Envoy Air, a wholly owned subsidiary of American Airlines, has confirmed it fell victim to a hacking campaign exploiting vulnerabilities in Oracle’s E-Business Suite (EBS). The breach, first highlighted by the notorious Clop ransomware group, underscores the growing risks facing…
Microsoft Ends Support for Windows 10: Millions of PCs Now at Security Risk
Microsoft has officially stopped supporting Windows 10, marking a major change for millions of users worldwide. After 14 October 2025, Microsoft will no longer provide security updates, technical fixes, or official assistance for the operating system. While computers running…
IT Security News Hourly Summary 2025-10-18 18h : 2 posts
2 posts were published in the last hour 16:2 : Authorities Shut Down Cybercrime-as-a-Service, Seize 40,000 SIM Cards 15:32 : From Airport chaos to cyber intrigue: Everest Gang takes credit for Collins Aerospace breach
Authorities Shut Down Cybercrime-as-a-Service, Seize 40,000 SIM Cards
Law enforcement authorities across Europe have dismantled a sophisticated cybercrime-as-a-service operation that enabled criminals to commit widespread fraud and other serious offenses across the continent. The coordinated action, codenamed ‘SIMCARTEL’, resulted in seven arrests, the seizure of over 40,000 active…
From Airport chaos to cyber intrigue: Everest Gang takes credit for Collins Aerospace breach
Everest claims Collins Aerospace hack hitting EU airports, but its leak site vanishes soon after, sparking takedown speculation. Do you remember the Collins Aerospace supply chain attack that disrupted operations at several major European airports, including Heathrow in London, Brussels,…
Stop Reacting, Start Strategizing: A New Era for Cybersecurity and DR
People making cybersecurity and disaster recovery (DR) decisions today often operate as if they’re in a vacuum. Their company has a need – perhaps they have to create a copy… The post Stop Reacting, Start Strategizing: A New Era for…
New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft
Threat actors are leveraging Microsoft Azure Blob Storage to craft highly convincing phishing sites that mimic legitimate Office 365 login portals, putting Microsoft 365 users at severe risk of credential theft. This method exploits trusted Microsoft infrastructure, making the attacks…
Global Ransomware Groups Hit Record High as Smaller Threat Actors Emerge
The number of active ransomware groups has reached an unprecedented high, marking a new phase in the global cyber threat landscape. According to GuidePoint Security’s latest Ransomware & Cyber Threat Report, the total number of active groups surged 57%,…
Astaroth Malware Adopts GitHub Infrastructure to Target Crypto Investors
A new attack is now underway involving the notorious Astaroth banking Trojan, a banking Trojan which is used to steal cryptocurrency credentials, and cybersecurity researchers at McAfee have discovered that this Trojan exploited the GitHub platform for distribution. This…
Crypto Vanishes: North Korea’s $2B Heist, Discord Breach Exposes Millions
North Korean hackers have stolen over $2 billion in cryptocurrency in 2025, while a Discord breach exposed sensitive user data, including government IDs of approximately 70,000 individuals. These incidents highlight the growing sophistication of cyber threats targeting both financial…
John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
The investigation into former national security advisor John Bolton's handling of classified material stemmed in part from an admission Bolton made to the FBI in July 2021 that hackers – believed to be from Iran – had breached his private…
Rethinking Cybersecurity in the Age of AI: Risk, Resilience, and Our New Cyber Reality
The AI revolution is entering a critical new phase. It’s not just about the promise of AI anymore, but also about the new vulnerabilities it introduces. As a cybersecurity leader,… The post Rethinking Cybersecurity in the Age of AI: Risk,…
New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a previously undocumented .NET malware dubbed CAPI Backdoor. According to Seqrite Labs, the attack chain involves distributing phishing emails containing…
Critical Zimbra SSRF Flaw Exposes Sensitive Data
Zimbra has released an emergency security patch to address a critical Server-Side Request Forgery (SSRF) vulnerability that could allow attackers to access sensitive data through the platform’s chat proxy configuration. The flaw, classified as high severity, affects Zimbra versions 10.1.5…
Hackers Dox ICE, DHS, DOJ, and FBI Officials
Plus: A secret FBI anti-ransomware task force gets exposed, the mystery of the CIA’s Kryptos sculpture is finally solved, North Koreans busted hiding malware in the Ethereum blockchain, and more. This article has been indexed from Security Latest Read the…
SIMCARTEL operation: Europol takes down SIM-Box ring linked to 3,200 scams
Europol’s SIMCARTEL operation shut down a SIM-box network behind 3,200 frauds and €4.5M losses, using 40,000 SIMs for scams and extortion. Europol’s “SIMCARTEL” operation dismantled an illegal SIM-box network tied to over 3,200 fraud cases and €4.5M in losses. The…
Microsoft Windows 11 October Update Disrupts Localhost (127.0.0.1) Connectivity
Microsoft’s October 2025 Windows 11 update has introduced an unexpected connectivity issue affecting developers and IT professionals worldwide. The security patch KB5066835, released on October 14, 2025, for OS Builds 26200.6899 and 26100.6899, has disrupted localhost connections, preventing applications from…
PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution
A proof-of-concept exploit for two critical vulnerabilities in the popular file archiver 7-Zip, potentially allowing attackers to execute arbitrary code remotely through malicious ZIP files. The flaws, tracked as CVE-2025-11001 and CVE-2025-11002, were disclosed by the Zero Day Initiative (ZDI)…
Authorities Dismantle Cybercrime-as-a-Service Platform, Seize 40,000 Active SIM Cards
An international law enforcement operation has dismantled a large-scale cybercrime-as-a-service network responsible for fueling thousands of online fraud cases across Europe. The operation, known as SIMCARTEL, took place on 10 October 2025 in Latvia and resulted in five arrests, the…
PoC Exploit Released for 7-Zip Vulnerabilities that Let Attackers Execute Arbitrary Code Remotely
A proof-of-concept exploit for two critical vulnerabilities in the popular file archiver 7-Zip, potentially allowing attackers to execute arbitrary code remotely through malicious ZIP files. The flaws, tracked as CVE-2025-11001 and CVE-2025-11002, were disclosed by the Zero Day Initiative (ZDI)…
IT Security News Hourly Summary 2025-10-18 09h : 2 posts
2 posts were published in the last hour 7:2 : Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT 6:32 : Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data
Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT
The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to target Japan and Malaysia with another remote access trojan (RAT) tracked as HoldingHands RAT (aka Gh0stBins). “The…
Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data
A newly disclosed Server-Side Request Forgery (SSRF) flaw in Zimbra Collaboration Suite has raised major security concerns, prompting administrators to patch systems immediately. The issue, identified in the chat proxy configuration component, could allow attackers to gain unauthorized access to…
Exploring the Dark Web: A Conversation with Criminologist David Decary-Hetu
In this episode, Jim Love interviews David Decary-Hetu, a criminologist at the University of Montreal, discussing the dark web and its impact on criminal activity and cybersecurity. They delve into what the dark web is, how it operates, its primary…