Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

New Mirai Variant ShadowV2 Targets IoT Devices Amidst AWS Disruption


A new variant of the Mirai botnet called ShadowV2 has been detected targeting IoT devices across multiple countries during the late-October AWS outage. The malware uses various attack methods including UDP floods, TCP-based floods, and HTTP-level floods to launch DDoS attacks. Organizations are advised to review their security protocols, ensure timely firmware updates, and maintain robust monitoring capabilities to strengthen their cybersecurity posture.



Published: Fri Nov 28 02:58:52 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

MS Teams Guest Access Exploited: A Security Blind Spot that Leaves Users Vulnerable to Phishing Attacks

Microsoft Teams' guest access feature has been found to have a critical security flaw that allows attackers to bypass Microsoft Defender protections, leaving users vulnerable to phishing attacks. To safeguard against this vulnerability, organizations must take immediate action to restrict guest invitations, implement cross-tenant controls, and educate their employees on spotting suspicious invites.

Published: Fri Nov 28 03:15:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Thousands of Sensitive Secrets Leaked on Popular Code-Formatting Platforms


Thousands of sensitive secrets have been leaked on popular code-formatting platforms, including JSONFormatter and CodeBeautify. This has led to widespread exposure of highly sensitive information, including credentials and private keys. The incident highlights the dangers of pasting sensitive credentials online and emphasizes the need for proactive threat intelligence and exposure management.

Published: Fri Nov 28 04:42:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Privileged Access Management: Why Organizations Are Turning to Remote Privileged Access Management


Remote Privileged Access Management: The Evolution of PAM

Summary:
The rise of hybrid and remote work has necessitated a new approach to securing privileged access. Organizations are turning to Remote Privileged Access Management (RPAM) as a cloud-based solution, driven by the need for strong access controls, scalability, and compliance. Learn more about the shift towards RPAM and how it is evolving the landscape of PAM solutions.

Published: Fri Nov 28 06:04:00 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

OBR Cyber Breach: A Blunder of Epic Proportions Reveals Budget Leak

The Office for Budget Responsibility (OBR) has found itself at the center of a major cybersecurity breach, with sensitive information about the government's budget policies being leaked online 45 minutes before publication. An investigation is underway to determine how the breach occurred and what measures can be taken to prevent it in the future.

Published: Fri Nov 28 06:16:14 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Malicious Large Language Models: Empowering Inexperienced Hackers


Malicious Large Language Models: Empowering Inexperienced Hackers
Cybersecurity experts have discovered two large language models, WormGPT 4 and KawaiiGPT, being used by inexperienced hackers to conduct advanced attacks. Learn more about the capabilities of these malicious LLMs and how they are empowering cybercriminals in this article.


Published: Fri Nov 28 07:27:27 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Temporary Malfunction: An Examination of a Web Service's Response to a Systemic Failure

A temporary technical glitch brought down a web service, prompting administrators to notify users and take corrective action. Will this incident serve as a valuable learning experience for the organization, or will it be just another hiccup on an otherwise smooth ride? Only time will tell.

Published: Fri Nov 28 07:32:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

GrapheneOS's Digital Dilemma: A Case Study in Cloud Sovereignty and Privacy Concerns

GrapheneOS has left French cloud provider OVHcloud over concerns about France's stance on digital privacy and sovereignty. The decision highlights the growing tensions surrounding data security, user autonomy, and national interests in the tech industry.

Published: Fri Nov 28 10:02:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The French Football Federation's Data Breach: A Cautionary Tale for the Sports World


The French Football Federation has disclosed a data breach after hackers exploited a compromised account to gain access to administrative management software used by over 1,400 member clubs. The breach, which occurred between October 2025 and January 2026, saw the attackers stealing personal and contact information from millions of individuals. As the FFF strengthens its security measures, the incident serves as a cautionary tale for organizations in need of robust cybersecurity protocols.

Published: Fri Nov 28 10:21:21 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Shai-Hulud 2.0: A Modern-Day Worm Attacks PostHog's JavaScript SDKs, Exfiltrating Sensitive Data

PostHog suffers massive security breach due to automated pull request; Shai-Hulud 2.0 worm compromises thousands of developer credentials.

Published: Fri Nov 28 10:38:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Legacy Python Bootstrap Scripts Exposed: Unveiling the Domain-Takeover Risk

Legacy Python Bootstrap Scripts Exposed: Unveiling the Domain-Takeover Risk

Published: Fri Nov 28 11:00:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korean Hackers Unleash Sophisticated Malware Campaign Targeting npm Registry


A recent surge in malicious activity on the npm registry highlights the evolving nature of cyber threats, as North Korean hackers deploy 197 packages to spread updated OtterCookie malware. This campaign underscores the need for increased vigilance and proactive measures to safeguard against such sophisticated attacks.

Published: Fri Nov 28 11:21:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Invisible Password: A Microsoft Windows Update Conundrum

Microsoft has revealed a Windows update conundrum where password login options become invisible on lock screens for users affected by the August 2025 KB5064081 non-security preview update. Users can work around this issue until Microsoft releases a fix, highlighting the need for software providers to prioritize stability and functionality.

Published: Fri Nov 28 12:15:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

French Soccer Federation Hit by Sophisticated Data Breach: A Looming Shadow on Cybersecurity


The French Soccer Federation was hit by a sophisticated data breach, resulting in the theft of sensitive member data. The organization has acknowledged the attack and expressed its commitment to protecting member data. Despite the relatively small amount of data stolen, the incident has sparked concerns about the organization's cybersecurity posture and highlights the ongoing threat posed by increasingly skilled and patient hackers.

Published: Fri Nov 28 16:42:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Staying Safe in a Surveillance-Ready World: Essential Strategies for Protecting Your Digital Life

Staying safe in a surveillance-ready world requires a proactive approach to online security and anonymity. By utilizing the right tools and strategies, individuals can maintain control over their digital lives and protect themselves against unwanted tracking and monitoring.

Published: Sat Nov 29 06:13:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Asahi Group Holdings Suffers Devastating Data Breach: 1.9 Million Individuals Impacted

Japanese beer giant Asahi Group Holdings has confirmed a severe data breach, leaving up to 1.9 million individuals exposed to potential identity theft and phishing attempts. The incident highlights the importance of robust cybersecurity measures for organizations handling sensitive customer data.

Published: Sat Nov 29 09:32:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The OtterCookie Malware Saga: A Comprehensive Analysis of the Contagious Interview Campaign's Expansive npm Package Distribution


The Contagious Interview campaign has expanded its malicious operations by distributing 197 new npm packages containing the OtterCookie malware. This comprehensive analysis delves into the campaign's infrastructure, tactics, and malware distribution methods, highlighting the growing threat landscape in the software development ecosystem.

Published: Sat Nov 29 19:58:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV: A Critical Security Alert for Industrial Control Systems



A critical security alert has been issued regarding OpenPLC ScadaBR due to the addition of CVE-2021-26829 to the Known Exploited Vulnerabilities (KEV) catalog. This cross-site scripting bug boasts a CVSS score of 5.4 and affects both Windows and Linux versions of the software. Industrial control systems are at risk, emphasizing the need for timely patching and proactive vulnerability management.

The development comes as threat actors continue to target industrial control systems using sophisticated TTPs. Hacktivist groups like TwoNet are increasingly exploiting vulnerabilities in these systems, highlighting the importance of staying informed about newly discovered vulnerabilities and applying patches in a timely manner.

As FCEB agencies require fixes for CVE-2021-26829 by December 19, 2025, for optimal protection, organizations operating industrial control systems must prioritize vulnerability management and implement robust security measures to mitigate these risks. The addition of this bug serves as a reminder that industrial control systems are critical infrastructure targets for malicious actors.

Stay informed about the latest vulnerabilities and apply patches in a timely manner to prevent potential breaches. Prioritize proactive security awareness and culture within your organization to ensure optimal protection against these evolving threats.

Published: Sun Nov 30 03:49:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Convergence of Cyber Threats: The Latest Security Breaches and Malware Campaigns


A Global Convergence of Cyber Threats: The Latest Security Breaches and Malware Campaigns explores the intricate web of cyber threats spread globally, shedding light on tactics employed by malicious actors to compromise sensitive information. This comprehensive overview highlights the need for robust cybersecurity measures, prioritizing data protection, and staying vigilant against emerging risks.

