ποΈ 20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Multiple npm packages have been compromised as part of a software supply chain attack after a maintainer's account was compromised in a phishing attack. The attack targeted Josh Junon aka Qix, who received an email message that mimicked npm "supportnpmjs.help", urging them to update their update their twofactor authentication 2FA credentials before September 10, 2025, by clicking on.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat hunters have discovered a set of previously unreported domains, some going back to May 2020, that are associated with Chinalinked threat actors Salt Typhoon and UNC4841. "The domains date back several years, with the oldest registration activity occurring in May 2020, further confirming that the 2024 Salt Typhoon attacks were not the first activity carried out by this group," Silent Push.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft's Direct Send feature to form a "highly efficient attack pipeline" in recent phishing campaigns, according to new findings from ReliaQuest. "Axios user agent activity surged 241 from June to August 2025, dwarfing the 85 growth of all other flagged user agents combined," the cybersecurity company said in a.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft's Direct Send feature to form a "highly efficient attack pipeline" in recent phishing campaigns, according to new findings from ReliaQuest. "Axios user agent activity surged 241 from June to August 2025, dwarfing the 85 growth of all other flagged user agents combined," the cybersecurity company said in a.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A new Android malware called RatOn has evolved from a basic tool capable of conducting Near Field Communication NFC relay attacks to a sophisticated remote access trojan with Automated Transfer System ATS capabilities to conduct device fraud. "RatOn merges traditional overlay attacks with automatic money transfers and NFC relay functionality making it a uniquely powerful threat,".π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A new Android malware called RatOn has evolved from a basic tool capable of conducting Near Field Communication NFC relay attacks to a sophisticated remote access trojan with Automated Transfer System ATS capabilities to conduct device fraud. "RatOn merges traditional overlay attacks with automatic money transfers and NFC relay functionality making it a uniquely powerful threat,".π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ [Webinar] Shadow AI Agents Multiply Fast β Learn How to Detect and Control Them ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
One click is all it takes. An engineer spins up an experimental AI Agent to test a workflow. A business unit connects to automate reporting. A cloud platform quietly enables a new agent behind the scenes. Individually, they look harmless. But together, they form an invisible swarm of Shadow AI Agentsoperating outside securitys line of sight, tied to identities you dont even know exist.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ [Webinar] Shadow AI Agents Multiply Fast β Learn How to Detect and Control Them ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
One click is all it takes. An engineer spins up an experimental AI Agent to test a workflow. A business unit connects to automate reporting. A cloud platform quietly enables a new agent behind the scenes. Individually, they look harmless. But together, they form an invisible swarm of Shadow AI Agentsoperating outside securitys line of sight, tied to identities you dont even know exist.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malwareturnedremote access trojan called MostereRAT. The phishing attack incorporates a number of advanced evasion techniques to gain complete control over compromised systems, siphon sensitive data, and extend its functionality by serving secondary plugins, Fortinet FortiGuard Labs said. ".π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malwareturnedremote access trojan called MostereRAT. The phishing attack incorporates a number of advanced evasion techniques to gain complete control over compromised systems, siphon sensitive data, and extend its functionality by serving secondary plugins, Fortinet FortiGuard Labs said. ".π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ How Leading CISOs are Getting Budget Approval ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Its budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you're a CISO or security leader, you've likely found yourself explaining why your program matters, why a given tool or headcount is essential, and how the next breach is one blind spot away. But these arguments often fall short unless they're framed in a way the board can understand and appreciate.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ How Leading CISOs are Getting Budget Approval ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Its budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you're a CISO or security leader, you've likely found yourself explaining why your program matters, why a given tool or headcount is essential, and how the next breach is one blind spot away. But these arguments often fall short unless they're framed in a way the board can understand and appreciate.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
π’ US Senator calls for Microsoft FTC probe over βgross cybersecurity negligenceβ β Ron Wyden claims the tech giant has provided βdangerous, insecure softwareβ to the US government π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Ron Wyden, a Democratic senator from Oregon, has written to the chair of the FTC calling for an investigation into Microsoft's cyber practices.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
US Senator calls for Microsoft FTC probe over βgross cybersecurity negligenceβ β Ron Wyden claims the tech giant has provided βdangerousβ¦
Microsoft should face an FTC probe over alleged failings, one US lawmaker claims
β€2
π’ LNER warns customers to remain vigilant after personal data exposed in cyber attack π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
LNER has warned customers to remain vigilant for social engineering attacks after a cyber attack on the rail operator exposed personal data.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
LNER warns customers to remain vigilant after personal data exposed in cyber attack
The train operator said ticket sales and train operations are unaffected, but that customers should be on the lookout for phishing attempts
π’ Jaguar Land Rover u-turns on cyber attack containment claims, admits βsome data has been affectedβ π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Jaguar Land Rover JLR has admitted some data may have been accessed by hackers following a cyber attack which severely disrupted production.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Jaguar Land Rover u-turns on cyber attack containment claims, admits βsome data has been affectedβ
The car manufacturer says the attack was worse than first thought
π’ Everything we know about the Plex data breach so far π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Plex advised users to sign out of any connected devices that are currently logged in and enable twofactor authentication if they havent already.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Everything we know about the Plex data breach so far
No credit card information or passwords were compromised in the Plex data breach
β€1
π’ Prolific ransomware operator added to Europeβs Most Wanted list as US dangles $10 million reward π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The US Department of Justice is offering a reward of up to 10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Prolific ransomware operator added to Europeβs Most Wanted list as US dangles $10 million reward
Volodymyr Viktorovych Tymoshchuk is believed to have been behind hundreds of attacks
π¦Ώ Malware Injected Into Code Packages That Get 2 Billion+ Downloads Each Week π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
An attack targeting the Node.js ecosystem was just identified but not before it compromised 18 npm packages that account for billions of weekly downloads.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Malware Injected Into Code Packages That Get 2 Billion+ Downloads Each Week
An attack targeting the Node.js ecosystem was just identified β but not before it compromised 18 npm packages that account for billions of weekly downloads.
π¦Ώ Former WhatsApp Security Chief Sues Meta, Citing Major Privacy Risks π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
ExWhatsApp security chief Attaullah Baig is suing Meta and alleging the company ignored flaws that put billions at risk. Meta denies the claims.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Former WhatsApp Security Chief Sues Meta, Citing Major Privacy Risks
Ex-WhatsApp security chief Attaullah Baig is suing Meta and alleging the company ignored flaws that put billions at risk. Meta denies the claims.
ποΈ Cracking the Boardroom Code: Helping CISOs Speak the Language of Business ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
CISOs know their field. They understand the threat landscape. They understand how to build a strong and costeffective security stack. They understand how to staff out their organization. They understand the intricacies of compliance. They understand what it takes to reduce risk. Yet one question comes up again and again in our conversations with these security leaders how do I make the impact.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat actors affiliated with the Akira ransomware group have continued to target SonicWall devices for initial access. Cybersecurity firm Rapid7 said it observed a spike in intrusions involving SonicWall appliances over the past month, particularly following reports about renewed Akira ransomware activity since late July 2025. SonicWall subsequently revealed the SSL VPN activity aimed at its.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity