logo SOCFeed

Related News Stories

Stories grouped by similar topics and content

📰 Urgent! Update Chrome: Zero-Day Exploit Active

3 related articles · 82% similarity

Google released an emergency Chrome update to address a critical zero-day vulnerability actively exploited in the wild. This is the fifth such vulnerability patched this year, highlighting the importance of immediate updates to protect against attacks.

3 posts

Jetzt aktualisieren! Chrome-Sicherheitslücke wird angegriffen

Google hat in der Nacht zum Mittwoch den Chrome-Webbrowser aktualisiert. Das Update schließt auch eine bereits attackierte Lücke....

heise security News
Jetzt aktualisieren! Chrome-Sicherheitslücke wird angegriffen

Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild

Google on Tuesday rolled out fixes for six security issues in its Chrome web browser, including one that it said has been exploited in the wild. The h...

The Hacker News
Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild

Chrome Update Patches Fifth Zero-Day of 2025

Google has released a Chrome 138 security update that patches a zero-day, the fifth resolved in the browser this year. The post Chrome Update Patches ...

SecurityWeek
📰 N. Korea's npm Malware Attack

2 related articles · 91% similarity

North Korean hackers deployed 67 malicious packages to the npm registry, distributing a new malware loader called XORIndex. This continues their ongoing Contagious Interview campaign, highlighting a sophisticated and concerning threat to the software supply chain.

2 posts

North Korean XORIndex malware hidden in 67 malicious npm packages

North Korean threat actors planted 67 malicious packages in the Node Package Manager (npm) online repository to deliver a new malware loader called XO...

BleepingComputer

North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set of 67 malicious packages to the n...

The Hacker News
North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign
📰 HazyBeacon: AWS Cloud Used in SE Asia Gov't Hacks

2 related articles · 90% similarity

A sophisticated cyber campaign, employing the novel HazyBeacon malware, leverages AWS Lambda functions to infiltrate Southeast Asian government organizations and steal sensitive data. The attackers utilize legitimate cloud communication channels for command and control, highlighting the risks of cloud-based infrastructure exploitation.

2 posts

Attackers Abuse AWS Cloud to Target Southeast Asian Governments

The intelligence-gathering cyber campaign introduces the novel HazyBeacon backdoor and uses legitimate cloud communication channels for command-and-co...

darkreading
Attackers Abuse AWS Cloud to Target Southeast Asian Governments

State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments

Governmental organizations in Southeast Asia are the target of a new campaign that aims to collect sensitive information by means of a previously undo...

The Hacker News
State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments
📰 Record DDoS Attacks Hit Global Networks

2 related articles · 89% similarity

Cloudflare reported mitigating a record-breaking 7.3 Tbps DDoS attack in Q2 2025, exceeding the total number of attacks blocked in all of 2024. These hyper-volumetric attacks targeted key global sectors, highlighting a significant increase in the scale and frequency of DDoS threats.

2 posts

Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors

Cloudflare on Tuesday said it mitigated 7.3 million distributed denial-of-service (DDoS) attacks in the second quarter of 2025, a significant drop fro...

The Hacker News
Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors

DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total 

Cloudflare has published its quarterly DDoS threat report for Q2 2025 and the company says it has blocked millions of attacks. The post DDoS Attacks B...

SecurityWeek
📰 Konfety Malware's Evasive Tactics

2 related articles · 89% similarity

A new, sophisticated variant of the Konfety Android malware is evading detection by employing advanced obfuscation techniques, including malformed APK structures and dynamic code manipulation. These methods allow the malware to bypass security measures and potentially steal sensitive user data.

2 posts

New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code

Cybersecurity researchers have discovered a new, sophisticated variant of a known Android malware referred to as Konfety that leverages the evil twin ...

The Hacker News
New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code

Android malware Konfety uses malformed APKs to evade detection

A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that allow it to evade analys...

BleepingComputer
📰 MITRE's AADAPT: Securing Financial Systems

2 related articles · 85% similarity

MITRE has released the AADAPT framework, an extension of the ATT&CK framework, designed to enhance cybersecurity defenses within financial systems. AADAPT focuses on detecting and responding to cyberattacks targeting traditional finance and cryptocurrency, providing crucial documentation for identifying and mitigating vulnerabilities.

2 posts

MITRE Launches AADAPT Framework for Financial Systems

The new framework is modeled after and meant to complement the MITRE ATT&CK framework, and it is aimed at detecting and responding to cyberattacks...

darkreading
MITRE Launches AADAPT Framework for Financial Systems

MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats 

The MITRE AADAPT framework provides documentation for identifying, investigating, and responding to weaknesses in digital asset payments. The post MIT...

SecurityWeek
📰 AsyncRAT: Open-Source Malware's Dangerous Evolution

2 related articles · 80% similarity

The open-source AsyncRAT remote access trojan, initially released on GitHub in 2019, has spawned numerous dangerous variants, creating a complex and widespread cyber threat. Its easily accessible code has democratized cybercrime, enabling a surge in global malware activity.

2 posts

AsyncRAT Spawns Concerning Labyrinth of Forks

Since surfacing on GitHub in 2019, AsyncRAT has become a poster child for how open source malware can democratize cybercrime, with a mazelike footprin...

darkreading
AsyncRAT Spawns Concerning Labyrinth of Forks

AsyncRAT's Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

Cybersecurity researchers have charted the evolution of a widely used remote access trojan called AsyncRAT, which was first released on GitHub in Janu...

The Hacker News
AsyncRAT's Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe
📰 SVG Smuggling: New Phishing Threat

2 related articles · 79% similarity

Cybercriminals are exploiting Scalable Vector Graphics (SVG) files to redirect users to malicious websites without requiring clicks or macros. This technique, hiding obfuscated JavaScript within SVG images, allows for stealthy, zero-click phishing attacks, bypassing traditional security measures.

2 posts

Threat Actors Use SVG Smuggling for Browser-Native Redirection

Obfuscated JavaScript code is embedded within SVG files for browser-native redirection to malicious pages. The post Threat Actors Use SVG Smuggling fo...

SecurityWeek

How phishers are weaponizing SVG images in zero-click, evasive campaigns

Threat actors are shifting from conventional phishing tricks, which used malicious links and document macros, to benign-looking...

CSO Online
How phishers are weaponizing SVG images in zero-click, evasive campaigns
📰 Critical Train Hacking Vulnerability Ignored for Years

2 related articles · 88% similarity

A serious cybersecurity flaw allows hackers to remotely trigger train brakes, a vulnerability known for at least two decades. Both End-of-Train and Head-of-Train systems are susceptible, highlighting a long-standing lack of adequate security measures in the US railway system.

2 posts

Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years

Many trains in the U.S. are vulnerable to a hack that can remotely lock a train’s brakes, according to the U.S. Cybersecurity and Infrastructure Se...

404 Media
Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years

Train Brakes Can Be Hacked Over Radio—And the Industry Knew for 20 Years

A vulnerability affecting systems named End-of-Train and Head-of-Train can be exploited by hackers to cause trains to brake.  The post Train Brakes Ca...

SecurityWeek
📰 Elmo's X Account Hacked: Racist Posts Surface

2 related articles · 88% similarity

Elmo's verified X account was compromised, resulting in the posting of antisemitic threats and other hateful messages. Sesame Workshop regained control of the account, highlighting the vulnerability of even high-profile social media accounts to hacking. The incident underscored the spread of harmful content online.

2 posts

Sesame Workshop Regains Control of Elmo’s Hacked X Account After Racist Posts

The account was compromised over the weekend and Elmo’s 650,000 followers were given antisemitic threats and a reference to the Jeffrey Epstein invest...

SecurityWeek

Elmo has been hacked, claims Trump is in Epstein files, calls for Jews to be exterminated

Over the weekend, Sesame Street star Elmo's verified account was apparently hijacked and used to post a string of profane messages, including one desc...

Graham Cluley
📰 Interlock Ransomware's New FileFix RAT Attack

4 related articles · 85% similarity

The Interlock ransomware group is deploying a new PHP-based remote access trojan (RAT) variant through a sophisticated 'FileFix' injection method, targeting various industries via compromised websites. This technique leverages legitimate websites to deliver the malware, making detection more challenging.

4 posts

Web-Inject Campaign Debuts Fresh Interlock RAT Variant

A cyber-threat campaign is using legitimate websites to inject victims with remote access Trojans belonging to the Interlock ransomware group, in orde...

darkreading
Web-Inject Campaign Debuts Fresh Interlock RAT Variant

New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries

Threat actors behind the Interlock ransomware group have unleashed a new PHP variant of its bespoke remote access trojan (RAT) as part of a widespread...

The Hacker News
New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries

Interlock ransomware adopts new FileFix attack to push malware

Hackers have adopted the new technique called 'FileFix' in Interlock ransomware attacks to drop a remote access trojan (RAT) on targeted systems. [......

BleepingComputer

New Interlock RAT Variant Distributed via FileFix Attacks

The Interlock ransomware group has partnered with the KongTuke TDS to distribute a new RAT variant via FileFix attacks. The post New Interlock RAT Var...

SecurityWeek
📰 Gigabyte UEFI Firmware: Critical Security Flaw

3 related articles · 85% similarity

Multiple news outlets report critical vulnerabilities in Gigabyte motherboard UEFI firmware, allowing attackers to bypass Secure Boot and install persistent malware. Gigabyte users are urged to update their firmware immediately to mitigate the risk of compromise.

3 posts

Gigabyte: CERT warnt vor UEFI-Sicherheitslücke von Mainboards

Das CERT hat eine Warnung vor Rechteausweitungslücken in UEFI-Firmware von Gigabyte-Mainboards veröffentlicht. Updates sind nötig....

heise security News
Gigabyte: CERT warnt vor UEFI-Sicherheitslücke von Mainboards

Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot

Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the ...

BleepingComputer

Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment

Vulnerabilities in Gigabyte firmware implementations could allow attackers to disable Secure Boot and execute code during the early boot phase. The po...

SecurityWeek
📰 Gemini AI: Vulnerable to Phishing Attacks

4 related articles · 81% similarity

Multiple reports reveal vulnerabilities in Google's Gemini AI, allowing attackers to inject malicious prompts and create seemingly legitimate email summaries containing hidden phishing instructions. These flaws enable attackers to bypass security measures and trick users into revealing sensitive information.

4 posts

Google Gemini AI Bug Allows Invisible, Malicious Prompts

A prompt-injection vulnerability in the AI assistant allows attackers to create messages that appear to be legitimate Google Security alerts but inste...

darkreading
Google Gemini AI Bug Allows Invisible, Malicious Prompts

Google Gemini Tricked Into Showing Phishing Message Hidden in Email 

Google Gemini for Workspace can be tricked into displaying a phishing message when asked to summarize an email. The post Google Gemini Tricked Into Sh...

SecurityWeek

Google Gemini vulnerability enables hidden phishing attacks

Google Gemini for Workspace can be abused to generate email summaries that appear legitimate but contain malicious instructions...

CSO Online
Google Gemini vulnerability enables hidden phishing attacks

Google Gemini flaw hijacks email summaries for phishing

Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings that di...

BleepingComputer
📰 Grok-4 AI: Jailbroken in 48 Hours

2 related articles · 89% similarity

xAI's new Grok-4 large language model (LLM) was compromised within two days of its release via sophisticated 'whispered' jailbreaks, highlighting vulnerabilities in its safety mechanisms and prompting concerns about AI security.

2 posts

New Grok-4 AI breached within 48 hours using ‘whispered’ jailbreaks

xAI’s newly launched Grok-4 is already showing cracks in its defenses, falling to recently revealed multi-conversational, sugge...

CSO Online
New Grok-4 AI breached within 48 hours using ‘whispered’ jailbreaks

Grok-4 Falls to a Jailbreak Two Days After Its Release

The latest release of the xAI LLM, Grok-4, has already fallen to a sophisticated jailbreak. The post Grok-4 Falls to a Jailbreak Two Days After Its Re...

SecurityWeek
📰 Pay2Key Ransomware Returns, Targets US & Israel

2 related articles · 92% similarity

The Iranian-backed Pay2Key ransomware-as-a-service (RaaS) operation has resurfaced, offering increased incentives to affiliates targeting US and Israeli organizations. This resurgence follows recent geopolitical tensions in the region, suggesting a potential link between cyberattacks and international conflict.

2 posts

Pay2Key Ransomware Gang Resurfaces With Incentives to Attack US, Israel

The ransomware-as-a-service (RaaS) operation, which has been tied to an Iranian advanced persistent threat (APT) group, recently boosted its affiliate...

darkreading
Pay2Key Ransomware Gang Resurfaces With Incentives to Attack US, Israel

Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals

An Iranian-backed ransomware-as-a-service (RaaS) named Pay2Key has resurfaced in the wake of the Israel-Iran-U.S. conflict last month, offering bigger...

The Hacker News
Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
📰 Gravity Forms Plugin Supply Chain Attack

3 related articles · 90% similarity

Malicious code was injected into the popular Gravity Forms WordPress plugin via a supply chain attack, affecting versions available for download on the official website. This compromise potentially exposes millions of WordPress sites to malware and data breaches.

3 posts

GravityForms: WordPress-Plug-in in Supply-Chain-Attacke infiziert

IT-Forscher haben auf der Webseite des millionenfach genutzten WordPress-Plug-ins GravityForms eine infizierte Version entdeckt....

heise security News
GravityForms: WordPress-Plug-in in Supply-Chain-Attacke infiziert

Hackers Inject Malware Into Gravity Forms WordPress Plugin 

Two Gravity Forms WordPress plugin versions available on the official download page were injected with malware in a supply chain attack. The post Hack...

SecurityWeek

WordPress Gravity Forms developer hacked to push backdoored plugins

The popular WordPress plugin Gravity Forms has been compromised in what seems a supply-chain attack where manual installers from the official website ...

BleepingComputer
📰 Urgent: Wing FTP Server Under Attack!

4 related articles · 86% similarity

A critical, actively exploited remote code execution vulnerability (CVE-2025-47812) in Wing FTP Server allows attackers to execute arbitrary commands with root privileges. Multiple security sources confirm widespread exploitation, urging immediate patching.

4 posts

Kritische Codeschmuggel-Lücke in Wing FTP wird angegriffen

In der Datentransfersoftware Wing FTP attackieren Angreifer eine Sicherheitslücke, die das Einschleusen von Schadcode erlaubt....

heise security News
Kritische Codeschmuggel-Lücke in Wing FTP wird angegriffen

Hackers are exploiting critical RCE flaw in Wing FTP Server

Hackers have started to exploit a critical remote code execution vulnerability in Wing FTP Server just one day after technical details on the flaw bec...

BleepingComputer

Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild

A recently disclosed maximum-severity security flaw impacting the Wing FTP Server has come under active exploitation in the wild, according to Huntres...

The Hacker News
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild

Critical Wing FTP Server Vulnerability Exploited

Wing FTP Server vulnerability CVE-2025-47812 can be exploited for arbitrary command execution with root or system privileges. The post Critical Wing F...

SecurityWeek
📰 GPU Rowhammer Attacks Threaten AI

5 related articles · 86% similarity

Researchers have demonstrated a new Rowhammer attack, dubbed GPUHammer, targeting NVIDIA GPUs. This attack can degrade the accuracy of AI models, prompting NVIDIA to urge users to enable System-level Error Correction Codes (ECC) as a mitigation strategy. The vulnerability affects GDDR6 GPUs.

5 posts

Rowhammer Attack Demonstrated Against Nvidia GPU

Researchers demonstrated GPUHammer — a Rowhammer attack against GPUs — by degrading the accuracy of machine learning models. The post Rowhammer Attack...

SecurityWeek

Alert: Nvidia GPUs are vulnerable to Rowhammer attacks

Nvidia has issued a security reminder to application developers, computer manufacturers, and IT leaders that modern memory chip...

CSO Online
Alert: Nvidia GPUs are vulnerable to Rowhammer attacks

GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs

NVIDIA is urging customers to enable System-level Error Correction Codes (ECC) as a defense against a variant of a RowHammer attack demonstrated again...

The Hacker News
GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs

NVIDIA shares guidance to defend GDDR6 GPUs against Rowhammer attacks

NVIDIA is warning users to activate System Level Error-Correcting Code  mitigation to protect against Rowhammer attacks on graphical processors with G...

BleepingComputer

NVIDIA shares guidance to defend GDDR6 GPUs against Rowhammer attacks

NVIDIA is warning users to activate System Level Error-Correcting Code  mitigation to protect against Rowhammer attacks on graphical processors with G...

BleepingComputer
📰 Missing Epstein Prison Video Footage Sparks Questions

2 related articles · 85% similarity

Analysis of metadata from the FBI's Jeffrey Epstein prison video reveals nearly three minutes of missing footage. While there's no evidence of deceptive manipulation, the modifications fuel conspiracy theories and raise concerns about transparency in the investigation.

2 posts

The FBI's Jeffrey Epstein Prison Video Had Nearly 3 Minutes Cut Out

Metadata from the “raw” Epstein prison video shows approximately 2 minutes and 53 seconds were removed from one of two stitched-together clips. The cu...

Wired - Security Latest
The FBI's Jeffrey Epstein Prison Video Had Nearly 3 Minutes Cut Out

Metadata Shows the FBI’s ‘Raw’ Jeffrey Epstein Prison Video Was Likely Modified

There is no evidence the footage was deceptively manipulated, but ambiguities around how the video was processed may further fuel conspiracy theories ...

Wired - Security Latest
Metadata Shows the FBI’s ‘Raw’ Jeffrey Epstein Prison Video Was Likely Modified
📰 Agentic AI's MCP: Security Risks Emerge

2 related articles · 87% similarity

The Model Context Protocol (MCP), a key technology supporting agentic AI, suffers from critical security vulnerabilities. These flaws, present across the MCP ecosystem, expose organizations rapidly adopting this technology to new and significant attack vectors. The vulnerabilities highlight the urgent need for robust security measures in the burgeoning field of agentic AI.

2 posts

Agentic AI's Risky MCP Backbone Opens Brand-New Attack Vectors

Critical security vulnerabilities affect different parts of the Model Context Protocol (MCP) ecosystem, which many organizations are rapidly adopting ...

darkreading
Agentic AI's Risky MCP Backbone Opens Brand-New Attack Vectors

MCP is fueling agentic AI — and introducing new security risks

Model Context Protocol (MCP) was created in late 2024 by OpenAI’s top competitor Anthropic. It was so good as a means for provi...

CSO Online
MCP is fueling agentic AI — and introducing new security risks
📰 AMD CPU Flaws Risk Data Leaks

2 related articles · 86% similarity

AMD has revealed four new vulnerabilities in its processors, allowing potential data leaks through timing attacks. These flaws affect a wide range of chipsets and could enable attackers to steal sensitive information from enterprise systems.

2 posts

AMD discloses new CPU flaws that can enable data leaks via timing attacks

AMD has disclosed four new processor vulnerabilities that could allow attackers to steal sensitive data from enterprise systems...

CSO Online
AMD discloses new CPU flaws that can enable data leaks via timing attacks

AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs

Semiconductor company AMD is warning of a new set of vulnerabilities affecting a broad range of chipsets that could lead to information disclosure. Th...

The Hacker News
AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs
📰 Pro Basketball Player Busted in Ransomware Case

3 related articles · 85% similarity

A Russian professional basketball player was arrested in France at the request of the US for allegedly negotiating ransomware payments, despite claims of technological ineptitude. The player denies involvement, highlighting the complexities of international cybercrime investigations. The case underscores the unexpected involvement of seemingly unrelated individuals in cybercriminal activities.

3 posts

Russian basketball player arrested in ransomware case despite being “useless with computers”

A Russian professional basketball player has been arrested for allegedly acting as a negotiator for a ransomware gang... and despite his lawyer claimi...

Graham Cluley

Ransomware-Verdacht: Französische Polizei verhaftet russischen Basketballer

Laut einem Medienbericht ist ein russischer Basketballspieler auf Antrag der USA in Frankreich festgenommen und inhaftiert worden. Der bestreitet alle...

heise security News
Ransomware-Verdacht: Französische Polizei verhaftet russischen Basketballer

Russian pro basketball player arrested for alleged role in ransomware attacks

Russian professional basketball player Daniil Kasatkin was arrested in France at the request of the United States for allegedly acting as a negotiator...

BleepingComputer
📰 Critical eSIM Vulnerabilities Threaten Billions

3 related articles · 83% similarity

Multiple reports reveal significant security flaws in eSIM technology, exposing billions of IoT devices and smartphones to hacking, cloning, and spying. These vulnerabilities stem from both hardware and software weaknesses, highlighting a widespread security risk requiring urgent industry action.

3 posts

eSIM Vulnerability in Kigen's eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks

Cybersecurity researchers have discovered a new hacking technique that exploits weaknesses in the eSIM technology used in modern smartphones, exposing...

The Hacker News
eSIM Vulnerability in Kigen's eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks

eSIM Bug in Millions of Phones Enables Spying, Takeover

eSIMs around the world may be fundamentally vulnerable to physical and network attacks because of a 6-year-old Oracle vulnerability in technology that...

darkreading
eSIM Bug in Millions of Phones Enables Spying, Takeover

eSIM Hack Allows for Cloning, Spying 

Details have been disclosed for an eSIM hacking method that could impact many, but the industry is taking action. The post eSIM Hack Allows for Clonin...

SecurityWeek
📰 Urgent: Critical Fortinet FortiWeb Vulnerabilities Exploited

4 related articles · 82% similarity

Multiple critical security vulnerabilities in Fortinet's FortiWeb have been patched, with publicly available exploits now circulating. These flaws allow for remote code execution and database compromise, urging immediate updates to prevent attacks.

4 posts

Fortinet schließt Sicherheitslecks in mehreren Produkten

Fortinet hat einige Sicherheitslücken in mehreren Produkten geschlossen. Eine davon gilt sogar als kritisches Risiko....

heise security News
Fortinet schließt Sicherheitslecks in mehreren Produkten

Angriffe wahrscheinlich: Exploit für FortiWeb-Lücke verfügbar

Am Donnerstag hat Fortinet ein Update für FortiWeb veröffentlicht. Exploits sind aufgetaucht, die die kritische Lücke missbrauchen....

heise security News
Angriffe wahrscheinlich: Exploit für FortiWeb-Lücke verfügbar

Exploits for pre-auth Fortinet FortiWeb RCE flaw released, patch now

Proof-of-concept exploits have been released for a critical SQLi vulnerability in Fortinet FortiWeb that can be used to achieve pre-authenticated remo...

BleepingComputer

Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)

Fortinet has released fixes for a critical security flaw impacting FortiWeb that could enable an unauthenticated attacker to run arbitrary database co...

The Hacker News
Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
📰 UK Busts Major Retail Cybercrime Ring

6 related articles · 79% similarity

Four individuals, including three teenagers, were arrested by the UK's National Crime Agency for their alleged involvement in significant cyberattacks targeting major retailers Marks & Spencer, Co-op, and Harrods. The attacks resulted in an estimated £440 million in losses and are potentially linked to the 'Scattered Spider' cybercriminal group.

6 posts

Cybercrime-Bande "Scattered Spider": Vier Verhaftungen in Großbritannien

Drei männliche Teenager und eine junge Frau wurden festgenommen, vor allem wegen Angriffen auf britische Einzelhändler Marks & Spencer, Co-Op und ...

heise security News
Cybercrime-Bande "Scattered Spider": Vier Verhaftungen in Großbritannien

4 Arrested in UK Over M&S, Co-op, Harrods Hacks

The UK's National Crime Agency arrested four people, who some experts believe are connected to the notorious cybercriminal collective known as Scatter...

darkreading
4 Arrested in UK Over M&S, Co-op, Harrods Hacks

Four Arrested in UK Over M&S, Co-op Cyberattacks

Three teens and a woman have been arrested by the UK’s NCA over the hacking of M&S, Co-op and Harrods. The post Four Arrested in UK Over M&S, ...

SecurityWeek

Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods

The U.K. National Crime Agency (NCA) on Thursday announced that four people have been arrested in connection with cyber attacks targeting major retail...

The Hacker News
Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods

Four arrested in UK over M&S, Co-op, Harrods cyberattacks

The UK's National Crime Agency (NCA) arrested four people suspected of being involved in cyberattacks on major retailers in the country, including Mar...

BleepingComputer

Four arrested in UK over M&S, Co-op, Harrod cyberattacks

The UK's National Crime Agency (NCA) arrested four people suspected of being involved in cyberattacks on major retailers in the country, including Mar...

BleepingComputer
📰 PerfektBlue: Critical Bluetooth Car Hack

5 related articles · 78% similarity

A critical Bluetooth vulnerability, dubbed PerfektBlue, affects millions of vehicles from Mercedes, Volkswagen, and Skoda, potentially allowing remote code execution. The flaws reside in OpenSynergy's BlueSDK Bluetooth stack and impact a wide range of devices beyond automobiles.

