Category: EN

Researchers Scanning the Internet, (Tue, May 20th)

We have been using our data to identify researchers scanning the internet for a few years. Currently, we are tracking 36 groups performing such scans, and our data feed of the IP addresses used contains around 33k addresses [1]. …

Regeneron to Buy 23andMe for $256M Amid Growing Data Privacy Concerns

Biotechnology giant Regeneron Pharmaceuticals has emerged as the successful bidder in the bankruptcy auction for genetic testing pioneer 23andMe, offering $256 million for the majority of the company’s assets. Announced Monday, the deal would transfer 23andMe’s consumer genomics business and…

Hackers Abuse TikTok and Instagram APIs to Verify Stolen Account Credentials

Cybercriminals are leveraging the Python Package Index (PyPI) to distribute malicious tools designed to exploit TikTok and Instagram APIs for verifying stolen account credentials. Security researchers at Socket have identified three such packages checker-SaGaF, steinlurks, and sinnercore that automate the…

iPhone Security 101 – Protecting Your Device from Phishing Scams

In an age where smartphones contain our most sensitive information, phishing attacks targeting iPhone users have surged dramatically. According to recent reports, phishing messages have increased by 202% in the second half of 2024, with credential-based phishing attacks skyrocketing by…

Microsoft to Integrate AI With Windows 11 File Explorer

Microsoft is introducing artificial intelligence capabilities directly into Windows 11’s File Explorer, allowing users to manipulate files without opening dedicated applications.  Announced in Windows 11 Insider Preview Build 26200.5603 (KB5058488) released to the Dev Channel on May 19, 2025, this…

WordPress Plugin Vulnerability Exposes 22,000 Sites to Cyber Attacks

A critical security vulnerability discovered in the popular Motors WordPress theme has exposed approximately 22,000 websites to significant risk.  Security researchers have identified a privilege escalation vulnerability that allows unauthenticated attackers to take over administrative accounts, potentially compromising the entire…

NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch

VMware patches flaws that expose users to data leakage, command execution and denial-of-service attacks. No temporary workarounds available.  The post NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

LockBit Leak Shows Affiliates Use Pressure Tactics, Rarely Get Paid

Weeks after LockBit ransomware breach, leaked data reveals how affiliates generate ransomware, set ransom demands, and often walk away unpaid. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article:…

CISA Includes MDaemon Email Server XSS Flaw in KEV Catalog

Cybersecurity and Infrastructure Security Agency (CISA) has added a cross-site scripting (XSS) vulnerability affecting MDaemon Email Server to its Known Exploited Vulnerabilities (KEV) Catalog on May 19, 2025. This critical addition, identified as CVE-2024-11182, highlights a security flaw that allows…

Cynet boosts AI-powered threat detection accuracy

Cynet announced a major update to CyAI, its proprietary AI engine that powers advanced threat detection across the Cynet platform. By reducing false positives by 90%, CyAI advances Cynet’s mission to maximize purpose-built protection for managed service providers and small-to-medium…

A security key for every employee? Yubikey-as-a-Service goes global

Yubico’s roaming authenticators can now be provisioned and delivered in 175 countries. Here’s what the service offers. This article has been indexed from Latest stories for ZDNET in Security Read the original article: A security key for every employee? Yubikey-as-a-Service…

Security Flaw in WordPress Plugin Puts 22,000 Websites at Risk of Cyber Attacks

Critical security vulnerability has been discovered in Motors, a popular WordPress theme with over 22,000 sales, potentially exposing thousands of websites to complete takeover. Security researchers at Wordfence identified an unauthenticated privilege escalation vulnerability that allows attackers to change passwords…

Threat Actors Deploy Bumblebee Malware via Poisoned Bing SEO Results

A newly identified cyberattack campaign has revealed the persistent and evolving threat of Bumblebee malware, a sophisticated downloader first discovered in 2022 and linked to ransomware groups like Conti. According to a recent report by Cyjax, threat actors have orchestrated…

Cloud Security and Privacy: Best Practices to Mitigate the Risks

Cloud security refers to technologies, best practices, and safety guidelines that help to protect your data from human errors, insider and security threats. Therefore, it naturally covers a wide range of procedures, which are aimed at securing systems from data…

