Indian government entities have been targeted in two campaigns undertaken by a threat actor that operates in Pakistan using previously undocumented tradecraft. The campaigns have been codenamed Gopher Strike and Sheet Attack by Zscaler ThreatLabz, which identified them in September…
WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
Meta on Tuesday announced it’s adding Strict Account Settings on WhatsApp to secure certain users against advanced cyber attacks because of who they are and what they do. The feature, similar to Lockdown Mode in Apple iOS and Advanced Protection…
ShinyHunters Target 100+ Firms Using Phone Calls to Bypass SSO Security
ShinyHunters is driving attacks on 100+ organisations, using vishing and fake login pages with allied groups to bypass SSO and steal company data, reports Silent Push. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and…
Lawsuit Claims Meta Can Access WhatsApp Messages Despite Encryption Promises
A class-action lawsuit alleges Meta can access WhatsApp messages despite encryption claims, raising new privacy concerns. The post Lawsuit Claims Meta Can Access WhatsApp Messages Despite Encryption Promises appeared first on eSecurity Planet. This article has been indexed from eSecurity…
Fighting The Next Evolution of Email Threats With Layered, AI-Driven Security
For decades, email has been the backbone of corporate communications and for precisely this reason, it remains the attacker’s preferred gateway into organisations. Phishing, Business Email Compromise (BEC), and supply chain attacks continue to increase, with adversaries using AI and…
Keyfactor Allies with IBM Consulting to Spur PQC Adoption
Keyfactor has partnered with IBM Consulting to enable organizations to accelerate adoption of post-quantum cryptography (PQC) before existing legacy encryption schemes might be cracked later this decade. Under the terms of the non-exclusive alliance, the cryptographic discovery, public key infrastructure…
Microsoft’s Patch Fixes Are Breaking Windows, Forcing a Second Emergency Update
Microsoft issued a second emergency Windows patch in January after earlier fixes caused new bugs, raising concerns about update quality and reliability. The post Microsoft’s Patch Fixes Are Breaking Windows, Forcing a Second Emergency Update appeared first on TechRepublic. This…
Pyodide Sandbox Escape Enables Remote Code Execution in Grist-Core
Critical sandbox escape vulnerability in Grist-Core enables remote code execution via a malicious formula This article has been indexed from www.infosecurity-magazine.com Read the original article: Pyodide Sandbox Escape Enables Remote Code Execution in Grist-Core
IT Security News Hourly Summary 2026-01-27 18h : 6 posts
6 posts were published in the last hour 16:34 : Shadowserver finds 6,000+ likely vulnerable SmarterMail servers exposed online 16:34 : APT Attacks Target Indian Government Using SHEETCREEP, FIREPOWER, and MAILCREEP | Part 2 16:34 : Interconnectedness, extortion risk make…
Shadowserver finds 6,000+ likely vulnerable SmarterMail servers exposed online
Shadowserver researchers found 6,000+ SmarterMail servers exposed online and likely vulnerable to a critical auth bypass flaw. Nonprofit security organization Shadowserver reported that over 6,000 SmarterMail servers are exposed on the internet and likely vulnerable to attacks exploiting a critical…
APT Attacks Target Indian Government Using SHEETCREEP, FIREPOWER, and MAILCREEP | Part 2
This is Part 2 of our two-part technical analysis on the Gopher Strike and Sheet Attack campaigns. For details on the Gopher Strike campaign, go to Part 1.IntroductionIn September 2025, Zscaler ThreatLabz uncovered three additional backdoors, SHEETCREEP, FIREPOWER, and MAILCREEP,…
Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority
A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Interconnectedness, extortion risk make cybersecurity…
6000+ Vulnerable SmarterTools SmarterMail Servers Exposed to Actively Exploited RCE Vulnerability
Over 6,000 SmarterMail servers exposed on the internet are running vulnerable versions that are at risk of active remote code execution (RCE) attacks. Security researchers identified the flaws through daily HTTP vulnerability scans, and exploitation attempts have already been observed…
MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules
MEDUSA, an AI-first Static Application Security Testing (SAST) tool boasting 74 specialized scanners and over 180 AI agent security rules. This open-source CLI scanner targets modern development challenges like false positives and multi-language coverage. MEDUSA consolidates security scanning across 42+…
Hackers are Leveraging SEO Poisoning to Attack Users Looking for Legitimate Tools
Cybercriminals have adopted a deceptive strategy to compromise users searching for common software applications online. These attackers are using search engine optimization poisoning techniques to place malicious links at the top of search results. When unsuspecting users click on these…
Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage. That’s a Business Problem
Security Operations Centers live or die by their ability to respond quickly and accurately to alerts. At the heart of this process is alert triage — the initial evaluation that decides whether an alert is a real incident, a false positive, or something that needs immediate…
Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors
Threat actors have started targeting companies in the insurance, e-commerce, and IT sectors through a critical vulnerability tracked as CVE-2025-55182, commonly known as React2Shell. This flaw exists in the Flight protocol that handles client-server communication for React Server Components, allowing…
China-linked group accused of spying on phones of UK prime ministers’ aides – for years
Reports say Salt Typhoon attackers accessed handsets of senior govt folk Chinese state-linked hackers are accused of spending years inside the phones of senior Downing Street officials, exposing private communications at the heart of the UK government.… This article has…
Memcyco Raises $37 Million for Anti-Impersonation Technology
The startup will use the investment to fuel global expansion of its agentless platform, including in Latin America. The post Memcyco Raises $37 Million for Anti-Impersonation Technology appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
PeckBirdy Framework Tied to China-Aligned Cyber Campaigns
PeckBirdy command-and-control framework targeting gambling, government sectors in Asia since 2023 has been linked to China-aligned APTs This article has been indexed from www.infosecurity-magazine.com Read the original article: PeckBirdy Framework Tied to China-Aligned Cyber Campaigns
Living Off the Web: How Fake Captcha Turned Trust Into a Malware Delivery Channel
Fake Captcha abuses trusted web interactions to deliver malware and evade traditional detection. The post Living Off the Web: How Fake Captcha Turned Trust Into a Malware Delivery Channel appeared first on eSecurity Planet. This article has been indexed from…
U.S. CISA adds Microsoft Office, GNU InetUtils, SmarterTools SmarterMail, and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Office, GNU InetUtils, SmarterTools SmarterMail, and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Microsoft Office, GNU InetUtils, SmarterTools SmarterMail, and Linux Kernel flaws…
AI Agents Are Booking Travel: How Businesses Can Enable Revenue & Minimize Risk
AI agents are booking travel at scale. Learn how to enable agentic commerce, stop agent hijacking and loyalty fraud, and protect your revenue. The post AI Agents Are Booking Travel: How Businesses Can Enable Revenue & Minimize Risk appeared first…
WhatsApp-Based Astaroth Banking Trojan Targets Brazilian Users in New Malware Campaign
A fresh look at digital threats shows malicious software using WhatsApp to spread the Astaroth banking trojan, mainly affecting people in Brazil. Though messaging apps are common tools for connection, they now serve attackers aiming to steal financial data.…