A federal agency that supplies budget and economic information to Congress has suffered a cybersecurity incident, reportedly at the hands of a suspected foreign party. A spokesperson for the Congressional Budget Office (CBO) acknowledged the incident Thursday after The Washington Post reported that the office was hacked, with the attackers potentially accessing communications between lawmakers … Read More “Agency that provides budget data to Congress hit with security incident – CyberScoop” »
“Pay up or we share the tapes”: Hackers target massage parlour clients in blackmail scheme – Graham Cluley
South Korean police have uncovered a hacking operation that stole sensitive data from massage parlours and blackmailed their male clientele. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
Critical infrastructure is once again in the spotlight, as it is revealed that several UK water suppliers have reported cybersecurity incidents over the last two years. Read more in my article on the Fortra blog. – Read More – Graham Cluley
New ChatGPT Vulnerabilities Let Hackers Steal Data, Hijack Memory – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Seven vulnerabilities in ChatGPT (including GPT-5) allow attackers to use ‘0-click’ and ‘memory injection’ to bypass safety features and persistently steal private user data and chat history. Tenable Research exposes the flaws. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
SonicWall said a state-sponsored threat actor was behind the brute-force attack that exposed firewall configuration files of every customer that used the company’s cloud backup service. The vendor pinned the responsibility for the attack on an undisclosed nation state Tuesday, after Mandiant concluded its investigation into the incident. SonicWall did not attribute the attack to … Read More “SonicWall pins attack on customer portal to undisclosed nation-state – CyberScoop” »
Experts have uncovered large-scale phishing exploiting Booking.com, Airbnb and Expedia accounts, targeting hotels and customers – Read More –
Cisco on Wednesday disclosed that it became aware of a new attack variant that’s designed to target devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software releases that are susceptible to CVE-2025-20333 and CVE-2025-20362. “This attack can cause unpatched devices to unexpectedly reload, leading to denial-of-service … Read More “Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 – The Hacker News” »
A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks targeting Ukrainian entities. The campaign, detected in May 2025, is tracked by the security outfit under the moniker InedibleOchotense, describing it as Russia-aligned. “InedibleOchotense sent spear-phishing emails and Signal text messages, containing a link – Read … Read More “Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine – The Hacker News” »
A new Cisco report exposed large language models to multi-turn adversarial attacks with 90% success rates – Read More –
Cavalry Werewolf Hit Russian Government with New ShellNET Backdoor – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Doctor Web uncovers a targeted cyberattack on a Russian government body by the Cavalry Werewolf group using a new ShellNET backdoor and Telegram-based control. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Top 7 Companies Specializing in Product Discovery Phase in 2025 – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Finding the right partner is less about headcount and more about repeatable outcomes, which is why the profiles… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More – The Hacker News
Cybercrime has stopped being a problem of just the internet — it’s becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and even trusted apps or social platforms are turning into attack vectors. The result is a global system where every digital weakness can be … Read More “ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More – The Hacker News” »
Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement. Crisis management or Tabletop exercises, for a long time relatively rare in the context of cybersecurity, have become required as a series of regulations has introduced this requirement to FSI … Read More “From Tabletop to Turnkey: Building Cyber Resilience in Financial Services – The Hacker News” »
Smashing Security podcast #442: The hack that messed with time, and rogue ransom where negotiators – Graham Cluley
Time itself comes under attack as a state-backed hacking gang spends two years tunnelling toward a nation’s master clock — with chaos potentially only a tick away. Plus when ransomware negotiators turn to the dark side, what could possibly go wrong? All this and more is discussed in episode 442 of the “Smashing Security” podcast … Read More “Smashing Security podcast #442: The hack that messed with time, and rogue ransom where negotiators – Graham Cluley” »
ENISA report reveals DDoS accounted for 60% of public sector security incidents last year – Read More –
Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response – The Hacker News
Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response (MDR) — marking the fourth consecutive year of inclusion. According to Gartner, more than 600 providers globally claim to deliver MDR services, yet only a select few meet the criteria to appear in the Market … Read More “Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response – The Hacker News” »