How to create a remote access policy, with template

Remote work, while beneficial, presents numerous security risks. Help keep your organization’s systems safe with a remote access policy. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: How to create a…

Phishing Attack Prevention – Best Practices for 2025

The phishing attack landscape continues to evolve in 2025, with cybercriminals using more sophisticated techniques to bypass security measures, emphasizing the need for phishing attack prevention. Phishing remains one of the most prevalent and damaging cyber threats facing organizations worldwide.…

Adidas Data Breach – Customers’ Personal Information Exposed

Adidas Korea has announced a security breach affecting customer data, marking the second major incident in the fashion industry targeting Korean consumers this month. The sportswear giant revealed that unauthorized access was gained through a third-party customer service provider, compromising…

Threat Actors Deliver Bumblebee Malware Poisoning Bing SEO

A sophisticated malware campaign leveraging search engine optimization (SEO) poisoning on Microsoft Bing has emerged, delivering the notorious Bumblebee malware to unsuspecting users. The campaign, identified in May 2025, specifically targets users searching for specialized software tools, demonstrating a concerning…

TrustCloud Raises $15 Million for Security Assurance Platform

AI-native security assurance firm TrustCloud has raised $15 million in a strategic funding round led by ServiceNow Ventures. The post TrustCloud Raises $15 Million for Security Assurance Platform appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Compromised RVTools Installer Spreading Bumblebee Malware

RVTools installer on its official site was found delivering malware. Research shows it spread Bumblebee loader. Users urged to verify downloads. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original…

Qilin Exploits SAP Zero-Day Vulnerability Weeks Ahead of Public Disclosure

Cybersecurity experts at OP Innovate have uncovered evidence that CVE-2025-31324, a critical zero-day vulnerability in SAP NetWeaver Visual Composer, was actively exploited nearly three weeks before its public disclosure. This flaw, residing in the /developmentserver/metadatauploader endpoint, lacks proper authentication and…

Critical VMware Cloud Foundation Vulnerability Exposes Sensitive Data

Broadcom’s VMware division has disclosed three significant security vulnerabilities in its Cloud Foundation platform that could allow attackers to gain unauthorized access to sensitive information and internal services. The advisory, published today (May 20, 2025), details vulnerabilities with CVSS scores…

Mounting GenAI Cyber Risks Spur Investment in AI Security

Thales found that 73% of organizations are investing in AI-specific security tools, amid surging takeup of GenAI tools in enterprises This article has been indexed from www.infosecurity-magazine.com Read the original article: Mounting GenAI Cyber Risks Spur Investment in AI Security

WordPress Plugin Flaw Puts 22,000 Websites at Risk of Cyber Attacks

A severe security flaw has been uncovered in the Motors WordPress theme, a popular choice for car dealerships and listings with over 22,000 sales on ThemeForest. Researcher Foxyyy reported a critical Privilege Escalation vulnerability through the Wordfence Bug Bounty Program,…

DoorDash Hack

A DoorDash driver stole over $2.5 million over several months: The driver, Sayee Chaitainya Reddy Devagiri, placed expensive orders from a fraudulent customer account in the DoorDash app. Then, using DoorDash employee credentials, he manually assigned the orders to driver…

Tor Browser 14.5.2 Released With Bug Fixes & New Capabilities

The Tor Project has announced the release of Tor Browser 14.5.2, available since May 18, 2025. This latest version delivers important security updates to Firefox and addresses several bugs, continuing the organization’s commitment to providing robust privacy protection for users…

Telecommunications Companies in Spain Experiencing Downtime

Major telecommunications networks across Spain have gone down early on Tuesday, May 20, 2025, following a network update by Spanish telecommunications giant Telefónica. The outage has affected fixed-line infrastructure and mobile services nationwide, with particularly severe disruptions reported in Madrid,…

Trojanized KeePass opens doors for ransomware attackers

A suspected initial access broker has been leveraging trojanized versions of the open-source KeePass password manager to set the stage for ransomware attacks, WithSecure researchers have discovered. KeeLoader: Passoword manager that acts as data stealer and malware loader In February…

