A sophisticated cybercrime operation has emerged, targeting unsuspecting internet users through a deceptive social engineering technique that exploits one of the web’s most trusted security mechanisms. Since June 2024, the financially motivated threat group UNC5518 has been systematically compromising legitimate…
Russian APT Exploiting 7-Year-Old Cisco Vulnerability: FBI
Russian state-sponsored hackers tracked as Static Tundra continue to target Cisco devices affected by CVE-2018-0171. The post Russian APT Exploiting 7-Year-Old Cisco Vulnerability: FBI appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Russian…
AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged
AWS’s Trusted Advisor tool, which is supposed to warn customers if their (cloud) S3 storage buckets are publicly exposed, could be “tricked” into reporting them as not exposed when they actually are, Fog Security researchers have found. S3 access protection…
Cybercriminal Linked to Notorious Scattered Spider Gang Gets 10-Year Sentence
Noah Urban, linked with the Scattered Spider cybercriminal gang, will also pay $13m in restitution to victims This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminal Linked to Notorious Scattered Spider Gang Gets 10-Year Sentence
IT Security News Hourly Summary 2025-08-21 12h : 3 posts
3 posts were published in the last hour 9:33 : 7 clever ways to automate your home with smart plugs 9:32 : NIST Unveils Guidelines to Help Spot Face Morphing Attempts 9:32 : “PromptFix” Attacks Could Supercharge Agentic AI Threats
UNC5518 Group Hacks Legitimate Sites with Fake Captcha to Deliver Malware
The financially motivated threat group UNC5518 has been infiltrating trustworthy websites to install ClickFix lures, which are misleading phony CAPTCHA pages, as part of a complex cyber campaign that has been monitored since June 2024. These malicious pages trick users…
AI crawlers and fetchers are blowing up websites, with Meta and OpenAI the worst offenders
One fetcher bot seen smacking a website with 39,000 requests per minute Cloud services giant Fastly has released a report claiming AI crawlers are putting a heavy load on the open web, slurping up sites at a rate that accounts…
Weak Passwords and Compromised Accounts: Key Findings from the Blue Report 2025
As security professionals, it’s easy to get caught up in a race to counter the latest advanced adversary techniques. Yet the most impactful attacks often aren’t from cutting-edge exploits, but from cracked credentials and compromised accounts. Despite widespread awareness of…
Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth
A campaign leverages CVE-2024-36401 to stealthily monetize victims’ bandwidth where legitimate software development kits (SDKs) are deployed for passive income. The post Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth appeared first on Unit 42. This…
The best password generators of 2025: Expert tested
While it’s easy to default to common, easy-to-guess passwords, a password generator can help you create complex, secure credentials. We’ll help you choose the best password generator to keep your online accounts safe. This article has been indexed from Latest…
Orange Belgium Data Breach Impacts 850,000 Customers
Orange Belgium says hackers accessed data pertaining to 850,000 customer accounts during a July cyberattack. The post Orange Belgium Data Breach Impacts 850,000 Customers appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Orange…
Orange Data Breach Raises SIM-Swapping Attack Fears
Orange Belgium revealed that a threat actor has compromised 850,000 customer accounts, with SIM card numbers among the data accessed This article has been indexed from www.infosecurity-magazine.com Read the original article: Orange Data Breach Raises SIM-Swapping Attack Fears
QUIC-LEAK Vulnerability Allows Attackers to Drain Server Memory and Cause DoS
Security researchers at Imperva have disclosed a critical pre-handshake memory exhaustion vulnerability in the widely-used LSQUIC QUIC implementation that enables remote attackers to crash servers through denial-of-service attacks. The flaw, designated CVE-2025-54939 and dubbed “QUIC-LEAK,” bypasses standard QUIC connection-level protections…
New Campaign Uses Active Directory Federation Services to Steal M365 Credentials
Researchers at Push Security have discovered a new phishing campaign that targets Microsoft 365 (M365) systems and uses Active Directory Federation Services (ADFS) to enable credential theft. This attack vector exploits Microsoft’s authentication redirect mechanisms, effectively turning a legitimate service…
MITM6 + NTLM Relay Attack Enables Full Domain Compromise
Cybersecurity researchers are highlighting a dangerous attack technique that combines rogue IPv6 configuration with NTLM credential relay to achieve complete Active Directory domain compromise, exploiting default Windows configurations that most organizations leave unchanged. Attack Leverages Default Windows IPv6 Behavior The…
A Scattered Spider member gets 10 years in prison
A 20-year-old Scattered Spider member gets 10 years in prison and $13M restitution for SIM-swapping crypto thefts. Scattered Spider hacker, Noah Michael Urban (20), was sentenced to 10 years in U.S. prison and ordered to pay $13M restitution for SIM-swapping…
New SHAMOS Malware Attacking macOS Via Fake Help Websites to Steal Login Credentials
A sophisticated malware campaign targeting macOS users has emerged between June and August 2025, successfully attempting to compromise over 300 customer environments through deceptive help websites. The malicious operation deploys SHAMOS, a variant of the notorious Atomic macOS Stealer (AMOS),…
New MITM6 + NTLM Relay Attack Let Attackers Escalate Privileges and Compromise Entire Domain
A sophisticated attack chain that combines MITM6 with NTLM relay techniques to achieve full Active Directory domain compromise. The attack exploits Windows’ default IPv6 auto-configuration behavior, allowing attackers to escalate from network access to Domain Admin privileges in minutes. Key…
CISA Releases Four ICS Advisories Surrounding Vulnerabilities, and Exploits
CISA issued four comprehensive Industrial Control Systems (ICS) advisories on August 19, 2025, highlighting serious vulnerabilities affecting critical infrastructure sectors including energy and manufacturing. These advisories detail exploitable vulnerabilities with CVSS scores ranging from 5.8 to 9.8, requiring immediate attention…
7 clever ways to automate your home with smart plugs
Smart plugs are a great addition to any home; they’re affordable, easy to install, and user-friendly. Here are some ways you can automate your home with them. This article has been indexed from Latest news Read the original article: 7…
NIST Unveils Guidelines to Help Spot Face Morphing Attempts
NIST has released new guidelines examining the pros and cons of detection methods for face morphing software This article has been indexed from www.infosecurity-magazine.com Read the original article: NIST Unveils Guidelines to Help Spot Face Morphing Attempts
“PromptFix” Attacks Could Supercharge Agentic AI Threats
Guardio reveals a new AI take on ClickFix dubbed “PromptFix” This article has been indexed from www.infosecurity-magazine.com Read the original article: “PromptFix” Attacks Could Supercharge Agentic AI Threats
The best 15-inch laptops of 2025: Expert tested and reviewed
Need a new laptop? We’ve tested the best 15-inch laptops this year from brands like Apple, Asus, and Dell to help you choose the best fit. This article has been indexed from Latest news Read the original article: The best…
FBI: Russia-linked group Static Tundra exploit old Cisco flaw for espionage
FBI warns FSB-linked group Static Tundra is exploiting a 7-year-old Cisco IOS/IOS XE flaw to gain persistent access for cyber espionage. The FBI warns that Russia-linked threat actor Static Tundra exploits Simple Network Management Protocol (SNMP) and end-of-life networking devices…
Apple Patches Zero-Day Exploited in Targeted Attacks
Apple has rolled out iOS and macOS updates that resolve a zero-day vulnerability exploited in highly targeted attacks. The post Apple Patches Zero-Day Exploited in Targeted Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft
A 20-year-old member of the notorious cybercrime gang known as Scattered Spider has been sentenced to ten years in prison in the U.S. in connection with a series of major hacks and cryptocurrency thefts. Noah Michael Urban pleaded guilty to…
22-year-old Operator of ‘Rapper Bot’ Botnet Charged for Launching 3 Tbps DDoS Attack
Federal authorities have charged a 22-year-old Oregon man with operating one of the most powerful distributed denial-of-service (DDoS) botnets ever discovered, marking a significant victory in the ongoing battle against cybercriminal infrastructure. Ethan Foltz of Eugene, Oregon, faces federal charges…