Security News
2025-05-05
BSides Seattle 2025: Rebuilding Trust in Systems In The Age Of NHIs
Read moreThe Future of Cloud & Security Operations: Analyzing PANW’s Cortex Cloud Bet
Read moreCyber Security Company CEO Arrested for Installing Malware Onto Hospital Computers
Read moreMicrosoft CEO says up to 30% of the company's code was written by AI #ai-news
Read moreWhen /etc/h*sts Breaks Your Substack Editor: An Adventure in Web Content Filtering
Read moreVulnerability Exploitation Is Shifting in 2024-25
Read moreMy SIEM-Agnostic Creative Process to Detection Engineering
Read moreVibe Hacking: Finding Auth Bypass and RCE in Open Game Panel
Read more5%- report- OX 2025 Application Security Benchmark Report
Read moreRSA Day #3 Summary RSA2025
Read moreExclusive: Dating app Raw exposed users' location data and personal information
Read moreSignal v. Noise in the RSA Innovation Sandbox Sandbox was won by Nuclei creators. However they have to take controversial $5 million funding to be a finalist. Blackhat finalists dont have to RSA2025 Link to visual
Read more2025-04-24
More than 560,000 people were impacted across four healthcare data breaches involving Hillcrest Convalescent Center, Gastroenterology Associates of Central Florida, Community Care Alliance, and Sunflower Medical Group.
Read moreUS cities warn of wave of unpaid parking phishing texts I got one of these!
Read moreGoogle Pays Out Nearly $12M in 2024 Bug Bounty Program Lets to bug hunting!
Read moreUndocumented commands found in Bluetooth chip used by a billion devices Hardware Hacking
Read moreEthereum private key stealer on PyPI downloaded over 1,000 times Supply chain attack!
Read moreMalicious Code Hits ‘tj-actions/changed-files’ in 23,000 GitHub Repos
Read moreTomcat Vulnerability and a analysis by Wallarm Labs
Read moreAttack on Car dealerships
Read moreJuniper Routers by China Nexus
Read moreFake Captcha
Read moreSupply chain attacks by Lazarus to steal crypto
Read moreUS Treasury got hidden messages in Emojis
Read moreMajor leak: sperm bank California Cryobank suffers data breach
Read moreUse one Virtual Machine to own them all — active exploitation of ESXicape
Read moreNew Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents
Read moreThe Great CNAPP Re-bundle
Read moreNew npm attack poisons local packages with backdoors
Read moreNew Atlantis AIO platform automates credential stuffing on 140 services
Read moremacOS Users Warned of New Versions of ReaderUpdate Malware
Read moreScaling Threat Modeling with AI: Generating 1000 Threat Models Using Gemini 2.0 and AI Security Analyzer
Read moreSecurity on the path to AGI
Read moreDarkwebDaily.live
Read moreDigital Safety - How to protect your online identity
Read moreA Free OSINT Lesson: Search Indexes, Record Shops, and Flipping through Vinyl
Read moreCritical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication
Read moreOver 3 million applicants’ data leaked on NYU’s website
Read moreBountySecurity/BountyPrompt: Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI
Read moreDryRun Security vs. Traditional SAST Vendors in Ruby on Rails
Read moreSecuring AI agents: authentication patterns for Operator and computer using models — WorkOS
Read moreOracle Health breach compromises patient data at US hospitals
Read moreCVE-2025-1974: The IngressNightmare in Kubernetes | Wiz Blog
Read moreCVE-2025-29927
Read moreiOS Dating App compromise
Read morePillage registry
Read moreTMBench
Read moreCVE-2024-27564 Actively Exploited in the Wild OpenAI vulnerability (SSRF) exploited for Healthcare hacking, this video shows the exploit in action.
Read moreHackers abuse WordPress MU-Plugins to hide malicious code Wordpress plugins - rabbit hole.
