π΅οΈββοΈ Iran's MOIS-Linked APT34 Spies on Allies Iraq & Yemen π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The Islamic Republic is keeping its enemies close and its friends closer, with espionage attacks aimed at nearby neighbors.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Iran's MOIS-Linked APT34 Spies on Allies Iraq & Yemen
The Islamic Republic is keeping its enemies close and its friends closer, with espionage attacks aimed at nearby neighbors.
π΅οΈββοΈ Hoff's Rule: People First π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading Confidential Episode 5 Christofer Hoff, chief secure technology officer at LastPass, shares the human side of the story of how he led his team through a major cyber incident and built from the ground up a security team and security culture.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Dark Reading Confidential: Hoff's Rule: People First
Dark Reading Confidential Episode 5: Christofer Hoff, chief secure technology officer at LastPass, shares the human side of the story of how he led his team through a major cyber incident and built from the ground up a security team and security culture.
π΅οΈββοΈ How CISA Cuts Impact Election Security π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
State and federal security experts weighed in on the impact that budgetary and personnel cuts to CISA will have on election security as a whole.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
How CISA Cuts Impact Election Security
State and federal security experts weighed in on the impact that budgetary and personnel cuts to CISA will have on election security as a whole.
π΅οΈββοΈ OpenAI Bumps Up Bug Bounty Reward to $100K in Security Update π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The artificial intelligence research company previously had its maximum payout set at 20,000 before exponentially raising the reward.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
OpenAI Bumps Up Bug Bounty Reward to $100K
The artificial intelligence research company previously had its maximum payout set at $20,000 before exponentially raising the reward.
π΅οΈββοΈ DoJ Recovers $5M Lost in BEC Fraud Against Workers' Union π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The union received a spoofed email that led to the loss of 6.4 million, much of it transferred to other accounts or to a cryptocurrency exchange.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
DoJ Recovers $5M Lost in BEC Fraud Against Workers' Union
The workers' union received a spoofed email that led to the loss of $6.4 million, much of it transferred to other accounts or to a cryptocurrency exchange.
π΅οΈββοΈ Fake DeepSeek Ads Spread Malware to Google Users π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Popularity of the generative AI platform makes it an obvious choice for cybercriminals abusing Googlesponsored search results, according to researchers.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Fake DeepSeek Ads Spread Malware to Google Users
Popularity of the generative AI (GenAI) platform makes it an obvious choice for cybercriminals abusing Google sponsored search results, researchers say.
π΅οΈββοΈ High-Severity Cloud Security Alerts Tripled in 2024 π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Attackers aren't just spending more time targeting the cloud they're ruthlessly stealing more sensitive data and accessing more critical systems than ever before.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
High-Severity Cloud Security Alerts Tripled in 2024
Attackers aren't just spending more time targeting the cloud β they're ruthlessly stealing more sensitive data and accessing more critical systems than ever before.
π¦Ώ Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Microsofts .NET MAUI lets developers build crossplatform apps in C, but its use of binary blob files poses new risks by bypassing Androids DEXbased security checks.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection
Microsoftβs .NET MAUI lets developers build cross-platform apps in C#, but its use of binary blob files poses new risks by bypassing Androidβs DEX-based security checks.
π¦Ώ Which Top Cybersecurity Role of 2024 Was Featured in 64,000+ Job Postings? π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
IT and security workforce management firm CyberSN surveyed job listings from 2022 to 2024. Yes, decreases in demand for some job titles may be related to AI.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Which Top Cybersecurity Role of 2024 Was Featured in 64,000+ Job Postings?
IT and security workforce management firm CyberSN surveyed job listings from 2022 to 2024. Yes, decreases in demand for some job titles may be related to AI.
βοΈ When Getting Phished Puts You in Mortal Danger βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Many successful phishing attacks result in a financial loss or malware infection. But falling for some phishing scams, like those currently targeting Russians searching online for organizations that are fighting the Kremlin war machine, can cost you your freedom or your life.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
When Getting Phished Puts You in Mortal Danger
Many successful phishing attacks result in a financial loss or malware infection. But falling for some phishing scams, like those currently targeting Russians searching online for organizations that are fighting the Kremlin war machine, can cost you yourβ¦
ποΈ PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign likely aimed at users in Taiwan under the guise of chat apps. "PJobRAT can steal SMS messages, phone contacts, device and app information, documents, and media files from infected Android devices," Sophos security researcher Pankaj Kohli said in a Thursday analysis. PJobRAT, first.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked to siphon sensitive information such as environment variables from compromised systems. "Some of these packages have lived on npmjs.com for over 9 years, and provide legitimate functionality to blockchain developers," Sonatype researcher Ax Sharma said. "However, ... the latest.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Mozilla Patches Critical Firefox Bug Similar to Chromeβs Recent Zero-Day Vulnerability ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely days after Google patched a similar flaw in Chrome that came under active exploitation as a zeroday. The security vulnerability, CVE20252857, has been described as a case of an incorrect handle that could lead to a sandbox escape. "Following the recent Chrome sandbox escape .π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victimsβ DNS Email Records ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have shed light on a new phishingasaservice PhaaS platform that leverages the Domain Name System DNS mail exchange MX records to serve fake login pages that impersonate about 114 brands. DNS intelligence firm Infoblox is tracking the actor behind the PhaaS, the phishing kit, and the related activity under the moniker Morphing Meerkat. "The threat actor behind.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Hackers Repurpose RansomHub's EDRKillShifter in Medusa, BianLian, and Play Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A new analysis has uncovered connections between affiliates of RansomHub and other ransomware groups like Medusa, BianLian, and Play. The connection stems from the use of a custom tool that's designed to disable endpoint detection and response EDR software on compromised hosts, according to ESET. The EDR killing tool, dubbed EDRKillShifter, was first documented as used by RansomHub actors in.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
An advanced persistent threat APT group with ties to Pakistan has been attributed to the creation of a fake website masquerading as India's public sector postal system as part of a campaign designed to infect both Windows and Android users in the country. Cybersecurity company CYFIRMA has attributed the campaign with medium confidence to a threat actor called APT36, which is also known as.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ New Report Explains Why CASB Solutions Fail to Address Shadow SaaS and How to Fix It ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Whether its CRMs, project management tools, payment processors, or lead management tools your workforce is using SaaS applications by the pound. Organizations often rely on traditional CASB solutions for protecting against malicious access and data exfiltration, but these fall short for protecting against shadow SaaS, data damage, and more. A new report, Understanding SaaS Security Risks Why.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Top 3 MS Office Exploits Hackers Use in 2025 β Stay Alert! ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Hackers have long used Word and Excel documents as delivery vehicles for malware, and in 2025, these tricks are far from outdated. From phishing schemes to zeroclick exploits, malicious Office files are still one of the easiest ways into a victims system. Here are the top three Microsoft Officebased exploits still making the rounds this year and what you need to know to avoid them. 1.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ 150,000 Sites Compromised by JavaScript Injection Promoting Chinese Gambling Platforms ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
An ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects to promote Chineselanguage gambling platforms has ballooned to compromise approximately 150,000 sites to date. "The threat actor has slightly revamped their interface but is still relying on an iframe injection to display a fullscreen overlay in the visitor's browser," cside security analyst Himanshu.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. Cybersecurity and Infrastructure Security Agency CISA has added two sixyearold security flaws impacting Sitecore CMS and Experience Platform XP to its Known Exploited Vulnerabilities KEV catalog, based on evidence of active exploitation. The vulnerabilities are listed below CVE20199874 CVSS score 9.8 A deserialization vulnerability in the Sitecore.Security.AntiCSRF.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systems ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A critical security flaw has been disclosed in NetApp SnapCenter that, if successfully exploited, could allow privilege escalation. SnapCenter is an enterprisefocused software that's used to manage data protection across applications, databases, virtual machines, and file systems, offering the ability to backup, restore, and clone data resources. The vulnerability, tracked as.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity