2025 January(178)  February(102)  March(349) April(112) May(0) June(0) July(0) August(0) September(0)

DATE

NAME

Info

CATEG.

WEB

31.3.25

Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images Threat actors are using the "mu-plugins" directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and Exploit

The Hacker News

31.3.25

Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT . "The file names use Virus The Hacker News

31.3.25

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation Virus The Hacker News

30.3.25

U.S. seized $8.2 million in crypto linked to 'Romance Baiting' scams The U.S. Department of Justice (DOJ) has seized over $8.2 million worth of USDT (Tether) cryptocurrency that was stolen via 'romance baiting' scams. Cryptocurrency

BleepingComputer

30.3.25

Retail giant Sam’s Club investigates Clop ransomware breach claims Sam's Club, an American warehouse supermarket chain owned by U.S. retail giant Walmart, is investigating claims of a Clop ransomware breach. Ransom

BleepingComputer

30.3.25

OpenAI now pays researchers $100,000 for critical vulnerabilities Artificial intelligence company OpenAI has announced a fivefold increase in the maximum bug bounty rewards for "exceptional and differentiated" critical security vulnerabilities from $20,000 to $100,000. AI

BleepingComputer

30.3.25

Phishing-as-a-service operation uses DNS-over-HTTPS for evasion A newly discovered phishing-as-a-service (PhaaS) operation that researchers call Morphing Meerkat, has been using the DNS over HTTPS (DoH) protocol to evade detection. Phishing

BleepingComputer

30.3.25

Microsoft fixes button that restores classic Outlook client Microsoft resolved an issue that caused the new Outlook email client to crash when users clicked a button designed to switch back to classic Outlook. Vulnerebility

BleepingComputer

30.3.25

New Ubuntu Linux security bypasses require manual mitigations Three security bypasses have been discovered in Ubuntu Linux's unprivileged user namespace restrictions, which could be enable a local attacker to exploit vulnerabilities in kernel components. Exploit

BleepingComputer

30.3.25

Oracle Health breach compromises patient data at US hospitals A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from legacy servers. Incindent

BleepingComputer

30.3.25

Microsoft fixes Remote Desktop issues caused by Windows updates Microsoft has fixed a known issue that caused problems with Remote Desktop and RDS connections after installing Windows updates released since January 2025. OS

BleepingComputer

30.3.25

Hijacked Microsoft web domain injects spam into SharePoint servers The legacy domain for Microsoft Stream was hijacked to show a fake Amazon site promoting a Thailand casino, causing all SharePoint sites with old embedded videos to display it as spam. Hack

BleepingComputer

30.3.25

Infostealer campaign compromises 10 npm packages, targets devs Ten npm packages were suddenly updated with malicious code yesterday to steal environment variables and other sensitive data from developers' systems. Virus

BleepingComputer

30.3.25

Chinese FamousSparrow hackers deploy upgraded malware in attacks A China-linked cyberespionage group known as 'FamousSparrow' was observed using a new modular version of its signature backdoor 'SparrowDoor' against a US-based trade organization. Virus

BleepingComputer

30.3.25

Windows 11 KB5053656 update released with 38 changes and fixes Microsoft has released the KB5053656 preview cumulative update for Windows 11 24H2 with 38 changes, including real-time translation on AMD and Intel-powered Copilot+ PCs and fixes for authentication and blue-screen issues. OS

BleepingComputer

30.3.25

The 4 WordPress flaws hackers targeted the most in Q1 2025 A new report sheds light on the most targeted WordPress plugin vulnerabilities hackers used in the first quarter of 2025 to compromise sites. Vulnerebility

BleepingComputer

30.3.25

Mozilla warns Windows users of critical Firefox sandbox escape flaw Mozilla has released Firefox 136.0.4 to patch a critical security vulnerability that can let attackers escape the web browser's sandbox on Windows systems. Vulnerebility

BleepingComputer

30.3.25

Recent Windows Server 2025 updates cause Remote Desktop freezes Microsoft says a known issue is causing Remote Desktop freezes on Windows Server 2025 systems after installing security updates released since the February 2025 Patch Tuesday. OS

BleepingComputer

30.3.25

Vivaldi integrates Proton VPN into the browser to fight web tracking Vivaldi has announced the integration of Proton VPN directly into its browser without requiring add-on downloads or plugin activations, allowing users to protect their data against 'Big Tech' surveillance for free. Safety

BleepingComputer

30.3.25

Dozens of solar inverter flaws could be exploited to attack power grids Dozens of vulnerabilities in products from three leading makers of solar inverters, Sungrow, Growatt, and SMA, could be exploited to control devices or execute code remotely on the vendor's cloud platform. Vulnerebility

BleepingComputer

30.3.25

UK fines software provider £3.07 million for 2022 ransomware breach The UK Information Commissioner's Office (ICO) has fined Advanced Computer Software Group Ltd £3.07 million over a 2022 ransomware attack that exposed the sensitive personal data of 79,404 people, including National Health Service (NHS) patients. Ransom

BleepingComputer

30.3.25

Oracle customers confirm data stolen in alleged cloud breach is valid Despite Oracle denying a breach of its Oracle Cloud federated SSO login servers and the theft of account data for 6 million people, BleepingComputer has confirmed with multiple companies that associated data samples shared by the threat actor are valid. Incindent

BleepingComputer

29.3.25

New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that's primarily designed to target users in Spain and Turkey. Virus

The Hacker News

29.3.25

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability In what's an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called Ransom The Hacker News

29.3.25

StreamElements discloses third-party data breach after hacker leaks data Cloud-based streaming company StreamElements confirms it suffered a data breach at a third-party service provider after a threat actor leaked samples of stolen data on a hacking forum. Incindent

BleepingComputer

29.3.25

New Atlantis AIO platform automates credential stuffing on 140 services A new cybercrime platform named 'Atlantis AIO' provides an automated credential stuffing service against 140 online platforms, including email services, e-commerce sites, banks, and VPNs. CyberCrime

BleepingComputer

29.3.25

Claude is testing ChatGPT-like Deep Research feature Compass Claude could be getting a ChatGPT-like Deep Research feature called Compass. You can tell Claude's Compass what you need, and the AI agent will take care of everything. AI

BleepingComputer

29.3.25

Microsoft fixes printing issues caused by January Windows updates Microsoft has fixed a known issue causing some USB printers to start printing random text after installing Windows updates released since late January 2025. Vulnerebility

BleepingComputer

29.3.25

RedCurl cyberspies create ransomware to encrypt Hyper-V servers A threat actor named 'RedCurl,' known for stealthy corporate espionage operations since 2018, is now using a ransomware encryptor designed to target Hyper-V virtual machines. Ransom

BleepingComputer

29.3.25

Microsoft: Recent Windows updates cause Remote Desktop issues Microsoft says that some customers might experience Remote Desktop and RDS connection issues after installing recent Windows updates released since January 2025. OS

BleepingComputer

29.3.25

New npm attack poisons local packages with backdoors Two malicious packages were discovered on npm (Node package manager) that covertly patch legitimate, locally installed packages to inject a persistent reverse shell backdoor. Attack

BleepingComputer

29.3.25

Juniper Routers, Network Devices Targeted with Custom Backdoors Backdoored Juniper networking devices are at the center of two major cybersecurity stories that highlight the ongoing vulnerability and active targeting of network infrastructure by cyber adversaries. Hacking blog

ECLYPSIUM

29.3.25

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin Trend Research identified Russian threat actor Water Gamayun exploiting CVE-2025-26633, a zero-day vulnerability in the Microsoft Management Console that attackers exploit to execute malicious code and exfiltrate data. Vulnerebility blog

Trend Micro

29.3.25

A Deep Dive into Water Gamayun’s Arsenal and Infrastructure Trend Research discusses the delivery methods, custom payloads, and techniques used by Water Gamayun, the suspected Russian threat actor abusing a zero-day vulnerability in the Microsoft Management Console framework (CVE-2025-26633) to execute malicious code on infected machines. Vulnerebility blog

Trend Micro

29.3.25

Trend Cybertron: Full Platform or Open-Source? Previously exclusive to Trend Vision One customers, select Trend Cybertron models, datasets and agents are now available via open-source. Build advanced security solutions and join us in developing the next generation of AI security technology. Cyber blog

Trend Micro

29.3.25

Critical Strapi Vulnerability Allows RCE via Server-Side Template Injection The SonicWall Capture Labs threat research team became aware of the threat CVE-2025-24813, assessed its impact and developed mitigation measures for the vulnerability. Vulnerebility blog SonicWall

29.3.25

MoDiRAT Malware Uses Horus Protector to Target France The SonicWall Capture Labs threat research team has identified a new development in the Horus Protector distributed infection chain. Recently, it has been targeting the French region with MoDiRAT, a malware notorious for stealing credit card and other victim information. Malware blog SonicWall

29.3.25

Critical Apache Tomcat RCE Vulnerability (CVE-2025-24813) Under Active Exploitation The SonicWall Capture Labs threat research team became aware of the threat CVE-2025-24813, assessed its impact and developed mitigation measures for the vulnerability. Vulnerebility blog SonicWall

29.3.25

Cloud Threats on the Rise: Alert Trends Show Intensified Attacker Focus on IAM, Exfiltration The attacks against cloud-hosted infrastructure are increasing, and the proof is in the analysis of security alert trends. Recent research reveals that organizations saw nearly five times as many daily cloud-based alerts at the end of 2024 compared to the start of the year. This means attackers have significantly intensified their focus on targeting and breaching cloud infrastructure. Hacking blog Palo Alto

29.3.25

VanHelsing, new RaaS in Town In recent weeks, a new and rapidly expanding ransomware-as-a-service (RaaS) program called VanHelsingRaaS has been making waves in the cybercrime world. Launched on March 7, 2025, this service has already demonstrated its rapid growth and deadly potential, having infected three victims within just two weeks of its introduction Ransom blog Checkpoint

29.3.25

Gamaredon campaign abuses LNK files to distribute Remcos backdoor Cisco Talos is actively tracking an ongoing campaign, targeting users in Ukraine with malicious LNK files which run a PowerShell downloader since at least November 2024. Malware blog Cisco Blog

29.3.25

Money Laundering 101, and why Joe is worried In this blog post, Joe covers the very basics of money laundering, how it facilitates ransomware cartels, and what the regulatory future holds for cybercrime. Cyber blog Cisco Blog

29.3.25

Making it stick: How to get the most out of cybersecurity training Security awareness training doesn’t have to be a snoozefest – games and stories can help instill ‘sticky’ habits that will kick in when a danger is near Cyber blog Eset

29.3.25

RansomHub affiliates linked to rival RaaS gangs ESET researchers also examine the growing threat posed by tools that ransomware affiliates deploy in an attempt to disrupt EDR security solutions Ransom blog

Eset

29.3.25

FamousSparrow resurfaces to spy on targets in the US, Latin America Once thought to be dormant, the China-aligned group has also been observed using the privately-sold ShadowPad backdoor for the first time APT blog

Eset

29.3.25

Shifting the sands of RansomHub’s EDRKillShifter

ESET researchers discover new ties between affiliates of RansomHub and of rival gangs Medusa, BianLian, and Play

Ransom blog

Eset

29.3.25

You will always remember this as the day you finally caught FamousSparrow ESET researchers uncover the toolset used by the FamousSparrow APT group, including two undocumented versions of the group’s signature backdoor, SparrowDoor APT blog

Eset

29.3.25

Prevent Web Scraping by Applying the Pyramid of Pain The Bots Pyramid of Pain: a framework for effective bot defense. BotNet blog

F5

29.3.25

2025 Advanced Persistent Bot Report: Scraper Bots Deep-Dive The 2025 Advanced Persistent Bot (APB) Report covers all bot types, across all industries, at a high level. But web scrapers, in particular, are a persistent threat, growing even more so with the seemingly infinite appetite of generative AI platforms. BotNet blog

F5

29.3.25

2025 Advanced Persistent Bots Report Uncovering the true scale of persistent bot activity, and the advanced techniques that bot operators use in order to remain hidden from bot defenses. BotNet blog

F5

29.3.25

The Curious Case of PlayBoy Locker Cybereason issues Threat Analysis reports to investigate emerging threats and provide practical recommendations for protecting against them. Ransom blog Cybereason

29.3.25

An analysis of the NSO BLASTPASS iMessage exploit On September 7, 2023 Apple issued an out-of-band security update for iOS Exploit blog Project Zero

28.3.25

Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt, and SMA, that could be exploited Vulnerebility The Hacker News

28.3.25

CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that's designed to download and execute secondary Virus The Hacker News

28.3.25

Windows 11 update breaks Veeam recovery, causes connection errors Microsoft and Veeam are investigating a known issue that triggers connection errors on Windows 11 24H2 systems when restoring from Veeam Recovery Media. Vulnerebility

BleepingComputer

28.3.25

Google fixes Chrome zero-day exploited in espionage campaign Google has fixed a high-severity Chrome zero-day vulnerability exploited to escape the browser's sandbox and deploy malware in espionage attacks targeting Russian media outlets and government organizations. Vulnerebility

BleepingComputer

28.3.25

CrushFTP warns users to patch unauthenticated access flaw immediately CrushFTP warned customers of an authentication bypass security vulnerability and urged them to patch their servers immediately. Vulnerebility

BleepingComputer

28.3.25

Cloudflare R2 service outage caused by password rotation error Cloudflare has announced that its R2 object storage and dependent services experienced an outage lasting 1 hour and 7 minutes, causing 100% write and 35% read failures globally. Vulnerebility

BleepingComputer

28.3.25

Broadcom warns of authentication bypass in VMware Windows Tools Broadcom released security updates today to fix a high-severity authentication bypass vulnerability in VMware Tools for Windows. Vulnerebility

BleepingComputer

28.3.25

New Windows zero-day leaks NTLM hashes, gets unofficial patch Free unofficial patches are available for a new Windows zero-day vulnerability that can let remote attackers steal NTLM credentials by tricking targets into viewing malicious files in Windows Explorer. Vulnerebility

BleepingComputer

28.3.25

EncryptHub linked to MMC zero-day attacks on Windows systems A threat actor known as EncryptHub has been linked to Windows zero-day attacks exploiting a Microsoft Management Console vulnerability patched this month. Exploit

BleepingComputer

28.3.25

Browser-in-the-Browser attacks target CS2 players' Steam accounts A new phishing campaign targets Counter-Strike 2 players utilizing Browser-in-the-Browser (BitB) attacks that display a realistic window that mimics Steam's login page. Hack

BleepingComputer

28.3.25

New Android malware uses Microsoft’s .NET MAUI to evade detection New Android malware campaigns use Microsoft's cross-platform framework .NET MAUI while disguising as legitimate services to evade detection. Virus

BleepingComputer

28.3.25

23andMe files for bankruptcy, customers advised to delete DNA data ​California-based genetic testing provider 23andMe has filed for Chapter 11 bankruptcy and plans to sell its assets following years of financial struggles. Incindent BleepingComputer

28.3.25

New VanHelsing ransomware targets Windows, ARM, ESXi systems A new multi-platform ransomware-as-a-service (RaaS) operation named VanHelsing has emerged, targeting Windows, Linux, BSD, ARM, and ESXi systems. Ransom BleepingComputer

28.3.25

PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign likely aimed at users in Taiwan under the guise Virus The Hacker News

28.3.25

Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked to siphon sensitive information such as Cryptocurrency The Hacker News

28.3.25

Mozilla Patches Critical Firefox Bug Similar to Chrome's Recent Zero-Day Vulnerability Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely days after Google patched a similar flaw in Vulnerebility The Hacker News

28.3.25

New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims' DNS Email Records Cybersecurity researchers have shed light on a new phishing-as-a-service (PhaaS) platform that leverages the Domain Name System ( DNS ) mail exchange ( MX ) Phishing The Hacker News

28.3.25

Hackers Repurpose RansomHub's EDRKillShifter in Medusa, BianLian, and Play Attacks A new analysis has uncovered connections between affiliates of RansomHub and other ransomware groups like Medusa , BianLian , and Play . The connection Ransom The Hacker News

27.3.25

APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware An advanced persistent threat (APT) group with ties to Pakistan has been attributed to the creation of a fake website masquerading as India's public sector postal system as part of a campaign designed to infect both Windows and APT The Hacker News

27.3.25

New Report Explains Why CASB Solutions Fail to Address Shadow SaaS and How to Fix It Whether it's CRMs, project management tools, payment processors, or lead management tools - your workforce is using SaaS applications by the pound. Vulnerebility The Hacker News

27.3.25

150,000 Sites Compromised by JavaScript Injection Promoting Chinese Gambling Platforms An ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects to promote Chinese-language gambling platforms has Hack The Hacker News

27.3.25

CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two six-year-old security flaws impacting Sitecore CMS and Experience Platform (XP) Vulnerebility The Hacker News

27.3.25

NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systems A critical security flaw has been disclosed in NetApp SnapCenter that, if successfully exploited, could allow privilege escalation. SnapCenter is an Vulnerebility The Hacker News

27.3.25

New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations The Chinese threat actor known as FamousSparrow has been linked to a cyber attack targeting a trade group in the United States and a research institute in APT The Hacker News

26.3.25

Cyberattack takes down Ukrainian state railway’s online services Ukrzaliznytsia, Ukraine's national railway operator, has been hit by a massive cyberattack that disrupted online services for buying tickets both through mobile apps and the website. BigBrothers

BleepingComputer

26.3.25

DrayTek routers worldwide go into reboot loops over weekend Many Internet service providers (ISPs) worldwide are alerting customers of an outage that started Saturday night and triggered DrayTek router connectivity problems. Vulnerebility

BleepingComputer

26.3.25

Chinese Weaver Ant hackers spied on telco network for 4 years A China-linked advanced threat group named Weaver Ant spent more than four years in the network of a telecommunications services provider, hiding traffic and infrastructure with the help of compromised Zyxel CPE routers. Virus

BleepingComputer

26.3.25

Police arrests 300 suspects linked to African cybercrime rings African law enforcement authorities have arrested 306 suspects as part of 'Operation Red Card,' an INTERPOL-led international crackdown targeting cross-border cybercriminal networks. CyberCrime

BleepingComputer

26.3.25

Critical flaw in Next.js lets hackers bypass authorization A critical severity vulnerability has been discovered in the Next.js open-source web development framework, potentially allowing attackers to bypass authorization checks. Vulnerebility

BleepingComputer

26.3.25

FBI warnings are true—fake file converters do push malware The FBI is warning that fake online document converters are being used to steal people's information and, in worst-case scenarios, lead to ransomware attacks. BigBrothers BleepingComputer

26.3.25

EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as a zero-day to deliver a wide range of Exploit The Hacker News

26.3.25

RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor's Virus The Hacker News

26.3.25

Malicious npm Package Modifies Local 'ethers' Library to Launch Reverse Shell Attacks Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring Virus The Hacker News

26.3.25

Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks Google has released out-of-band fixes to address a high-severity security flaw in its Chrome browser for Windows that has been exploited in the wild as part of Exploit The Hacker News

26.3.25

Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according to findings from Abnormal CyberCrime The Hacker News

26.3.25

New Security Flaws Found in VMware Tools and CrushFTP — High Risk, No Workaround Broadcom has issued security patches to address a high-severity security flaw in VMware Tools for Windows that could lead to an authentication bypass. Tracked Vulnerebility The Hacker News

25.3.25

Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker A new investigation has unearthed nearly 200 unique command-and-control (C2) domains associated with a malware called Raspberry Robin . "Raspberry Robin (also known as Roshtyak or Storm-0856) is a complex and evolving threat actor Hack The Hacker News

25.3.25

Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years A major telecommunications company located in Asia was allegedly breached by Chinese state-sponsored hackers who spent over four years inside its systems, BigBrothers The Hacker News

