Source: hackread.com – Author: Waqas. Aikido Security flagged the largest npm attack ever recorded, with 18 packages like chalk, debug, and ansi-styles hacked to hijack crypto...
Day: September 8, 2025
Zero-Day in Sitecore Exploited to Deploy WEEPSTEEL Malware – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A critical zero-day vulnerability (CVE-2025-53690) is being actively exploited in Sitecore. This flaw, originating from old, insecure keys, allows hackers...
MostereRAT Targets Windows, Uses AnyDesk and TightVNC for Full Access – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. MostereRAT malware targets Windows through phishing, bypasses security with advanced tactics, and grants hackers full remote control. Cybersecurity researchers at...
iExec brings TEE-based privacy tools to Arbitrum – Source:hackread.com
Source: hackread.com – Author: Uzair Amir. Paris, France, 2025 – iExec has announced the deployment of its privacy framework on Arbitrum, enabling the creation of powerful...
Innovator Spotlight: Seraphic – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: Gary Reinventing Browser Security for the Enterprise The Browser: Enterprise’s Biggest Blind Spot On any given day, the humble web browser is...
Innovator Spotlight: Darwinium – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: Gary The Digital Battlefield: How AI is Reshaping Cybersecurity and Fraud Prevention Crocodiles aren’t the only predators lurking in the shadows anymore....
Quantum Computing is Coming: Enterprises Need to Prepare Now – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Quantum computing is coming. When? No one knows for sure. Some experts say 10 years, others say 15 to 20...
Finding Agility in Post Quantum Encryption (PQC) – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team In an era where data security is paramount, current encryption algorithms are sufficient to safeguard sensitive information. However, the advent...
Go-to Resources for Secure Cloud Storage – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: TechRepublic Staff The growth of the cloud can be attributed to its many advantages. For example, cloud storage enables an organization to...
WhatsApp’s former security boss claims reporting infosec failings led to ousting – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn WhatsApp’s former head of security, Attaullah Baig, has filed a lawsuit against its parent company, Meta, alleging that the social...
The US government has no idea how many cybersecurity pros it employs – Source: go.theregister.com
Source: go.theregister.com – Author: Brandon Vigliarolo The US federal government employs tens of thousands of cybersecurity professionals at a cost of billions per year – or...
Drift massive attack traced back to loose Salesloft GitHub account – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons The Salesloft Drift breach that compromised “hundreds” of companies including Google, Palo Alto Networks, and Cloudflare, all started with miscreants...
Dev snared in crypto phishing net, 18 npm packages compromised – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn Crims have added backdoors to at least 18 npm packages after developer Josh Junon inadvertently authorized a reset of the...
Salt Typhoon used dozens of domains, going back five years. Did you visit one? – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Security researchers have uncovered dozens of domains used by Chinese espionage crew Salt Typhoon to gain stealthy, long-term access to...
PACER buckles under MFA rollout as courts warn of support delays – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones US courts have warned of delays as PACER, the system for accessing court documents, struggles to support users enrolling in...
CISA sounds alarm over TP-Link wireless routers under attack – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Infosec in brief The US Cybersecurity and Infrastructure Security Agency (CISA) has said two flaws in routers made by Chinese...
UK tech minister booted out in weekend cabinet reshuffle – Source: go.theregister.com
Source: go.theregister.com – Author: Lindsay Clark UK prime minister Sir Keir Starmer cleared out the officials in charge of tech and digital law in a dramatic...
GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies – Source:thehackernews.com
Source: thehackernews.com – Author: . Salesloft has revealed that the data breach linked to its Drift application started with the compromise of its GitHub account. Google-owned...
GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have detailed a new sophisticated malware campaign that leverages paid ads on search engines like Google to deliver malware...
Noisy Bear Campaign Targeting Kazakhstan Energy Sector Outed as a Planned Phishing Test – Source:thehackernews.com
Source: thehackernews.com – Author: . A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector in...
The Critical Failure in Vulnerability Management – Source: www.darkreading.com
Source: www.darkreading.com – Author: Amar Ramakrishnan Source: designer491 via Alamy Stock Photo COMMENTARY Business has slowed considerably in the vulnerability management market segment, yet there are...
45 New Domains Linked to Salt Typhoon, UNC4841 – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer The China-backed threat actors have used the previously undiscovered infrastructure to obtain long-term, stealthy access to targeted organizations....
Canadian investment platform Wealthsimple disclosed a data breach – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini September 08, 2025 Wealthsimple reported a data breach affecting some customers due to a supply chain attack via...
Venezuela’s President Maduro said his Huawei Mate X6 cannot be hacked by US cyber spies – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini September 08, 2025 Venezuela’s President Maduro shows Huawei Mate X6 gift from China’s President Xi Jinping, hailing it...
Czech cyber agency NUKIB flags Chinese espionage risks to critical infrastructure – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini September 08, 2025 Czech cybersecurity agency NUKIB warns of Chinese cyber threats to critical infrastructure, citing the cyberespionage...
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 61 – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits....
Wealthsimple Confirms Data Breach After Supply Chain Attack – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Canadian fintech firm Wealthsimple has confirmed a data breach that exposed sensitive information belonging to roughly 30,000 customers. The incident, detected on...
MostereRAT Targets Windows Users With Stealth Tactics – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A phishing campaign delivering a new strain of malware, MostereRAT, has been uncovered by cybersecurity researchers. The Remote Access Trojan (RAT) targets...
Remote Access Abuse Biggest Pre-Ransomware Indicator – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Abuses of remote access software and services are the most common ‘pre-ransomware’ indicators, according to new research from Cisco Talos. Adversaries frequently...
Qualys, Tenable Latest Victims of Salesloft Drift Hack – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Cybersecurity providers Tenable and Qualys are the latest in a growing list of companies affected by a significant supply chain attack targeting...