Published: Sun Nov 30 09:44:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unveiling the Shadows: A Deeper Dive into the Labyrinth of Modern Malware

Unveiling the Shadows: A Deeper Dive into the Labyrinth of Modern Malware

Published: Sun Nov 30 10:44:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Swiss Government's Banning of SaaS and Cloud Services for Sensitive Data: A Shift towards End-to-End Encryption

The Swiss government has banned the use of Software as a Service (SaaS) and cloud services for storing sensitive information due to security concerns, highlighting the growing awareness of the risks associated with SaaS and cloud services. The decision underscores the importance of end-to-end encryption and secure data handling practices.

Published: Sun Nov 30 18:18:39 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Tech Leaders Face Regulatory Scrutiny Over Fake Government Messages

Google and Apple ordered to prevent fake government messages from being displayed on their platforms, with significant fines at stake if they fail to comply. The move highlights growing regulatory oversight of social media platforms and sets a precedent for protecting users from malicious activities.

Published: Sun Nov 30 20:01:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Tomiris: A Sophisticated Cyber Threat Actor Evasion and Stealth in Modern Attacks


The rise of Tomiris, a sophisticated cyber threat actor, has been marked by its use of public services as command-and-control servers and spear-phishing emails targeting government entities and intergovernmental organizations in Russia. The attacks have leveraged a combination of reverse shells, custom implants, and open-source C2 frameworks to facilitate post-exploitation, highlighting the challenges faced by security professionals in detecting and responding to these threats.

Published: Mon Dec 1 00:05:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Albiriox MaaS Malware Unleashes Global On-Device Fraud Attacks


A new Android malware named Albiriox has been unleashed on the global market, targeting over 400 apps across various sectors including banking and financial technology. The malicious software-as-a-service (MaaS) model leverages advanced techniques such as dropper applications and packing to evade static detection, while also bypassing traditional authentication and fraud-detection mechanisms. With its extensive surveillance and data exfiltration capabilities, Albiriox poses a significant threat to individual users and organizations alike.

Published: Mon Dec 1 03:28:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Exploitation of OpenPLC ScadaBR: A Cautionary Tale of Cybersecurity Negligence


The U.S. CISA has added an OpenPLC ScadaBR flaw to its Known Exploited Vulnerabilities catalog, highlighting the ongoing concern for industrial control systems (ICS) and operational technology (OT) networks. The vulnerability allows attackers to deface the HMI login page and disable logs and alarms, posing a significant risk to critical infrastructure. Experts warn that organizations must prioritize cybersecurity measures to protect themselves against sophisticated attacks like this one.

Published: Mon Dec 1 03:45:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The French Football Federation Exposes Its Vulnerability to Cyber Attack: A Cautionary Tale for the Sports World

The French Football Federation has suffered a significant data breach due to a compromised account, exposing player data including names, addresses, and license numbers. The organization has taken proactive measures to address the breach and inform relevant authorities. This incident serves as a warning for sports organizations to prioritize cybersecurity and protect their members' sensitive information.

Published: Mon Dec 1 05:48:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ambitious Android Malware Emerges: Albiriox Threatens Banking and Financial Security


A new Android-based malware named Albiriox has emerged with advanced capabilities for on-device fraud and real-time control, making significant threats to financial institutions and their users. Its targeted nature across 400+ banking, fintech, crypto, and payment apps signify a concerning trend in mobile malware development.

Published: Mon Dec 1 05:56:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyber Monday Deals: Unpacking Eureka Vacuums' Black Friday Bonanza


This year's Cyber Monday has brought some impressive deals on top-notch cleaning products from Eureka Vacuums. In this article, we will delve into the details of their latest Black Friday and Cyber Monday offers, exploring the features and benefits of each model, as well as the factors that make them stand out in a crowded market.

Published: Mon Dec 1 06:10:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Agentic Trojan Horse: Unleashing a New Era of Cybersecurity Threats


The emergence of "agentic" AI browsers has sent shockwaves through the cybersecurity community, posing a significant threat to enterprise security. As these new browsers gain traction, security teams must develop new strategies to detect and prevent malicious activity. Learn how in our latest article: The Agentic Trojan Horse: Unleashing a New Era of Cybersecurity Threats

Published: Mon Dec 1 06:18:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A World on High Alert: The Looming Threats to Cybersecurity

As the threat landscape continues to evolve, it's crucial to stay informed about the latest security concerns and take proactive measures to protect yourself and your organization.

Published: Mon Dec 1 07:53:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Coupang's Cybersecurity Nightmare: A Data Breach of Epic Proportions

South Korea's largest e-commerce platform, Coupang, has admitted to a massive data breach that exposed the personal details of 33.7 million customers, leaving the company's reputation in tatters and raising concerns about the cybersecurity measures in place at the retailer.

Published: Mon Dec 1 08:03:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Flock's Surveillance AI: A Globalized Labor Force Behind a Looming Shadow of Privacy Concerns

Flock, a company that has become ubiquitous in American communities, has been using overseas gig workers to train its machine learning algorithms for surveillance purposes. This revelation raises significant concerns about who will have access to footage collected by Flock's cameras and whether the use of such labor perpetuates exploitation and undermines local job markets.

Published: Mon Dec 1 08:11:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Dutch Study Reveals Teenage Cybercrime is Mostly a Phase: A Phased Approach to Understanding Adolescent Offending

Dutch researchers have discovered that teenage cybercrime is largely a phase, with most offenders ceasing their activities by the age of 20. The study provides valuable insights into the nature and trajectory of adolescent offending, with implications for prevention and reduction strategies.

Published: Mon Dec 1 09:09:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Massive Malicious Browser Extension Operation: Unpacking the ShadyPanda Campaign


In a disturbing discovery, Koi Security has found that a malicious operation known as "ShadyPanda" has been amassing over 4.3 million installations on Chrome and Edge platforms. This campaign involves the gradual introduction of additional malicious functionality to initially legitimate browser extension tools, resulting in significant financial gains for the attackers through affiliate fraud and other means.

Published: Mon Dec 1 09:19:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Fake Worker Phenomenon: A Growing Threat to Organizations Worldwide


The Fake Worker Phenomenon: A Growing Threat to Organizations Worldwide
A new threat is emerging in the digital landscape, involving malicious actors impersonating trusted professionals to gain access to organizations' sensitive systems and data. This insidious threat requires robust HR practices, advanced technical controls, and continuous security awareness training to mitigate its impact.

Published: Mon Dec 1 09:43:21 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Pre-Installation Predicament: India's Latest Foray into Cybersecurity through Sanchar Saathi App

India has ordered phone makers to pre-install a government-backed app on all new phones within 90 days, marking the latest move in its efforts to bolster national security and combat telecom fraud. The directive bears striking resemblance to Russia's recent legislation mandating the pre-installation of a government-backed messaging app on all devices sold in the country.

Published: Mon Dec 1 12:16:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

ShadyPanda's Web of Deceit: A Seven-Year-Long Campaign of Browser Spyware


ShadyPanda's Web of Deceit: A Seven-Year-Long Campaign of Browser Spyware reveals the cunning tactics used by ShadyPanda to turn browser extensions into instruments of surveillance. The campaign amassed over 4.3 million installations and highlights the importance of maintaining vigilance when it comes to browser security and user privacy.

Published: Mon Dec 1 12:27:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Malicious Update: A Vulnerability in SmartTube YouTube App Exposes Android TV Devices to Security Risks



The popular open-source SmartTube YouTube client for Android TV was compromised after an attacker gained access to the developer's signing keys, leading to a malicious update being pushed to users. The breach has raised concerns about potential security risks and the importance of developers prioritizing their users' safety and security.



Published: Mon Dec 1 13:21:09 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malicious Browser Extensions: A Stealthy Threat to User Privacy

Malicious browser extensions have infected millions of users with malware, including backdoors and spyware. The ShadyPanda campaign highlights a problem in the way browser extension marketplaces manage approved extensions, and emphasizes the need for more stringent monitoring and testing procedures to prevent similar attacks in the future.

