The hackers are also suspected of being behind several cyber-attacks, including against the French Football Federation This article has been indexed from www.infosecurity-magazine.com Read the original article: French Authorities Arrest Four with Suspected Ties to Notorious BreachForums
Category: EN
BreachForums: ShinyHunters Members Arrested, IntelBroker Identified as Kai West
Four alleged ShinyHunters members arrested, IntelBroker exposed as British national Kai West in global crackdown linked to BreachForums and major data breaches. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the…
CISA Issues Alert on Active Exploitation of D-Link Path Traversal Flaw
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert following evidence of active exploitation of a critical vulnerability (CVE-2024-0769) in legacy D-Link DIR-859 WiFi routers. The flaw, which enables attackers to gain unauthorized access and potentially…
U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet…
Androxgh0st Botnet Operators Exploiting US University For Hosting C2 Logger
The Androxgh0st botnet has significantly expanded its operations since 2023, with cybercriminals now compromising prestigious academic institutions to host their command and control infrastructure. This sophisticated malware campaign has demonstrated remarkable persistence and evolution, targeting a diverse range of vulnerabilities…
UK to buy nuclear-capable F-35As that can’t be refueled from RAF tankers
Aircraft meant to bolster NATO deterrent will rely on allied support to stay airborne The UK government is to buy 12 F-35A fighters capable of carrying nuclear weapons as part of the NATO deterrent, but there’s a snag: the new…
Central Kentucky Radiology Data Breach Impacts 167,000
The personal information of 167,000 individuals was compromised in an October 2024 data breach at Central Kentucky Radiology. The post Central Kentucky Radiology Data Breach Impacts 167,000 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
ClickFix attacks skyrocketing more than 500%
ClickFix, a deceptive attack method, saw a surge of more than 500% in the first half of 2025, making it the second most common attack vector after phishing, according to ESET’s latest Threat Report. The report, which looks at trends…
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks
An Iranian state-sponsored hacking group associated with the Islamic Revolutionary Guard Corps (IRGC) has been linked to a spear-phishing campaign targeting journalists, high-profile cyber security experts, and computer science professors in Israel. “In some of those campaigns, Israeli technology and…
Interpol Warns of Rapid Rise in Cybercrime on African Continent
Interpol claims cybercrime has risen sharply in Africa with cyber-offences accounting for a “medium-to-high” share of all crime This article has been indexed from www.infosecurity-magazine.com Read the original article: Interpol Warns of Rapid Rise in Cybercrime on African Continent
Critical Cisco ISE Vulnerabilities Allow Remote Code Execution
Two critical vulnerabilities in Cisco ISE could allow remote attackers to execute arbitrary code with root privileges. The post Critical Cisco ISE Vulnerabilities Allow Remote Code Execution appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Researchers Demonstrate Windows Registry Manipulation via C++ Program
Cybersecurity researchers have developed a C++ program demonstrating how attackers manipulate the Windows Registry to establish persistence, evade defenses, and alter system behavior. This technique, central to many cyberattacks, exploits the registry’s role as Windows’ configuration database. The program uses…
Frozen supermarket chain deploys facial recognition tech
Privacy campaigner brands Iceland’s use of ‘Orwellian’ camera tech ‘chilling,’ CEO responds: ‘It’ll cut violent crime’ Privacy campaigners are branding frozen food retailer Iceland’s decision to trial facial recognition technology (FRT) at several stores “chilling” – the UK supermarket chain…
CitrixBleed 2: The nightmare that echoes the ‘CitrixBleed’ flaw in Citrix NetScaler devices
New Citrix flaw ‘CitrixBleed 2’ lets attackers steal session cookies without logging in, echoing a previously exploited vulnerability. A new flaw in Citrix NetScaler ADC and Gateway, dubbed ‘CitrixBleed 2‘ (CVE-2025-5777, CVSS v4.0 Base Score of 9.3), can allow unauthenticated…
British Man Suspected of Being the Hacker IntelBroker Arrested, Charged
25-year-old Kai West, believed to be the hacker IntelBroker, was arrested in France and charged by the United States. The post British Man Suspected of Being the Hacker IntelBroker Arrested, Charged appeared first on SecurityWeek. This article has been indexed…
How AI is Transforming the Legal Profession
AI isn’t replacing lawyers—it’s liberating them from mundane tasks to focus on strategy and human connection. From transforming document review to democratizing legal expertise for small firms, artificial intelligence is reshaping how legal professionals serve clients and deliver justice. The…
Supply Chain Incident Imperils Glasgow Council Services and Data
Glasgow City Council has warned of service disruption and potential data loss after a security incident This article has been indexed from www.infosecurity-magazine.com Read the original article: Supply Chain Incident Imperils Glasgow Council Services and Data
Protecting Business Data From Unauthorized Encryption Threats
Your business operates in an online environment where unauthorized encryption of data isn’t just possible, it’s probable. The… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Protecting Business…
IBM i Vulnerability Allows Attackers to Escalate Privileges
A critical security vulnerability has been identified in IBM i, potentially allowing attackers to escalate privileges and execute arbitrary code with administrator rights. The flaw, tracked as CVE-2025-36004, affects IBM Facsimile Support for i across multiple versions of the IBM…
TeamFiltration Pentesting Tool Weaponized to Hijack Microsoft Teams, Outlook, and Other Accounts
A sophisticated cyberattack campaign has weaponized a legitimate penetration testing framework to compromise thousands of Microsoft cloud accounts across hundreds of organizations worldwide. The malicious operation, designated UNK_SneakyStrike, leverages TeamFiltration, a popular cybersecurity tool originally designed for Office 365 security…