Outpost24 simplifies threat analysis with AI-enhanced summaries

Outpost24 announced the addition of AI-enhanced summaries to the Digital Risk Protection (DRP) modules within its External Attack Surface Management (EASM) platform. With Outpost24’s DRP modules, organizations are able to identify, monitor, and protect against threats before they can be…

Spain Orders Airbnb To Shut Down Listings

Spanish government says nearly 66,000 listings violate law, orders shutdowns amidst housing crisis, as Airbnb says it will appeal This article has been indexed from Silicon UK Read the original article: Spain Orders Airbnb To Shut Down Listings

Court Rules Delta Can Pursue CrowdStrike Over Mass Outage

Georgia state court says Delta Airlines can pursue claims against security firm CrowdStrike after faulty update crashed systems worldwide This article has been indexed from Silicon UK Read the original article: Court Rules Delta Can Pursue CrowdStrike Over Mass Outage

Critical Multer Vulnerability Puts Millions of Node.js Apps at Risk

Critical security vulnerability has been discovered in Multer, one of the most widely used Node.js middleware packages for handling file uploads. The vulnerability affects all versions from 1.4.4-lts.1 up to but not including 2.0.0, potentially exposing millions of web applications…

What to Expect When You’re Convicted

When a formerly incarcerated “troubleshooter for the mafia” looked for a second career he chose the thing he knew best. He became a prison consultant for white-collar criminals. This article has been indexed from Security Latest Read the original article:…

O2 Service Vulnerability Exposed User Location

A vulnerability in O2’s implementation of the IMS standard resulted in user location data being exposed in network responses. The post O2 Service Vulnerability Exposed User Location appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

CloudSEK Raises $19 Million for Threat Intelligence Platform

Threat protection and intelligence firm CloudSEK raises $19 million in funding from new and existing investors. The post CloudSEK Raises $19 Million for Threat Intelligence Platform appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Duping Cloud Functions: An emerging serverless attack vector

Cisco Talos built on Tenable’s discovery of a Google Cloud Platform vulnerability to uncover how attackers could exploit similar techniques across AWS and Azure. This article has been indexed from Cisco Talos Blog Read the original article: Duping Cloud Functions:…

Microsoft Releases Emergency Fix for BitLocker Recovery Issue

Microsoft has released an emergency out-of-band update (KB5061768) to address a critical issue causing Windows 10 systems to boot into BitLocker recovery screens following the installation of the May 2025 security updates. The fix, released on May 19, comes after…

Madhu Gottumukkala Officially Announced as CISA Deputy Director

New CISA Deputy Director Madhu Gottumukkala has joined the agency from South Dakota’s Bureau of Information and Technology. The post Madhu Gottumukkala Officially Announced as CISA Deputy Director appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

The Windows Subsystem for Linux goes open source

Microsoft has officially open-sourced the Windows Subsystem for Linux (WSL), closing the very first issue ever filed on the Microsoft/WSL GitHub repository: “Will this be open source?” WSL allows developers to run unmodified Linux command-line tools, utilities, and applications directly…

Italy Fines Replika AI Maker £4m Over Child Safety

Italian data regulator fines Luka, developer of Replika AI ‘virtual friend’, 5m euros for failure to prevent children from using service This article has been indexed from Silicon UK Read the original article: Italy Fines Replika AI Maker £4m Over…

AMD Sells ZT’s AI Server Manufacturing Unit To Sanmina

Sanmina to buy ZT Systems AI cloud server manufacturing business from AMD as company builds up US-based supply chain This article has been indexed from Silicon UK Read the original article: AMD Sells ZT’s AI Server Manufacturing Unit To Sanmina

Half of Consumers Targeted by Social Media Fraud Ads

Around half of US and UK consumers have seen fraud ads and content on ‘refund hacks’ on social media This article has been indexed from www.infosecurity-magazine.com Read the original article: Half of Consumers Targeted by Social Media Fraud Ads

Malicious npm Package in Koishi Chatbots Steals Sensitive Data in Real Time

Socket’s Threat Research Team has uncovered a dangerous npm package named koishi-plugin-pinhaofa, masquerading as a spelling-autocorrect helper for Koishi chatbots. Marketed innocently, this plugin embeds a insidious data-exfiltration backdoor that scans every incoming message for an eight-character hexadecimal string a…