25.3.25

Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps Cybersecurity researchers are calling attention to an Android malware campaign that leverages Microsoft's .NET Multi-platform App UI (.NET MAUI) framework to CyberCrime The Hacker News

25.3.25

INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust Law enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation CyberCrime The Hacker News

25.3.25

Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication A set of five critical security shortcomings have been disclosed in the Ingress NGINX Controller for Kubernetes that could result in unauthenticated remote code Vulnerebility The Hacker News

25.3.25

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is found in 66% of cloud storage buckets. This data is vulnerable to Ransom The Hacker News

25.3.25

Microsoft Adds Inline Data Protection to Edge for Business to Block GenAI Data Leaks Microsoft on Monday announced a new feature called inline data protection for its enterprise-focused Edge for Business web browser. The native data security AI The Hacker News

24.3.25

VanHelsing RaaS Launch: 3 Victims, $5K Entry Fee, Multi-OS, and Double Extortion Tactics A ransomware-as-a-service (RaaS) operation called VanHelsing has already claimed three victims since it launched on March 7, 2025. "The RaaS model allows Ransom The Hacker News

24.3.25

VSCode Marketplace Removes Two Extensions Deploying Early-Stage Ransomware Cybersecurity researchers have uncovered two malicious extensions in the Visual Studio Code (VSCode) Marketplace that are designed to deploy ransomware that's Ransom The Hacker News

24.3.25

Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks A critical security flaw has been disclosed in the Next.js React framework that could be potentially exploited to bypass authorization checks under certain Vulnerebility The Hacker News

23.3.25

Cloudflare now blocks all unencrypted traffic to its API endpoints Cloudflare announced that it closed all HTTP connections and it is now accepting only secure, HTTPS connections for api.cloudflare.com. Security

BleepingComputer

23.3.25

Microsoft Trust Signing service abused to code-sign malware Cybercriminals are abusing Microsoft's Trusted Signing platform to code-sign malware executables with short-lived three-day certificates. Virus

BleepingComputer

23.3.25

Coinbase was primary target of recent GitHub Actions breaches Researchers have determined that Coinbase was the primary target in a recent GitHub Actions cascading supply chain attack that compromised secrets in hundreds of repositories. Cryptocurrency

BleepingComputer

23.3.25

Oracle denies breach after hacker claims theft of 6 million data records Oracle denies it was breached after a threat actor claimed to be selling 6 million data records allegedly stolen from the company's Oracle Cloud federated SSO login servers Incindent

BleepingComputer

23.3.25

Fake Semrush ads used to steal SEO professionals’ Google accounts A new phishing campaign is targeting SEO professionals with malicious Semrush Google Ads that aim to steal their Google account credentials. Phishing

BleepingComputer

23.3.25

Microsoft: Exchange Online bug mistakenly quarantines user emails Microsoft is investigating an Exchange Online bug causing anti-spam systems to mistakenly quarantine some users' emails. Security

BleepingComputer

23.3.25

US removes sanctions against Tornado Cash crypto mixer The U.S. Department of Treasury announced today that it has removed sanctions against the Tornado Cash cryptocurrency mixer, which North Korean Lazarus hackers used to launder hundreds of millions stolen in multiple crypto heists. APT

BleepingComputer

23.3.25

Steam pulls game demo infecting Windows with info-stealing malware Valve has removed a game titled 'Sniper: Phantom's Resolution' from the Steam store following multiple user reports that indicated its demo installer actually infected their systems with information stealing malware. Virus

BleepingComputer

23.3.25

Veeam RCE bug lets domain users hack backup servers, patch now Veeam has patched a critical remote code execution vulnerability tracked as CVE-2025-23120 in its Backup & Replication software that impacts domain-joined installations. Vulnerebility

BleepingComputer

23.3.25

Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories' CI/CD Secrets Exposed The supply chain attack involving the GitHub Action "tj-actions/changed-files" started as a highly-targeted attack against one of Coinbase's open-source Hack The Hacker News

23.3.25

CISA tags NAKIVO backup flaw as actively exploited in attacks CISA has warned U.S. federal agencies to secure their networks against attacks exploiting a high-severity vulnerability in NAKIVO's Backup & Replication software. BigBrothers

BleepingComputer

23.3.25

VSCode extensions found downloading early-stage ransomware Two malicious VSCode Marketplace extensions were found deploying in-development ransomware from a remote server, exposing critical gaps in Microsoft's review process. Ransom

BleepingComputer

23.3.25

Critical Cisco Smart Licensing Utility flaws now exploited in attacks Attackers have started targeting Cisco Smart Licensing Utility (CSLU) instances unpatched against a vulnerability exposing a built-in backdoor admin account. Exploit

BleepingComputer

23.3.25

RansomHub ransomware uses new Betruger ‘multi-function’ backdoor Security researchers have linked a new backdoor dubbed Betruger, deployed in several recent ransomware attacks, to an affiliate of the RansomHub operation. Ransom

BleepingComputer

23.3.25

UK urges critical orgs to adopt quantum cryptography by 2035 The UK's National Cyber Security Centre (NCSC) has published specific timelines on migrating to post-quantum cryptography (PQC), dictating that critical organizations should complete migration by 2035 BigBrothers

BleepingComputer

22.3.25

WordPress security plugin WP Ghost vulnerable to remote code execution bug Popular WordPress security plugin WP Ghost is vulnerable to a critical severity flaw that could allow unauthenticated attackers to remotely execute code and hijack servers. Vulnerebility

BleepingComputer

22.3.25

GitHub Action supply chain attack exposed secrets in 218 repos The compromise of GitHub Action tj-actions/changed-files has impacted only a small percentage of the 23,000 projects using it, with it estimated that only 218 repositories exposed secrets due to the supply chain attack. Hack

BleepingComputer

22.3.25

HellCat hackers go on a worldwide Jira hacking spree Swiss global solutions provider Ascom has confirmed a cyberattack on its IT infrastructure as a hacker group known as Hellcat targets Jira servers worldwide using compromised credentials. Hack

BleepingComputer

22.3.25

Malware campaign 'DollyWay' breached 20,000 WordPress sites A malware operation dubbed 'DollyWay' has been underway since 2016, compromising over 20,000 WordPress sites globally to redirect users to malicious sites. Hack

BleepingComputer

22.3.25

Kali Linux 2025.1a released with 1 new tool, annual theme refresh Kali Linux has released version 2025.1a, the first version of 2025, with one new tool, desktop changes, and a theme refresh. OS

BleepingComputer

22.3.25

Pennsylvania education union data breach hit 500,000 people The Pennsylvania State Education Association (PSEA), the largest public-sector union in Pennsylvania, is notifying over half a million individuals that attackers stole their personal information in a July 2024 security breach. Incindent

BleepingComputer

22.3.25

Ukrainian military targeted in new Signal spear-phishing attacks Ukraine's Computer Emergency Response Team (CERT-UA) is warning about highly targeted attacks employing compromised Signal accounts to send malware to employees of defense industry firms and members of the country's army forces. BigBrothers

BleepingComputer

22.3.25

New Arcane infostealer infects YouTube, Discord users via game cheats A newly discovered information-stealing malware called Arcane is stealing extensive user data, including VPN account credentials, gaming clients, messaging apps, and information stored in web browsers. Virus

BleepingComputer

22.3.25

Click Profit blocked by the FTC over alleged e-commerce scams The US Federal Trade Commission (FTC) has taken action against the "Click Profit" business opportunity platform for allegedly earning $14 million while deceiving consumers with false promises of guaranteed passive income through online stores. BigBrothers

BleepingComputer

22.3.25

WhatsApp patched zero-click flaw exploited in Paragon spyware attacks WhatsApp has patched a zero-click, zero-day vulnerability used to install Paragon's Graphite spyware following reports from security researchers at the University of Toronto's Citizen Lab. Social

BleepingComputer

22.3.25

Sperm donation giant California Cryobank warns of a data breach US sperm donor giant California Cryobank is warning customers it suffered a data breach that exposed customers' personal information. Incindent

BleepingComputer

22.3.25

GitHub Action hack likely led to another in cascading supply chain attack A cascading supply chain attack that began with the compromise of the "reviewdog/action-setup@v1" GitHub Action is believed to have led to the recent breach of "tj-actions/changed-files" that leaked CI/CD secrets. Hack

BleepingComputer

22.3.25

Western Alliance Bank notifies 21,899 customers of data breach Arizona-based Western Alliance Bank is notifying nearly 22,000 customers their personal information was stolen in October after a third-party vendor's secure file transfer software was breached. Incindent BleepingComputer

22.3.25

Malicious Android 'Vapor' apps on Google Play installed 60 million times Over 300 malicious Android applications downloaded 60 million items from Google Play acted as adware or attempted to steal credentials and credit card information. Virus

BleepingComputer

22.3.25

New Windows zero-day exploited by 11 state hacking groups since 2017 At least 11 state-backed hacking groups from North Korea, Iran, Russia, and China have been exploiting a new Windows vulnerability in data theft and cyber espionage zero-day attacks since 2017 Exploit

BleepingComputer

22.3.25

Google to purchase Wiz for $32 billion in cloud security play Google has announced it entered into a definitive agreement to acquire Wiz, a leading cloud security platform, for $32 billion in an all-cash transaction. Vulnerebility BleepingComputer

22.3.25

Critical AMI MegaRAC bug can let attackers hijack, brick servers ​A new critical severity vulnerability found in American Megatrends International's MegaRAC Baseboard Management Controller (BMC) software can let attackers hijack and potentially brick vulnerable servers. Vulnerebility BleepingComputer

22.3.25

U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe The U.S. Treasury Department has announced that it's removing sanctions against Tornado Cash, a cryptocurrency mixer service that has been accused of aiding the BigBrothers The Hacker News

22.3.25

Albabat Ransomware Group Potentially Expands Targets to Multiple OS, Uses GitHub to Streamline Operations Trend Research encounters new versions of the Albabat ransomware, which appears to target Windows, Linux, and macOS devices. We also reveal the group’s use of GitHub to streamline their ransomware operation. Ransom blog

Trend Micro

22.3.25

ZDI-CAN-25373: Windows Shortcut Exploit Abused as Zero-Day in Widespread APT Campaigns Trend Zero Day Initiative™ (ZDI) uncovered both state-sponsored and cybercriminal groups extensively exploiting ZDI-CAN-25373, a Windows .lnk file vulnerability that enables hidden command execution. Vulnerebility blog

Trend Micro

22.3.25

SonicWall Detects Credential-Stealing SVG File in Phishing Campaign This week, the SonicWall Capture Labs threat research team performed an analysis of a phishing email that included an SVG file attachment, which contains HTML and JavaScript code designed to capture user credentials. Phishing blog SonicWall

22.3.25

WormLocker Ransomware Resurfaces: Infection Cycle, Encryption Tactics, and Prevention WormLocker was first spotted in late 2020. Since its discovery, it has been observed spreading through phishing emails and exploiting vulnerabilities. The SonicWall Capture Labs threat research team has received what appears to be a more recent sample of this ransomware. Given the dynamic nature of ransomware threats, this might signify its potential resurgence. Ransom blog SonicWall

22.3.25

Microsoft Security Bulletin Coverage for March 2025 Microsoft’s March 2025 Patch Tuesday has 56 vulnerabilities, of which 23 are Remote Code Execution. SonicWall Capture Labs threat research team has analyzed and addressed Microsoft’s security advisories for the month of March 2025 and has produced coverage for 10 of the reported vulnerabilities. Vulnerebility blog SonicWall

22.3.25

GitHub Actions Supply Chain Attack: A Targeted Attack on Coinbase Expanded to the Updated March 20: The recent compromise of the GitHub action tj-actions/changed-files and additional actions within the reviewdog organization has captured the attention of the GitHub community, marking another major software supply chain attack. Our team conducted an in-depth investigation into this incident and uncovered many more details about how the attack occurred and its timeline. Cryptocurrency blog Palo Alto

22.3.25

UAT-5918 targets critical infrastructure entities in Taiwan UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination of web shells and open-sourced tooling to conduct post-compromise activities to establish persistence in victim environments for information theft and credential harvesting. BigBrother blog Cisco Blog

22.3.25

Operation FishMedley ESET researchers detail a global espionage operation by FishMonger, the APT group run by I‑SOON Cyber blog Eset

22.3.25

MirrorFace updates toolset, expands targeting to Europe The group's Operation AkaiRyū begins with targeted spearphishing emails that use the upcoming World Expo Cyber blog

Eset

22.3.25

Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor ESET researchers uncovered MirrorFace activity that expanded beyond its usual focus on Japan and targeted a Central European diplomatic institute with the ANEL backdoor Cyber blog

Eset

22.3.25

AI's biggest surprises of 2024 | Unlocked 403 cybersecurity podcast (S2E1) Here's what's been hot on the AI scene over the past 12 months, how it's changing the face of warfare, and how you can fight AI-powered scams AI blog

Eset

22.3.25

Analysis of Black Basta Ransomware Chat Leaks Trellix obtained access to Black Basta's chat leaks at the end of February 2025 and immediately began analyzing the chat logs. Given that Black Basta is a rebrand of Conti RaaS, our approach mirrored that which we took in Conti Leaks: Examining the Panama Papers of Ransomware. Ransom blog Trelix

21.3.25

UAT-5918 Targets Taiwan's Critical Infrastructure Using Web Shells and Open-Source Tools Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in Taiwan since at least 2023. "UAT-5918, a BigBrothers The Hacker News

21.3.25

Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a Ransom The Hacker News

21.3.25

China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Families The China-linked advanced persistent threat (APT) group. known as Aquatic Panda has been linked to a "global espionage campaign" that took place in 2022 targeting APT The Hacker News

21.3.25

Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers Two known threat activity clusters codenamed Head Mare and Twelve have likely joined forces to target Russian entities, new findings from Kaspersky reveal. "Head BigBrothers The Hacker News

21.3.25

Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility Two now-patched security flaws impacting Cisco Smart Licensing Utility are seeing active exploitation attempts, according to SANS Internet Storm Center . The Exploit The Hacker News

21.3.25

YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russian-speaking Virus The Hacker News

21.3.25

Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems Veeam has released security updates to address a critical security flaw impacting its Backup & Replication software that could lead to remote code execution. The Vulnerebility The Hacker News

20.3.25

Blockchain gaming platform WEMIX hacked to steal $6.1 million Blockchain gaming platform WEMIX suffered a cyberattack last month, allowing threat actors to steal 8,654,860 WEMIX tokens, valued at approximately $6,100,000 at the time. Cryptocurrency

BleepingComputer

20.3.25

Telegram CEO leaves France temporarily as criminal probe continues French authorities have allowed Pavel Durov, Telegram's CEO and founder, to temporarily leave the country while criminal activity on the messaging platform is still under investigation. Social

BleepingComputer

20.3.25

Microsoft: New RAT malware used for crypto theft, reconnaissance Microsoft has discovered a new remote access trojan (RAT) that employs "sophisticated techniques" to avoid detection, maintain persistence, and extract sensitive data. Virus

BleepingComputer

20.3.25

OKX suspends DEX aggregator after Lazarus hackers try to launder funds OKX Web3 has decided to suspend its DEX aggregator services to implement security upgrades following reports of abuse by the notorious North Korean Lazarus hackers, who recently conducted a $1.5 billion crypto heist. APT

BleepingComputer

20.3.25

Supply chain attack on popular GitHub Action exposes CI/CD secrets A supply chain attack on the widely used 'tj-actions/changed-files' GitHub Action, used by 23,000 repositories, potentially allowed threat actors to steal CI/CD secrets from GitHub Actions build logs. Hack

BleepingComputer

20.3.25

Critical RCE flaw in Apache Tomcat actively exploited in attacks A critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild, enabling attackers to take over servers with a simple PUT request. Exploit

BleepingComputer

20.3.25

Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts A widespread phishing campaign has targeted nearly 12,000 GitHub repositories with fake "Security Alert" issues, tricking developers into authorizing a malicious OAuth app that grants attackers full control over their accounts and code. CyberCrime

BleepingComputer

20.3.25

Malicious Adobe, DocuSign OAuth apps target Microsoft 365 accounts Cybercriminals are promoting malicious Microsoft OAuth apps that masquerade as Adobe and DocuSign apps to deliver malware and steal Microsoft 365 accounts credentials. Virus BleepingComputer

20.3.25

Six Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest Data The governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore are likely customers of spyware developed by Israeli company Paragon Solutions, BigBrothers The Hacker News

20.3.25

CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw impacting NAKIVO Backup & Replication software to its Vulnerebility The Hacker News

20.3.25

CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a new campaign that targets the defense sectors with Dark Crystal RAT (aka DCRat ). The campaign, detected earlier this month, has been found to target both Virus The Hacker News

20.3.25

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access trojans (RATs) like Quasar RAT. The vulnerability, assigned the CVE identifier CVE-2024-4577 , refers to an argument injection Virus The Hacker News

20.3.25

Leaked Black Basta Chats Suggest Russian Officials Aided Leader's Escape from Armenia The recently leaked trove of internal chat logs among members of the Black Basta ransomware operation has revealed possible connections between the e-crime Ransom The Hacker News

20.3.25

ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick users into downloading malware Virus The Hacker News

19.3.25

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO , a Supervisory Control and Data Acquisition (SCADA) system Vulnerebility The Hacker News

19.3.25

CISA Warns of Active Exploitation in GitHub Action Supply Chain Compromise The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a vulnerability linked to the supply chain compromise of the GitHub Action, Incindent The Hacker News

19.3.25

New 'Rules File Backdoor' Attack Lets Hackers Inject Malicious Code via AI Code Editors Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered Virus The Hacker News

19.3.25

Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017 An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from China, Iran, North Korea, and Russia as part of data theft, espionage, and financially motivated campaigns that date back to 2017. APT The Hacker News

19.3.25

Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security Google is making the biggest ever acquisition in its history by purchasing cloud security company Wiz in an all-cash deal worth $32 billion. "This acquisition Security The Hacker News

19.3.25

New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking A critical security vulnerability has been disclosed in AMI's MegaRAC Baseboard Management Controller (BMC) software that could allow an attacker to bypass authentication and carry out post-exploitation actions. The vulnerability, tracked as Vulnerebility The Hacker News

19.3.25

New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads Cybersecurity researchers have warned about a large-scale ad fraud campaign that has leveraged hundreds of malicious apps published on the Google Play Store Exploit

The Hacker News

19.3.25

China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the China-aligned MirrorFace threat actor that targeted a diplomatic Virus The Hacker News

19.3.25

BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse At least four different threat actors have been identified as involved in an updated version of a massive ad fraud and residential proxy scheme called BADBOX , BotNet The Hacker News

18.3.25

Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and Virus The Hacker News

18.3.25

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept Exploit The Hacker News

17.3.25

Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by threat actors to deliver Mirat botnet malware variants since at BotNet

The Hacker News

17.3.25

Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users' Actions Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format the layout of web pages, to bypass spam filters and track users' Exploit The Hacker News

17.3.25

Cybersecurity researchers are calling attention to an incident in which the popular GitHub Action tj-actions/changed-files was compromised to leak secrets from

Security

The Hacker News

16.3.25

New Akira ransomware decryptor cracks encryptions keys using GPUs

Security researcher Yohanes Nugroho has released a decryptor for the Linux variant of Akira ransomware, which utilizes GPU power to retrieve the decryption key and unlock files for free.

Ransom

BleepingComputer

16.3.25

Coinbase phishing email tricks users with fake wallet migration

A large-scale Coinbase phishing attack poses as a mandatory wallet migration, tricking recipients into setting up a new wallet with a pre-generated recovery phrase controlled by attackers.

Phishing

BleepingComputer

16.3.25

Ransomware gang creates tool to automate VPN brute-force attacks

The Black Basta ransomware operation created an automated brute-forcing framework dubbed 'BRUTED' to breach edge networking devices like firewalls and VPNs.

Ransom

BleepingComputer

16.3.25

Cisco IOS XR vulnerability lets attackers crash BGP on routers

Cisco has patched a denial of service (DoS) vulnerability that lets attackers crash the Border Gateway Protocol (BGP) process on IOS XR routers with a single BGP update message.

Vulnerebility

BleepingComputer

16.3.25

Suspected LockBit ransomware dev extradited to United States

A dual Russian-Israeli national, suspected of being a key developer for the LockBit ransomware operation, has been extradited to the United States to face charges.

Ransom

BleepingComputer

16.3.25

New SuperBlack ransomware exploits Fortinet auth bypass flaws

A new ransomware operator named 'Mora_001' is exploiting two Fortinet vulnerabilities to gain unauthorized access to firewall appliances and deploy a custom ransomware strain dubbed SuperBlack.

Ransom

BleepingComputer

16.3.25

Microsoft says button to restore classic Outlook is broken

Microsoft is investigating a known issue that causes the new Outlook email client to crash when users click the "Go to classic Outlook" button, which should help them switch back to the classic Outlook.

Security

BleepingComputer

16.3.25

Juniper patches bug that let Chinese cyberspies backdoor routers

​Juniper Networks has released emergency security updates to patch a Junos OS vulnerability exploited by Chinese hackers to backdoor routers for stealthy access.

Vulnerebility

BleepingComputer

16.3.25

GitLab patches critical authentication bypass vulnerabilities

GitLab released security updates for Community Edition (CE) and Enterprise Edition (EE), fixing nine vulnerabilities, among which two critical severity ruby-saml library authentication bypass flaws.

Vulnerebility

BleepingComputer

16.3.25

ClickFix attack delivers infostealers, RATs in fake Booking.com emails

Microsoft is warning that an ongoing phishing campaign impersonating Booking.com is using ClickFix social engineering attacks to infect hospitality workers with various malware, including infostealers and RATs.

Virus

BleepingComputer

16.3.25

Facebook discloses FreeType 2 flaw exploited in attacks

Facebook is warning that a FreeType vulnerability in all versions up to 2.13 can lead to arbitrary code execution, with reports that the flaw has been exploited in attacks.

Social

BleepingComputer

16.3.25

CISA: Medusa ransomware hit over 300 critical infrastructure orgs

CISA says the Medusa ransomware operation has impacted over 300 organizations in critical infrastructure sectors in the United States until last month.

Ransom

BleepingComputer

16.3.25

New North Korean Android spyware slips onto Google Play

A new Android spyware named 'KoSpy' is linked to North Korean threat actors who have infiltrated Google Play and third-party app store APKPure through at least five malicious apps.

Virus

BleepingComputer

16.3.25

Garantex crypto exchange admin arrested while on vacation

Indian authorities arrested Aleksej Besciokov, the co-founder and one of the administrators of the Russian Garantex crypto-exchange while vacationing with his family in Varkala, India.

Cryptocurrency

BleepingComputer

16.3.25

Mozilla warns users to update Firefox before certificate expires

Mozilla is warning Firefox users to update their browsers to the latest version to avoid facing disruption and security risks caused by the upcoming expiration of one of the company's root certificates.

Security

BleepingComputer

15.3.25

AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution

In this blog entry, we uncovered a campaign that uses fake GitHub repositories to distribute SmartLoader, which is then used to deliver Lumma Stealer and other malicious payloads. The campaign leverages GitHub’s trusted reputation to evade detection, using AI-generated content to make fake repositories appear legitimate.

AI blog

Trend Micro

15.3.25

SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware

Trend Research analyzed SocGholish’s MaaS framework and its role in deploying RansomHub ransomware through compromised websites, using highly obfuscated JavaScript loaders to evade detection and execute various malicious tasks.

Ransom blog

Trend Micro

15.3.25

Critical Mautic Vulnerability (CVE-2024-47051) Enables Arbitrary File Uploads

The SonicWall Capture Labs threat research team became aware of a critical arbitrary file upload in Mautic, assessed its impact, and developed mitigation measures.

Vulnerebility blog

SonicWall

15.3.25

Off the Beaten Path: Recent Unusual Malware

Recently, we discovered several new malware samples with unique characteristics that made attribution and function determination challenging.

Malware blog

Palo Alto

15.3.25

Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims

Unit 42 researchers discovered a campaign distributing thousands of fraudulent cryptocurrency investment platforms ​​via websites and mobile applications.

Cryptocurrency blog

Palo Alto

15.3.25

Enterprises Should Consider Replacing Employees’ Home TP-Link Routers

An examination of CVE trends from February 2025 scanning data.

Vulnerebility blog

F5

15.3.25

Why Critical MongoDB Library Flaws Won't See Mass Exploitation

Discover how to mitigate CVE-2024-53900 and CVE-2025-23061, which expose Node.js APIs to remote attacks.

Vulnerebility blog

F5

15.3.25

Blind Eagle: …And Justice for All

Check Point Research discovered a series of ongoing campaigns targeting Colombian institutions and government entities since November 2024. The campaigns are linked to Blind Eagle, also known as APT-C-36, and deliver malicious .url files, which cause a similar effect to the CVE-2024-43451 vulnerability

Vulnerebility blog

Checkpoint

15.3.25

Patch it up: Old vulnerabilities are everyone’s problems

Thorsten picks apart some headlines, highlights Talos’ report on an unknown attacker predominantly targeting Japan, and asks, “Where is the victim, and does it matter?”

Vulnerebility blog

Cisco Blog

15.3.25

Microsoft Patch Tuesday for March 2025 — Snort rules and prominent vulnerabilities

Microsoft has released its monthly security update for March of 2025 which includes 57 vulnerabilities affecting a range of products, including 6 that Microsoft marked as “critical”.

Vulnerebility blog

Cisco Blog

15.3.25

When IT meets OT: Cybersecurity for the physical world

While relatively rare, real-world incidents impacting operational technology highlight that organizations in critical infrastructure can’t afford to dismiss the OT threat

Cyber blog

Eset

15.3.25

Don’t let cybercriminals steal your Spotify account

Listen up, this is sure to be music to your ears – a few minutes spent securing your account today can save you a ton of trouble tomorrow

Cyber blog

Eset

15.3.25

AI-driven deception: A new face of corporate fraud

Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses

AI blog

Eset

15.3.25

Microsoft patches Windows Kernel zero-day exploited since 2023

Slovak cybersecurity company ESET says a newly patched zero-day vulnerability in the Windows Win32 Kernel Subsystem has been exploited in attacks since March 2023.

OS

BleepingComputer

15.3.25

Chinese cyberspies backdoor Juniper routers for stealthy access

Chinese hackers are deploying custom backdoors on Juniper Networks Junos OS MX routers that have reached end-of-life (EoL) and no longer receive security updates.

APT

BleepingComputer

15.3.25

Microsoft: Recent Windows updates make USB printers print random text

Microsoft says that some USB printers will start printing random text after installing Windows updates released since late January 2025.

OS

BleepingComputer

15.3.25

North Korean Lazarus hackers infect hundreds via npm packages

Six malicious packages have been identified on npm (Node package manager) linked to the notorious North Korean hacking group Lazarus.

APT

BleepingComputer

15.3.25

Apple fixes WebKit zero-day exploited in ‘extremely sophisticated’ attacks

Apple has released emergency security updates to patch a zero-day bug the company describes as exploited in "extremely sophisticated" attacks.

OS

BleepingComputer

15.3.25

Windows 10 KB5053606 update fixes broken SSH connections

Microsoft has released the KB5053606 cumulative update for Windows 10 22H2 and Windows 10 21H2, which fixes numerous bugs, including one preventing SSH connections.

OS

BleepingComputer

15.3.25

Microsoft March 2025 Patch Tuesday fixes 7 zero-days, 57 flaws

Today is Microsoft's March 2025 Patch Tuesday, which includes security updates for 57 flaws, including six actively exploited zero-day vulnerabilities.

OS

BleepingComputer

15.3.25

Windows 11 KB5053598 & KB5053602 cumulative updates released

Microsoft has released Windows 11 KB5053598 and KB5053602 cumulative updates for versions 24H2 and 23H2 to fix security vulnerabilities and issues.

OS

BleepingComputer

15.3.25

Microsoft replacing Remote Desktop app with Windows App in May

Microsoft announced that it will drop support for the Remote Desktop app (available via the Microsoft Store) on May 27 and replace it with its new Windows App.

OS

BleepingComputer

15.3.25

MassJacker malware uses 778,000 wallets to steal cryptocurrency

A newly discovered clipboard hijacking operation dubbed 'MassJacker' uses at least 778,531 cryptocurrency wallet addresses to steal digital assets from compromised computers.

Virus

BleepingComputer

15.3.25

Critical PHP RCE vulnerability mass exploited in new attacks

Threat intelligence company GreyNoise warns that a critical PHP remote code execution vulnerability that impacts Windows systems is now under mass exploitation.

Vulnerebility

BleepingComputer

15.3.25

PowerSchool previously hacked in August, months before data breach

PowerSchool has published a long-awaited CrowdStrike investigation into its massive December 2024 data breach, which determined that the company was previously hacked over 4 months earlier, in August, and then again in September.

Incindent

BleepingComputer

15.3.25

CISA tags critical Ivanti EPM flaws as actively exploited in attacks

CISA warned U.S. federal agencies to secure their networks against attacks exploiting three critical vulnerabilities affecting Ivanti Endpoint Manager (EPM) appliances.

Vulnerebility

BleepingComputer

15.3.25

X hit by 'massive cyberattack' amid Dark Storm's DDoS claims

The Dark Storm hacktivist group claims to be behind DDoS attacks causing multiple X worldwide outages on Monday, leading the company to enable DDoS protections from Cloudflare.

