AI is transforming the phishing threat landscape at a pace many security teams are struggling to match, according to Cofense. In 2024, researchers tracked one malicious email every 42 seconds. Many of the 42-second attacks were part of polymorphic phishing…
Category: EN
The U.S. Copyright Office’s Draft Report on AI Training Errs on Fair Use
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> Within the next decade, generative AI could join computers and electricity as one of the most transformational technologies in history, with all of the promise and peril that implies. Governments’ responses…
How working in a stressful environment affects cybersecurity
Stressful work environments don’t just erode morale, they can quietly undermine cybersecurity. When employees feel overworked, unsupported, or mistreated, their judgment and decision-making suffer. “From an organizational perspective, a toxic culture often leads to increased errors, missed threats, decreased productivity,…
Cybersecurity Skills Framework connects the dots between IT job roles and the practical skills needed
The Linux Foundation, in collaboration with OpenSSF and Linux Foundation Education, has released the Cybersecurity Skills Framework, a global reference guide that helps organizations identify and address critical cybersecurity competencies across a broad range of IT job families. “Cybersecurity is…
CISA Warns of Google Chromium 0-Day Vulnerability Actively Exploited in the Wild – Patch Now!
The Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-4664 to its Known Exploited Vulnerabilities Catalog as the vulnerability is actively exploited in the wild in attacks. This high-severity issue in Google Chromium involves insufficient policy enforcement in the Loader component,…
O que é um ataque cibernético? Tipos e prevenção
A segurança digital se tornou uma prioridade inegociável. Com o avanço da tecnologia, surgem também novas ameaças digitais e uma das mais perigosas é o ataque cibernético. Empresas, governos e até mesmo usuários comuns estão constantemente na mira de criminosos…
New infosec products of the week: May 16, 2025
Here’s a look at the most interesting products from the past week, featuring releases from Hunted Labs, McAfee, Obsidian Security, PentestPad, Resecurity, and SecuX. Resecurity One simplifies cybersecurity operations Resecurity One provides real-time cyber threat intelligence from multiple sources, enabling…
AI Governance Is Your Competitive Edge If You Treat It That Way
For years, we’ve watched technology initiatives stumble not because they failed to innovate, but because they failed to govern. Now, with artificial intelligence reshaping industries at breakneck speed, many organizations are falling into the same trap: rushing ahead with AI…
ISC Stormcast For Friday, May 16th, 2025 https://isc.sans.edu/podcastdetail/9454, (Fri, May 16th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Friday, May 16th, 2025…
Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List
Once a key figure in the Angler exploit kit underworld, Tarasov’s life has unraveled into detention, paranoia, and an unwanted return to the Russia he publicly despised. The post Andrei Tarasov: Inside the Journey of a Russian Hacker on the…
Is Your Cloud Truly Safe from Invisible Threats?
Why Do Cloud Security Gaps Exist? Can we confidently claim to have sealed all potential breaches? The truth is, despite significant investments in cybersecurity measures, gaps continue to exist. Many professionals overlook the importance of Non-Human Identities (NHIs) management. NHIs,…
How Protected Are Your Automated Systems?
