Authorities in France, Belgium, and Cyprus initiated the investigation into a massive money laundering operation connected to a widespread crypto The post Nine Arrested In Crypto Laundering first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the…
Ex Cyber Employees Extort US Firms
U.S. federal prosecutors have charged three Florida men—Ryan Clifford Goldberg, Kevin Tyler Martin, and an unindicted accomplice The post Ex Cyber Employees Extort US Firms first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original article:…
IT Security News Hourly Summary 2025-11-06 15h : 11 posts
11 posts were published in the last hour 13:34 : Cavalry Werewolf Hit Russian Government with New ShellNET Backdoor 13:34 : Cisco Confirms Active Exploitation of Secure ASA and FTD RCE Vulnerability 13:34 : Iranian Hackers Exploit RMM Tools to…
Cavalry Werewolf Hit Russian Government with New ShellNET Backdoor
Doctor Web uncovers a targeted cyberattack on a Russian government body by the Cavalry Werewolf group using a new ShellNET backdoor and Telegram-based control. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and…
Cisco Confirms Active Exploitation of Secure ASA and FTD RCE Vulnerability
Cisco has issued a critical warning about ongoing attacks targeting a severe remote code execution vulnerability affecting its Secure Firewall, Adaptive Security Appliance, and Threat Defense Software. The company updated its security advisory on November 5, 2025, revealing that threat…
Iranian Hackers Exploit RMM Tools to Target Academics and Foreign-Policy Experts
Proofpoint Threat Research has identified a previously unknown Iranian threat actor, dubbed UNK_SmudgedSerpent, that conducted sophisticated phishing campaigns against academics and foreign policy experts between June and August 2025. The group employed credential harvesting techniques, sophisticated social engineering, and remote…
SonicWall cloud backup hack was the work of a state actor
Incident responders from Mandiant have wrapped up their investigation into the SonicWall cloud backup service hack, and the verdict is in: the culprit is a state-sponsored threat actor (though the specific nation wasn’t disclosed). “[The incident] was isolated to the…
Threat Actors Exploit VS Code Extensions for Ransomware via GitHub C2
Security researchers have uncovered a sophisticated attack campaign attributed to Kimsuky, the North Korean-backed threat group known for conducting espionage operations against government entities and think tanks. Recent analysis reveals that threat actors are leveraging Visual Studio Code extensions and…
Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code
Cisco has disclosed multiple critical vulnerabilities in Unified Contact Center Express (CCX) that allow unauthenticated remote attackers to execute malicious code and escalate privileges. The vulnerabilities affect the Java Remote Method Invocation (RMI) process and authentication mechanisms, potentially compromising entire…
Checkpoint Details on How Attackers Drained $128M from Balancer Pools Within 30 Minutes
On November 3, 2025, blockchain security monitoring systems detected a sophisticated exploit targeting Balancer V2’s ComposableStablePool contracts. An attacker executed a precision loss vulnerability to drain $128.64 million across six blockchain networks in under 30 minutes. The attack leveraged a…
Follow Pragmatic Interventions to Keep Agentic AI in Check
Agentic AI speeds operations, but requires clear goals, least privilege, auditability, red‑teaming, and human oversight to manage opacity, misalignment, and misuse. The post Follow Pragmatic Interventions to Keep Agentic AI in Check appeared first on SecurityWeek. This article has been…
Collins Aerospace Deals with Mounting Aftermath of Hack
One of the most disruptive cyber incidents to have hit Europe’s aviation sector in recent years was a crippling ransomware attack that occurred on September 19, 2025, causing widespread chaos throughout the continent’s airports. The disruption was not caused by…
ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More
Cybercrime has stopped being a problem of just the internet — it’s becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and even trusted apps or social platforms are turning…
From Tabletop to Turnkey: Building Cyber Resilience in Financial Services
Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement. Crisis management or Tabletop exercises, for a long time relatively rare in the context of…
Airstalk Malware Exploits AirWatch MDM for Covert C2 Communication
Security researchers have identified a sophisticated new malware family, Airstalk, that exploits VMware’s AirWatch API—now known as Workspace ONE Unified Endpoint Management—to establish covert command-and-control channels. The discovery represents a significant threat to evolution, with both PowerShell and .NET variants…
Cisco UCCX Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code
Cisco has issued a critical security advisory addressing two severe vulnerabilities in its Unified Contact Center Express (CCX) platform that could enable remote attackers to execute arbitrary commands and gain unauthorized system access. The vulnerabilities, published on November 5, 2025,…
Checkpoint Analysis: Dissecting the $128M Balancer Pool Drain in Under 30 Minutes
In the early hours of November 3, 2025, Check Point Research’s blockchain threat monitoring systems flagged a suspicious pattern on the Ethereum mainnet. The alert stemmed from Balancer V2’s Vault contract, which soon revealed one of the most devastating DeFi…
SonicWall fingers state-backed cyber crew for September firewall breach
Spies, not crooks, were behind digital heist – damage stopped at the backups, says US cybersec biz SonicWall has blamed an unnamed, state-sponsored collective for the September break-in that saw cybercriminals rifle through a cache of firewall configuration backups.… This…
DeFi Protocol Balancer Starts Recovering Funds Stolen in $128 Million Heist
Hackers drained more cryptocurrency from Balancer by exploiting a rounding function and performing batch swaps. The post DeFi Protocol Balancer Starts Recovering Funds Stolen in $128 Million Heist appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Prowler embeds AI directly into security workflows
Prowler launched Prowler Lighthouse AI, an intelligent security assistant and MCP Server, that brings autonomous AI directly into DevSecOps workflows. Available immediately, Prowler’s AI innovations combine agentic reasoning with automation to accelerate risk analysis, streamline compliance and guide teams through…
Top 7 Companies Specializing in Product Discovery Phase in 2025
Finding the right partner is less about headcount and more about repeatable outcomes, which is why the profiles… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More Read the original article: Top…
Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan
Rob Leathern and Rob Goldman, who both worked at Meta, are launching a new nonprofit that aims to bring transparency to an increasingly opaque, scam-filled social media ecosystem. This article has been indexed from Security Latest Read the original article:…
Nevada Ransomware Attack Started Months Before It Was Discovered, Per Report
The ransomware attack discovered in August occurred as early as May when a state employee mistakenly downloaded malicious software. The post Nevada Ransomware Attack Started Months Before It Was Discovered, Per Report appeared first on SecurityWeek. This article has been…
Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response
Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response (MDR) — marking the fourth consecutive year of inclusion. According to Gartner, more than 600 providers globally claim to deliver…