π΅οΈββοΈ Indian Car-Sharing Firm Zoomcar Latest to Suffer Breach π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The company acknowledged that cybercriminals had taken sensitive information on more than 8 million users, including names, phone numbers, car registration numbers, addresses, and emails.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Indian Car-Sharing Firm Zoomcar Latest to Suffer Breach
The company acknowledged that cybercriminals had taken sensitive information on more than 8 million users, including names, phone numbers, car registration numbers, addresses, and emails.
ποΈ Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Veeam has rolled out patches to contain a critical security flaw impacting its Backup Replication software that could result in remote code execution under certain conditions. The security defect, tracked as CVE202523121, carries a CVSS score of 9.9 out of a maximum of 10.0. "A vulnerability allowing remote code execution RCE on the Backup Server by an authenticated domain user," the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Iran has throttled internet access in the country in a purported attempt to hamper Israel's ability to conduct covert cyber operations, days after the latter launched an unprecedented attack on the country, escalating geopolitical tensions in the region. Fatemeh Mohajerani, the spokesperson of the Iranian Government, and the Iranian Cyber Police, FATA, said the internet slowdown was designed to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. Cybersecurity and Infrastructure Security Agency CISA on Tuesday placed a security flaw impacting the Linux kernel in its Known Exploited Vulnerabilities KEV catalog, stating it has been actively exploited in the wild. The vulnerability, CVE20230386 CVSS score 7.8, is an improper ownership bug in the Linux kernel that could be exploited to escalate privileges on susceptible.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A former U.S. Central Intelligence Agency CIA analyst has been sentenced to little more than three years in prison for unlawfully retaining and transmitting top secret National Defense Information NDI to people who were not entitled to receive them and for attempting to cover up the malicious activity. Asif William Rahman, 34, of Vienna, has been sentenced today to 37 months on charges of.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ Government cybersecurity action plan includes Β£16 million in funding π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Cash will go to help startups, scaleups, and university spinouts, while a new advisory group will aim to improve public sector cybersecurity.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Government cybersecurity action plan includes Β£16 million in funding
Cash will go to help startups, scale-ups, and university spinouts, while a new advisory group will aim to improve public sector cybersecurity
π΅οΈββοΈ How CISOs Can Govern AI & Meet Evolving Regulations π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Security teams are no longer just the last line of defense they are the foundation for responsible AI adoption.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
How CISOs Can Govern AI & Meet Evolving Regulations
Security teams are no longer just the last line of defense β they are the foundation for responsible AI adoption.
π€1
π΅οΈββοΈ Serpentine#Cloud Uses Cloudflare Tunnels in Sneak Attacks π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
An unidentified threat actor is using .lnk Windows shortcut files in a series of sophisticated attacks utilizing inmemory code execution and livingofftheland cyberattack strategies.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Serpentine#Cloud Malware Uses Cloudflare in Sneak Attacks
An unidentified threat actor is using .lnk Windows shortcut files in a series of sophisticated attacks utilizing in-memory code execution and living-off-the-land cyberattack strategies.
ποΈ FedRAMP at Startup Speed: Lessons Learned ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
For organizations eyeing the federal market, FedRAMP can feel like a gated fortress. With strict compliance requirements and a notoriously long runway, many companies assume the path to authorization is reserved for the wellresourced enterprise. But thats changing. In this post, we break down how fastmoving startups can realistically achieve FedRAMP Moderate authorization without derailing.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have exposed a previously unknown threat actor known as Water Curse that relies on weaponized GitHub repositories to deliver multistage malware. "The malware enables data exfiltration including credentials, browser data, and session tokens, remote access, and longterm persistence on infected systems," Trend Micro researchers Jovit Samaniego, Aira Marcelo, Mohamed.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π AI Now Generates Majority of Spam and Malicious Emails π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Barracuda observed a big spike in spam emails generated using AI tools, making up the majority detected in April 2025.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π GodFather Malware Upgraded to Hijack Legitimate Mobile Apps π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Upgraded GodFather banking malware now uses ondevice virtualization to hijack apps, enabling realtime fraud.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π ClickFix Helps Infostealers Use MHSTA for Defense Evasion π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
ClickFix techniques are enabling threat actors to bypass defenses using tools like MSHTA, says ReliaQuest.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π UK Government Publishes Plan to Boost Cyber Sector Growth π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The new Cyber Growth Action Plan aims to support the UKs cyber industry, including the development of innovative new technologies and startups.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Ransomware Group Qilin Offers Legal Counsel to Affiliates π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The group positions itself not just as a ransomware group, but as a fullservice cybercrime platform, according to Cybereason.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Paddle Pays $5m to Settle Tech Support Scam Allegations π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Payment processor Paddle has agreed to settle with the FTC over allegations related to tech support scams.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π¦
CERT-In Vulnerability Note Highlights Critical Security Risks in Ivanti, Trend Micro, Apache Kafka, and SAP Products π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble CERTIn Vulnerability Note Highlights Critical Security Risks in Ivanti, Trend Micro, Apache Kafka, and SAP Products " dataimagecaption"Cyble CERTIn Vulnerability Note Highlights Critical Security Risks in Ivanti, Trend Micro, Apache Kafka, and SAP Products " datamediumfile"httpscyble.comwpcontentuploads202506CybleBlogsCERTINVulnerability300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202506CybleBlogsCERTINVulnerability1024x512.jpg" title"CERTIn Vulnerability Note Highlights Critical Security Risks in Ivanti, Trend Micro, Apache Kafka, and SAP Products 1" The Indian Computer Emergency Response Team CERTIn has issued a series of highand criticalseverity alerts through its CERTIn Vulnerability Note platform, warning enterprises and individuals about newly discovered securit...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
CERT-In Vulnerability Note: Critical Flaws In Top Software
CERT-In Vulnerability Note warns of high-risk flaws in Ivanti Workspace Control, exposing sensitive credentials and urging urgent patching to prevent breaches.
ποΈ 1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A new multistage malware campaign is targeting Minecraft users with a Javabased malware that employs a distributionasservice DaaS offering called Stargazers Ghost Network. "The campaigns resulted in a multistage attack chain targeting Minecraft users specifically," Check Point researchers Jaromr Hoej and Antonis Terefos said in a report shared with The Hacker News. "The malware was.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
β€2
π Critical Linux Flaws Discovered Allowing Root Access Exploits π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Two critical Linux flaws allow unprivileged users to gain root access, affecting major distributions.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π B2B Growth Marketing Manager π
π Read more.
π Via "UnderDefense"
----------
ποΈ Seen on @cibsecurity
The post B2B Growth Marketing Manager appeared first on UnderDefense.π Read more.
π Via "UnderDefense"
----------
ποΈ Seen on @cibsecurity
UnderDefense
B2B Growth Marketing Manager - UnderDefense
π¦Ώ Two WormGPT Clones That Use Grok and Mixtral Found in Underground Forum π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
WormGPT was created by Last, a Portuguese hacker, using GPTJ to bypass AI safety filters before being shut down in 2023 after public exposure.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Two WormGPT Clones That Use Grok and Mixtral Found in Underground Forum
WormGPT was created by βLast,β a Portuguese hacker, using GPT-J to bypass AI safety filters before being shut down in 2023 after public exposure.