In today’s digital landscape, organizations face an unprecedented volume of cybersecurity alerts on a daily basis. While these alerts are crucial for maintaining security, their sheer volume can overwhelm security teams, a phenomenon known as alert fatigue. This issue not…
CMMC Compliance: What Your Need to Know Ahead of November 10
The November 10th deadline for Cybersecurity Maturity Model Certification (CMMC) compliance is approaching fast. For CISOs, risk managers, and compliance leaders across the defense industrial base, this date represents more than a regulatory milestone; it’s a make-or-break moment for securing and…
African Authorities Arrest 260 Suspects in Romance, Sextortion Scams
Authorities in 14 African countries arrested 260 people, seized 1,235 electronic devices, and took down 18 criminal infrastructures in a sprawling Interpol operation aimed at the growing global problem of romance and sextortion scams being run via social media and…
IT Security News Hourly Summary 2025-09-29 15h : 11 posts
11 posts were published in the last hour 13:4 : New TamperedChef Malware Exploits Productivity Tools to Access and Exfiltrate Sensitive Data 13:4 : NowSecure Privacy helps organizations protect mobile apps from data leaks 13:4 : ⚡ Weekly Recap: Cisco…
UK government bails out Jaguar Land Rover with £1.5B loan after hack disrupts vehicle production for weeks
The Indian-owned carmaking giant will be bailed out after a cyberattack stalled car production and its downstream supply chain. Critics argue that the bailout sends the wrong message to hackers and crime groups. This article has been indexed from Security…
Harrods alerts customers to new data breach linked to third-party provider
British Department Store Harrods warns customers of a data breach via a third-party provider, exposing some names and contact details. Harrods, the luxury British department store, warned customers of a data breach affecting its online systems. The company confirmed that…
Shai-Hulud Worm Strikes: Self-Replicating Malware Infects Hundreds of NPM Packages
A highly dangerous self-replicating malware called “Shai-Hulud” has recently swept through the global software supply chain, becoming one of the largest incidents of its kind ever documented. Named after the sandworms in the Dune series, this worm has infected…
National Cyber Authorities Launch OT Security Guidance
The Five Eyes countries, Germany and the Netherlands are launching a standard for managing OT security This article has been indexed from www.infosecurity-magazine.com Read the original article: National Cyber Authorities Launch OT Security Guidance
Jaguar Land Rover Confirms Gradual Restart of Operations Post-Cyberattack
Jaguar Land Rover (JLR) has announced the controlled resumption of manufacturing operations following a significant cyberattack that disrupted its production facilities. The British luxury automaker confirmed that some sections of its manufacturing operations will resume in the coming days as…
New ModStealer Evade Antivirus Detection to Attack macOS Users and Steal Sensitive Data
A sophisticated new cross-platform information stealer known as ModStealer has emerged, targeting macOS users and demonstrating concerning capabilities to evade Apple’s built-in security mechanisms. The malware represents the latest evolution in macOS-focused threats, which have seen a dramatic surge throughout…
Threat Actors Weaponizing Facebook and Google Ads as Financial Platforms to Steal Sensitive Data
In recent months, cybersecurity teams have observed an alarming trend in which malicious actors exploit Facebook and Google advertising channels to masquerade as legitimate financial services. By promoting free or premium access to well-known trading platforms, these threat actors have…
Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation
The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a controlled environment. It’s an important metric in security because criminals… The post Data Is a Dish Best Served Fresh: “In…
New TamperedChef Malware Exploits Productivity Tools to Access and Exfiltrate Sensitive Data
A sophisticated malware campaign dubbed “TamperedChef” is exploiting trojanized productivity tools—disguised as seemingly benign applications—to bypass security controls, establish persistence, and siphon sensitive information from targeted systems. On September 22, 2025, Field Effect researchers investigating a potentially unwanted application (PUA)…
NowSecure Privacy helps organizations protect mobile apps from data leaks
NowSecure announced the release of NowSecure Privacy, a privacy solution for mobile applications. With this launch, developers, security teams, and privacy professionals gain the capabilities needed to identify and fix systemic blind spots that compromise mobile application privacy. NowSecure Privacy…
⚡ Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More
Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden software bugs to massive DDoS attacks and new ransomware tricks, this week’s roundup gives you the biggest security moves to know.…
Akira Ransomware Beats SonicWall VPN MFA
Since July 2025, the Akira ransomware campaign has been exploiting SonicWall NSA and TZ series devices running SonicOS 6-8. Researchers suspect The post Akira Ransomware Beats SonicWall VPN MFA first appeared on CyberMaterial. This article has been indexed from CyberMaterial…
DataCenter Fire Shuts South Korea Sites
A fire caused by an exploding lithium-ion battery at a key government data center in Daejeon, South Korea, has knocked more than 600 essential public The post DataCenter Fire Shuts South Korea Sites first appeared on CyberMaterial. This article has…
Ransomware Hits Ohio Union County
Union County, Ohio, discovered a ransomware attack on its computer network on May 18, 2025. Following the breach, the county immediately The post Ransomware Hits Ohio Union County first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…
Medusa Ransomware Hits Comcast Data
The Medusa ransomware group has taken responsibility for a cyberattack on Comcast, the global media and technology giant. The post Medusa Ransomware Hits Comcast Data first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original article:…
MacOS XCSSET Variant Hits Firefox
A new version of a well-known macOS malware called XCSSET has been discovered by cybersecurity researchers. This updated variant of XCSSET The post MacOS XCSSET Variant Hits Firefox first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…
Acreed Infostealer Gaining Popularity Among Cybercriminals for C2 via Steam Platform
Acreed, a novel infostealer first observed in February 2025, has rapidly gained traction among threat actors seeking discreet credential and cryptocurrency data harvesting. Leveraging a unique command-and-control (C2) mechanism via the Steam platform’s community profiles, Acreed exhibits advanced OPSEC measures…
WhatsApp 0-Click Flaw Abused via Malicious DNG Image File
A newly discovered zero-click remote code execution (RCE) vulnerability in WhatsApp is putting millions of Apple users at risk. Researchers from DarkNavyOrg have demonstrated a proof-of-concept (PoC) exploit that leverages two distinct flaws to compromise iOS, macOS, and iPadOS devices without any…
The State of AI in the SOC 2025 – Insights from Recent Study
Security leaders are embracing AI for triage, detection engineering, and threat hunting as alert volumes and burnout hit breaking points. A comprehensive survey of 282 security leaders at companies across industries reveals a stark reality facing modern Security Operations Centers:…
DarkCloud Infostealer Relaunched to Grab Credentials, Crypto and Contacts
eSentire TRU analyses the new DarkCloud V4.2 infostealer, rewritten in VB6. Find out how the malware steals browser data, crypto, and contacts via targeted phishing. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI &…