A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike phishing websites by impersonating popular apps like WhatsApp, Google Photos, TikTok, and YouTube as lures to install them. “Once…
Tag: EN
Anatomy of a Modern Threat: Deconstructing the Figma MCP Vulnerability
Threat researchers recently disclosed a severe vulnerability in a Figma Model Context Protocol (MCP) server, as reported by The Hacker News. While the specific patch is important, the discovery itself serves as a critical wake-up call for every organization rushing…
USENIX 2025: PEPR ’25 – Breaking Barriers, Not Privacy: Real-World Split Learning Across Healthcare Systems
Creator, Author and Presenter: Sravan Kumar Elineni Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: PEPR ’25 – Breaking Barriers, Not Privacy: Real-World Split…
Andesite AI Puts Human Analysts at the Center of Cybersecurity Innovation
Andesite AI Inc., a two-year-old cybersecurity startup, is reimagining how human expertise and artificial intelligence can work together to strengthen digital defense. Founded by former CIA officers Brian Carbaugh and William MacMillan, the company aims to counter a fragmented…
Why Deleting Cookies Doesn’t Protect Your Privacy
Most internet users know that cookies are used to monitor their browsing activity, but few realize that deleting them does not necessarily protect their privacy. A newer and more advanced method known as browser fingerprinting is now being used to…
Investigating targeted “payroll pirate” attacks affecting US universities
Microsoft Threat Intelligence has identified a financially motivated threat actor that we track as Storm-2657 compromising employee accounts to gain unauthorized access to employee profiles and divert salary payments to attacker-controlled accounts, attacks that have been dubbed “payroll pirate”. The…
Discord Says Hackers Stole 70,000 ID Photos, Dismisses Extortion Claims
70,000 Discord users had government ID photos and private data exposed via a third-party vendor breach. See Discord’s full response and critical security steps to protect your identity. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News,…
CVE-2025-5947: WordPress Plugin flaw lets hackers access Admin accounts
Threat actors are exploiting a critical flaw, tracked as CVE-2025-5947, in the Service Finder WordPress theme’s Bookings plugin. Threat actors are exploiting a critical vulnerability, tracked as CVE-2025-5947 (CVSS score 9.8), in the Service Finder WordPress theme’s Bookings plugin. The…
Closing the Cloud Security Gap
Secure your cloud. Get insights from the 2025 Unit 42 Global Incident Response Report on closing the cloud security gap and protecting your assets. The post Closing the Cloud Security Gap appeared first on Palo Alto Networks Blog. This article…
Legit tools, illicit uses: Velociraptor, Nezha turned against victims
Threat actors are using an increasing variety of commercial and open-source products to carry out their attacks: according to researchers, Velociraptor and Nezha are the latest additions to their attack toolbox. Velociraptor misuse A suspected China-based ransomware threat actor has…
CVE-2025-61882 Explained: The Oracle Zero-Day Breach That Hit Enterprises Hard
A critical zero-day vulnerability in Oracle E-Business Suite (EBS) was exploited by the Cl0p ransomware group in mid-2025. The flaw, later tracked as CVE-2025-61882, allowed remote code execution without authentication,… The post CVE-2025-61882 Explained: The Oracle Zero-Day Breach That Hit…
Cyber risk a growing priority among insurance and asset management firms
A report by Moody’s shows an emphasis on board-level oversight and spending in order to boost cyber resilience. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Cyber risk a growing priority among insurance…
Risk mitigation budgets swell as enterprise AI adoption grows
Governing AI comes at a cost with most organizations increasing oversight investments in the next financial year, according to OneTrust data. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Risk mitigation budgets swell…
Wordfence Intelligence Weekly WordPress Vulnerability Report (September 29, 2025 to October 5, 2025)
📢 Calling all Vulnerability Researchers and Bug Bounty Hunters! 📢 🚀 Operation: Maximum Impact Challenge! Now through November 10, 2025, earn 2X bounty rewards for all in-scope submissions in software with at least 5,000 active installs and fewer than 5…
SonicWall Confirms Breach Exposing All Customer Firewall Configuration Backups
SonicWall, together with leading incident response firm Mandiant, has completed a thorough review of a recent cloud backup security incident. The investigation confirmed that an unknown party gained access to all firewall configuration backup files for customers using the MySonicWall…
Microsoft Azure Experiences Global Outage Disrupting Cloud Services Worldwide
Microsoft Azure suffered a significant service interruption that left many customers unable to reach cloud resources. The incident began at roughly 07:40 UTC, when Azure Front Door, the platform’s native content delivery network (CDN), lost about 30 percent of its…
Phantom Taurus: China-Linked Hackers Target Global Governments
China-linked hacker group Phantom Taurus targets global governments with advanced stealth malware. The post Phantom Taurus: China-Linked Hackers Target Global Governments appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Phantom Taurus:…
Ransomware Attack on Motility Software Solutions Exposes Data of 766,000 Customers
Motility Software Solutions, a leading U.S.-based provider of dealer management software (DMS), has confirmed a ransomware attack that compromised the personal data of approximately 766,000 customers. The company, previously known as Systems 2000 (Sys2K), serves over 7,000 dealerships across…
LABScon25 Replay | Auto-Poking The Bear: Analytical Tradecraft In The AI Age
AI agents promise speed, but at what cost to trust? Dreadnode’s Wendiggensen & Palm unpack this dilemma through a hands-on study of leaked Russian data. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and…
Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign
Written by: Peter Ukhanov, Genevieve Stark, Zander Work, Ashley Pearson, Josh Murchie, Austin Larsen Introduction Beginning Sept. 29, 2025, Google Threat Intelligence Group (GTIG) and Mandiant began tracking a new, large-scale extortion campaign by a threat actor claiming affiliation with…