BugTrace-AI, an open-source suite that harnesses generative AI to supercharge vulnerability detection. Launched as a one-stop web security analysis platform, BugTrace-AI blends static (SAST) and dynamic (DAST) testing with AI-driven reconnaissance, payload crafting, and more, all in a sleek React-based…
Critical Vulnerability in Popular Node.js Library Exposes Windows Systems to RCE Attacks
A serious security flaw has been discovered in systeminformation, a popular Node.js library used by thousands of developers. The vulnerability, labelled CVE-2025-68154, allows attackers to run malicious code on Windows computers. All versions up to 5.27.13 are affected, and developers…
Critical Apache Commons Text Vulnerability Enables Remote Code Execution Attacks
A newly disclosed security flaw in Apache Commons Text, tracked as CVE-2025-46295, has been identified as a remote code execution (RCE) vulnerability. That could allow attackers to compromise systems using vulnerable versions of the library. The issue impacts Apache Commons Text versions before 1.10.0,…
Phantom Stealer Attacking Users to Steal Sensitive Data like Passwords, Browser Cookies, Credit Card Data
Phantom Stealer version 3.5 has emerged as a serious threat to users worldwide, capable of extracting sensitive information including passwords, browser cookies, credit card details, and cryptocurrency wallet data. This sophisticated malware operates through deceptive packaging, often disguised as legitimate…
France Probes ‘Foreign Interference’ After Remote Control Malware Found on Passenger Ferry
France’s counterespionage agency is investigating a suspected cyberattack plot targeting an international passenger ferry The post France Probes ‘Foreign Interference’ After Remote Control Malware Found on Passenger Ferry appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Group Policy abuse reveals China-aligned espionage group targeting governments
ESET Research has identified a previously undocumented China-aligned advanced persistent threat group that uses Windows Group Policy to deploy malware and move through victim networks. The group, tracked as LongNosedGoblin, has targeted government institutions in Southeast Asia and Japan with…
Families Sue Meta Over Instagram ‘Sextortion’ Deaths
Two families sue Meta over teens’ deaths, claiming company prioritised profits over protecting young people from sexual blackmail This article has been indexed from Silicon UK Read the original article: Families Sue Meta Over Instagram ‘Sextortion’ Deaths
GhostPairing campaign abuses WhatsApp device linking to hijack accounts
Attackers abuse WhatsApp’s device-linking feature to hijack accounts via pairing codes in the GhostPairing campaign. Attackers are exploiting WhatsApp’s device-linking feature to hijack accounts using pairing codes in a campaign dubbed GhostPairing, without requiring authentication. Gen Digital first observed the…
Industrial routers bear the brunt of OT cyberattacks, new Forescout research finds
Industrial routers and other OT perimeter devices are absorbing the majority of cyberattacks targeting operational technology environments, according to new Forescout Vedere Labs research. Analysing 90 days of real-world honeypot data, researchers found that 67% of malicious activity was directed…
DVSA’s clapped-out booking system gets bot slapped as new boss rides in
18-year-old platform crumbles under 94M daily requests while resellers flog £62 tests for £500 The UK’s Driver and Vehicle Standards Agency (DVSA) has appointed a new chief exec to tackle spiraling waits for practical driving tests with bots overrunning its…
How CISOs Can Beat the Ransomware Blame Game
CISOs are often blamed after ransomware attacks, yet most breaches stem from organizational gaps, budget tradeoffs, and staffing shortages. This analysis explores why known risks remain unfixed and how security leaders can break the cycle. The post How CISOs Can…
Bitcoin Investor Seeks To Build Community On Island
Crypto investor Olivier Janssens in early stages of building massive community on island of Nevis with its own court system This article has been indexed from Silicon UK Read the original article: Bitcoin Investor Seeks To Build Community On Island
Oracle Says Data Centre On Track Amid Financing Turbulence
Oracle says major AI data centre in Michigan going as planned, after biggest equity partner Blue Owl reportedly drops out This article has been indexed from Silicon UK Read the original article: Oracle Says Data Centre On Track Amid Financing…
Chinese Hackers Breach Cisco’s Email Security Systems
The Chinese threat group, tracked as UAT-9686, has deployed a collection of custom-built hacking tools to maintain persistent access to compromised systems. The post Chinese Hackers Breach Cisco’s Email Security Systems appeared first on TechRepublic. This article has been indexed…
UK surveillance law still full of holes, watchdog warns
Investigatory Powers Commissioner says reforms have failed to close oversight gaps The UK’s Investigatory Powers Act 2016 (IPA) has several regulatory gaps that must be plugged in future legislative reforms, according to Investigatory Powers Commissioner (IPC) Sir Brian Leveson.… This…
SonicWall Patches Exploited SMA 1000 Zero-Day
The medium-severity flaw has been exploited in combination with a critical bug for remote code execution. The post SonicWall Patches Exploited SMA 1000 Zero-Day appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: SonicWall…
Hospital Ransomware Really is The Pitt
Ransomware has become a systemic risk to healthcare, where downtime equals patient harm. From Change Healthcare to Ascension, this analysis explains why hospitals are targeted, what HIPAA really requires, and how resilience—not checklists—must drive security strategy. The post Hospital Ransomware…
Concentric AI expands Private Scan Manager with Azure support for regulated industries
Concentric AI announced expanded Private Scan Manager functionality in its Semantic Intelligence data security governance platform. Customers now have the ability to deploy Semantic Intelligence within their own private Microsoft Azure cloud. This follows an announcement earlier this year where…
HMRC Warns of Over 135,000 Scam Reports
The UK’s tax office has received 135,500 reports of suspected scams in the past 10 months including 4800 related to self assessment filings This article has been indexed from www.infosecurity-magazine.com Read the original article: HMRC Warns of Over 135,000 Scam…
ENGINE code removed from the OpenSSL Library
OpenSSL 4.0, to be released in April 2026, is the first major release since 3.0 which replaced the ENGINE interface with Providers. Removing ENGINEs is a primary goal of this major release and this post describes the change agreed to…
Sekoia.io Strengthens Collective Cyber Defense at NATO CCDCOE’s Crossed Swords 2025 Exercise
Sekoia.io delivered its technology and expertise to the NATO CCDCOE’s Crossed Swords 2025 (XS25) exercise to gather critical insights and validate our defensive capabilities in a military-grade environment. Hosted by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in…
Phantom Stealer Targeting Users to Steal Sensitive Data
Sophisticated malware employs a multi-stage infection chain and advanced evasion techniques to exfiltrate sensitive information. Phantom, a sophisticated stealer malware variant, is conducting targeted attacks to harvest sensitive data from infected systems, including passwords, browser cookies, credit card information, and…
Critical Apache Commons Text Flaw Lets Hackers Execute Remote Code
A critical remote code execution vulnerability has been discovered in Apache Commons Text, affecting all versions prior to 1.10.0. The flaw, tracked as CVE-2025-46295, poses a significant security risk to organizations relying on the widely-used Java library for text manipulation…
Chinese Ink Dragon Breaches European Government Networks, Affecting Asia and South America
Ink Dragon, a Chinese espionage group, has significantly expanded its operational reach from Southeast Asia and South America into European government networks, according to ongoing research by Check Point Research. The threat actor employs a methodical approach that combines strategic…