Security News

2025-05-05

BSides Seattle 2025: Rebuilding Trust in Systems In The Age Of NHIs

Read more

The Future of Cloud & Security Operations: Analyzing PANW’s Cortex Cloud Bet

Read more

Cyber Security Company CEO Arrested for Installing Malware Onto Hospital Computers

Read more

Microsoft CEO says up to 30% of the company's code was written by AI #ai-news

Read more

When /etc/h*sts Breaks Your Substack Editor: An Adventure in Web Content Filtering

Read more

Vulnerability Exploitation Is Shifting in 2024-25

Read more

My SIEM-Agnostic Creative Process to Detection Engineering

Read more

Vibe Hacking: Finding Auth Bypass and RCE in Open Game Panel

Read more

5%- report- OX 2025 Application Security Benchmark Report

Read more

RSA Day #3 Summary RSA2025

Read more

Exclusive: Dating app Raw exposed users' location data and personal information

Read more

Signal v. Noise in the RSA Innovation Sandbox Sandbox was won by Nuclei creators. However they have to take controversial $5 million funding to be a finalist. Blackhat finalists dont have to RSA2025 Link to visual

Read more

2025-04-24

More than 560,000 people were impacted across four healthcare data breaches involving Hillcrest Convalescent Center, Gastroenterology Associates of Central Florida, Community Care Alliance, and Sunflower Medical Group.

Read more

US cities warn of wave of unpaid parking phishing texts I got one of these!

Read more

Google Pays Out Nearly $12M in 2024 Bug Bounty Program Lets to bug hunting!

Read more

Undocumented commands found in Bluetooth chip used by a billion devices Hardware Hacking

Read more

Ethereum private key stealer on PyPI downloaded over 1,000 times Supply chain attack!

Read more

Malicious Code Hits ‘tj-actions/changed-files’ in 23,000 GitHub Repos

Read more

Tomcat Vulnerability and a analysis by Wallarm Labs

Read more

Attack on Car dealerships

Read more

Juniper Routers by China Nexus

Read more

Fake Captcha

Read more

Supply chain attacks by Lazarus to steal crypto

Read more

US Treasury got hidden messages in Emojis

Read more

Major leak: sperm bank California Cryobank suffers data breach

Read more

Use one Virtual Machine to own them all — active exploitation of ESXicape

Read more

New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents

Read more

The Great CNAPP Re-bundle

Read more

New npm attack poisons local packages with backdoors

Read more

New Atlantis AIO platform automates credential stuffing on 140 services

Read more

macOS Users Warned of New Versions of ReaderUpdate Malware

Read more

Scaling Threat Modeling with AI: Generating 1000 Threat Models Using Gemini 2.0 and AI Security Analyzer

Read more

Security on the path to AGI

Read more

DarkwebDaily.live

Read more

Digital Safety - How to protect your online identity

Read more

A Free OSINT Lesson: Search Indexes, Record Shops, and Flipping through Vinyl

Read more

Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

Read more

Over 3 million applicants’ data leaked on NYU’s website

Read more

BountySecurity/BountyPrompt: Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI

Read more

DryRun Security vs. Traditional SAST Vendors in Ruby on Rails

Read more

Securing AI agents: authentication patterns for Operator and computer using models — WorkOS

Read more

Oracle Health breach compromises patient data at US hospitals

Read more

CVE-2025-1974: The IngressNightmare in Kubernetes | Wiz Blog

Read more

CVE-2025-29927

Read more

iOS Dating App compromise

Read more

Pillage registry

Read more

TMBench

Read more

CVE-2024-27564 Actively Exploited in the Wild OpenAI vulnerability (SSRF) exploited for Healthcare hacking, this video shows the exploit in action.

Read more

Hackers abuse WordPress MU-Plugins to hide malicious code Wordpress plugins - rabbit hole.

Read more

Microsoft Opensources Red Teaming Agent

Read more

AI Agents for Detection EngineeringOriginal post 06.Q2 CIS-60

Read more

TracecatHQ/tracecat

Read more

MCP and Security Operations

Read more

Becoming a Detection Engineering Contractor Part II: The Preparation

Read more

SOC AI Agents

Read more

The Return of the Baby ASO: Why SOCs Still Suck

Read more

Must read books in tech and IT book-summarizer

Read more

Texas State Bar Breach👩‍⚖️, Outlaw Linux Malware 🐧, Scattered Spider Members Pleads Guilty 🕷️ TLDR Expand

Read more

Security Weekly

Read more

Google Announces Sec Gemini v1 #ai-news

Read more

Slow Collapse of Critical Thinking in OSINT due to AI #ai-news

Read more

Underage Deepfakes Exposed 👶, Finding Evil in Memory 😈, AI Finds GRUB2 Flaws 🤖

Read more

Oracle Second Hack 👁️‍🗨️, Taming ML Wild West 🤠, ChatGPT Creates Fake Passport 🛂

Read more

Autonomous SOC Analyst Product

Read more

Story of signal from Increment @ Stripe CTI

Read more

Ghidra MCP #ai-news

Read more

Program: Cybersecurity Intelligence and Information Security, M.S. - University of South Florida - Modern Campus Catalog™ 06.Q2 CIS-60

Read more

Internship Opportunities 06.Q2 CIS-60

Read more

Tailscale raises $160M.

Read more

francisconeves97/jxscout: jxscout superpowers JavaScript analysis for security researchers #tools

Read more

1.6 Million People Impacted by Data Breach at Laboratory Services Cooperative

Read more

Defeating Prompt Injections by Design

Read more

2025-03-07

Flightradar24 experiences ongoing DDoS cyberattack.

Read more

New 'polyglot' malware targets aviation and satellite communication firms.

Read more

Apartment buildings are been broken into within minutes using IoT-connected intercoms with default credentials, leaving them vulnerable to anyone with Google.

Read more

2025-02-28

ByBit (1.5 Billion Hack) linked to North Korea.

Read more

Skybox Security shuts down and lays off entire workforce.

Read more

Black Basta ransomware group's internal chats leaked.

Read more

LLM dataset found to contain over 12,000 API keys and passwords.

Read more

New 'Pass-the-cookie' exploit bypasses multi-factor authentication.

Read more

ChatGPT vulnerable to operator prompt injection.

Read more

LLM injection attacks highlighted by 'Indiana Jones jailbreak' approach.

Read more

Russian threat groups targeting Ukraine's Signal communications.

Read more

Apple and UK government clash over end-to-end encryption.

Read more

2025-02-20

Russia's Sandworm conducting 'BadPilot campaign' targeting US and European organizations in energy and telecommunications sectors, exploiting vulnerabilities to maintain access and support military objectives

Read more

Trump Hotels guest information leaked on hacker forum by threat actor 'FutureSeeker', known for similar data dumps

Read more

Vulnerability (CVE-2025-0994) in Trimble Cityworks tool used by local governments discovered, potentially allowing RCE against customer IIS servers

Read more

Researchers detail $50K software supply chain hack involving exposed NPM_TOKEN in Docker image build layers

Read more

Research highlights ongoing security concerns with PDF features and potential attack vectors

Read more

JPMorgan Chase announces plans to block Zelle payments to social media contacts to combat rising online payment fraud

Read more

Elon Musk's Dogecoin website discovered to be vulnerable to defacement due to unrestricted editing capabilities

Read more

Pig Butchering cryptocurrency scams show 40% year-over-year revenue growth with increased sophistication

Read more

Security researchers identify malicious machine learning models uploaded to Hugging Face platform

Read more

Russian state-sponsored threat actor reportedly shifting focus to targeting US and UK assets

Read more

Slop and Flop attacks emerge as a new security threat, though details on their execution and impact remain scarce.

Read more

Cryptocurrency and blockchain hacker report highlights that bug bounties in the sector outpay other industries. Around 10% of vulnerabilities stem from business logic flaws, compared to 2% in other sectors. Crypto.com runs $2 million in bug bounties.

Read more

Apple patches a zero-day vulnerability related to USB Restricted Mode, which was actively exploited in highly sophisticated attacks.

Read more

Ken Huang releases Maestro, a seven-layer threat modeling tool for Agentic AI, designed for continuous security assessment.

Read more

A WatchTowr researcher discovered over 150 abandoned sensitive S3 buckets from software companies, governments, and infrastructure pipelines, exposing critical data.

Read more

Over 12,000 KerioControl firewalls remain vulnerable to an RCE flaw despite GFI Software's security update on December 19, 2024. According to Censys, over 23,800 instances are still at risk.

Read more

Toll booth scammers continue to exploit users through fraudulent SMS messages, tricking victims into making false payments.

Read more

A massive brute-force attack, utilizing 2.8 million IPs—mostly from Brazil—targets VPN devices, highlighting ongoing security risks.

Read more

2025-02-13

More than 560,000 people were impacted across four healthcare data breaches involving Hillcrest Convalescent Center, Gastroenterology Associates of Central Florida, Community Care Alliance, and Sunflower Medical Group.

Read more

US cities warn of a surge in phishing scams involving fake unpaid parking tickets. Attackers are sending fraudulent SMS messages to steal payment details.

Read more

Google paid nearly $12 million in bug bounties during 2024, highlighting the importance of vulnerability research and responsible disclosure.

Read more

Undocumented commands were discovered in a widely used Bluetooth chip, potentially impacting over a billion devices and raising concerns about hardware security vulnerabilities.

Read more

A malicious Ethereum private key stealer was found in a PyPI package, downloaded over 1,000 times, demonstrating ongoing supply chain attacks in open-source ecosystems.

Read more

2025-02-07

Hackers are spoofing Microsoft ADFS login pages in a phishing campaign targeting education, healthcare, and government organizations to steal credentials.

Read more

A vulnerability in Cisco Webex Chat allowed unauthorized access to chat histories across multiple organizations, raising concerns over data security.

Read more

AI red teaming research compares jailbreak results of various LLMs, including DeepSeek, Qwen, O1, O3, Claude, and Kimi, highlighting security weaknesses.

Read more

Multiple security flaws found in the DeepSeek iOS app, including sending unencrypted data, exposing users to potential privacy risks.

Read more

CIA mistakenly sent an unclassified email containing names of some employees to the Trump administration, raising security concerns.

Read more

An IT trainer and YouTuber claims DeepSeek is misleading users, exposing alleged discrepancies in its AI operations.

Read more

Zero-day vulnerabilities in Microsoft Sysinternals allow attackers to execute DLL injection on Windows, posing a significant security threat.

Read more

WhatsApp accuses surveillance firm Paragon of hacking, escalating concerns over the misuse of spyware in global surveillance.

Read more

OverTheWire's Bandit wargame is a highly recommended gamified tool for improving Linux command-line skills.

Read more

2024-12-31

Claude uses AI to identify new security threats by leveraging advanced natural language processing to analyze patterns and anomalies in real-time, providing proactive threat detection.

Read more

Chinese APT exploited a BeyondTrust API key to gain unauthorized access to U.S. Treasury systems, extracting sensitive documents in a significant cybersecurity breach.

Read more

New HIPAA rules mandate healthcare providers to restore critical data within 72 hours and conduct annual compliance audits to enhance patient data protection.

Read more

North Korean threat actors deployed OtterCookie malware in the Contagious Interview campaign. This JavaScript malware uses Socket.IO to communicate with a C2 server, enabling shell commands for data theft, including files, clipboard data, and cryptocurrency wallet keys.

Read more

2024-12-11

Russia has pioneered a new model of drug trafficking using darknet markets and cryptocurrency for payment, with physical 'dead drops' for delivery. Russian platforms like Kraken and Mega now dominate 93% of global darknet markets, generating $1.5 billion in revenue in 2023.

Read more

Attackers are distributing corrupted Word documents that bypass security scans, only to show QR codes leading to credential theft sites after user or automated recovery processes assemble the malware.

Read more

UPenn researchers demonstrated how language model-powered robots could be manipulated into dangerous behaviors using automated jailbreak prompts, such as planning explosions and driving off bridges.

Read more

President Yoon Suk Yeol of South Korea has declared emergency martial law, citing opposition-controlled parliament and alleged North Korean sympathies.

Read more

Attackers compromised a GitHub account to publish backdoored versions of Solana's Web3.js library, which could steal private keys from decentralized apps.

Read more

Threat actors are abusing Cloudflare's pages.dev and workers.dev domains for phishing campaigns, leveraging their trusted reputation and built-in SSL.

Read more

iVerify's new spyware detection tool uncovered Pegasus infections in 7 out of 2,500 customer device scans, targeting not just activists but also business leaders and government officials.

Read more

The FBI reports criminals are increasingly using AI to enhance scams, creating realistic text, images, and videos for romance, investment, and job fraud.

Read more

Russian agents planted spyware on a programmer's Android phone during a forced detention in Moscow, using a trojanized version of Cube Call Recorder with surveillance capabilities.

Read more

OpenAI is collaborating with Anduril to develop AI-powered anti-drone systems for the U.S. military, building on Anduril's recent defense contract win.

Read more

US Special Forces have ordered 10 NERVA-LG robotic systems for tactical missions, marking their first major investment in unmanned ground vehicles.

Read more

Apple secured a patent for a system capable of identifying individuals without visible facial features, using data such as walking style and clothing.

Read more

Russia's Gamaredon hacking group is using Cloudflare Tunnels to conceal infrastructure while deploying GammaDrop malware against Ukrainian targets.

Read more

SailPoint found a critical directory traversal vulnerability (CVE-2024-10905) in their IdentityIQ platform that scores 10/10 CVSS and allows unauthorized file access.

Read more

Matt Johansen has launched Vulnerable Media, a technical marketing agency specializing in cybersecurity content and campaigns, after taking Vulnerable U full-time.

Read more

Cybersecurity journalist Brian Krebs continues investigating cybercrime despite years of threats and harassment, including swatting attempts and malicious mail.

Read more

Russian courts sentenced 15 members of the Hydra dark web marketplace, including a life sentence for its creator, after the site facilitated $5 billion in cryptocurrency transactions.

Read more

2024-12-07

China has deeply compromised thousands of US telco networks according to Senator Mark Warner. The attack, carried out by "Salt Typhoon," involves persistent access requiring device replacements and may include wiretapping capabilities.

Read more

Volexity uncovered Russian APT28 hackers targeting neighboring organizations to exploit WiFi networks. Using password spraying and lateral movement, the group bypassed MFA-less systems to infiltrate high-value targets.

Read more

Apple issued urgent patches for iOS, iPadOS, macOS, visionOS, and Safari to fix two zero-day vulnerabilities, CVE-2024-44308 and CVE-2024-44309, addressing potential code execution and XSS risks.

Read more

The Danish Navy detained the Chinese bulk carrier Yi Peng 3 for allegedly damaging undersea telecom cables in the Baltic Sea, affecting connections between Finland, Germany, Sweden, and Lithuania.

Read more

Crowdstrike reported that China-linked group Liminal Panda has targeted telecom networks in South Asia and Africa since 2020, exploiting protocols like SIGTRAN and GSM for intelligence collection.

Read more

Crum & Forster launched a new liability insurance policy for CISOs, covering consulting work and even pro bono IT security activities, protecting against personal liability.

Read more

Google blocked over 1,000 pro-China propaganda websites operated by "Glassbridge," a network of four Chinese firms masquerading as legitimate news outlets.

Read more

Researchers uncovered Russia scaling up disinformation campaigns using AI-generated Western personas. Techniques include fake profile pictures and coordinated posts to disseminate anti-Ukraine narratives more effectively.

Read more

2024-11-19

Palo Alto Networks has released Indicators of Compromise (IoCs) for a new zero-day vulnerability affecting their firewalls.

Read more

VMware confirmed that threat actors are exploiting two vCenter Server vulnerabilities, CVE-2024-38812 and CVE-2024-38813, which were first disclosed at the 2024 Matrix Cup hacking competition.

Read more

Cybersecurity researchers have disclosed a high-severity security flaw in the PostgreSQL open-source database system. Tracked as CVE-2024-10979 with a CVSS score of 8.8, the flaw could allow unprivileged users to alter environment variables, potentially leading to code execution or information disclosure.

Read more

2024-11-12

Six critical flaws have been found in the Ollama AI framework, potentially allowing denial-of-service, model theft, and poisoning attacks.

Read more

The FBI is warning about a rise in hacked police emails being used to send fake subpoenas and emergency data requests (EDRs) to U.S. tech companies. Attackers target low-security organizations with high trust, compromising them to gain access to data, permissions, and restricted authorization.

Read more

Google's AI security assessment tool, Big Sleep, found a zero-day vulnerability in the SQLite database engine, marking the first instance where AI uncovered a flaw missed by traditional testing.

Read more

The FBI is asking the public for help in identifying Chinese hackers in groups like APT31 and APT41.

Read more

CrowdStrike has launched new AI Red Team Services to identify vulnerabilities in AI systems and provide guidance on how to fix them.

Read more

Synology is telling users to patch a critical zero-click RCE bug, CVE-2024-10443, affecting millions of DiskStation and BeePhotos NAS devices. Synology advises caution about exposing NAS devices to the internet.

Read more

Nokia is investigating a potential breach after a hacker, IntelBroker, claimed to have stolen their source code from a third-party vendor. The data includes SSH keys, source code, and RSA keys, accessed via default credentials on a SonarQube server.

Read more

Canada has ordered TikTok Technology Canada to shut down, citing national security risks. This decision closes the company’s Canadian operations but does not restrict Canadians from using TikTok.

Read more

Researchers from George Mason University have introduced Mantis, a framework using prompt injections to counterattack against prompt injection attacks, potentially misdirecting or compromising attackers' systems.

Read more

The U.S. is tightening rules on foreign real estate deals near military bases, adding 60 installations to the CFIUS scrutiny list. This follows the forced closure of a Chinese-owned crypto mine near F.E. Warren Air Force Base.

Read more

2024-11-04

An investigation by French newspaper Le Monde revealed that bodyguards of leaders such as Joe Biden and Donald Trump have used the Strava fitness app, inadvertently disclosing sensitive locations. For instance, the app revealed a San Francisco hotel where President Biden met with Chinese President Xi Jinping.

Read more

Password manager LastPass has alerted users to scammers promoting a fraudulent support number, 805-206-2892, through 5-star reviews on its Chrome extension. Calling this number directs users to download a remote support program that is actually malware.

Read more

Researchers have successfully created voice-based financial scams, like unauthorized bank transfers and credential theft, using the new real-time API in ChatGPT-4o. The scams showed success rates ranging from 20-60%.

Read more

Cisco Talos discovered five out-of-bounds vulnerabilities in NVIDIA's shader processing technology and eleven separate issues affecting LevelOne routers.

Read more

Okta has patched a critical issue allowing logins without a password if a username exceeded 52 characters. How this passed through extensive testing remains baffling.

Read more

The US has charged Russian national Maxim Rudometov for creating the RedLine infostealer, following access to the malware's source code and infrastructure.

Read more

The U.S. military has confirmed its first purchase of OpenAI products for AFRICOM, signifying a step towards integrating AI into national security operations.

Read more

Bellingcat identified the location where Hamas leader Yahya Sinwar was killed in southern Gaza's Tal as-Sutlan area, using IDF footage and distinct visual markers such as a gazebo and residential tower.

Read more