Source: hackread.com – Author: Waqas. Roblox hit with class action over alleged secret tracking of kids’ data; lawsuit claims privacy law violations and unauthorized data sharing....
Day: May 12, 2025
Practical Ways to Improve Your Digital Efficiency – Source:hackread.com
Source: hackread.com – Author: Owais Sultan. Optimizing your online productivity is more important than ever. Whether you’re a business owner, freelancer, or simply someone looking to...
Anonymous Hackers Steal Flight Data from US Deportation Airline GlobalX – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A hacker group claiming affiliation with Anonymous says it breached GlobalX Airlines, leaking sensitive flight and passenger data tied to...
FakeUpdates, Remcos, AgentTesla Top Malware Charts in Stealth Attack Surge – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. Check Point’s April 2025 malware report reveals increasingly sophisticated and hidden attacks using familiar malware like FakeUpdates, Remcos, and AgentTesla....
U.S. CISA adds TeleMessage TM SGNL to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds TeleMessage TM SGNL flaw to its Known Exploited Vulnerabilities catalog. The U.S....
Researchers found one-click RCE in ASUS’s pre-installed software DriverHub – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Expert found two flaws in DriverHub, pre-installed on Asus motherboards, which allow remote code execution via crafted HTTP requests. Security...
Threat actors use fake AI tools to deliver the information stealer Noodlophile – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Threat actors use fake AI tools to trick users into installing the information stealer Noodlophile, Morphisec researchers warn. Morphisec researchers...
German police seized eXch crypto exchange – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Germany’s BKA shut down eXch crypto exchange, seizing its infrastructure over money laundering and illegal trading platform charges. On April...
73% of CISOs admit security incidents due to unknown or unmanaged assets – Source: www.csoonline.com
Source: www.csoonline.com – Author: As IT infrastructures become increasingly complex, so do the attack surfaces. Many companies are doing too little to contain the risks. Only...
Audi warnt vor Gebrauchtwagenbetrügern – Source: www.csoonline.com
Source: www.csoonline.com – Author: Im Internet kursieren derzeit betrügerische Gebrauchtwagenangebote. Nach Mercedes-Benz ist nun auch die VW-Tochter Audi betroffen. Online-Betrüger täuschen Audi-Kunden mit gefälschten Gebrauchtwagenangeboten. Wirestock...
The rise of vCISO as a viable cybersecurity career path – Source: www.csoonline.com
Source: www.csoonline.com – Author: For those looking for a career change or who just don’t want to be in charge of the cybersecurity of one company...
Hacktivist Attacks on India Overstated Amid APT36 Espionage Threat – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A wave of hacktivist claims of attacks against Indian digital infrastructure has sparked alarm in recent weeks, with over 100 purported breaches...
Criminal Proxy Network Infects Thousands of IoT Devices – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Written by A criminal proxy network has been found infecting thousands of Internet of Things (IoT) and end-of-life (EoL) devices, converting them...
#Infosec2025: Experts to Shine Light on Vendor Supply Chain Resilience Against Third-Party Risks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The vendor supply chain is complex and sprawling with organizations often working with hundreds, if not thousands, of third-party suppliers. This vast...
EU Launches Free Entry-Level Cyber Training Program – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A new EU-funded beginner cybersecurity training program has launched enrolment, with a particular focus on women and other underrepresented groups. She@Cyber training...
FreeDrain Phishing Scam Drains Crypto Hobbyists’ Wallets – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A sophisticated phishing scheme, comprising a network of fake websites, has been targeting web3 projects and draining cryptocurrency wallets at scale for...
Japanese Account Hijackers Make $2bn+ of Illegal Trades – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Japan’s financial regulator has warned of a surge in the number of account takeovers in its securities market, with hackers making illegal...
German Police Shutter “eXch” Money Laundering Service – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: German police claim to have seized tens of millions of euros and server infrastructure associated with notorious crypto-swapping service eXch. The Federal Criminal Police...
ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files – Source:thehackernews.com
Source: thehackernews.com – Author: . ASUS has released updates to address two security flaws impacting ASUS DriverHub that, if successfully exploited, could enable an attacker to...
⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams – Source:thehackernews.com
Source: thehackernews.com – Author: . What do a source code editor, a smart billboard, and a web server have in common? They’ve all become launchpads for...
The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That – Source:thehackernews.com
Source: thehackernews.com – Author: . Detecting leaked credentials is only half the battle. The real challenge—and often the neglected half of the equation—is what happens after...
Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures – Source:thehackernews.com
Source: thehackernews.com – Author: . Threat actors have been observed leveraging fake artificial intelligence (AI)-powered tools as a lure to entice users into downloading an information...
Why aggregating your asset inventory leads to better security – Source: go.theregister.com
Source: go.theregister.com – Author: Pete Constantine Partner content For many organizations, managing IT assets is like trying to complete a jigsaw puzzle without all the pieces....
Attackers pwn charter airline helping Trump’s deportation campaign – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones GlobalX, a charter airline used for deportations by the US government, has admitted someone broke into its network infrastructure. “On...
Britain’s cyber agents and industry clash over how to tackle shoddy software – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones CYBERUK Intervention is required to ensure the security market holds vendors to account for shipping insecure wares – imposing costs...
Unending ransomware attacks are a symptom, not the sickness – Source: go.theregister.com
Source: go.theregister.com – Author: Rupert Goodwins Opinion It’s been a devastating few weeks for UK retail giants. Marks and Spencer, the Co-Op, and now uber-posh Harrods...
DOGE worker’s old creds found exposed in infostealer malware dumps – Source: go.theregister.com
Source: go.theregister.com – Author: Brandon Vigliarolo Infosec in brief Good cybersecurity habits don’t appear to qualify anyone to work at DOGE, as one Musk minion seemingly...
Cisco IOS, IOS XE, and IOS XR Software TWAMP Denial of Service Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco IOS, IOS XE, and IOS XR Software TWAMP Denial of Service Vulnerability High CVE-2025-20154 CWE-20 Download CSAF Email Summary A...
Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability High CVE-2025-20192 CWE-232 Download CSAF Email Summary A...
Zero Trust in the Age of Digital Transformation: The New Cybersecurity Paradigm – Source:hackread.com
Source: hackread.com – Author: Owais Sultan. With the digital transformation movement sweeping the world and cyber threats evolving simultaneously to pose greater and greater threats, today’s...