Are Your Machine Identities Safe? Non-Human Identities (NHIs) and Secrets Security Management present a groundbreaking approach to data security. But what is the reality of your automated systems’ protection? We will explore this question, highlighting the importance of implementing a…
Fostering Innovation with Secure Access Management
How Does Secure Access Management Fuel Innovation? Have you ever pondered the correlation between innovation security and business success? With businesses heavily rely on technology to innovate and drive growth, secure access management has become a crucial element in their…
Building Confidence in Your Cybersecurity Strategy
Why is a Comprehensive Cybersecurity Strategy Essential? A robust cybersecurity strategy is no longer a luxury but a necessity. Whether it is financial services, healthcare, or travel, organizations are making significant shifts to the digital domain. It has become critical…
Commit Stomping
Manipulating Git Histories to Obscure the Truth This article has been indexed from ZephrSec – Adventures In Information Security Read the original article: Commit Stomping
‘Expect Imposters’ Coinbase Tells Customers Whose Information Was Exposed in Data Breach
Instead of paying the $20 million ransom, Coinbase offered the same amount of money for information leading to the attackers. This article has been indexed from Security | TechRepublic Read the original article: ‘Expect Imposters’ Coinbase Tells Customers Whose Information…
Windows 10 Users Get 3 More Years of Microsoft 365 Security Updates
In a surprise reversal, Microsoft has adjusted Microsoft 365 Apps support for Windows 10, granting security updates through 2028 as many users are delaying Windows 11 upgrades. This article has been indexed from Security | TechRepublic Read the original article:…
Nova Scotia Power discloses data breach after March security incident
Nova Scotia Power confirmed a data breach involving the theft of sensitive customer data after the April cybersecurity incident. Nova Scotia Power Inc. is a vertically integrated electric utility serving the province of Nova Scotia, Canada. Headquartered in Halifax, it is…
Endpoint Security Controls: Designing a Secure Endpoint Architecture, Part 1
As organizations embrace digital transformation and hybrid work, the endpoint becomes both a critical productivity enabler and a significant security liability. Laptops, desktops, smartphones, and even IoT devices form the frontline in the battle for data integrity and organizational resilience.…
Detection and Mitigation of Lateral Movement in Cloud Networks
How Hackers Bypass Lateral Movement Detection (And How to Stop Them) Detecting lateral movement has emerged as a crucial cybersecurity challenge today. Attackers who breach network perimeters follow a five-step process. They start with reconnaissance, move to their original compromise,…
Breachforums Boss to Pay $700k in Healthcare Breach
In what experts are calling a novel legal outcome, the 22-year-old former administrator of the cybercrime community Breachforums will forfeit nearly $700,000 to settle a civil lawsuit from a health insurance company whose customer data was posted for sale on…
In Memoriam: John L. Young, Cryptome Co-Founder
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> John L. Young, who died March 28 at age 89 in New York City, was among the first people to see the need for an online library…
Coinbase disclosed a data breach after an extortion attempt
Coinbase confirmed rogue contractors stole customer data and demanded a $20M ransom in a breach reported to the SEC. Coinbase said rogue contractors stole data on under 1% of users and demanded $20M; the data breach was disclosed in an…
Hackers Abuse Google Services to Send Malicious Law Enforcement Requests
A sophisticated phishing campaign has emerged targeting Google users with fraudulent law enforcement data requests, exploiting legitimate Google services to bypass security systems and create highly convincing scams. The attack utilizes official Google infrastructure, including the company’s OAuth system and…
New .NET Multi-stage Loader Attacking Windows Systems to Deploy Malicious Payloads
A sophisticated .NET multi-stage malware loader has been actively targeting Windows systems since early 2022, serving as a distribution channel for dangerous payloads including information stealers and remote access trojans. This loader employs a complex three-stage deployment mechanism that helps…
Coinbase Hacked – Massive Data Breach Costs Them $400 Million
Coinbase Global, Inc., one of the world’s largest crypto exchanges, disclosed a major cybersecurity incident in a Form 8-K filing with the U.S. Securities and Exchange Commission (SEC) on May 14, 2025. The breach, orchestrated by an unknown threat actor,…
Xoxo to Prague
In this week’s newsletter, Thor inspects the LockBit leak, finding $10,000 “security tips,” ransom negotiations gone wrong and a rare glimpse into the human side of cybercrime. This article has been indexed from Cisco Talos Blog Read the original article:…
Coinbase Customer Info Stolen by Bribed Overseas Agents
Coinbase insider breach: Bribed overseas agents stole user data; company rejects ransom, offers $20M reward, boosts security, and… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Coinbase Customer…
Coinbase Data Breach – Customers Personal Info, Government‑ID & Transaction Data Exposed
Coinbase, the largest cryptocurrency exchange in the United States, has disclosed a significant cybersecurity incident that could cost the company up to $400 million. The breach, revealed in a regulatory filing and confirmed by company officials, stemmed from a sophisticated…
The Kids Online Safety Act Will Make the Internet Worse for Everyone
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> The Kids Online Safety Act (KOSA) is back in the Senate. Sponsors are claiming—again—that the latest version won’t censor online content. It isn’t true. This bill still…
Closing the Loop: Continuous API Security Testing – FireTail Blog
May 15, 2025 – Lina Romero – APIs power the modern internet as we know it. AI is grabbing the headlines, but less time is spent reporting on the APIs that connect these AI models behind the scenes to users,…
Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan
Trend™ Research discusses the evolving tradecraft of threat actor Earth Ammit, proven by the advanced toolset used in its TIDRONE and VENOM campaigns that targeted the drone supply chain. This article has been indexed from Trend Micro Research, News and…
CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited
Cybersecurity professionals and network defenders, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five newly identified Windows 0-day vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. These vulnerabilities, currently exploited in the wild, present significant risks for organizations…
Inside Turla’s Uroboros Infrastructure and Tactics Revealed
In a nation-state cyber espionage, a recent static analysis of the Uroboros rootkit, attributed to the infamous APT group Turla, uncovers a chilling display of sophistication and mastery over Windows kernel internals. With the sample identified by the MD5 hash…
Coinbase Data Breach – Customers Personal Info, Government‑ID & Account Data Exposed
Coinbase, the largest cryptocurrency exchange in the United States, has disclosed a significant cybersecurity incident that could cost the company up to $400 million. The breach, revealed in a regulatory filing and confirmed by company officials, stemmed from a sophisticated…
Sit, Fetch, Steal – Chihuahua Stealer: A new Breed of Infostealer
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Sit, Fetch, Steal – Chihuahua Stealer: A…
EFF to California Lawmakers: There’s a Better Way to Help Young People Online
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> We’ve covered a lot of federal and state proposals that badly miss the mark when attempting to grapple with protecting young people’s safety online. These include bills…
Cyber fiends battering UK retailers now turn to US stores
DragonForce-riding ransomware ring also has ‘shiny object syndrome’ so will likely move on to another sector soon The same miscreants behind recent cyberattacks on British retailers are now trying to dig their claws into major American retailers’ IT environments –…
Windows CLFS Zero-Day Flaw Exploited in Play Ransomware Attacks
In zero-day attacks, the Play ransomware gang exploited a critical Windows Common Log File System flaw to gain SYSTEM access and install malware on infected PCs. The vulnerability, known as CVE-2025-29824, was identified by Microsoft as being exploited in…
Meta Mirage” Phishing Campaign Poses Global Cybersecurity Threat to Businesses
A sophisticated phishing campaign named Meta Mirage is targeting companies using Meta’s Business Suite, according to a new report by cybersecurity experts at CTM360. This global threat is specifically engineered to compromise high-value accounts—including those running paid ads and…
Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if it proceeds with its plans to train users’ data for training its artificial intelligence (AI)…
Trend Micro Puts a Spotlight on AI at Pwn2Own Berlin
Get a sneak peak into how Trend Micro’s Pwn2Own Berlin 2025 is breaking new ground, focusing on AI infrastructure and finding the bugs to proactively safeguard the future of computing. This article has been indexed from Trend Micro Research, News…
Siemens VersiCharge AC Series EV Chargers
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services…
Siemens Mendix OIDC SSO
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services…
Siemens SIRIUS 3SK2 Safety Relays and 3RK3 Modular Safety Systems
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services…
Siemens SCALANCE LPE9403
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services…
Siemens SIMATIC PCS neo
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services…
Coinbase extorted for $20M. Support staff bribed. Customers scammed. One hell of a breach disclosure…
One expert tells us: ‘It is the most unique breach disclosure I’ve ever seen’ Coinbase says some of its overseas support staff were paid off to steal information on behalf of cybercriminals, and the company is now being extorted for…
How the Microsoft Secure Future Initiative brings Zero Trust to life
Read how you can improve your security posture by applying Zero Trust framework and principles based on learnings from the April 2025 Secure Future Initiative progress report. The post How the Microsoft Secure Future Initiative brings Zero Trust to life…
Google Algorithm Slashes Reddit Traffic: What It Means for UGC Platforms
Reddit Struggles After Google’s New Focus on Expertise This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Google Algorithm Slashes Reddit Traffic: What It Means for UGC Platforms
CISA Alerts on Active Exploitation of Zero-Day Vulnerability in Multiple Fortinet Products
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding five zero-day vulnerabilities affecting multiple Fortinet products, after evidence emerged of active exploitation in the wild. The vulnerabilities, tracked as CVE-2025-32756, impact Fortinet’s FortiVoice, FortiMail, FortiNDR,…
Record-Breaking $27 Billion Black Market ‘Haowang Guarantee’ Deals Conducted Behind Closed Doors
Major victory against online crime, two of the world’s largest illicit marketplaces-Huione Guarantee (also known as “Haowang Guarantee”) and Xinbi Guarantee-were forced offline on May 13, 2025. These platforms collectively enabled over $35 billion in transactions, mostly in the stablecoin…
Threat Actors Exploit Open Source Packages to Deploy Malware in Supply Chain Attacks
The Socket Threat Research Team has uncovered a surge in supply chain attacks where threat actors weaponize open source software libraries to deliver malicious payloads such as infostealers, remote shells, and cryptocurrency drainers. With modern development heavily reliant on ecosystems…
Hackers Exploit Google Services to Send Malicious Law Enforcement Requests
Cybersecurity researchers have uncovered a sophisticated phishing campaign where malicious actors exploit Google services to dispatch fraudulent law enforcement requests. This audacious scheme leverages the trust associated with Google’s infrastructure, specifically Google Forms and Google Drive, to craft and distribute…
Intruder vs. Acunetix vs. Attaxion: Comparing Vulnerability Management Solutions
The vulnerability management market is projected to reach US$24.08 billion by 2030, with numerous vendors offering seemingly different solutions to the same problem. How does an organization choose the right vulnerability management tool for its needs? Today, we compare three…
CVE-2024-2928: MLflow Local File Inclusion via URI Fragment Manipulation
Read about an LFI vulnerability disclosed in MLflow which allowed unauthenticated remote attackers to read arbitrary files by exploiting URI fragments containing directory traversal sequences. The post CVE-2024-2928: MLflow Local File Inclusion via URI Fragment Manipulation appeared first on OffSec.…
CISA Warns of Five Actively Exploited Windows 0-Day Vulnerabilities
CISA has issued an urgent alert after adding five new Microsoft Windows zero-day vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabilities, which affect core Windows components, have been flagged as…
Proofpoint to acquire Hornetsecurity
Proofpoint has entered into a definitive agreement to acquire Hornetsecurity, a pan-European provider of AI-powered Microsoft 365 (M365) security, data protection, compliance, and security awareness services. Terms of the deal are confidential. The acquisition significantly enhances Proofpoint’s ability to provide…
Insider Threat fetches $400m loss to Coinbase
Coinbase, one of the leading cryptocurrency exchanges in the United States, has been the target of a significant cyber attack, potentially leading to losses ranging from $180 million to $400 million in the current financial year. This forecast comes from…
Socket buys Coana to tell you which security alerts you can ignore
Sometimes, less information is more In its latest gambit to reduce the noise of unnecessary security alerts, Socket has acquired Coana, a startup founded in 2022 by researchers from Aarhus University in Denmark that tells users which vulnerabilities they can…
Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)
Arachnid alarm: Three major British retailers recently attacked, resulting in huge damage. Now we see the self-same scum spotlighting stores in the States. The post Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware) appeared first on Security…
Coinbase Offers $20m Bounty to Take Down Cybercrime Ring Behind Hack
Coinbase is offering a $20m reward to help catch the threat actor behind a cyber-attack that could cost it between $180-$400m This article has been indexed from www.infosecurity-magazine.com Read the original article: Coinbase Offers $20m Bounty to Take Down Cybercrime…
Fileless Remcos RAT Attack Evades Antivirus Using PowerShell Scripts
A new wave of attacks uses PowerShell and LNK files to secretly install Remcos RAT, enabling full remote… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Fileless Remcos…
Hackers Steal Customers Banking Details in Nova Scotia Cyber Attack
Nova Scotia Power has confirmed that hackers infiltrated its IT infrastructure and exfiltrated sensitive customer data, including banking details from pre-authorized payment systems, in a cyberattack first detected on March 19, 2025. The energy provider revealed on May 14 that…
Patch Tuesday: Microsoft Patches 78 Vulnerabilities, 5 Zero-Day Flaws
Microsoft patched vulnerabilities for the Common Log File System driver, Microsoft Edge, SharePoint, and more. This article has been indexed from Security | TechRepublic Read the original article: Patch Tuesday: Microsoft Patches 78 Vulnerabilities, 5 Zero-Day Flaws
Microsoft Outlook Down – Millions of Users Affected With This Longest Outage in Microsoft History
A widespread outage affecting Microsoft 365 services has left users across the globe unable to access key platforms, including Outlook, Hotmail, and the main Microsoft 365 website, since Wednesday evening. The disruption, which began at 10:30 PM UTC on May…
Chihuahua Stealer Leverages Google Drive Document to Steal Browser Login Credentials
A newly discovered .NET-based infostealer dubbed “Chihuahua Stealer” has emerged as a significant threat, exploiting Google Drive documents to deliver malicious PowerShell scripts and steal sensitive data. First identified by G DATA analysts in April 2025, the malware targets browser…
New DarkCloud Stealer Uses AutoIt to Evade Detection & Steal Login Credentials
A new variant of the DarkCloud information-stealing malware has emerged, leveraging the AutoIt scripting language to bypass security tools and harvest sensitive credentials from infected systems. Dubbed DarkCloud Stealer v4, the malware has targeted financial institutions, healthcare organizations, and e-commerce…
TransferLoader Malware Allows Attackers to Execute Arbitrary Commands on Compromised System
A newly identified malware loader dubbed TransferLoader has emerged as a critical threat, enabling attackers to execute arbitrary commands on compromised systems and deliver payloads such as the Morpheus ransomware. First detected in February 2025 by Zscaler ThreatLabz researchers, this…
Xerox Issues April 2025 Security Patch Update for FreeFlow Print Server v2
Xerox has announced the release of its April 2025 Security Patch Update for the FreeFlow® Print Server v2 running on Windows® 10, reinforcing the company’s commitment to robust cybersecurity for its production print platforms. The update, officially released on May…
Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data
Coinbase said a group of rogue contractors were bribed to pull customer data from internal systems, leading to a $20 million ransom demand. The post Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data appeared first on…
BSidesLV24 – GroundFloor – The Road To Developers’ Hearts
Author/Presenter: Sing Ambikapathi Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24…
New .NET Multi-Stage Loader Targets Windows Systems to Deploy Malicious Payloads
A recently discovered .NET-based multi-stage loader has caught the attention of cybersecurity researchers due to its complex architecture and ability to deploy a range of malicious payloads on Windows systems. Tracked since early 2022 by Threatray, this loader employs a…
Barclays Introduces New Step-by-Step Model to Tackle Modern Fraud
Banks and shops are facing more advanced types of fraud that mix online tricks with real-world scams. To fight back, experts from Barclays and a security company called Threat Fabric have created a detailed model to understand how these…
One Click Is All It Takes: New Mac Malware Steals Your Data
A growing number of Mac users are being tricked into downloading harmful software through fake verification messages. These scams look like normal human checks, such as Google’s “I’m not a robot” box, but are actually part of a malware…
Audio and Video Chat Recording Could Be Part of Nintendo Switch 2
Audio and Video Chat Recording Could Be Part of Nintendo Switch 2. In an official announcement from Nintendo, a new in-game communication system known as GameChat will be included in the Nintendo Switch 2 console, which is due…
iHeartMedia Cyberattack Exposes Sensitive Data Across Multiple Radio Stations
iHeartMedia, the largest audio media company in the United States, has confirmed a significant data breach following a cyberattack on several of its local radio stations. In official breach notifications sent to affected individuals and state attorney general offices…
Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data for a small subset of its customers. “Criminals targeted our customer support agents overseas,” the company said in a statement. “They used cash…
PowerShell-Based Loader Deploys Remcos RAT in New Fileless Attack
A stealthy fileless PowerShell attack using Remcos RAT bypassed antivirus by operating in memory This article has been indexed from www.infosecurity-magazine.com Read the original article: PowerShell-Based Loader Deploys Remcos RAT in New Fileless Attack
Wordfence Intelligence Weekly WordPress Vulnerability Report (May 5, 2025 to May 11, 2025)
📢 In case you missed it, Wordfence just published its annual WordPress security report for 2024. Read it now to learn more about the evolving risk landscape of WordPress so you can keep your sites protected in 2025 and beyond. …
Customer Data Compromised in Dior Cyber Attack
Luxury fashion house Dior experienced a significant security incident when unauthorized external actors breached their customer database. According to the official notification, Dior immediately implemented containment protocols and engaged cybersecurity experts to investigate the intrusion. The breach exposed various categories…
Nucor Steel Manufacturer Halts Production After Cyberattack
Nucor Corporation, one of North America’s largest steel producers, has temporarily halted production at multiple facilities following a cybersecurity breach that compromised critical operational systems. The incident, disclosed in a May 15, 2025, SEC filing, marks one of the most…
Coinbase suffers data breach, gets extorted (but won’t pay)
Cryptocurrency exchange platform Coinbase has suffered a breach, which resulted in attackers acquiring customers’ data that can help them mount social engineering attacks, the company confirmed today by filing a report with the US Securities and Exchange Commission (SEC). The…
SAP NetWeaver Flaw Exploited by Ransomware Groups and Chinese-Backed Hackers
The critical vulnerability is being exploited by BianLian, RansomwEXX and a Chinese nation-state actor known as Chaya_004 This article has been indexed from www.infosecurity-magazine.com Read the original article: SAP NetWeaver Flaw Exploited by Ransomware Groups and Chinese-Backed Hackers
Node.js Vulnerability Enables Attackers to Crash Processes and Disrupt Services
Node.js project has released a critical security update addressing several vulnerabilities that could allow attackers to crash server processes and disrupt critical services. The security fixes, announced on May 14, 2025 by Node.js maintainer RafaelGSS, affect multiple release lines (LTS…
Xanthorox Emerging BlackHat AI Tool Empowering Hackers in Phishing and Malware Campaigns
Artificial intelligence platform named Xanthorox has emerged as a potent new tool for cybercriminals, enabling the automated generation of phishing campaigns, malware, and hyperrealistic deepfakes. Unlike traditional dark-web tools restricted to hidden forums, Xanthorox’s developer openly advertises its capabilities on…
Enisa Launched New European Vulnerability Database to Strengthen Cybersecurity
European Union Agency for Cybersecurity (ENISA) has officially launched the European Vulnerability Database (EUVD), a groundbreaking platform designed to enhance digital security across the EU. Developed in accordance with the NIS2 Directive, the database is now operational and accessible to…
Hackers Disguised Remote Access Malware as Microsoft Edge service
A sophisticated backdoor campaign in which attackers cleverly disguised remote access malware as a legitimate Microsoft Edge service. The malicious Mesh agent, masquerading under the path C:\Program Files\Microsoft\MicrosoftEdge\msedge.exe, was found running on multiple computers and servers across the affected network.…
Threat Actors Using Weaponized HTML Files to Deliver Horabot Malware
A new wave of sophisticated phishing campaigns targeting Spanish-speaking users in Latin America has emerged, leveraging weaponized HTML files to deploy the Horabot malware. First identified in April 2025 by Fortinet’s FortiGuard Labs, Horabot combines credential theft, email automation, and…
Interlock Ransomware Attacking Defense Contractors and Their Supply Chains
A dangerous ransomware operation dubbed Interlock has escalated its focus on defense contractors and their supply chains, jeopardizing sensitive military logistics, intellectual property, and national security. First observed in September 2024, the group employs “big-game hunting” tactics-targeting high-value organizations-and double…
Snowflake CISO on the power of ‘shared destiny’ and ‘yes and’
Lessons learned from last year’s security snafu interview Being the chief information security officer at Snowflake is never an easy job, but last spring it was especially challenging.… This article has been indexed from The Register – Security Read the…
GitLab 18 increases developer productivity by integrating AI throughout the platform
GitLab launched GitLab 18, including AI capabilities natively integrated into the platform and major new innovations across core DevOps, and security and compliance workflows that are available now, with further enhancements planned throughout the year. Additionally, GitLab Premium customers can…
Dior Confirms Data Breach Affecting Customer Information
Dior confirmed a data breach compromising customer personal information, discovered on May 7 This article has been indexed from www.infosecurity-magazine.com Read the original article: Dior Confirms Data Breach Affecting Customer Information
Locked Out and Held for Ransom: A City’s Battle Against Cybercrime
Read how having a plan and doing some preparation in advance can lessen the severity of a ransomware attack ? or prevent one altogether. This article has been indexed from Blog Read the original article: Locked Out and Held for…
FrigidStealer Malware Hits macOS Users via Fake Safari Browser Updates
FrigidStealer malware targets macOS users via fake browser updates, stealing passwords, crypto wallets, and notes using DNS-based data… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: FrigidStealer Malware…
Windows Defender Application Control Bypassed Through Browser Exploit Techniques
Security researchers from the X-Force Red Adversary Simulation team have uncovered a novel method to bypass Windows Defender Application Control (WDAC), a robust Windows security feature designed to prevent unauthorized code execution through strict application whitelisting policies. Often deployed in…
Weaponized Google Calendar Invites Deliver Malicious Payload Using a Single Character
Security researchers have unearthed a sophisticated malware distribution method leveraging Google Calendar invites to deliver malicious payloads through seemingly innocuous links. The attack, centered around a deceptive npm package named os-info-checker-es6, showcases an unprecedented level of obfuscation that begins with…
Russian Hackers Exploit XSS Vulnerabilities to Inject Malicious Code into Email Servers
A sophisticated cyberespionage campaign, dubbed Operation RoundPress, has been uncovered by cybersecurity researchers at ESET. Attributed with medium confidence to the Russian-linked Sednit group-also known as APT28, Fancy Bear, and Forest Blizzard-this operation targets high-value webmail servers using cross-site scripting…
Phishing Campaign Mimics Email Quarantine Notifications: 32,000 Emails Target 6,358 Customers
In a recent discovery, Check Point researchers have identified a large-scale phishing campaign that exploits the guise of email quarantine notifications. This campaign, consisting of 32,000 emails, has targeted 6,358 customers across various regions. The primary objective of the attackers…
Threat landscape for industrial automation systems in Q1 2025
Kaspersky ICS CERT shares trends and statistics on industrial threats in Q1 2025. This article has been indexed from Securelist Read the original article: Threat landscape for industrial automation systems in Q1 2025