A flaw in OneDrive File Picker has exposed millions to data overreach through excessive OAuth permissions – Read More –
A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting the Craft Content Management System (CMS) to deploy multiple payloads, including a cryptocurrency miner, a loader dubbed Mimo Loader, and residential proxyware. The vulnerability in question is CVE-2025-32432, a maximum severity flaw in Craft CMS that was patched … Read More “Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware – The Hacker News” »
Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cybersecurity researchers have disclosed details of a coordinated cloud-based scanning activity that targeted 75 distinct “exposure points” earlier this month. The activity, observed by GreyNoise on May 8, 2025, involved as many as 251 malicious IP addresses that are all geolocated to Japan and hosted by Amazon. “These IPs triggered 75 distinct behaviors, including CVE … Read More “251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch – The Hacker News” »
Would you expect an end user to log on to a cybercriminal’s computer, open their browser, and type in their usernames and passwords? Hopefully not! But that’s essentially what happens if they fall victim to a Browser-in-the-Middle (BitM) attack. Like Man-in-the-Middle (MitM) attacks, BiTM sees criminals look to control the data flow between the victim’s … Read More “How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds – The Hacker News” »
Adidas revealed that customer contact information, including names, emails and phone numbers were accessed by an unauthorized party – Read More –
A Vietnam-nexus hacking group distributes infostealers and backdoors via social media ads promoting fake AI generator websites – Read More –
A newly-discovered Russian group, Void Blizzard, has successfully compromised organizations in critical industries, Microsoft warned – Read More –
Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five years, including more than $2 billion in 2024 alone. The company said the App Store is confronted by a wide range of threats that seek to defraud users in various ways, ranging from “deceptive apps designed to steal … Read More “Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats – The Hacker News” »
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on May 27 SEC Consult Vulnerability Lab Security Advisory < 20250521-0 > ======================================================================= title: Multiple Vulnerabilities product: eCharge Hardy Barth cPH2 and cPP2 charging stations vulnerable version: 2.2.0 fixed version: Not available CVE number: CVE-2025-27803, CVE-2025-27804, CVE-2025-48413, CVE-2025-48414, CVE-2025-48415,… – Read More – Full Disclosure
Affiliate marketing is a powerful tool for promoting brands. However, with its popularity gaining traction, more dishonest affiliate… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
ChatGPT o3 resists shutdown despite explicit instructions, raising fresh concerns over AI safety, alignment, and reinforcement learning behaviors. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Zscaler announced Tuesday its intention to acquire Red Canary, a company known for Managed Detection and Response (MDR) services, to boost its ability to integrate artificial intelligence, automation and human expertise into its security offerings. The acquisition is positioned around the convergence of Zscaler’s data-driven, AI-centric cloud security and Red Canary’s decade of operational expertise … Read More “ZScaler acquires Red Canary for boost in AI-driven security operations – CyberScoop” »
An Iranian man pleaded guilty Tuesday to participating in the Robbinhood ransomware scheme, which most notably afflicted the city of Baltimore in a costly 2019 attack. Sina Gholinejad, 37, pleaded guilty to one count of computer fraud and abuse and one count of conspiracy to commit wire fraud. He faces up to 30 years in … Read More “Iranian man pleads guilty in Robbinhood ransomware scheme – CyberScoop” »
Lovers of Adidas clothes would be wise to be on their guard against phishing attacks, after the German sportswear giant revealed that a cyber attack had exposed the personal information of customers. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
As the internet fills up with clips from AI-video generators, hacking groups are seeding the online landscape with malware-laced programs and fake websites hoping to cash in on the trend. Tracked by researchers at Mandiant and Google Cloud, the campaign is being carried out by a group identified as “UNC6032.” Since mid-2024, they have spread … Read More “Mandiant flags fake AI video generators laced with malware – CyberScoop” »
A newly discovered Russian state-sponsored threat group has targeted a large swath of industries, especially in NATO member states and Ukraine, part of a global espionage campaign in support of Moscow’s interests, Microsoft Threat Intelligence said in a Tuesday blog post. Laundry Bear, a group Microsoft tracks as Void Blizzard, has attacked multiple governments and … Read More “New Russian state-sponsored APT quickly gains global reach, hitting expansive targets – CyberScoop” »
Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising antivirus software from Bitdefender to dupe victims into downloading a remote access trojan called Venom RAT. The campaign indicates a “clear intent to target individuals for financial gain by compromising their credentials, crypto wallets, and potentially selling access to their systems,” … Read More “Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets – The Hacker News” »
Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into a cryptocurrency mining botnet. The attacks, designed to mine for Dero currency, is notable for its worm-like capabilities to propagate the malware to other exposed Docker instances and rope them into an ever-growing horde of mining bots. Kaspersky … Read More “New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency – The Hacker News” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.3 ATTENTION: Low attack complexity Vendor: Johnson Controls Inc. Equipment: iSTAR Configuration Utility (ICU) tool Vulnerability: Use of Uninitialized Variable 2. RISK EVALUATION Successful exploitation of this vulnerability may allow an attacker to gain access to memory leaked from the ICU. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Johnson … Read More “Johnson Controls iSTAR Configuration Utility (ICU) Tool – All CISA Advisories” »
CISA released one Industrial Control Systems (ICS) advisory on May 27, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-146-01 Johnson Controls iSTAR Configuration Utility (ICU) Tool CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations. – Read More – All CISA … Read More “CISA Releases One Industrial Control Systems Advisory – All CISA Advisories” »
There’s a graveyard of brilliant cybersecurity companies that no one has ever heard of. These firms had incredible… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Adidas confirms cyber attack compromising customer data, joining other major retailers targeted by advanced threats and rising cybersecurity risks. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
