Rhadamanthys 0.9.2 released: New version of the popular information stealer introduces changes that break existing tools and add fresh evasion techniques. Professionalization continues: Operators have rebranded as RHAD Security / Mythical Origin Labs and launched a polished website with multiple…
ICE Wants to Build Out a 24/7 Social Media Surveillance Team
Documents show ICE plans to hire dozens of contractors to scan X, Facebook, TikTok, and other platforms to target people for deportation. This article has been indexed from Security Latest Read the original article: ICE Wants to Build Out a…
Hacking group claims theft of 1 billion records from Salesforce customer databases
The hacking group claims to have stolen about a billion records from companies, including FedEx, Qantas, and TransUnion, who store their customer and company data in Salesforce. This article has been indexed from Security News | TechCrunch Read the original…
New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps
In recent months, security teams have observed a surge in Android spyware campaigns that prey on privacy-conscious users by masquerading as trusted messaging apps. These malicious payloads exploit users’ trust in Signal and ToTok, delivering trojanized applications that request extensive…
Munich Airport chaos after drone sightings spook air traffic control
Overnight shutdown leaves thousands stuck as Oktoberfest crowds stretch city security Munich Airport was temporarily closed last night following reports of drones buzzing around the area.… This article has been indexed from The Register – Security Read the original article:…
North Korea Remote Worker Scam Goes Global, Expands Target Industries
A report by Okta researchers says the notorious North Korea IT worker scams, which have focused on U.S. tech and crypto firms, is now going global, targeting other industries like healthcare and finances in a growing number of countries that…
OnePlus Users Face Security Risks from OxygenOS Vulnerability
With smartphones continuously expanding, OnePlus has long been recognised as one of the leading brands in the market, delivering premium performance at an affordable price point and building a loyal user base within the competitive Android market for years. …
IoT Routers Used In Targeted In SMS Phishing
Scammers have been taking advantage of easily accessible cellular routers to send out massive text message-based phishing attacks, or The post IoT Routers Used In Targeted In SMS Phishing first appeared on CyberMaterial. This article has been indexed from CyberMaterial…
Georgia Tech Pays 875,000 In Cyber Fraud
The U.S. government is ramping up its efforts to ensure that defense contractors uphold their cybersecurity obligations, with a clear message that The post Georgia Tech Pays 875,000 In Cyber Fraud first appeared on CyberMaterial. This article has been indexed…
Hackers Target Oracle Apps For Extortion
A criminal group is extorting executives and tech departments at large organizations, claiming to have stolen data from their Oracle Corp. applications. The post Hackers Target Oracle Apps For Extortion first appeared on CyberMaterial. This article has been indexed from…
Facebook Scams Target Seniors With Malware
Attackers are targeting seniors on Facebook with a sophisticated scheme that combines social engineering with malicious software. They create fake groups The post Facebook Scams Target Seniors With Malware first appeared on CyberMaterial. This article has been indexed from CyberMaterial…
Android Spyware Poses As Signal And Totok
The cybersecurity company ESET recently discovered two new spyware families, dubbed ProSpy and ToSpy, that target Android users. The attackers disguised The post Android Spyware Poses As Signal And Totok first appeared on CyberMaterial. This article has been indexed from…
Revolutionizing Third Party Risk Management: The Future with Autonomous Pen-Testing
In today’s interconnected digital landscape, businesses are more dependent than ever on third-party vendors and partners. While these relationships bring numerous benefits, they also introduce significant risks. Traditional third-party risk… The post Revolutionizing Third Party Risk Management: The Future with…
DrayOS Router Flaw Allows Remote Code Execution by Attackers
A critical vulnerability affecting DrayOS routers could let unauthenticated attackers execute code remotely. Discovered on July 22 by Pierre-Yves Maes of ChapsVision, the flaw stems from the use of an uninitialized variable in the Web User Interface (WebUI). Crafting special…
Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT
In a recent wave of targeted phishing campaigns, the Cavalry Werewolf cluster has escalated its operations by impersonating government officials and deploying both FoalShell and StallionRAT malware. These tactics underscore the urgency of maintaining continuous cyber intelligence monitoring and implementing…
Oneleet Raises $33 Million for Security Compliance Platform
The cybersecurity startup will expand its engineering team, add more AI capabilities, and invest in go-to-market efforts. The post Oneleet Raises $33 Million for Security Compliance Platform appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL
Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular messaging app WhatsApp. The campaign, codenamed SORVEPOTEL by Trend Micro, weaponizes the trust with the platform to extend its reach across Windows systems,…
Cl0p-Linked Gang Attempts to Extort Oracle E-Business Customers
A ‘high-volume’ extortion campaign possibly linked to FIN11 and Cl0p is targeting Oracle E-Business executives. Mandiant and GTIG are investigating unproven data theft claims. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto…
New XWorm V6 Variant Embeds Malicious Code into Trusted Windows Applications
In the constantly evolving world of cyber threats, staying informed is not just an advantage; it’s a necessity. First observed in 2022, XWorm quickly gained notoriety as a highly effective malware, providing cybercriminals with a versatile toolkit for malicious activities.…
From threats to apology, hackers pull child data offline after public backlash
After posting children’s photos online and issuing ransom demands, cybercriminals targeting Kido nurseries say they’ve erased the stolen data. This article has been indexed from Malwarebytes Read the original article: From threats to apology, hackers pull child data offline after…
UK government says digital ID won’t be compulsory – honest
Even spy-tech biz Palantir says ‘steady on’ as 2.76M Brits demand it be ditched The British government has finally given more details about the proposed digital ID project, directly responding to the 2.76 million naysayers that signed an online petition…
How Fileless Malware Differs From Traditional Malware Attacks
The cybersecurity landscape has witnessed a dramatic evolution in attack methodologies, with fileless malware emerging as one of the most sophisticated and dangerous threats facing organizations today. Unlike traditional malware that relies on executable files stored on disk, fileless attacks…
Chinese Hackers Compromising High-Value IIS Servers to Manipulate Search Rankings
The Chinese-speaking cybercrime group UAT-8099 has been stealthily breaching valuable Internet Information Services (IIS) servers in India, Thailand, Vietnam, Canada, and Brazil to carry out extensive search engine optimization (SEO) fraud. This campaign, which began surfacing in early 2025, leverages…
DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely
A critical vulnerability has been discovered in DrayTek’s DrayOS routers, which could allow unauthenticated remote attackers to execute malicious code. The flaw, tracked as CVE-2025-10547, affects a wide range of Vigor router models, prompting administrators to apply security updates urgently.…