New 23andMe Buyer Regeneron Promises to Prioritize Security

Regeneron, which intends to acquire 23andMe for $256m, says data security and privacy will be a priority This article has been indexed from www.infosecurity-magazine.com Read the original article: New 23andMe Buyer Regeneron Promises to Prioritize Security

Dell Taps Nvidia Blackwell Ultra For Latest AI Servers

Dell introduces servers running Nvidia’s Blackwell Ultra AI GPUs as high costs, intense competition pressure profit margins This article has been indexed from Silicon UK Read the original article: Dell Taps Nvidia Blackwell Ultra For Latest AI Servers

Microsoft’s GitHub Offers AI Coding Agent

Microsoft’s GitHub expands AI offerings with semi-autonomous programming agent, Azure to offer models from xAI, Mistral, Black Forest Labs This article has been indexed from Silicon UK Read the original article: Microsoft’s GitHub Offers AI Coding Agent

W3LL Phishing Kit Actively Attacking Users to Steal Outlook Login Credentials

A sophisticated phishing campaign utilizing the W3LL Phishing Kit has been actively targeting users’ Microsoft Outlook credentials through elaborate impersonation techniques. First identified by Group-IB in 2022, this phishing-as-a-service (PhaaS) tool has evolved into a comprehensive ecosystem complete with its…

CISA Adds Ivanti EPMM 0-day to KEV Catalog Following Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) officially added two critical zero-day vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities (KEV) catalog.  These vulnerabilities, CVE-2025-4427 and CVE-2025-4428, are actively exploited in the wild and pose…

Engineering Calm in Crisis: Lessons from the Frontlines of Security

High-pressure incidents can be defining moments for organizations, demanding immediate, coordinated, and often high-stakes responses. In the realm of cybersecurity, where threats evolve rapidly and stakes include sensitive data, reputational damage, and financial loss, the pressure to act quickly is…

Tor Browser 14.5.2 Released: Bug Fixes and Enhanced Features

Tor Project has launched Tor Browser 14.5.2, a significant update addressing security vulnerabilities, refining cross-platform functionality, and enhancing build system reliability. This release integrates critical Firefox security patches, resolves longstanding privacy-related bugs, and implements infrastructural improvements to streamline future development.…

CampusGuard ScriptSafe prevents unauthorized script execution

CampusGuard introduced ScriptSafe, a software data security and privacy compliance solution.  ScriptSafe identifies and mitigates risks posed by JavaScript, third-party vendors and open-source code within your web ecosystem. Beyond securing your code, it addresses a critical gap in managing third-party digital…

Huawei Debuts HarmonyOS Laptop With 18-Inch Folding Display

Huawei launches MateBook Pro laptop with 18-inch folding display powered by company’s own HarmonyOS operating system and processing chips This article has been indexed from Silicon UK Read the original article: Huawei Debuts HarmonyOS Laptop With 18-Inch Folding Display

Critical pfSense Firewall Flaws Enable Attackers to Inject Malicious Code

Security researchers have uncovered three critical vulnerabilities in pfSense firewall software that could allow attackers to inject malicious code, corrupt configurations, and potentially gain unauthorized access to systems. These vulnerabilities were responsibly disclosed to Netgate, the company behind pfSense, between…

CISA Adds Actively Exploited Ivanti EPMM Zero-Day to KEV Catalog

Cybersecurity and Infrastructure Security Agency (CISA) has added two critical zero-day vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The flaws CVE-2025-4427 and CVE-2025-4428 enable authentication…

Malware Evasion Techniques – What Defenders Need to Know

In 2025, cybercriminals are raising the stakes by deploying sophisticated malware that bypasses traditional security measures, using advanced malware evasion techniques. Recent data shows that over 2,500 ransomware attacks were reported in just the first half of 2024, averaging more…

Honeypots become a strategic layer in cyber defence

J2 Software has introduced ‘Honeypot as a Service’, a plug-and-play solution designed to deceive attackers, gather critical threat intelligence, and ultimately strengthen an organisation’s cyber resilience. This new approach is particularly crucial as cyberattacks become more complex and targeted. A…