π JLR Extends Production Halt After Cyber-Attack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Jaguar Land Rover JLR has confirmed that its pause in production will last until at least Wednesday, September 24.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
JLR Extends Production Halt After Cyber-Attack
Jaguar Land Rover (JLR) has confirmed that its pause in production will last until at least Wednesday, September 24
π API Threats Surge to 40,000 Incidents in 1H 2025 π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Thales claims there were over 40,000 API incidents in the first half of 2025.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
API Threats Surge to 40,000 Incidents in 1H 2025
Thales claims there were over 40,000 API incidents in the first half of 2025
π FinWise Bank Warns of Insider Data Breach π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
An insider data breach at FinWise may have impacted 689,000 customers.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
FinWise Bank Warns of Insider Data Breach
An insider data breach at FinWise may have impacted 689,000 customers
ποΈ New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic to deliver the StealC information stealer malware. "The observed campaign uses a highly convincing, multilingual phishing site e.g., fake Facebook Security page, with antianalysis techniques and advanced obfuscation to evade detection," Acronis security researcher Eliad.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
βοΈ Self-Replicating Worm Hits 180+ Software Packages βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
At least 187 code packages made available through the JavaScript repository NPM have been infected with a selfreplicating worm that steals credentials from developers and publishes those secrets on GitHub, experts warn. The malware, which briefly infected multiple code packages from the security vendor CrowdStrike, steals and publishes even more credentials every time an infected package is installed.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
Self-Replicating Worm Hits 180+ Software Packages
At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and publishes those secrets on GitHub, experts warn. The malware, which briefly infectedβ¦
ποΈ SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A massive ad fraud and click fraud operation dubbed SlopAds ran a cluster of 224 apps, collectively attracting 38 million downloads across 228 countries and territories. "These apps deliver their fraud payload using steganography and create hidden WebViews to navigate to threat actorowned cashout sites, generating fraudulent ad impressions and clicks," HUMANs Satori Threat Intelligence and.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Gucci and Alexander McQueen Hit by Customer Data Breach π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The attack, which is linked to ShinyHunters, has reportedly compromised data relating to 7.4 million unique email addresses.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Gucci and Alexander McQueen Hit by Customer Data Breach
The attack, which is linked to ShinyHunters, has reportedly compromised data relating to 7.4 million unique email addresses
π Chinese AI Villager Pen Testing Tool Hits 11,000 PyPI Downloads π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
AInative Villager, which automates Kali and DeepSeek penetration tests, has reached 11,000 PyPI downloads fueling dualuse threat.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Chinese AI Villager Pen Testing Tool Hits 11,000 PyPI Downloads
AI-native Villager, which automates Kali and DeepSeek penetration tests, has reached 11,000 PyPI downloads fueling dual-use threat
β€1
π Fifteen Ransomware Gangs βRetire,β Future Unclear π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Fifteen ransomware groups have claimed shutdown on BreachForums experts warn of rebrands and copycats.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Fifteen Ransomware Gangs βRetire,β Future Unclear
Fifteen ransomware groups have claimed shutdown on BreachForums; experts warn of rebrands and copycats
π Lessons from Medusa: What the Industryβs Most Efficient Ransomware Teaches Us π
π Read more.
π Via "UnderDefense"
----------
ποΈ Seen on @cibsecurity
Medusa is one of 2025s most aggressive multiextortion ransomware families it encrypts systems, steals data, and uses public pressure to force payment. Emerging in June 2021, it has evolved into a RansomwareasaService RaaS powerhouse, impacting over 300 victims by February 2025 across critical sectors like healthcare, education, manufacturing, and technology. With attacks surging 42 from The post Lessons from Medusa What the Industrys Most Efficient Ransomware Teaches Us appeared first on UnderDefense.π Read more.
π Via "UnderDefense"
----------
ποΈ Seen on @cibsecurity
UnderDefense
Medusa Ransomware Playbook: How to Detect and Recover
Learn Medusa ransomware indicators, triage, containment, forensics, recovery, and prevention strategies to survive multi-extortion attacks.
π’ Jaguar Land Rover says IT disruption set to continue π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The automotive manufacturer is still not fully operational after the recent cyber attack.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Jaguar Land Rover says IT disruption set to continue
The automotive manufacturer is still not fully operational after the recent cyber attack
π’ Nearly 700,000 customers impacted after insider attack at US fintech firm π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
FinWise, which provides loans on behalf of US financial services firms, revealed a former employee accessed sensitive customer information after leaving the firm.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Nearly 700,000 customers impacted after insider attack at US fintech firm
Details on how the insider attack unfolded aren't clear, but FinWise has taken action to prevent future incidents
π¦Ώ Apple Releases iOS 26, macOS Tahoe 26 and 50+ Security Fixes π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Apple just fixed more than 50 security flaws across iPhone, iPad, Mac, Watch, TV, and Vision Pro. The post Apple Releases iOS 26, macOS Tahoe 26 and 50 Security Fixes appeared first on TechRepublic.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Apple Releases iOS 26, macOS Tahoe 26 and 50+ Security Fixes
Apple just fixed more than 50 security flaws across iPhone, iPad, Mac, Watch, TV, and Vision Pro.
ποΈ TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The threat actor known as TA558 has been attributed to a fresh set of attacks delivering various remote access trojans RATs like Venom RAT to breach hotels in Brazil and Spanishspeaking markets. Russian cybersecurity vendor Kaspersky is tracking the activity, observed in summer 2025, to a cluster it tracks as RevengeHotels. "The threat actors continue to employ phishing emails with invoice.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A Chinaaligned threat actor known as TA415 has been attributed to spearphishing campaigns targeting the U.S. government, think tanks, and academic organizations utilizing U.S.China economicthemed lures. "In this activity, the group masqueraded as the current Chair of the Select Committee on Strategic Competition between the United States and the Chinese Communist Party CCP, as well as the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ From Quantum Hacks to AI Defenses β Expert Guide to Building Unbreakable Cyber Resilience ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Quantum computing and AI working together will bring incredible opportunities. Together, the technologies will help us extend innovation further and faster than ever before. But, imagine the flip side, waking up to news that hackers have used a quantum computer to crack your company's encryption overnight, exposing your most sensitive data, rendering much of it untrustworthy. And with your.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Rethinking AI Data Security: A Buyer's Guide ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Generative AI has gone from a curiosity to a cornerstone of enterprise productivity in just a few short years. From copilots embedded in office suites to dedicated large language model LLM platforms, employees now rely on these tools to code, analyze, draft, and decide. But for CISOs and security architects, the very speed of adoption has created a paradox the more powerful the tools, the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have tied a fresh round of cyber attacks targeting financial services to the notorious cybercrime group known as Scattered Spider, casting doubt on their claims of going "dark." Threat intelligence firm ReliaQuest said it has observed indications that the threat actor has shifted their focus to the financial sector. This is supported by an increase in lookalike domains.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ DOJ Resentences BreachForums Founder to 3 Years for Cybercrime and Possession of CSAM ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. Department of Justice DoJ on Tuesday resentenced the former administrator of BreachForums to three years in prison in connection with his role in running the cybercrime forum and possessing child sexual abuse material CSAM. Conor Brian Fitzpatrick aka Pompompurin, 22, of Peekskill, New York, pleaded guilty to one count of access device conspiracy, one count of access device.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ RaccoonO365 Phishing Network Dismantled as Microsoft, Cloudflare Take Down 338 Domains ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Microsoft's Digital Crimes Unit said it teamed up with Cloudflare to coordinate the seizure of 338 domains used by RaccoonO365, a financially motivated threat group that was behind a phishingasaservice Phaas toolkit used to steal more than 5,000 Microsoft 365 credentials from 94 countries since July 2024. "Using a court order granted by the Southern District of New York, the DCU seized 338.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π FileFix Campaign Using Steganography and Multistage Payloads π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
FileFix campaign hides PowerShell script and encrypted EXEs in JPGs via multilingual phishing.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
FileFix Campaign Using Steganography and Multistage Payloads
FileFix campaign hides PowerShell script and encrypted EXEs in JPGs via multilingual phishing