Published: Mon Dec 1 13:34:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Australian Man Sentenced to 7+ Years for Airport and In-Flight Wi-Fi Attacks



An Australian man has been sentenced to over seven years in prison for carrying out a series of malicious Wi-Fi attacks at airports and on flights. The attacks targeted sensitive information such as email and social media credentials, and were carried out by Michael Clapsis using "evil twin" Wi-Fi networks that tricked users into connecting to fake hotspots. Clapsis has been charged with multiple counts of unauthorized access and data theft, and faces a maximum sentence of 23 years in prison. The sentencing marks a significant victory for law enforcement agencies and highlights the need for continued innovation in cybersecurity measures and awareness campaigns to prevent similar attacks.

Published: Mon Dec 1 14:45:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Resurgence of Glassworm: A Third Wave of Malicious VS Code Packages Raises Alarms Among Developers

Glassworm malware has returned to its third wave, with new malicious VS Code packages making their way onto the OpenVSX and Microsoft Visual Studio marketplaces. This latest iteration of the malware is notable for its use of "invisible Unicode characters" to hide its code from review, as well as its sophisticated techniques for stealing sensitive information from developers' environments.

Published: Mon Dec 1 15:13:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Home Users Desperate to Hack Their Way to Better Voice Assistant Experience

Google Home users who have been waiting for the Gemini upgrade are getting desperate, attempting to hack their way into getting the supposedly upgraded voice assistant onto their devices. Will this hack work, or is Google still trailing behind the competition in terms of smart home AI? Stay tuned as we continue to monitor developments and updates on the Gemini for Home update.

Published: Mon Dec 1 16:02:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Laundering in the Shadows: The Fall of Cryptomixer, a Service Used to Launder Cybercrime Proceeds


Law enforcement has finally shut down Cryptomixer, a service used to launder cybercrime proceeds, in a major operation called Operation Olympia. The takedown resulted in the seizure of over $29M in Bitcoin and highlights the efforts of law enforcement agencies around the world in their fight against cybercrime and money laundering.

Published: Mon Dec 1 18:49:27 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

India Mandates Government App Installation on Smartphones: A Growing Concern for Data Security

India's government has issued a directive requiring all smartphone manufacturers to install a government-approved app, Sanchar Saathi, on every handset sold in the country, sparking debate about data security and user privacy.

Published: Mon Dec 1 21:37:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

India's Pre-Installation Mandate: A New Era in Telecom Security

India has ordered major mobile device manufacturers to pre-install a government-backed cybersecurity app on all new phones within 90 days, in an effort to safeguard citizens from buying non-genuine handsets and tackle telecom fraud. The move comes as India joins the ranks of countries like Russia, which have mandated pre-installation of homegrown security apps to combat similar threats.

Published: Tue Dec 2 00:58:52 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Android Security Flaws: Google Patches 107 Vulnerabilities


New Android Security Flaws: Google Patches 107 Vulnerabilities
Google has released a new monthly security update for the Android operating system, which addresses a total of 107 security flaws. The patch includes fixes for two high-severity vulnerabilities that have been exploited in the wild, including CVE-2025-48633 and CVE-2025-48572. Users are recommended to update their devices to the latest patch level as soon as possible.


Published: Tue Dec 2 02:15:19 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google's Latest Android Security Update Addresses Two Actively Exploited Flaws

Google's latest Android security update addresses two actively exploited flaws in the Framework component, as well as several critical vulnerabilities in the kernel and closed-source components. This update is a must-have for all Android users to protect their devices from exploitation.

Published: Tue Dec 2 04:48:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Revolutionary Approach to Vulnerability Management: SecAlerts

SecAlerts revolutionizes vulnerability management by delivering actionable intelligence and risk analytics to security teams worldwide, empowering them to stay ahead of emerging threats and protect their organizations from costly breaches.

Published: Tue Dec 2 06:03:20 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Korea's Cybersecurity Woes: The Coupang Data Breach Exposes 34 Million Customers

South Korea’s leading e-commerce platform, Coupang, has disclosed a significant data breach that exposed the personal information of nearly 34 million customers. The incident serves as a stark reminder of the growing cybersecurity threats in South Korea and the need for robust measures to protect sensitive customer data.