5 posts

PerfektBlue: Bluetooth-Lücke in Entertainment-Systemen von Mercedes, Skoda & VW

Die Bluetooth-Schwachstellenkombination mit dem Spitznamen "PerfektBlue" schlägt gerade Wellen. Sie betrifft Fahrzeuge von Mercedes, Skoda & VW....

heise security News
PerfektBlue: Bluetooth-Lücke in Entertainment-Systemen von Mercedes, Skoda & VW

350M Cars, 1B Devices Exposed to 1-Click Bluetooth RCE

Mercedes, Skoda, and Volkswagen vehicles, as well as untold industrial, medical, mobile, and consumer devices, may be vulnerable to an attack chain ca...

darkreading
350M Cars, 1B Devices Exposed to 1-Click Bluetooth RCE

Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack

PCA Cyber Security has discovered critical vulnerabilities in the BlueSDK Bluetooth stack that could have allowed remote code execution on car systems...

SecurityWeek

PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution

Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy's BlueSDK Bluetooth stack that, if successfully exploited, could...

The Hacker News
PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution

PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars

Four vulnerabilities dubbed PerfektBlue and affecting the BlueSDK Bluetooth stack from OpenSynergy can be exploited to achieve remote code execution a...

BleepingComputer
📰 Ingram Micro Recovers from Ransomware Attack

3 related articles · 90% similarity

Ingram Micro experienced a significant ransomware attack impacting online services, causing disruptions for customers. The company has since successfully restored systems and resumed normal operations across all regions. The attack's specific details and extent of data compromise remain undisclosed.

3 posts

Ingram Micro starts restoring systems after ransomware attack

Ingram Micro has begun restoring systems and business services after suffering a massive SafePay ransomware attack right before the July 4th holiday. ...

BleepingComputer

Ingram Micro Up and Running After Ransomware Attack

Customers were the first to notice the disruption on the distributor's website when they couldn't place orders online. ...

darkreading
Ingram Micro Up and Running After Ransomware Attack

Ingram Micro Restores Systems Impacted by Ransomware

Ingram Micro has restored operations across all countries and regions after disconnecting systems to contain a ransomware attack. The post Ingram Micr...

SecurityWeek
📰 Qantas Data Breach: 5.7M Customers Affected

3 related articles · 88% similarity

A data breach at Qantas has compromised the personal information of 5.7 million customers, including names, addresses, contact details, and potentially other sensitive data. The airline is investigating the incident and notifying affected individuals, emphasizing the scale of the security lapse.

3 posts

Qantas: Erste Details nach Cyber-Vorfall bekannt

Nach dem IT-Vorfall in der vergangenen Woche präsentiert Qantas nun erste Ermittlungsergebnisse. 5,7 Millionen Kundendaten sind futsch....

heise security News
Qantas: Erste Details nach Cyber-Vorfall bekannt

Qantas Confirms 5.7 Million Impacted by Data Breach

Hackers compromised names, addresses, email address, phone numbers, and other information pertaining to Qantas customers. The post Qantas Confirms 5.7...

SecurityWeek

Qantas confirms data breach impacts 5.7 million customers

Australian airline Qantas has confirmed that 5.7 million people have been impacted by a recent data breach, in which threat actors stole customers' da...

BleepingComputer
📰 Critical ServiceNow Vulnerability: Urgent Patch Needed

3 related articles · 86% similarity

A high-severity vulnerability in ServiceNow allows low-privileged users to access restricted data due to misconfigured access control lists (ACLs). This flaw, tracked as CVE-2025-3648, enables data exfiltration and requires immediate patching by administrators to mitigate risk.

3 posts

New ServiceNow flaw lets attackers enumerate restricted data

A new vulnerability in ServiceNow, dubbed Count(er) Strike, allows low-privileged users to extract sensitive data from tables to which they should not...

BleepingComputer

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs

A high-severity security flaw has been disclosed in ServiceNow's platform that, if successfully exploited, could result in data exposure and exfiltrat...

The Hacker News
ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs

Warning to ServiceNow admins: Fix your access control lists now

A vulnerability in the way ServiceNow manages user access control lists can easily allow a threat actor to steal sensitive data...

CSO Online
Warning to ServiceNow admins: Fix your access control lists now
📰 Nippon Steel Zero-Day Breach Exposes Data

2 related articles · 82% similarity

A zero-day exploit targeting network equipment at Nippon Steel Solutions led to a data breach affecting both customer and employee information. While the compromised data hasn't yet surfaced on the dark web, the company is investigating the extent of the breach and potential impact.

2 posts

Customer, Employee Data Exposed in Nippon Steel Breach

Information from the company's NS Solutions subsidiary has yet to show up on any Dark Web sites, but it doesn't rule out the possibility that the data...

darkreading
Customer, Employee Data Exposed in Nippon Steel Breach

Nippon Steel Subsidiary Blames Data Breach on Zero-Day Attack

Nippon Steel Solutions has disclosed a data breach that resulted from the exploitation of a zero-day in network equipment. The post Nippon Steel Subsi...

SecurityWeek
📰 McDonald's AI Bot Leaks 64M Applicant Data

9 related articles · 81% similarity

A severe security flaw in McDonald's AI-powered hiring platform, McHire, exposed the personal data of approximately 64 million job applicants. The vulnerability stemmed from easily guessable default credentials, allowing unauthorized access to sensitive information including chats and contact details.

9 posts

Daten von Millionen Bewerbern für Jobs bei McDonald's lagen offen bei KI-Firma

McDonald's nutzt einen KI-Chatbot für Einstellungsgespräche, doch die dabei gesammelten Daten waren kaum geschützt. Sicherheitsforscher fanden einfach...

heise security News
Daten von Millionen Bewerbern für Jobs bei McDonald's lagen offen bei KI-Firma

Lessons Learned From McDonald's Big AI Flub

McDonald's hiring platform was using its original default credentials and inadvertently exposed information belonging to approximately 64 million job ...

darkreading
Lessons Learned From McDonald's Big AI Flub

McDonald’s Chatbot Recruitment Platform Exposed 64 Million Job Applications

Two vulnerabilities in an internal API allowed unauthorized access to contacts and chats, exposing the information of 64 million McDonald’s applicants...

SecurityWeek

'123456' password exposed info for 64 million McDonald’s job applicants

Cybersecurity researchers discovered a vulnerability in McHire, McDonald's chatbot job application platform, that exposed the personal information of ...

BleepingComputer

'123456' password exposed chats for 64 million McDonald’s job chatbot applications

Cybersecurity researchers discovered a vulnerability in McHire, McDonald's chatbot job application platform, that exposed the chats of more than 64 mi...

BleepingComputer

'123456' password exposed chats for 64 million McDonald’s job applications

Cybersecurity researchers discovered a vulnerability in McHire, McDonald's chatbot job application platform, that exposed the chats of more than 64 mi...

BleepingComputer

'123456' password exposed chats for 64 million McDonald’s job applicants

Cybersecurity researchers discovered a vulnerability in McHire, McDonald's chatbot job application platform, that exposed the chats of more than 64 mi...

BleepingComputer

McDonald’s AI hiring tool’s password ‘123456’ exposed data of 64M applicants

A security oversight in McDonald’s AI-powered hiring platform “McHire” was found exposing sensitive applicant data belonging to...

CSO Online
McDonald’s AI hiring tool’s password ‘123456’ exposed data of 64M applicants

McDonald’s AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Using the Password ‘123456’

Basic security flaws left the personal info of tens of millions of McDonald’s job-seekers vulnerable on the “McHire” site built by AI software firm Pa...

Wired - Security Latest
McDonald’s AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Using the Password ‘123456’
📰 Urgent: Citrix NetScaler Exploit Under Attack

4 related articles · 79% similarity

A critical vulnerability (CVE-2025-5777), dubbed 'CitrixBleed 2', affecting Citrix NetScaler ADC and Gateway is actively being exploited. CISA has added it to its KEV catalog, urging immediate patching due to the unacceptable risk. Proof-of-concept exploit code has been publicly released.

4 posts

Exploit details released for Citrix Bleed 2 flaw affecting NetScaler

Security researchers have released a technical analysis and proof-of-concept exploit code for a critical vulnerability fixed la...

CSO Online
Exploit details released for Citrix Bleed 2 flaw affecting NetScaler

CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting Citrix NetScaler ADC and Gateway...

The Hacker News
CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises

CitrixBleed 2 Flaw Poses Unacceptable Risk: CISA

CISA considers the recently disclosed CitrixBleed 2 vulnerability an unacceptable risk and has added it to the KEV catalog. The post CitrixBleed 2 Fla...

SecurityWeek

CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch

The U.S. Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in Ci...

