The U.S. Department of Justice has indicted 54 individuals over a multi-million-dollar ATM jackpotting fraud scheme. U.S. DoJ indicted 54 people for a nationwide ATM jackpotting scheme that stole millions via malware. The case links the crimes to the cybercrime…
Bangladeshi Operator of Fake ID Marketplaces Charged in International Fraud Case
A 29-year-old Bangladeshi man has been indicted on federal charges for operating online marketplaces that sold fraudulent identity document templates to customers worldwide, U.S. authorities announced. Zahid Hasan of Dhaka, Bangladesh, faces nine federal counts, including six counts of transferring…
LinkedIn Profile Data Among Billions of Records Found in Exposed Online Database
Cybersecurity researchers recently identified a massive online database that was left publicly accessible without any security protections, exposing a vast collection of professional and personal information. The database contained more than 16 terabytes of data, representing over 4.3 billion…
IT Security News Hourly Summary 2025-12-20 21h : 2 posts
2 posts were published in the last hour 19:31 : DevOps and Cybersecurity: Building a New Line of Defense Against Digital Threats 19:31 : NDSS 2025 – Too Subtle to Notice: Investigating Executable Stack Issues in Linux Systems
DevOps and Cybersecurity: Building a New Line of Defense Against Digital Threats
Learn how DevOps and DevSecOps strengthen cybersecurity through automation, CI/CD, and secure DevOps development services. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: DevOps and Cybersecurity: Building a New…
NDSS 2025 – Too Subtle to Notice: Investigating Executable Stack Issues in Linux Systems
Session 6D: Software Security: Vulnerability Detection Authors, Creators & Presenters: Hengkai Ye (The Pennsylvania State University), Hong Hu (The Pennsylvania State University) PAPER Too Subtle to Notice: Investigating Executable Stack Issues in Linux Systems Code injection was a favored technique…
Are We Becoming Children of the MagentAI?
(If you’d prefer, you can skip the intro blathering and just download the full white paper) Back in 1997, a commercial airline captain noticed his fellow pilots had a problem: they’d gotten so used to following the magenta flight path…
FBI Seizes Fake ID Template Domains Operating from Bangladesh
US authorities have charged Zahid Hasan with running TechTreek, a $2.9 million online marketplace selling fake ID templates. The investigation, involving the FBI and Bangladesh police, uncovered a global scheme selling fraudulent passports and social security cards to over 1,400…
Claude Opus 4.5 Now Integrated with GitHub Copilot
GitHub has announced the general availability of Claude Opus 4.5, Anthropic’s advanced AI model, across its Copilot platform. This integration enhances AI capabilities for developers using GitHub’s code assistance tools. The Claude Opus 4.5 model is now accessible to users…
CountLoader and GachiLoader Malware Campaigns Target Cracked Software Users
Cybersecurity analysts have uncovered a new malware campaign that relies on cracked software download platforms to distribute an updated variant of a stealthy and modular loader known as CountLoader. According to researchers from the Cyderes Howler Cell Threat Intelligence…
Clop Ransomware Targets Internet-Facing Gladinet CentreStack Servers in New Data Theft Campaign
The Clop ransomware group, also known as Cl0p, has launched a new extortion campaign aimed at Gladinet CentreStack file servers that are exposed to the internet. Gladinet CentreStack is a file-sharing solution that allows organizations to securely access and…
Microsoft Rolls Out Baseline Security Mode for Office, SharePoint, Exchange, Teams, and Entra
Microsoft has begun deploying Baseline Security Mode across Microsoft 365 tenants, a new dashboard in the M365 Admin Center that centralizes recommended security configurations for Office, SharePoint, Exchange, Teams, and Entra. Announced at Ignite 2025, this opt-in feature helps administrators…
Lugano: Swiss Crypto Hub Where Bitcoin Pays for Everything
The Swiss city of Lugano, located in the Italian-speaking canton of Ticino, has turned itself into the European capital for cryptocurrency through its bold “Plan ₿” scheme, which lets citizens and businesses transact in Bitcoin and Tether for almost everything.…
U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware
The U.S. Department of Justice (DoJ) this week announced the indictment of 54 individuals in connection with a multi-million dollar ATM jackpotting scheme. The large-scale conspiracy involved deploying malware named Ploutus to hack into automated teller machines (ATMs) across the…
Hackers Stole Millions of PornHub Users’ Data for Extortion
Plus: Cisco discloses a zero-day with no available patch, Venezuela accuses the US of a cyberattack, and more. This article has been indexed from Security Latest Read the original article: Hackers Stole Millions of PornHub Users’ Data for Extortion
Microsoft 365 Users Targeted by Russia-Linked Device Code Phishing Operations
The global network infrastructure is experiencing a wave of sophisticated cyber intrusions as states-sponsored and financially motivated hackers are increasingly exploiting a legitimate Microsoft authentication mechanism to seize control of enterprise accounts in a broad range of sectors. There has…
IT Security News Hourly Summary 2025-12-20 12h : 3 posts
3 posts were published in the last hour 11:2 : U.S. CISA adds a flaw in WatchGuard Fireware OS to its Known Exploited Vulnerabilities catalog 11:2 : CISA Releases New Indicators of Compromise Tied to BRICKSTORM Malware 11:2 : Cybersecurity…
U.S. CISA adds a flaw in WatchGuard Fireware OS to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a WatchGuard Fireware OS flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a WatchGuard Firebox OS vulnerability, tracked as CVE-2025-14733 (CVSS Score of 9.3), to its Known…
CISA Releases New Indicators of Compromise Tied to BRICKSTORM Malware
The Cybersecurity and Infrastructure Security Agency (CISA), along with the National Security Agency (NSA) and Canadian Centre for Cyber Security (Cyber Centre), has released updated indicators of compromise (IOCs) and detection signatures for BRICKSTORM malware. The latest update, published on…
Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks
In a shocking betrayal of industry trust, two former cybersecurity professionals have pleaded guilty to federal charges for launching ransomware attacks against U.S. businesses. The pair, whose day jobs involved helping companies respond to hacks and negotiate ransoms, admitted to…
Microsoft Teams Outage Causes Global Messaging Delays and Service Interruptions
Microsoft Teams users worldwide experienced significant service disruptions on December 20, 2025, as the collaboration platform encountered widespread issues affecting messaging functionality and other critical service operations. The company has acknowledged the incident and is actively investigating the root cause.…
25,000+ FortiCloud SSO-Enabled Systems Vulnerable to Remote Exploitation
The Shadowserver Foundation has identified over 25,000 internet-facing Fortinet devices globally with FortiCloud Single Sign-On (SSO) functionality enabled, raising concerns about potential exposure to critical authentication bypass vulnerabilities. The non-profit security organization recently added fingerprinting capabilities for these systems to…
IT Security News Hourly Summary 2025-12-20 09h : 1 posts
1 posts were published in the last hour 8:2 : Hackers Weaponize SVG Files and Office Documents to Target Windows Users
Hackers Weaponize SVG Files and Office Documents to Target Windows Users
Cybersecurity researchers have uncovered a sophisticated email campaign deploying a commodity loader to distribute Remote Access Trojans and information stealers. The operation primarily targets manufacturing and government organizations across Italy, Finland, and Saudi Arabia, using highly evasive techniques. Multi-Vector Attack…