Researchers report renewed activity by Iran-linked Infy (Prince of Persia), showing the hacking group remains active and dangerous after years of silence. SafeBreach researchers have spotted renewed activity from the Iran-linked APT group Infy, also known as Prince of Persia,…
New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs
A sophisticated new Android malware family called Wonderland has emerged as a significant threat to users in Uzbekistan and the broader Central Asia region. The malware, which specializes in stealing SMS messages and intercepting one-time passwords, represents a major escalation…
MacSync macOS Malware Distributed via Signed Swift Application
A recent MacSync Stealer version no longer requires users to directly interact with the terminal for execution. The post MacSync macOS Malware Distributed via Signed Swift Application appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
How an LMS Cloud Model Supports Scalable Learning
There’s a new era for training and development programs, making the LMS (Learning Management System) cloud model the… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: How an LMS…
Lies-in-the-Loop Attack Turns AI Safety Dialogs into Remote Code Execution Attack
A newly discovered attack technique has exposed a critical weakness in artificial intelligence code assistants by weaponizing their built-in safety features. The attack, known as Lies-in-the-Loop, manipulates the trust users place in approval dialogs that are designed to prevent harmful…
Hackers Exploiting .onmicrosoft.com Domains to Launch TOAD Scam Attack
Cybercriminals are increasingly weaponizing legitimate Microsoft infrastructure to bypass security filters and trick users into falling for Telephone-Oriented Attack Delivery (TOAD) scams. By abusing the default .onmicrosoft.com When domains are assigned to Azure tenants, attackers send malicious invites that appear…
Around 1,000 systems compromised in ransomware attack on Romanian water agency
On-site staff keep key systems working while all but one region battles with encrypted PCs Romania’s cybersecurity agency confirms a major ransomware attack on the country’s water management administration has compromised around 1,000 systems, with work to remediate them still…
Gambit Cyber Raises $3.4 Million in Seed Funding
The cybersecurity startup will use the funds to accelerate platform improvements, global expansion, and partnerships. The post Gambit Cyber Raises $3.4 Million in Seed Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
How to Browse the Web More Sustainably With a Green Browser
As the internet becomes an essential part of daily life, its environmental footprint continues to grow. Data centers, constant connectivity, and resource-heavy browsing habits all contribute to energy consumption and digital waste. While individual users may not see this impact…
⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More
Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They’re going after the everyday tools we trust most — firewalls, browser add-ons, and even smart TVs — turning small cracks into serious breaches.…
Insider Threat: Hackers Paying Company Insiders to Bypass Security
A new report from Check Point Research reveals a growing trend of cyber criminals recruiting employees at banks, telecoms, and tech giants. Learn how hackers use the darknet and Telegram to offer payouts up to $15,000 for internal access to…
WatchGuard Firebox firewalls under attack (CVE-2025-14733)
More than 115,000 internet-facing WatchGuard Firebox firewalls may be vulnerable to compromise via CVE-2025-14733, a remote code execution vulnerability actively targeted by attackers, Shadowserver’s latest scanning reveals. About CVE-2025-14733 WatchGuard Firebox firewalls, which also incorporate VPN and unified threat management…
UK: NHS Supplier Confirms Cyber-Attack, Operations Unaffected
DXS International, an official partner of NHS England, said the breach has not affected its operations This article has been indexed from www.infosecurity-magazine.com Read the original article: UK: NHS Supplier Confirms Cyber-Attack, Operations Unaffected
IT Security News Hourly Summary 2025-12-22 12h : 10 posts
10 posts were published in the last hour 11:3 : Now Admins Can Block External Users in Microsoft Teams From Defender Portal 11:3 : 125,000 IPs WatchGuard Firebox Devices Exposed to Internet Vulnerable to 0-day RCE Attacks 11:2 : Hackers…
Now Admins Can Block External Users in Microsoft Teams From Defender Portal
Microsoft is set to enhance the security integration between Microsoft Teams and Microsoft Defender for Office 365 with a new feature rolling out next month. According to a new notification in the Microsoft 365 Message Center (MC1200058), security administrators will…
125,000 IPs WatchGuard Firebox Devices Exposed to Internet Vulnerable to 0-day RCE Attacks
The Shadowserver Foundation identified approximately 125,000 WatchGuard Firebox firewall devices worldwide at risk due to a critical vulnerability actively exploited. The flaw, tracked as CVE-2025-14733, enables unauthenticated remote attackers to execute arbitrary code on unpatched devices with minimal effort. The…
Hackers Using Phishing Tools to Access M365 Accounts via OAuth Device Code
Threat actors are now targeting Microsoft 365 accounts using a growing attack method known as OAuth device code phishing. This technique takes advantage of the OAuth 2.0 device authorization flow, a legitimate Microsoft feature designed for devices with limited input…
Multiple Exim Server Vulnerabilities Let Attackers Seize Control of the Server
Security researchers at the National Institute of Standards and Technology (NIST) have uncovered critical security flaws in the Exim mail server. That could allow remote attackers to take complete control of vulnerable systems. The vulnerabilities affect Exim version 4.99 when…
Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in US
Artem Stryzhak pleaded guilty to conspiracy to commit computer fraud after he was extradited earlier this year. The post Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in US appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
9 MFA Mistakes in Manufacturing IT and Fixes
Discover the most common MFA mistakes in manufacturing IT and learn practical fixes to improve security, uptime, and authentication on factory floors. The post 9 MFA Mistakes in Manufacturing IT and Fixes appeared first on Security Boulevard. This article has…
15 Best Passwordless Authentication Solutions in 2026
Compare the 15 best passwordless authentication solutions for 2026. Explore features, pricing, use cases, and how to choose the right tool. The post 15 Best Passwordless Authentication Solutions in 2026 appeared first on Security Boulevard. This article has been indexed…
10 Best Multi-Factor Authentication Solutions in 2026
Explore the 10 best MFA solutions in 2026. Compare features, pricing, pros, cons, and find the right multi-factor authentication tool for your business. The post 10 Best Multi-Factor Authentication Solutions in 2026 appeared first on Security Boulevard. This article has…
DIG AI: Uncensored darknet AI assistant at the service of criminals and terrorists
Resecurity has identified the emergence of uncensored darknet AI assistants, enabling threat actors to leverage advanced data processing capabilities for malicious purposes. One of these – DIG AI – was identified on September 29 of this year and has already…
Nefilim Ransomware Affiliate Pleads Guilty
A Ukrainian man has pleaded guilty to charges connecting him to Nefilim ransomware attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: Nefilim Ransomware Affiliate Pleads Guilty