A suspected hacker, believed to be the mastermind behind an organised campaign of attacks that stole millions of dollars worth of stocks from celebrities, including BTS singer Jung Kook, has been extradited to South Korea. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
Study Reveals TikTok, Alibaba, Temu Collect Extensive User Data in America – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Incogni finds top foreign apps downloaded in the US harvest names, locations, and emails, sharing them with third parties for ads and profiling. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers – The Hacker News
Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with an in-memory malware dubbed MixShell. The activity has been codenamed ZipLine by Check Point Research. “Instead of sending unsolicited phishing emails, attackers initiate contact through a company’s public ‘Contact Us’ form, tricking – Read More – The … Read More “MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers – The Hacker News” »
ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners – The Hacker News
A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to fake CAPTCHA verification pages that employ the ClickFix social engineering tactic to deliver information stealers, ransomware, and cryptocurrency miners. The large-scale cybercrime campaign, first detected in August 2025, has been codenamed ShadowCaptcha by the Israel National – … Read More “ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners – The Hacker News” »
New Android Hook Malware Variant Locks Devices With Ransomware – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Zimperium’s research reveals the Hook Android malware is now a hybrid threat, using ransomware and spyware to steal… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Silver Spring, USA / Maryland, 26th August 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
AccuKnox Awarded Patent for Runtime Security of Kernel Events – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Menlo Park, United States, 26th August 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
All previously scheduled mobility trips across Maryland for this week will be honored, said the state’s transportation administration – Read More –
Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay screens to display extortion messages. “A prominent characteristic of the latest variant is its capacity to deploy a full-screen ransomware overlay, which aims to coerce the victim into remitting a ransom payment,” Zimperium zLabs researcher Vishnu Pratapagiri … Read More “HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands – The Hacker News” »
A new CIISec poll finds the majority of industry professionals would prefer more rigorous cybersecurity laws – Read More –
Data I/O has revealed operational disruption following a ransomware breach that forced it to take some systems offline – Read More –
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws impacting Citrix Session Recording and Git to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2024-8068 (CVSS score: 5.1) – An improper privilege management vulnerability in Citrix Session Recording … Read More “CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git – The Hacker News” »
Google has announced plans to begin verifying the identity of all developers who distribute apps on Android, even for those who distribute their software outside the Play Store. “Android will require all apps to be registered by verified developers in order to be installed by users on certified Android devices,” the company said. “This creates … Read More “Google to Verify All Android Developers in 4 Countries to Block Malicious Apps – The Hacker News” »
As we step in 2025, once the major firewalls that define network safety for decades, now standing as a… The post The Death of Perimeter Security: Why Firewalls Are the Fax Machines of 2025 appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
How to Streamline Your Game Development Process: 4 Smart Solutions – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Development teams worldwide spend countless hours wrestling with the same persistent challenges: tight deadlines, resource constraints, and the… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Fake Voicemail Emails Install UpCrypter Malware on Windows – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
FortiGuard Labs warns of a global phishing campaign that delivers UpCrypter malware, giving hackers complete control of infected… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 – The Hacker News
Docker has released fixes to address a critical security flaw affecting the Docker Desktop app for Windows and macOS that could potentially allow an attacker to break out of the confines of a container. The vulnerability, tracked as CVE-2025-9074, carries a CVSS score of 9.3 out of 10.0. It has been addressed in version 4.44.3. … Read More “Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 – The Hacker News” »
UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats – The Hacker News
A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the globe to advance Beijing’s strategic interests. “This multi-stage attack chain leverages advanced social engineering including valid code signing certificates, an adversary-in-the-middle (AitM) attack, and indirect execution techniques to evade – … Read More “UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats – The Hacker News” »
