The Iranian state-sponsored hacking group known as MuddyWater has been identified deploying a new backdoor named UDPGangster The post MuddyWater Uses UDPGangster In Campaign first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original article: MuddyWater…
Sneeit RCE And ICTBroadcast Bug Power Attacks
A critical security flaw in the Sneeit Framework plugin for WordPress is being actively exploited, according to data from Wordfence. The post Sneeit RCE And ICTBroadcast Bug Power Attacks first appeared on CyberMaterial. This article has been indexed from CyberMaterial…
US Contributes to 44% of Cyber Attacks; Public Administration Targeted for Financial Gains
Global cybercrime is accelerating toward a projected cost of 15.63 trillion dollars by 2029, up from an estimated 10.5 trillion dollars today, as criminals exploit new technologies faster than businesses can defend against them. Yet 59% of organisations say they…
Hackers Exploit Multiple Ad Networks to Distribute Triada Malware to Android Users
Adex, the anti-fraud and traffic-quality platform operating under AdTech Holding, has successfully identified and neutralized a sophisticated, multi-year malware operation linked to the infamous Triada Trojan. This campaign, which has persistently targeted the mobile advertising ecosystem, underscores the evolving dangers…
Apple, Google, and Samsung May Soon Activate Always-On GPS in India
India’s government is considering a controversial proposal that could require smartphone manufacturers to enable satellite location tracking on all devices permanently. The plan has sparked significant backlash from major tech companies, including Apple, Google, and Samsung, who argue the measure…
NVIDIA and Lakera AI Propose Unified Framework for Agent Safety
NVIDIA and Lakera AI have introduced a groundbreaking unified security and safety framework designed to address the emerging challenges posed by autonomous AI agents in enterprise environments. This collaborative effort represents a significant step forward in making agentic systems AI…
Exposing the Core Functionalities of QuasarRAT: Encrypted Configuration and Obfuscation Techniques
In the second installment of the “Advent of Configuration Extraction” series, security researchers have unwrapped QuasarRAT, a widely-deployed .NET remote access trojan (RAT), revealing sophisticated techniques for extracting its encrypted configuration from both clean and obfuscated binary samples. The analysis…
UK moves to strengthen undersea cable defenses as Russian snooping ramps up
Atlantic Bastion combines AI systems with warships to counter increased surveillance The UK government has announced enhanced protection for undersea cables using autonomous vessels alongside crewed warships and aircraft, responding to escalating Russian surveillance activities.… This article has been indexed…
AWS: China-linked threat actors weaponized React2Shell hours after disclosure
Multiple China-linked threat actors began exploiting the CVE-2025-55182, aka React2Shell flaw, within hours, AWS Security warns. Multiple China-linked threat actors began exploiting the CVE-2025-55182, also known as the React2Shell flaw, within hours, according to AWS Security. The researchers confirmed that…
Scammers harvesting Facebook photos to stage fake kidnappings, warns FBI
Family photos pulled from social media are being used as “proof-of-life” in virtual kidnapping scams, the FBI warns. This article has been indexed from Malwarebytes Read the original article: Scammers harvesting Facebook photos to stage fake kidnappings, warns FBI
IT Security News Hourly Summary 2025-12-08 15h : 6 posts
6 posts were published in the last hour 13:32 : Space Bears Ransomware Claims Comcast Data Theft Through QuasarBreach 13:32 : Hackers Compromising Developers with Malicious VS Code, Cursor AI Extensions 13:32 : LOLPROX Exposes Hidden Exploitation Paths that Can…
Space Bears Ransomware Claims Comcast Data Theft Through QuasarBreach
Space Bears ransowmare claims it obtained Comcast files through a breach at Quasar Inc, with threats to publish the data and separate leaks promised from Quasar itself. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech,…
Hackers Compromising Developers with Malicious VS Code, Cursor AI Extensions
The developer tools used by millions of programmers worldwide have become a prime target for attackers seeking to compromise entire organizations. Visual Studio Code and AI-powered IDEs like Cursor AI, when combined with their extension marketplaces, present a critical vulnerability…
LOLPROX Exposes Hidden Exploitation Paths that Can Enable Stealthy Hypervisor Attacks
Proxmox Virtual Environment has become a popular choice for organizations building private cloud infrastructure and virtual machine management systems. However, a new analysis reveals significant security gaps in how the hypervisor can be exploited once an attacker gains initial access…
The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel
The Kitten Project has emerged as a coordinated hacktivist platform operating at the intersection of activism and technical operations. This initiative represents a shift in how cyber-focused groups organize their campaigns, moving beyond isolated attacks toward centralized infrastructure that facilitates…
How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?
The holiday season compresses risk into a short, high-stakes window. Systems run hot, teams run lean, and attackers time automated campaigns to get maximum return. Multiple industry threat reports show that bot-driven fraud, credential stuffing and account takeover attempts intensify…
âš¡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More
It’s been a week of chaos in code and calm in headlines. A bug that broke the internet’s favorite framework, hackers chasing AI tools, fake apps stealing cash, and record-breaking cyberattacks — all within days. If you blink, you’ll miss…
Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
Tri-Century Eye Care was targeted recently by the Pear ransomware group, which claimed to have stolen over 3 Tb of data. The post Tri-Century Eye Care Data Breach Impacts 200,000 Individuals appeared first on SecurityWeek. This article has been indexed…
Substitution Cipher Based on The Voynich Manuscript
Here’s a fun paper: “The Naibbe cipher: a substitution cipher that encrypts Latin and Italian as Voynich Manuscript-like ciphertext“: Abstract: In this article, I investigate the hypothesis that the Voynich Manuscript (MS 408, Yale University Beinecke Library) is compatible with…
Home Office kept police facial recognition flaws to itself, UK data watchdog fumes
Regulator disappointed as soon-to-be-scrapped algo’s problems remained a secret despite consistent engagement The UK’s data protection watchdog has criticized the Home Office for failing to disclose significant biases in police facial recognition technology, despite regular engagement between the organizations.… This…
Ransomware Payments Surpassed $4.5 Billion: US Treasury
Ransomware payments reached the highest level in 2023, at $1.1 billion paid in 1,512 reported incidents. The post Ransomware Payments Surpassed $4.5 Billion: US Treasury appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Hackers Target Developers Using Malicious VS Code and Cursor AI Extensions
Visual Studio Code and AI-powered IDEs such as Cursor AI and Windsurf are emerging as one of the most critical and overlooked attack surfaces in the modern software supply chain. Installed on millions of developer machines worldwide, these tools often…
Next.js Releases Scanner to Detect and Fix Apps Affected by React2Shell Vulnerability
Next.js developers have a new weapon in the fight against the critical “React2Shell” vulnerability. This new scanner offers a simple, one-line solution for development teams to identify vulnerable versions of Next.js and React Server Components (RSC) and apply the necessary…
Porsche Cars Disabled After Major Failure in Installed Satellite Security System
Hundreds of Porsche owners across Russia are facing a significant problem as their luxury cars have suddenly stopped working. The issue stems from a failure in the factory-installed security and tracking systems, which have completely shut down the vehicles. According…