Source: securityboulevard.com – Author: Gary Warner Here we have another cautionary tale about off-shoring customer service when faced with the reality of Call Center Scams that...
Year: 2025
The AI Threat: How Enterprises Can Defend Against the Next Generation of Attacks – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team AI is transforming the way work gets done across industries. But while it improves business efficiencies, it also arms cybercriminals...
Telcom Security: The Intersection of Critical Infrastructure – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Telecommunications service providers (TSP) are foundational to the functioning of our modern technical society, serving as the conduit through which...
Bouygues Telecom Hit by Cyberattack, 6.4 Million Customers Affected – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A cyberattack on Bouygues Telecom exposed data for 6.4 million customers. Find out what information was compromised and what you...
AgentFlayer 0-click exploit abuses ChatGPT Connectors to Steal 3rd-party app data – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. AgentFlayer is a critical vulnerability in ChatGPT Connectors. Learn how this zero-click attack uses indirect prompt injection to secretly steal...
New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP – Source:thehackernews.com
Source: thehackernews.com – Author: . A novel attack technique could be weaponized to rope thousands of public domain controllers (DCs) around the world to create a...
Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have presented new findings related to a now-patched security issue in Microsoft’s Windows Remote Procedure Call (RPC) communication protocol...
Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Researchers demonstrated that smart buses, the transportation vehicles that incorporate various systems to improve safety, efficiency, and passenger experience, can...
DEF CON hackers plug security holes in US water systems amid tsunami of threats – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons def con A DEF CON hacker walks into a small-town water facility…no, this is not the setup for a joke...
The inside story of the Telemessage saga, and how you can view the data – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson DEF CON On Saturday at DEF CON, security boffin Micah Lee explained just how he hacked into TeleMessage, the supposedly...
BadCam: Linux-based Lenovo webcam bugs enable BadUSB attacks – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Lenovo webcam flaws, dubbed BadCam, let attackers turn them into BadUSB devices to inject keystrokes and launch OS-independent attacks. Eclypsium...
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57 – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits....
Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs...
Embargo Ransomware nets $34.2M in crypto since April 2024 – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Embargo ransomware, likely a BlackCat/Alphv successor, has netted $34.2M in crypto since mid-2024, researchers say. The Embargo ransomware group has...
Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have uncovered multiple security flaws in Dell’s ControlVault3 firmware and its associated Windows APIs that could have been abused...
The Future of API Security Reviews – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team As organizations increasingly rely on application programming interfaces (APIs) to facilitate communication and data exchange between software systems, these “gates”...
SMBs Know the Risks, So Why Are Cybercriminals Still Winning? – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Cybercriminals are no longer primarily focused on large enterprises. They now see small- and medium-sized businesses (SMBs) as prime targets...
OMEN Improvements – Source: securityboulevard.com
Source: securityboulevard.com – Author: Matt Weir “If I had an hour to solve a problem, I would spend 55 minutes thinking about the problem and five...
Tips to Protect Yourself on LinkedIn from Fraud, Social Engineering, and Espionage – Source: securityboulevard.com
Source: securityboulevard.com – Author: Matthew Rosenquist LinkedIn is a great communication tool for business professionals that informs, provides opportunities, and fosters collaboration — which is exactly why...
Friday Squid Blogging: New Vulnerability in Squid HTTP Proxy Server – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments finagle • August 9, 2025 6:47 AM I was asked recently to do a security audit on a...
Google Project Zero Changes Its Disclosure Policy – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Google’s vulnerability finding team is again pushing the envelope of responsible disclosure: Google’s Project Zero team will retain its existing...
#DEFCON: AI Cyber Challenge Winners Revealed in DARPA’s $4M Cybersecurity Showdown – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: After two years of competition, the winners of the AI Cybersecurity Challenge (AIxCC) were revealed at the DEFCON 33 hacking event on...
Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have disclosed vulnerabilities in select model webcams from Lenovo that could turn them into BadUSB attack devices. “This allows...
Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have uncovered a jailbreak technique to bypass ethical guardrails erected by OpenAI in its latest large language model (LLM)...
Nigerian man extradited from France to US over hacking and fraud allegations – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A Nigerian man has been extradited from France to face hacking, identity theft, and fraud charges in the US. He...
WinRAR Zero-Day CVE-2025-8088 Exploited to Spread RomCom Malware – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. Critical WinRAR flaw CVE-2025-8088 exploited by Russia-linked hackers to spread RomCom malware, update to version 7.13 now to stay protected....
Former New York Times Cyber Reporter Issues Chilling Warning at Black Hat – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Matt Gonzales Nicole Perlroth, former New York Times reporter and founding partner of Silver Buckshot Ventures, speaking at Black Hat 2025 in...
Germany limits police spyware use to serious crimes – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Germany’s top court ruled police can use spyware only for crimes punishable by at least three years in prison. Germany’s...
Phishing attacks exploit WinRAR flaw CVE-2025-8088 to install RomCom – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini WinRAR flaw CVE-2025-8088, fixed in v7.13, was exploited as a zero-day in phishing attacks to install RomCom malware. The WinRAR...
French firm Bouygues Telecom suffered a data breach impacting 6.4M customers – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Bouygues Telecom suffered a cyberattack that compromised the personal information of 6.4 million customers. French telecommunications company Bouygues Telecom suffered...