Elastic has disclosed a security incident stemming from a third-party breach at Salesloft Drift, which resulted in unauthorized access to an internal email account containing valid credentials. While the company’s core Salesforce environment was not impacted, the incident exposed sensitive…
Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure
Cybersecurity researchers began tracking a sophisticated campaign in the closing months of 2024, targeting both government and corporate networks across multiple continents. The threat actors behind this operation, known colloquially as Salt Typhoon and UNC4841, leveraged overlapping infrastructure and shared…
Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations
The attacker deployed multiple malware families, including two backdoors and a proxy tunneller, and various reconnaissance tools. The post Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them
⚠️ One click is all it takes. An engineer spins up an “experimental” AI Agent to test a workflow. A business unit connects to automate reporting. A cloud platform quietly enables a new agent behind the scenes. Individually, they look…
TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs
Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks targeting exposed Docker APIs. Akamai, which discovered the latest activity last month, said it’s designed to block other actors from accessing…
From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks
Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote access trojan called MostereRAT. The phishing attack incorporates a number of advanced evasion techniques to gain complete control over compromised systems, siphon sensitive data, and…
Chinese Cyber Espionage Campaign Impersonates US Congressman
A House select committee said Chinese actors impersonated Representative John Moolenaar to steal information that could be used to influence trade talks This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Cyber Espionage Campaign Impersonates US Congressman
IT Security News Hourly Summary 2025-09-09 12h : 9 posts
9 posts were published in the last hour 9:32 : How Leading CISOs are Getting Budget Approval 9:7 : New Malware Exploits Exposed Docker APIs to Gain Persistent Root SSH Access 9:7 : Finally, a Windows desktop I can confidently…
Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed
An analysis of the Gentlemen ransomware group, which employs advanced, adaptive tactics, techniques, and procedure to target critical industries worldwide. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Unmasking The Gentlemen Ransomware:…
SpamGPT: New AI Email Attack Tool Fueling Massive Phishing Operations
A novel AI-driven email attack toolkit named SpamGPT has surfaced on underground hacking forums, promising cybercriminals an all-in-one platform for launching large-scale phishing campaigns. Advertised as an “AI-powered spam-as-a-service” solution, SpamGPT automates compromise of email servers, bypasses major spam filters, and offers…
New Cyber Attack Exploits DeskSoft to Spread Malware via RDP Command Execution
An emerging threat campaign has been identified that weaponizes a trojanized version of DeskSoft’s EarthTime application to deploy sophisticated malware, leveraging Remote Desktop Protocol (RDP) access for command execution and network reconnaissance. Security analysts attribute the intrusion to an affiliate…
A New Platform Is Launching to Protect Public Servants From an Angry Mob
From data-removal services to threat monitoring, the Public Service Alliance says its new marketplace will help public servants defend themselves in an era of data brokers and political violence. This article has been indexed from Security Latest Read the original…
Scientists build quantum computers that snap together like LEGO bricks
Like LEGO for the quantum age, researchers have created modular superconducting qubits that can be linked with high fidelity. This design allows reconfiguration, upgrades, and scalability, marking a big step toward fault-tolerant quantum computers. This article has been indexed from…
Anthropic’s Claude Code runs code to test if it is safe – which might be a big mistake
AI security reviews add new risks, say researchers App security outfit Checkmarx says automated reviews in Anthropic’s Claude Code can catch some bugs but miss others – and sometimes create new risks by executing code while testing it.… This article…
Nokia successor HMD spawns secure device biz with Euro-made smartphone
Ivalo XE handset targets governments and security critical sectors, though Qualcomm silicon keeps it tied to the US Finnish phone maker HMD Global is launching a business unit called HMD Secure to target governments and other security-critical customers, and has…
Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion
The industrial cybersecurity firm will become a wholly owned subsidiary of Mitsubishi Electric. The post Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Silobreaker Requirements enables teams to improve threat intelligence
Silobreaker has launched Requirements, a new way for threat intelligence (TI) teams to define, operationalize and measure Priority Intelligence Requirements (PIRs). The new capability combines a PIR library with integrated monitoring tools and performance metrics, covering use cases across cyber…
How Leading CISOs are Getting Budget Approval
It’s budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you’re a CISO or security leader, you’ve likely found yourself explaining why your program matters, why a given tool or headcount is essential, and how the next…
New Malware Exploits Exposed Docker APIs to Gain Persistent Root SSH Access
The Akamai Hunt Team has uncovered a new strain of malware that targets exposed Docker APIs with expanded infection capabilities. First observed in August 2025 within Akamai’s honeypot infrastructure, this variant diverges from the June 2025 Trend Micro report by…
Finally, a Windows desktop I can confidently put away my iMac for
Lenovo’s Legion T5 is a powerhouse gaming desktop that delivers top-notch performance at a midrange price. But not everyone will love its physical design. This article has been indexed from Latest news Read the original article: Finally, a Windows desktop…
New Technique Uncovered To Exploit Linux Kernel Use-After-Free Vulnerability
A new technique to exploit a complex use-after-free (UAF) vulnerability in the Linux kernel successfully bypasses modern security mitigations to gain root privileges. The method targets CVE-2024-50264, a difficult-to-exploit race condition bug in the AF_VSOCK subsystem that was recognized with a Pwnie…
SpamGPT – AI-powered Attack Tool Used By Hackers For Massive Phishing Attack
A sophisticated new cybercrime toolkit named SpamGPT is enabling hackers to launch massive and highly effective phishing campaigns by combining artificial intelligence with the capabilities of professional email marketing platforms. Marketed on the dark web as a “spam-as-a-service” platform, SpamGPT…
Elastic Salesloft Drift Security Incident – Hackers Accessed Email Account Contains Valid Credentials
Elastic has disclosed a security incident stemming from a third-party breach at Salesloft Drift, which resulted in unauthorized access to an internal email account containing valid credentials. While the company’s core Salesforce environment was not impacted, the incident exposed sensitive…
Plex Urges Password Resets Following Data Breach
Hackers accessed emails, usernames, password hashes, and authentication data stored in a Plex database. The post Plex Urges Password Resets Following Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Plex Urges…