Two defendants pleaded guilty in a Bitcoin laundering case tied to the UK’s record crypto seizure. The Met’s seven-year probe moves to sentencing 10–11 November. The post UK Police Convicts Pair in £5.5 Billion Bitcoin Launder Case appeared first on…
UK government tries again to access encrypted Apple customer data: Report
The U.K. Home Office is seeking access to Apple users’ encrypted iCloud backups for a second time, after an earlier attempt failed earlier this year. This article has been indexed from Security News | TechCrunch Read the original article: UK…
New DNS Malware Detour Dog Delivers Strela Stealer Using DNS TXT Records
A sophisticated DNS-based malware campaign has emerged, utilizing thousands of compromised websites worldwide to deliver the Strela Stealer information-stealing malware through an unprecedented technique involving DNS TXT records. The threat, tracked as Detour Dog by security researchers, represents a significant…
New FlipSwitch Hooking Technique Bypasses Linux Kernel Defenses
The cybersecurity landscape witnessed the emergence of a sophisticated rootkit variation, FlipSwitch, targeting modern Linux kernels. First surfacing in late September 2025, FlipSwitch exploits recent changes in syscall dispatching to implant stealthy hooks directly into kernel code. Early indicators suggest…
New Google Drive Desktop Feature adds AI-powered Ransomware Detection to Prevent Cyberattacks
Google has introduced a new AI-powered ransomware detection feature for Google Drive for desktop, designed to block cyberattacks and protect user files automatically. This enhancement adds a significant layer of security for users of Windows and macOS, addressing the persistent…
Microsoft Previews Graph Framework to Better Integrate Cybersecurity Tools
Microsoft this week began previewing an instance of a graph that is specifically designed to facilitate integration of disparate cybersecurity tools and platforms. Based on a data lake that is now generally available and an instance of a Model Context…
Release Announcement for OpenSSL 3.6.0
The final release of OpenSSL 3.6 is now live. We would like to thank all those who contributed to the OpenSSL 3.6 release, without whom the OpenSSL Library would not be possible. This article has been indexed from Blog on…
IT Security News Hourly Summary 2025-10-01 18h : 11 posts
11 posts were published in the last hour 16:2 : Canadian Police Seize $40M in Digital Assets After Closing TradeOgre 16:2 : Broadcom Issues Patches for VMware NSX and vCenter Security Flaws 15:32 : Policy-as-Code for Terraform in Regulated Environments…
Meet SpamGPT and MatrixPDF, AI Toolkits Driving Malware Attacks
Cybersecurity researchers at Varonis have discovered two new plug-and-play cybercrime toolkits, MatrixPDF and SpamGPT. Learn how these AI-powered tools make mass phishing and PDF malware accessible to anyone, redefining online security risks. This article has been indexed from Hackread –…
Canadian Police Seize $40M in Digital Assets After Closing TradeOgre
Canadian police have shut down the cryptocurrency trading platform TradeOgre and seized digital assets valued at more than $40 million USD, marking both the country’s largest cryptocurrency seizure and the first time a crypto exchange has been dismantled by…
Broadcom Issues Patches for VMware NSX and vCenter Security Flaws
Broadcom has released security patches for critical flaws affecting several VMware products This article has been indexed from www.infosecurity-magazine.com Read the original article: Broadcom Issues Patches for VMware NSX and vCenter Security Flaws
Policy-as-Code for Terraform in Regulated Environments
Why Does It Matter? When we talk about a regulated workload, we talk about compliance. These compliances are industry standards that govern how data is processed, stored, and managed. That is why these workloads need to be clean and should…
Databricks boosts data security with AI-powered suite
<p>Databricks launched Data Intelligence for Cybersecurity, a set of features and integrations aimed at enabling customers to thwart data security threats with greater accuracy.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1′)</script> </div> </div>…
Cyber Awareness Month: Phishing and Software Updates Still Matter Most
Read more about cyber basics with insights from the 2025 Global Threat Landscape Report that reinforce the key themes from Cyber Security Awareness Month. This article has been indexed from Fortinet Industry Trends Blog Read the original article: Cyber…
WestJet Confirms Data Breach – Customers Personal Information Exposed
WestJet announced a cybersecurity incident in which a sophisticated third-party actor gained unauthorized access to internal systems, exposing personal information of some customers. The breach, discovered on June 13, 2025, has since been contained and remediated, but not before sensitive…
MatrixPDF Attacks Gmail Users Bypassing Email Filters and Fetch Malicious Payload
In recent weeks, a novel malware campaign dubbed MatrixPDF has surfaced, targeting Gmail users with carefully crafted emails that slip past conventional spam and phishing filters. This campaign has been active since mid-September 2025 and leverages PDF attachments that, when…
CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks
Cisco’s Simple Network Management Protocol (SNMP) implementations in IOS and IOS XE have come under intense scrutiny following reports of active exploitation in the wild. First disclosed in August 2025, CVE-2025-20352 describes a critical buffer overflow in the SNMP engine…
Medusa Ransomware Gang Offers BBC Reporter Millions for Inside Hack Access
A ransomware operation claiming affiliation with the Medusa gang attempted to recruit BBC cybersecurity correspondent Joe Tidy as an insider threat, offering him substantial financial incentives in exchange for access to the broadcaster’s systems. The threat actor, using the…
Massive Breach Allows Hackers to Steal Employee Data from the US Federal Agencies
An incident at the Federal Emergency Management Agency allowed threat actors to steal employee data from the US Customs and Border Protection and the disaster management office. The breach has allegedly triggered the removal of dozens of Federal Emergency Management…
Datzbro Android Banking Trojan Targets Seniors With Device-Takeover Attacks
Researchers have uncovered a previously undocumented Android banking trojan, dubbed Datzbro, that is being used in device-takeover campaigns aimed squarely at older adults. ThreatFabric, a Dutch mobile security firm, first tied the activity to a social-engineering network in August…
Navigating Complexity: CISO Strategies for Security Tool Consolidation and Budget Optimization
In the dynamic landscape of modern cybersecurity, Chief Information Security Officers (CISOs) often face a paradoxical challenge: the proliferation of security tools. While each solution promises to strengthen defenses, the… The post Navigating Complexity: CISO Strategies for Security Tool Consolidation…
Top 10 Best Vulnerability Management Software in 2025
In today’s fast-paced digital environment, organizations face constant threats from cybercriminals exploiting weaknesses in IT systems. Vulnerability management software is one of the most crucial elements in safeguarding a network, as it helps identify, evaluate, and remediate security gaps before…
Shortcut-based Credential Lures Deliver DLL Implants
A new campaign has been observed using malicious Windows shortcuts in credential-themed ZIP files to deploy PowerShell script This article has been indexed from www.infosecurity-magazine.com Read the original article: Shortcut-based Credential Lures Deliver DLL Implants
Landmark US cyber-information-sharing program expires, bringing uncertainty
Without legal protections, companies might stop reporting information about cybersecurity threats. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Landmark US cyber-information-sharing program expires, bringing uncertainty