Category: EN

Polymorphic phishing attacks flood inboxes

AI is transforming the phishing threat landscape at a pace many security teams are struggling to match, according to Cofense. In 2024, researchers tracked one malicious email every 42 seconds. Many of the 42-second attacks were part of polymorphic phishing…

The U.S. Copyright Office’s Draft Report on AI Training Errs on Fair Use

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> Within the next decade, generative AI could join computers and electricity as one of the most transformational technologies in history, with all of the promise and peril that implies. Governments’ responses…

How working in a stressful environment affects cybersecurity

Stressful work environments don’t just erode morale, they can quietly undermine cybersecurity. When employees feel overworked, unsupported, or mistreated, their judgment and decision-making suffer. “From an organizational perspective, a toxic culture often leads to increased errors, missed threats, decreased productivity,…

O que é um ataque cibernético? Tipos e prevenção

A segurança digital se tornou uma prioridade inegociável. Com o avanço da tecnologia, surgem também novas ameaças digitais e uma das mais perigosas é o ataque cibernético. Empresas, governos e até mesmo usuários comuns estão constantemente na mira de criminosos…

New infosec products of the week: May 16, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Hunted Labs, McAfee, Obsidian Security, PentestPad, Resecurity, and SecuX. Resecurity One simplifies cybersecurity operations Resecurity One provides real-time cyber threat intelligence from multiple sources, enabling…

AI Governance Is Your Competitive Edge If You Treat It That Way

For years, we’ve watched technology initiatives stumble not because they failed to innovate, but because they failed to govern. Now, with artificial intelligence reshaping industries at breakneck speed, many organizations are falling into the same trap: rushing ahead with AI…

Is Your Cloud Truly Safe from Invisible Threats?

Why Do Cloud Security Gaps Exist? Can we confidently claim to have sealed all potential breaches? The truth is, despite significant investments in cybersecurity measures, gaps continue to exist. Many professionals overlook the importance of Non-Human Identities (NHIs) management. NHIs,…

How Protected Are Your Automated Systems?

Are Your Machine Identities Safe? Non-Human Identities (NHIs) and Secrets Security Management present a groundbreaking approach to data security. But what is the reality of your automated systems’ protection? We will explore this question, highlighting the importance of implementing a…

Fostering Innovation with Secure Access Management

How Does Secure Access Management Fuel Innovation? Have you ever pondered the correlation between innovation security and business success? With businesses heavily rely on technology to innovate and drive growth, secure access management has become a crucial element in their…

Building Confidence in Your Cybersecurity Strategy

Why is a Comprehensive Cybersecurity Strategy Essential? A robust cybersecurity strategy is no longer a luxury but a necessity. Whether it is financial services, healthcare, or travel, organizations are making significant shifts to the digital domain. It has become critical…

Commit Stomping

Manipulating Git Histories to Obscure the Truth This article has been indexed from ZephrSec – Adventures In Information Security Read the original article: Commit Stomping

Detection and Mitigation of Lateral Movement in Cloud Networks

How Hackers Bypass Lateral Movement Detection (And How to Stop Them) Detecting lateral movement has emerged as a crucial cybersecurity challenge today. Attackers who breach network perimeters follow a five-step process. They start with reconnaissance, move to their original compromise,…

Breachforums Boss to Pay $700k in Healthcare Breach

In what experts are calling a novel legal outcome, the 22-year-old former administrator of the cybercrime community Breachforums will forfeit nearly $700,000 to settle a civil lawsuit from a health insurance company whose customer data was posted for sale on…

In Memoriam: John L. Young, Cryptome Co-Founder

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> John L. Young, who died March 28 at age 89 in New York City, was among the first people to see the need for an online library…

Hackers Abuse Google Services to Send Malicious Law Enforcement Requests

A sophisticated phishing campaign has emerged targeting Google users with fraudulent law enforcement data requests, exploiting legitimate Google services to bypass security systems and create highly convincing scams. The attack utilizes official Google infrastructure, including the company’s OAuth system and…

