The hackers remained undetected for three weeks, deploying China Chopper, remote access scripts, and reconnaissance tools. The post GeoServer Flaw Exploited in US Federal Agency Hack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Category: securityweek
GitHub Boosting Security in Response to NPM Supply Chain Attacks
GitHub will implement local publishing with mandatory 2FA, granular tokens that expire after seven days, and trusted publishing. The post GitHub Boosting Security in Response to NPM Supply Chain Attacks appeared first on SecurityWeek. This article has been indexed from…
Record-Breaking DDoS Attack Peaks at 22 Tbps and 10 Bpps
The attack was aimed at a European network infrastructure company and it has been linked to the Aisuru botnet. The post Record-Breaking DDoS Attack Peaks at 22 Tbps and 10 Bpps appeared first on SecurityWeek. This article has been indexed…
SonicWall Updates SMA 100 Appliances to Remove Overstep Malware
The software update includes additional file checks and helps users remove the known rootkit deployed in a recent campaign. The post SonicWall Updates SMA 100 Appliances to Remove Overstep Malware appeared first on SecurityWeek. This article has been indexed from…
Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers
Tracked as CVE-2025-59689, the command injection bug could be triggered via malicious emails containing crafted compressed attachments. The post Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Jaguar Land Rover Says Shutdown Will Continue Until at Least Oct 1 After Cyberattack
JLR extended the pause in production “to give clarity for the coming week as we build the timeline for the phased restart of our operations and continue our investigation.” The post Jaguar Land Rover Says Shutdown Will Continue Until at…
A Massive Telecom Threat Was Stopped Right As World Leaders Gathered at UN Headquarters in New York
More than 300 servers and 100,000 SIM cards designed to mimic cellphones and overwhelm networks. The post A Massive Telecom Threat Was Stopped Right As World Leaders Gathered at UN Headquarters in New York appeared first on SecurityWeek. This article…
Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack
Binarly researchers have found a way to bypass a patch for a previously disclosed vulnerability. The post Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
SolarWinds Makes Third Attempt at Patching Exploited Vulnerability
CVE-2025-26399 is a patch bypass of CVE-2024-28988, which is a patch bypass of the exploited CVE-2024-28986. The post SolarWinds Makes Third Attempt at Patching Exploited Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests
The company will expand its platform’s capabilities and accelerate investigative collaboration and go-to-market efforts. The post Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher
The strength of responsible disclosure is that it can solve problems before they are actioned. The weakness is that it potentially generates a false sense of security in the vendor. The post All Microsoft Entra Tenants Were Exposed to Silent…
ShadowV2 DDoS Service Lets Customers Self-Manage Attacks
The botnet’s operators provide customers with access to an infected network of Docker containers so they can conduct DDoS attacks. The post ShadowV2 DDoS Service Lets Customers Self-Manage Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited
A new ranking of Model Context Protocol weaknesses highlights critical risks—from prompt injection to command injection—and provides a roadmap for securing the foundations of agentic AI. The post Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited appeared…
Scattered Spider Suspect Arrested in US
The juvenile suspect surrendered on September 17 and was booked on computer intrusion, extortion, and identity theft charges. The post Scattered Spider Suspect Arrested in US appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Automotive Titan Stellantis Discloses Data Breach
The company says customer contact information was stolen from a third-party service provider’s platform. The post Automotive Titan Stellantis Discloses Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Automotive Titan Stellantis…
European Airport Disruptions Caused by Ransomware Attack
Collins Aerospace is reportedly having difficulties recovering from the ransomware attack. The post European Airport Disruptions Caused by Ransomware Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: European Airport Disruptions Caused by…
Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud
L1TF Reloaded is a vulnerability combining the old L1TF and half-Spectre hardware flaws to bypass deployed software mitigations. The post Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud appeared first on SecurityWeek. This article has been indexed…
Mycroft Raises $3.5 Million for AI-Powered Security and Compliance Platform
The Canada-based company has emerged from stealth with autonomous AI agents designed to manage and operate the security and IT stack. The post Mycroft Raises $3.5 Million for AI-Powered Security and Compliance Platform appeared first on SecurityWeek. This article has…
HoundBytes Launches Automated Security Analyst
The Romania-based company has launched WorkHorse and is preparing for a funding round to accelerate growth. The post HoundBytes Launches Automated Security Analyst appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: HoundBytes Launches…
FBI Warns of Spoofed IC3 Website
Threat actors likely spoofed the official government website for personal information theft and monetary fraudulent activity. The post FBI Warns of Spoofed IC3 Website appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: FBI…