Information security

[ follow ]
fromThe Hacker News
12 minutes ago

CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation

The vulnerability, tracked as CVE-2025-59374 (CVSS score: 9.3), has been described as an "embedded malicious code vulnerability" introduced by means of a supply chain compromise that could allow attackers to perform unintended actions. "Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise," according to a description of the flaw published in CVE.org. "The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected."
Information security
#cisco-asyncos
fromThe Hacker News
1 hour ago
Information security

Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

A critical AsyncOS zero-day (CVE-2025-20393) enables remote root command execution when Spam Quarantine is internet-exposed, actively exploited by China-linked APT UAT-9686.
fromTechCrunch
11 hours ago
Information security

Cisco says Chinese hackers are exploiting its customers with a new zero-day | TechCrunch

Critical Cisco AsyncOS vulnerability enables full takeover of exposed devices; no patches exist and wiping/rebuilding software is the only current mitigation.
fromTechCrunch
11 hours ago
Information security

Cisco says Chinese hackers are exploiting its customers with a new zero-day | TechCrunch

#msmq
Information security
fromThe Hacker News
14 hours ago

New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails

Operation ForumTroll-linked phishing targeted Russian academics using aged fake eLibrary domains to deliver LeetAgent and Dante spyware via one-time links and personalized ZIP files.
Information security
fromComputerWeekly.com
14 hours ago

ClickFix attacks that bypass cyber controls on the rise | Computer Weekly

ClickFix attacks surged in 2025, tricking users into running commands that bypass conventional defenses and enable RATs, credential theft, and ransomware.
fromTheregister
7 hours ago

Attacks pummeling Cisco AsyncOS 0-day since late November

Suspected Chinese-government-linked threat actors have been battering a maximum-severity Cisco AsyncOS zero-day vulnerability in some Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances for nearly a month, and there's no timeline for a fix. Cisco disclosed the bug, tracked as CVE-2025-20393, on Wednesday and said it affects both physical and virtual SEG and SEWM appliances in certain non-standard configurations where the Spam Quarantine feature is enabled and exposed to the internet.
Information security
Information security
fromThe Hacker News
10 hours ago

SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances

SonicWall SMA 100 series appliances contain a locally exploitable privilege escalation vulnerability (CVE-2025-40602) actively exploited; users must apply platform-hotfix updates immediately.
Information security
fromThe Hacker News
14 hours ago

APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign

APT28 conducted a sustained credential-harvesting phishing campaign targeting UKR[.]net users to steal login credentials and two-factor authentication codes for GRU intelligence collection.
fromThe Hacker News
18 hours ago

China-Linked Ink Dragon Hacks Governments Using ShadowPad and FINALDRAFT Malware

The threat actor known as Jewelbug has been increasingly focusing on government targets in Europe since July 2025, even as it continues to attack entities located in Southeast Asia and South America. Check Point Research is tracking the cluster under the name Ink Dragon. It's also referenced by the broader cybersecurity community under the names CL-STA-0049, Earth Alux, and REF7707. The China-aligned hacking group is assessed to be active since at least March 2023.
Information security
#browser-extensions
Information security
fromwww.standard.co.uk
8 hours ago

London council hit by cyber attack says personal data copied and taken away'

Westminster City Council suffered a November 24 cyber attack that likely copied sensitive personal data from a shared IT system with Kensington and Chelsea Council.
Information security
fromThe Hacker News
18 hours ago

Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time

Proactive, context-rich SOCs using threat intelligence and sector-specific visibility reduce alert fatigue, anticipate campaigns, and prevent incidents rather than merely responding.
fromZDNET
1 day ago

Is your smart home an easy target? 6 ways experts lock theirs down

Most of us have some internet of things (IoT) devices at home, whether it's a phone, a tablet, or a collection of security cameras and sensors. When you learn that 120,000 home security cameras were hacked in South Korea for sexploitation footage, it makes you think twice about adding such devices to your home, which is your most sacred space for privacy.
Information security
#data-breach
fromTechCrunch
1 day ago
Information security

Hacking group says it's extorting Pornhub after stealing users' viewing data | TechCrunch

fromForbes
5 days ago
Information security

4.3 Billion Work Profiles Exposed: Scammers Now Know Where You Work

fromTechCrunch
1 day ago
Information security

Hacking group says it's extorting Pornhub after stealing users' viewing data | TechCrunch

fromForbes
5 days ago
Information security

4.3 Billion Work Profiles Exposed: Scammers Now Know Where You Work

Information security
fromThe Hacker News
10 hours ago

Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks

Kimwolf is a NDK-compiled DDoS botnet infecting at least 1.8 million Android-based TVs, set-top boxes, and tablets worldwide.
Information security
fromComputerWeekly.com
19 hours ago

Security platform consolidation in 2026: The AI imperative | Computer Weekly

Organizations must consolidate cybersecurity platforms to survive AI-driven, adaptive attacks that operate in real time; fragmented tool stacks cannot respond fast enough.
Information security
fromTechzine Global
18 hours ago

ARTPEC-9 and Axis Edge Vault: a unified hardware-rooted framework for cybersecure surveillance

ARTPEC-9 strengthens network camera security with hardware-backed features, deep device-level safeguards, and integration with Axis OS to enhance surveillance resilience and threat mitigation.
Information security
fromWIRED
19 hours ago

Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks

Microsoft will disable default RC4 support in Windows domain controllers to remove an obsolete, vulnerable cipher long exploited by attackers.
#react-server-components
fromLogRocket Blog
17 hours ago
Information security

React2Shell exploit: What happened and lessons learned - LogRocket Blog

A deserialization flaw in React Server Components (React2Shell, CVE-2025-55182) enabled remote code execution with CVSS 10.0 and was rapidly exploited in the wild.
fromTechzine Global
5 days ago
Information security

Three new vulnerabilities discovered in React Server Components

React Server Components have three new vulnerabilities—two DoS and one source-code leak—requiring immediate updates to patched versions.
#cybersecurity
Information security
fromZDNET
15 hours ago

PC experts warn against using your router's USB port - here's what to do instead

Router USB ports expose networks to security vulnerabilities through outdated protocols; avoid using them and choose safer central storage alternatives.
fromNextgov.com
8 hours ago

CISA opens 100 applications for CyberCorps students

The Cybersecurity and Infrastructure Security Agency said it will make 100 internship opportunities available to students participating in a government scholarship program that's been hampered by federal hiring freezes enacted by the Trump administration. The move announced Wednesday would allow undergraduate and graduate students to enter the cyber defense agency under the CyberCorps: Scholarship for Service Program, a longstanding workforce pipeline used to place top student talent into U.S. cybersecurity positions.
Information security
fromFuturism
7 hours ago

Hacker Busts Startup Running Huge Web of AI-Generated "Influencers" on Instagram

the entire backend used to manage its phone farm - so it provides an extraordinary glimpse at how the service is actually being used to manipulate social media at scale. Speaking to 404 on condition of anonymity, the hacker said they can "see the phones in use, which manager [computers controlling the phones] they had, which TikTok accounts they were assigned, proxies in use (and their passwords), and pending tasks. As well as the link to control devices for each manager."
Information security
fromZacks
12 hours ago

Pardon Our Interruption

As you were browsing something about your browser made us think you were a bot. There are a few reasons this might happen: You've disabled JavaScript in your web browser. You're a power user moving through this website with super-human speed. You've disabled cookies in your web browser. A third-party browser plugin, such as Ghostery or NoScript, is preventing JavaScript from running.
#holiday-scams
fromZDNET
1 day ago
Information security

Beware of 'gift card draining' and two other top holiday scams, US Treasury warns

fromZDNET
1 day ago
Information security

Beware of 'gift card draining' and two other top holiday scams, US Treasury warns

Information security
fromZDNET
1 day ago

Need to encrypt Mac files? I found a free app that makes it super easy

Encrypto for macOS simplifies AES-256 file encryption, sharing, password hints, and cross-platform compatibility with Windows.
Information security
fromTechzine Global
21 hours ago

Cisco Foundation AI takes on key role within Identity Intelligence

Cisco Identity Intelligence uses an internally developed Foundation-sec-1.1-8B-Instruct AI model to analyze identity behavior and detect complex, domain-specific threats.
fromFortune
12 hours ago

How Amazon's CSO defends against efforts by North Korean IT workers to infiltrate his company | Fortune

Steve Schmidt, the chief security officer at Amazon, says his team has identified and blocked more than 1,800 attempts by North Korea to secure IT roles at the tech giant. He warns that this scheme is becoming more prevalent across the technology industry as the nation-state actor targets the lucrative salaries of generative artificial intelligence and machine learning jobs, and the troves of valuable data such workers have access to.
Information security
fromTheregister
14 hours ago