BleepingComputer
📰 US Sanctions North Korean Hacker Group

3 related articles · 76% similarity

The US Treasury Department sanctioned individuals and entities linked to North Korea's Andariel hacking group for their involvement in a fraudulent IT worker scheme that utilized malware. These sanctions target those responsible for the scheme's financial operations and cyberattacks.

3 posts

US Treasury Department sanctions individuals and entities over illegal IT worker scheme

The US Department of the Treasury’s Office of Foreign Assets Control (OFAC) Tuesday imposed sanctions on two individuals and fo...

CSO Online
US Treasury Department sanctions individuals and entities over illegal IT worker scheme

Treasury sanctions North Korean over IT worker malware scheme

The U.S. Department of the Treasury sanctioned cyber actor Song Kum Hyok for his association with North Korea's hacking group Andariel and for facilit...

BleepingComputer

U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) on Tuesday sanctioned a member of a North Korean hacking group called An...

The Hacker News
U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme
📰 Dark Web: Offense & Defense Strategies

2 related articles · 75% similarity

Cybersecurity professionals are increasingly utilizing the dark web to understand and counteract criminal activities. This involves analyzing dark market dynamics and employing proactive strategies to identify vulnerabilities and threats before they can be exploited.

2 posts

How defenders use the dark web

The term “dark web” may paint a picture in our head of threat actors lurking underground, on the shrouded parts of the internet...

CSO Online
How defenders use the dark web

Know Your Enemy: Understanding Dark Market Dynamics

To help counter crime, today's organizations require a cyber-defense strategy that incorporates the mindset of the cybercriminal. ...

darkreading
Know Your Enemy: Understanding Dark Market Dynamics
📄 Individual Stories

133 unique articles

China’s Salt Typhoon Hacked US National Guard

Chinese hacking group Salt Typhoon targeted a National Guard unit’s network and tapped into communications with other units. The post China’s Salt Typ...

SecurityWeek

Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time

Social engineering attacks have entered a new era—and they’re coming fast, smart, and deeply personalized. It’s no longer just suspicious emails in yo...

The Hacker News
Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time

Former US Soldier Who Hacked AT&T and Verizon Pleads Guilty

Cameron John Wagenius pleaded guilty to charges related to hacking into US telecommunications companies. The post Former US Soldier Who Hacked AT&...

SecurityWeek

IoT Security Firm Exein Raises $81 Million 

Italian company Exein has raised €70 million (~$81 million) in a Series C funding round led by Balderton. The post IoT Security Firm Exein Raises $81 ...

SecurityWeek

Google AI "Big Sleep" Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act

Google on Tuesday revealed that its large language model (LLM)-assisted vulnerability discovery framework discovered a security flaw in the SQLite ope...

The Hacker News
Google AI "Big Sleep" Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act

"Passwort" Folge 36: Vollständig zertifizierte News

Es gibt Nachrichten über Public-Key-Infrastrukturen, von wichtigen technischen Neuerungen bis zu groben Fehlern – da lassen sich die Hosts nicht zweim...

heise security News
"Passwort" Folge 36: Vollständig zertifizierte News

7 obsolete security practices that should be terminated immediately

Breaking bad habits and building better ones is a journey that requires patience, self-awareness, and determination. This is tr...

CSO Online
7 obsolete security practices that should be terminated immediately

Altered Telegram App Steals Chinese Users' Android Data

Using more than 600 domains, attackers entice Chinese-speaking victims to download a vulnerable Telegram app that is nearly undetectable on older vers...

darkreading
Altered Telegram App Steals Chinese Users' Android Data

AI Is Reshaping How Attorneys Practice Law

Experts recommend enhanced AI literacy, training around the ethics of using AI, and verification protocols to maintain credibility in an increasingly ...

darkreading
AI Is Reshaping How Attorneys Practice Law

OpenAI's image model gets built-in style feature on ChatGPT

OpenAI's image gen model, which is available via ChatGPT for free, now lets you easily create AI images even if you're not familiar with trends or pro...

BleepingComputer

Abacus dark web drug market goes offline in suspected exit scam

Abacus Market, the largest Western darknet marketplace supporting Bitcoin payments, has shut down its public infrastructure in a move suspected to be ...

BleepingComputer

Windows KB5064489 emergency update fixes Azure VM launch issues

Microsoft has released an emergency update to fix a bug that prevents Azure virtual machines from launching when the Trusted Launch setting is disable...

BleepingComputer

The Hyperpersonalized AI Slop Silo Machine Is Here

Subscribe Join the newsletter to get the latest updates. ...

404 Media
The Hyperpersonalized AI Slop Silo Machine Is Here

Police disrupt “Diskstation” ransomware gang attacking NAS devices

An international law enforcement action dismantled a Romanian ransomware gang known as 'Diskstation,' which encrypted the systems of several companies...

BleepingComputer

Saving the Lost Silent Zuckerberg Interview With the Amazing Power of AI

Yesterday, Silicon Valley trade publication The Information launched TITV, a live-streaming news program. For its first episode, the company’s foun...

404 Media
Saving the Lost Silent Zuckerberg Interview With the Amazing Power of AI

Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools

Cybersecurity researchers have shed light on a new ransomware-as-a-service (RaaS) operation called GLOBAL GROUP that has targeted a wide range of sect...

The Hacker News
Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools

Virtual Event Preview: Cloud & Data Security Summit – Tackling Exposed Attack Surfaces in the Cloud

Virtual event brings together leading experts, practitioners, and innovators for a full day of insightful discussions and tactical guidance on evolvin...

SecurityWeek

Immigration Raid Tracking App ‘ICE Block’ Keeps Your Data Private, Researcher Finds

ICE Block, an app that lets users warn others about the location of ICE officers, and which for a short while was the top of the social media App S...

404 Media
Immigration Raid Tracking App ‘ICE Block’ Keeps Your Data Private, Researcher Finds

How Criminal Networks Exploit Insider Vulnerabilities

Criminal networks are adapting quickly, and they're betting that companies won't keep pace. Let's prove them wrong. ...

darkreading
How Criminal Networks Exploit Insider Vulnerabilities

Hugging Face Is Hosting 5,000 Nonconsensual AI Models of Real People

Hugging Face, a company with a multi-billion dollar valuation and one of the most commonly used platforms for sharing AI tools and resources, is hosti...

404 Media
Hugging Face Is Hosting 5,000 Nonconsensual AI Models of Real People

a16z-Backed AI Site Civitai Is Mostly Porn, Despite Claiming Otherwise

In the two years that I’ve been reporting about Civitai, a platform for sharing AI image generation models that has been instrumental in the productio...

404 Media
a16z-Backed AI Site Civitai Is Mostly Porn, Despite Claiming Otherwise

Data Breach at Debt Settlement Firm Impacts 160,000 People

Pennsylvania-based Century Support Services is disclosing a data breach after its systems were hacked in November 2024.  The post Data Breach at Debt ...

SecurityWeek

FBI schließt illegale Videospiel-Websites

Ende vergangener Woche hat das FBI mehrere Webseiten stillgelegt, die widerrechtlich kopierte Videospiele angeboten haben....

heise security News
FBI schließt illegale Videospiel-Websites

OpenAI's ChatGPT-powered browser is codenamed 'Aura'

OpenAI is following Perplexity and is working on its own AI-powered browser codenamed "Aura." [...]...

BleepingComputer

"Bits & Böses": Dem Hass nicht das Internet überlassen

Opfer von Hass und digitaler Gewalt müssen das nicht wehrlos hinnehmen. Es gibt Menschen und Hilfsorganisationen, die ihnen helfen, gegen die Täter vo...

heise security News
"Bits & Böses": Dem Hass nicht das Internet überlassen

Securing Agentic AI: How to Protect the Invisible Identity Access

AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has t...

The Hacker News
Securing Agentic AI: How to Protect the Invisible Identity Access

Noch 90 Tage: Microsoft-365-Apps unter Windows 10 nach Support-Ende

In drei Monaten endet der Support für Windows 10. Microsoft erinnert daran und erläutert die Unterstützung von Microsoft-365-Apps....

heise security News
Noch 90 Tage: Microsoft-365-Apps unter Windows 10 nach Support-Ende

Zip Security Raises $13.5 Million in Series A Funding

Zip Security’s Series A funding round led by Ballistic Ventures will help the company grow its engineering and go-to-market teams. The post Zip Securi...

SecurityWeek

Ransomware Group Claims Attack on Belk

DragonForce says it stole more than 150 gigabytes of data from US department store chain Belk in a May cyberattack. The post Ransomware Group Claims A...

SecurityWeek

EU-App zur Alterskontrolle: Fünf Staaten beginnen mit den Tests

Bevor man auf nicht jugendfreie Inhalte zugreifen kann, soll man in der EU bald sein Alter nachweisen können. Fünf Staaten beginnen nun mit Probeläufe...

heise security News
EU-App zur Alterskontrolle: Fünf Staaten beginnen mit den Tests

Potenzielles Sicherheitsleck bei GommeHD: Möglicherweise Datenleck

Der deutsche Minecraft-Server GommeHD hat wohl eine Schwachstelle und ein Datenleck. User sollten ihre Passwörter ändern....

heise security News
Potenzielles Sicherheitsleck bei GommeHD: Möglicherweise Datenleck

AI poisoning and the CISO’s crisis of trust

In May 2025, the NSA, CISA, and FBI issued a joint bulletin authored with the cooperation of the governments of Australia, New ...

CSO Online
AI poisoning and the CISO’s crisis of trust

Für Grok & Co.: Pentagon verspricht KI-Firmen hunderte Millionen US-Dollar

Das Pentagon hat gleich mit vier KI-Firmen Verträge abgeschlossen, um deren Technik nutzen und testen zu können. Geld gibt es dabei auch für Grok 4 vo...

heise security News
Für Grok & Co.: Pentagon verspricht KI-Firmen hunderte Millionen US-Dollar

Drei mobile Videotürme für Überwachung in München

Sechs Meter hoch und mit drei Kameras – an Schwerpunkten der Kriminalität sollen die neuen Anlagen mehr Sicherheit bringen....

heise security News
Drei mobile Videotürme für Überwachung in München

UK launches vulnerability research program for external experts

UK's National Cyber Security Centre (NCSC) has announced a new Vulnerability Research Initiative (VRI) that aims to strengthen relations with external...

BleepingComputer

Military Veterans May Be What Cybersecurity Is Looking For

As the field struggles with a shortage, programs that aim to provide veterans with the technical skills needed to succeed in cybersecurity may be the ...

darkreading
Military Veterans May Be What Cybersecurity Is Looking For

Report from the Cambridge Cybercrime Conference

The Cambridge Cybercrime Conference was held on 23 June. Summaries of the presentations are here....

Schneier on Security

Swedish Prime Minister Pulls AI Campaign Tool After It Was Used to Ask Hitler for Support

The Moderate Party of Sweden has removed an AI tool from its website after people used it to generate videos of Prime Minister Ulf Kristersson aski...

404 Media
Swedish Prime Minister Pulls AI Campaign Tool After It Was Used to Ask Hitler for Support

The Unusual Suspect: Git Repos

While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sen...

The Hacker News
The Unusual Suspect: Git Repos

'Deportation Tok' Is Taking Off

As immigration raids roll out across the U.S., those affected are processing the experience in the normal 2025 way—via vertical video. Across socia...

404 Media
'Deportation Tok' Is Taking Off

The 10 most common IT security mistakes

Encrypted files and a text file containing a ransom note clearly indicate that a company has fallen victim to a cyberattack. Bu...

CSO Online
The 10 most common IT security mistakes

The Media's Pivot to AI Is Not Real and Not Going to Work

Subscribe Join the newsletter to get the latest updates. ...

404 Media
The Media's Pivot to AI Is Not Real and Not Going to Work

The Dark Side of Global Power Shifts & Demographic Decline

As global power realigns and economies falter, the rise in cybercrime is no longer hypothetical — it's inevitable. ...

darkreading
The Dark Side of Global Power Shifts & Demographic Decline

⚡ Weekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More

In cybersecurity, precision matters—and there’s little room for error. A small mistake, missed setting, or quiet misconfiguration can quickly lead to ...

The Hacker News
⚡ Weekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More

Malicious VSCode extension in Cursor IDE led to $500K crypto theft

A fake extension for the Cursor AI IDE code editor infected devices with remote access tools and infostealers, which, in one case, led to the theft of...

BleepingComputer

Louis Vuitton Data Breach Hits Customers in Several Countries

Louis Vuitton customers in the UK, South Korea, Turkey and possibly other countries are being notified of a data breach. The post Louis Vuitton Data B...

SecurityWeek

AI 'Nudify' Websites Are Raking in Millions of Dollars

Millions of people are accessing harmful AI “nudify” websites. New analysis says the sites are making millions and rely on tech from US companies. ...

Wired - Security Latest
AI 'Nudify' Websites Are Raking in Millions of Dollars

8 tough trade-offs every CISO must navigate

One key to success in the C-suite is being able to balance multiple competing interests. And while each executive faces high...

CSO Online
8 tough trade-offs every CISO must navigate

Putting AI-assisted ‘vibe hacking’ to the test

Attackers are increasingly leveraging large language models (LLMs) to enhance attack workflows, but for all their advances in h...

CSO Online
Putting AI-assisted ‘vibe hacking’ to the test

CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center

India's Central Bureau of Investigation (CBI) has announced that it has taken steps to dismantle what it said was a transnational cybercrime syndicate...

The Hacker News
CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center

13 Romanians Arrested for Phishing the UK’s Tax Service

Investigators from HMRC joined more than 100 Romanian police officers to arrest the 13 Romanian suspects in the counties of Ilfov, Giurgiu and Calaras...

SecurityWeek

Windows 10 KB5062554 update breaks emoji panel search feature

The search feature for the Windows 10 emoji panel is broken after installing the KB5062554 cumulative update released Tuesday, making it not possible ...

BleepingComputer

Cyberangriff auf nius.de: mutmaßlich Nutzerdaten veröffentlicht

Am Samstag traf ein Cyberangriff das Portal nius.de: Titel von Artikeln wurden manipuliert, anscheinend auch Abonnentendaten veröffentlicht....

heise security News
Cyberangriff auf nius.de: mutmaßlich Nutzerdaten veröffentlicht

Weekly Update 460

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.This week's update is the last remote...

Troy Hunt's Blog
Weekly Update 460

Trump’s NASA Cuts Would Hurt America for a Long, Long Time

Welcome back to the Abstract! Here are the studies that caught my eye this week.First up, a bummer! NASA is facing devastating cuts to Earth science, ...

404 Media
Trump’s NASA Cuts Would Hurt America for a Long, Long Time

Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub

Cybersecurity researchers have discovered a serious security issue that allows leaked Laravel APP_KEYs to be weaponized to gain remote code execution ...

The Hacker News
Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub

4 Arrested Over Scattered Spider Hacking Spree

Plus: An “explosion” of AI-generated child abuse images is taking over the web, a Russian professional basketball player is arrested on ransomware cha...

Wired - Security Latest
4 Arrested Over Scattered Spider Hacking Spree

BSI-Chefin: Cyberschutz-Verpflichtung für Firmen ab 2026

Wer seine IT-Systeme nicht ausreichend schützt, geht ins Risiko. Für rund 29.000 Unternehmen und Einrichtungen soll es bald verbindliche Vorgaben gebe...

heise security News
BSI-Chefin: Cyberschutz-Verpflichtung für Firmen ab 2026

Polizei-Diensthandys: Datenabfluss in Mecklenburg-Vorpommern möglich

In Mecklenburg-Vorpommern kann die Polizei derzeit die Diensthandys nicht nutzen. Erste Untersuchungsergebnisse liegen vor....

heise security News
Polizei-Diensthandys: Datenabfluss in Mecklenburg-Vorpommern möglich

Squid Dominated the Oceans in the Late Cretaceous

New research: One reason the early years of squids has been such a mystery is because squids’ lack of hard shells made their fossils hard to come by. ...

Schneier on Security

Payment Processors Are Pushing AI Porn Off Its Biggest Platforms

Tensor.Art, an AI image creating and model sharing site announced on Friday that it is “temporarily” restricting AI models, tools, and posts relate...

404 Media
Payment Processors Are Pushing AI Porn Off Its Biggest Platforms

Tradecraft in the Information Age

Long article on the difficulty (impossibility?) of human spying in the age of ubiquitous digital surveillance....

Schneier on Security

Behind the Blog: In Our Lane

This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we ...

404 Media
Behind the Blog: In Our Lane

As Cyber-Insurance Premiums Drop, Coverage Is Key to Resilience

Cyber-insurance premiums continue to decline from their explosive growth from 2020 to 2022, but coverage is more important than ever to manage risks, ...

darkreading
As Cyber-Insurance Premiums Drop, Coverage Is Key to Resilience

The zero-day that could've compromised every Cursor and Windsurf user

Learn how one overlooked flaw in OpenVSX discovered by Koi Secureity could've let attackers hijack millions of dev machines via an extension supply ch...