Attack

BleepingComputer

14.3.25

Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges

A 51-year-old dual Russian and Israeli national who is alleged to be a developer of the LockBit ransomware group has been extradited to the United States, nearly three months after he was formally charged in connection with the e-crime

BigBrothers

The Hacker News

14.3.25

GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging

The GSM Association (GSMA) has formally announced support for end-to-end encryption (E2EE) for securing messages sent via the Rich Communications

Safety

The Hacker News

14.3.25

Live Ransomware Demo: See How Hackers Breach Networks and Demand a Ransom

Cyber threats evolve daily. In this live webinar, learn exactly how ransomware attacks unfold—from the initial breach to the moment hackers demand payment.

Ransom

The Hacker News

14.3.25

New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions

Users searching for pirated software are the target of a new malware campaign that delivers a previously undocumented clipper malware called MassJacker,

Virus

The Hacker News

14.3.25

OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection

A new malware campaign has been observed leveraging social engineering tactics to deliver an open-source rootkit called r77 . The activity, condemned

Virus

The Hacker News

13.3.25

Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails

Microsoft has shed light on an ongoing phishing campaign that targeted the hospitality sector by impersonating online travel agency Booking.com using an increasingly popular social engineering technique called ClickFix to deliver credential-stealing malware.

Phishing

The Hacker News

13.3.25

North Korea's ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps

The North Korea-linked threat actor known as ScarCruft is said to have been behind a never-before-seen Android surveillance tool named KoSpy targeting

APT

The Hacker News

13.3.25

GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks

Two high-severity security flaws have been disclosed in the open-source ruby-saml library that could allow malicious actors to bypass Security Assertion Markup Language (SAML) authentication protections. SAML is an XML-based markup

Vulnerebility

The Hacker News

13.3.25

Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk

Meta has warned that a security vulnerability impacting the FreeType open-source font rendering library may have been exploited in the wild. The vulnerability has

Exploit

The Hacker News

13.3.25

WARNING: Expiring Root Certificate May Disable Firefox Add-Ons, Security Features, and DRM Playback

Browser maker Mozilla is urging users to update their Firefox instances to the latest version to avoid facing issues with using add-ons due to the impending

Hack

The Hacker News

13.3.25

Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits

The China-nexus cyber espionage group tracked as UNC3886 has been observed targeting end-of-life MX routers from Juniper Networks as part of a campaign

APT

The Hacker News

12.3.25

Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack

Threat intelligence firm GreyNoise is warning of a "coordinated surge" in the exploitation of Server-Side Request Forgery (SSRF) vulnerabilities spanning

Vulnerebility

The Hacker News

12.3.25

URGENT: Microsoft Patches 57 Security Flaws, Including 6 Actively Exploited Zero-Days

Microsoft on Tuesday released security updates to address 57 security vulnerabilities in its software, including a whopping six zero-days that it said have

Vulnerebility

The Hacker News

12.3.25

Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks

Apple on Tuesday released a security update to address a zero-day flaw that it said has been exploited in "extremely sophisticated" attacks. The vulnerability has been

Vulnerebility

The Hacker News

12.3.25

Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks

The threat actor known as Blind Eagle has been linked to a series of ongoing campaigns targeting Colombian institutions and government entities since

APT

The Hacker News

11.3.25

US govt says Americans lost record $12.5 billion to fraud in 2024

The U.S. Federal Trade Commission (FTC) said today that Americans lost a record $12.5 billion to fraud last year, a 25% increase over the previous year.

BigBrothers

BleepingComputer

11.3.25

FTC will send $25.5 million to victims of tech support scams

Later this week, the Federal Trade Commission (FTC) will start distributing over $25.5 million in refunds to those misled by tech support companies Restoro and Reimage's scare tactics.

BigBrothers

BleepingComputer

11.3.25

Swiss critical sector faces new 24-hour cyberattack reporting rule

Switzerland's National Cybersecurity Centre (NCSC) has announced a new reporting obligation for critical infrastructure organizations in the country, requiring them to report cyberattacks to the agency within 24 hours of their discovery.

BigBrothers

BleepingComputer

11.3.25

Google paid $12 million in bug bounties last year to security researchers

Google paid almost $12 million in bug bounty rewards to 660 security researchers who reported security bugs through the company's Vulnerability Reward Program (VRP) in 2024.

Security

BleepingComputer

11.3.25

US cities warn of wave of unpaid parking phishing texts

US cities are warning of an ongoing mobile phishing campaign pretending to be texts from the city's parking violation departments about unpaid parking invoices, that if unpaid, will incur an additional $35 fine per day.

Phishing

BleepingComputer

11.3.25

Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices

Unpatched TP-Link Archer routers have become the target of a new botnet campaign dubbed Ballista, according to new findings from the Cato CTRL team.

BotNet

The Hacker News

11.3.25

SideWinder APT Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa

Maritime and logistics companies in South and Southeast Asia, the Middle East, and Africa have become the target of an advanced persistent threat (APT) group

APT

The Hacker News

11.3.25

Moxa Issues Fix for Critical Authentication Bypass Vulnerability in PT Switches

Taiwanese company Moxa has released a security update to address a critical security flaw impacting its PT switches that could permit an attacker to bypass

Vulnerebility

The Hacker News

11.3.25

CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws impacting Advantive VeraCore and Ivanti Endpoint

Vulnerebility

The Hacker News

10.3.25

Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials

Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on.

Hack

The Hacker News

10.3.25

Desert Dexter Targets 900 Victims Using Facebook Ads and Telegram Malware Links

The Middle East and North Africa have become the target of a new campaign that delivers a modified version of a known malware called AsyncRAT since September

Social

The Hacker News

10.3.25

SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools

A new mass malware campaign is infecting users with a cryptocurrency miner named SilentCryptoMiner by masquerading it as a tool designed to circumvent

Cryptocurrency

The Hacker News

9.3.25

Developer guilty of using kill switch to sabotage employer's systems

A software developer has been found guilty of sabotaging his ex-employer's systems by running custom malware and installing a "kill switch" after being demoted at the company.

Incindent

BleepingComputer

9.3.25

Undocumented "backdoor" found in Bluetooth chip used by a billion devices

The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented "backdoor" that could be leveraged for attacks.

Virus

BleepingComputer

9.3.25

YouTubers extorted via copyright strikes to spread malware

Cybercriminals are sending bogus copyright claims to YouTubers to coerce them into promoting malware and cryptocurrency miners on their videos.

Cryptocurrency

BleepingComputer

9.3.25

US seizes $23 million in crypto linked to LastPass breaches

U.S. authorities have seized over $23 million in cryptocurrency linked to the theft of $150 million from a Ripple crypto wallet in January 2024. Investigators believe hackers who breached LastPass in 2022 were behind the attack.

Cryptocurrency

BleepingComputer

9.3.25

Unpatched Edimax IP camera flaw actively exploited in botnet attacks

A critical command injection vulnerability impacting the Edimax IC-7100 IP camera is currently being exploited by botnet malware to compromise devices.

BotNet

BleepingComputer

9.3.25

Employee charged with stealing unreleased movies, sharing them online

A Memphis man was arrested and charged with stealing DVDs and Blu-ray discs of unreleased movies and sharing ripped digital copies online before their release.

Cyber

BleepingComputer

9.3.25

US charges Garantex admins with money laundering, sanctions violations

The administrators of the Russian Garantex crypto-exchange have been charged in the United States with facilitating money laundering for criminal organizations and violating sanctions.

Cryptocurrency

BleepingComputer

9.3.25

Data breach at Japanese telecom giant NTT hits 18,000 companies

Japanese telecommunication services provider NTT Communications Corporation (NTT) is warning almost 18,000 corporate customers that their information was compromised during a cybersecurity incident.

Incindent

BleepingComputer

9.3.25

Microsoft: North Korean hackers join Qilin ransomware gang

Microsoft says a North Korean hacking group tracked as Moonstone Sleet has deployed Qilin ransomware payloads in a limited number of attacks.

Ransom

BleepingComputer

9.3.25

Microsoft says malvertising campaign impacted 1 million PCs

Microsoft has taken down an undisclosed number of GitHub repositories used in a massive malvertising campaign that impacted almost one million devices worldwide.

Virus

BleepingComputer

9.3.25

Ransomware gang encrypted network from a webcam to bypass EDR

The Akira ransomware gang was spotted using an unsecured webcam to launch encryption attacks on a victim's network, effectively circumventing Endpoint Detection and Response (EDR), which was blocking the encryptor in Windows.

Ransom

BleepingComputer

9.3.25

US seizes domain of Garantex crypto exchange used by ransomware gangs

The U.S. Secret Service has seized the domain of the sanctioned Russian cryptocurrency exchange Garantex in collaboration with the Department of Justice's Criminal Division, the FBI, and Europol.

Ransom

BleepingComputer

9.3.25

Cybercrime 'crew' stole $635,000 in Taylor Swift concert tickets

New York prosecutors say that two people working at a third-party contractor for the StubHub online ticket marketplace made $635,000 after almost 1,000 concert tickets and reselling them online.

CyberCrime

BleepingComputer

9.3.25

Ethereum private key stealer on PyPI downloaded over 1,000 times

A malicious Python Package Index (PyPI) package named "set-utils" has been stealing Ethereum private keys through intercepted wallet creation functions and exfiltrating them via the Polygon blockchain.

Cryptocurrency

BleepingComputer

9.3.25

Over 37,000 VMware ESXi servers vulnerable to ongoing attacks

Over 37,000 internet-exposed VMware ESXi instances are vulnerable to CVE-2025-22224, a critical out-of-bounds write flaw that is actively exploited in the wild.

Vulnerebility

BleepingComputer

9.3.25

Malicious Chrome extensions can spoof password managers in new attack

A newly devised "polymorphic" attack allows malicious Chrome extensions to morph into other browser extensions, including password managers, crypto wallets, and banking apps, to steal sensitive information.