Nomad settles with the FTC over $186M cyberattack

Illusory Systems, which trades as Nomad, allegedly misled users about the security of its cryptocurrency bridge, which was compromised in 2022 in an attack that led to $186 million worth of funds being stolen. The FTC alleged that Nomad pushed an update in June 2022 containing "inadequately tested code" that, in turn, introduced a "significant vulnerability" that was exploited around a month later.
Information security
fromFast Company
20 hours ago

How Cloudflare, 'the most important internet company you've never heard of,' took center stage

But for the better part of 2025, cofounder and CEO Matthew Prince has been trying to change that. The company's core business is to improve the performance and enhance the security of websites and online applications, protecting against malicious actors and routing web traffic through its data centers to optimize performance. "Six billion people pass through our network every single month," Prince says. If Cloudflare is doing its job well, no one notices.
Information security
Information security
fromEngadget
15 hours ago

How a VPN works (and why you should care)

A VPN creates an encrypted tunnel to a remote server that masks device IP, protects privacy, and enables location-based access and secure remote networking.
#react2shell
fromThe Hacker News
1 day ago
Information security

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

React2Shell is exploited to deploy stealthy remote-access malware such as KSwapDoor and ZnDoor, enabling encrypted mesh communications, command execution, and file operations.
fromTheregister
5 days ago
Information security

Half of exposed React servers remain unpatched amid attacks

Half of internet-facing React server systems remain unpatched against CVE-2025-55182, enabling widespread unauthenticated remote code execution exploitation across diverse attack clusters.
Information security
fromThe Hacker News
1 day ago

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

GRU-linked APT44 ran a 2021–2025 campaign targeting Western critical infrastructure, exploiting misconfigured network edge devices and known software vulnerabilities.
Information security
fromTheregister
1 day ago

China's Ink Dragon hides out in European government networks

Ink Dragon expanded espionage into European government networks, using compromised servers as relay nodes, stealing credentials and updating backdoors to blend with Microsoft cloud activity.
Information security
fromThe Hacker News
1 day ago

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

A malicious NuGet package impersonating Tracer.Fody stole Stratis cryptocurrency wallet files and passwords, exfiltrating them to a Russian-hosted server.
fromThe Hacker News
1 day ago

Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass

Cybersecurity company Arctic Wolf said it observed active intrusions involving malicious single sign-on (SSO) logins on FortiGate appliances on December 12, 2025. The attacks exploit two critical authentication bypasses (CVE-2025-59718 and CVE-2025-59719, CVSS scores: 9.8). Patches for the flaws were released by Fortinet last week for FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager. "These vulnerabilities allow unauthenticated bypass of SSO login authentication via crafted SAML messages, if the FortiCloud SSO feature is enabled on affected devices," Arctic Wolf Labs said in a new bulletin.
Information security
Information security
fromThe Hacker News
1 day ago

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Threat actors use compromised AWS IAM credentials and novel persistence methods to deploy widespread crypto-mining across ECS and EC2, evading detection and extending operations.
fromTheregister
2 days ago

SoundCloud bounces some VPNs as it cleans up cyberattack

"SoundCloud recently detected unauthorized activity in an ancillary service dashboard," opens a Monday post from the company. "Upon making this discovery, we immediately activated our incident response protocols and promptly contained the activity. We also engaged leading third-party cybersecurity experts to assist in a thorough investigation and response." Not long after SoundCloud and its hired help contained the incident, the site became the subject of multiple denial of service attacks.
Information security
#phishing
fromIT Pro
1 day ago
Information security

Complacent Gen Z and Millennial workers are more likely to be duped by social engineering attacks

fromIT Pro
1 day ago
Information security

Complacent Gen Z and Millennial workers are more likely to be duped by social engineering attacks

Information security
fromTheregister
1 day ago

SantaStealer bags credentials and crypto wallets

SantaStealer is a modular credential- and wallet-stealing infostealer advertised as undetectable despite samples lacking robust anti-analysis and evasion techniques.
Information security
fromChannelPro
1 day ago

Tapping into the 'touch grass' movement in cybersecurity

Organizations are adopting offline, air-gapped, and paper-based recovery measures to improve resilience and reduce dependence on always-on cloud connectivity.
Information security
fromIT Pro
1 day ago