BleepingComputer

Factoring Cybersecurity Into Finance's Digital Strategy

As financial institutions continue to embrace digital transformation, their success will depend on their ability to establish and maintain robust and ...

darkreading
Factoring Cybersecurity Into Finance's Digital Strategy

In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware Evolves, DoNot APT Targets Govs

Noteworthy stories that might have slipped under the radar: Microsoft shows attack against AMD processors, SentinelOne details latest ZuRu macOS malwa...

SecurityWeek

Hackergruppe soll 170 Cyberangriffe verübt haben

Mindestens 170 Angriffe mit Millionenschaden: Ermittler nehmen eine internationale Hackergruppe ins Visier....

heise security News
Hackergruppe soll 170 Cyberangriffe verübt haben

Cyberstarts Launches $300M Liquidity Fund to Help Startups Retain Top Talent

With IPOs taking longer than ever, the venture firm’s fund aims to keep startup veterans motivated while staying private. The post Cyberstarts Launche...

SecurityWeek

Paddy Power and BetFair have suffered a data breach

Paddy Power and BetFair have warned customers that "an unauthorised third party” gained access to “limited betting account information” relating to up...

Graham Cluley

Securing Data in the AI Era

The 2025 Data Risk Report: Enterprises face potentially serious data loss risks from AI-fueled tools. Adopting a unified, AI-driven approach to data s...

The Hacker News
Securing Data in the AI Era

GrapheneOS veröffentlicht Android 16 im Stable-Kanal

Das datensparsame GrapheneOS steht als Stable-Version auf Basis von Android 16 zur Installation für Pixel-Geräte bereit. Einfach hatten es die Entwick...

heise security News
GrapheneOS veröffentlicht Android 16 im Stable-Kanal

EU Unveils AI Code of Practice to Help Businesses Comply With Bloc’s Rules

The EU code is voluntary and complements the EU’s AI Act, a comprehensive set of regulations that was approved last year and is taking effect in phase...

SecurityWeek

TikTok Faces Fresh European Privacy Investigation Over China Data Transfers

The Irish Data Privacy Commission announced that TikTok is facing a new European Union privacy investigation into user data sent to China. The post Ti...

SecurityWeek

July 2025 Breaks a Decade of Monthly Android Patches

Since August 2015, Google has delivered a constant stream of monthly security patches for Android. Until July 2025. The post July 2025 Breaks a Decade...

SecurityWeek

Anatomy of a Scattered Spider attack: A growing ransomware threat evolves

Scattered Spider is increasingly making headlines of late, evolving its techniques and broadening the scope of its criminal act...

CSO Online
Anatomy of a Scattered Spider attack: A growing ransomware threat evolves

Trend Micro: Mehrere Produkte mit hochriskanten Lücken

Trend Micro hat Schwachstellenbeschreibungen veröffentlicht, die Lücken in mehreren Produkten erörtern. Updates sind verfügbar....

heise security News
Trend Micro: Mehrere Produkte mit hochriskanten Lücken

Auslegungssache 138: Datenschutz im Domain-System

Die DSGVO hat den Zugriff auf Domain-Inhaberdaten drastisch eingeschränkt. Im c't-Datenschutz-Podcast geht es um die Folgen und neue Ansätze....

heise security News
Auslegungssache 138: Datenschutz im Domain-System

DHS Tells Police That Common Protest Activities Are ‘Violent Tactics’

DHS is urging law enforcement to treat even skateboarding and livestreaming as signs of violent intent during a protest, turning everyday behavior int...

Wired - Security Latest
DHS Tells Police That Common Protest Activities Are ‘Violent Tactics’

Digital Fingerprints Test Privacy Concerns in 2025

Digital fingerprinting technology creates detailed user profiles by combining device data with location and demographics, which increases the risks of...

darkreading
Digital Fingerprints Test Privacy Concerns in 2025

Windows 11 now uses JScript9Legacy engine for improved security

Microsoft announced that it has replaced the default scripting engine JScript with the newer and more secure JScript9Legacy on Windows 11 version 24H2...

BleepingComputer

Mexiko: Untersuchung wegen mutmaßlicher Schmiergeldzahlung beim Kauf von Pegasus

Beim Kauf der Spionagesoftware Pegasus soll Mexikos Ex-Präsident Enrique Peña Nieto Schmiergeld kassiert haben. Die Staatsanwaltschaft leitet Ermittlu...

heise security News
Mexiko: Untersuchung wegen mutmaßlicher Schmiergeldzahlung beim Kauf von Pegasus

Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads

Cybersecurity researchers have discovered a critical vulnerability in the open-source mcp-remote project that could result in the execution of arbitra...

The Hacker News
Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads

Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord

Cryptocurrency users are the target of an ongoing social engineering campaign that employs fake startup companies to trick users into downloading malw...

The Hacker News
Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord

Our Galaxy May Contain a Mysterious Force. It Could Change Physics Forever.

🌘Subscribe to 404 Media to get The Abstract, our newsletter about the most exciting and mind-boggling science news and studies of the week. Scientist...

404 Media
Our Galaxy May Contain a Mysterious Force. It Could Change Physics Forever.

The UN Made AI-Generated Refugees

I am talking to Amina, an AI avatar that plays the role of a woman living in a refugee camp in Chad after she escaped violence in Sudan. “I’m hangi...

404 Media
The UN Made AI-Generated Refugees

FBI's CJIS demystified: Best practices for passwords, MFA & access control

FBI's Criminal Justice Information Services (CJIS) compliance isn't optional when handling law enforcement data. From MFA to password hygiene, see how...

BleepingComputer

SIM Swap Fraud Is Surging — and That's a Good Thing

Now it's time to build systems that attackers can't reroute with a phone call. ...

darkreading
SIM Swap Fraud Is Surging — and That's a Good Thing

Cyberangriff per Telefonkonferenz: Fünf junge Männer unter Verdacht

Fünf junge Männer blockierten die Telefonleitungen von rund 800 Polizeidienststellen. Der verwendete Trick war simpel, sorgte aber für viel Ärger....

heise security News
Cyberangriff per Telefonkonferenz: Fünf junge Männer unter Verdacht

Trump Mobile Keeps Charging My Credit Card And I Have No Idea Why

Last month I put down $100 to pre-order the Trump Organization’s forthcoming mobile phone, the T1. Or, I tried to. As I wrote at the time, the webs...

404 Media
Trump Mobile Keeps Charging My Credit Card And I Have No Idea Why

Nationale IT-Sicherheit: CDU-Wirtschaftsrat tagt zu "Cybernation Deutschland"

Der Wirtschaftsrat will in Berlin den Weg zur Cybernation Deutschland finden. Am Ziel wird wenig gezweifelt – doch gute Absichten allein reichen nicht...

heise security News
Nationale IT-Sicherheit: CDU-Wirtschaftsrat tagt zu "Cybernation Deutschland"

Juniper: 28 Sicherheitsmitteilungen zu Schwachstellen veröffentlicht

Juniper behandelt in 28 Sicherheitsmitteilungen Schwachstellen in den Appliances und deren Betriebssystemen....

heise security News
Juniper: 28 Sicherheitsmitteilungen zu Schwachstellen veröffentlicht

Booz Allen Invests in Machine Identity Firm Corsha

‘Machine identities’, often used interchangeably with ‘non-human identities’ (NHIs), have been increasing rapidly since the start of digital transform...

SecurityWeek

AMD-fTPM-Bug: Einige Mainboard-Hersteller verteilen den Fix nicht

AMD erklärt, dass für einen fTPM-Fehler seit Jahren eine Korrektur bereitsteht. Hersteller liefern sie nur nicht aus....

heise security News
AMD-fTPM-Bug: Einige Mainboard-Hersteller verteilen den Fix nicht

Warn-App: NINA schickt jetzt auch Polizeimeldungen

Die Notfall-App des Bundes namens Nina warnt derzeit vor allem vor extremen Unwettern und anderen drohenden Naturkatastrophen. Nun wird ihre Funktion ...

heise security News
Warn-App: NINA schickt jetzt auch Polizeimeldungen

Using Signal Groups for Activism

Good tutorial by Micah Lee. It includes some nonobvious use cases....

Schneier on Security

What Can Businesses Do About Ethical Dilemmas Posed by AI?

AI-made decisions are in many ways shaping and governing human lives. Companies have a moral, social, and fiduciary duty to responsibly lead its take-...

SecurityWeek

What Security Leaders Need to Know About AI Governance for SaaS

Generative AI is not arriving with a bang, it’s slowly creeping into the software that companies already use on a daily basis. Whether it is video con...

