Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Chrome Releases Crit ...

 Firewall Daily

Google has rolled out a new security update for Chrome users, following the discovery of a vulnerability, CVE-2025-2783, affecting the Windows version of the browser. The update was made available on Tuesday, March 25, 2025, as part of the Stable Channel Update for Desktop. This release includes a crucial fix for the   show more ...

vulnerability and will be gradually deployed to users in the coming days and weeks.  Details of the Stable Channel Update  The updated version of Chrome for Windows is 134.0.6998.177/.178, which addresses the critical issue identified as CVE-2025-2783. The vulnerability arises from an incorrect handle provided in unspecified circumstances within the Mojo component on Windows, leaving users exposed to potential attacks.  Google has confirmed that an exploit for this security flaw has already been detected in the wild. As part of the company’s response, it has made this emergency update available to users as soon as possible. While the update will be rolled out over the next few days and weeks, users are encouraged to manually check for updates and restart their browsers once the fix is installed to ensure they are fully protected.  Impact of CVE-2025-2783  CVE-2025-2783 is a high-severity vulnerability that could lead to various security risks, including potential system compromise. The flaw is associated with Mojo, a library used within Chrome, which is critical for handling inter-process communication. Attackers could exploit this weakness to execute arbitrary code or carry out other malicious activities on affected systems.  The Chrome update addresses this issue by fixing the improper handling of the Mojo component, effectively closing the door to any exploitation of CVE-2025-2783. This patch highlights the ongoing vulnerability management to maintain the browser’s security by addressing security flaws. Google has issued a reminder to users to remain cautious while browsing the web, particularly when dealing with emails and suspicious links. The company emphasized the critical importance of avoiding seemingly innocent clicks, as they can lead to the exploitation of vulnerabilities such as CVE-2025-2783. With the rise of AI-powered attacks becoming more sophisticated and harder to detect, users are urged to stay vigilant to ensure their systems remain secure. These attacks often rely on human error, such as clicking on a malicious link, which can open the door for exploits that take advantage of vulnerabilities like the one recently discovered in Chrome. Conclusion In response to these growing threats, Google released this update to help users fix their Chrome browsers. The release of this update highlights how quickly potential exploits can emerge and the impact they can have on users' security. However, while Google has rolled out the update, it is ultimately the responsibility of users to ensure they install the update as soon as it becomes available.

image for Malaysia Braces for  ...

 Cyber News

Since the start of 2025, a series of major cybersecurity incidents have been observed in Malaysia, including ransomware attacks, unauthorized intrusions, the spread of the SparkCat malicious app, data breaches, scam calls, and WhatsApp impersonation scams. Between January and February 2025, Cyber999 recorded 1,029   show more ...

