SAP has released security fixes for 13 new security issues, including a high-priority update for a critical deserialization bug in its NetWeaver The post New Sap Netweaver Bug Enables Takeover first appeared on CyberMaterial. This article has been indexed from…
Tag: EN
US Seizes 15 Billion In Crypto
The U.S. Department of Justice (DOJ) has confiscated a staggering $15 billion in Bitcoin from a notorious criminal enterprise known as the Prince Group The post US Seizes 15 Billion In Crypto first appeared on CyberMaterial. This article has been…
Android Flaw Lets Apps Steal 2FA Codes
Pixnapping is a new type of side-channel attack that targets Android devices. It’s a “pixel-stealing” framework that can covertly siphon data from The post Android Flaw Lets Apps Steal 2FA Codes first appeared on CyberMaterial. This article has been indexed…
Elasticsearch Leak Exposes 6 Billion Records from Scraping, Old and New Breaches
An Elasticsearch leak exposed 6 billion records from global data breaches and scraping sources, including banking and personal details tied to multiple regions. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read…
BlackSuit Ransomware Breaches Corporate Network Using Single Compromised VPN Credential
A major manufacturing company fell victim to a swift and devastating ransomware attack after threat actors gained access using just one set of stolen VPN credentials. The attack, carried out by the cybercrime group Ignoble Scorpius, culminated in widespread encryption…
Customer Service Firm 5CA Denies Responsibility for Discord Data Breach
After being named by Discord as the third-party responsible for the breach, 5CA said none of its systems were involved. The post Customer Service Firm 5CA Denies Responsibility for Discord Data Breach appeared first on SecurityWeek. This article has been…
MCPTotal Unfurls Hosting Service to Secure MCP Servers
MCPTotal today launched a hosting service to secure the Model Context Protocol (MCP) servers that are now starting to be more widely deployed to streamline data access for artificial intelligence (AI) applications and agents. Company CEO Gil Dabah said the…
Software-Tracking Database Project Management Plan for Organizational IT Departments
Organizations need to monitor and administer their software throughout departments because today’s technology-based environment requires effective tracking for both security and compliance and operational excellence. The plan defines how to… The post Software-Tracking Database Project Management Plan for Organizational IT…
MCPTotal Launches to Power Secure Enterprise MCP Workflows
New York, USA, New York, 15th October 2025, CyberNewsWire This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: MCPTotal Launches to Power Secure Enterprise MCP Workflows
Windows Agere Modem Driver 0-Day Exploited in Active Privilege Escalation Attacks
A newly discovered zero-day vulnerability in the Windows Agere Modem driver has been actively exploited by threat actors to elevate privileges on affected systems. Tracked as CVE-2025-24052 and CVE-2025-24990, these flaws allow a low-privileged user to gain full system control…
CISA Alerts on Rapid7 Velociraptor Flaw Exploited in Ransomware Campaigns
The Cybersecurity and Infrastructure Security Agency has added a critical vulnerability in Rapid7 Velociraptor to its Known Exploited Vulnerabilities catalogue, warning that threat actors are actively exploiting the flaw in ransomware attacks. The vulnerability, tracked as CVE-2025-6264, was added to…
Maverick: a new banking Trojan abusing WhatsApp in a mass-scale distribution
A malware campaign was recently detected in Brazil, distributing a malicious LNK file using WhatsApp. It delivered a new Maverick banker, which features code overlaps with Coyote malware. This article has been indexed from Securelist Read the original article: Maverick:…
Satellites leak voice calls, text messages and more
Scientists have revealed a gaping hole in global telecom security, intercepting personal and business data from geostationary satellites. This article has been indexed from Malwarebytes Read the original article: Satellites leak voice calls, text messages and more
Workplace AI Tools Now Top Cause of Data Leaks, Cyera Report Warns
A recent Cyera report reveals that generative AI tools like ChatGPT, Microsoft Copilot, and Claude have become the leading source of workplace data leaks, surpassing traditional channels like email and cloud storage for the first time. The alarming trend…
Blumira rolls out SOC Auto-Focus to streamline threat investigation
Blumira launched SOC Auto-Focus, an AI-powered security investigation tool, alongside enhancements to its Managed Service Provider (MSP) partner program. SOC Auto-Focus is designed to help IT teams and MSPs work smarter, reduce alert fatigue and accelerate incident response through contextual…
Harmonic Security targets AI data risks with Model Context Protocol Gateway
Harmonic Security announced Model Context Protocol (MCP) Gateway, a developer-friendly, locally installed gateway that gives security teams complete visibility and control over their organization’s agentic AI ecosystem. The solution intercepts all MCP traffic enabling security teams to discover what clients…
Beyond Secrets Manager: Designing Zero-Retention Secrets in AWS With Ephemeral Access Patterns
Secrets management in AWS has traditionally relied on long-lived secrets stored in Secrets Manager or Parameter Store. But as attack surfaces grow and threat actors become faster at exploiting exposed credentials, even rotated secrets begin to look like liabilities. The…
Pro-Russian Hacktivist Group Attacking Government Portals, Financial Services and Online Commerce
A sophisticated campaign orchestrated by multiple hacktivist groups has emerged, targeting government portals, financial services, and online commerce platforms across Israel and allied nations. The coordinated cyber offensive, timed around the October 7 anniversary, demonstrated unprecedented levels of organization and…
Chinese Hackers Leverage Geo-Mapping Tool to Maintain Year-Long Persistence
The emergence of a sophisticated malware campaign leveraging geo-mapping technology has put critical infrastructure and enterprise networks on high alert. First observed targeting sectors across Asia and North America, the malware was traced to a group of Chinese threat actors…
TigerJack Hacks Infiltrated Developer Marketplaces with 11 Malicious VS Code Extensions
A sophisticated threat actor known as TigerJack has systematically infiltrated developer marketplaces with at least 11 malicious Visual Studio Code extensions, targeting thousands of unsuspecting developers worldwide. Operating under multiple publisher identities including ab-498, 498, and 498-00, this cybercriminal has…