CrowdStrike has disclosed and released patches for two medium-severity vulnerabilities in its Falcon sensor for Windows that could allow an attacker to delete arbitrary files. The security vulnerabilities, designated as CVE-2025-42701 and CVE-2025-42706, require an attacker to have already gained…
Discord Data Breach – 1.5 TB of Data and 2 Million Government ID Photos Extorted
The popular communication platform Discord is facing an extortion attempt following a significant data breach at one of its third-party customer service providers, Zendesk. Threat actors claim to have stolen 1.5 terabytes of sensitive data, including over 2.1 million government-issued…
IT Security News Hourly Summary 2025-10-09 03h : 4 posts
4 posts were published in the last hour 1:2 : FreePBX SQL Injection Vulnerability Exploited to Modify The Database 0:32 : Crimson Collective Leverages AWS Services to Exfiltrate Sensitive Data 0:32 : Exciting Developments in Cloud-Native Security 0:32 : Zero…
FreePBX SQL Injection Vulnerability Exploited to Modify The Database
A critical SQL injection vulnerability in FreePBX has emerged as a significant threat to VoIP infrastructure worldwide, enabling attackers to manipulate database contents and achieve arbitrary code execution. FreePBX, a widely deployed PBX system built around the open-source Asterisk VoIP…
Crimson Collective Leverages AWS Services to Exfiltrate Sensitive Data
A new threat group calling itself Crimson Collective has emerged as a significant cybersecurity concern, targeting Amazon Web Services (AWS) cloud environments with sophisticated data exfiltration and extortion campaigns. The group has recently claimed responsibility for attacking Red Hat, asserting…
Exciting Developments in Cloud-Native Security
Are Machine Identities the Hidden Key to Cloud-Native Security? Effective cybersecurity strategies rely not only on safeguarding human credentials but also on ensuring the security of non-human identities (NHIs). These machine identities, often overshadowed by their human counterparts, play a…
Zero Trust for AI Agents: Implementing Dynamic Authorization in an Autonomous World
Traditional role-based access control assumes predictable behavior, but AI agents exhibit emergent behaviors no human anticipated. Dynamic authorization using ABAC and JWT tokens enables real-time policy decisions that adapt to AI behavior, environmental context, and risk levels automatically. The post…
IT Security News Hourly Summary 2025-10-09 00h : 5 posts
5 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-10-08 22:2 : Mustang Panda Using New DLL Side-Loading Technique to Deliver Malware 22:2 : Scattered Lapsus$ Hunters Launched a New Leak Site to Release…
Research Finds That API Security Blind Spots Could Put AI Agent Deployments at Risk
New research by Salt Security has revealed an alarming disconnect between rapid API adoption and immature security practices, threatening the success of critical AI and automation initiatives. The H2 2025 State of API Security Report shows that, as enterprises race to…
Research Finds Budgets, Staffing and Skills Fail to Keep Pace with Rising Cyber Threats
New research by ISACA has found that over a third (39%) of European IT and cybersecurity professionals report that their organisation is experiencing more cybersecurity attacks than this time last year. Yet despite this rising wave of attacks, confidence in…
IT Security News Daily Summary 2025-10-08
153 posts were published in the last hour 21:32 : OpenAI Blocks Global Hackers Misusing ChatGPT for Cyberattacks 21:32 : How to configure and verify ACM certificates with trust stores 21:2 : Critical Redis Flaw Could Compromise Most Cloud Environments…
Qilin ransomware claimed responsibility for the attack on the beer giant Asahi
Qilin ransomware claimed responsibility for the recent attack on the beer giant Asahi that disrupted operations in Japan. Asahi Group Holdings, Ltd (commonly called Asahi) is Japan’s largest brewing company, known for producing top-selling beers like Asahi Super Dry, as…
Hackers Actively Compromising Databases Using Legitimate Commands
A sophisticated new breed of ransomware attacks is leveraging legitimate database commands to compromise organizations worldwide, bypassing traditional security measures through “malware-less” operations. Unlike conventional ransomware that encrypts files using malicious binaries, threat actors are exploiting exposed database services by…
Mustang Panda Using New DLL Side-Loading Technique to Deliver Malware
In recent weeks, cybersecurity analysts have observed a resurgence of the Mustang Panda threat actor deploying a novel DLL side-loading approach to deliver malicious payloads. Emerging in June 2025, this campaign leverages politically themed lures targeting Tibetan advocacy groups. Victims…
Scattered Lapsus$ Hunters Launched a New Leak Site to Release Data Stolen from Salesforce Instances
The notorious cybercriminal collective known as Scattered Lapsus$ Hunters has escalated their extortion campaign by launching a dedicated leak site to threaten organizations with the exposure of stolen Salesforce data. This supergroup, comprised of established threat actors including ShinyHunters, Scattered…
OpenAI Blocks Global Hackers Misusing ChatGPT for Cyberattacks
OpenAI halts hackers from Russia, North Korea, and China exploiting ChatGPT for malware and phishing attacks. The post OpenAI Blocks Global Hackers Misusing ChatGPT for Cyberattacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
How to configure and verify ACM certificates with trust stores
In this post, we show how to configure customer trust stores to work with public certificates issued through AWS Certificate Manager (ACM). Organizations can encounter challenges when configuring trust stores for ACM certificates and incorrect trust store configuration can lead…
Critical Redis Flaw Could Compromise Most Cloud Environments
A Redis flaw, CVE-2025-49844, exposes 75% of cloud systems to remote code execution, data theft, and full system compromise. The post Critical Redis Flaw Could Compromise Most Cloud Environments appeared first on eSecurity Planet. This article has been indexed from…
Exposure Management Beyond The Endpoint
Relying on an endpoint-centric approach to exposure management can leave you with blind spots that increase risk. You need to see your environment like an attacker does. Key takeaways: Long remediation cycles and difficulty prioritizing risk are significant challenges for…
The First Malicious MCP Server is a Warning Shot for AI Cybersecurity
 The first malicious Model Context Protocol (MCP) server has been discovered and we should all be worried how this is foreshadowing AI cybersecurity risks! Cybersecurity researchers at Koi Security detected malicious code within an MCP server that connects AI…
IT Security News Hourly Summary 2025-10-08 21h : 4 posts
4 posts were published in the last hour 19:2 : Modernizing Federal DevSecOps for CMMC and Beyond 18:32 : Rethinking AI Data Security: A Buyer’s Guide for CISOs 18:32 : Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web…
DragonForce, LockBit, and Qilin, a new triad aims to dominate the ransomware landscape
DragonForce, LockBit, and Qilin formed a ransomware alliance to boost attack effectiveness, marking a major shift in the cyber threat landscape. Ransomware groups DragonForce, LockBit, and Qilin formed a strategic alliance to enhance their attack capabilities, signaling an evolving cyber…
Modernizing Federal DevSecOps for CMMC and Beyond
The Cybersecurity Maturity Model Certification (CMMC) 2.0 marks a clear shift from box-checking to modernization. Compliance is, of course, important. However, this evolution highlights the need to revise our approach to how software is developed, governed, and delivered across federal…
Rethinking AI Data Security: A Buyer’s Guide for CISOs
Generative AI has gone from a novelty to a foundation of organization efficiency in just a few short years. From copilots embedded in office suites to dedicated large language model (LLM) platforms, personnel now rely on these platforms to code,…