reported cyber incidents. The most frequently reported cases include fraud, content-related breaches (data leaks), malicious software infections, intrusions, and intrusion attempts. As Malaysians prepare for the festive celebrations of Hari Raya Aidilfitri, CyberSecurity Malaysia’s Cyber999 Incident Response Centre has issued an advisory to system administrators and internet users to warn and guide Malaysians on necessary precautions to mitigate such cyber threats. Given the increased risk of cyber threats during festive periods, Cyber999 urges system administrators and internet users to remain vigilant. Hackers often take advantage of reduced monitoring and weakened defenses during holiday breaks to launch cyberattacks. The advisory highlights the need for enhanced security strategies to minimize risks. Recommendations for System Administrators in Malaysia System administrators play an important role in safeguarding digital infrastructure against cyber threats. Cyber999 recommends the following best practices: Keep Systems Updated: Ensure that all operating systems, applications, and third-party add-ons are updated with the latest security patches. Upgrade Legacy Software: If running older software versions, upgrade to the latest versions to prevent exploitation of known vulnerabilities. Use Reliable Security Sources: Refer to vendors’ official websites or Cyber999’s security advisories for the latest updates. Enhance Anti-Virus Protection: Ensure that antivirus software on all hosts and email gateways is updated with the latest signature files. Check System Configurations: Proper system configuration helps prevent issues such as unintended information disclosure and unauthorized directory access. Enable System Logging: Keep system logging activated to track and analyze potential security breaches. Perform Regular Backups: Back up all critical information daily and store copies offline in a secure location. Implement a Multi-Layered Defense Strategy: Use firewalls, Intrusion Prevention Systems (IPS), and Intrusion Detection Systems (IDS) to detect and prevent cyberattacks. Advice for Financial Institutions With financial transactions at their peak during the festive season, financial institutions must adopt stringent security measures to counter phishing scams and fraudulent activities. Cyber999 advises: Educating Customers: Banks should actively educate their customers on safe browsing, email security, and secure internet banking practices. Strengthening Security Infrastructure: Institutions must ensure robust cybersecurity frameworks to detect and mitigate online fraud attempts. Updating Contact Information: Make system administrators’ contact details accessible in case of emergency security incidents. Precautions for Home Users Home users are also at risk of cyber threats, particularly from phishing scams and malware infections. Cyber999 provides the following recommendations: Update Devices and Software: Regularly update PCs, browsers, and applications with the latest security patches. Install and Maintain Antivirus Software: Ensure that antivirus programs are installed and updated to detect new viruses and malware. Exercise Caution Online: Avoid clicking on links or opening attachments from unknown sources on social media and emails. Be Aware of Online Scams: Stay informed about the latest online scams targeting internet users. Backup Important Data: Regularly back up critical data and store copies offline to mitigate the impact of potential data loss. CyberSecurity Malaysia encourages individuals and organizations to report any cybersecurity incidents through its Cyber999 reporting channels. The 24/7 On-Call Incident Reporting service remains operational during the festive season to assist with urgent cybersecurity threats. Final Thoughts Staying informed and proactive is key to safeguarding Malaysia’s digital landscape. The Cyber Incident Quarterly Summary Report for Q4 2024 provides a comprehensive analysis of reported security incidents, offering insights into threat trends, attack categories, and key security advisories. While it does not measure financial losses, it serves as an essential resource for understanding the nation’s cybersecurity challenges. With cybercriminals exploiting vulnerabilities across various sectors, preventive measures are no longer optional—they are critical. Cyber999 urges all stakeholders, including system administrators, businesses, financial institutions, and everyday internet users, to adopt security practices, update their systems regularly, and stay vigilant against emerging threats. By nurturing a culture of cybersecurity awareness and preparedness, Malaysians can better protect their personal and organizational data—ensuring a safer, more secure digital environment for all, even as they celebrate Hari Raya Aidilfitri with peace of mind.

image for Defense Contractor M ...

 Compliance

Morse Corp Inc., a Massachusetts-based defense contractor, has agreed to pay $4.6 million to resolve allegations of cybersecurity fraud under the False Claims Act. The U.S. Department of Justice announced the settlement, claiming that the company misrepresented its compliance with federal cybersecurity standards while   show more ...

working on contracts with the Departments of the Army and Air Force. Morse Corp Allegations and Legal Proceedings The case began in January 2023 when a whistleblower, Kevin Berich, filed a qui tam lawsuit against Morse Corp under the False Claims Act. The DOJ joined the case in March 2023, accusing the company of violating the Defense Federal Acquisition Regulation Supplement (DFARS) clauses. These regulations mandate that contractors adhere to the cybersecurity standards outlined in the National Institute of Standards and Technology (NIST) Special Publication 800-171. The DOJ's investigation revealed that from January 2018 to September 2022, Morse Corp used a third-party service to host its emails without ensuring compliance with the FedRAMP Moderate baseline—a critical cybersecurity requirement for handling covered defense information. The company also failed to implement the required cybersecurity controls from NIST SP 800-171, which protect controlled unclassified information from unauthorized access. Misrepresentation of Cybersecurity Compliance According to the settlement agreement, Morse Corp submitted a misleading score of 104 on its cybersecurity assessment to the Department of Defense’s Supplier Performance Risk System (SPRS) in January 2021. However, an independent evaluation in July 2022 revealed a significantly lower score of -142, indicating that the company had only implemented 22% of the required controls. Despite this discovery, Morse Corp failed to update its score until June 2023. The settlement document also detailed that the defense contractor lacked a consolidated cybersecurity plan outlining system boundaries, operational environments, and connections to other networks. These oversights exposed sensitive defense data to potential exploitation and unauthorized access, violating its contractual obligations. Also Read: US Department of Defense Contractor Targeted by Donut Ransomware Financial Penalties and Whistleblower Award As part of the settlement, Morse Corp will pay $4.6 million, including $2.3 million as restitution. The whistleblower, Kevin Berich, will receive 18.5% of the total settlement amount for bringing the case to light. The agreement also requires Morse Corp to cover $198,616 in legal fees for Berich’s attorneys. “Failure to implement cybersecurity requirements can have devastating consequences, leaving sensitive DoD data vulnerable to cyber threats and malicious actors,” said Special Agent William Richards of the Air Force Office of Special Investigations (AFOSI). “(We) will continue to combat fraud affecting the Department of the Air Force and hold those accountable that fail to properly safeguard sensitive defense information.” Implications for Defense Contractors The settlement serves as a warning to defense contractors about the consequences of misrepresenting cybersecurity compliance. The DOJ emphasized that ensuring cybersecurity standards is not a procedural formality but a critical element of national security. Experts suggest that the case could lead to stricter enforcement of cybersecurity regulations and increased scrutiny of defense contractors. The outcome may prompt more whistleblowers to report non-compliance, given the significant financial incentives under the False Claims Act.

image for AI-Powered Productiv ...

 Cyber News

Generative AI (GenAI) has quickly become a core in enterprise environments, but with its growing adoption comes significant security concerns. A recent report highlights 30-fold increase in the volume of data—including sensitive corporate information—being fed into GenAI applications over the past year. The   show more ...

findings highlights the urgent need for businesses to reevaluate their security strategies as AI-driven tools become embedded in daily workflows. The report reveals that enterprise users are increasingly sharing sensitive data such as source code, regulated information, passwords, and intellectual property with GenAI applications. Adding to the challenge, 72% of enterprise users access GenAI apps using personal accounts rather than company-managed platforms. This growing trend of "shadow AI"—akin to the earlier shadow IT phenomenon—poses a major governance issue for security teams. Without proper oversight, businesses lack visibility into what data is being shared and where it is going, creating potential entry points for cyber threats. The Scope of AI Integration in Enterprises The report provides a comprehensive analysis of AI usage in the workplace, showing that 90% of organizations have adopted dedicated GenAI applications, while an even higher 98% are using software that integrates AI-powered features. Though only 4.9% of employees use standalone AI apps, a staggering 75% interact with AI-powered features in other enterprise tools. Security teams now face a new and evolving challenge: the unintentional insider threat. Employees may not realize the risks of sharing proprietary information with AI-driven platforms, making it essential for organizations to enforce strict data security measures. Shadow AI and Its Implications One of the report’s key findings is that shadow AI has become the primary shadow IT concern for organizations. Employees using personal accounts to interact with AI models mean businesses have little to no control over how their data is being processed, stored, or leveraged by third-party providers. The unregulated use of AI tools leaves companies vulnerable to data exfiltration and regulatory non-compliance. Organizations are increasingly adopting strict policies to mitigate these risks, with many choosing to block unapproved AI applications altogether. Security teams are also implementing Data Loss Prevention (DLP) solutions, real-time user coaching, and access controls to limit the risk of exposure. How Data is Being Exposed to AI The report identifies two main ways sensitive enterprise data is making its way into GenAI applications: Summarization Requests: Employees rely on AI tools to condense large documents, datasets, and source code. This increases the likelihood of exposing proprietary information to external AI systems. Content Generation: AI-powered applications are commonly used to generate text, images, videos, and code. When users input confidential data into these tools, they risk exposing sensitive details that could be used to train external models, leading to unintended data leaks. The Challenge of Early AI Adoption The rapid proliferation of AI apps has created an unpredictable security landscape. The report finds that early adopters of new AI tools are present in nearly every enterprise, with 91% of organizations containing users who experiment with newly released GenAI applications. This poses a security risk, as employees may unknowingly share proprietary data with unvetted platforms. To contend this issue, many businesses are taking a "block first, ask questions later" approach. Instead of trying to keep pace with the constant influx of new AI tools, they opt to preemptively block all unapproved applications while allowing only a vetted selection of AI services. This proactive approach minimizes the risk of sensitive data exposure and allows security teams to conduct proper evaluations before approving new tools. The Shift to Local AI Infrastructure A notable trend highlighted in the report is the increasing deployment of GenAI infrastructure within enterprises. Over the past year, the number of organizations running AI models locally has jumped from less than 1% to 54%. While this shift helps reduce reliance on third-party cloud providers and mitigates some external data leakage risks, it introduces new challenges. Local AI deployments come with their own security concerns, including supply chain vulnerabilities, data leakage, improper data output handling, and risks related to prompt injection attacks. To address these issues, organizations must strengthen their security posture by implementing best practices outlined in frameworks such as: The OWASP Top 10 for Large Language Model Applications The National Institute of Standards and Technology (NIST) AI Risk Management Framework The MITRE ATLAS framework for AI threat assessment A CISO’s Perspective on AI Security As AI-driven cyber threats evolve, Chief Information Security Officers (CISOs) are increasingly looking to existing security tools to help mitigate risks. Nearly all enterprises are now implementing policies to control AI tool access, limiting what data can be shared and which users can interact with specific AI applications. The report suggests that organizations should take the following tactical steps to strengthen their AI security strategies: Assess AI Usage: Identify which GenAI apps and infrastructure are in use, who is using them, and how they are being utilized. Implement Strong AI Controls: Regularly review security policies, block unauthorized apps, enforce DLP measures, and provide real-time user guidance to minimize risk. Strengthen Local AI Security: Ensure that any on-premise AI deployments align with industry security frameworks to prevent data leaks and cyber threats. While AI offers immense benefits in productivity and efficiency, it also presents new challenges that organizations must address. The findings of this report reinforce the importance of security policies, continuous monitoring, and proactive risk mitigation strategies to safeguard sensitive enterprise data in an AI-powered world.