The Hacker News
What Security Leaders Need to Know About AI Governance for SaaS

New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App

Cybersecurity researchers have discovered new artifacts associated with an Apple macOS malware called ZuRu, which is known to propagate via trojanized...

The Hacker News
New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App

AirMDR Raises $15.5 Million for MDR Solution

AI-powered MDR provider AirMDR has raised $15.5 million in funding (seed and infusion investment) to support its R&D efforts. The post AirMDR Rais...

SecurityWeek

200.000 Webseiten durch Sicherheitsleck in WordPress-Plug-in SureForms gefährdet

Wer in den eigenen WordPress-Instanzen das Plug-in SureForms einsetzt, sollte updaten: Eine Sicherheitslücke erlaubt die Übernahme....

heise security News
200.000 Webseiten durch Sicherheitsleck in WordPress-Plug-in SureForms gefährdet

North American APT Uses Exchange Zero-Day to Attack China

Stories about Chinese APTs attacking the US and Canada are plentiful. In a turnabout, researchers found what they believe is a North American entity a...

darkreading
North American APT Uses Exchange Zero-Day to Attack China

Smashing Security podcast #425: Call of Duty: From pew-pew to pwned

In episode 425 of "Smashing Security", Graham reveals how "Call of Duty: WWII" has been weaponised - allowing hackers to hijack your entire PC during ...

Graham Cluley

Welcoming Push Security to Have I Been Pwned's Partner Program

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.As we gradually roll out HIBP’s Partn...

Troy Hunt's Blog
Welcoming Push Security to Have I Been Pwned's Partner Program

Microsoft Authenticator on iOS moves backups fully to iCloud

Microsoft is rolling out a new backup system in September for its Authenticator app on iOS, removing the requirement to use a Microsoft personal accou...

BleepingComputer

Browser Exploits Wane as Users Become the Attack Surface

For browsers, exploitation is out — and getting users to compromise their own systems is in. Improved browser security has forced attackers to adapt t...

darkreading
Browser Exploits Wane as Users Become the Attack Surface

Security-Bericht: On-Premises-Angebote erleben Renaissance

Unternehmen sorgen sich um Bedrohungen durch KI und den Verlust von Daten – On-premises wird wieder beliebter. Das geht aus einer Umfrage hervor....

heise security News
Security-Bericht: On-Premises-Angebote erleben Renaissance

Microsoft confirms Windows Server Update Services (WSUS) sync is broken

Microsoft has confirmed a widespread issue in Windows Server Update Services (WSUS) that prevents organizations from syncing with Microsoft Update and...

BleepingComputer

Google reveals details on Android’s Advanced Protection for Chrome

Google is sharing more information on how Chrome operates when Android mobile users enable Advanced Protection, highlighting strong security improveme...

BleepingComputer

An NVIDIA Container Bug & Chance to Harden Kubernetes

A container escape flaw involving the NVIDIA Container Toolkit could have enabled a threat actor to access AI datasets across tenants. ...

darkreading
An NVIDIA Container Bug & Chance to Harden Kubernetes

New AI Malware PoC Reliably Evades Microsoft Defender

Worried about hackers employing LLMs to write powerful malware? Using targeted reinforcement learning (RL) to train open source models in specific tas...

darkreading
New AI Malware PoC Reliably Evades Microsoft Defender

Bitcoin Depot breach exposes data of nearly 27,000 crypto users

Bitcoin Depot, an operator of Bitcoin ATMs, is notifying customers of a data breach incident that has exposed their sensitive information. [...]...

BleepingComputer

Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets

The Initial Access Broker (IAB) known as Gold Melody has been attributed to a campaign that exploits leaked ASP.NET machine keys to obtain unauthorize...

The Hacker News
Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets

Ruckus Networks leaves severe flaws unpatched in management devices

Multiple vulnerabilities that remain unpatched in Ruckus Wireless management products could be exploited to fully compromise the network environment t...

BleepingComputer

AirMDR Tackles Security Burdens for SMBs With AI

The security startup provides managed detection and response services for small to midsize businesses to detect and address modern threats, such as ra...

darkreading
AirMDR Tackles Security Burdens for SMBs With AI

Rubio Impersonator Signals Growing Security Threat From Deepfakes

An impostor who posed as the secretary of state in text and voice communications with diplomats and politicians demonstrates the increased sophisticat...

darkreading
Rubio Impersonator Signals Growing Security Threat From Deepfakes

As Texas floods, so does the internet – with dangerous lies

As Texas reels from devastating floods, conspiracy theorists are hard at work....

Graham Cluley

The MFA You Trust Is Lying to You – and Here's How Attackers Exploit It

MFA Authenticator apps aren't cutting it anymore. Attackers are bypassing legacy MFA with fake sites and real-time phishing. Token Ring and BioStick s...

BleepingComputer

AiLock ransomware: What you need to know

The AiLock ransomware gang gives its victims just 72 hours to respond and five days to pay up... or else. If you don’t comply? They will grass you up ...

Graham Cluley

Ameos-Kliniken: Cyberangriff sorgt für eingeschränkte Versorgung

Der Klinikkonzern Ameos kämpft nach einem Cyberangriff mit einem großen IT-Ausfall. Davon sind alle deutschen Standorte betroffen....

heise security News
Ameos-Kliniken: Cyberangriff sorgt für eingeschränkte Versorgung

ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

Agents from Immigration and Customs Enforcement (ICE) have gained access to a massive database of health and car insurance claims and are using it ...

404 Media
ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware

A threat actor with suspected ties to India has been observed targeting a European foreign affairs ministry with malware capable of harvesting sensiti...

The Hacker News
DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware

SatanLock Next in Line for Ransomware Group Shutdowns

Though the victims list on its site has since been taken down, the group plans on leaking the rest of the files stolen from its victims. ...

darkreading
SatanLock Next in Line for Ransomware Group Shutdowns

Podcast: How to Fight Back Against AI Bot Scrapers

We’re back! We start this week with Emanuel’s article about Anubis, an open source piece of software that is saving the internet from AI bot scrape...

404 Media
Podcast: How to Fight Back Against AI Bot Scrapers

Verified, featured, and malicious: RedDirection campaign reveals browser marketplace failures

A widespread browser hijacking campaign has infected over 2.3 million users through 18 malicious extensions available on Google...

CSO Online
Verified, featured, and malicious: RedDirection campaign reveals browser marketplace failures

Unlock Security Operations Success With Data Analysis

From data fog to threat clarity: Automating security analytics helps security teams stop fighting phantoms and respond to what matters. ...

darkreading
Unlock Security Operations Success With Data Analysis

Samsung Announces Security Improvements for Galaxy Smartphones

New Samsung Galaxy features include protections for on-device AI, expanded cross-device threat detection, and quantum-resistant encryption for network...

SecurityWeek

Trend Micro flags BERT: A rapidly growing ransomware threat

A new threat actor, BERT, has emerged as a fast-moving ransomware group that has rapidly expanded its activity across Asia, Eur...

CSO Online
Trend Micro flags BERT: A rapidly growing ransomware threat

IBM Power11 challenges x86 and GPU giants with security-first server strategy

With the launch of Power11 servers, IBM is shifting the discussion from raw performance numbers to security and reliability, hi...

CSO Online
IBM Power11 challenges x86 and GPU giants with security-first server strategy

Yet Another Strava Privacy Leak

This time it’s the Swedish prime minister’s bodyguards. (Last year, it was the US Secret Service and Emmanuel Macron’s bodyguards. in 2018, it was sec...

Schneier on Security

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact

Industrial solutions providers Siemens, Schneider Electric and Phoenix Contact have released July 2025 Patch Tuesday ICS security advisories. The post...

SecurityWeek

How To Automate Ticket Creation, Device Identification and Threat Triage With Tines

Run by the team at workflow orchestration and AI platform Tines, the Tines library features over 1,000 pre-built workflows shared by security practiti...

The Hacker News
How To Automate Ticket Creation, Device Identification and Threat Triage With Tines

IT-Security-Pros: Firmen locken lieber mit Work-Life-Balance als hohem Gehalt

Arbeitgeber legen bei der Suche nach IT-Security-Fachpersonal inzwischen weniger Wert auf den Uni-Abschluss, wie eine Analyse zeigt....

heise security News
IT-Security-Pros: Firmen locken lieber mit Work-Life-Balance als hohem Gehalt

SocFeed by Venacus

SOCFeed is a SOC news aggregator that provides the latest updates on data leaks, breaches, and cybersecurity incidents. Stay informed with real-time news from various sources.

© 2025 SocFeed. All rights reserved.