Read moreMicrosoft Opensources Red Teaming Agent
Read moreAI Agents for Detection EngineeringOriginal post 06.Q2 CIS-60
Read moreTracecatHQ/tracecat
Read moreMCP and Security Operations
Read moreBecoming a Detection Engineering Contractor Part II: The Preparation
Read moreSOC AI Agents
Read moreThe Return of the Baby ASO: Why SOCs Still Suck
Read moreMust read books in tech and IT book-summarizer
Read moreTexas State Bar Breach👩⚖️, Outlaw Linux Malware 🐧, Scattered Spider Members Pleads Guilty 🕷️ TLDR Expand
Read moreSecurity Weekly
Read moreGoogle Announces Sec Gemini v1 #ai-news
Read moreSlow Collapse of Critical Thinking in OSINT due to AI #ai-news
Read moreUnderage Deepfakes Exposed 👶, Finding Evil in Memory 😈, AI Finds GRUB2 Flaws 🤖
Read moreOracle Second Hack 👁️🗨️, Taming ML Wild West 🤠, ChatGPT Creates Fake Passport 🛂
Read moreAutonomous SOC Analyst Product
Read moreStory of signal from Increment @ Stripe CTI
Read moreGhidra MCP #ai-news
Read moreProgram: Cybersecurity Intelligence and Information Security, M.S. - University of South Florida - Modern Campus Catalog™ 06.Q2 CIS-60
Read moreInternship Opportunities 06.Q2 CIS-60
Read moreTailscale raises $160M.
Read morefrancisconeves97/jxscout: jxscout superpowers JavaScript analysis for security researchers #tools
Read more1.6 Million People Impacted by Data Breach at Laboratory Services Cooperative
Read moreDefeating Prompt Injections by Design
Read more2025-03-07
Flightradar24 experiences ongoing DDoS cyberattack.
Read moreNew 'polyglot' malware targets aviation and satellite communication firms.
Read moreApartment buildings are been broken into within minutes using IoT-connected intercoms with default credentials, leaving them vulnerable to anyone with Google.
Read more2025-02-28
ByBit (1.5 Billion Hack) linked to North Korea.
Read moreSkybox Security shuts down and lays off entire workforce.
Read moreBlack Basta ransomware group's internal chats leaked.
Read moreLLM dataset found to contain over 12,000 API keys and passwords.
Read moreNew 'Pass-the-cookie' exploit bypasses multi-factor authentication.
Read moreChatGPT vulnerable to operator prompt injection.
Read moreLLM injection attacks highlighted by 'Indiana Jones jailbreak' approach.
Read moreRussian threat groups targeting Ukraine's Signal communications.
Read moreApple and UK government clash over end-to-end encryption.
Read more2025-02-20
Russia's Sandworm conducting 'BadPilot campaign' targeting US and European organizations in energy and telecommunications sectors, exploiting vulnerabilities to maintain access and support military objectives
Read moreTrump Hotels guest information leaked on hacker forum by threat actor 'FutureSeeker', known for similar data dumps
Read moreVulnerability (CVE-2025-0994) in Trimble Cityworks tool used by local governments discovered, potentially allowing RCE against customer IIS servers
Read moreResearchers detail $50K software supply chain hack involving exposed NPM_TOKEN in Docker image build layers
Read moreResearch highlights ongoing security concerns with PDF features and potential attack vectors
Read moreJPMorgan Chase announces plans to block Zelle payments to social media contacts to combat rising online payment fraud
Read moreElon Musk's Dogecoin website discovered to be vulnerable to defacement due to unrestricted editing capabilities
Read morePig Butchering cryptocurrency scams show 40% year-over-year revenue growth with increased sophistication
Read moreSecurity researchers identify malicious machine learning models uploaded to Hugging Face platform
Read moreRussian state-sponsored threat actor reportedly shifting focus to targeting US and UK assets
Read moreSlop and Flop attacks emerge as a new security threat, though details on their execution and impact remain scarce.