Published: Tue Dec 2 06:46:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The University of Pennsylvania's Data Breach: A Growing Concern for Higher Education Institutions


The University of Pennsylvania has confirmed a new data breach following an attack on its Oracle E-Business Suite servers. The attackers stole documents containing personal information from the platform in August 2025, exploiting a previously unknown zero-day flaw. This incident is part of a larger extortion campaign by Clop's ransomware gang, which has targeted numerous organizations worldwide.

Published: Tue Dec 2 07:11:20 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Awareness of AI's Vulnerability: Researchers Uncover Syntactic-Domain Spurious Correlations in Language Models

A new study reveals that large language models may be vulnerable to "syntax hacking," where they prioritize grammatical patterns over actual meaning. This phenomenon can lead to incorrect responses and security vulnerabilities, highlighting the need for continued research into these powerful AI tools.

Published: Tue Dec 2 08:11:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The FTC's Stern Warning: Illumination of Education's Data Breach and the Need for Edtech Companies to Prioritize Student Privacy

FTC slaps edtech vendor after breach exposes 10M students, demanding changes but no fines or criminal charges.

Published: Tue Dec 2 08:25:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Layer of Deception: MuddyViper Backdoor Exposed by Iranian Nation-State Actors


Iranian nation-state actors have been using a previously undocumented backdoor called MuddyViper to carry out targeted attacks against Israeli entities. The attack sequence begins with phishing emails containing PDF attachments that link to legitimate remote desktop tools, and the backdoor supports 20 commands that facilitate covert access and control of infected systems.


Published: Tue Dec 2 08:54:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google's Decisive Action: Patches 107 Android Flaws, Including Two Zero-Day Vulnerabilities


Google has released a comprehensive patch for 107 vulnerabilities in its Android operating system, including two high-severity zero-day exploits that have been actively targeted by attackers. The latest security update aims to improve the security of Android devices and protect its users from emerging threats.

Published: Tue Dec 2 09:02:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Kensington and Chelsea Council Data Breach: Unraveling the Web of Vulnerability


Kensington and Chelsea Council data breach: A tangled web of shared IT systems and sensitive information


Published: Tue Dec 2 09:28:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercrime's Subscription Economy: A Shift Towards Renting Tools, Access, and Infrastructure

Cybercrime's subscription economy has transformed the way attackers rent tools, access, and infrastructure for malicious purposes. With advanced phishing tools, infostealer logs, and access brokers available at affordable prices, defenders are facing a new and significant challenge in staying one step ahead of these cybercriminals.

Published: Tue Dec 2 09:58:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Rogue Cyber Operatives: The Lazarus Group's Remote-Worker Scheme Exposed

Rogue Cyber Operatives: The Lazarus Group's Remote-Worker Scheme Exposed reveals how North Korean cyber espionage entity Lazarus Group was able to infiltrate Western companies through fake job postings and remote IT workers. Read more about this complex threat operation exposed on camera.

Published: Tue Dec 2 10:14:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

GlassWorm's Destructive Supply Chain Campaign Spreads Malicious Extensions Across Multiple Developer Platforms


GlassWorm, a notorious supply chain campaign known for its malicious activities, has reared its head once again with a devastating wave of 24 extensions impersonating popular developer tools and frameworks. The latest iteration of this campaign saw the attackers infiltrate both Microsoft Visual Studio Marketplace and Open VSX, two prominent platforms used by developers worldwide. To learn more about GlassWorm's destructive supply chain campaign and how it affects developers, read the full article.

Published: Tue Dec 2 10:36:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malicious npm Package Exposes Vulnerability in AI Security Tools



Malicious npm packages have long been a source of concern for cybersecurity experts, as they can easily be uploaded to popular package repositories and spread like wildfire, bringing harm to unsuspecting users. Recently, a malicious npm package was discovered that attempts to influence artificial intelligence (AI)-driven security scanners, highlighting the ongoing cat-and-mouse game between threat actors and AI security tools. A new malicious package has been found to expose vulnerabilities in AI security tools, emphasizing the need for continued vigilance in the software supply chain.

Published: Tue Dec 2 10:51:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

MuddyWater's Latest Strike: Unpacking the Advanced MuddyViper Malware



In a recent series of attacks, MuddyWater has demonstrated its capabilities by targeting multiple sectors in Israel and one confirmed target in Egypt. The attackers have used advanced tools, including a custom-made loader called Fooder, to deploy their malware, dubbed MuddyViper. This article provides an in-depth analysis of the latest campaign, exploring the tactics, techniques, and procedures (TTPs) employed by MuddyWater and what they reveal about the group's evolving approach.