image for Abracadabra Cyberatt ...

 Firewall Daily

The decentralized finance (DeFi), Abracadabra, is dealing with a cyberattack that resulted in the theft of nearly $13 million worth of cryptocurrency. The Abracadabra cyberattack, which targeted the platform’s “gmCauldrons,” has shaken the cryptocurrency market particularly those that rely on liquidity tokens   show more ...

from decentralized exchanges like GMX. Decoding the Abracadabra Cyberattack  The cyberattack on Abracadabra occurred in March 2025 and drained 6,260 ETH, valued at approximately $12.98 million at the time. The exploit was flagged by blockchain security firm PeckShield, which identified suspicious transactions involving contracts from Abracadabra and decentralized exchange GMX. These contracts were connected to gmCauldrons, isolated lending markets within Abracadabra that allowed users to borrow against crypto collateral.  [caption id="attachment_101619" align="alignnone" width="544"] Details of the Abracadabra attack (Soure: X)[/caption] The gmCauldrons in question were designed to use GM tokens—liquidity positions from GMX—however, it was these specific cauldrons, not the GMX platform itself, that were compromised. GMX, which operates as a decentralized exchange, distanced itself from the incident. [caption id="attachment_101621" align="alignnone" width="546"] Tweet from GMX Communications' Contributor (Source: X)[/caption] According to GMX Communications Contributor Jonezee, “To clarify, GMX contracts are not affected. The exploit relates solely to Abracadabra’s gmCauldrons based on GMX V2’s GM pools. We’re deeply sorry for anyone affected by this unfortunate situation.”  Abracadabra’s Response to the Attack  Following the breach, Abracadabra quickly issued a statement acknowledging the exploit, assuring its users that no collateral was affected, and only the gmCauldrons had been targeted. The platform explained that its gmCauldrons had undergone rigorous auditing by Guardian Audits, the same firm responsible for auditing GMX’s core contracts. Despite these security measures, the cyberattack on Abracadabra wasn’t detected until the hacker had already executed several transactions.  Abracadabra’s team moved quickly to mitigate the damage. With the help of Zeroshadow, a security firm, the team turned off all borrows to the affected cauldrons to prevent further exploitation. They also confirmed that funds from the attack were consolidated across three addresses, and they were in close contact with Chainalysis, a blockchain forensics firm, to trace the stolen funds.  To resolve the situation, Abracadabra has even offered the hacker a 20% bug bounty, with an invitation to negotiate the return of the funds. A message was sent via on-chain communication, and the protocol shared an email address for the hacker to contact them if they wished to discuss the matter further. Abracadabra also stated that a full post-mortem report would be provided once the investigation is concluded. A Broader Look at the Abracadabra Data Breach and the Impact on GMX  [caption id="attachment_101623" align="alignnone" width="562"] Statement from Jonezee in GMX (Source: Telegram)[/caption] While the exploit was primarily confined to Abracadabra’s gmCauldrons, it has stirred up concerns within the broader DeFi community. GMX, which was not directly impacted by the breach, clarified that the attack was restricted to Abracadabra’s infrastructure. GMX reiterated that its contracts were secure and unaffected by the cyberattack on Abracadabra. GMX, a popular decentralized exchange, offers users the ability to trade assets like BTC, ETH, and SOL with up to 100x leverage, directly from their wallets. Jonezee of GMX explained, “We believe the issue relates solely to the Abracadabra/Spell cauldrons. These cauldrons allow for borrowing against specific GM liquidity tokens, but the GMX platform itself has not been compromised.”  Security experts have been working together to investigate the cause of the exploit, including teams from Guardian Audits, GMX, and other security researchers. The full details of how the exploit was carried out remain under investigation.  Tracking the Stolen Funds  [caption id="attachment_101625" align="alignnone" width="543"] Security Update on Hackers' Wallet (Source: X)[/caption] As of the latest update, the stolen funds from the Abracadabra data breach have been consolidated across three wallets, with the addresses being tracked by Chainalysis and Zeroshadow’s monitoring team. The stolen cryptocurrency, which includes 6,260 ETH, was bridged to the Ethereum network and distributed across multiple addresses, making it more difficult to trace the movement of the funds. The addresses identified in the attack include:  0x018182FD7B856AeE1606D7E0AA8bca10F1Cb0b5d  0xa8f822E937C982e65b0437Ac81792a3AdA76A1ff  0x047C2a3dd1Ab4105B365685d4804fE5c440B5729  Despite the complex nature of the hack, Abracadabra’s security infrastructure, including partnerships with Zeroshadow and Chainalysis, has played a crucial role in tracking the movement of the stolen funds. 

image for How to hack an Eight ...

 Technology

For a while after we wrote about hacking a bicycle, it seemed it couldnt be beat as the most unlikely hack target ever. However, developers imagination seems to know no bounds — and hackers arent far behind in their ingenuity… And so, heres introducing the internet-connected mattress system — or Pod as its   show more ...

called — made by the company Eight Sleep, along with several ways it can be hacked as discovered by security researcher Dylan Ayrey. Smart mattress Pod? Whats that? Perhaps we should start by explaining what an Eight Sleep Pod is and why someone might want to buy this futuristic piece of tech. The Eight Sleep designers position their product as an Intelligent Bed Cooling System. The primary target audience is people with various sleep problems: insomnia, poor sleep quality, snoring, and similar issues that can significantly impact quality of life. The Pod is made up of a sheet-like high-tech layer (Cover), and an external unit (Hub); optionally theres also a motorized Base. It allows users to adjust the temperature of the bed — heating it up or cooling it down as instructed by the owner. It can do it automatically too — more on this later. Theres a network of tubes with water circulating through them built into it. The external unit connected to this system handles the heating and cooling. The Eight Sleep Pod is divided into two independent zones of a double-bed — each with its own settings. The temperature range is fairly broad: from 12 to 43°C. At $4699, the Eight Sleep Pod 4 Ultra package is the most expensive version of the system made by the company Source But wait: theres more to it! The Pod has several dozen clinical-grade sensors that track users sleep quality. It also has vibration motors to wake you up, and sensors for ambient temperature and humidity. The ultimate version — the Pod 4 Ultra — comes with a transformable, electronically-controlled bed base. It goes without saying that the system connects to the internet. It does this via a Wi-Fi receiver in the Hub. Eight Sleep Pods are configured and controlled almost exclusively via an app. We say almost, because the latest (and most expensive) generation — Pod 4 — has pressure-sensitive areas on the sides that you can tap to control certain functions. Autopilot and sleep by subscription The main software component of an Eight Sleep Pod is the Autopilot system, which uses sensors built into the Cover to collect lots of statistics about the quality and quantity of users sleep, and generate detailed reports for them. In addition, Autopilot has a number of other interesting options. For example, the system can detect when the user starts snoring and change the geometry of the Base to fix the problem. Autopilot uses vibration sensors to track snoring, and combats it by adjusting the geometry of the bed base Source The Pod also has a physical alarm clock that wakes the user by changing the temperature of the bed and turning on vibration. However, the key Autopilot feature (and the one Eight Sleep touts the most) is, well, autopilot mode. What this does is continuously monitor the users sleep quality — automatically adjusting the temperature to ensure the deepest and most comfortable sleep possible. In case you thought this was an Eight Sleep Pod ad, lets look at this products numerous flaws… To start with, these things are eye-wateringly expensive: retail prices start at $3000, and the top-of-the-line Pod 4 Ultra costs a whopping $4700. An Autopilot subscription would set you back at least $200 per year — without it, the most exciting features simply wont work Source But the outlay doesnt end there: the user will almost certainly have to pay for a subscription that costs between $200 and $300 per year. In theory, you could choose not to pay it, but without the subscription most of the smart features remain inactive. Also, like any modern tech company, Eight Sleep constantly collects data about its users. CEO Matteo Franceschetti talks quite openly about this on X: Eight Sleep has accumulated data on almost a billion hours of their users sleep Source Smart mattress hack No. 1: developer backdoor Now lets shift the focus to why this post was written: hacking this smart-mattress system. Dylan Ayrey, a security researcher, decided to look into Eight Sleeps security — simply out of curiosity, he said, as Dylan is the happy owner of an Eight Sleep Pod, which helps him with his insomnia. You might remember Dylan for his other notable investigations, such as the possibility of using phantom corporate accounts uncontrollable by workspace admins, or attacking Google OAuth via abandoned domains. To begin analyzing the Pods security, Ayrey needed a copy of its firmware. Security-conscious vendors dont just give their firmware away, so trying to find a copy often becomes a quest unto itself. Not so with Eight Sleep. The update server lets anyone who follows the link download the firmware for any of the companys Pod models, no questions asked. While examining the code, Dylan found a number of noteworthy things, including an API for remote connection via SSH. Given that an Eight Sleep Pod is essentially a computer running Linux (as many other modern devices are), a connection like this allows running arbitrary code remotely on the mattress pad Hub. The Eight Sleep Pod firmware was found to contain an API for remote access to the smart mattress Source Judging by the email address associated with the SSH public key found in the firmware code, all (or at least many) Eight Sleep engineers could have remote access to any Pod. Judging by the email address associated with the SSH public key, every Eight Sleep engineer has remote access to any Pod Source One could use an SSH connection like this to spy on the Pods owner — to find out when theyre sleeping or when they spend the night away from home. It would even be possible to check if theres one person in bed or two. Having this type of control could also let someone play pranks on the owner by changing the temperature of the Pod, turning the alarm clock on or off, adjusting the geometry of the bed base, and so on. Nothing like that seems to have happened to Eight Sleep Pod owners yet, but something like it could; theoretical possibilities like this sometimes do materialize. This is what recently happened with Ecovacs robot vacuums: pranksters used vulnerabilities in these devices to harass their owners. Smart mattress hack No. 2: an AWS key in the firmware While still looking at the Eight Sleep Pod firmware, Dylan discovered a valid AWS (Amazon Web Services) key in its code — used to continuously upload telemetry to the cloud. Again this is only theoretical, but if the key fell into the wrong hands it could lead to serious violations of user privacy. (Not the) best practices for programming smart devices: hardcoded AWS key in the firmware accessible to anyone Source For better or for worse, the full truth about the presence of an Amazon key wont come out. Dylan notified Eight Sleep, and by the time his research was published the key had already been revoked. However, the mere presence of the key within the firmware, where it was accessible to anyone, was clear evidence that user security and privacy were taken lightly. Dylan further adds that the key could have, at the very least, been used to cause financial damage to the company by sending a large number of meaningless requests to the AWS cloud. Smart mattress hack No. 3: jailbreaking with the help of an aquarium chiller Clearly inspired by his earlier findings, Dylan decided to attempt jailbreaking the Pod — that is, detaching it from Eight Sleeps cloud services. Dylan took a drastic approach: he disconnected the external unit (with all its smart electronics and internet connectivity). Detaching an Eight Sleep smart mattress from the cloud using a $150 aquarium chiller Source Dylan replaced the Eight Sleep Hub with a common aquarium chiller. This system, in contrast, doesnt require an app or a subscription fee, collects no user data, comes without any backdoors, and runs perfectly well without an internet connection. What it does do is effectively adjust the temperature of your bed, and, just as importantly, it costs only $150. For those who prefer a less radical approach to the issue of Eight Sleep products being tied to the vendor cloud, Free Sleep offers a solution. This is an open-source software suite that allows you to take control of your smart mattress. Want to know what other unexpected devices have been successfully hacked? Here you go! Hacking a train Hacking a capsule hotel Hole in the bowl: smart pet feeder springs a leak Vulnerabilities in a toy robot permitting snooping. Seriously Hacking our bosss smart home Vibrators hacked IP camera security: the bad, the ugly, and the evil …and many others!

