Family photos pulled from social media are being used as “proof-of-life” in virtual kidnapping scams, the FBI warns. This article has been indexed from Malwarebytes Read the original article: Scammers harvesting Facebook photos to stage fake kidnappings, warns FBI
IT Security News Hourly Summary 2025-12-08 15h : 6 posts
6 posts were published in the last hour 13:32 : Space Bears Ransomware Claims Comcast Data Theft Through QuasarBreach 13:32 : Hackers Compromising Developers with Malicious VS Code, Cursor AI Extensions 13:32 : LOLPROX Exposes Hidden Exploitation Paths that Can…
Space Bears Ransomware Claims Comcast Data Theft Through QuasarBreach
Space Bears ransowmare claims it obtained Comcast files through a breach at Quasar Inc, with threats to publish the data and separate leaks promised from Quasar itself. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech,…
Hackers Compromising Developers with Malicious VS Code, Cursor AI Extensions
The developer tools used by millions of programmers worldwide have become a prime target for attackers seeking to compromise entire organizations. Visual Studio Code and AI-powered IDEs like Cursor AI, when combined with their extension marketplaces, present a critical vulnerability…
LOLPROX Exposes Hidden Exploitation Paths that Can Enable Stealthy Hypervisor Attacks
Proxmox Virtual Environment has become a popular choice for organizations building private cloud infrastructure and virtual machine management systems. However, a new analysis reveals significant security gaps in how the hypervisor can be exploited once an attacker gains initial access…
The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel
The Kitten Project has emerged as a coordinated hacktivist platform operating at the intersection of activism and technical operations. This initiative represents a shift in how cyber-focused groups organize their campaigns, moving beyond isolated attacks toward centralized infrastructure that facilitates…
How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?
The holiday season compresses risk into a short, high-stakes window. Systems run hot, teams run lean, and attackers time automated campaigns to get maximum return. Multiple industry threat reports show that bot-driven fraud, credential stuffing and account takeover attempts intensify…
⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More
It’s been a week of chaos in code and calm in headlines. A bug that broke the internet’s favorite framework, hackers chasing AI tools, fake apps stealing cash, and record-breaking cyberattacks — all within days. If you blink, you’ll miss…
Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
Tri-Century Eye Care was targeted recently by the Pear ransomware group, which claimed to have stolen over 3 Tb of data. The post Tri-Century Eye Care Data Breach Impacts 200,000 Individuals appeared first on SecurityWeek. This article has been indexed…
Substitution Cipher Based on The Voynich Manuscript
Here’s a fun paper: “The Naibbe cipher: a substitution cipher that encrypts Latin and Italian as Voynich Manuscript-like ciphertext“: Abstract: In this article, I investigate the hypothesis that the Voynich Manuscript (MS 408, Yale University Beinecke Library) is compatible with…
Home Office kept police facial recognition flaws to itself, UK data watchdog fumes
Regulator disappointed as soon-to-be-scrapped algo’s problems remained a secret despite consistent engagement The UK’s data protection watchdog has criticized the Home Office for failing to disclose significant biases in police facial recognition technology, despite regular engagement between the organizations.… This…
Ransomware Payments Surpassed $4.5 Billion: US Treasury
Ransomware payments reached the highest level in 2023, at $1.1 billion paid in 1,512 reported incidents. The post Ransomware Payments Surpassed $4.5 Billion: US Treasury appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Hackers Target Developers Using Malicious VS Code and Cursor AI Extensions
Visual Studio Code and AI-powered IDEs such as Cursor AI and Windsurf are emerging as one of the most critical and overlooked attack surfaces in the modern software supply chain. Installed on millions of developer machines worldwide, these tools often…
Next.js Releases Scanner to Detect and Fix Apps Affected by React2Shell Vulnerability
Next.js developers have a new weapon in the fight against the critical “React2Shell” vulnerability. This new scanner offers a simple, one-line solution for development teams to identify vulnerable versions of Next.js and React Server Components (RSC) and apply the necessary…
Porsche Cars Disabled After Major Failure in Installed Satellite Security System
Hundreds of Porsche owners across Russia are facing a significant problem as their luxury cars have suddenly stopped working. The issue stems from a failure in the factory-installed security and tracking systems, which have completely shut down the vehicles. According…
CISA Adds Critical React2Shell Vulnerability to KEV Catalog After Active Exploitation
The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a high-severity vulnerability affecting Meta’s React Server Components to its Known Exploited Vulnerabilities (KEV) catalog. Assigned the identifier CVE-2025-55182, the security flaw dubbed “React2Shell” by the security community is currently being…
LOLPROX Unveils Undetected Exploitation Routes for Stealthy Hypervisor Attacks
A new security analysis has unveiled “LOLPROX,” a comprehensive catalog of “Living Off The Land” (LOL) techniques specifically targeting Proxmox Virtual Environment (VE). The research, detailed by security researcher Andy Gill (ZephrSec), highlights how threat actors can weaponize the popular…
OceanLotus Hacker Group Targeting Xinchuang IT Ecosystems to Launch Supply Chain Attacks
The OceanLotus hacker group, widely tracked as APT32, has initiated a highly targeted surveillance campaign aimed at China’s “Xinchuang” IT ecosystem. This strategic pivot focuses on compromising indigenized domestic hardware and software frameworks that were specifically designed to establish secure,…
Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes
Critical security alerts have been issued for Firebox firewall devices due to serious ten vulnerabilities. The vulnerabilities in WatchGuard, disclosed on December 4, 2025, span multiple severity levels and attack vectors. With several requiring urgent patching to prevent unauthorized code…
Portugal Updates Cybercrime Law To Protect Good-Faith Security Researchers
Portugal has updated its cybercrime law to offer legal protection to security researchers who probe systems in good faith and report vulnerabilities responsibly. The change creates a legal safe harbor for ethical hacking, turning what was previously classified as…
Palo Alto GlobalProtect Portals Face Spike in Suspicious Login Attempts
Among the developments that have disturbed security teams around the world, threat-intelligence analysts have detected a sudden and unusually coordinated wave of probing of Palo Alto Networks’ GlobalProtect remote access infrastructure. This activity appears to be influenced by the…
Fake RTO e-Challan WhatsApp Scam Resurfaces: Fraudsters Push Spyware Through Malicious APK Files
Cybercriminals have once again revived an old trick—but with a more convincing disguise. This time, scammers are exploiting the name of the official RTO e-challan system to deceive smartphone users. Over the past year, malicious APK files have been…
Portugal Revises Cybercrime Law to Protect Security Researchers
Security researchers will now be protected from prosecution in Portugal as long as they meet certain conditions This article has been indexed from www.infosecurity-magazine.com Read the original article: Portugal Revises Cybercrime Law to Protect Security Researchers
React2Shell Under Active Exploitation by China-Nexus Hackers
React2Shell (CVE-2025-55182) is under active exploitation by Earth Lamia and Jackpot Panda, risking over two million instances worldwide This article has been indexed from www.infosecurity-magazine.com Read the original article: React2Shell Under Active Exploitation by China-Nexus Hackers