By 31 March 2026, organisations should have alternatives to Mail Check and Web Check in place. – Read More – NCSC Feed
Google warns of “just-in-time AI” malware using LLMs to evade detection and generate malicious code on-demand – Read More –
Europe will likely face a combination of heightened cyber-physical attacks and information operations coming from nation-state groups in 2026 – Read More –
The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware. According to a new report from Bitdefender, the adversary is said to have enabled the Hyper-V role on selected victim systems to deploy a minimalistic, Alpine Linux-based virtual machine. “This hidden … Read More “Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection – The Hacker News” »
The world of digital economy is becoming more and more uncertain with the balance between innovation and security becoming… The post Quantum Computing & the Future of Tokenisation Security appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files. “The malicious activity – carried out by a state-sponsored threat actor – was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call,” … Read More “SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach – The Hacker News” »
For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare’s public ranking of the most frequently requested websites. Cloudflare responded by redacting Aisuru domain names from their top websites list. The chief executive at Cloudflare says Aisuru’s overlords are using the botnet to boost … Read More “Cloudflare Scrubs Aisuru Botnet from Top Domains List – Krebs on Security” »
Hackers Steal Personal Data and 17K Slack Messages in Nikkei Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Nikkei confirms breach after a virus infected an employee PC, exposing 17,368 names and Slack chat histories. The media giant reported the incident voluntarily. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Congressional leaders are pressing federal agencies to provide more information on their plans to compete with China on a range of tech and cybersecurity issues, including a strategy for promoting American 6G telecommunications infrastructure and limiting Chinese tech in US supply chains. Representative Raja Krishnamoorthi, D-Ill., ranking member on the House Select Committee on the … Read More “Congressional leaders want an executive branch strategy on China 6G, tech supply chain – CyberScoop” »
When a pair of high-profile internet outages took down large chunks of the internet last month, the events briefly brought hundreds of organizations to a near-halt and prevented millions of users from accessing core services for everyday business needs. From Starbucks to crypto exchanges to the messaging app Signal, the outages rippled across nearly every … Read More “With each cloud outage, calls for government action grow louder – CyberScoop” »
A federal judge has reimposed a sentence on Paige Thompson, the former Amazon Web Services engineer convicted in the 2019 Capital One data breach that compromised the personal information of more than 100 million people. U.S. District Judge Robert Lasnik sentenced Thompson to time served, plus five years of supervised release with three years of … Read More “Court reimposes original sentence for Capital One hacker – CyberScoop” »
When a pair of high-profile internet outages took down large chunks of the internet last month, the events briefly brought hundreds of organizations to a near-halt and prevented millions of users from accessing core services for everyday business needs. From Starbucks to crypto exchanges to the messaging app Signal, the outages rippled across nearly every … Read More “With each cloud outage, calls for government action grow louder – CyberScoop” »
A Commerce Department office should investigate Chinese government-connected products in more than a dozen emerging industries for security threats, a group of House GOP committee leaders said in a letter they released Wednesday. In the missive, the lawmakers said the Office of Information and Communications Technology and Services has the power to both investigate and … Read More “House GOP leaders seek government probe, restrictions on Chinese-made tech – CyberScoop” »
Private markets used to operate behind closed doors, exclusive, informal, and built on personal connections more than structure.… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Severe React Native Flaw Exposes Developer Systems to Remote Attacks – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
JFrog researchers found a critical RCE vulnerability (CVE-2025-11953) in the popular React Native CLI. Developers using versions 4.8.0-20.0.0-alpha.2 must update to patch the flaw. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Private markets used to operate behind closed doors, exclusive, informal, and built on personal connections more than structure.… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Behind every alert is an analyst; tired eyes scanning dashboards, long nights spent on false positives, and the constant fear of missing something big. It’s no surprise that many SOCs face burnout before they face their next breach. But this doesn’t have to be the norm. The path out isn’t through working harder, but through … Read More “Why SOC Burnout Can Be Avoided: Practical Steps – The Hacker News” »
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud – The Hacker News
The U.S. Treasury Department on Tuesday imposed sanctions against eight individuals and two entities within North Korea’s global financial network for laundering money for various illicit schemes, including cybercrime and information technology (IT) worker fraud. “North Korean state-sponsored hackers steal and launder money to fund the regime’s nuclear weapons program,” said Under Secretary of – … Read More “U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud – The Hacker News” »
Operation “Chargeback” has dismantled global fraud networks misusing stolen card data from more than 4.3 million victims – Read More –
Google on Wednesday said it discovered an unknown threat actor using an experimental Visual Basic Script (VB Script) malware dubbed PROMPTFLUX that interacts with its Gemini artificial intelligence (AI) model API to write its own source code for improved obfuscation and evasion. “PROMPTFLUX is written in VBScript and interacts with Gemini’s API to request specific … Read More “Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly – The Hacker News” »
A vulnerability has been discovered in CWP (aka Control Web Panel or CentOS Web Panel), which could allow for remote code execution. CWP, or Control Web Panel, is a free server administration tool for enterprise-based Linux distributions like CentOS, which simplifies managing web hosting services. The admin interface (accessible on port 2087 or 2031) and the … Read More “A Vulnerability in CWP (aka Control Web Panel or CentOS Web Panel) Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
A previously unknown cyber actor UNK_SmudgedSerpent has been observed targeting academics with phishing and malware, merging techniques from Iranian groups – Read More –
Norton Crack Midnight Ransomware, Release Free Decryptor – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Norton finds a flaw in the new Midnight ransomware built from Babuk code and releases a free decryptor to help victims recover files without paying a ransom. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data – The Hacker News
Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI’s ChatGPT artificial intelligence (AI) chatbot that could be exploited by an attacker to steal personal information from users’ memories and chat histories without their knowledge. The seven vulnerabilities and attack techniques, according to Tenable, were found in OpenAI’s GPT-4o and GPT-5 models. OpenAI has … Read More “Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data – The Hacker News” »
How the F5 breach, CISA job cuts, and a government shutdown are eroding U.S. cyber readiness – CyberScoop
The federal cybersecurity system is weathering a series of crises that couldn’t have arrived at a worse time. The F5 security breach from Oct. 15, the proposed elimination of more than 1,000 jobs at the Cybersecurity and Infrastructure Security Agency (CISA), and the ongoing federal government shutdown have created a perfect storm that is not … Read More “How the F5 breach, CISA job cuts, and a government shutdown are eroding U.S. cyber readiness – CyberScoop” »
Credentials and Misconfigurations Behind Most Cloud Breaches, Says AWS – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
New AWS report data reveals the top four security failure points in the cloud, including vulnerability exploitation (24%)… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Raise your hand if you’ve heard the myth, “Android isn’t secure.” Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may worry about the security—after all, work data is critical. However, outdated concerns can hold your business back from unlocking its full potential. The truth is, … Read More “Securing the Open Android Ecosystem with Samsung Knox – The Hacker News” »
Microsoft Teams Flaws Allowed Attackers to Fake Identities, Rewrite Chats – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Microsoft Teams vulnerabilities let attackers impersonate users, edit chat history, and spoof calls before Microsoft issued security fixes in late 2025. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions – The Hacker News
A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting academics and foreign policy experts between June and August 2025, coinciding with heightened geopolitical tensions between Iran and Israel. “UNK_SmudgedSerpent leveraged domestic political lures, including societal change in Iran and investigation into the – Read More – … Read More “Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions – The Hacker News” »
10 Successful Marketplaces Built on Sharetribe: Lessons Learned – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
The marketplace revolution is here, and it’s transforming how we buy, sell, and share everything from vintage furniture… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Three of Anthropic’s Claude Desktop extensions were vulnerable to command injection – flaws that have now been fixed – Read More –
Juniper Research predicts a $9bn drop in losses to SMS fraud next year – Read More –
Zscaler estimates 239 malicious Android apps made it onto the official Play store over the past year – Read More –
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Gladinet and Control Web Panel (CWP) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabilities in question are listed below – CVE-2025-11371 (CVSS score: 7.5) – A vulnerability in files or directories … Read More “CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence – The Hacker News” »





