π VanHelsingRaaS Expands Rapidly in Cybercrime Market π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
VanHelsingRaaS, a new ransomwareasaservice program, infected three victims within two weeks of release, demanding ransoms of 500,000.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
VanHelsingRaaS Expands Rapidly in Cybercrime Market
VanHelsingRaaS, a new ransomware-as-a-service program, infected three victims within two weeks of release, demanding ransoms of $500,000
π Ukraine Railway Systems Hit by Targeted Cyber-Attack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Ukraines national railway company has suffered a largescale cyberattack, disrupting online services and operations.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ukraine Railway Systems Hit by Targeted Cyber-Attack
Ukraineβs national railway company has suffered a βlarge-scaleβ cyber-attack, disrupting online services and operations
π Authorities Seize 1842 Devices in Africaβs Cybercrime Crackdown π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Authorities in seven African countries have arrested 306 suspects and seized 1842 devices in Operation Red Card.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Authorities Seize 1842 Devices in Africaβs Cybercrime Crackdown
Authorities in seven African countries have arrested 306 suspects and seized 1842 devices in Operation Red Card
π1
ποΈ INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Law enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation codenamed Red Card that took place between November 2024 and February 2025. The coordinated effort "aims to disrupt and dismantle crossborder criminal networks which cause significant harm to individuals and businesses," INTERPOL said, adding it.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
π¦
Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras. " dataimagecaption"Cyble Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras " datamediumfile"httpscyble.comwpcontentuploads202503CybleBlogsIvanti300x150.png" datalargefile"httpscyble.comwpcontentuploads202503CybleBlogsIvanti1024x512.png" title"Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras 1" Overview Vulnerabilities in Ivanti products, AVTECH IP cameras, and WordPress plugins have recently been among the dozens of attempted exploits detected by Cyble honeypot sensors. The attack attempts were detailed in the threat intelligence companys weekly sensor intelligence reports to clients. The Cyble reports have also examined persistent attacks against Linux systems and net...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Cyble Detects Exploit Attempts On Ivanti & AVTECH Cams
Ivanti and AVTECH products and WordPress plugins have been among dozens of attack targets detected by Cyble honeypots.
π’ Millions of 23andMe usersβ genetic data could be up for grabs β and experts worry itβs a looming privacy nightmare π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
DNA testing company 23andMe has filed for bankruptcy protection, raising questions about the future of the company and the personal data it holds.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Millions of 23andMe usersβ genetic data could be up for grabs β and experts worry itβs a looming privacy nightmare
The company holds the genetic data of around 15 million people, and security experts have raised serious concerns
π1
π’ Fake file converter tools are on the rise β hereβs what you need to know π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The FBI has issued an alert over the rise of fake file converter tools available online after observing a spate of scams and ransomware attacks.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Fake file converter tools are on the rise β hereβs what you need to know
Criminals are offering tools for free that do more than they claim, leading to malware or identity theft
π’ Oracle breach claims spark war of words with security researchers π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
A war of words has erupted between Oracle and cybersecurity researchers following claims the company suffered a security breach.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Oracle breach claims spark war of words with security researchers
The tech giant denied claims it had been breached β researchers have hit back
π΅οΈββοΈ OPSEC Nightmare: Leaking US Military Plans to a Reporter π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Experts say the leakage of US military plans to a reporter this month reflects a severe operational security failure on the part of US leadership.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
OPSEC Nightmare: Leaking US Military Plans to a Reporter
Experts say the leakage of US military plans to a reporter this month reflects a severe operational security failure on the part of US leadership.
π΅οΈββοΈ South African Poultry Company Reports $1M Loss After Cyber Intrusion π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The company reports that no sensitive information was breached or stolen in the cyber intrusion and that its operations are running normally again.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Poultry Company Reports $1M Loss After Cyberattack
The company reports that no sensitive information was breached or stolen in the cyber intrusion and that its operations are running normally again.
π΅οΈββοΈ Accused Snowflake Attacker 'Judische' Agrees to US Extradition π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Though there is no confirmation as to when this extradition will occur, Alexander Moucka agreed to be transferred in writing before a judge.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Accused Snowflake Attacker 'Judische' Agrees to US Extradition
Though there is no confirmation as to when this extradition will occur, Moucka agreed to be transferred in writing before a judge.
π΅οΈββοΈ 5 Considerations for a Data Loss Prevention Rollout π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Strong DLP can be a gamechanger but it can also become a slowmoving, overcomplicated mess if not executed properly.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
5 Considerations for a Data Loss Prevention Rollout
Strong DLP can be a game-changer β but it can also become a slow-moving, overcomplicated mess if not executed properly.
π΅οΈββοΈ Meet the Low-Key Access Broker Supercharging Russian State Cybercrime π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Raspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout Europe.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Meet the Access Broker Supercharging Russian Cybercrime
Raspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout Europe.
π΅οΈββοΈ 23andMe Bankruptcy Filing May Put Sensitive Data at Risk π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Security experts worry the company's Chapter 11 status and aim to sell its assets could allow threat actors to exploit and misuse the genetic information it collected.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
23andMe Bankruptcy Filing May Put Sensitive Data at Risk
The company's Chapter 11 status and plans to sell its assets could allow threat actors to exploit and misuse the genetic information it collected.
π¦Ώ After Detecting 30B Phishing Attempts, Microsoft Adds Even More AI to Its Security Copilot π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Microsoft is partnering with top firms to launch new AI security tools, boosting breach analysis, threat detection, and AI model protection across cloud platforms.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
After Detecting 30B Phishing Attempts, Microsoft Adds Even More AI to Its Security Copilot
Microsoft is partnering with top firms to launch new AI security tools, boosting breach analysis, threat detection, and AI model protection across cloud platforms.
π1
π¦Ώ Europol Warns Criminal Networks Are Embracing AI, Making Fraud Smarter and Harder to Detect π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
The same qualities that make AI revolutionary accessibility, adaptability and sophistication also make it a powerful tool for criminal networks, Europol says.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Europol Warns Criminal Networks Are Embracing AI, Making Fraud Smarter and Harder to Detect
βThe same qualities that make AI revolutionary β accessibility, adaptability and sophistication β also make it a powerful tool for criminal networks,β Europol says.
π1
ποΈ Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Google has released outofband fixes to address a highseverity security flaw in its Chrome browser for Windows that it said has been exploited in the wild as part of attacks targeting organizations in Russia. The vulnerability, tracked as CVE20252783, has been described as a case of "incorrect handle provided in unspecified circumstances in Mojo on Windows." Mojo refers to a.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ New Security Flaws Found in VMware Tools and CrushFTP β High Risk, No Workaround ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Broadcom has issued security patches to address a highseverity security flaw in VMware Tools for Windows that could lead to an authentication bypass. Tracked as CVE202522230, the vulnerability is rated 7.8 on the tenpoint Common Vulnerability Scoring System CVSS. "VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control," Broadcom said in an.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A new investigation has unearthed nearly 200 unique commandandcontrol C2 domains associated with a malware called Raspberry Robin. "Raspberry Robin also known as Roshtyak or Storm0856 is a complex and evolving threat actor that provides initial access broker IAB services to numerous criminal groups, many of which have connections to Russia," Silent Push said in a report shared with The.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A major telecommunications company located in Asia was allegedly breached by Chinese statesponsored hackers who spent over four years inside its systems, according to a new report from incident response firm Sygnia. The cybersecurity company is tracking the activity under the name Weaver Ant, describing the threat actor as stealthy and highly persistent. The name of the telecom provider was not.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Organizations now use an average of 112 SaaS applicationsa number that keeps growing. In a 2024 study, 49 of 644 respondents who frequently used Microsoft 365 believed that they had less than 10 apps connected to the platform, despite the fact that aggregated data indicated over 1,000 Microsoft 365 SaaStoSaaS connections on average per deployment. And thats just one major SaaS provider.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity