The year opened without a reset. The same pressure carried over, and in some places it tightened. Systems people assume are boring or stable are showing up in the wrong places. Attacks moved quietly, reused familiar paths, and kept working…
IT Security News Hourly Summary 2026-01-05 15h : 7 posts
7 posts were published in the last hour 14:4 : GHOSTCREW: AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More 14:4 : ProfileHound: Post-Escalation Tool Designed to Achieve Red Team Objectives 14:4 : Kimwolf Botnet Exploits 2 Million Devices to…
GHOSTCREW: AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More
A new open-source tool is bridging the gap between artificial intelligence and offensive security operations. GHOSTCREW is an advanced AI red team assistant that leverages Large Language Models (LLMs), Model Context Protocol (MCP), and Retrieval-Augmented Generation (RAG) to automate complex penetration…
ProfileHound: Post-Escalation Tool Designed to Achieve Red Team Objectives
ProfileHound emerges as a specialized post-exploitation instrument for offensive security professionals seeking to identify high-value targets within Active Directory environments. The tool addresses a critical gap in red-team reconnaissance by enumerating domain user profiles stored on compromised machines, enabling operators…
Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure
A massive new botnet dubbed “Kimwolf” has infected over 2 million devices globally, transforming innocent users’ home internet connections into secret proxy nodes for cybercriminals. According to a new report by security firm Synthient, the botnet has grown explosively by…
Attackers Leverage FortiWeb Vulnerabilities to Deploy Sliver C2 for Long-Term Access
Threat researchers have uncovered a sophisticated attack campaign targeting FortiWeb web application firewalls across multiple continents, with adversaries deploying the Sliver command-and-control framework to establish persistent access and establish covert proxy infrastructure. The discovery came from analyzing exposed Silver C2…
Hackers Steal $35M in Cryptocurrency Following LastPass Breach
Russian cybercriminals have laundered over $35 million in stolen cryptocurrency linked to the devastating 2022 LastPass breach, according to new forensic analysis by blockchain intelligence firm TRM Labs. The 2022 attack exposed encrypted password vaults belonging to roughly 30 million…
Master IT Fundamentals with This CompTIA Certification Prep Bundle
Prepare for a successful IT career with lifetime access to expert-led courses covering CompTIA A+, Network+, Security+, and Cloud+ certification prep. The post Master IT Fundamentals with This CompTIA Certification Prep Bundle appeared first on TechRepublic. This article has been…
Inside China’s Urban Navigation Blackout and the Lessons for India
The administrative capital of Jiangsu Province and the eastern Chinese city of Nanjing, home to nearly 10 million people, briefly lost its digital compass on Wednesday when the city experienced an unprecedented six-hour satellite navigation outage that temporarily stalled…
Kimwolf Botnet Hacked 2 Million Devices and Turned User’s Internet Connection as Proxy Node
A dangerous new malware called Kimwolf has quietly infected over 2 million devices around the world, forcing them to act as illegal proxy servers without the owners knowing. The botnet has grown at an alarming speed and is currently being…
Threat Actor Exploited Multiple FortiWeb Appliances to Deploy Sliver C2 for Persistent Access
Recent findings indicate that a sophisticated threat actor is actively exploiting multiple outdated FortiWeb appliances to deploy the Sliver Command and Control (C2) framework. This campaign highlights a concerning trend where adversaries leverage open-source offensive tools to maintain persistent access…
Kimwolf Android Botnet Grows Through Residential Proxy Networks
The 2-million-device-strong botnet allows monetization through DDoS attacks, app installs, and the selling of proxy bandwidth. The post Kimwolf Android Botnet Grows Through Residential Proxy Networks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations
Featuring: Cybersecurity is being reshaped by forces that extend beyond individual threats or tools. As organizations operate across cloud infrastructure, distributed endpoints, and complex supply chains, security has shifted from a collection of point solutions to a question of architecture,…
How To Build Ransomware-Resilient AI Data Pipelines: A Practical Guide for Modern Enterprises
Modern enterprises depend on AI data pipelines for analytics and automated decision-making. As these pipelines become more integrated… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: How To Build…
Grok apologizes for creating image of young girls in “sexualized attire”
Having generated content that may violate US child sexual abuse material laws, Grok highlights once again how ineffective AI guardrails can be. This article has been indexed from Malwarebytes Read the original article: Grok apologizes for creating image of young…
Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes
WhatsApp device fingerprinting can be useful in the delivery of sophisticated spyware, but impact is very limited without a zero-day. The post Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes appeared first on SecurityWeek. This article has…
AWS CISO: Need for Continuous Observability is Now Critical
AWS CISO Amy Herzog urges security leaders to invest in visibility and automation to counter increasingly AI-driven cyberattacks in real time. The post AWS CISO: Need for Continuous Observability is Now Critical appeared first on Security Boulevard. This article has…
Cybersecurity Deals Exceed One Billion
The cybersecurity sector experienced a major shift in 2025 as consolidation reached record levels with over 420 merger and acquisition deals. This article has been indexed from CyberMaterial Read the original article: Cybersecurity Deals Exceed One Billion
Finland Arrests Crew Over Cable Damage
Finnish law enforcement took control of the cargo vessel Fitburg after discovering it had been dragging its anchor directly over a critical telecommunications link connecting Helsinki to Estonia. This article has been indexed from CyberMaterial Read the original article: Finland…
Cognizant Faces Lawsuits After Breach
Cognizant and its healthcare claims subsidiary, TriZetto Provider Solutions, are currently navigating a series of class-action lawsuits filed in federal courts across New Jersey and Missouri. This article has been indexed from CyberMaterial Read the original article: Cognizant Faces Lawsuits…
Sergey Petrossov’s Aero Ventures Addresses Aviation’s Younger, Tech-Focused Buyer Demographic
Private aviation’s typical buyer used to be straightforward: corporate executive, mid-50s, established wealth. That profile is still prominent, but it’s changing fast. Buyers under 45 now account for 29% of pre-owned private jet transactions, nearly double their share from a…
New Zealand orders review into ManageMyHealth cyberattack
Government ‘incredibly’ concerned about breach potentially affecting more than 100,000 patients New Zealand health minister Simeon Brown has ordered a review into the cyberattack at ManageMyHealth, which threatens the data of hundreds of thousands of Kiwis.… This article has been…
RondoDox Botnet Hijacks IoT Systems
Cybersecurity investigators have revealed a sophisticated nine-month campaign that has been actively compromising web applications and Internet of Things devices to build a massive botnet called RondoDox. This article has been indexed from CyberMaterial Read the original article: RondoDox Botnet…
Infostealers Hijack Business Infrastructure
A dangerous feedback loop in the cybercrime ecosystem is currently allowing attackers to leverage stolen credentials to take over trusted business websites. This article has been indexed from CyberMaterial Read the original article: Infostealers Hijack Business Infrastructure