LastPass is warning of a new phishing campaign disguised as a maintenance notification from the service, asking users to back up their vaults in the next 24 hours. [...]
Threat actors are exploiting misconfiguredΒ web applications used for security training and internal penetration testing, such as DVWA, OWASP Juice Shop, Hackazon, and bWAPP, to gainΒ access to cloud environments of Fortune 500 companies and security vendors. [...]
A critical-severity vulnerability in the Advanced Custom Fields: Extended (ACF Extended) plugin for WordPress can be exploited remotely by unauthenticated attackers to obtain administrative permissions. [...]
The recently discovered cloud-focused VoidLink malware framework is believed to have been developed by a single person with the help of an artificial intelligence model. [...]
Using only natural language instructions, researchers were able to bypass Google Gemini's defenses against malicious prompt injectionΒ and create misleading events to leak private Calendar data. [...]
A malvertising campaign is using a fake ad-blocking Chrome and Edge extension namedΒ NexShieldΒ that intentionally crashes the browser in preparation for ClickFix attacks. [...]
Ransomware attackers targeting a Fortune 100 company in the finance sector used a new malware strain, dubbed PDFSider, to deliver malicious payloads on Windows systems. [...]
The U.K. government is warning of continued malicious activity from Russian-aligned hacktivist groups targeting critical infrastructure and local government organizations in the country in disruptive denial-of-service (DDoS) attacks. [...]
The Canadian Investment Regulatory Organization (CIRO) confirmed that the data breach it suffered last year impacts about 750,000 Canadian investors. [...]
Another set of 17 malicious extensions linked to the GhostPoster campaign hasΒ been discovered in Chrome, Firefox, and Edge stores, where they accumulated a total ofΒ 840,000 installations. [...]
A cross-site scripting (XSS) flaw in the web-based control panel used by operators of the StealC info-stealing malware allowed researchers to observe active sessions and gather intelligence on the attackers' hardware. [...]
The identity of theΒ Black Basta ransomware gang leader has been confirmed by law enforcement in Ukraine and Germany, and the individual has been added to the wanted list of Europol and Interpol. [...]
An advanced threat actor tracked as UAT-8837 and believed to be linked to China has been focusing on critical infrastructure systems in North America, gaining access by exploiting both known and zero-day vulnerabilities. [...]
The Gootloader malware, typically used for initial access, is now using a malformed ZIP archive designed to evade detection by concatenating up to 1,000 archives. [...]
Hackers are actively exploiting a maximumΒ severity flaw in the Modular DS WordPress plugin that allows them to bypass authentication remotely and access the vulnerable sites withΒ admin-level privileges. [...]
Microsoft announced thatΒ the Copilot Studio extension for the Visual Studio Code (VS Code) integrated development environment is now available to all users. [...]
The Kyowon Group (Kyowon), a South Korean conglomerate, disclosed that a cyberattack has disrupted its operations and customer information may have been exposed in the incident. [...]
The French data protection authority (CNIL) has imposed cumulative fines of β¬42 million on Free Mobile and its parent company, Free, for inadequate protection of customer data against cyber threats. [...]
Technical details and a public exploit have been published for a critical vulnerability affectingΒ Fortinet's Security Information and Event Management (SIEM) solution that could be leveraged by a remote, unauthenticated attacker to execute commands or code. [...]
Researchers identified an attack method dubbed "Reprompt" that could allow attackers to infiltrate a user's Microsoft Copilot session and issue commands to exfiltrate sensitive data. [...]