Published: Tue Dec 2 11:01:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Takedown of Cryptomixer: A Global Effort to Combat Cybercrime and Cryptocurrency Laundering



The takedown of Cryptomixer marks a significant victory in the global fight against cybercrime and cryptocurrency laundering. Europol's Operation Olympia resulted in the seizure of €25 million in Bitcoin and 12 terabytes of data, as well as the shutdown of three Swiss servers and the cryptomixer.io domain. This operation is a major milestone in Europol's efforts to combat cryptocurrency laundering services, highlighting the importance of cooperation between law enforcement agencies worldwide.

Published: Tue Dec 2 11:12:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Growing Concerns of Cybersecurity Breaches: A Look into Clop's Oracle EBS Raids


Clop's brazen approach to breaching Oracle's E-Business Suite has left many organizations scrambling to patch their systems and protect sensitive data. As more high-profile breaches emerge, it is becoming clear that these exploits are not isolated incidents, but rather part of a larger pattern of coordinated cyber attacks. Learn more about the growing concerns of cybersecurity breaches in this exclusive report.

Published: Tue Dec 2 12:01:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Indian Government Cracks Down on Messaging App Fraud: A New Era of SIM-Based Security

India has taken a tough stance against messaging app fraud by requiring all communication service providers to link users' mobile numbers with their SIM cards. This move is aimed at combating phishing, scams, and cyber fraud, which have become increasingly prevalent in India.

Published: Tue Dec 2 12:59:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Patches High-Severity Android Zero-Days as Holiday Season Brings Early Christmas for Attackers

Google has released its December Android security bulletin, highlighting several high-severity vulnerabilities that have been patched. The release serves as a reminder of the importance of keeping software up-to-date and taking steps to protect against known vulnerabilities.

Published: Tue Dec 2 13:15:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Dev Secret Leak: Shai-Hulud 2.0 NPM Malware Attack Exposes Over 400,000 Sensitive Secrets


The Shai-Hulud 2.0 NPM malware attack has exposed over 400,000 sensitive secrets belonging to developers worldwide, highlighting the growing threat of supply chain attacks in the software development industry. As experts warn, this type of attack could have been prevented if infected packages had been identified and neutralized earlier on.

Published: Tue Dec 2 13:34:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Android Framework Flaws: A Growing Concern for Cybersecurity

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added Android Framework flaws to its Known Exploited Vulnerabilities catalog, highlighting the growing concern over the security of Android devices. Two high-severity vulnerabilities have been identified, which were found in the Android Framework and are currently under limited, targeted exploitation.

Published: Tue Dec 2 15:43:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Korea Cracks Down on Cybercrime Syndicates: A Glimpse into the Dark World of Hacked IP Cameras


In a significant move, Korea's National Police have arrested four individuals suspected of hacking over 120,000 IP cameras across the country and selling stolen footage to a foreign adult site. The operation highlights the growing problem of hacked IP cameras and the need for individuals to take proactive steps to safeguard themselves against cyber threats.

Published: Tue Dec 2 15:55:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia's Nuclear Deterrent Woes: The Sarmat Missile's Troubling Track Record



A recent test launch of Russia's RS-28 Sarmat missile has failed, raising concerns about the stability and reliability of Moscow's nuclear deterrence capabilities. The incident highlights the need for greater transparency and accountability within Russia's military-industrial complex and underscores the imperative to address technical issues that threaten the country's ability to project power.



Published: Tue Dec 2 18:11:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

MuddyViper: The Latest Chapter in Iranian Nation-State Hackers' Campaign to Exploit Global Vulnerabilities

Iranian nation-state hackers have employed the MuddyViper backdoor in targeted attacks against Israeli entities across various sectors, as part of a broader campaign by Iranian group known as MuddyWater (aka Mango Sandstorm or TA450). This latest development highlights the sophistication and adaptability of Iranian APT groups, emphasizing the importance of robust cybersecurity measures to prevent such breaches.