Read moreCryptocurrency and blockchain hacker report highlights that bug bounties in the sector outpay other industries. Around 10% of vulnerabilities stem from business logic flaws, compared to 2% in other sectors. Crypto.com runs $2 million in bug bounties.
Read moreApple patches a zero-day vulnerability related to USB Restricted Mode, which was actively exploited in highly sophisticated attacks.
Read moreKen Huang releases Maestro, a seven-layer threat modeling tool for Agentic AI, designed for continuous security assessment.
Read moreA WatchTowr researcher discovered over 150 abandoned sensitive S3 buckets from software companies, governments, and infrastructure pipelines, exposing critical data.
Read moreOver 12,000 KerioControl firewalls remain vulnerable to an RCE flaw despite GFI Software's security update on December 19, 2024. According to Censys, over 23,800 instances are still at risk.
Read moreToll booth scammers continue to exploit users through fraudulent SMS messages, tricking victims into making false payments.
Read moreA massive brute-force attack, utilizing 2.8 million IPs—mostly from Brazil—targets VPN devices, highlighting ongoing security risks.
Read more2025-02-13
More than 560,000 people were impacted across four healthcare data breaches involving Hillcrest Convalescent Center, Gastroenterology Associates of Central Florida, Community Care Alliance, and Sunflower Medical Group.
Read moreUS cities warn of a surge in phishing scams involving fake unpaid parking tickets. Attackers are sending fraudulent SMS messages to steal payment details.
Read moreGoogle paid nearly $12 million in bug bounties during 2024, highlighting the importance of vulnerability research and responsible disclosure.
Read moreUndocumented commands were discovered in a widely used Bluetooth chip, potentially impacting over a billion devices and raising concerns about hardware security vulnerabilities.
Read moreA malicious Ethereum private key stealer was found in a PyPI package, downloaded over 1,000 times, demonstrating ongoing supply chain attacks in open-source ecosystems.
Read more2025-02-07
Hackers are spoofing Microsoft ADFS login pages in a phishing campaign targeting education, healthcare, and government organizations to steal credentials.
Read moreA vulnerability in Cisco Webex Chat allowed unauthorized access to chat histories across multiple organizations, raising concerns over data security.
Read moreAI red teaming research compares jailbreak results of various LLMs, including DeepSeek, Qwen, O1, O3, Claude, and Kimi, highlighting security weaknesses.
Read moreMultiple security flaws found in the DeepSeek iOS app, including sending unencrypted data, exposing users to potential privacy risks.
Read moreCIA mistakenly sent an unclassified email containing names of some employees to the Trump administration, raising security concerns.
Read moreAn IT trainer and YouTuber claims DeepSeek is misleading users, exposing alleged discrepancies in its AI operations.
Read moreZero-day vulnerabilities in Microsoft Sysinternals allow attackers to execute DLL injection on Windows, posing a significant security threat.
Read moreWhatsApp accuses surveillance firm Paragon of hacking, escalating concerns over the misuse of spyware in global surveillance.
Read moreOverTheWire's Bandit wargame is a highly recommended gamified tool for improving Linux command-line skills.
Read more2024-12-31
Claude uses AI to identify new security threats by leveraging advanced natural language processing to analyze patterns and anomalies in real-time, providing proactive threat detection.
Read moreChinese APT exploited a BeyondTrust API key to gain unauthorized access to U.S. Treasury systems, extracting sensitive documents in a significant cybersecurity breach.
Read moreNew HIPAA rules mandate healthcare providers to restore critical data within 72 hours and conduct annual compliance audits to enhance patient data protection.
Read moreNorth Korean threat actors deployed OtterCookie malware in the Contagious Interview campaign. This JavaScript malware uses Socket.IO to communicate with a C2 server, enabling shell commands for data theft, including files, clipboard data, and cryptocurrency wallet keys.
Read more2024-12-11
Russia has pioneered a new model of drug trafficking using darknet markets and cryptocurrency for payment, with physical 'dead drops' for delivery. Russian platforms like Kraken and Mega now dominate 93% of global darknet markets, generating $1.5 billion in revenue in 2023.
Read moreAttackers are distributing corrupted Word documents that bypass security scans, only to show QR codes leading to credential theft sites after user or automated recovery processes assemble the malware.
Read moreUPenn researchers demonstrated how language model-powered robots could be manipulated into dangerous behaviors using automated jailbreak prompts, such as planning explosions and driving off bridges.
Read morePresident Yoon Suk Yeol of South Korea has declared emergency martial law, citing opposition-controlled parliament and alleged North Korean sympathies.
Read moreAttackers compromised a GitHub account to publish backdoored versions of Solana's Web3.js library, which could steal private keys from decentralized apps.
Read moreThreat actors are abusing Cloudflare's pages.dev and workers.dev domains for phishing campaigns, leveraging their trusted reputation and built-in SSL.
Read moreiVerify's new spyware detection tool uncovered Pegasus infections in 7 out of 2,500 customer device scans, targeting not just activists but also business leaders and government officials.
Read moreThe FBI reports criminals are increasingly using AI to enhance scams, creating realistic text, images, and videos for romance, investment, and job fraud.
Read moreRussian agents planted spyware on a programmer's Android phone during a forced detention in Moscow, using a trojanized version of Cube Call Recorder with surveillance capabilities.
Read moreOpenAI is collaborating with Anduril to develop AI-powered anti-drone systems for the U.S. military, building on Anduril's recent defense contract win.
Read moreUS Special Forces have ordered 10 NERVA-LG robotic systems for tactical missions, marking their first major investment in unmanned ground vehicles.
Read moreApple secured a patent for a system capable of identifying individuals without visible facial features, using data such as walking style and clothing.
Read moreRussia's Gamaredon hacking group is using Cloudflare Tunnels to conceal infrastructure while deploying GammaDrop malware against Ukrainian targets.
Read moreSailPoint found a critical directory traversal vulnerability (CVE-2024-10905) in their IdentityIQ platform that scores 10/10 CVSS and allows unauthorized file access.
Read moreMatt Johansen has launched Vulnerable Media, a technical marketing agency specializing in cybersecurity content and campaigns, after taking Vulnerable U full-time.
Read moreCybersecurity journalist Brian Krebs continues investigating cybercrime despite years of threats and harassment, including swatting attempts and malicious mail.
Read moreRussian courts sentenced 15 members of the Hydra dark web marketplace, including a life sentence for its creator, after the site facilitated $5 billion in cryptocurrency transactions.
Read more2024-12-07
China has deeply compromised thousands of US telco networks according to Senator Mark Warner. The attack, carried out by "Salt Typhoon," involves persistent access requiring device replacements and may include wiretapping capabilities.
Read moreVolexity uncovered Russian APT28 hackers targeting neighboring organizations to exploit WiFi networks. Using password spraying and lateral movement, the group bypassed MFA-less systems to infiltrate high-value targets.
Read moreApple issued urgent patches for iOS, iPadOS, macOS, visionOS, and Safari to fix two zero-day vulnerabilities, CVE-2024-44308 and CVE-2024-44309, addressing potential code execution and XSS risks.
Read moreThe Danish Navy detained the Chinese bulk carrier Yi Peng 3 for allegedly damaging undersea telecom cables in the Baltic Sea, affecting connections between Finland, Germany, Sweden, and Lithuania.
Read moreCrowdstrike reported that China-linked group Liminal Panda has targeted telecom networks in South Asia and Africa since 2020, exploiting protocols like SIGTRAN and GSM for intelligence collection.
Read moreCrum & Forster launched a new liability insurance policy for CISOs, covering consulting work and even pro bono IT security activities, protecting against personal liability.
Read moreGoogle blocked over 1,000 pro-China propaganda websites operated by "Glassbridge," a network of four Chinese firms masquerading as legitimate news outlets.
Read moreResearchers uncovered Russia scaling up disinformation campaigns using AI-generated Western personas. Techniques include fake profile pictures and coordinated posts to disseminate anti-Ukraine narratives more effectively.
