RedTiger is an open-source red-teaming tool repurposed by attackers to steal sensitive data from Discord users and gamers. Released in 2025 on GitHub, RedTiger bundles penetration-testing utilities, including network scanners and OSINT tools. But its infostealer module has gone rogue,…
MuddyWater Using New Malware Toolkit to Deliver Phoenix Backdoor Malware to International Organizations
The Advanced Persistent Threat group MuddyWater, widely recognized as an Iran-linked espionage actor, has orchestrated a sophisticated phishing campaign targeting more than 100 government entities and international organizations across the Middle East, North Africa, and beyond. The operation, which became…
New LockBit Ransomware Victims Identified by Security Researchers
Check Point has identified a dozen attacks in September that bore the LockBit stamp, with half of them attributed to the group’s new ransomware version This article has been indexed from www.infosecurity-magazine.com Read the original article: New LockBit Ransomware Victims…
Hexnode CEO Says Passwords Alone Won’t Fix Your Layer 8 Issues
Since 2004, Cybersecurity Awareness Month has been held every October to educate individuals, communities, and businesses on the fundamentals of cyber hygiene. What started as a broad effort focusing on… The post Hexnode CEO Says Passwords Alone Won’t Fix Your…
Critical Windows Server WSUS Vulnerability Exploited in the Wild
CVE-2025-59287 allows a remote, unauthenticated attacker to execute arbitrary code and a PoC exploit is available. The post Critical Windows Server WSUS Vulnerability Exploited in the Wild appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign
A Pakistan-nexus threat actor has been observed targeting Indian government entities as part of spear-phishing attacks designed to deliver a Golang-based malware known as DeskRAT. The activity, observed in August and September 2025 by Sekoia, has been attributed to Transparent…
Is AI moving faster than its safety net?
From agentic browsers to chat assistants, the same tools built to help us can also expose us. This article has been indexed from Malwarebytes Read the original article: Is AI moving faster than its safety net?
Hackers Target Perplexity Comet Browser Users
Shortly after the browser was launched, numerous fraudulent domains and fake applications were discovered. The post Hackers Target Perplexity Comet Browser Users appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Hackers Target Perplexity…
Telegram Messenger Abused by Android Malware to Seize Full Device Control
Security researchers at Doctor Web have uncovered a sophisticated Android backdoor disguised as Telegram X that grants cybercriminals complete control over victims’ accounts and devices. The malware, identified as Android.Backdoor.Baohuo.1.origin, has already infected more than 58,000 devices worldwide, with approximately…
From Failure to 100: How Akas Earned His OSCP+
In this guide, we’re sharing an inspiring story from one of our OSCP+ Certified Holders who embodies the journey of Try Harder. We’d like to introduce you to Akas Wisnu Aji (justakazh), a Cyber Security Consultant from Indonesia, who became…
North Korean Hackers Aim at European Drone Companies
Lazarus has used fake job offers in attacks targeting companies developing UAV technology, for information theft. The post North Korean Hackers Aim at European Drone Companies appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
North Korea led the world in nation-state hacking in Q2 and Q3
Security leaders should prioritize anomalous-activity detection and zero-trust principles, a new report recommends. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: North Korea led the world in nation-state hacking in Q2 and Q3
Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats
Paris, France, 24th October 2025, CyberNewsWire This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More Read the original article: Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats
Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
A major cybersecurity investigation has uncovered a sophisticated criminal operation called Vault Viper that exploits online gambling platforms to distribute a malicious custom browser with remote access capabilities. The threat actor, linked to the Baoying Group and connected to the…
Are Free Book Websites Safe? Cybersecurity Risks in Online Reading
The Price of Free: When Books Come With Baggage Free books on the internet sound like a dream.… The post Are Free Book Websites Safe? Cybersecurity Risks in Online Reading appeared first on Hackers Online Club. This article has been…
Cybersecurity at a Crossroads: Why AI-Driven Innovation Demands Organizational Accountability
Executives are facing a defining challenge with artificial intelligence (AI): how to responsibly harness its power while defending against the risks it creates. AI can detect threats faster and improve… The post Cybersecurity at a Crossroads: Why AI-Driven Innovation Demands…
In Other News: iOS 26 Deletes Spyware Evidence, Shadow Escape Attack, Cyber Exec Sold Secrets to Russia
Other noteworthy stories that might have slipped under the radar: Everest group takes credit for Collins Aerospace hack, Maryland launches VDP, gamers targeted with red teaming tool and RAT. The post In Other News: iOS 26 Deletes Spyware Evidence, Shadow…
Hackers Breach Verstappen Data
The governing body for Formula 1, the FIA, has confirmed that one of its driver information databases was compromised in a recent security The post Hackers Breach Verstappen Data first appeared on CyberMaterial. This article has been indexed from CyberMaterial…
IT Security News Hourly Summary 2025-10-24 15h : 12 posts
12 posts were published in the last hour 13:5 : YouTube Videos Used As Malware Traps 13:5 : Lazarus Hits European Defense Firms 13:4 : China Hackers Breach Telecom Firm 12:34 : Google Warns of Cybercriminals Using Fake Job Postings…
Toys R Us Canada Data Breach Alert
Toys “R” Us Canada has begun notifying customers about a data breach that compromised a portion of its customer database. The incident came The post Toys R Us Canada Data Breach Alert first appeared on CyberMaterial. This article has been…
YouTube Videos Used As Malware Traps
A sprawling and sophisticated malicious network has been exploiting the popularity and inherent trust of YouTube to propagate various types The post YouTube Videos Used As Malware Traps first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…
Lazarus Hits European Defense Firms
The notorious North Korea-aligned advanced persistent threat (APT) group, Lazarus, also known as Hidden Cobra, launched a renewed phase The post Lazarus Hits European Defense Firms first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original…
China Hackers Breach Telecom Firm
A newly revealed wave of attacks saw China-based threat actors exploiting the ToolShell vulnerability (CVE-2025-53770) in on-premises Microsoft SharePoint The post China Hackers Breach Telecom Firm first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original…
Google Warns of Cybercriminals Using Fake Job Postings to Spread Malware and Steal Credentials
Google’s Threat Intelligence Group (GTIG) has uncovered a sophisticated social engineering campaign orchestrated by financially motivated threat actors based in Vietnam. The ultimate objective is to compromise corporate advertising accounts and steal valuable credentials for resale or direct monetization. The…