Cisco Talos discovers PathWiper, a destructive new malware targeting critical infrastructure in Ukraine, highlighting ongoing cyber threats amidst the Russia-Ukraine conflict. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original…
Category: EN
New DuplexSpy RAT Gives Attackers Full Control Over Windows Machines
A new Remote Access Trojan (RAT) named DuplexSpy has surfaced, posing a significant threat to Windows-based systems worldwide. Developed in C# by GitHub user ISSAC/iss4cf0ng and released publicly on April 15, 2025, with a stated intent of “educational purposes,” this…
New Way to Track Covertly Android Users
Researchers have discovered a new way to covertly track Android users. Both Meta and Yandex were using it, but have suddenly stopped now that they have been caught. The details are interesting, and worth reading in detail: >Tracking code that…
Arkana Ransomware Group Allegedly Claims Breach of Ticketmaster Databases
Arkana Security Group claims to have successfully gained access to Ticketmaster’s database infrastructure and exfiltrated massive volumes of sensitive customer data. The threat actors have reportedly announced their intentions to sell comprehensive datasets containing ticket sales records, payment methodologies, customer…
Critical SOQL Injection 0-Day Vulnerability in Salesforce Affects Millions Worldwide
A critical zero-day vulnerability discovered in Salesforce‘s default controller has exposed millions of user records across thousands of deployments worldwide. The security flaw, found in the built-in aura://CsvDataImportResourceFamilyController/ACTION$getCsvAutoMap controller, allowed attackers to extract sensitive user information and document details through…
Blocking stolen phones from the cloud can be done, should be done, won’t be done
Big tech can’t be bothered to fight crime. It can barely be bothered even to say so Opinion A lot of our tech world is nightmarish, but sometimes this is literally true.… This article has been indexed from The Register…
US Seeks Forfeiture of $7.74M in Cryptocurrency Tied to North Korean IT Workers
The US is seeking the forfeiture of $7.74 million in cryptocurrency in frozen wallets tied to North Korean fake IT workers schemes. The post US Seeks Forfeiture of $7.74M in Cryptocurrency Tied to North Korean IT Workers appeared first on…
Trump Administration Revises Cybersecurity Rules, Replaces Biden and Obama Orders
A new Trump Executive Order limits the use of cybersecurity-related sanctions only against foreign malicious actors This article has been indexed from www.infosecurity-magazine.com Read the original article: Trump Administration Revises Cybersecurity Rules, Replaces Biden and Obama Orders
Roles Here? Roles There? Roles Anywhere: Exploring the Security of AWS IAM Roles Anywhere
This examination of the Amazon Web Services (AWS) Roles Anywhere service looks at potential risks, analyzed from both defender and attacker perspectives. The post Roles Here? Roles There? Roles Anywhere: Exploring the Security of AWS IAM Roles Anywhere appeared first…
Apple AI Launch In China ‘Delayed Over US Tensions’
Apple deal to launch iPhone AI services in China with Alibaba technology faces delays as regulators hold up US deals, says report This article has been indexed from Silicon UK Read the original article: Apple AI Launch In China ‘Delayed…
Tesla’s Head Of Optimus Exits Company
Milan Kovac, head of engineering for Optimus humanoid robot, reportedly departs, creating uncertainty around hyped AI-powered programme This article has been indexed from Silicon UK Read the original article: Tesla’s Head Of Optimus Exits Company
Jenkins Gatling Plugin Flaw Allows CSP Bypass, Exposing Systems to Attack
On June 6, 2025, the Jenkins Project issued a security advisory (SECURITY-3588 / CVE-2025-5806) affecting the Gatling Plugin, a widely used tool for displaying performance test reports within the Jenkins automation server. The vulnerability carries a high severity rating, with…
Chinese spy crew appears to be preparing for conflict by backdooring 75+ critical orgs
SentinelOne discovered the campaign when they tried to hit the security vendor’s own servers An IT services company, a European media group, and a South Asian government entity are among the more than 75 companies where China-linked groups have planted…
Sleep with one eye open: how Librarian Ghouls steal data by night
According to Kaspersky, Librarian Ghouls APT continues its series of attacks on Russian entities. A detailed analysis of a malicious campaign utilizing RAR archives and BAT scripts. This article has been indexed from Securelist Read the original article: Sleep with…
Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison
Kingsley Uchelue Utulu has been sentenced to more than 5 years in prison for his role in a scheme that involved hacking, fraud and identity theft. The post Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison appeared…
Tesla Robotaxi Launch In Austin Expected This Month
Tesla expected to launch Robotaxi autonomous vehicle rides in Austin, Texas this month with small ‘pilot’ fleet and human teleoperators This article has been indexed from Silicon UK Read the original article: Tesla Robotaxi Launch In Austin Expected This Month
US-UAE AI Data Centre Deal ‘Far From Finalised’
Deal announced last month to built 10-square-mile AI data centre in UAE with Nvidia chips reportedly far from finalised over security concerns This article has been indexed from Silicon UK Read the original article: US-UAE AI Data Centre Deal ‘Far…
Beware for Developers: 16 React Native Packages with Millions of Downloads Compromised Overnight
Cybersecurity researchers have uncovered a large-scale attack targeting the npm ecosystem, compromising 16 popular React Native packages with a combined download count exceeding one million per week. The attack, detected on June 6th, 2025, represents a significant escalation in the…
Expanding on ADHICS v2.0: A Closer Look at Healthcare Cybersecurity in the UAE
As digital transformation sweeps across the healthcare sector, there has never been more at stake. Healthcare data is worth a lot on the black market. Unlike financial data, which has a short shelf life (accounts can be frozen, and fraud…
US Tries to Claw Back $7m Taken by North Korean IT Workers
The Justice Department has filed a civil forfeiture complaint alleging North Korean IT workers amassed $7m+ This article has been indexed from www.infosecurity-magazine.com Read the original article: US Tries to Claw Back $7m Taken by North Korean IT Workers