Read more2024-11-19
Palo Alto Networks has released Indicators of Compromise (IoCs) for a new zero-day vulnerability affecting their firewalls.
Read moreVMware confirmed that threat actors are exploiting two vCenter Server vulnerabilities, CVE-2024-38812 and CVE-2024-38813, which were first disclosed at the 2024 Matrix Cup hacking competition.
Read moreCybersecurity researchers have disclosed a high-severity security flaw in the PostgreSQL open-source database system. Tracked as CVE-2024-10979 with a CVSS score of 8.8, the flaw could allow unprivileged users to alter environment variables, potentially leading to code execution or information disclosure.
Read more2024-11-12
Six critical flaws have been found in the Ollama AI framework, potentially allowing denial-of-service, model theft, and poisoning attacks.
Read moreThe FBI is warning about a rise in hacked police emails being used to send fake subpoenas and emergency data requests (EDRs) to U.S. tech companies. Attackers target low-security organizations with high trust, compromising them to gain access to data, permissions, and restricted authorization.
Read moreGoogle's AI security assessment tool, Big Sleep, found a zero-day vulnerability in the SQLite database engine, marking the first instance where AI uncovered a flaw missed by traditional testing.
Read moreThe FBI is asking the public for help in identifying Chinese hackers in groups like APT31 and APT41.
Read moreCrowdStrike has launched new AI Red Team Services to identify vulnerabilities in AI systems and provide guidance on how to fix them.
Read moreSynology is telling users to patch a critical zero-click RCE bug, CVE-2024-10443, affecting millions of DiskStation and BeePhotos NAS devices. Synology advises caution about exposing NAS devices to the internet.
Read moreNokia is investigating a potential breach after a hacker, IntelBroker, claimed to have stolen their source code from a third-party vendor. The data includes SSH keys, source code, and RSA keys, accessed via default credentials on a SonarQube server.
Read moreCanada has ordered TikTok Technology Canada to shut down, citing national security risks. This decision closes the company’s Canadian operations but does not restrict Canadians from using TikTok.
Read moreResearchers from George Mason University have introduced Mantis, a framework using prompt injections to counterattack against prompt injection attacks, potentially misdirecting or compromising attackers' systems.
Read moreThe U.S. is tightening rules on foreign real estate deals near military bases, adding 60 installations to the CFIUS scrutiny list. This follows the forced closure of a Chinese-owned crypto mine near F.E. Warren Air Force Base.
Read more2024-11-04
An investigation by French newspaper Le Monde revealed that bodyguards of leaders such as Joe Biden and Donald Trump have used the Strava fitness app, inadvertently disclosing sensitive locations. For instance, the app revealed a San Francisco hotel where President Biden met with Chinese President Xi Jinping.
Read morePassword manager LastPass has alerted users to scammers promoting a fraudulent support number, 805-206-2892, through 5-star reviews on its Chrome extension. Calling this number directs users to download a remote support program that is actually malware.
Read moreResearchers have successfully created voice-based financial scams, like unauthorized bank transfers and credential theft, using the new real-time API in ChatGPT-4o. The scams showed success rates ranging from 20-60%.
Read moreCisco Talos discovered five out-of-bounds vulnerabilities in NVIDIA's shader processing technology and eleven separate issues affecting LevelOne routers.
Read moreOkta has patched a critical issue allowing logins without a password if a username exceeded 52 characters. How this passed through extensive testing remains baffling.
Read moreThe US has charged Russian national Maxim Rudometov for creating the RedLine infostealer, following access to the malware's source code and infrastructure.
Read moreThe U.S. military has confirmed its first purchase of OpenAI products for AFRICOM, signifying a step towards integrating AI into national security operations.
Read moreBellingcat identified the location where Hamas leader Yahya Sinwar was killed in southern Gaza's Tal as-Sutlan area, using IDF footage and distinct visual markers such as a gazebo and residential tower.
Read more