The Federal Communications Commission announced Monday it has blocked more than 1,200 voice service providers from having access to the country’s phone network for failing to comply with anti-robocall regulations, marking the agency’s largest enforcement action against companies that facilitate illegal automated calls. The providers were disconnected after violating FCC rules requiring accurate certifications in … Read More “FCC removes 1,200 voice providers from telephone networks in major robocall crackdown – CyberScoop” »
Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware loader called UpCrypter. The campaign leverages “carefully crafted emails to deliver malicious URLs linked to convincing phishing pages,” Fortinet FortiGuard Labs researcher Cara Lin said. “These pages are designed to entice recipients into downloading JavaScript – … Read More “Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads – The Hacker News” »
Data I/O, an electronics manufacturer and software vendor for major automotive suppliers and tech firms, said its operations were disrupted in the wake of a ransomware attack earlier this month. The attack occurred Aug. 16, the company said in a regulatory filing Thursday. “The incident has temporarily impacted the company’s operations including internal and external … Read More “Data I/O reports business disruptions in wake of ransomware attack – CyberScoop” »
Blistering Wyden letter seeks review of federal court cybersecurity, citing ‘incompetence,’ ‘negligence’ – CyberScoop
Sen. Ron Wyden on Monday urged Supreme Court Chief Justice John Roberts to seek an independent review of federal court cybersecurity following the latest major hack, accusing the judiciary of “incompetence” and “covering up” its “negligence” over digital defenses. Wyden, D-Ore., wrote his letter in response to news this month that hackers had reportedly breached … Read More “Blistering Wyden letter seeks review of federal court cybersecurity, citing ‘incompetence,’ ‘negligence’ – CyberScoop” »
National Public Data Relaunches Despite 2.9 Billion SSNs Breach – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
It is business as usual at National Public Data (NPD) despite the breach that exposed 3 billion Social Security numbers and the subsequent leak. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Only 7 Days Left for Early Bird Registration to the OpenSSL Conference 2025 – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Newark, United States, 25th August 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A variant of the Atomic macOS Stealer (AMOS) targets macOS users via fake support sites in malvertising campaign – Read More –
⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More – The Hacker News
Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage, or shift who holds the upper hand. For leaders, this means defense isn’t just a matter of firewalls and patches—it’s about strategy. The strongest organizations aren’t the ones with the most tools, … Read More “⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More – The Hacker News” »
A Chinese developer has been sentenced to four years in prison after being found to deploy malicious code in his employer’s network, including a “kill switch” – Read More –
Cybercriminals Exploit Cheap VPS to Launch SaaS Hijacking Attacks – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Darktrace researchers have discovered a new wave of attacks where cybercriminals use cheap Virtual Private Servers (VPS) to… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations – The Hacker News
Security Information and Event Management (SIEM) systems act as the primary tools for detecting suspicious activity in enterprise networks, helping organizations identify and respond to potential attacks in real time. However, the new Picus Blue Report 2025, based on over 160 million real-world attack simulations, revealed that organizations are only detecting 1 out of 7 … Read More “Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations – The Hacker News” »
Top EdTech Apps Delivering AI Skills – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
“AI isn’t coming, it’s already here. The question is, are you ready?” That’s the brutal reality of a… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The US Cybersecurity and Infrastructure Security Agency is planning to launch an update to a 2021 guideline for SBOM requirements – Read More –
Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing – The Hacker News
The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS (Bharat Operating System Solutions) Linux systems with malicious Desktop shortcut files in attacks targeting Indian Government entities. “Initial access is achieved through spear-phishing emails,” CYFIRMA said. “Linux BOSS environments are targeted via weaponized .desktop – Read More … Read More “Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing – The Hacker News” »
The semiconductor industry is at the epicentre of modern innovation, yet it is also a very complex and strategic… The post Top 5 Cyber Threats Facing Semiconductor Manufacturing appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
CTM360 Report Explains How Emotions Fuel Modern Fraud – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
CTM360 research reveals how scammers hook their victims through manipulative traps built on AI, stolen data, and brand… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot – The Hacker News
