On November 27th, 2025, we received a submission for a Site Reset and Privilege Escalation vulnerability in Demo Importer Plus, a WordPress plugin with more than 10,000 active installations. This vulnerability can be leveraged to trigger a full site reset…
1M Customer Records Allegedly Stolen in Brightspeed Breach
Brightspeed is investigating claims that the Crimson Collective stole data from more than one million customers. The post 1M Customer Records Allegedly Stolen in Brightspeed Breach appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
Versatile Malware Loader pkr_mtsi Delivers Diverse Payloads
Malicious Windows packer named pkr_mtsi used as a flexible malware loader in malvertising campaigns This article has been indexed from www.infosecurity-magazine.com Read the original article: Versatile Malware Loader pkr_mtsi Delivers Diverse Payloads
IT Security News Hourly Summary 2026-01-07 18h : 13 posts
13 posts were published in the last hour 16:36 : Critical macOS Flaw Lets Attackers Bypass Apple Privacy Controls Without Consent 16:36 : From Tycoon2FA to Lazarus Group – Inside ANY.RUN’s Biggest Discoveries of 2025 16:36 : GoBruteforcer Botnet brute-forces…
Critical macOS Flaw Lets Attackers Bypass Apple Privacy Controls Without Consent
A newly disclosed macOS vulnerability bypasses Apple’s TCC privacy controls, allowing silent access to files, microphone data, and user activity. The post Critical macOS Flaw Lets Attackers Bypass Apple Privacy Controls Without Consent appeared first on TechRepublic. This article has…
From Tycoon2FA to Lazarus Group – Inside ANY.RUN’s Biggest Discoveries of 2025
ANY.RUN, the interactive malware analysis platform, has wrapped up 2025 with impressive growth figures and significant contributions to the cybersecurity community. The company’s annual report reveals how its global user base collectively spent over 400,000 hours analyzing threats—equivalent to more…
GoBruteforcer Botnet brute-forces Passwords for FTP, MySQL, and phpMyAdmin on Linux Servers
A sophisticated Go-based botnet dubbed GoBruteforcer is aggressively targeting Linux servers worldwide, brute-forcing weak passwords on internet-exposed services including FTP, MySQL, PostgreSQL, and phpMyAdmin. Check Point Research recently documented a new 2025 variant of the malware that demonstrates significant technical…
CrazyHunter Ransomware Attacking Healthcare Sector with Advanced Evasion Techniques
CrazyHunter ransomware has emerged as a critical and evolving threat that specifically targets healthcare organizations and sensitive medical infrastructure. This Go-developed malware represents a significant escalation in ransomware sophistication, employing advanced encryption methods and delivery mechanisms designed to bypass modern…
ownCloud Urges Users to Enable Multi-Factor Authentication Following Credential Theft
ownCloud has urgently urged users of its Community Edition to enable multi-factor authentication (MFA). Threat intelligence report from Hudson Rock highlighted incidents where attackers compromised self-hosted file-sharing platforms, including some ownCloud deployments, but ownCloud stresses that its platform itself remains…
FIR in Bengaluru Targets Social Media Accounts Spreading Obscene URLs
The Bengaluru Central Cyber Crime unit has taken legal steps to investigate allegations that explicit content was being distributed across the mainstream social media platforms in coordinated fashion, showing the ever-evolving challenges in the transformation of police work in…
High Severity Flaw In Open WebUI Can Leak User Conversations and Data
A high-severity security bug impacting Open WebUI has been found by experts. It may expose users to account takeover (ATO) and, in some incidents, cause full server compromise. Talking about WebUI, Cato researchers said, “When a platform of this size…
Amazon Busts DPRK Hacker on Tiny Typing Delay
Amazon recently uncovered a North Korean IT worker infiltrating its corporate network by tracking a tiny 110ms delay in keystrokes, highlighting a growing threat in remote hiring and cybersecurity. The anomaly, revealed by Amazon’s Chief Security Officer Stephen Schmidt,…
The Hidden Security Risks in ETL/ELT Pipelines for LLM-Enabled Organizations
As organizations integrate large language models (LLMs) into analytics, automation, and internal tools, a subtle yet serious shift is occurring within their data platforms. ETL and ELT pipelines that were originally designed for reporting and aggregation are now feeding models…
900,000 Users Hit as Chrome Extensions Steal AI Chat Data
Malicious Chrome extensions stole AI chat data from over 900,000 users. The post 900,000 Users Hit as Chrome Extensions Steal AI Chat Data appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…
The Loudest Voices in Security Often Have the Least to Lose
Security advice fails when it comes from those who don’t bear the consequences and won’t be responsible for making it work. The post The Loudest Voices in Security Often Have the Least to Lose appeared first on SecurityWeek. This article…
Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud
New Android malware enables unauthorized tap-to-pay transactions without physical access to bank cards This article has been indexed from www.infosecurity-magazine.com Read the original article: Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud
NIST asks public for help securing AI agents
The agency is interested in case studies showing how best to protect agents from hackers. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: NIST asks public for help securing AI agents
Lone Hacker Used Infostealers to Access Data at 50 Global Companies
A Hudson Rock report reveals how an Iranian hacker named Zestix breached 50 global companies, including Iberia Airlines and Pickett & Associates, by using stolen passwords and a lack of MFA. This article has been indexed from Hackread – Cybersecurity…
Microsoft scraps Exchange Online spam clamp after customers cry foul
Negative feedback sinks Redmond’s plan to cap outbound email recipients Microsoft has backed away from planned changes to Exchange Online after customers objected to limits designed to curb outbound email abuse.… This article has been indexed from The Register –…
Chrome Extensions With 900,000 Downloads Caught Stealing AI Chats
Impersonating a legitimate extension from AITOPIA, the two malicious extensions were also exfiltrating users’ browser activity. The post Chrome Extensions With 900,000 Downloads Caught Stealing AI Chats appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control
Cybersecurity researchers have disclosed details of yet another maximum-severity security flaw in n8n, a popular workflow automation platform, that allows an unauthenticated remote attacker to gain complete control over susceptible instances. The vulnerability, tracked as CVE-2026-21858 (CVSS score: 10.0), has…
Cyber Briefing: 2026.01.07
Domain spoofing phishing surges as critical RCEs hit Veeam and n8n, insurers face breaches, ransomware claims grow, and arrests follow major leaks. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.01.07
Fraud attacks expected to ramp up in AI ‘perfect storm’
2026 is poised to be “the year of impersonation attacks” amid an explosion of AI-powered tools, a fraud prevention expert said. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Fraud attacks expected to ramp…
Misconfigured email routing enables internal-spoofed phishing
Attackers exploit misconfigured email routing to spoof internal emails, using PhaaS platforms like Tycoon2FA to steal credentials. Attackers exploit misconfigured email routing and spoof protections to send phishing emails appearing internal, using PhaaS platforms like Tycoon2FA to steal credentials. “Phishing…