A new Malware-as-a-Service (MaaS) threat named “Olymp Loader” appeared in June 2025, aggressively advertised on underground hacker forums like XSS and HackForums. Advertised by an operator known as “OLYMPO,” this malware is marketed as a sophisticated tool written entirely in…
Category: EN
Hackers Tricks macOS Users to Execute Command in Terminal to Deliver FlexibleFerret Malware
Cybercriminals are successfully targeting Apple users through a sophisticated social engineering scheme that tricks victims into running harmful commands on their computers. The threat, called FlexibleFerret, is attributed to North Korean operators and represents a continuing evolution of the Contagious…
Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web
A threat actor operating under the alias ResearcherX has posted what they claim to be a full‑chain zero‑day exploit targeting Apple’s recently released iOS 26 operating system. The listing, which appeared on a prominent dark web marketplace, alleges that the…
Belonging at Akamai: My Journey of Inclusion, Growth, and Connection
Discover how Akamai’s culture of belonging and inclusion empowers employees and drives innovation in tech. This article has been indexed from Blog Read the original article: Belonging at Akamai: My Journey of Inclusion, Growth, and Connection
Full Circle: How Akamai’s Evolution Set the Stage for the AI Inference Era
Read how Akamai, a pioneer in CDNs, is undergoing a profound strategic transformation into a diversified cloud and cybersecurity provider in the AI era. This article has been indexed from Blog Read the original article: Full Circle: How Akamai’s Evolution…
Hottest cybersecurity open-source tools of the month: November 2025
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Heisenberg: Open-source software supply chain health check tool Heisenberg is an open-source tool that checks the health of a software supply chain.…
Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack
A significant gap in Microsoft Teams’ B2B guest access allows attackers to bypass Defender for Office 365 protections, creating unprotected zones for phishing and malware delivery. At Cybersecurity News, we recently highlighted how Microsoft Teams’ New “Chat with Anyone” Feature…
The identity mess your customers feel before you do
Customer identity has become one of the most brittle parts of the enterprise security stack. Teams know authentication matters, but organizations keep using methods that frustrate users and increase risk. New research from Descope shows how companies manage customer identity…
Your critical infrastructure is running out of time
Cyber attackers often succeed not because they are inventive, but because the systems they target are old. A new report by Cisco shows how unsupported technology inside national infrastructure creates openings that attackers can exploit repeatedly. The findings show how…
Cybersecurity Update: Incorrect Company Naming, Major Breaches, and New Malware Campaigns
In this episode, the host addresses a previous mistake in naming a company involved in a breach, correcting SitusAMC for Ascensus, and extends apologies. Key topics include US banks assessing a breach fallout from financial tech vendor SitusAMC, ransomware group…
Criminal networks industrialize payment fraud operations
Fraud operations are expanding faster than payment defenses can adjust. Criminal groups function like coordinated businesses that develop tools, automate tasks, and scale attacks. New data from a Visa report shows how these shifts are reshaping risk across the financial…
Shai-Hulud v2 Spreads From npm to Maven, as Campaign Exposes Thousands of Secrets
The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the npm registry. The Socket Research Team said it identified a Maven Central package named org.mvnpm:posthog-node:4.18.1 that…
New Unauthenticated DoS Vulnerability Crashes Next.js Servers with a Single Request
A newly discovered critical vulnerability in the Next.js framework allows attackers to crash self-hosted servers using a single HTTP request, requiring negligible resources to execute. Discovered by researchers at Harmony Intelligence, the denial-of-service (DoS) flaw affects widespread versions of the…
North Korean Hackers Evade UN Sanctions Leveraging Cyber Capabilities, IT Workers and Crypto Activities
The Democratic People’s Republic of Korea (DPRK) has intensified its global cyber operations, systematically violating United Nations Security Council resolutions through large-scale cyberattacks, cryptocurrency theft, and cross-border money laundering schemes. According to the Multilateral Sanctions Monitoring Team (MSMT) report, North…
Elena Lazar: Failures are Inevitable – Reliability is a Choice
Reliability engineer on why resilience must be designed, not patched, and how decades of global experience taught her to turn outages into insights. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More…
FBI: Account Takeover Scammers Stole $262 Million this Year
The FBI says that account takeover scams this year have resulted in 5,100-plus complaints in the U.S. and $262 million in money stolen, and Bitdefender says the combination of the growing number of ATO incidents and risky consumer behavior is…
For the first time, a RomCom payload has been observed being distributed via SocGholish
RomCom malware used the SocGholish fake update loader to deliver Mythic Agent to a U.S. civil engineering firm. In September 2025, Arctic Wolf Labs observed RomCom threat actors delivering the Mythic Agent via SocGholish to a U.S. company. The researchers…
Gainsight CEO downplays breach, says only a ‘handful’ of customers had data stolen
Maybe if your hand has 200+ fingers… Gainsight CEO Chuck Ganapathi downplayed the victim count related to his company’s recent breach, saying he’s only aware of “a handful of customers” who had their data affected after Salesforce flagged unusual activity…
AWS Private Certificate Authority now supports partitioned CRLs
Public Key Infrastructure (PKI) is essential for securing and establishing trust in digital communications. As you scale your digital operations, you’ll issue and revoke certificates. Revoking certificates is useful especially when employees leave, migrate to a new certificate authority hierarchy,…
Xillen Stealer Evolves With AI-Like Evasion and Broader Targeting
Xillen Stealer v5 uses AI-themed evasion and expanded targeting to advance credential-theft tactics. The post Xillen Stealer Evolves With AI-Like Evasion and Broader Targeting appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…