Cybersecurity researchers have discovered a malicious Go module that presents itself as a brute-force tool for SSH but actually contains functionality to discreetly exfiltrate credentials to its creator. “On the first successful login, the package sends the target IP address, username, and password to a hard-coded Telegram bot controlled by the threat actor,” Socket researcher … Read More “Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot – The Hacker News” »
Hackers Could Take Over Apple Devices Via Malicious Images – Patch Now! – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Apple fixes CVE-2025-43300, a flaw letting hackers hijack devices via malicious images. Users urged to update iPhone, iPad,… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Fake CoinMarketCap Journalists Targeting Crypto Executives in Spear-Phishing Campaign – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Fake CoinMarketCap journalist profiles used in spear-phishing target crypto execs via Zoom interviews, risking malware, data theft, and… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Critical infrastructure organisations are once again being warned of the threat posed by malicious cybercriminals, following a ransomware attack against a state-owned energy company in Pakistan. Read more in my article on the Exponential-e blog. – Read More – Graham Cluley
GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets – The Hacker News
Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose Redis servers to various malicious activities, including leveraging the compromised devices as IoT botnets, residential proxies, or cryptocurrency mining infrastructure. The first set of attacks entails the exploitation of CVE-2024-36401 (CVSS score: 9.8), a critical – Read More – The … Read More “GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets – The Hacker News” »
COOKIE SPIDER’s Malvertising Drops New SHAMOS macOS Malware – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
CrowdStrike reports COOKIE SPIDER using malvertising to spread SHAMOS macOS malware (a new variant of AMOS infostealer), stealing… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Scattered Spider Hacker Noah Michael Urban Jailed for 10 Years – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Noah Michael Urban, the 20-year-old hacker from the notorious Scattered Spider group, was sentenced to 10 years in… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Some cybersecurity news outlets were duped a few days ago by a claim that Europol was offering a $50,000 bounty for information about two members of the Qilin ransomware group. Turns out it was all a hoax. Read more details about what happened in my article on the Hot for Security blog – Read More … Read More “Europol says Telegram post about 50,000 Qilin ransomware award is fake – Graham Cluley” »
Interpol-led crackdown disrupts cybercrime networks in Africa that caused $485 million in losses – CyberScoop
A globally coordinated operation involving support from 18 countries in Africa, the United Kingdom and nine security organizations resulted in the arrest of 1,209 alleged cybercriminals, Interpol said Friday. Authorities said they recovered $97.4 million and dismantled 11,432 pieces of malicious infrastructure between June and August. Financial losses attributed to the crimes allegedly committed by … Read More “Interpol-led crackdown disrupts cybercrime networks in Africa that caused $485 million in losses – CyberScoop” »
Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called VShell. The “Linux-specific malware infection chain that starts with a spam email with a malicious RAR archive file,” Trellix researcher Sagar Bade said in a technical write-up. “The payload isn’t hidden inside the file content … Read More “Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection – The Hacker News” »
Operation Serengeti 2.0 operators helped recover $97.4m stolen by cybercriminals – Read More –
INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown – The Hacker News
INTERPOL on Friday announced that authorities from 18 countries across Africa have arrested 1,209 cybercriminals who targeted 88,000 victims. “The crackdown recovered $97.4 million and dismantled 11,432 malicious infrastructures, underscoring the global reach of cybercrime and the urgent need for cross-border cooperation,” the agency said. The effort is the second phase of an ongoing law … Read More “INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown – The Hacker News” »
Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage – The Hacker News
Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus cyber espionage group known as Murky Panda that involves abusing trusted relationships in the cloud to breach enterprise networks. “The adversary has also shown considerable ability to quickly weaponize N-day and zero-day vulnerabilities and frequently achieves initial access to their targets by – … Read More “Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage – The Hacker News” »
Darktrace observed a coordinated campaign on customer SaaS accounts, all of which involved logins from IP addresses linked to VPS providers – Read More –
Pentesting remains one of the most effective ways to identify real-world security weaknesses before adversaries do. But as the threat landscape has evolved, the way we deliver pentest results hasn’t kept pace. Most organizations still rely on traditional reporting methods—static PDFs, emailed documents, and spreadsheet-based tracking. The problem? These outdated workflows introduce delays, – Read … Read More “Automation Is Redefining Pentest Delivery – The Hacker News” »
All Apple users are encouraged to update their iPhones, iPads and macOS devices – Read More –





