ποΈ North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The North Korealinked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented backdoor called AkdoorTea, along with tools like TsunamiKit and Tropidoor. Slovak cybersecurity firm ESET, which is tracking the activity under the name DeceptiveDevelopment, said the campaign targets software developers across all operating systems, Windows,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Phishing Campaign Evolves into PureRAT Deployment, Linked to Vietnamese Threat Actors π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Vietnamese phishing campaign evolves from Python infostealer to PureRAT trojan.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Phishing Campaign Evolves into PureRAT Deployment, Linked to Vietnamese Threat Actors
Vietnamese phishing campaign evolves from Python infostealer to PureRAT trojan
ποΈ Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have disclosed a critical flaw impacting Salesforce Agentforce, a platform for building artificial intelligence AI agents, that could allow attackers to potentially exfiltrate sensitive data from its customer relationship management CRM tool by means of an indirect prompt injection. The vulnerability has been codenamed ForcedLeak CVSS score 9.4 by Noma Security,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Malicious AI Agent Server Reportedly Steals Emails π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The security researchers who discovered the malicious npm package called it the first malicious MCP in the wild.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Malicious AI Agent Server Reportedly Steals Emails
The security researchers who discovered the malicious npm package called it the βfirst malicious MCP in the wildβ
π¨ NCSC warns of persistent malware campaign targeting Cisco devices π¨
π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
Latest malware analysis report helps organisations detect and mitigate malicious activity targeting certain Cisco devices.π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
National Cyber Security Centre
NCSC warns of persistent malware campaign targeting Cisco devices
NCSC warns that outdated Cisco devices are being actively targeted by malicious actors, urging organisations to upgrade and secure systems
π Critical Vulnerability in Salesforce AgentForce Exposed π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Critical flaw ForcedLeak in Salesforce's AgentForce allows CRM data theft via prompt injection.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Critical Vulnerability in Salesforce AgentForce Exposed
Critical flaw ForcedLeak in Salesforce's AgentForce allows CRM data theft via prompt injection
ποΈ Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cisco is urging customers to patch two security flaws impacting the VPN web server of Cisco Secure Firewall Adaptive Security Appliance ASA Software and Cisco Secure Firewall Threat Defense FTD Software, which it said have been exploited in the wild. The zeroday vulnerabilities in question are listed below CVE202520333 CVSS score 9.9 An improper validation of usersupplied input.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Container .tdwrap Section .tdsection .tdtitle margin 16px 0 4px fontsize 32px lineheight 1.2 fontweight 800 .tdsubtitle margin 0 0 24px color 64748b fontsize 16px Timeline .tdtimeline position relative margin 0 !importantpadding 0!important liststyle none spine .tdtimelinebefore .π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The threat actor known as Vane Viper has been outed as a purveyor of malicious ad technology adtech, while relying on a tangled web of shell companies and opaque ownership structures to deliberately evade responsibility. "Vane Viper has provided core infrastructure in widespread malvertising, ad fraud, and cyberthreat proliferation for at least a decade," Infoblox said in a technical report.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π¨ NCSC statement following reports of nursery data incident π¨
π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
Statement from the NCSC in response to reports of an incident impacting nurseries.π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
National Cyber Security Centre - NCSC.GOV.UK
NCSC statement following reports of nursery data incident
Statement from the NCSC in response to reports of an incident impacting nurseries.
ποΈ Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.K. National Cyber Security Centre NCSC has revealed that threat actors have exploited the recently disclosed security flaws impacting Cisco firewalls as part of zeroday attacks to deliver previously undocumented malware families like RayInitiator and LINE VIPER. "The RayInitiator and LINE VIPER malware represent a significant evolution on that used in the previous campaign, both in.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π¦Ώ Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Trend Micro reveals that RepairIt "contradicted its privacy policy by collecting, storing, and, due to weak Development, Security, and Operations practices, inadvertently leaking private user data." The post Security Breaches Found in AIPowered Repair Tool Wondershare RepairIt appeared first on TechRepublic.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt
RepairIt contradicted its privacy policy and has inadvertently been leaking private user data.
π¦Ώ Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Trend Micro reveals that RepairIt "contradicted its privacy policy by collecting, storing, and, due to weak Development, Security, and Operations practices, inadvertently leaking private user data." The post Security Breaches Found in AIPowered Repair Tool Wondershare RepairIt appeared first on TechRepublic.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt
RepairIt contradicted its privacy policy and has inadvertently been leaking private user data.
π’ Organizations around the world are unprepared for the threat from bad bots β and UK businesses are some of the worst performers π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
As AIdriven bot traffic booms, legacy defenses are failing fast.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Organizations around the world are unprepared for the threat from bad bots β and UK businesses are some of the worst performers
As AI-driven bot traffic booms, legacy defenses are failing fast
πͺ Sharpening the Focus on Product Requirements and Cybersecurity Risks: Updating Foundational Activities for IoT Product Manufacturers πͺ
π Read more.
π Via "NIST"
----------
ποΈ Seen on @cibsecurity
Over the past few months, NIST has been revising and updating Foundational Activities for IoT Product Manufacturers NIST IR 8259 Revision 1 Initial Public Draft, which describes recommended premarket and postmarket activities for manufacturers to develop products that meet their customers cybersecurity needs and expectations. Thank you so much for the thoughtful comments and feedback throughout this process 400 participants across industry, consumer organizations, academia, federal agencies, and researchers shared feedback in both the December 2024 and March 2025 workshopsas well as.π Read more.
π Via "NIST"
----------
ποΈ Seen on @cibsecurity
NIST
Sharpening the Focus on Product Requirements and Cybersecurity Risks: Updating Foundational Activities for IoT Product Manufacturers
Update: The comment period for your feedback on the second public draft of NIST IR 8259 has been
π’ Asahi production halted by cyber attack π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Yet another big brand suffers operational disruption following apparent hacking attack.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Asahi production halted by cyberattack
Yet another big brand suffers operational disruption following apparent hacking attack
πͺ Sharpening the Focus on Product Requirements and Cybersecurity Risks: Updating Foundational Activities for IoT Product Manufacturers πͺ
π Read more.
π Via "NIST"
----------
ποΈ Seen on @cibsecurity
Over the past few months, NIST has been revising and updating Foundational Activities for IoT Product Manufacturers NIST IR 8259 Revision 1 Initial Public Draft, which describes recommended premarket and postmarket activities for manufacturers to develop products that meet their customers cybersecurity needs and expectations. Thank you so much for the thoughtful comments and feedback throughout this process 400 participants across industry, consumer organizations, academia, federal agencies, and researchers shared feedback in both the December 2024 and March 2025 workshopsas well as.π Read more.
π Via "NIST"
----------
ποΈ Seen on @cibsecurity
NIST
Sharpening the Focus on Product Requirements and Cybersecurity Risks: Updating Foundational Activities for IoT Product Manufacturers
Update: The comment period for your feedback on the second public draft of NIST IR 8259 has been
π’ Organizations around the world are unprepared for the threat from bad bots β and UK businesses are some of the worst performers π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
As AIdriven bot traffic booms, legacy defenses are failing fast.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Organizations around the world are unprepared for the threat from bad bots β and UK businesses are some of the worst performers
As AI-driven bot traffic booms, legacy defenses are failing fast
π¦
The Week in Vulnerabilities: MFT, Help Desk Fixes Urged by Cyble π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble Vulnerability Intelligence researchers tracked 1,126 vulnerabilities in the last week, and nearly 200 already have publicly available ProofsofConcept PoCs, raising the odds that the flaws will be exploited. A total of 71 vulnerabilities were rated as critical under CVSS v3.1, while 21 received a critical severity rating under the newer CVSS v4.0 scoring system. Here are some of the most critical vulnerabilities tracked by Cyble in the last week, including some under discussion on open source and underground forums. SolarWinds WHD, GoAnywhere MFT Among the Top Vulnerabilities Among the top vulnerabilities this week was CVE202526399, a critical remote code execution RCE vulnerability in SolarWinds Web Help Desk WHD, a webbased IT ticketing and asset management solution...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
ποΈ Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously undocumented Chinaaligned nationstate actor dubbed Phantom Taurus over the past twoandahalf years. "Phantom Taurus' main focus areas include ministries of foreign affairs, embassies, geopolitical events, and military operations," Palo Alto Networks Unit 42.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously undocumented Chinaaligned nationstate actor dubbed Phantom Taurus over the past twoandahalf years. "Phantom Taurus' main focus areas include ministries of foreign affairs, embassies, geopolitical events, and military operations," Palo Alto Networks Unit 42.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity