Massive Synthient Stealer Log leak adds 183 million stolen usernames and passwords to Have I Been Pwned, exposing new victims worldwide. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More Read the…
Category: EN
Stealthy Malware Leveraging Variable Functions and Cookies for Evasion
Cybersecurity researchers at Wordfence Threat Intelligence and their Care and Response teams have observed a persistent trend in new malware that leverages heavy obfuscation techniques to evade detection. While some malware attempts to blend in as legitimate files, the more…
Cybercriminals Impersonate Aid Agencies to Lure Victims with Fake Financial Offers
Scammers have intensified their efforts to defraud vulnerable populations through sophisticated impersonation schemes and fraudulent financial aid offers, according to recent intelligence monitoring and law enforcement findings. The threat landscape reveals a coordinated, international ecosystem of fraud operations targeting individuals…
House Democrats Push Back at Reassignments, Firings of CISA Employees
Democrats in Congress are continuing to target the Trump Administrations actions with CISA, with the latest effort being a letter from House Democrats arguing the firing some employees and moving others to help with the president’s expansive immigration and deportation…
Salt Typhoon Hacks European Telecom
China-linked espionage group Salt Typhoon successfully breached a European telecommunications firm in July 2025, continuing a widespread global campaign The post Salt Typhoon Hacks European Telecom first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original…
Ransomware Hits Jewett Cameron
Oregon-based Jewett-Cameron Company, a provider of fencing, specialty wood, gardening products, and accessories for dogs like kennels and crates The post Ransomware Hits Jewett Cameron first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original article:…
MuddyWater Launches Global Spying
The Iranian nation-state threat group known as MuddyWater has launched a new, targeted campaign across the Middle East and North Africa (MENA) region The post MuddyWater Launches Global Spying first appeared on CyberMaterial. This article has been indexed from CyberMaterial…
Fake Zoom Calls Target Ukraine Aid
The PhantomCaptcha cyberattack, detailed in a new report by SentinelOne, represents a highly calculated and sophisticated operation targeting organizations The post Fake Zoom Calls Target Ukraine Aid first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the…
Gift Card Heist Via Cloud Hackers
Cybersecurity researchers have recently detailed the activities of a cybercriminal operation dubbed Jingle Thief, a group focused on gift card The post Gift Card Heist Via Cloud Hackers first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…
TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT
In July 2025, cybersecurity firm CYFIRMA uncovered an active phishing campaign targeting Linux-based operating systems used by Indian government and military organisations. This operation, attributed to TransparentTribe (also known as APT36 or Operation C-Major), is the latest in a series…
Jira Vulnerability Lets Attackers Alter Files Accessible to the Jira JVM Process
Atlassian has disclosed a critical path traversal vulnerability affecting Jira Software Data Center and Server that could allow authenticated attackers to modify files accessible to the Jira Java Virtual Machine (JVM) process. The vulnerability, tracked as CVE-2025-22167, carries a high…
Active Exploits Target Magento and Adobe Commerce RCE, Attackers Inject Webshells
Unauthenticated attackers are actively exploiting a critical vulnerability affecting Adobe Commerce and Magento platforms worldwide. The flaw, tracked as CVE-2025-54236 and dubbed SessionReaper, enables remote code execution and customer account takeover on thousands of online stores. CVE ID Vulnerability Name Affected…
Russian Hackers Pivot Fast With New “ROBOT” Malware Chain
Russian hackers launched a new “ROBOT” malware chain after LOSTKEYS was exposed. The post Russian Hackers Pivot Fast With New “ROBOT” Malware Chain appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…
Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process
Atlassian has disclosed a high-severity path traversal vulnerability in Jira Software Data Center and Server that enables authenticated attackers to arbitrarily write files to any path accessible by the Java Virtual Machine (JVM) process. This flaw, tracked as CVE-2025-22167 with…
CISA Warns of Motex LANSCOPE Endpoint Manager Vulnerability Exploited in Attacks
CISA has issued a critical alert regarding a severe vulnerability in Motex LANSCOPE Endpoint Manager, a popular tool for managing IT assets across networks. Dubbed an improper verification of the source of a communication channel flaw, this issue allows attackers…
Apple may have to open its walled garden to outside app stores
The UK’s competition watchdog says Apple’s “walled garden” gives it too much control—and may soon force it to allow rival app stores on iPhones. This article has been indexed from Malwarebytes Read the original article: Apple may have to open…
Building Confidence Through Traceability: Lessons From Mail and Tech
Learn how traceability builds customer trust through certified mail tracking and modern authentication. Boost reliability online and offline in 2025. The post Building Confidence Through Traceability: Lessons From Mail and Tech appeared first on Security Boulevard. This article has been…
PhantomCaptcha RAT Attack Targets Aid Groups Supporting Ukraine
SentinelLABS’ research reveals PhantomCaptcha, a highly coordinated, one-day cyber operation on Oct 8, 2025, targeting the International Red Cross, UNICEF, and Ukraine government groups using fake emails and a Remote Access Trojan (RAT) linked to Russian infrastructure. This article has…
Jingle Thief Hackers Exploit the Festive Season with Weaponized Gift Card Scams
Cybersecurity researchers have uncovered a sophisticated campaign targeting global retail and consumer services organizations through credential theft and gift card fraud. Dubbed “Jingle Thief,” this operation exploits the festive shopping season when companies are most vulnerable to financial fraud schemes.…
U.S. CISA adds Motex LANSCOPE flaw to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Motex LANSCOPE flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Motex LANSCOPE flaw, tracked as CVE-2025-61932 (CVSS v4 score of 9.3), to its Known…