Source: go.theregister.com – Author: Connor Jones Oracle Cloud’s denial of a digital break-in is now in clear dispute. A infosec researcher working on validating claims that...
Day: March 25, 2025
Infosec pro Troy Hunt HasBeenPwned in Mailchimp phish – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Infosec veteran Troy Hunt of HaveIBeenPwned fame is notifying thousands of people after phishers scooped up his Mailchimp mailing list....
You know that generative AI browser assistant extension is probably beaming everything to the cloud, right? – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn Generative AI assistants packaged up as browser extensions harvest personal data with minimal safeguards, researchers warn. Some of these extensions...
VanHelsing ransomware emerges to put a stake through your Windows heart – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Check Point has spotted a fresh ransomware-as-a-service crew in town: VanHelsing, touting a cross-platform locker targeting Microsoft Windows, Linux, and...
Hm, why are so many DrayTek routers stuck in a bootloop? – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson DrayTek router owners in the UK and beyond had a pretty miserable weekend after some ISPs began to notice a...
OTF, which backs Tor, Let’s Encrypt and more, sues to save its funding from Trump cuts – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn An organization that bankrolls various internet security projects has asked a Washington DC court to prevent the Trump administration from...
Top Trump officials text secret Yemen airstrike plans to journo in Signal SNAFU – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Updated Senior Trump administration officials used the messaging app Signal to discuss detailed plans to attack Houthi rebels in Yemen...
Android malware campaigns use .NET MAUI to evade detection – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Researchers warn of a new Android malware that uses .NET MAUI to mimic legit services and evade detection. McAfee researchers...
Astral Foods, South Africa’s largest poultry producer, lost over $1M due to a cyberattack – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Astral Foods, South Africa’s largest poultry producer, lost over $1M due to a cyberattack disrupting deliveries and impacting operations. Astral...
A cyberattack hits Ukraine’s national railway operator Ukrzaliznytsia – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A cyberattack on Ukraine’s national railway operator Ukrzaliznytsia disrupted online ticket services, causing long lines at Kyiv’s station. The Record...
Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain – Source: securelist.com
Source: securelist.com – Author: Igor Kuznetsov, Boris Larin Incidents Incidents 25 Mar 2025 minute read In mid-March 2025, Kaspersky technologies detected a wave of infections by...
A Sneaky Phish Just Grabbed my Mailchimp Mailing List – Source: www.troyhunt.com
Source: www.troyhunt.com – Author: Troy Hunt You know when you’re really jet lagged and really tired and the cogs in your head are just moving that...
New Android Malware Uses .NET MAUI to Evade Detection – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Cybersecurity researchers at McAfee have identified a new wave of Android malware campaigns leveraging .NET MAUI, a cross-platform development framework, to evade...
Cybercriminals Use Atlantis AIO to Target 140+ Platforms – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Cybercriminals have been observed increasingly leveraging Atlantis AIO, a sophisticated tool designed to automate credential stuffing attacks across more than 140 platforms....
NIST Warns of Significant Limitations in AI/ML Security Mitigations – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The US National Institute of Standards and Technology (NIST) has warned that there are significant challenges and limitations for mitigating attacks on...
China-Linked Weaver Ant Hackers Exposed After Four-Year Telco Infiltration – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A newly identified China-nexus hacking group infiltrated the network of an Asian telecommunications service provider and remained undetected for more than four...
Dark Web Mentions of Malicious AI Tools Spike 200% – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Chatter about jailbreaks and use of malicious AI tools on the cybercrime underground surged in 2024, according to an analysis by threat...
IngressNightmare: Four Critical Bugs Found in 40% of Cloud Systems – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Kubernetes customers using the popular Ingress NGINX Controller have been urged to patch four newly discovered remote code execution (RCE) flaws assigned...
Navigating NIS2 Compliance: Elevating Cyber Resilience Through Network Visibility – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team As cyber threats continue to surge, businesses face growing pressure to fortify their defences and ensure operational continuity. Regulatory frameworks...
Unpacking Disinformation in the 2024 US Presidential Election – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team The 2016 U.S. presidential election is often cited as a watershed moment for digital disinformation campaigns – revealing the vulnerability...
Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker – Source:thehackernews.com
Source: thehackernews.com – Author: . A new investigation has unearthed nearly 200 unique command-and-control (C2) domains associated with a malware called Raspberry Robin. “Raspberry Robin (also...
Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years – Source:thehackernews.com
Source: thehackernews.com – Author: . A major telecommunications company located in Asia was allegedly breached by Chinese state-sponsored hackers who spent over four years inside its...
AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface – Source:thehackernews.com
Source: thehackernews.com – Author: . Organizations now use an average of 112 SaaS applications—a number that keeps growing. In a 2024 study, 49% of 644 respondents...
Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers are calling attention to an Android malware campaign that leverages Microsoft’s .NET Multi-platform App UI (.NET MAUI) framework to...
INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust – Source:thehackernews.com
Source: thehackernews.com – Author: . Law enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation...
Hackers Are Using Microsoft’s .NET MAUI to Spread Android Malware – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. McAfee Labs has revealed that cybercriminals are exploiting Microsoft’s newly introduced .NET MAUI app development tool to spread Android malware...
Active Roles Wins 2025 Cybersecurity Excellence Award for Hybrid Active Directory Protection – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. Alisa Viejo, United States, March 25th, 2025, CyberNewsWire One Identity, a leader in unified identity security, today announced that One Identity...
CYREBRO Recognized in Gartner Emerging Tech Report for Detection and Response Startups – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. Ramat Gan, Israel, March 25th, 2025, CyberNewsWire CYREBRO, the AI-native Managed Detection and Response (MDR), today announced its recognition as a...
Medusa Ransomware Disables Anti-Malware Tools with Stolen Certificates – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. Cybercriminals are exploiting custom and compromised drivers to disable endpoint detection and response (EDR) systems, facilitating undetected malicious activity. Elastic...
Report on Paragon Spyware – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Citizen Lab has a new report on Paragon’s spyware: Key Findings: Introducing Paragon Solutions. Paragon Solutions was founded in Israel...