Kosovo man Liridon Masurica pleaded guilty to running the cybercrime marketplace BlackDB. He was arrested in 2024. Kosovo citizen Liridon Masurica (33) of Gjilan, aka @blackdb, pleaded guilty to running the BlackDB cybercrime market. Kosovo police arrested Masurica on December…
kkRAT Exploits Network Protocols to Exfiltrate Clipboard Data
The threat actor delivers three Remote Access Trojans (RATs)—ValleyRAT, FatalRAT, and a newly discovered RAT dubbed kkRAT—via phishing sites hosted on GitHub Pages. These sites masquerade as legitimate software installers for popular applications. In each instance, a ZIP archive contains…
Palo Alto Networks User-ID Agent Flaw Leaks Passwords in Cleartext
A newly disclosed vulnerability in the Palo Alto Networks User-ID Credential Agent on Windows systems allows service account passwords to be exposed in cleartext under certain non-default configurations. Tracked as CVE-2025-4235, the flaw carries a CVSS base score of 4.2…
A Practical Guide to API Threat Analytics in Cloud Platforms
Any modern application is centered around APIs. They drive mobile applications, link business systems, and deliver new digital experiences. However, the convenience has its own risks — attackers often use APIs to break into systems. Basic security steps like authentication…
Brussels faces privacy crossroads over encryption backdoors
Over 600 security boffins say planned surveillance crosses the line Europe, long seen as a bastion of privacy and digital rights, will debate this week whether to enforce surveillance on citizens’ devices.… This article has been indexed from The Register…
Email Security Startup AegisAI Launches With $13 Million in Funding
AegisAI uses autonomous AI agents to prevent phishing, malware, and BEC attacks from reaching inboxes. The post Email Security Startup AegisAI Launches With $13 Million in Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
AI Emerges as the Hope—and Risk—for Overloaded SOCs
With security teams drowning in alerts, many suppress detection rules and accept hidden risks. AI promises relief through automation and triage—but without human oversight, it risks becoming part of the problem. The post AI Emerges as the Hope—and Risk—for Overloaded…
Senator Urges FTC Probe of Microsoft Over Security Failures
Senator Ron Wyden’s complaints focus on Windows security and the Kerberoasting attack technique. The post Senator Urges FTC Probe of Microsoft Over Security Failures appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Senator…
IT Security News Hourly Summary 2025-09-11 12h : 9 posts
9 posts were published in the last hour 10:4 : PoisonSeed Threat Actor Strengthens Credential Theft Operations with New Domains 10:3 : Attackers abuse ConnectWise ScreenConnect to drop AsyncRAT 10:3 : Zero Outages, Full Visibility: How PacificSource Automated SSL TLS…
Why File Integrity Monitoring (FIM) Is a Must for Compliance — And How to Pick the Right Solution
As Fortra’s new File Integrity Monitoring Buyer’s Guide states, “What was once a security control for simple file changes now ensures integrity across organizations’ entire systems.” The landscape has evolved significantly since Fortra’s Tripwire introduced file integrity monitoring (FIM) over…
‘Astronaut-in-distress’ romance scammer steals money from elderly woman
A Japanese octogenarian lost thousands of dollars after being scammed by someone who described himself as an astronaut in need of help. This article has been indexed from Malwarebytes Read the original article: ‘Astronaut-in-distress’ romance scammer steals money from elderly…
Default Cursor setting can be exploited to run malicious code on developers’ machines
An out-of-the-box setting in Cursor, a popular AI source-code editor, could be leveraged by attackers to covertly run malicious code on users’ computers, researchers have warned. An exploitable vulnerability in the Cursor AI editor Cursor is an AI-augmented fork of…
ChillyHell macOS Malware Resurfaces, Using Google.com as a Decoy
A previously dormant macOS threat, ChillyHell, is reviving. Read how this malware can bypass security checks, remain hidden,… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: ChillyHell macOS…
NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges
NVIDIA has released a security update for its NVDebug tool to address three high-severity vulnerabilities that could allow an attacker to escalate privileges, execute code, and tamper with data. The company is urging users to immediately install the latest version…
Attacker steals customer data from Brit rail operator LNER during break-in at supplier
Major UK player cagey on specifics but latest attack follows string blamed on ‘third party’ suppliers One of the UK’s largest rail operators, LNER, is the latest organization to spill user data via a third-party data breach.… This article has…
Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance
Oligo Security has shared details on an Apple CarPlay attack that hackers may be able to launch without any interaction. The post Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance appeared first on SecurityWeek. This article has…
France: Three Regional Healthcare Agencies Targeted by Cyber-Attacks
Compromised data includes personal data such as patients’ full names, ages, phone numbers and email addresses This article has been indexed from www.infosecurity-magazine.com Read the original article: France: Three Regional Healthcare Agencies Targeted by Cyber-Attacks
PoisonSeed Threat Actor Strengthens Credential Theft Operations with New Domains
Spoof the email delivery platform SendGrid and employ fake Cloudflare CAPTCHA interstitials to lend legitimacy before redirecting unsuspecting users to credential harvesting pages. Since June 1, 2025, DomainTools Investigations has identified 21 newly registered domains exhibiting hallmarks of the eCrime…
Attackers abuse ConnectWise ScreenConnect to drop AsyncRAT
Hackers exploit ConnectWise ScreenConnect to drop AsyncRAT via scripted loaders, stealing data and persisting with a fake Skype updater. LevelBlue researchers warn of a campaign abusing ConnectWise ScreenConnect to deploy AsyncRAT. Attackers use VBScript/PowerShell loaders and achieve persistence via a fake…
Zero Outages, Full Visibility: How PacificSource Automated SSL TLS Certificate Lifecycle Management
In healthcare, every second counts. From electronic health records (EHR) to patient portals and claims processing systems, secure digital communication is the backbone of delivering care and protecting sensitive patient information. That security relies on SSL/TLS certificates—and the rules governing…
Cracking the Boardroom Code: Helping CISOs Speak the Language of Business
CISOs know their field. They understand the threat landscape. They understand how to build a strong and cost-effective security stack. They understand how to staff out their organization. They understand the intricacies of compliance. They understand what it takes to…
Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts
Cybersecurity researchers have disclosed two new campaigns that are serving fake browser extensions using malicious ads and fake websites to steal sensitive data. The malvertising campaign, per Bitdefender, is designed to push fake “Meta Verified” browser extensions named SocialMetrics Pro…
ZynorRAT Exploits Windows and Linux Systems to Gain Remote Access
During a recent threat hunting exercise, the Sysdig Threat Research Team (TRT) identified a new sample dubbed ZynorRAT. This Go-based Remote Access Trojan (RAT) delivers a comprehensive suite of custom command-and-control (C2) capabilities for both Linux and Windows systems. First…
Experts scrutinized Ofcom’s Online Safety Act governance. They’re concerned
Academics and OSA stakeholders say Ofcom needs to take a closer look at how controversial legislation is enforced Industry experts expressed both concern and sympathy for Ofcom, the Brit regulator that is overseeing the Online Safety Act, as questions mount…