which could allow for unauthorized resource access and in specific conditions, causing the firewall to crash. SonicOS is SonicWall’s operating system designed for their firewalls and other security devices. Successful exploitation of the most severe of these vulnerabilities could allow for unauthorized access … Read More “A Vulnerability in SonicWall SonicOS management access and SSLVPN Could Allow for Unauthorized Access – Cyber Security Advisories – MS-ISAC” »
WinRAR Zero-Day CVE-2025-8088 Exploited to Spread RomCom Malware – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Critical WinRAR flaw CVE-2025-8088 exploited by Russia-linked hackers to spread RomCom malware, update to version 7.13 now to… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes – The Hacker News
A fresh set of 60 malicious packages has been uncovered targeting the RubyGems ecosystem by posing as seemingly innocuous automation tools for social media, blogging, or messaging services to steal credentials from unsuspecting users and likely resell them on dark web forums like Russian Market. The activity is assessed to be active since at least … Read More “RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes – The Hacker News” »
Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems – The Hacker News
Cybersecurity researchers have uncovered a jailbreak technique to bypass ethical guardrails erected by OpenAI in its latest large language model (LLM) GPT-5 and produce illicit instructions. Generative artificial intelligence (AI) security platform NeuralTrust said it combined a known technique called Echo Chamber with narrative-driven steering to trick the model into producing undesirable – Read More … Read More “Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems – The Hacker News” »
The winners of the AI Cybersecurity Challenge (AIxCC), Team Atlanta, won a $4m prize – Read More –
Cybersecurity researchers have discovered over a dozen vulnerabilities in enterprise secure vaults from CyberArk and HashiCorp that, if successfully exploited, can allow remote attackers to crack open corporate identity systems and extract enterprise secrets and tokens from them. The 14 vulnerabilities, collectively named Vault Fault, affect CyberArk Secrets Manager, Self-Hosted, and – Read More – … Read More “CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials – The Hacker News” »
A new documentary series about cybercrime airing next month on HBO Max features interviews with Yours Truly. The four-part series follows the exploits of Julius Kivimäki, a prolific Finnish hacker recently convicted of leaking tens of thousands of patient records from an online psychotherapy practice while attempting to extort the clinic and its patients. The … Read More “KrebsOnSecurity in New ‘Most Wanted’ HBO Max Series – Krebs on Security” »
DARPA’s AI Cyber Challenge reveals winning models for automated vulnerability discovery and patching – CyberScoop
The Pentagon’s two-year public competition to spur the development of cyber-reasoning systems that use large language models to autonomously find and patch vulnerabilities in open-source software concluded Friday with $8.5 awarded to three teams of security specialists at DEF CON. The Defense Advanced Research Project Agency’s AI Cyber Challenge seeks to address a persistent bottleneck … Read More “DARPA’s AI Cyber Challenge reveals winning models for automated vulnerability discovery and patching – CyberScoop” »
15,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652) – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A new report by VulnCheck exposes a critical command injection flaw (CVE-2025-53652) in the Jenkins Git Parameter plugin.… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Microsoft: An organization without a response plan will be hit harder by a security incident – CyberScoop
LAS VEGAS — Businesses that don’t treat security with the gravity it requires — exhibited by lackluster or nonexistent preparation, planning and exercise in the event of a cyberattack — typically suffer longer and unnecessarily, Microsoft threat intelligence, hunting and response leaders said Thursday at Black Hat. In the best- case scenarios in the wake … Read More “Microsoft: An organization without a response plan will be hit harder by a security incident – CyberScoop” »
AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims – The Hacker News
Cybersecurity researchers are drawing attention to a new campaign that’s using legitimate generative artificial intelligence (AI)-powered website building tools like DeepSite AI and BlackBox AI to create replica phishing pages mimicking Brazilian government agencies as part of a financially motivated campaign. The activity involves the creation of lookalike sites imitating Brazil’s State – Read More … Read More “AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims – The Hacker News” »
LAS VEGAS — One of the big worries during the generative AI boom is where exactly data is traveling when users enter queries or commands into the system. According to new research, those worries may also extend to one of the world’s most popular consumer technology companies. Apple’s artificial intelligence ecosystem, known as Apple Intelligence, … Read More “Research reveals possible privacy gaps in Apple Intelligence’s data handling – CyberScoop” »
LAS VEGAS — One of the big worries during the generative AI boom is where exactly data is traveling when users enter queries or commands into the system. According to new research, those worries may also extend to one of the world’s most popular consumer technology companies. Apple’s artificial intelligence ecosystem, known as Apple Intelligence, … Read More “Research reveals possible privacy gaps in Apple Intelligence’s data handling – CyberScoop” »
Leaders of the US Cybersecurity and Infrastructure Agency (CISA) pushed back on layoff concerns and highlighted new initiatives – Read More –
The Information Commissioner has applied for a civil penalty against Optus following the 2022 data breach that exposed the personal details of 9.5 million Australians – Read More –
GreedyBear: 40 Fake Crypto Wallet Extensions Found on Firefox Marketplace – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A new, coordinated cybercrime campaign called “GreedyBear” has stolen over $1 million from crypto users. Learn how the group uses malicious extensions, malware, and fake websites in an industrial-scale attack uncovered by Koi Security. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
When an organization’s credentials are leaked, the immediate consequences are rarely visible—but the long-term impact is far-reaching. Far from the cloak-and-dagger tactics seen in fiction, many real-world cyber breaches begin with something deceptively simple: a username and password. According to Verizon’s 2025 Data Breach Investigations Report, leaked credentials accounted for 22% of breaches – Read … Read More “Leaked Credentials Up 160%: What Attackers Are Doing With Them – The Hacker News” »
TeaOnHer hasn’t stopped at copying the functionality of the original Tea app (albeit skewed towards men rating women). It also appears to have carelessly mimicked the Tea dating advice app’s recklessness when it comes to data security. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
The judiciary announced stronger protections for its case management system following reports of a major breach of sensitive court documents in multiple states – Read More –
Accelerated digitalization, embedded finance, and the clear regulatory environment have been precipitating the swift transformation of the fintech ecosystem… The post How India’s fintech fraud patterns are evolving in 2025 appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
A newly discovered campaign dubbed GreedyBear has leveraged over 150 malicious extensions to the Firefox marketplace that are designed to impersonate popular cryptocurrency wallets and steal more than $1 million in digital assets. The published browser add-ons masquerade as MetaMask, TronLink, Exodus, and Rabby Wallet, among others, Koi Security researcher Tuval Admoni said. What makes … Read More “GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions – The Hacker News” »
Bouygues Telecom revealed the attackers stole personal data of 6.4 million customers, including contact details, contractual data and international bank account numbers – Read More –
The post Federal courts to ramp up filing system security after ‘recent escalated cyberattacks’ appeared first on CyberScoop. – Read More – CyberScoop
The NSA’s CAPT program, launched in 2024 with Horizon3.ai, now benefits 1000 of the 300,000 US Defense Industrial Base companies – Read More –
LAS VEGAS — The Russian cybercrime group behind BlackSuit and Royal ransomware was more prolific and successful at extorting payments from its victims than previously known, according to an update Thursday from an investigative unit inside the Department of Homeland Security. “Since 2022, the Royal and BlackSuit ransomware groups have compromised over 450 known victims … Read More “BlackSuit, Royal ransomware group hit over 450 US victims before last month’s takedown – CyberScoop” »





