The Union Civil Aviation Minister, Ram Mohan Naidu Kinjarapu, informed Parliament about confirmed cyber attacks that targeted seven major airports The post Indian Airports Hit By Cyber Attack first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…
Illuminate Must Delete Student Data
Illuminate Education, a provider of cloud-based tools for K-12 schools to collect and analyze sensitive student data—including academic, attendance The post Illuminate Must Delete Student Data first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original…
Australian Jailed For WiFi Attacks
Australian man Michael Clapsis, 44, was recently sentenced to 7 years and 4 months in prison after being convicted of multiple cybercrimes. The post Australian Jailed For WiFi Attacks first appeared on CyberMaterial. This article has been indexed from CyberMaterial…
Lazarus APT Remote Worker Scheme Caught
A coalition led by BCA LTD founder Mauro Eldritch, in collaboration with NorthScan and the interactive malware analysis platform ANY.RUN, The post Lazarus APT Remote Worker Scheme Caught first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…
IT Security News Hourly Summary 2025-12-03 15h : 9 posts
9 posts were published in the last hour 14:5 : Researchers spotted Lazarus’s remote IT workers in action 14:4 : Fileless protection explained: Blocking the invisible threat others miss 14:4 : Critical King Addons Vulnerability Exploited to Hack WordPress Sites…
Researchers spotted Lazarus’s remote IT workers in action
Researchers exposed a Lazarus scheme using remote IT workers tied to North Korea’s Famous Chollima APT group in a joint investigation. Researchers filmed Lazarus APT group’s remote-worker scheme in action, uncovering a North Korean network of IT contractors linked to…
Fileless protection explained: Blocking the invisible threat others miss
Your antivirus scans files. But what about attacks that never create files? Here’s how we catch the threats hiding on your family’s computers. This article has been indexed from Malwarebytes Read the original article: Fileless protection explained: Blocking the invisible…
Critical King Addons Vulnerability Exploited to Hack WordPress Sites
A critical-severity vulnerability in the King Addons for Elementor plugin for WordPress has been exploited to take over websites. The post Critical King Addons Vulnerability Exploited to Hack WordPress Sites appeared first on SecurityWeek. This article has been indexed from…
MuddyWater Attacks Critical Infrastructure With Custom Malware and Improved Tactics
MuddyWater, an Iran-aligned cyberespionage group also known as Mango Sandstorm, has launched a new, highly targeted campaign against critical infrastructure in Israel and Egypt. Active from September 2024 through March 2025, the group zeroed in on diverse sectors including engineering,…
CISA Warns of Android 0-Day Vulnerability Exploited in Attacks
CISA has added two critical Android Framework vulnerabilities to its Known Exploited Vulnerabilities catalog, signaling active exploitation in the wild. The vulnerabilities affect the Android OS and pose significant risks to millions of mobile devices worldwide. CISA added the vulnerabilities…
The Digital Trail That Led Scammers to Her Personal and Financial Information
In an unmistakable demonstration of the speed and sophistication of modern financial fraud, investigators say a sum of almost six crore was transferred within a matter of minutes, passing through an extensive chain of locations and accounts before disappearing…
CISA Warns of Spyware Gangs Targeting Signal and WhatsApp Users
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about state-backed threat actors and cyber-mercenaries actively exploiting commercial spyware to compromise Signal and WhatsApp accounts belonging to high-value targets. The alert, published in late November 2025,…
Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say
A sprawling network that’s seemingly maintained to serve (illegal) online gambling opportunities and deliver malware to Indonesian citizens is likely also being used to provide threat actors command and control (C2) and anonymity services. “The infrastructure has been active for…
UK Ransomware Payment Ban to Come with Exemptions, Security Minster Say
The UK government’s proposed ransomware payment ban for public sector and critical infrastructure will come with national security exemptions This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Ransomware Payment Ban to Come with Exemptions, Security Minster…
Longwatch RCE Flaw Allows Attackers to Run Remote Code with Elevated Privileges
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory warning about a critical remote code execution vulnerability affecting Industrial Video & Control’s Longwatch video surveillance and monitoring system. The flaw enables unauthenticated attackers to execute arbitrary code with…
Malicious Rust “evm-units” Impersonator Deploys OS-Specific Payloads
A malicious Rust crate masquerading as an Ethereum Virtual Machine (EVM) utility has been caught delivering silent, OS-specific payloads to developers’ machines. The package, named evm-units and authored by “ablerust,” was hosted on Crates.io for roughly eight months and accumulated…
Shai-Hulud 2.0 Cyberattack Compromises 30,000 Repos and Exposes 500 GitHub Accounts
The Shai-Hulud 2.0 supply chain attack has proven to be one of the most persistent and destructive malware campaigns targeting the developer ecosystem. Since the incident first emerged on November 24, 2025, Wiz Research and Wiz CIRT have been tracking…
Let’s Encrypt Cutting Certificate Lifespan from 90 Days to 45 Days
Let’s Encrypt, the nonprofit certificate authority serving millions of websites, announced a significant shift in how it issues digital certificates. Starting in 2026, the organization will reduce the validity period of its SSL/TLS certificates from 90 days to 45 days,…
New Calendly-Inspired Phishing Attack Aims to Steal Google Workspace Credentials
A long-running phishing campaign is abusing Calendly-branded job invitations to compromise Google Workspace and Facebook Business accounts, with a particular focus on hijacking ad management platforms used by agencies and large brands. The operation, uncovered by Push Security, combines Attacker‑in‑the‑Middle…
Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar
Remember when phishing emails were easy to spot? Bad grammar, weird formatting, and requests from a “Prince” in a distant country? Those days are over. Today, a 16-year-old with zero coding skills and a $200 allowance can launch a campaign…
After intense backlash, India pulls mandate to pre-install government app on smartphones
On Wednesday, the Indian telecom ministry said Sanchar Saathi, an anti-theft and cybersecurity protection app, would remain voluntary, and that smartphone makers would no longer be required to preload it on devices they sell. This article has been indexed from…
ServiceNow to Acquire Identity Security Firm Veza in Reported $1 Billion Deal
Veza Security was recently valued at more than $800 million after raising $108 million in Series D funding. The post ServiceNow to Acquire Identity Security Firm Veza in Reported $1 Billion Deal appeared first on SecurityWeek. This article has been…
Arizona Attorney General Sues Chinese Online Retailer Temu Over Data Theft Claims
Arizona is the latest state to sue Temu and its parent company PDD Holdings over allegations that the Chinese online retailer is stealing customers’ data. The post Arizona Attorney General Sues Chinese Online Retailer Temu Over Data Theft Claims appeared…
Disinformation and Cyber-Threats Among Top Global Exec Concerns
A new WEF report reveals that AI-powered threats like disinformation are among executives’ biggest concerns This article has been indexed from www.infosecurity-magazine.com Read the original article: Disinformation and Cyber-Threats Among Top Global Exec Concerns