Source: news.sophos.com – Author: gallagherseanm Ransomware is usually a crime of opportunity. Attackers typically strike through an easily-discovered vulnerability or security weakness— unpatched Internet-facing software, vulnerable...
Day: May 20, 2025
Freshly discovered bug in OpenPGP.js undermines whole point of encrypted comms – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Security researchers are sounding the alarm over a fresh flaw in the JavaScript implementation of OpenPGP (OpenPGP.js) that allows both...
Ransomware attack on food distributor spells more pain for UK supermarkets – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones It’s more bad news for UK supermarkets with chilled and frozen food distribution business Peter Green Chilled confirming a ransomware...
Virgin Media O2 patches hole that let callers snoop on your coordinates – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones UK telco Virgin Media O2 has fixed an issue with its 4G Calling feature that allowed users’ general location to...
DoorDash Hack – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier A DoorDash driver stole over $2.5 million over several months: The driver, Sayee Chaitainya Reddy Devagiri, placed expensive orders from...
ELPACO-Team Ransomware Attack Detection: Hackers Exploit Atlassian Confluence Vulnerability (CVE-2023-22527) to Gain RDP Access and Enable RCE – Source: socprime.com
Source: socprime.com – Author: Veronika Telychko In today’s fast-evolving ransomware landscape, threat actors are accelerating their tactics to gain access and deploy payloads with alarming speed....
Have I Been Pwned 2.0 is Now Live! – Source: www.troyhunt.com
Source: www.troyhunt.com – Author: Troy Hunt This has been a very long time coming, but finally, after a marathon effort, the brand new Have I Been...
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits...
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery – Source:thehackernews.com
Source: thehackernews.com – Author: . A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, including Amazon S3 buckets...
100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads – Source:thehackernews.com
Source: thehackernews.com – Author: . An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly...
AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door...
The Crowded Battle: Key Insights from the 2025 State of Pentesting Report – Source:thehackernews.com
Source: thehackernews.com – Author: . In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISOs from global enterprises (200 from within the USA)...
South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware – Source:thehackernews.com
Source: thehackernews.com – Author: . High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged as the target of a new campaign orchestrated by a...
Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization – Source:thehackernews.com
Source: thehackernews.com – Author: . Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed international organization in Saudi...
Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that’s targeting publicly accessible Redis servers. The malicious activity has...
Virgin Media 02 Vuln Exposes Call Recipient Location – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have...
Tenable Adds Third-Party Connectors to Exposure Management Platform – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jeffrey Schwartz Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Regeneron Pledges Privacy Protection in $256M Bid for 23andMe – Source: www.darkreading.com
Source: www.darkreading.com – Author: Arielle Waldman Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Bumblebee Malware Takes Flight via Trojanized VMware Utility – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Large Retailers Land in Scattered Spider’s Ransomware Web – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
‘Hazy Hawk’ Cybercrime Gang Swoops In for Cloud Resources – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Novel Phishing Attack Combines AES With Poisoned npm Packages – Source: www.darkreading.com
Source: www.darkreading.com – Author: Alexander Culafi, Senior News Writer, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why...
Why Rigid Security Programs Keep Failing – Source: www.darkreading.com
Source: www.darkreading.com – Author: Aditya Gupta Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
The AI Fix #51: Divorce by coffee grounds, and why AI robots need your brain – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content In episode 51 of The AI Fix, a Greek man’s marriage is destroyed after ChatGPT reads his...
SEC Twitter hack: Man imprisoned for role in attack that caused Bitcoin’s price to soar. – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley A 25-year-old man from Alabama has been sentenced to 14 months in a federal prison for his part in a...
Hazy Hawk Attack Spotted Targeting Abandoned Cloud Assets Since 2023 – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. Infoblox reveals Hazy Hawk, a new threat exploiting abandoned cloud resources (S3, Azure) and DNS gaps since Dec 2023. Learn...
LockBit Leak Shows Affiliates Use Pressure Tactics, Rarely Get Paid – Source:hackread.com
Source: hackread.com – Author: Waqas. LockBit, one of the most prolific ransomware gangs operating today, was breached last week revealing its inner operations with clarity. The...
Compromised RVTools Installer Spreading Bumblebee Malware – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A widely used tool for managing VMware systems, RVTools, was recently found delivering harmful software to users. A security researcher,...
New Nitrogen Ransomware Targets Financial Firms in the US, UK and Canada – Source:hackread.com
Source: hackread.com – Author: Owais Sultan. Nitrogen, a ransomware strain, has emerged as a major threat to organizations worldwide, with a particular focus on the financial...
Mounting GenAI Cyber Risks Spur Investment in AI Security – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Around three-quarters (73%) of organizations are investing in AI-specific security tools, amid growing concern about GenAI cyber risks, according to Thales 2025...