Esra’a Al Shafei spoke with The Reg about the spy tech ‘global trade’ interview Digital rights activist Esra’a Al Shafei found FinFisher spyware on her device more than a decade ago. Now she’s made it her mission to surveil the…
IT Security News Hourly Summary 2025-11-08 12h : 3 posts
3 posts were published in the last hour 10:40 : The who, where, and how of APT attacks in Q2 2025–Q3 2025 10:40 : In memoriam: David Harley 10:40 : TISZA Világ – 198,520 breached accounts
The who, where, and how of APT attacks in Q2 2025–Q3 2025
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report This article has been indexed from WeLiveSecurity Read the original article: The who, where, and how of APT…
In memoriam: David Harley
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security This article has been indexed from WeLiveSecurity Read the original article: In memoriam: David Harley
TISZA Világ – 198,520 breached accounts
In late October 2025, data breached from the Hungarian political party TISZA was published online before being extensively redistributed. Stemming from a compromise of the TISZA Világ service earlier in the month, the breach exposed 200k records of personal data…
Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
A sophisticated spyware operation targeting Samsung Galaxy devices, dubbed LANDFALL, which exploited a zero-day vulnerability to infiltrate phones through seemingly innocuous images shared on WhatsApp. This campaign, active since mid-2024, allowed attackers to deploy commercial-grade Android malware capable of full…
IT Security News Hourly Summary 2025-11-08 09h : 1 posts
1 posts were published in the last hour 7:9 : AI-Powered Cyber Threats Rise: Attackers Target Manufacturing Sector
AI-Powered Cyber Threats Rise: Attackers Target Manufacturing Sector
A comprehensive new report reveals that manufacturing organizations are grappling with a dual challenge: rapidly adopting generative AI technologies while simultaneously defending against attackers who exploit these same platforms and trusted cloud services to launch sophisticated attacks. The findings underscore…
Honeypot: Requests for (Code) Repositories, (Sat, Nov 8th)
This is just a quick diary entry to report that I saw requests on my honeypot for (code) repositories: This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Honeypot: Requests for (Code) Repositories,…
New “LANDFALL” Android Malware Uses Samsung 0-Day Vulnerability Hidden in WhatsApp Images
Cybersecurity researchers at Unit 42 have uncovered a sophisticated Android spyware campaign that exploited a previously unknown zero-day vulnerability in Samsung Galaxy devices. The malware, dubbed LANDFALL, leveraged a critical vulnerability in Samsung’s image processing library to deliver commercial-grade surveillance…
Samsung Mobile Flaw Exploited as Zero-Day to Deploy LANDFALL Android Spyware
A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a “commercial-grade” Android spyware dubbed LANDFALL in targeted attacks in the Middle East. The activity involved the exploitation of CVE-2025-21042 (CVSS score: 8.8), an…
A Former Black Hat Hacker Advises Us On Security Weaknesses
Unveiling the Double-Edged Sword of AI in Cybersecurity with Brian Black In this episode of Cybersecurity Today, host Jim Love interviews Brian Black, the head of security engineering at Deep Instinct and a former black hat hacker. Brian shares his…
IT Security News Hourly Summary 2025-11-08 06h : 2 posts
2 posts were published in the last hour 5:4 : New Microsoft Teams Feature Exposes Users to Phishing and Malware Risks 4:38 : Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems
New Microsoft Teams Feature Exposes Users to Phishing and Malware Risks
Microsoft is poised to roll out a significant update to Teams, enabling users to initiate chats with anyone using just an email address—even if the recipient isn’t a Teams user. While the feature, launching in targeted releases by early November…
Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems
Cybersecurity researchers have recently discovered a new malware platform known as Atroposia, which is being promoted on dark web forums as a subscription-based hacking toolkit. The platform offers cybercriminals a remote access trojan (RAT) that can secretly control computers,…
Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware
A newly identified ransomware group, Cephalus, has emerged as a significant threat to organizations worldwide, exploiting stolen Remote Desktop Protocol (RDP) credentials to gain access to networks and deploy powerful encryption attacks. The AhnLab researchers observed in mid-June 2025 that…
How MSSPs Turn Security Alerts Into Exponential Revenue With Morpheus AI
See how Morpheus AI transforms managed security economics—delivering 24/7 autonomous coverage, unified data, and exponential returns without increasing headcount. The post How MSSPs Turn Security Alerts Into Exponential Revenue With Morpheus AI appeared first on D3 Security. The post How…
IT Security News Hourly Summary 2025-11-08 03h : 1 posts
1 posts were published in the last hour 1:33 : German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure
German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure
German hosting provider aurologic GmbH has emerged as a central facilitator within the global malicious infrastructure ecosystem, providing upstream transit and data center services to numerous high-risk hosting networks. Operating from its primary facility at Tornado Datacenter GmbH & Co.…
LLM08: Vector & Embedding Weaknesses – FireTail Blog
Nov 07, 2025 – – In 2025, with the rise of AI, we’ve seen a parallel rise in cyber risks. The OWASP Top 10 for LLM helps us categorize and understand the biggest risks we are seeing in today’s landscape.…
Satisfied with Your Cloud Security? Enhance with NHIs
What Are Non-Human Identities and Why Are They Critical for Cloud Security? Have you ever considered how Non-Human Identities (NHIs) are transforming cloud security? With technological advancements ushering in a digital transformation across industries, the safeguarding of NHIs has become…
Freedom in Cybersecurity: Choosing the Right NHIs
Could Your Organization Be Leaving the Security of Non-Human Identities to Chance? Managing Non-Human Identities (NHIs) and Secrets Security Management has become imperative. These entities, often overlooked compared to their human counterparts, are machine identities that play a crucial role…
Achieving Liberating Flexibility with Cloud NHIs
Can Flexible Security Be Achieved with Cloud NHIs? Organizations are increasingly relying on the cloud for operational efficiency and scalability. But how can businesses ensure their cloud environments remain secure without sacrificing flexibility? One compelling approach is through the management…
The Government Shutdown Is a Ticking Cybersecurity Time Bomb
Many critical systems are still being maintained, and the cloud provides some security cover. But experts say that any lapses in protections like patching and monitoring could expose government systems. This article has been indexed from Security Latest Read the…