Source: hackread.com – Author: Deeba Ahmed. A new and concerning cyber threat, dubbed Mocha Manakin, has been identified by cybersecurity research firm Red Canary. First tracked...
Day: June 20, 2025
Linux flaws chain allows Root access across major distributions – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Researchers discovered two local privilege escalation flaws that could let attackers gain root access on systems running major Linux distributions....
A ransomware attack pushed the German napkin firm Fasana into insolvency – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A cyberattack pushed the German napkin firm Fasana into insolvency, likely worsening existing financial troubles and serving as the final...
Researchers discovered the largest data breach ever, exposing 16 billion login credentials – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Researchers discovered the largest data breach ever, exposing 16 billion login credentials, likely due to multiple infostealers. Researchers announced the...
China-linked group Salt Typhoon breached satellite firm Viasat – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini China-linked APT Typhoon has reportedly targeted satellite firm Viasat, the group has breached multiple telecom providers in the past. China-linked...
How to Lock Down the No-Code Supply Chain Attack Surface – Source: www.darkreading.com
Source: www.darkreading.com – Author: Amichai Shulman Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
The Rising Deepfake Risk for Businesses: A Step-By-Step Defense Strategy Built Around the Basics of Security – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Deepfakes are the exciting new thing in cyber security, but at their core they are not a new threat –...
Innovator Spotlight: ESET – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: Gary Cybersecurity’s Enduring Guardians: ESET’s 35-Year Journey of Threat Intelligence The Berlin Wall crumbled, and from its digital shadows emerged a cybersecurity...
The Rise of Identity Risk Intelligence – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team For many years, cybersecurity professionals have relied on Indicators of Compromise (IOCs) such as IP addresses, domain names, and file...
GitHub hit by a sophisticated malware campaign as ‘Banana Squad’ mimics popular repos – Source: www.csoonline.com
Source: www.csoonline.com – Author: Attackers use typo-squatting, obfuscation, and fake accounts to slip Python-based malware into open-source projects, raising fresh alarms for OSS supply chain security....
IBM combines governance and security tools to solve the AI agent oversight crisis – Source: www.csoonline.com
Source: www.csoonline.com – Author: With AI agents multiplying across enterprises, IBM’s watsonx–Guardium integration aims to provide unified AgentOps visibility, automated red teaming, and regulatory accelerators to...
Hacker legen Leymann Baustoffe lahm – Source: www.csoonline.com
Source: www.csoonline.com – Author: Die Baumarktkette Leymann Baustoffe wurde Ziel einer Cyberattacke. Alle Standorte sind betroffen. Alle Filialen der Baumarktkette Leymann Baustoffe müssen aufgrund einer Cyberattacke...
How to conduct an effective post-incident review – Source: www.csoonline.com
Source: www.csoonline.com – Author: Mitigation and remediation aren’t the endpoints of incident response. Having a structured process to analyze and learn from a cybersecurity incident once...
Chain IQ data theft highlights need to oversee third party suppliers – Source: www.csoonline.com
Source: www.csoonline.com – Author: Firm says hack on 19 companies came from ‘tools and techniques that had never before been seen on a global scale.’ Cybersecurity...
Phishing campaign abuses Cloudflare Tunnels to sneak malware past firewalls – Source: www.csoonline.com
Source: www.csoonline.com – Author: Serpentine#Cloud attack by unknown attackers opens RAT-based backdoor. Another threat group has started abusing the Cloudflare Tunnel service to get phishing emails...
6 Steps to 24/7 In-House SOC Success – Source:thehackernews.com
Source: thehackernews.com – Author: . Hackers never sleep, so why should enterprise defenses? Threat actors prefer to target businesses during off-hours. That’s when they can count...
Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider – Source:thehackernews.com
Source: thehackernews.com – Author: . Cloudflare on Thursday said it autonomously blocked the largest ever distributed denial-of-service (DDoS) attack ever recorded, which hit a peak of...
200+ Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have uncovered a new campaign in which the threat actors have published more than 67 GitHub repositories that claim...
UK Gov Cybersecurity Jobs Average Salary is Under £45,000, Study Finds – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: UK public sector cybersecurity roles offer an average salary of just £44,739 ($60,070) per annum, according to a study by Bridwell. The...
Russia Expert Falls Prey to Elite Hackers Disguised as US Officials – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Keir Giles, a British expert on Russian information operations, has been targeted by a sophisticated spear phishing attack using novel social engineering...
Self-Driving Car Video Footage – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Ian Stewart • June 19, 2025 8:36 AM Does anyone really care? I was talking to the manager...
Boffins devise voice-altering tech to jam ‘vishing’ schemes – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn Researchers based in Israel and India have developed a defense against automated call scams. ASRJam is a speech recognition jamming...
Uncle Sam seeks time in tower dump data grab case after judge calls it ‘unconstitutional’ – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones The United States is requesting [PDF] a month-long extension to the deadline for its final decision regarding an appeal against...
Glazed and confused: Hole lotta highly sensitive data nicked from Krispy Kreme – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Krispy Kreme finally revealed the number of people affected by its November cyberattack, and it’s easy to see why analyzing...
UK gov asks university boffins to pinpoint cyber growth areas where it should splash cash – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Cybersecurity experts have started a formal review into the UK cybersecurity market, at the government’s request, to identify future growth...
Banana Squad’s Stealthy GitHub Malware Campaign Targets Devs – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A new campaign exploiting GitHub to distribute malicious Python code disguised as legitimate hacking tools has been uncovered by cybersecurity researchers. The...
North Korean Hackers Deploy Python-Based Trojan Targeting Crypto – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A new Python-based remote access Trojan (RAT) known as PylangGhost is being deployed in cyber campaigns attributed to the North Korean-aligned group Famous...
Krispy Kreme Data Breach Puts Employees at Risk of Financial Fraud – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Krispy Kreme has revealed that over 160,000 people have had sensitive data compromised as a result of a November 2024 data security...
UBS Employee Data Reportedly Exposed in Third Party Attack – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Global banking giant UBS has suffered a data breach following a cyber-attack on a third-party supplier. In a statement emailed to Infosecurity,...
Researchers Warn of ‘Living off AI’ Attacks After PoC Exploits Atlassian’s AI Agent Protocol – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: AI Agents hold great promise for IT ticketing services, but they also bring with them new risks. Researchers from Cato Networks have...