Senator Ron Wyden’s complaints focus on Windows security and the Kerberoasting attack technique. The post Senator Urges FTC Probe of Microsoft Over Security Failures appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Senator…
Tag: EN
Why File Integrity Monitoring (FIM) Is a Must for Compliance — And How to Pick the Right Solution
As Fortra’s new File Integrity Monitoring Buyer’s Guide states, “What was once a security control for simple file changes now ensures integrity across organizations’ entire systems.” The landscape has evolved significantly since Fortra’s Tripwire introduced file integrity monitoring (FIM) over…
‘Astronaut-in-distress’ romance scammer steals money from elderly woman
A Japanese octogenarian lost thousands of dollars after being scammed by someone who described himself as an astronaut in need of help. This article has been indexed from Malwarebytes Read the original article: ‘Astronaut-in-distress’ romance scammer steals money from elderly…
Default Cursor setting can be exploited to run malicious code on developers’ machines
An out-of-the-box setting in Cursor, a popular AI source-code editor, could be leveraged by attackers to covertly run malicious code on users’ computers, researchers have warned. An exploitable vulnerability in the Cursor AI editor Cursor is an AI-augmented fork of…
ChillyHell macOS Malware Resurfaces, Using Google.com as a Decoy
A previously dormant macOS threat, ChillyHell, is reviving. Read how this malware can bypass security checks, remain hidden,… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: ChillyHell macOS…
NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges
NVIDIA has released a security update for its NVDebug tool to address three high-severity vulnerabilities that could allow an attacker to escalate privileges, execute code, and tamper with data. The company is urging users to immediately install the latest version…
Attacker steals customer data from Brit rail operator LNER during break-in at supplier
Major UK player cagey on specifics but latest attack follows string blamed on ‘third party’ suppliers One of the UK’s largest rail operators, LNER, is the latest organization to spill user data via a third-party data breach.… This article has…
Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance
Oligo Security has shared details on an Apple CarPlay attack that hackers may be able to launch without any interaction. The post Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance appeared first on SecurityWeek. This article has…
France: Three Regional Healthcare Agencies Targeted by Cyber-Attacks
Compromised data includes personal data such as patients’ full names, ages, phone numbers and email addresses This article has been indexed from www.infosecurity-magazine.com Read the original article: France: Three Regional Healthcare Agencies Targeted by Cyber-Attacks
PoisonSeed Threat Actor Strengthens Credential Theft Operations with New Domains
Spoof the email delivery platform SendGrid and employ fake Cloudflare CAPTCHA interstitials to lend legitimacy before redirecting unsuspecting users to credential harvesting pages. Since June 1, 2025, DomainTools Investigations has identified 21 newly registered domains exhibiting hallmarks of the eCrime…
Attackers abuse ConnectWise ScreenConnect to drop AsyncRAT
Hackers exploit ConnectWise ScreenConnect to drop AsyncRAT via scripted loaders, stealing data and persisting with a fake Skype updater. LevelBlue researchers warn of a campaign abusing ConnectWise ScreenConnect to deploy AsyncRAT. Attackers use VBScript/PowerShell loaders and achieve persistence via a fake…
Zero Outages, Full Visibility: How PacificSource Automated SSL TLS Certificate Lifecycle Management
In healthcare, every second counts. From electronic health records (EHR) to patient portals and claims processing systems, secure digital communication is the backbone of delivering care and protecting sensitive patient information. That security relies on SSL/TLS certificates—and the rules governing…
Cracking the Boardroom Code: Helping CISOs Speak the Language of Business
CISOs know their field. They understand the threat landscape. They understand how to build a strong and cost-effective security stack. They understand how to staff out their organization. They understand the intricacies of compliance. They understand what it takes to…
Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts
Cybersecurity researchers have disclosed two new campaigns that are serving fake browser extensions using malicious ads and fake websites to steal sensitive data. The malvertising campaign, per Bitdefender, is designed to push fake “Meta Verified” browser extensions named SocialMetrics Pro…
ZynorRAT Exploits Windows and Linux Systems to Gain Remote Access
During a recent threat hunting exercise, the Sysdig Threat Research Team (TRT) identified a new sample dubbed ZynorRAT. This Go-based Remote Access Trojan (RAT) delivers a comprehensive suite of custom command-and-control (C2) capabilities for both Linux and Windows systems. First…
Experts scrutinized Ofcom’s Online Safety Act governance. They’re concerned
Academics and OSA stakeholders say Ofcom needs to take a closer look at how controversial legislation is enforced Industry experts expressed both concern and sympathy for Ofcom, the Brit regulator that is overseeing the Online Safety Act, as questions mount…
Senator Calls for FTC Investigation into Microsoft’s Use of Outdated RC4 Encryption and Kerberoasting Vulnerabilities
U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to investigate Microsoft for what he terms “gross cybersecurity negligence,” accusing the tech giant of knowingly shipping its Windows operating system with a dangerously outdated form of encryption…
Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted
US offers $11m as LockerGoga ransomware suspect becomes one of Europe’s most wanted men This article has been indexed from www.infosecurity-magazine.com Read the original article: Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted
Wyden Urges FTC to Investigate Microsoft Over Weak RC4 Encryption Enabling Kerberoasting
Senator Ron Wyden has formally requested the Federal Trade Commission investigate Microsoft for cybersecurity negligence that has enabled ransomware attacks against critical infrastructure organizations nationwide. In a September 10 letter to FTC Chair Andrew Ferguson, Wyden detailed how Microsoft’s dangerous…
NVIDIA NVDebug Tool Vulnerability Lets Attackers Gain Elevated System Access
A critical vulnerability in NVIDIA’s NVDebug tool could allow attackers to gain elevated system access, execute code, or tamper with data. NVIDIA released a security bulletin on September 8, 2025, reporting three distinct flaws in the NVDebug tool and urging…