Passkeys beat passwords in security and usability, but recovery gaps create new risks. Explore why digital identity still needs a constitutional backstop beyond passkeys. The post The Future of Passwords: Kill Them in the Flow, Keep Them in the Constitution appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Akira Ransomware Haul Surpasses $244M in Illicit Proceeds
Akira ransomware has extorted $244M since September 2025, with some attacks exfiltrating data in just two hours, a joint cybersecurity advisory warns This article has been indexed from www.infosecurity-magazine.com Read the original article: Akira Ransomware Haul Surpasses $244M in Illicit…
Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments
Cisco Talos has identified an emerging threat from Kraken, a sophisticated cross-platform ransomware group that has emerged from the remnants of the HelloKitty ransomware cartel. In August 2025, the security firm observed the Russian-speaking group conducting big-game hunting and double-extortion…
Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign
A financially motivated threat actor automated the package publishing process in a coordinated tea.xyz token farming campaign. The post Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb WAF that could allow an attacker to take over admin accounts and completely compromise a device. “The watchTowr team is seeing active, indiscriminate in-the-wild exploitation of…
Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign
State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part of a “highly sophisticated espionage campaign” in mid-September 2025. “The attackers used AI’s ‘agentic’ capabilities to an unprecedented degree –…
IT Security News Hourly Summary 2025-11-14 12h : 2 posts
2 posts were published in the last hour 10:34 : Germany’s BSI issues guidelines to counter evasion attacks targeting LLMs 10:34 : Security Degradation in AI-Generated Code: A Threat Vector CISOs Can’t Ignore
Germany’s BSI issues guidelines to counter evasion attacks targeting LLMs
Germany’s BSI warns of rising evasion attacks on LLMs, issuing guidance to help developers and IT managers secure AI systems. Germany’s BSI warns of rising evasion attacks on LLMs, issuing guidance to help developers and IT managers secure AI systems…
Security Degradation in AI-Generated Code: A Threat Vector CISOs Can’t Ignore
A new study shows LLMs introduce more vulnerabilities with each code iteration, highlighting critical risks for CISOs and the need for skilled human oversight. The post Security Degradation in AI-Generated Code: A Threat Vector CISOs Can’t Ignore appeared first on…
Kraken Cross-Platform Ransomware Attacking Windows, Linux, and VMware ESXi Systems in Enterprise Environments
In August 2025, a new ransomware threat emerged with capabilities that fundamentally changed how organizations should approach enterprise security. Kraken, a Russian-speaking cybercriminal group, began executing sophisticated attacks targeting large organizations across multiple continents. What makes Kraken particularly dangerous is…
Cl0P Ransomware Group Allegedly Claims Breach of Entrust in Oracle 0-Day EBS Hack
The notorious Cl0P ransomware group has claimed responsibility for breaching digital security firm Entrust, exploiting a critical zero-day vulnerability in Oracle E-Business Suite (EBS). The attack, tied to CVE-2025-61882, marks another high-profile victim in Cl0P’s relentless assault on organizations using…
Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover
A deceptive Chrome extension named Safery: Ethereum Wallet has emerged as a serious threat to cryptocurrency users. Published on the Chrome Web Store on November 12, 2024, this extension masquerades as a secure Ethereum wallet while secretly stealing user seed…
Critical Imunify360 AV Vulnerability Exposes 56 Million+ Linux-hosted Websites to RCE Attacks
A severe remote code execution (RCE) vulnerability has been discovered in Imunify360 AV, a widely used malware scanner protecting approximately 56 million websites. The security flaw, recently patched by CloudLinux, allows attackers to execute arbitrary commands and potentially take complete…
Imunify360 Vulnerability Could Expose Millions of Sites to Hacking
A vulnerability in ImunifyAV can be exploited for arbitrary code execution by uploading a malicious file to shared servers. The post Imunify360 Vulnerability Could Expose Millions of Sites to Hacking appeared first on SecurityWeek. This article has been indexed from…
Google Files Lawsuit to Dismantle ‘Lighthouse’ Smishing Kit
Google filed a civil lawsuit against 25 individuals accused of ties to a Chinese cyber collective known as the ‘Smishing Triad’ This article has been indexed from www.infosecurity-magazine.com Read the original article: Google Files Lawsuit to Dismantle ‘Lighthouse’ Smishing Kit
Clop claims it hacked ‘the NHS.’ Which bit? Your guess is as good as theirs
Cybercrime crew has ravaged multiple private organizations using Oracle EBS zero-day for months The UK’s National Health Service (NHS) is investigating claims of a cyberattack by extortion crew Clop.… This article has been indexed from The Register – Security Read…
Washington Post notifies 10,000 individuals affected in Oracle-linked data theft
The Washington Post alerts nearly 10,000 employees and contractors that personal and financial data was exposed in the Oracle breach. The Washington Post warns nearly 10,000 staff and contractors that personal and financial data was exposed in the Oracle breach.…
Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company’s Silent Patch
Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb WAF that could allow an attacker to take over admin accounts and completely compromise a device. “The watchTowr team is seeing active, indiscriminate in-the-wild exploitation of…
Washington Post Oracle E-Suite Breach Exposes Data of Over 9,000 Staff and Contractors
The Washington Post disclosed a significant data breach affecting more than 9,700 employees and contractors following an external system compromise targeting its Oracle E-Suite infrastructure. The breach, which occurred on July 10, 2025, went undetected for nearly 3.5 months before…
Critical Zoho Analytics Plus Flaw Allows Attackers to Run Arbitrary SQL Queries
A critical unauthenticated SQL injection vulnerability has been discovered in Zoho Analytics Plus on-premise, posing a severe risk to organizations running affected versions. Tracked as CVE-2025-8324, this flaw enables attackers to execute arbitrary SQL queries without authentication, potentially leading to…
Without a vCISO, Your Startup’s Security Is Running on Luck
What do you think is the startup illusion of safety? If there is any? Baby organizations tend to believe “we’re small, we’re agile, risk is low” when it comes to cybersecurity. That belief might not have been dangerous a few…
EU Probes Google Over Publisher Rankings
European Commission said Google crackdown on commercial content hosted by publishers may unfairly restrict legitimate revenue source This article has been indexed from Silicon UK Read the original article: EU Probes Google Over Publisher Rankings
Critical Imunify360 Vulnerability Exposes Millions of Linux-Hosted Sites to RCE Attacks
A critical Remote Code Execution vulnerability has been patched in Imunify360 AV, a security product protecting approximately 56 million websites worldwide. Hosting companies must apply the patch immediately to prevent potential server compromises. The vulnerability details began circulating in late…
The UK’s Four-Step Framework for Supply Chain Resilience
Ransomware attacks can ripple through supply chains, causing serious disruption and massive financial consequences for multiple businesses in one fell swoop. As such, CISOs are spending more time considering how to keep operations secure as ecosystems span across dozens, if…