Coinbase Hacked – Massive Data Breach Costs Them $400 Million

Coinbase Global, Inc., one of the world’s largest crypto exchanges, disclosed a major cybersecurity incident in a Form 8-K filing with the U.S. Securities and Exchange Commission (SEC) on May 14, 2025. The breach, orchestrated by an unknown threat actor,…

Xoxo to Prague

In this week’s newsletter, Thor inspects the LockBit leak, finding $10,000 “security tips,” ransom negotiations gone wrong and a rare glimpse into the human side of cybercrime. This article has been indexed from Cisco Talos Blog Read the original article:…

Coinbase Customer Info Stolen by Bribed Overseas Agents

Coinbase insider breach: Bribed overseas agents stole user data; company rejects ransom, offers $20M reward, boosts security, and… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Coinbase Customer…

The Kids Online Safety Act Will Make the Internet Worse for Everyone

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> The Kids Online Safety Act (KOSA) is back in the Senate. Sponsors are claiming—again—that the latest version won’t censor online content. It isn’t true. This bill still…

CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited

Cybersecurity professionals and network defenders, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five newly identified Windows 0-day vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. These vulnerabilities, currently exploited in the wild, present significant risks for organizations…

Inside Turla’s Uroboros Infrastructure and Tactics Revealed

In a nation-state cyber espionage, a recent static analysis of the Uroboros rootkit, attributed to the infamous APT group Turla, uncovers a chilling display of sophistication and mastery over Windows kernel internals. With the sample identified by the MD5 hash…

EFF to California Lawmakers: There’s a Better Way to Help Young People Online

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> We’ve covered a lot of federal and state proposals that badly miss the mark when attempting to grapple with protecting young people’s safety online. These include bills…

Cyber fiends battering UK retailers now turn to US stores

DragonForce-riding ransomware ring also has ‘shiny object syndrome’ so will likely move on to another sector soon The same miscreants behind recent cyberattacks on British retailers are now trying to dig their claws into major American retailers’ IT environments –…

Windows CLFS Zero-Day Flaw Exploited in Play Ransomware Attacks

  In zero-day attacks, the Play ransomware gang exploited a critical Windows Common Log File System flaw to gain SYSTEM access and install malware on infected PCs. The vulnerability, known as CVE-2025-29824, was identified by Microsoft as being exploited in…

Trend Micro Puts a Spotlight on AI at Pwn2Own Berlin

Get a sneak peak into how Trend Micro’s Pwn2Own Berlin 2025 is breaking new ground, focusing on AI infrastructure and finding the bugs to proactively safeguard the future of computing. This article has been indexed from Trend Micro Research, News…

Siemens VersiCharge AC Series EV Chargers

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services…

Siemens Mendix OIDC SSO

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services…

Siemens SIRIUS 3SK2 Safety Relays and 3RK3 Modular Safety Systems

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services…

Siemens SCALANCE LPE9403

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services…

Siemens SIMATIC PCS neo

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services…

Hackers Exploit Google Services to Send Malicious Law Enforcement Requests

Cybersecurity researchers have uncovered a sophisticated phishing campaign where malicious actors exploit Google services to dispatch fraudulent law enforcement requests. This audacious scheme leverages the trust associated with Google’s infrastructure, specifically Google Forms and Google Drive, to craft and distribute…

CVE-2024-2928: MLflow Local File Inclusion via URI Fragment Manipulation

Read about an LFI vulnerability disclosed in MLflow which allowed unauthenticated remote attackers to read arbitrary files by exploiting URI fragments containing directory traversal sequences. The post CVE-2024-2928: MLflow Local File Inclusion via URI Fragment Manipulation appeared first on OffSec.…

CISA Warns of Five Actively Exploited Windows 0-Day Vulnerabilities

CISA has issued an urgent alert after adding five new Microsoft Windows zero-day vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabilities, which affect core Windows components, have been flagged as…