Published: Tue Dec 2 20:42:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The GPS Spoofing Threat to India's National Security: A Growing Concern for the Country's Airports

The Indian government has confirmed that eight major airports in the country have been subjected to GPS spoofing and jamming incidents since 2023. This revelation highlights the importance of securing critical infrastructure such as airports and underscores the need for vigilance and proactive measures to prevent such incidents from occurring in the future.

Published: Tue Dec 2 21:07:42 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Attack on Japanese E-Tailer Askul: A Wake-Up Call for E-Commerce Security


A Japanese e-tailer has been hit by a ransomware attack, leaving its online sales crippled for nearly five weeks. The company's Warehouse Management System was compromised, forcing it to suspend logistics services and shut down its website. Askul's experience highlights the importance of robust cybersecurity measures in e-commerce businesses.

Published: Wed Dec 3 00:56:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Rebound: The Bittersweet Story of Japan's E-tailer, Askul


A Japanese e-commerce company has resumed partial sales on its platform 45 days after a devastating ransomware attack, highlighting the complex challenges faced by organizations in their post-attack recoveries. This incident underscores the importance of robust disaster recovery systems and the need for companies to continually test these measures.

Published: Wed Dec 3 01:10:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Pickle-Specific Security Flaws Exposed: A Glimpse into the Unseen Risks of Machine Learning

Picklescan, a widely used tool for detecting suspicious imports or function calls in Python pickle files, has been found to be vulnerable to critical security flaws. The three identified vulnerabilities could potentially allow malicious actors to execute arbitrary code by loading untrusted PyTorch models, effectively bypassing the tool's protections.

Published: Wed Dec 3 03:49:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadowy World of Malicious Rust Crates: Unpacking the Threats to Web3 Developers


Malicious Rust crates have targeted Windows, macOS, and Linux systems, delivering OS-specific malware via vulnerabilities in the Ethereum ecosystem. The packages were downloaded thousands of times before being removed from a repository due to their malicious nature. Learn more about this emerging threat vector and how developers can protect themselves.

Published: Wed Dec 3 04:06:03 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

India Mandates SIM-Linked Messaging Apps to Combat Rising Fraud Scams


India has mandated that all providers of messaging apps work only with active SIM cards linked to users' phone numbers to curb phishing, scams, and cyber-fraud. The new rule comes as part of the Department of Telecommunications (DoT) efforts to combat rising fraud scams on messaging platforms. By implementing this measure, India aims to provide greater protection for its citizens against SIM-based phishing and other types of cyber-fraud.

Published: Wed Dec 3 04:12:57 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Windows 11 Adoption Slows as Enterprises Cling to Windows 10 Despite End-of-Support Push

Windows 11 adoption has been slower than expected, particularly among enterprises, due to the challenges of transitioning from older versions of Windows 10. With the end-of-support push for many versions of Windows 10 looming, it remains to be seen how Microsoft's latest operating system will gain traction in the market.

Published: Wed Dec 3 06:57:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Industrialization of Cybercrime: How AI Tools are Redefining Phishing Attacks

Artificial intelligence-powered phishing tools are redefining the threat landscape of cybercrime, making it increasingly challenging for organizations to detect and respond to attacks. A recent webinar exposed the latest AI-powered phishing tools and highlighted the need for a proactive approach to identity protection and defense strategy shifts.

Published: Wed Dec 3 07:04:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

AI in Cybersecurity: From Disruptive Technology to Strategic Advantage



AI is transforming the way security professionals work, but it's not a replacement for human judgment and creativity. Instead, it's a tool that needs to be understood and harnessed to achieve better outcomes. By building or tuning their own AI-assisted workflows, security professionals can regain influence over the logic shaping their environment and make more informed decisions.



Published: Wed Dec 3 07:12:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The University of Phoenix Joins a Growing List of U.S. Universities Breached in Clop Data Theft Campaign

The University of Phoenix has joined a growing list of U.S. universities breached in a Clop data theft campaign targeting vulnerable Oracle E-Business Suite instances in August 2025, exposing sensitive personal and financial information belonging to students, staff, and suppliers.

Published: Wed Dec 3 07:50:33 2025 by llama3.2 3B Q4_K_M










© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us