The largest Bitcoin-enabled Western darknet marketplace, Abacus Market, has gone offline amid widespread suspicions of an exit scam that may have cost users millions of dollars in held cryptocurrency funds. TRM Labs, a blockchain analytics firm, assesses that the marketplace’s…
Category: EN
Authorities Take Down ‘Diskstation’ Ransomware Gang Targeting Synology NAS Globally
Italian State Police, working alongside French and Romanian authorities, have successfully dismantled a sophisticated ransomware operation known as “Diskstation” that specifically targeted Synology Network Attached Storage (NAS) systems worldwide. The international investigation, coordinated by EUROPOL and led by Milan’s Cybersecurity…
Curl 8.15.0 Officially Released: 233 Bugs Fixed in Major Update
Curl, the ubiquitous command-line tool and library for transferring data with URLs, has reached version 8.15.0 with a landmark release that addresses more than 230 bugs and streamlines its internal architecture. Officially launched today at 10:00 CEST (08:00 UTC) in…
Unit 42 MDR Recognized as a Leader in MDR, Again
Palo Alto Networks Unit 42 MDR Recognized as a Leader in the Frost Radar™: Global Managed Detection and Response (MDR), 2025. The post Unit 42 MDR Recognized as a Leader in MDR, Again appeared first on Palo Alto Networks Blog.…
DShield Honeypot Scanning Reaches Record-High – 1,000,000+ Logs in a Day
The cybersecurity landscape has witnessed an unprecedented surge in malicious scanning activity, with DShield honeypots recording over one million log entries in a single day for the first time in their operational history. This dramatic escalation represents a significant shift…
Federal IT contractor Agrees to Pay $14.75M Over False Cybersecurity Services Claim
Hill ASC Inc.’s $14.75 million settlement with the U.S. Department of Justice closes a five-year saga in which the Rockville-based contractor allegedly billed agencies for “highly adaptive” cybersecurity support it was never qualified to deliver. Investigators say Hill’s pitch hinged…
Security shop Adarma ceases trading, confirms it will enter administration
Former staffers of struggling UK biz say they don’t expect to be paid for July UK cybersecurity shop Adarma has confirmed it has entered administration.… This article has been indexed from The Register – Security Read the original article: Security…
Former US Soldier Who Hacked AT&T and Verizon Pleads Guilty
Cameron John Wagenius pleaded guilty to charges related to hacking into US telecommunications companies. The post Former US Soldier Who Hacked AT&T and Verizon Pleads Guilty appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Co-op Aims to Divert More Young Hackers into Cyber Careers
The Co-op is teaming up with The Hacking Games to inspire pathways into ethical cybersecurity careers This article has been indexed from www.infosecurity-magazine.com Read the original article: Co-op Aims to Divert More Young Hackers into Cyber Careers
IoT Security Firm Exein Raises $81 Million
Italian company Exein has raised €70 million (~$81 million) in a Series C funding round led by Balderton. The post IoT Security Firm Exein Raises $81 Million appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act
Google on Tuesday revealed that its large language model (LLM)-assisted vulnerability discovery framework discovered a security flaw in the SQLite open-source database engine before it could have been exploited in the wild. The vulnerability, tracked as CVE-2025-6965 (CVSS score: 7.2),…
Chinese engineers at Pentagon, HazyBeacon malware, MITRE framework: AADAPT
Pentagon welcomes Chinese engineers into its environment HazyBeacon: It’s not a beer, but it leaves a bitter aftertaste What the world needs now is another framework Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust…
Former U.S. Army Member Pleads Guilty in Telecom Hacking Case
A 21-year-old former U.S. Army soldier has pleaded guilty to participating in a sophisticated cybercrime operation that targeted telecommunications companies through hacking, data theft, and extortion schemes. Cameron John Wagenius, who was stationed in Texas during his military service, admitted…
Octalyn Stealer Steals VPN Configurations, Passwords and Cookies in Structured Folders
A sophisticated new credential stealer disguised as a legitimate forensic toolkit has emerged on GitHub, targeting sensitive user data including VPN configurations, browser credentials, and cryptocurrency wallet information. The Octalyn Stealer, first identified in July 2025, presents itself as an…
VMware ESXi and Workstation Vulnerabilities Let Attackers Execute Malicious Code on Host
Multiple severe vulnerabilities have been addressed affecting VMware ESXi, Workstation, Fusion, and Tools that could allow attackers to execute malicious code on host systems. The vulnerabilities, identified as CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, and CVE-2025-41239, carry CVSS scores ranging from 6.2 to…
Iranian Threat Actors Attacking U.S. Critical Infrastructure Including Water Systems
Iranian cyber operatives have intensified their assault on American critical infrastructure, with Intelligence Group 13 emerging as a primary threat actor targeting water treatment facilities, electrical grids, and industrial control systems across the United States. The group, operating under the…
Chrome Update Patches Fifth Zero-Day of 2025
Google has released a Chrome 138 security update that patches a zero-day, the fifth resolved in the browser this year. The post Chrome Update Patches Fifth Zero-Day of 2025 appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Cybersecurity Today: GPU Vulnerabilities, Microsoft’s Security Overhaul, and Major Flaws in Automotive Bluetooth
In this episode hosted by Jim Love, ‘Cybersecurity Today’ celebrates its recognition as number 10 on the Feed Spot list of Canadian News Podcasts and approaches a milestone of 10 million downloads. Key topics include new research identifying Nvidia GPUs…
Meme Crimes – Can You Conspire By Meme?
Can a person be convicted of a federal conspiracy solely by posting misleading political memes online, without ever having communicated or knowingly coordinated with their alleged co-conspirators? The post Meme Crimes – Can You Conspire By Meme? appeared first on…
Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS
The Node.js project has released critical security updates across multiple release lines to address two high-severity vulnerabilities that pose significant risks to Windows applications and could enable denial-of-service attacks. The vulnerabilities, identified as CVE-2025-27210 and CVE-2025-27209, affect active Node.js release…