In episode 52 of The AI Fix, our hosts watch a non-existent musical about garlic bread, Graham shares a summer reading list of books that don’t exist, Mark feels nauseous after watching a video of Sam Altman and Jony Ive waffling about products that don’t exist, some non-existent robots stack empty crates in a factory … Read More “The AI Fix #52: AI adopts its own social norms, and AI DJ creates diversity scandal – Graham Cluley” »
A targeted cyber-attack on an MSP exploited flaws in remote management tools, resulting in ransomware deployment and data theft – Read More –
Today, CISA, in collaboration with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and other international and U.S. partners, released new guidance for organizations seeking to procure Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platforms. This guidance includes the following three resources: Implementing SIEM and SOAR Platforms … Read More “New Guidance for SIEM and SOAR Implementation – All CISA Advisories” »
A novel attack exploited machine learning models on PyPI, using zipped Pickle files to deliver infostealer malware – Read More –
Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilot’s code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to other services, quietly swelling the population of non‑human identities (NHIs) across corporate clouds. That population is already overwhelming the enterprise: many companies – Read More … Read More “AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale – The Hacker News” »
Microsoft has shed light on a previously undocumented cluster of threat activity originating from a Russia-affiliated threat actor dubbed Void Blizzard (aka Laundry Bear) that it said is attributed to “worldwide cloud abuse.” Active since at least April 2024, the hacking group is linked to espionage operations mainly targeting organizations that are important to Russian … Read More “Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages – The Hacker News” »
Former UK government minister Rory Stewart and NCSC Director of Operations Paul Chichester will explore the growing link between geopolitics and cybersecurity – Read More –
The audit of the NVD will be conducted by the US Department of Commerce’s Office of Inspector General – Read More –
Everest ransomware leaks Coca-Cola employee data: 1,104 files exposed, including HR, admin roles, IDs, personal details, and internal records. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud. The activity, first detected by ReliaQuest in May 2025 targeting an unnamed customer in the manufacturing sector, is characterized by the use of fake login pages to access the … Read More “Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers – The Hacker News” »
A joint advisory from the US, UK, Australia and others highlights the importance of SIEM/SOAR platforms and overcoming implementation challenges – Read More –
Cisco Talos reported that a Chinese group has deployed web shells and malware in local government networks post-exploitation – Read More –
The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering attacks mounted by a criminal extortion actor known as Luna Moth targeting law firms over the past two years. The campaign leverages “information technology (IT) themed social engineering calls, and callback phishing emails, to gain remote access to systems or devices and steal … Read More “Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign – The Hacker News” »
The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing campaign targeting Tajikistan using macro-enabled Word templates as an initial payload. The attack chain is a departure from the threat actor’s previously documented use of an HTML Application (.HTA) loader dubbed HATVIBE, Recorded Future’s Insikt Group said in an analysis. “Given TAG-110’s … Read More “Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents – The Hacker News” »
SilverRAT Source Code leaked on GitHub, exposing powerful malware tools for remote access, password theft, and crypto attacks before removal. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cisco Talos warns of active exploitation of a zero-day vulnerability (CVE-2025-0994) in Cityworks supposedly by Chinese hackers from… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled endpoint. The packages, published under three different accounts, come with an install‑time script that’s triggered during npm install, Socket security researcher Kirill Boychenko said in … Read More “Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto – The Hacker News” »
Researchers have released PoC for CVE-2025-32756, a severe security flaw, that is actively being exploited in Fortinet products… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISO’s guide provides a practical roadmap for continuous web privacy validation that’s aligned with real-world practices. – Download the full guide here. Web Privacy: From Legal Requirement to Business Essential As regulators ramp up enforcement and users grow more privacy-aware, CISOs … Read More “CISO’s Guide To Web Privacy Validation And Why It’s Important – The Hacker News” »
Cyber threats don’t show up one at a time anymore. They’re layered, planned, and often stay hidden until it’s too late. For cybersecurity teams, the key isn’t just reacting to alerts—it’s spotting early signs of trouble before they become real threats. This update is designed to deliver clear, accurate insights based on real patterns and … Read More “⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs – The Hacker News” »
The US National Institute of Standards and Technology (NIST) published a white paper introducing a new metric called Likely Exploited Vulnerabilities (LEV) – Read More –
FBI warns law firms: Silent Ransom Group uses phishing emails and fake IT calls to steal data, demanding ransom to prevent public leaks. The agency is also urges victims to share ransom evidence. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework. The campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena. “Catena uses embedded shellcode and configuration switching logic to … Read More “Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware – The Hacker News” »
A critical XSS vulnerability, CVE-2024-27443, in Zimbra Collaboration Suite’s CalendarInvite feature is actively being exploited, potentially by the… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
SK Telecom reveals malware intrusion that remained hidden for nearly two years, led to the leaking of 26.69… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Akamai researchers reveal a critical flaw in Windows Server 2025 dMSA feature that allows attackers to compromise any… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cofense Intelligence’s May 2025 report exposes how cybercriminals are abusing legitimate Remote Access Tools (RATs) like ConnectWise and Splashtop to deliver malware and steal data. Learn about this growing threat. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto