Kyle Schutt, a 37-year-old DOGE employee identified in federal payroll records, has had his personal email address and associated passwords exposed in at least four distinct “stealer log” datasets published between late 2023 and early 2024. The revelations follow earlier…
Operation Moonlander dismantled the botnet behind Anyproxy and 5socks cybercriminals services
Law enforcement dismantled a 20-year botnet behind Anyproxy and 5socks cybercriminals services and arrested four suspects. Authorities dismantled a 20-year-old botnet tied to Anyproxy and 5socks as part of an international operation codenamed “Operation Moonlander”; four men, including three Russians,…
Google Chrome Uses Advanced AI to Combat Sophisticated Online Scams
Google has integrated artificial intelligence into its cybersecurity toolkit to shield users from financial and data theft scams. On Friday, May 09, 2025, the company unveiled a comprehensive report detailing its latest AI-driven initiatives across Search, Chrome, and Android, marking…
Why CISOs Must Prioritize Cybersecurity Culture in Remote Work
In the era of remote and hybrid work, Chief Information Security Officers (CISOs) are now tasked with cultivating a strong cybersecurity culture in remote work, extending far beyond traditional responsibilities like managing firewalls and monitoring networks. The shift to distributed…
Feds disrupt proxy-for-hire botnet, indict four alleged net miscreants
The FBI also issued a list of end-of-life routers you need to replace Earlier this week, the FBI urged folks to bin aging routers vulnerable to hijacking, citing ongoing attacks linked to TheMoon malware. In a related move, the US…
IT Security News Hourly Summary 2025-05-10 15h : 1 posts
1 posts were published in the last hour 12:32 : “PupkinStealer” A New .NET-Based Malware Steals Browser Credentials & Exfiltrate via Telegram
North Korea’s OtterCookie Malware Added a New Feature to Attack Windows, Linux, and macOS
A North Korea-linked attack group, known as WaterPlum (also referred to as Famous Chollima or PurpleBravo), has been actively targeting financial institutions, cryptocurrency operators, and FinTech companies globally. Since 2023, their infamous Contagious Interview campaign has utilized malware such as…
Keine Zugriffsrechte: Bremer Online-Meldeportal war jahrelang kaputt
Die Programmierer der Behörde hatten niemandem die Zugriffsrechte auf die Meldungen von Menschen in Not erteilt. Das blieb lange unentdeckt. (Software, Politik) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Keine Zugriffsrechte: Bremer Online-Meldeportal war…
“PupkinStealer” A New .NET-Based Malware Steals Browser Credentials & Exfiltrate via Telegram
A newly identified information-stealing malware, dubbed PupkinStealer, Developed in C# using the .NET framework, this lightweight yet effective malware targets sensitive user data, including browser credentials, desktop files, messaging app sessions, and screenshots. According to a CYFIRMA detailed analysis shared…
IT Security News Hourly Summary 2025-05-10 12h : 1 posts
1 posts were published in the last hour 10:4 : Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers
Das passiert, wenn ein Youtuber sein Netflix-Passwort mit der Welt teilt
Passwort-Sharing ist bei Netflix schon lange untersagt. Aber was passiert, wenn man es trotzdem tut? Ein Youtuber wollte es wissen und seinen Account für mehr als 800.000 Leute freigegeben. Das ist passiert. Dieser Artikel wurde indexiert von t3n.de – Software…
Google Gemini: Diese Mini-Änderung spart euch stundenlanges Bilderchaos
Google hat eine Neuerung für seine KI Gemini ausgerollt. Obwohl die Änderung auf den ersten Blick nur marginal erscheint, könnte das Unternehmen damit einigen User:innen Zeit und Frust ersparen. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen…
Deepfakes von Berliner Forschern imitieren den Herzschlag
Der Kampf gegen Deepfakes wird immer schwieriger. Ein Team der Humboldt-Universität hat nun gezeigt, dass auch Erkennungsmethoden, die auf Biosignale achten, an ihre Grenzen geraten. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel:…
19 Milliarden gestohlene Passwörter: Was du unbedingt vermeiden solltest
Expert:innen für Cybersicherheit haben 19 Milliarden gestohlene Passwörter unter die Lupe genommen. Sie zeigen, welche Logins besonders gefährdet sind und wie nachlässig viele Menschen ihre Passwörter auswählen. Was ihr daraus lernen könnt. Dieser Artikel wurde indexiert von t3n.de – Software…
Action-Figur aus ChatGPT: Das Risiko hinter dem lustigen Trend
Ein neuer Trend auf ChatGPT sorgt dafür, dass User:innen Bilder von sich als Action-Figuren erstellen. Auf den ersten Blick handelt es sich um eine harmlose Spielerei. Doch Datenschutzexpert:innen warnen vor den Risiken, die damit für ChatGPT-Nutzer:innen einhergehen. Dieser Artikel wurde…
Steganography Challenge: My Solution, (Sat, May 10th)
When I tried to solve “Steganography Challenge” with the same method as I used in “Steganography Analysis With pngdump.py: Bitstreams”, I couldn't recover the text message. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the…
ICE’s Deportation Airline Hack Reveals Man ‘Disappeared’ to El Salvador
Plus: A DOGE operative’s laptop reportedly gets infected with malware, Grok AI is used to “undress” women on X, a school software company’s ransomware nightmare returns, and more. This article has been indexed from Security Latest Read the original article:…
Five things we learned from WhatsApp vs. NSO Group spyware lawsuit
The landmark trial between WhatsApp and NSO Group unearthed several new revelations. We recap some of them here. This article has been indexed from Security News | TechCrunch Read the original article: Five things we learned from WhatsApp vs. NSO…
UK Ministry of Defence is spending less with US biz, and more with Europeans
France’s share of MOD cash is growing while the US’s shrinks The UK’s Ministry of Defence (MOD) is gradually shifting its spending from the US to Europe, according to research from Tussell.… This article has been indexed from The Register…
Your Android phone is getting a new security secret weapon – and it’s a big deal
This new security feature will make your Android phone more difficult to access if you haven’t used it in a while. This article has been indexed from Latest stories for ZDNET in Security Read the original article: Your Android phone…
Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers
As artificial intelligence (AI) tools gain mainstream traction for content creation, cybercriminals are capitalizing on the hype with a sophisticated new attack vector, fake AI platforms promising advanced video and image editing capabilities. These fraudulent sites, amplified through viral social…
20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly
In a coordinated effort, Lumen Technologies’ Black Lotus Labs, the U.S. Department of Justice (DOJ), the Federal Bureau of Investigation (FBI), and the Dutch National Police have dismantled a sophisticated criminal proxy network that has operated since 2004. The botnet,…
IT Security News Hourly Summary 2025-05-10 09h : 3 posts
3 posts were published in the last hour 7:5 : Building IDP Resilience 7:4 : How to rationalize IDPs (without painful migrations) 7:4 : Exposing a Government Data Breach: Whistleblower Tells All – Cybersecurity Today Special Report
Bedrohungen im Gesundheitswesen: Grobe Verstöße beim Datenschutz
Mitarbeiter im Gesundheitswesen senden laut Research Report von Netskope Threat Labs bei der Arbeit regelmäßig sensible Gesundheitsdaten an persönliche Cloud- und generative KI-Konten. Das gilt als Verstoß gegen die Datenschutzrichtlinien. Dieser Artikel wurde indexiert von Newsfeed Lesen Sie den originalen…