PXA Stealer pilfers data from nearly 40 browsers, including Chrome More than 4,000 victims across 62 countries have been infected by stealthy infostealers pilfering people’s passwords, credit card numbers, and browser cookies, which are then sold to other criminals on…
Tag: EN
Proton Authenticator Rolls Out As A Free Login Security App
After presenting numerous security apps for privacy-savvy users, Proton has now launched the Proton Authenticator… Proton Authenticator Rolls Out As A Free Login Security App on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This…
New Feature: Daily Trends Report, (Mon, Aug 4th)
I implemented a new report today, the “Daily Trends” report. It summarizes noteworthy data received from our honeypot. As with everything, it will improve if you provide feedback :) This article has been indexed from SANS Internet Storm Center, InfoCON:…
The latest from Black Hat USA 2025
<p>Black Hat USA 2025 is returning for its 28th year, covering the latest in infosec for technical experts, thought leaders, innovative vendors and cybersecurity pros.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div>…
New LegalPwn Attack Exploits Gemini, ChatGPT and other AI Tools into Executing Malicious Code via Disclaimers
A sophisticated new attack method that exploits AI models’ tendency to comply with legal-sounding text, successfully bypassing safety measures in popular development tools. A study by Pangea AI Security has revealed a novel prompt injection technique dubbed “LegalPwn” that weaponizes…
SonicWall VPNs Actively Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware
A likely zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) VPNs and firewall appliances is being actively exploited in the wild, enabling attackers to bypass multi-factor authentication (MFA) and deploy ransomware within hours of the initial breach. Security firms, including…
New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards
A sophisticated new cybercriminal campaign has emerged, leveraging a Python-based information stealer known as PXA Stealer to orchestrate one of the most extensive data theft operations observed in recent months. The malware, which first surfaced in late 2024, has evolved…
Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
The cybersecurity landscape has witnessed an unprecedented evolution as threat actors increasingly weaponize artificial intelligence to amplify their attack capabilities and target the very AI systems organizations depend upon. According to the CrowdStrike 2025 Threat Hunting Report, adversaries are no…
Vulnerability Summary for the Week of July 28, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 0x676e67–vproxy vproxy is an HTTP/HTTPS/SOCKS5 proxy server. In versions 2.3.3 and below, untrusted data is extracted from the user-controlled HTTP Proxy-Authorization header and passed to Extension::try_from and flows into…
Hacking group D4rk4rmy claimed the hack of Monte-Carlo Société des Bains de Mer
The cybercrime D4rk4rmy added the Monte-Carlo Société des Bains de Mer to the list of victims on its Tor dark web leak site. The cybercrime group D4rk4rmy claimed the hack of Monte-Carlo Société des Bains de Mer (SBM). The company…
Cybersecurity’s Blind Spot: Why Human Behavior is Every CISO’s Business
When a major breach makes headlines, the impact ripples far beyond the individuals whose data has been compromised. It shakes consumer trust, triggers urgent internal questions from staff, and lands… The post Cybersecurity’s Blind Spot: Why Human Behavior is Every…
Legacy Solutions Have Become a Cyber Defense Problem
The cyber defense community is at a crossroads that is magnified by cyber criminals’ adoption of AI and ransomware-as-a-service. With year-after-year of the IBM Cost of Data Breach report showing… The post Legacy Solutions Have Become a Cyber Defense Problem…
Mind the Middle
In an era where digital threats can cripple a business overnight, where threat actors can use AI to customize and automate attacks at scale, and where enterprises face constant budget… The post Mind the Middle appeared first on Cyber Defense…
Multifaceted Cyber-Attacks Require a Unified Defense Approach
Gone are the days of attacks hitting a single product or vulnerability. Today, we’re seeing the increasing use of multi-vector attacks and multi-stage approaches. For example, a DDoS attack in… The post Multifaceted Cyber-Attacks Require a Unified Defense Approach appeared…
Neural Hijacking: Is Your Brain Making Security Decisions Without You?
Introduction: The Battlefield Inside Your Head In cybersecurity, we master firewalls and encryption. But are we neglecting the most critical vulnerability? The human brain. Every day, you make thousands of split-second… The post Neural Hijacking: Is Your Brain Making Security Decisions…
Zero Day Quest: Join the largest hacking event with up to $5 million in total bounty awards
Last year, we announced the largest hacking event in history: Zero Day Quest, with up to $4 million in bounty awards. The response from the global security community was incredible and helped improve security for our customers and partners. This…
This Linux distro makes Slackware easier than ever
Slackware isn’t exactly the most user-friendly, but Slackel opens it up to the masses – offering four spins to choose from. This article has been indexed from Latest news Read the original article: This Linux distro makes Slackware easier than…
Nvidia Triton Vulnerabilities Pose Big Risk to AI Models
Nvidia has patched over a dozen vulnerabilities in Triton Inference Server, including another set of vulnerabilities that threaten AI systems. The post Nvidia Triton Vulnerabilities Pose Big Risk to AI Models appeared first on SecurityWeek. This article has been indexed…
Survey: Network Security Challenges Persist Despite Desire to Modernize
A survey of 1,000 IT, security and engineering professionals based in North America finds that most organizations are still struggling to manage and secure access to corporate networks. The post Survey: Network Security Challenges Persist Despite Desire to Modernize appeared…
Northwest Radiologists data breach hits 350,000 in Washington
A January 2025 breach at Northwest Radiologists exposed data of 350,000 Washington State residents, the company confirmed. A data breach at Northwest Radiologists in January 2025 has exposed the personal information of 350,000 residents of Washington State, the company has…