Governmental organizations in Southeast Asia are the target of a new campaign that aims to collect sensitive information by means of a previously undocumented Windows backdoor dubbed HazyBeacon. The activity is being tracked by Palo Alto Networks Unit 42 under…
Category: EN
Meme Coins in 2025: High Risk, High Reward, and Rising Security Threats
Meme coins started as internet jokes, but by 2025, they’ve become one of the most volatile and talked-about… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Meme Coins…
LaRecipe Tool with 2.3M Downloads Found Vulnerable to Full Server Takeover
A critical security vulnerability has been discovered in LaRecipe, a popular Laravel documentation package with over 2.3 million downloads, that could allow attackers to completely compromise affected servers. The vulnerability, identified as CVE-2025-53833, enables Server-Side Template Injection (SSTI) attacks that…
14 Hackers Arrested in Massive Tax Fraud Scheme, Authorities Confirm
Authorities have arrested 14 individuals in a coordinated international operation targeting a sophisticated tax fraud scheme that exploited stolen personal data to submit fraudulent claims worth over £1 million. The arrests demonstrate the growing collaboration between UK and Romanian law…
Ransomware Threat Grows as Attackers Move Into VMware and Linux
Linux has been the reliable backbone of business infrastructure for many years; it powers 96% of the top million web servers worldwide and more than 80% of workloads in public clouds. Its reputation for reliability and inherent security has long…
North Korean Hackers Exploit Zoom Invites in Attacks on Crypto Companies
Cybersecurity firm SentinelOne has exposed an ongoing malware campaign orchestrated by North Korean threat actors, known for their persistent “fake interview” scams. This operation continues to leverage spear-phishing tactics aimed at individuals and organizations within the Web3, cryptocurrency, and blockchain…
Hackers Leveraging AWS Lambda URLs Endpoints to Attack Governments Organizations
A previously unreported Windows backdoor dubbed “HazyBeacon” has emerged in a stealthy espionage campaign that began in late 2024 and is still unfolding across several Southeast Asian government networks. The operators exploit the public URL feature of AWS Lambda—originally designed…
Pentagon Awards AI Contracts To OpenAI, Google, Anthropic, xAI
US Defence Department hands contracts of up to $200m each to AI leaders as White House seeks to expand government AI adoption This article has been indexed from Silicon UK Read the original article: Pentagon Awards AI Contracts To OpenAI,…
Meta To Spend ‘Hundreds Of Billions’ On AI Data Centres
Meta vows to spend hundreds of billions of dollars on AI infrastructure as it seeks to keep up with competitors such as Google and OpenAI This article has been indexed from Silicon UK Read the original article: Meta To Spend…
North Korea-linked actors spread XORIndex malware via 67 malicious npm packages
North Korea-linked hackers uploaded 67 malicious npm packages with XORIndex malware, hitting 17K+ downloads in ongoing supply chain attacks. North Korea-linked threat actors behind the Contagious Interview campaign have uploaded 67 malicious npm packages with XORIndex malware loader, hitting over…
Social Engineering Identified as Catalyst for M&S Ransomware Breach
Marks & Spencer (M&S), one of the largest and most established retailers in the United Kingdom, has confirmed that a highly targeted social engineering operation triggered the ransomware attack in April 2025. This breach, which is associated with DragonForce…
Preventing Zero-Click AI Threats: Insights from EchoLeak
A zero-click exploit called EchoLeak reveals how AI assistants like Microsoft 365 Copilot can be manipulated to leak sensitive data without user interaction. This entry breaks down how the attack works, why it matters, and what defenses are available to…
MITRE Launches AADAPT Framework to Counter Real-World Attacks on Digital Asset Systems
The MITRE Corporation has unveiled its comprehensive AADAPT™ framework (Adversarial Actions in Digital Asset Payment Technologies), a specialized knowledge base designed to catalog and counter sophisticated attacks targeting digital asset management systems, cryptocurrency exchanges, and blockchain infrastructure. The framework represents…
British Citizen Sentenced for Islamophobic WiFi Hack at UK Train Stations
John Andreas Wik, a 37-year-old resident of Limes Road in Beckenham, has been handed a 24-month prison sentence, suspended for two years, after admitting to orchestrating an Islamophobic hack of free WiFi landing pages at multiple train stations across Britain.…
AsyncRAT evolves as ESET tracks its most popular malware forks
AsyncRAT is an open-source remote access trojan that first appeared on GitHub in 2019. It includes a range of typical RAT capabilities, such as keylogging, screen capture, credential theft, and more. Its simplicity and open-source design have made it a…
Abacus Market Shutters After Exit Scam, Say Experts
Darknet giant Abacus Market has gone offline due to a likely exit scam, according to TRM Labs This article has been indexed from www.infosecurity-magazine.com Read the original article: Abacus Market Shutters After Exit Scam, Say Experts
OpenAI Delays Open Source Model Indefinitely
OpenAI pushes back release of hotly anticipated open-source model indefinitely as it seeks to compete with DeepSeek This article has been indexed from Silicon UK Read the original article: OpenAI Delays Open Source Model Indefinitely
Apache Tomcat Coyote Flaw Allows Attackers to Launch DoS Attacks
The Apache Software Foundation has revealed a vulnerability in the Tomcat Coyote module, specifically within the Maven artifact org.apache.tomcat:tomcat-coyote, that could enable malicious actors to orchestrate denial-of-service (DoS) attacks. This flaw stems from an uncontrolled resource consumption issue tied to…
CISA Warns of Wing FTP Server Vulnerability Actively Exploited in Attacks
CISA has issued an urgent warning about a critical vulnerability in Wing FTP Server that is being actively exploited by cybercriminals. The vulnerability, tracked as CVE-2025-47812, poses significant risks to organizations using this popular file transfer solution and has been…
Elmo’s X Account Hacked: Sesame Street Character Used to Spread Racist and Antisemitic Messages
In a shocking incident that left parents and fans horrified, the official X account of Elmo, the beloved red monster from Sesame Street, was hacked on Sunday, July 13, 2025, and used to spread a series of racist and antisemitic…