A former U.S. Army Sergeant with access to classified military intelligence systems has admitted to federal charges related to attempting to provide sensitive national defense information to Chinese authorities. Joseph Daniel Schmidt, 31, whose last assignment was at Joint Base…
Category: EN
RapperBot Attacking DVRs to Gain Access Over Surveillance Cameras to Record Video
A sophisticated botnet campaign targeting digital video recorders (DVRs) has emerged as a significant threat to surveillance infrastructure worldwide, with cybercriminals exploiting vulnerable IoT devices to build massive botnets capable of large-scale distributed denial-of-service attacks. RapperBot, a variant of the…
New AI Jailbreak Bypasses Guardrails With Ease
New “Echo Chamber” attack bypasses advanced LLM safeguards by subtly manipulating conversational context, proving highly effective across leading AI models. The post New AI Jailbreak Bypasses Guardrails With Ease appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
CoinMarketCap, Cointelegraph compromised to serve pop-ups to drain crypto wallets
The CoinMarketCap and CoinTelegraph websites have been compromised over the weekend to serve clever phishing pop-ups to visitors, asking them to verify/connect their crypto wallets. The CoinMarketCap compromise CoinMarketCap (aka CMC) is a website popular with crypto investors as it…
Okta Cross App Access secures AI agents in the enterprise
Okta announced Cross App Access, a new protocol to help secure AI agents. As an extension of OAuth, it brings visibility and control to both agent-driven and app-to-app interactions, allowing IT teams to decide what apps are connecting and what…
XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks
Cybersecurity researchers have uncovered a Go-based malware called XDigo that has been used in attacks targeting Eastern European governmental entities in March 2025. The attack chains are said to have leveraged a collection of Windows shortcut (LNK) files as part…
Fake DMV Texts Scam Hit Thousands in Widespread Phishing Campaign
A series of fraudulent text messages impersonating state Departments of Motor Vehicles (DMVs) has spread throughout the United… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Fake DMV…
Critical Teleport Vulnerability Allows Remote Authentication Bypass
A critical security vulnerability, tracked as CVE-2025-49825, has been discovered in Teleport, a widely used open-source platform for secure access to servers, cloud applications, and infrastructure. This flaw enables remote attackers to bypass authentication controls, potentially granting unauthorized access to…
Confucius Hackers Target Government and Military Entities Using WooperStealer Malware
The notorious Confucius hacking organization, first exposed by foreign security vendors in 2016, continues to pose a significant threat to government and military entities across South and East Asia. With attack activities dating back to 2013, this group has recently…
This Linux distro routes all your traffic through the Tor network – and it’s my new favorite for privacy
I could easily see myself defaulting to Securonis when I need serious security. This article has been indexed from Latest stories for ZDNET in Security Read the original article: This Linux distro routes all your traffic through the Tor network…
Fortinet Partners with FIRST on New Initiative to Build Global Cyber Capacity
Fortinet is the inaugural partner for FIRST’s new Community, Operational capacity, Resilience, and Empowerment initiative to empower cybersecurity and incident response teams worldwide through capacity building and community development. Learn more about CORE. This article has been indexed from…
How to Use Open-Source AI in Defense Tech: Cybersecurity Safeguards for Developers
There are multiple initiatives in the USA and European Union to regulate the Open-source AI use – from an ethics perspective to data safety. However, very little attention is being… The post How to Use Open-Source AI in Defense Tech:…
Okta Introduces Cross App Access to Secure AI Agents in Enterprise
Okta Inc. on Monday said it has created a new protocol to secure artificial intelligence (AI) agents to bring visibility, control and governance to agent-driven and app-to-app interactions. The Cross App Access platform is especially important as more AI tools…
Fake DMV Texts Scam Thousands in Widespread Phishing Campaign
A series of fraudulent text messages impersonating state Departments of Motor Vehicles (DMVs) has spread throughout the United… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Fake DMV…
BlueNoroff Hackers Exploit Zoom App to Deploy Infostealer Malware in Targeted Attacks
The Field Effect Analysis team has uncovered a targeted social engineering campaign orchestrated by the North Korean state-sponsored threat actor BlueNoroff, a financially motivated subgroup of the notorious Lazarus Group. A Canadian online gambling provider fell victim to a meticulously…
Shadow Vector Malware Weaponizes SVG Images to Deploy AsyncRAT and RemcosRAT
A sophisticated malware campaign dubbed Shadow Vector is actively targeting users in Colombia through malicious Scalable Vector Graphics (SVG) files that act as decoys for deploying dangerous remote access tools. The campaign distributes spear-phishing emails impersonating trusted Colombian institutions, particularly…
North Korean Hackers Weaponizes Github Infrastructure Used to Deliver Malware
A sophisticated cyber espionage campaign has emerged, demonstrating how North Korean threat actors are increasingly leveraging legitimate cloud platforms to distribute malware and establish persistent command and control infrastructure. Security researchers have uncovered a complex spearphishing operation that exploits GitHub’s…
DDoS Attack Crippling Financial Sectors, Leds to Multi-Day Outages
Recent DDoS attacks have evolved from mere nuisances to strategic threats capable of paralyzing financial institutions for extended periods. The financial services sector has emerged as the primary target of these sophisticated attacks, which are designed to overwhelm digital infrastructure…
Microsoft Family Safety Blocking All the Version of Chrome Browsers
Microsoft Family Safety’s recent update has triggered an unexpected system-wide blocking of Google Chrome browsers across all versions, creating significant operational challenges for educational institutions and families utilizing Windows devices with parental controls enabled. The issue, which emerged on June…
Microsoft Limits Windows 11 24H2 Restore Points From 90 to 60 Days
Microsoft has implemented a significant change to its Windows 11 system recovery functionality, reducing the retention period for system restore points from 90 days to 60 days in the latest security update. This modification affects Windows 11 version 24H2 users…