Warp Panda has been using the BrickStorm, Junction, and GuestConduit malware in attacks against US organizations. The post US Organizations Warned of Chinese Malware Used for Long-Term Persistence appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Imper.ai Emerges From Stealth Mode With $28 Million in Funding
The cybersecurity startup detects impersonation risk in real-time, across video, phone, and chat communication. The post Imper.ai Emerges From Stealth Mode With $28 Million in Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
China-Linked Warp Panda Targets North American Firms in Espionage Campaign
CrowdStrike warned that Warp Panda, a China-linked cyber-espionage group, is targeting US organizations to steal sensitive data and support Beijing’s strategic interests This article has been indexed from www.infosecurity-magazine.com Read the original article: China-Linked Warp Panda Targets North American Firms…
IT Security News Hourly Summary 2025-12-05 15h : 8 posts
8 posts were published in the last hour 14:3 : JPCERT/CC Reports Widespread Exploitation of Array Networks AG Gateway Vulnerability 14:3 : Leaks show Intellexa burning zero-days to keep Predator spyware running 13:32 : PromptPwnd Vulnerability Exposes AI driven build…
JPCERT/CC Reports Widespread Exploitation of Array Networks AG Gateway Vulnerability
Array Networks AG gateways have been under active exploitation since August 2025 due to a command injection flaw, JPCERT/CC warns. A command injection flaw in Array Networks AG Series gateways, affecting DesktopDirect, has been exploited in the wild since August…
Leaks show Intellexa burning zero-days to keep Predator spyware running
A fresh investigation uncovers how Predator spyware still reaches victims through high-priced, newly bought zero-days. This article has been indexed from Malwarebytes Read the original article: Leaks show Intellexa burning zero-days to keep Predator spyware running
PromptPwnd Vulnerability Exposes AI driven build systems to Data Theft
Aikido Security exposes a new AI prompt injection flaw in GitHub/GitLab pipelines, letting attackers steal secrets. Major companies affected. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More Read the original article:…
Russian Calisto Hackers Target NATO Research Sectors with ClickFix Malicious Code
Russian-backed threat actors continue their sophisticated cyber espionage operations against Western institutions through advanced phishing tactics. Calisto, a Russia-nexus intrusion set attributed to the Russian FSB’s Center 18 for Information Security (military unit 64829), has emerged as a persistent threat…
Amazon Sounds Alarm Over Attack Threatening 300 Million Accounts
In the face of looming Black Friday 2025 frenzy, Amazon has unveiled a warning to its large customer base that is expected to overlap the holiday season’s busiest shopping week. The warning warns of a surge in sophisticated scams…
NCSC Launches Proactive Notification Service to Alert System Owners of Vulnerabilities
The UK’s National Cyber Security Centre (NCSC) has introduced a new initiative designed to protect organisations from cyber threats. Working alongside Netcraft, the NCSC has launched the Proactive Notification Service, a groundbreaking program that identifies and alerts system owners about security…
Hackers Exploiting ArrayOS AG VPN Vulnerability to Deploy Webshells
A critical command injection vulnerability in Array Networks’ ArrayOS AG systems has become the focus of active exploitation campaigns, with Japanese organizations experiencing confirmed attacks since August 2025. According to alerts from JPCERT/CC, threat actors are leveraged the vulnerability to install webshells…
Russian Calisto Hackers Target NATO Research with ClickFix Malware
Russian intelligence-linked cyber threat actors have intensified their operations against NATO research organizations, Western defense contractors, and NGOs supporting Ukraine, employing sophisticated phishing and credential harvesting techniques. The Calisto intrusion set, attributed to Russia’s FSB intelligence service, has escalated its…
Russian Hackers Imitate European Events in Coordinated Phishing Campaigns
Russian state-linked hackers are impersonating high-profile European security conferences to compromise cloud email and collaboration accounts at governments, think tanks, and policy organizations, according to new research from cybersecurity firm Volexity. The campaigns, active through late 2025, abuse legitimate Microsoft…
Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access
The cybersecurity landscape continues to evolve as threat actors deploy increasingly sophisticated tools to compromise Windows-based infrastructure. CastleRAT, a Remote Access Trojan that emerged around March 2025, represents a significant addition to the malware arsenal that defenders must now contend…
“Getting to Yes”: An Anti-Sales Guide for MSPs
Most MSPs and MSSPs know how to deliver effective security. The challenge is helping prospects understand why it matters in business terms. Too often, sales conversations stall because prospects are overwhelmed, skeptical, or tired of fear-based messaging. That’s why we…
Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
A human rights lawyer from Pakistan’s Balochistan province received a suspicious link on WhatsApp from an unknown number, marking the first time a civil society member in the country was targeted by Intellexa’s Predator spyware, Amnesty International said in a…
Louvre to Bolster Its Security, Issues €57m Public Tender
The French museum is planning to revamp its safety and security systems following a high-profile burglary in October This article has been indexed from www.infosecurity-magazine.com Read the original article: Louvre to Bolster Its Security, Issues €57m Public Tender
BRICKSTORM backdoor exposed: CISA warns of advanced China-backed intrusions
CISA details BRICKSTORM, a China-linked backdoor used by China-linked APTs to secure long-term persistence on compromised systems. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed technical details on BRICKSTORM, a backdoor used by China state-sponsored threat actors to…
Huge Trove of Nude Images Leaked by AI Image Generator Startup’s Exposed Database
An AI image generator startup’s database was left accessible to the open internet, revealing more than 1 million images and videos, including photos of real people who had been “nudified.” This article has been indexed from Security Latest Read the…
Hackers Actively Exploiting ArrayOS AG VPN Vulnerability to Deploy Webshells
Attackers are actively exploiting a serious vulnerability in Array Networks’ ArrayOS AG series to gain unauthorized access to enterprise networks. The flaw exists in the DesktopDirect function, a feature designed to provide remote desktop access to administrators. Security researchers have…
NVIDIA Triton Vulnerability Let Attackers Trigger DoS Attack Using Malicious Payload
Critical security updates have been released to fix two high-severity flaws in the Triton Inference Server that let attackers crash systems remotely from NVIDIA. Both flaws received a CVSS score of 7.5, indicating they are high-priority threats requiring immediate patching.…
China-Nexus Hackers Exploiting VMware vCenter Environments to Deploy Web Shells and Malware Implants
A new sophisticated threat actor has emerged in the cybersecurity landscape, targeting critical infrastructure across the United States. The adversary, operating under the name WARP PANDA, has demonstrated remarkable technical capabilities in infiltrating VMware vCenter environments at legal, technology, and…
UK pushes ahead with facial recognition expansion despite civil liberties backlash
Plan would create statutory powers for police use of biometrics, prompting warnings of mass surveillance The UK government has kicked off plans to ramp up police use of facial recognition, undeterred by a mounting civil liberties backlash and fresh warnings…
Lumia Security Raises $18 Million for AI Security and Governance
The startup will invest in expanding its engineering and research teams, deepening product integrations, and scaling go-to-market efforts. The post Lumia Security Raises $18 Million for AI Security and Governance appeared first on SecurityWeek. This article has been indexed from…