A significant uptick in Akira ransomware attacks has been observed exploiting unpatched SonicWall SSL VPN devices between July and August 2025. Despite a patch release the same day, many organizations remained vulnerable, allowing threat actors to gain initial access and…
Securing HTTPS From the Inside Out: Preventing Client-Side Interception Attacks
Overview HTTPS is the most common mechanism used to protect client-server communication on the internet. Most teams focus on SSL/TLS and server-side hardening — and for good reason — but security is layered: the system is only as strong as…
RondoDox Botnet Takes ‘Exploit Shotgun’ Approach
The botnet packs over 50 exploits targeting unpatched routers, DVRs, NVRs, CCTV systems, servers, and other network devices. The post RondoDox Botnet Takes ‘Exploit Shotgun’ Approach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer (MFT) that’s assessed to have come under active exploitation since at least September 11, 2025. The company said it began…
North Korean Hackers Steal Crypto
This year, North Korean cybercriminals stole a record-breaking $2 billion in cryptocurrency assets, marking the highest annual total on record. The post North Korean Hackers Steal Crypto first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the…
Crimson Collective Hits AWS Instances
A threat group known as Crimson Collective has been actively targeting Amazon Web Services (AWS) cloud environments to steal data and extort companies. The post Crimson Collective Hits AWS Instances first appeared on CyberMaterial. This article has been indexed from…
GitHub Copilot Chat Flaw Leaks Repo Data
A security vulnerability was recently discovered in GitHub Copilot Chat, an AI assistant designed to help developers with coding tasks. The post GitHub Copilot Chat Flaw Leaks Repo Data first appeared on CyberMaterial. This article has been indexed from CyberMaterial…
DragonForce LockBit Qilin Dominate Ransomware
Google has announced a new AI Vulnerability Reward Program (VRP) that expands on its previous program from 2023. This new initiative provides The post DragonForce LockBit Qilin Dominate Ransomware first appeared on CyberMaterial. This article has been indexed from CyberMaterial…
Google Launches New AI Bug Bounty
Google has announced a new AI Vulnerability Reward Program (VRP) that expands on its previous program from 2023. This new initiative provides The post Google Launches New AI Bug Bounty first appeared on CyberMaterial. This article has been indexed from…
175 Malicious npm Packages Targeting Tech and Energy Firms, 26,000 Downloads
Socket’s Threat Research Team has uncovered a sprawling phishing campaign—dubbed “Beamglea”—leveraging 175 malicious npm packages that have amassed over 26,000 downloads. These packages serve solely as hosting infrastructure, redirecting victims to credential-harvesting pages. Though randomly named packages make accidental developer…
Critical GitHub Copilot Vulnerability Let Attackers Exfiltrate Source Code From Private Repos
A critical vulnerability in GitHub Copilot Chat, rated 9.6 on the CVSS scale, could have allowed attackers to exfiltrate source code and secrets from private repositories silently. The exploit combined a novel prompt injection technique with a clever bypass of…
Millions of (very) private chats exposed by two AI companion apps
Two AI “girlfriend” apps have blabbed millions of intimate conversations from more than 400,000 users. This article has been indexed from Malwarebytes Read the original article: Millions of (very) private chats exposed by two AI companion apps
Autonomous AI Hacking and the Future of Cybersecurity
AI agents are now hacking computers. They’re getting better at all phases of cyberattacks, faster than most of us expected. They can chain together different aspects of a cyber operation, and hack autonomously, at computer speeds and scale. This is…
Multimodal AI, A Whole New Social Engineering Playground for Hackers
Multimodal AI delivers context-rich automation but also multiplies cyber risk. Hidden prompts, poisoned pixels, and cross-modal exploits can corrupt entire pipelines. Discover how attackers manipulate multimodal inputs—and the governance, testing, and incident response strategies CISOs need to stay ahead. The…
175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign
Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to facilitate credential harvesting attacks as part of an unusual campaign. The packages have been collectively downloaded 26,000 times, acting as…
The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart?
The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and velocity, a new generation of AI-powered agents is reshaping how Security Operations Centers (SOCs) detect, respond, and adapt. But not…
Google Launches AI Bug Bounty with $30,000 Top Reward
Google has introduced a new AI Vulnerability Reward Program offering up to $30,000 for bug discoveries in its AI products This article has been indexed from www.infosecurity-magazine.com Read the original article: Google Launches AI Bug Bounty with $30,000 Top Reward
IT Security News Hourly Summary 2025-10-10 12h : 14 posts
14 posts were published in the last hour 10:2 : Ferrari Shows Tech Behind Upcoming Electric Supercar 10:2 : GitHub Copilot Flaw Allows Attackers to Steal Source Code from Private Repositories 10:2 : UK techies’ union warns members after breach…
AI Tools Make Phishing Attacks Harder to Detect, Survey Warns
Despite the ever-evolving landscape of cyber threats, the phishing method remains the leading avenue for data breaches in the years to come. However, in 2025, the phishing method has undergone a dangerous transformation. What used to be a crude…
LLM-Powered MalTerminal Malware Uses OpenAI GPT-4 to Create Ransomware Code
LLM-enabled malware poses new challenges for detection and threat hunting as malicious logic can be generated at runtime rather than embedded in code. Our research discovered hitherto unknown samples, and what may be the earliest example known to date of…
Cops nuke BreachForums (again) amid cybercrime supergroup extortion blitz
US and French fuzz pull the plug on Scattered Lapsus$ Hunters’ latest leak shop targeting Salesforce US authorities have seized the latest incarnation of BreachForums, the cybercriminal bazaar recently reborn under the stewardship of the so-called Scattered Lapsus$ Hunters, with…
Juniper Networks Patches Critical Junos Space Vulnerabilities
Patches were rolled out for more than 200 vulnerabilities in Junos Space and Junos Space Security Director, including nine critical-severity flaws. The post Juniper Networks Patches Critical Junos Space Vulnerabilities appeared first on SecurityWeek. This article has been indexed from…
Red Pilling of Politics – Court Strikes Down California Law on Political Deepfakes
California’s AB 2655 aimed to fight AI-generated political deepfakes, but a federal court struck it down under Section 230, highlighting the clash between free speech and AI regulation. The post Red Pilling of Politics – Court Strikes Down California Law…
Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
CVE-2025-11371, a unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and Triofox file-sharing and remote access platforms, is being exploited by attackers in the wild. While Gladinet is aware of the vulnerability and of its active exploitation, a patch is…