Google is scrapping its dark web report feature - here's everything you need to know and some alternative options

Google will discontinue its dark web report tool, ending scans January 15 and deleting all related data by February 16 while promoting other security tools.
Information security
fromTechzine Global
1 day ago

CrowdStrike expands Falcon with security for AI interactions

Falcon AIDR protects the AI interaction layer—prompts, agents, and responses—by logging, correlating telemetry, and blocking risky interactions like prompt injection.
Information security
fromTechzine Global
1 day ago

Let's Encrypt drastically shortens certificate lifespans

Let's Encrypt is switching to Generation Y roots and shorter-lived server-only certificates while removing TLS client authentication and offering short-lived and IP support.
Information security
fromNextgov.com
1 day ago

Quantum cryptography implementation timelines must be shortened, industry CEO to tell Congress

Combining AI and quantum computing threatens current encryption, creating new cyber fault lines that demand comprehensive, network-wide quantum-resistant protections.
Information security
fromEngadget
2 days ago

Google is retiring its free dark web monitoring tool next year

Google will discontinue its free dark web reports, ending monitoring on January 15, 2026 and removing report access on February 16, 2026.
Information security
fromTechzine Global
2 days ago

Database administrator in 2025: how DBAs are reinventing themselves

DBAs must adapt to decentralized data, rising security and governance complexity, and automation demands as organizations prioritize rapid innovation over timely data controls.
fromWordtothewise
1 day ago

IPv4 and IPv6

The Old Internet is built on Internet Protocol version 4. This was first used on ARPANET in 1983. It's the IP version that launched the modern Internet. It's what we - or at least the general public - think of as an IP address. Under the covers it's a 32 bit long identifier, but it's always displayed as four decimal numbers separated by periods, e.g. "208.87.129.176".
Information security
fromBusiness Matters
3 days ago

How Blockchain and Crypto Are Changing the Online Casino Industry

The online casino industry has always been driven by innovation, but no technological shift has been as transformative as the rise of blockchain and cryptocurrency. What started as an experimental payment method has now evolved into a powerful engine reshaping how players interact with gambling platforms. Even established brands like Win Olympia are adopting blockchain-driven features to stay ahead of the curve. From faster payments to unparalleled transparency, blockchain is not just enhancing the online casino experience-it is redefining it entirely.
Information security
Information security
fromThe Hacker News
2 days ago

Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More

Critical zero-day vulnerabilities in Apple and Google products and a .NET SOAPwn flaw are actively exploited; install updates and patch affected software immediately.
#cve-2025-55182
fromTheregister
2 days ago
Information security

React2Shell vuln exploited by China, Iran, Google warns

Multiple Chinese state-linked groups, Iran-associated actors, and criminals are exploiting React2Shell (CVE-2025-55182) to deploy backdoors, tunnelers, and cryptominers.
fromThe Hacker News
5 days ago
Information security

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

Critical CVE-2025-55182 enables unauthenticated remote code execution via unsafe deserialization in React Server Components, prompting CISA to require patching by December 12, 2025.
fromThe Hacker News
5 days ago
Information security

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

Information security
fromTheregister
2 days ago

Amazon security boss blames Russia's GRU for energy hacks

Russia's GRU used stolen credentials and compromised misconfigured AWS-hosted network devices to maintain persistent access to Western energy and critical infrastructure networks.
fromThe Hacker News
2 days ago

FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE

CVE-2025-61675 (CVSS score: 8.6) - Numerous authenticated SQL injection vulnerabilities impacting four unique endpoints (basestation, model, firmware, and custom extension) and 11 affected parameters that enable read and write access to the underlying SQL database CVE-2025-61678 (CVSS score: 8.6) - An authenticated arbitrary file upload vulnerability that allows an attacker to exploit the firmware upload endpoint to upload a PHP web shell after obtaining a valid PHPSESSID and run arbitrary commands to leak the contents of sensitive files (e.g., "/etc/passwd")
Information security
Information security
fromComputerWeekly.com
2 days ago

What is driving the rise of infostealer malware? | Computer Weekly

Infostealer malware increasingly breaches credentials and session data, enabling account takeover, MFA bypass, fraud, and resale, driven by lax corporate and personal device security.
fromZDNET
2 days ago

Still running Windows 10? Here's why that's a bad idea

Hundreds of millions of computers worldwide are still running Windows 10, months after the one-time king of PC operating systems officially passed its end-of-support deadline. If you're responsible for one of those machines and you aren't ready to upgrade to Windows 11, you can sign up today for an Extended Security Updates (ESU) subscription -- consumers can get those updates free through October 2026, as I explain here: How to get free Windows 10 security patches on your PC - from now to October 2026.
Information security
Information security
fromThe Hacker News
2 days ago

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

VolkLocker RaaS hard-codes master keys and writes a plaintext backup to %TEMP%, enabling free file decryption despite typical ransomware behaviors.
fromThe Hacker News
2 days ago

A Browser Extension Risk Guide After the ShadyPanda Campaign

A threat group dubbed ShadyPanda spent seven years playing the long game, publishing or acquiring harmless extensions, letting them run clean for years to build trust and gain millions of installs, then suddenly flipping them into malware via silent updates. In total, about 4.3 million users installed these once-legitimate add-ons, which suddenly went rogue with spyware and backdoor capabilities. This tactic was essentially a browser extension supply-chain attack. The ShadyPanda operators even earned featured and verified badges in the official Chrome Web Store and Microsoft Edge Add-ons site for some extensions, reinforcing user confidence. Because extension updates happen automatically in the background, the attackers were able to push out malicious code without users noticing a thing.
Information security
Information security
fromForbes
2 days ago

The Web Security Questions You Aren't Asking (But Should Be)

Unconfigured email authentication (DKIM/DMARC) allows domain spoofing, damaging brand reputation and preventing legitimate email delivery.
#cyber-deception
fromIT Pro
2 days ago
Information security

The NCSC touts honeypots and 'cyber deception' tactics as the key to combating hackers - but they could 'lead to a false sense of security'

Cyber deception tools like honeypots can boost visibility, detect novel threats, and disrupt attackers but require clear strategy, outcome-based metrics, and standardized terminology.
fromTheregister
3 days ago
Information security

NCSC finds cyber deception tools work, if deployed right

Cyber-deception tools like honeypots and decoy accounts improve visibility and disrupt attackers when deployed with clear strategy, proper configuration, and ongoing maintenance.
fromIT Pro
2 days ago
Information security

The NCSC touts honeypots and 'cyber deception' tactics as the key to combating hackers - but they could 'lead to a false sense of security'

fromTheregister
2 days ago

JLR: Payroll data stolen in cybercrime that shook UK economy

Jaguar Land Rover (JLR) has reportedly told staff the cyber-raid that crippled its operations in August didn't just bring production to a screeching halt - it also walked off with the personal payroll data of thousands of employees. The breach, which was pegged as one of the most costly in UK history, includes bank account details, tax codes, and other sensitive data related to staff salaries, benefits, and former employees. In an email to both current employees and former employees, seen by The Telegraph, JLR wrote: "While investigating, we have unfortunately identified that there has been unauthorised access to some personal data we process in the context of employment and some information needed to administer payroll, benefits and staff schemes to employees and dependents. This includes data of ex-JLR team members that has been stored."
Information security
Information security
fromTheregister
2 days ago

Legal protection for ethical hacking is only the first step

The UK is reforming the Computer Misuse Act to protect legitimate cybersecurity research and address modern cybercrime and state-sponsored digital attacks.
Information security
fromArs Technica
2 days ago

Microsoft will finally kill obsolete cipher that has wreaked decades of havoc

Microsoft gradually deprecated RC4 over a decade, facing deep compatibility and selection-rule challenges, while Active Directory's unsalted, single-round MD4 enables Kerberoasting attacks.
Information security
fromComputerworld
2 days ago

Emerging cyber threats: How businesses can bolster their defenses

Enterprises must understand evolving cyber threats from AI, quantum computing, and emerging biotechnologies to protect data, infrastructure, and privacy.
Information security
fromThe Hacker News
2 days ago

Featured Chrome Browser Extension Caught Intercepting Millions of Users' AI Chats

Urban VPN Proxy extension silently captures AI chatbot prompts, responses, session metadata, and exfiltrates them to remote servers.
Information security
fromChannelPro
2 days ago

HackerOne eyes enterprise growth with double C-suite appointment

HackerOne appointed Stephanie Furfaro as CRO and Stacy Leidwinger as CMO to accelerate growth in threat exposure management and AI-native security offerings.
Information security
fromTechzine Global
2 days ago

Nutanix launches Distributed Sovereign Cloud for greater control and flexibility

Distributed Sovereign Cloud provides control, security, offline management, and flexible governance across clouds and dark sites without merely blocking access.
Information security
fromZDNET
3 days ago

Stop using your router's USB port - what PC experts recommend instead

Router USB ports often rely on outdated, unencrypted protocols like FTP, creating vulnerabilities that make using them unsafe and unsuitable for central storage.
fromThe Hacker News
4 days ago

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

Details of the six-year-old flaw were publicly shared by Cisco Talos in April 2019, describing it as an exploitable remote code execution vulnerability in the ACEManager "upload.cgi" function of Sierra Wireless AirLink ES450 firmware version 4.9.3. Talos reported the flaw to the Canadian company in December 2018. "This vulnerability exists in the file upload capability of templates within the AirLink 450," the company said. "When uploading template files, you can specify the name of the file that you are uploading."
Information security
fromWIRED
4 days ago

AI Toys for Kids Talk About Sex, Drugs, and Chinese Propaganda

Two people allegedly linked to China's infamous Salt Typhoon espionage hacking group seem to have previously received training through Cisco's prominent, long-running networking academy. Meanwhile, warnings are increasingly emerging from United States lawmakers in Congress that safeguards on expanded US wiretap powers have been failing, allowing US intelligence agencies to access more of Americans' data without adequate constraints. If you've been having trouble keeping track of all of the news and data coming out about infamous sex offender Jeffrey Epstein,
Information security
Information security
fromZDNET
4 days ago

Should you ever turn off Windows Security? It's tricky, but here's my rule of thumb

Windows Security can be temporarily or permanently disabled on Windows 11 Home and Pro, and creating a System Restore point is recommended before doing so.
fromTechzine Global
5 days ago

Vulnerability in Notepad++ updater exploited for malware

A security vulnerability in the Notepad++ update mechanism has been exploited to spread malicious code. What began as a report within the Notepad++ community at the end of October was later confirmed to be a structural weakness in the updater. Analysis by BleepingComputer shows that attackers were able to execute malware via this mechanism. Notepad++ has since released a fix in version 8.8.9.
Information security
fromTheregister
5 days ago

Microsoft RasMan 0-day gets an unofficial patch and exploit

A Microsoft zero-day vulnerability that allows an unprivileged user to crash the Windows Remote Access Connection Manager (RasMan) service now has a free, unofficial patch - with no word as to when Redmond plans to release an official one - along with a working exploit circulating online. Researchers from 0patch, the micropatching site, uncovered the denial-of-service (DoS) bug while investigating CVE-2025-59230, a Windows RasMan privilege escalation vulnerability that Redmond fixed in October, but not before attackers found and exploited the vulnerability.
Information security
Information security
fromThe Hacker News
5 days ago

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Four new phishing kits — BlackForce, GhostFrame, InboxPrime AI, and Spiderman — enable large-scale credential theft and MFA bypass using MitB and evasion techniques.
fromThe Hacker News
5 days ago

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads

Cybersecurity researchers are calling attention to a new campaign that's leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based Remote Access Trojan (RAT) dubbed PyStoreRAT. "These repositories, often themed as development utilities or OSINT tools, contain only a few lines of code responsible for silently downloading a remote HTA file and executing it via 'mshta.exe,'" Morphisec researcher Yonatan Edri said in a report shared with The Hacker News.
Information security
Information security
fromThe Hacker News
6 days ago

CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

CVE-2025-58360 is an unauthenticated XXE in OSGeo GeoServer being exploited in the wild; affected versions require immediate patching to prevent file access, SSRF, and DoS.
Information security
fromIT Pro
5 days ago

A concerning number of Log4j downloads are still vulnerable four years on

Over 13% of Log4j downloads remain vulnerable to Log4Shell, and most vulnerable open-source components are still downloaded despite available fixed versions.
Information security
fromTechCrunch
5 days ago

Google and Apple roll out emergency security updates after zero-day attacks | TechCrunch

Apple and Google issued security updates to patch actively exploited zero-day vulnerabilities tied to a likely government-backed hacking campaign targeting specific users.
Information security
fromTechzine Global
5 days ago

Microsoft improves its bug bounty program with "In Scope by Default"

Microsoft expands its bug bounty program to include all critical vulnerabilities affecting online services, covering proprietary, third-party, and open-source code.
[ Load more ]