Proofpoint to acquire Hornetsecurity

Proofpoint has entered into a definitive agreement to acquire Hornetsecurity, a pan-European provider of AI-powered Microsoft 365 (M365) security, data protection, compliance, and security awareness services. Terms of the deal are confidential. The acquisition significantly enhances Proofpoint’s ability to provide…

Insider Threat fetches $400m loss to Coinbase

Coinbase, one of the leading cryptocurrency exchanges in the United States, has been the target of a significant cyber attack, potentially leading to losses ranging from $180 million to $400 million in the current financial year. This forecast comes from…

Hackers Steal Customers Banking Details in Nova Scotia Cyber Attack

Nova Scotia Power has confirmed that hackers infiltrated its IT infrastructure and exfiltrated sensitive customer data, including banking details from pre-authorized payment systems, in a cyberattack first detected on March 19, 2025. The energy provider revealed on May 14 that…

New DarkCloud Stealer Uses AutoIt to Evade Detection & Steal Login Credentials

A new variant of the DarkCloud information-stealing malware has emerged, leveraging the AutoIt scripting language to bypass security tools and harvest sensitive credentials from infected systems. Dubbed DarkCloud Stealer v4, the malware has targeted financial institutions, healthcare organizations, and e-commerce…

BSidesLV24 – GroundFloor – The Road To Developers’ Hearts

Author/Presenter: Sing Ambikapathi Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24…

One Click Is All It Takes: New Mac Malware Steals Your Data

  A growing number of Mac users are being tricked into downloading harmful software through fake verification messages. These scams look like normal human checks, such as Google’s “I’m not a robot” box, but are actually part of a malware…

Customer Data Compromised in Dior Cyber Attack

Luxury fashion house Dior experienced a significant security incident when unauthorized external actors breached their customer database. According to the official notification, Dior immediately implemented containment protocols and engaged cybersecurity experts to investigate the intrusion. The breach exposed various categories…

Nucor Steel Manufacturer Halts Production After Cyberattack

Nucor Corporation, one of North America’s largest steel producers, has temporarily halted production at multiple facilities following a cybersecurity breach that compromised critical operational systems. The incident, disclosed in a May 15, 2025, SEC filing, marks one of the most…

Coinbase suffers data breach, gets extorted (but won’t pay)

Cryptocurrency exchange platform Coinbase has suffered a breach, which resulted in attackers acquiring customers’ data that can help them mount social engineering attacks, the company confirmed today by filing a report with the US Securities and Exchange Commission (SEC). The…

Hackers Disguised Remote Access Malware as Microsoft Edge service

A sophisticated backdoor campaign in which attackers cleverly disguised remote access malware as a legitimate Microsoft Edge service. The malicious Mesh agent, masquerading under the path C:\Program Files\Microsoft\MicrosoftEdge\msedge.exe, was found running on multiple computers and servers across the affected network.…

Threat Actors Using Weaponized HTML Files to Deliver Horabot Malware

A new wave of sophisticated phishing campaigns targeting Spanish-speaking users in Latin America has emerged, leveraging weaponized HTML files to deploy the Horabot malware. First identified in April 2025 by Fortinet’s FortiGuard Labs, Horabot combines credential theft, email automation, and…

Interlock Ransomware Attacking Defense Contractors and Their Supply Chains

A dangerous ransomware operation dubbed Interlock has escalated its focus on defense contractors and their supply chains, jeopardizing sensitive military logistics, intellectual property, and national security. First observed in September 2024, the group employs “big-game hunting” tactics-targeting high-value organizations-and double…

Dior Confirms Data Breach Affecting Customer Information

Dior confirmed a data breach compromising customer personal information, discovered on May 7 This article has been indexed from www.infosecurity-magazine.com Read the original article: Dior Confirms Data Breach Affecting Customer Information

FrigidStealer Malware Hits macOS Users via Fake Safari Browser Updates

FrigidStealer malware targets macOS users via fake browser updates, stealing passwords, crypto wallets, and notes using DNS-based data… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: FrigidStealer Malware…