Hack

BleepingComputer

9.3.25

Open-source tool 'Rayhunter' helps users detect Stingray attacks

The Electronic Frontier Foundation (EFF) has released a free, open-source tool named Rayhunter that is designed to detect cell-site simulators (CSS), also known as IMSI catchers or Stingrays.

Attack

BleepingComputer

8.3.25

Silk Typhoon hackers now target IT supply chains to breach networks

Microsoft warns that Chinese cyber-espionage threat group 'Silk Typhoon' has shifted its tactics, now targeting remote management tools and cloud services in supply chain attacks that give them access to downstream customers.

APT

BleepingComputer

8.3.25

US charges Chinese hackers linked to critical infrastructure breaches

The US Justice Department has charged Chinese state security officers along with APT27 and i-Soon hackers for network breaches and cyberattacks that have targeted victims globally since 2011.

APT

BleepingComputer

8.3.25

BadBox malware disrupted on 500K infected Android devices

The BadBox Android malware botnet has been disrupted again by removing 24 malicious apps from Google Play and sinkholing communications for half a million infected devices.

Virus

BleepingComputer

8.3.25

YouTube warns of AI-generated video of its CEO used in phishing attacks

YouTube warns of AI-generated video of its CEO used in phishing attacks

AI

BleepingComputer

8.3.25

Toronto Zoo shares update on last year's ransomware attack

The Toronto Zoo, the largest zoo in Canada, has provided more information about the data stolen during a ransomware attack in January 2024.

Ransom

BleepingComputer

8.3.25

Fake BianLian ransom notes mailed to US CEOs in postal mail scam

Scammers are impersonating the BianLian ransomware gang in fake ransom notes sent to US companies via snail mail through the United States Postal Service.

Ransom

BleepingComputer

8.3.25

Microsoft Teams tactics, malware connect Black Basta, Cactus ransomware

New research has uncovered further links between the Black Basta and Cactus ransomware gangs, with members of both groups utilizing the same social engineering attacks and the BackConnect proxy malware for post-exploitation access to corporate networks.

Ransom

BleepingComputer

8.3.25

New Eleven11bot botnet infects 86,000 devices for DDoS attacks

A new botnet malware named 'Eleven11bot' has infected over 86,000 IoT devices, primarily security cameras and network video recorders (NVRs), to conduct DDoS attacks.

BotNet

BleepingComputer

8.3.25

Cisco warns of Webex for BroadWorks flaw exposing credentials

Cisco warned customers today of a vulnerability in Webex for BroadWorks that could let unauthenticated attackers access credentials remotely.

Exploit

BleepingComputer

8.3.25

Google expands Android AI scam detection to more Pixel devices

Google has announced an increased rollout of new AI-powered scam detection features on Android to help protect users from increasingly sophisticated phone and text social engineering scams.

AI

BleepingComputer

8.3.25

New polyglot malware hits aviation, satellite communication firms

A previously undocumented polyglot malware is being deployed in attacks against aviation, satellite communication, and critical transportation organizations in the United Arab Emirates.

Virus

BleepingComputer

8.3.25

Polish Space Agency offline as it recovers from cyberattack

The Polish Space Agency (POLSA) has been offline since it disconnected its systems from the Internet over the weekend to contain a breach of its IT infrastructure.

BigBrothers

BleepingComputer

8.3.25

Hunters International ransomware claims attack on Tata Technologies

The Hunters International ransomware gang has claimed responsibility for a January cyberattack attack on Tata Technologies, stating they stole 1.4TB of data from the company.

Ransom

BleepingComputer

8.3.25

Broadcom fixes three VMware zero-days exploited in attacks

Broadcom warned customers today about three VMware zero-days, tagged as exploited in attacks and reported by the Microsoft Threat Intelligence Center.

Vulnerebility

BleepingComputer

8.3.25

Google fixes Android zero-day exploited by Serbian authorities

Google has released patches for 43 vulnerabilities in Android's March 2025 security update, including two zero-days. Serbian authorities have used one of the zero-days to unlock confiscated devices.

Vulnerebility

BleepingComputer

8.3.25

Rubrik rotates authentication keys after log server breach

Rubrik disclosed last month that one of its servers hosting log files was breached, causing the company to rotate potentially leaked authentication keys.

Incindent

BleepingComputer

8.3.25

DHS says CISA will not stop monitoring Russian cyber threats

The US Cybersecurity and Infrastructure Security Agency says that media reports about it being directed to no longer follow or report on Russian cyber activity are untrue, and its mission remains unchanged.

BigBrothers

BleepingComputer

8.3.25

CISA tags Windows, Cisco vulnerabilities as actively exploited

CISA has warned US federal agencies to secure their systems against attacks exploiting vulnerabilities in Cisco and Windows systems.

Exploit

BleepingComputer

8.3.25

New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint

A newly uncovered ClickFix phishing campaign is tricking victims into executing malicious PowerShell commands that deploy the Havok post-exploitation framework for remote access to compromised devices.

Attack

BleepingComputer

8.3.25

UK watchdog probes TikTok and Reddit over child privacy concerns

On Monday, the United Kingdom's privacy watchdog announced that it is investigating TikTok, Reddit, and Imgur because of privacy concerns about how they are processing children's data.

BigBrothers

BleepingComputer

8.3.25

Nearly 12,000 API keys and passwords found in AI training dataset

Close to 12,000 valid secrets that include API keys and passwords have been found in the Common Crawl dataset used for training multiple artificial intelligence models.

AI

BleepingComputer

8.3.25

Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks

Microsoft had discovered five Paragon Partition Manager BioNTdrv.sys driver flaws, with one used by ransomware gangs in zero-day attacks to gain SYSTEM privileges in Windows.

Ransom

BleepingComputer

8.3.25

Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security

DeepSeek-R1 uses Chain of Thought (CoT) reasoning, explicitly sharing its step-by-step thought process, which we found was exploitable for prompt attacks.

AI blog

Trend Micro

8.3.25

Malvertising campaign leads to info stealers hosted on GitHub

Microsoft detected a large-scale malvertising campaign in early December 2024 that impacted nearly one million devices globally. The attack originated from illegal streaming websites embedded with malvertising redirectors and ultimately redirected users to GitHub to deliver initial access payloads as the start of a modular and multi-stage attack chain.

Malware blog

Microsoft blog

8.3.25

Uncovering .NET Malware Obfuscated by Encryption and Virtualization

We will examine these behaviors in samples we have observed, showing how to extract their configuration parameters through unpacking each stage. Performing this same process through automation would allow a sandbox performing static analysis to extract crucial malware configuration parameters from such samples.

Malware blog

Palo Alto

8.3.25

Unmasking the new persistent attacks on Japan

Cisco Talos has discovered an active exploitation of CVE-2024-4577 by an attacker in order to gain access to the victim's machines and carry out post-exploitation activities.

Exploit blog

Cisco Blog

8.3.25

Who is Responsible and Does it Matter?

Martin Lee dives into to the complexities of defending our customers from threat actors and covers the latest Talos research in this week's newsletter.

Cyber blog

Cisco Blog

8.3.25

Kids behaving badly online? Here's what parents can do

By taking time to understand and communicate the impact of undesirable online behavior, you can teach your kids an invaluable set of life lessons for a new digital age

Cyber blog

Eset

8.3.25

Martin Rees: Post-human intelligence – a cosmic perspective | Starmus highlights

Take a moment to think beyond our current capabilities and consider what might come next in the grand story of evolution

AI blog

Eset

8.3.25

Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani

Big shifts in the infostealer scene, novel attack vector against iOS and Android, and a massive surge in investment scams on social media

Cyber blog

Eset

8.3.25

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations

Threat hunters have shed light on a "sophisticated and evolving malware toolkit" called Ragnar Loader that's used by various cybercrime and ransomware groups

APT

The Hacker News

8.3.25

Microsoft Warns of Malvertising Campaign Infecting Over 1 Million Devices Worldwide

Microsoft has disclosed details of a large-scale malvertising campaign that's estimated to have impacted over one million devices globally as part of what it

CyberCrime

The Hacker News

8.3.25

This Malicious PyPI Package Stole Ethereum Private Keys via Polygon RPC Transactions

Cybersecurity researchers have discovered a malicious Python package on the Python Package Index (PyPI) repository that's equipped to steal a victim's

Virus

The Hacker News

8.3.25

U.S. Secret Service Seizes Russian Garantex Crypto Exchange Website

A coalition of international law enforcement agencies has seized the website associated with the cryptocurrency exchange Garantex ("garantex[.]org"), nearly

Cryptocurrency

The Hacker News

7.3.25

Safe{Wallet} Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist

Safe{Wallet} has revealed that the cybersecurity incident that led to the Bybit $1.5 billion crypto heist is a "highly sophisticated, state-sponsored attack," stating the

Cryptocurrency

The Hacker News

7.3.25

PHP-CGI RCE Flaw Exploited in Attacks on Japan's Tech, Telecom, and E-Commerce Sectors

Threat actors of unknown provenance have been attributed to a malicious campaign predominantly targeting organizations in Japan since January 2025.

Exploit

The Hacker News

7.3.25

Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution

Elastic has rolled out security updates to address a critical security flaw impacting the Kibana data visualization dashboard software for Elasticsearch that could

Vulnerebility

The Hacker News

7.3.25

EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing

The financially motivated threat actor known as EncryptHub has been observed orchestrating sophisticated phishing campaigns to deploy information stealers

Ransom

The Hacker News

7.3.25

Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom

The threat actors behind the Medusa ransomware have claimed nearly 400 victims since it first emerged in January 2023, with the financially motivated attacks

Ransom

The Hacker News

7.3.25

Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

Over 1,000 websites powered by WordPress have been infected with a third-party JavaScript code that injects four separate backdoors. "Creating four backdoors

Virus

The Hacker News

6.3.25

U.S. Charges 12 Chinese Nationals in State-Backed Hacking Operations

The U.S. Department of Justice (DoJ) has announced charges against 12 Chinese nationals for their alleged participation in a wide-ranging scheme designed to steal

BigBrothers

The Hacker News

6.3.25

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

The China-linked threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology (IT) supply chain as a means to obtain initial access to

APT

The Hacker News

6.3.25

Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America

The threat actor known as Dark Caracal has been attributed to a campaign that deployed a remote access trojan called Poco RAT in attacks targeting Spanish-

Virus

The Hacker News

6.3.25

Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud

Google has announced the rollout of artificial intelligence (AI)-powered scam detection features to secure Android device users and their personal information.

AI

The Hacker News

6.3.25

Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

The threat actor known as Lotus Panda has been observed targeting government, manufacturing, telecommunications, and media sectors in the Philippines,

APT

The Hacker News

5.3.25

Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to

Virus

The Hacker News

5.3.25

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) module for maintaining

Ransom

The Hacker News

5.3.25

VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches

Broadcom has released security updates to address three actively exploited security flaws in VMware ESXi, Workstation, and Fusion products that could lead

Vulnerebility

The Hacker News

5.3.25

Suspected Iranian Hackers Used Compromised Indian Firm's Email to Target U.A.E. Aviation Sector

Threat hunters are calling attention to a new highly-targeted phishing campaign that singled out "fewer than five" entities in the United Arab Emirates (U.A.E.) to

APT

The Hacker News

5.3.25

Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers

Internet service providers (ISPs) in China and the West Coast of the United States have become the target of a mass exploitation campaign that deploys information

BigBrothers

The Hacker News

4.3.25

Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws impacting software from Cisco, Hitachi Vantara,

Exploit

The Hacker News

4.3.25

Google's March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities

Google has released its monthly Android Security Bulletin for March 2025 to address a total of 44 vulnerabilities, including two that it said have come under

Vulnerebility

The Hacker News

4.3.25

Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail

Threat actors are targeting Amazon Web Services ( AWS ) environments to push out phishing campaigns to unsuspecting targets, according to findings from Palo

Phishing

The Hacker News

4.3.25

Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites

Cybersecurity researchers are calling attention to a new phishing campaign that employs the ClickFix technique to deliver an open-source command-and-control

Phishing

The Hacker News

4.3.25

Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks

Threat actors have been exploiting a security vulnerability in Paragon Partition Manager's BioNTdrv.sys driver in ransomware attacks to escalate privileges and

Exploit

The Hacker News

4.3.25

U.K. ICO Investigates TikTok, Reddit, and Imgur Over Children's Data Protection Practices

The U.K.'s Information Commissioner's Office (ICO) has opened an investigation into online platforms TikTok, Reddit, and Imgur to assess the steps they are taking

BigBrothers

The Hacker News

3.3.25

Vo1d Botnet's Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries

Brazil, South Africa, Indonesia, Argentina, and Thailand have become the targets of a campaign that has infected Android TV devices with a botnet malware dubbed

BotNet

The Hacker News

1.3.25

Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks

Microsoft had discovered five Paragon Partition Manager BioNTdrv.sys driver flaws, with one used by ransomware gangs in zero-day attacks to gain SYSTEM privileges in Windows.

Ransom

BleepingComputer

1.3.25

U.S. recovers $31 million stolen in 2021 Uranium Finance hack

U.S. authorities recovered $31 million in cryptocurrency stolen in 2021 cyberattacks on Uranium Finance, a Binance Smart Chain-based DeFi protocol.

Cryptocurrency

BleepingComputer

1.3.25

Qilin ransomware claims attack at Lee Enterprises, leaks stolen data

The Qilin ransomware gang has claimed responsibility for the attack at Lee Enterprises that disrupted operations on February 3, leaking samples of data they claim was stolen from the company.

Ransom

BleepingComputer

1.3.25

Police arrests suspects tied to AI-generated CSAM distribution ring

Law enforcement agencies from 19 countries have arrested 25 suspects linked to a criminal ring that was distributing child sexual abuse material (CSAM) generated using artificial intelligence (AI).

AI

BleepingComputer

1.3.25

Serbian police used Cellebrite zero-day hack to unlock Android phones

Serbian authorities have reportedly used an Android zero-day exploit chain developed by Cellebrite to unlock the device of a student activist in the country and attempt to install spyware.

OS

BleepingComputer

1.3.25

Vo1d malware botnet grows to 1.6 million Android TVs worldwide

A new variant of the Vo1d malware botnet has grown to 1,590,299 infected Android TV devices across 226 countries, recruiting devices as part of anonymous proxy server networks.

Virus

BleepingComputer

1.3.25

Privacy tech firms warn France’s encryption and VPN laws threaten privacy

Privacy-focused email provider Tuta (previously Tutanota) and the VPN Trust Initiative (VTI) are raising concerns over proposed laws in France set to backdoor encrypted messaging systems and restrict internet access.

BigBrothers

BleepingComputer

1.3.25

Over 49,000 misconfigured building access systems exposed online

Researchers discovered 49,000 misconfigured and exposed Access Management Systems (AMS) across multiple industries and countries, which could compromise privacy and physical security in critical sectors.

Incindent

BleepingComputer

1.3.25

Belgium probes if Chinese hackers breached its intelligence service

The Belgian federal prosecutor's office is investigating whether Chinese hackers were behind a breach of the country's State Security Service (VSSE).

Incindent

BleepingComputer

1.3.25

Suspected Desorden hacker arrested for breaching 90 organizations

A suspected cyber criminal believed to have extorted companies under the name "DESORDEN Group" or "ALTDOS" has been arrested in Thailand for leaking the stolen data of over 90 organizations worldwide.

CyberCrime

BleepingComputer

1.3.25

FBI confirms Lazarus hackers were behind $1.5B Bybit crypto heist

FBI has confirmed that North Korean hackers stole $1.5 billion from cryptocurrency exchange Bybit on Friday in the largest crypto heist recorded until now.

Cryptocurrency

BleepingComputer

1.3.25

Southern Water says Black Basta ransomware attack cost £4.5M in expenses

United Kingdom water supplier Southern Water has disclosed that it incurred costs of £4.5 million ($5.7M) due to a cyberattack it suffered in February 2024.

Ransom

BleepingComputer

1.3.25

GrassCall malware campaign drains crypto wallets via fake job interviews

A recent social engineering campaign targeted job seekers in the Web3 space with fake job interviews through a malicious "GrassCall" meeting app that installs information-stealing malware to steal cryptocurrency wallets.

Virus

BleepingComputer

1.3.25

JavaGhost’s Persistent Phishing Attacks From the Cloud

Unit 42 researchers have observed phishing activity that we track as TGR-UNK-0011. We assess with high confidence that this cluster overlaps with the threat actor group JavaGhost. The threat actor group JavaGhost has been active for over five years and continues to target cloud environments to send out phishing campaigns to unsuspecting targets.

Phishing blog

Palo Alto

1.3.25

Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Global Organizations

This article reviews a cluster of malicious activity that we identify as CL-STA-0049. Since at least March 2023, a suspected Chinese threat actor has targeted governments, defense, telecommunication, education and aviation sectors in Southeast Asia and South America.

Malware blog

Palo Alto

1.3.25

RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sector

Malware targeting macOS systems is increasingly pervasive in our current threat landscape. Most of the associated threats are cybercrime-related, ranging from information stealers to cryptocurrency mining. Over the past year, we have witnessed an increase in cybercrime activity linked to North Korean nation-state APT groups.

Malware blog

Palo Alto

1.3.25

Auto-Color: An Emerging and Evasive Linux Backdoor

Between early November and December 2024, Palo Alto Networks researchers discovered new Linux malware called Auto-color. We chose this name based on the file name the initial payload renames itself after installation.

Malware blog

Palo Alto

1.3.25

Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign

While the abuse of vulnerable drivers has been around for a while, those that can terminate arbitrary processes have drawn increasing attention in recent years. As Windows security continues to evolve, it has become more challenging for attackers to execute malicious code without being detected.

APT blog

Checkpoint

1.3.25

Modern Approach to Attributing Hacktivist Groups

Over the past few decades, hacktivism has been, in a lot of cases, characterized by minor website defacements and distributed denial-of-service (DDoS) attacks, which, while making headlines, had minimal lasting impact.

BigBrother blog

Checkpoint

1.3.25

Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools

Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools

APT blog

Cisco Blog

1.3.25

Sellers can get scammed too, and Joe goes off on a rant about imposter syndrome

Joe has some advice for anyone experiencing self doubt or wondering about their next career move. Plus, catch up on the latest Talos research on scams targeting sellers, and the Lotus Blossom espionage group.

APT blog

Cisco Blog

1.3.25

Your item has sold! Avoiding scams targeting online sellers

There are many risks associated with selling items on online marketplaces that individuals and organizations should be aware of when conducting business on these platforms.

Spam blog

Cisco Blog

1.3.25

Bernhard Schölkopf: Is AI intelligent? | Starmus highlights

While today’s artificial intelligence excels at recognizing patterns, Schölkopf's talk raises a crucial question: what is the next great leap for AI?

AI blog

Eset

1.3.25

This month in security with Tony Anscombe – February 2025 edition

Ransomware payments trending down, the cyber-resilience gap facing SMBs, and APT groups embracing generative AI – it's a wrap on another month filled with impactful security news

Ransom blog

Eset

1.3.25

Laurie Anderson: Building an ARK | Starmus highlights

The pioneering multi-media artist reveals the creative process behind her stage show called ARK, which challenges audiences to reflect on some of the most pressing issues of our times

Cyber blog

Eset

1.3.25

Deceptive Signatures: Advanced Techniques in BEC Attacks

Business email compromise attacks have become increasingly common in recent years, driven by sophisticated social engineering tactics that make it easier to dupe victims.

Spam blog

Cybereason

1.3.25

Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language

Firefox browser maker Mozilla on Friday updated its Terms of Use a second time within a week following criticism overbroad language that appeared to give the

Security

The Hacker News

1.3.25

Amnesty Finds Cellebrite's Zero-Day Used to Unlock Serbian Activist's Android Phone

A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International. "The Android phone of one student protester was

Exploit

The Hacker News