Trust Wallet urged users to update its Chrome extension after a security incident caused about $7 million in losses. Trust Wallet warned users to update its Google Chrome extension after a security incident that resulted in about $7 million in…
500+ Cybercrime Arrests in INTERPOL’s Operation Sentinel
INTERPOL’s Operation Sentinel resulted in 574 arrests across Africa, disrupting major BEC, ransomware, and extortion campaigns. The post 500+ Cybercrime Arrests in INTERPOL’s Operation Sentinel appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
Shift-Left Strategies for Cloud-Native and Serverless Architectures
The growth observed in modern-day cloud applications is staggering to say the least. Applications are being built faster and deployed at a faster pace. However, there can be several obstacles on this journey toward proactive security, as security and compliance…
Google Introduces Option to Change @gmail.com Email Addresses
For years, Google users have been stuck with the email addresses they created when they first signed up. If you picked an embarrassing username years ago or simply want a more professional handle, the only previous solution was to create…
59K Servers Hacked in 48 Hours: Inside Operation PCPcat
Operation PCPcat shows how unpatched Next.js vulnerabilities can be exploited to harvest cloud credentials at massive scale. The post 59K Servers Hacked in 48 Hours: Inside Operation PCPcat appeared first on eSecurity Planet. This article has been indexed from eSecurity…
Pro-Russian group Noname057 claims cyberattack on La Poste services
Pro-Russian hacking group Noname057 claimed responsibility for the cyberattack that recently disrupted La Poste’s digital banking and online services. This week, the French national postal service La Poste confirmed a major cyber incident had knocked its information systems offline, disrupting…
Webrat Malware Targets Students and Junior Security Researchers Through Fake Exploits
In early 2025, security researchers uncovered a new malware family dubbed Webrat, which at that time was predominantly targeting ordinary users through fake distribution methods. The first propagation involved masking malware as cheats for online games-like Rust, Counter-Strike, and…
Telegram-Based Crypto Scam Networks Are Now Larger Than Any Dark Web Market in History
For years, illegal online marketplaces were closely linked to the dark web. These platforms relied on privacy-focused browsers and early cryptocurrencies to sell drugs, weapons, stolen data, and hacking tools while remaining hidden from authorities. At the time, their…
Google and Apple Deploy Rapid Security Fixes Following Zero-Day Attacks
It has been revealed that a set of advanced zero-day vulnerabilities, utilizing which a highly targeted hacking campaign was targeting private individuals, has been leveraged by Apple as an emergency security patch. Several weeks ago, in an official security…
NIST and MITRE Launch $20 Million AI Research Centers to Protect U.S. Manufacturing and Critical Infrastructure
The National Institute of Standards and Technology (NIST) has announced a new partnership with The MITRE Corporation to establish two artificial intelligence–focused research centers under a $20 million initiative. The effort will explore advanced AI applications, with a strong…
From AI to analog, cybersecurity tabletop exercises look a little different this year
Practice makes perfect It’s the most wonderful time of the year … for corporate security bosses to run tabletop exercises, simulating a hypothetical cyberattack or other emergency, running through incident processes, and practicing responses to ensure preparedness if when a…
IT Security News Hourly Summary 2025-12-26 18h : 1 posts
1 posts were published in the last hour 16:31 : Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code
Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code
Trust Wallet is urging users to update its Google Chrome extension to the latest version following what it described as a “security incident” that led to the loss of approximately $7 million. The issue, the multi‑chain, non‑custodial cryptocurrency wallet service…
This strange magnetism could power tomorrow’s AI
Scientists in Japan have confirmed that ultra-thin films of ruthenium dioxide belong to a newly recognized and powerful class of magnetic materials called altermagnets. These materials combine the best of two magnetic worlds: they’re stable against interference yet still allow…
This tiny chip could change the future of quantum computing
A new microchip-sized device could dramatically accelerate the future of quantum computing. It controls laser frequencies with extreme precision while using far less power than today’s bulky systems. Crucially, it’s made with standard chip manufacturing, meaning it can be mass-produced…
The State of SAP Security: How to Defend Your Organization from Surging ERP Application Attacks
SAP is now a prime cyberattack target and must be treated as a core enterprise security priority. The post The State of SAP Security: How to Defend Your Organization from Surging ERP Application Attacks appeared first on eSecurity Planet. This…
From video games to cyber defense: If you don’t think like a hacker, you won’t win
In supercharged AI race, defenders need to keep up interview According to Remedio CEO Tal Kollender, the only way to beat the bad guys hacking into corporate networks is to “think like a hacker,” and because not everyone is a…
Best of 2025: Survey: Nearly Half of Data Breaches Involved Third-Party Remote Access
A survey of 1,942 IT and IT security practitioners finds nearly half (47%) work for organizations that have experienced a data breach or cyberattack in the past 12 months that involved a third-party that has access to their network. The…
China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware
A China-linked advanced persistent threat (APT) group has been attributed to a highly-targeted cyber espionage campaign in which the adversary poisoned Domain Name System (DNS) requests to deliver its signature MgBot backdoor in attacks targeting victims in Türkiye, China, and…
Cyber Briefing: 2025.12.26
MacSync bypasses macOS security as browser and supply-chain malware spread, ransomware hits utilities, breaches surface, and courts and Interpol act. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2025.12.26
Popular NPM Package lotusbail Exposed as Trojan Stealing WhatsApp Chats
Koi Security uncovers lotusbail, a malicious npm package with 56K downloads that steals WhatsApp messages and installs a persistent backdoor. Learn how to protect your data. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and…
Aflac confirms June data breach affecting over 22 million customers
A June data breach exposed the personal information of more than 22 million Aflac customers, the company confirmed. A data breach in June exposed the information of more than 22 million Aflac customers, according to a new statement from the…
The Architect’s Guide to Logging
Every developer and architect thinks they understand logging until they’re staring at a production issue at 3:00 a.m. Realizing that their logs lack context, have no defined structure, and they’re sifting through a wall of text, desperately looking for that…
WordPress Vulnerability Scanner Reveals How Exposed Your Website Really Is
WordPress powers about 43% of all websites worldwide. This makes it an indispensable platform for organizations of all sizes. Unfortunately, that popularity also makes WordPress a prime target for attackers. Hundreds of thousands of WordPress sites get hacked each year,…