Microsoft has shed light on a previously undocumented cluster of threat activity originating from a Russia-affiliated threat actor dubbed Void Blizzard (aka Laundry Bear) that it said is attributed to “worldwide cloud abuse.” Active since at least April 2024, the…
Category: EN
Text-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websites
Written by: Diana Ion, Rommel Joven, Yash Gupta < div class=”block-paragraph_advanced”>Since November 2024, Mandiant Threat Defense has been investigating an UNC6032 campaign that weaponizes the interest around AI tools, in particular those tools which can be used to generate videos…
Mozilla Quickly Fixes Firefox Vulnerabilities from Pwn2Own 2025 with Urgent Patches
At this year’s Pwn2Own Berlin, security researchers successfully demonstrated two new zero-day exploits against Mozilla Firefox, targeting the browser’s content process. The vulnerabilities—CVE-2025-4918 and CVE-2025-4919—were both found in Firefox’s JavaScript engine and allowed out-of-bounds memory access, raising the risk of…
#Infosec2025: Rory Stewart and Paul Chichester to Headline at Infosecurity Europe 2025
Former UK government minister Rory Stewart and NCSC Director of Operations Paul Chichester will explore the growing link between geopolitics and cybersecurity This article has been indexed from www.infosecurity-magazine.com Read the original article: #Infosec2025: Rory Stewart and Paul Chichester to…
Adidas Customer Information Compromised Through Third-Party Vendor
German sportswear giant Adidas has confirmed a data breach after cybercriminals accessed customer data through a third-party customer service provider. The breach, disclosed on May 23, 2025, did not involve sensitive information such as passwords or payment details but did…
Chinese-Owned VPNs
One one my biggest worries about VPNs is the amount of trust users need to place in them, and how opaque most of them are about who owns them and what sorts of data they retain. A new study found…
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
Microsoft Threat Intelligence has discovered a cluster of worldwide cloud abuse activity conducted by a threat actor we track as Void Blizzard, who we assess with high confidence is Russia-affiliated and has been active since at least April 2024. Void…
Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers
Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud. The activity, first detected by ReliaQuest in May 2025 targeting an unnamed customer in…
US Government Launches Audit of NIST’s National Vulnerability Database
The audit of the NVD will be conducted by the US Department of Commerce’s Office of Inspector General This article has been indexed from www.infosecurity-magazine.com Read the original article: US Government Launches Audit of NIST’s National Vulnerability Database
OpenAI Plans Seoul Office Amidst Strong Demand
OpenAI to open next international office in Seoul, says South Korea has second highest level of paid ChatGPT subscribers after US This article has been indexed from Silicon UK Read the original article: OpenAI Plans Seoul Office Amidst Strong Demand
Capgemini, SAP Work With Mistral On AI For Regulated Industries
Mistral to work with Capgemini, SAP to tailor AI models for use in highly regulated industries such as finance, defence and energy This article has been indexed from Silicon UK Read the original article: Capgemini, SAP Work With Mistral On…
Alibaba ‘Instant’ Commerce Platform Crosses 40 Million Daily Orders
Alibaba’s Taobao Instant Commerce offering surpasses 40 million daily orders less than a month after launch, as e-commerce battle turns ugly This article has been indexed from Silicon UK Read the original article: Alibaba ‘Instant’ Commerce Platform Crosses 40 Million…
Foxconn ‘Interested’ In Buying Singapore’s UTAC
Apple assembler Foxconn reportedly a potential bidder for Singapore-based chip assembler and tester UTAC as Chinese owner looks to sell This article has been indexed from Silicon UK Read the original article: Foxconn ‘Interested’ In Buying Singapore’s UTAC
Silver RAT Malware Employs New Anti-Virus Bypass Techniques to Execute Malicious Activities
A newly identified strain of malware, dubbed Silver RAT, has emerged as a significant threat to cybersecurity, leveraging sophisticated anti-virus bypass techniques to infiltrate and compromise Windows-based systems. This remote access trojan (RAT), believed to be crafted by a highly…
Multiple Vulnerabilities in Hardy Barth EV Station Allow Unauthenticated Network Access
Critical security flaws have been identified in the eCharge Hardy Barth cPH2 and cPP2 charging stations, specifically affecting firmware version 2.2.0. These vulnerabilities, discovered by Stefan Viehböck of SEC Consult Vulnerability Lab, expose electric vehicle (EV) charging infrastructure to severe…
The Privacy-Friendly Tech to Replace Your US-Based Email, Browser, and Search
Thanks to drastic policy changes in the US and Big Tech’s embrace of the second Trump administration, many people are moving their digital lives abroad. Here are a few options to get you started. This article has been indexed from…
GIMP Image Editor Vulnerability Let Remote Attackers Arbitrary Code
Two critical security vulnerabilities discovered in the popular GIMP image editing software have been disclosed. These vulnerabilities allow remote attackers to execute arbitrary code on affected systems. The vulnerabilities, identified as CVE-2025-2760 and CVE-2025-2761, were publicly disclosed on April 7th,…
What to look for in USA-based dedicated server solutions
If your business is scaling up and shared hosting isn’t cutting it anymore, there’s a… What to look for in USA-based dedicated server solutions on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article…
GIMP Image Editor Vulnerability Allows Remote Attackers to Execute Arbitrary Code
Two major security vulnerabilities have been found in the widely used GIMP image editing software, potentially allowing remote attackers to execute arbitrary code on affected systems, according to security researchers. The vulnerabilities, labeled CVE-2025-2760 and CVE-2025-2761, each have a high…
Researchers Uncover macOS ‘AppleProcessHub’ Stealer: TTPs and C2 Server Details Revealed
Researchers have identified a novel information-stealing malware dubbed ‘AppleProcessHub,’ designed to infiltrate Apple systems and exfiltrate sensitive user data. This discovery sheds light on an evolving threat landscape where macOS, often considered a secure platform, is increasingly becoming a target…