 Feed

Google has released out-of-band fixes to address a high-severity security flaw in its Chrome browser for Windows that it said has been exploited in the wild as part of attacks targeting organizations in Russia.  The vulnerability, tracked as CVE-2025-2783, has been described as a case of "incorrect handle provided in unspecified circumstances in Mojo on Windows." Mojo refers to a

 Feed

Broadcom has issued security patches to address a high-severity security flaw in VMware Tools for Windows that could lead to an authentication bypass. Tracked as CVE-2025-22230, the vulnerability is rated 7.8 on the ten-point Common Vulnerability Scoring System (CVSS). "VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control," Broadcom said in an

 Feed

When people think of cybersecurity threats, they often picture external hackers breaking into networks. However, some of the most damaging breaches stem from within organizations. Whether through negligence or malicious intent, insiders can expose your organization to significant cybersecurity risks. According to Verizon's 2024 Data Breach Investigations Report, 57% of companies experience over

 Feed

Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according to findings from Abnormal Security. Atlantis AIO "has emerged as a powerful weapon in the cybercriminal arsenal, enabling attackers to test millions of stolen credentials in rapid succession," the cybersecurity company said in an analysis. Credential stuffing is a

 Feed

The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as a zero-day to deliver a wide range of malware families, including backdoors and information stealers such as Rhadamanthys and StealC. "In this attack, the threat actor manipulates .msc files and the Multilingual User Interface Path (MUIPath) to download and execute malicious payload,

 Feed

The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor's tradecraft. The activity, observed by Romanian cybersecurity company Bitdefender, involves the deployment of a never-before-seen ransomware strain dubbed QWCrypt. RedCurl, also called Earth Kapre and Red Wolf, has a history of orchestrating

 Feed

Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of software supply chain attacks targeting the open-source ecosystem. The packages in question are ethers-provider2 and ethers-providerz, with the former downloaded 73 times to date since it was published on

 Feed

“A boxer derives the greatest advantage from his sparring partner…” — Epictetus, 50–135 AD Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and circle. Red throws out three jabs, feints a fourth, and—BANG—lands a right hand on Blue down the center. This wasn’t Blue’s first day and despite his solid defense in front of the mirror, he feels the pressure.

 Feed

The Chinese threat actor known as FamousSparrow has been linked to a cyber attack targeting a trade group in the United States and a research institute in Mexico to deliver its flagship backdoor SparrowDoor and ShadowPad. The activity, observed in July 2024, marks the first time the hacking crew has deployed ShadowPad, a malware widely shared by Chinese state-sponsored actors. "FamousSparrow

 0CISO2CISO

Source: securelist.com – Author: Igor Kuznetsov, Boris Larin Incidents Incidents 25 Mar 2025 minute read In mid-March 2025, Kaspersky technologies detected a wave of infections by previously unknown and highly sophisticated malware. In all cases, infection occurred immediately after the victim clicked on a link   show more ...

in a phishing email, and the attackers’ website was opened […] La entrada Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain – Source: securelist.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.troyhunt.com – Author: Troy Hunt You know when you’re really jet lagged and really tired and the cogs in your head are just moving that little bit too slow? That’s me right now, and the penny has just dropped that a Mailchimp phish has grabbed my credentials, logged into my account and   show more ...

exported the […] La entrada A Sneaky Phish Just Grabbed my Mailchimp Mailing List – Source: www.troyhunt.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Android

Source: www.infosecurity-magazine.com – Author: Cybersecurity researchers at McAfee have identified a new wave of Android malware campaigns leveraging .NET MAUI, a cross-platform development framework, to evade detection and steal sensitive user information. These malicious applications disguise themselves as   show more ...

legitimate services, posing significant risks to mobile security. How .NET MAUI is Being Exploited Cross-platform development frameworks […] La entrada New Android Malware Uses .NET MAUI to Evade Detection – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Cybercriminals have been observed increasingly leveraging Atlantis AIO, a sophisticated tool designed to automate credential stuffing attacks across more than 140 platforms. This software enables attackers to systematically test many stolen username and password   show more ...

combinations, facilitating unauthorized access to various online services. Understanding Credential Stuffing Credential stuffing involves using stolen or […] La entrada Cybercriminals Use Atlantis AIO to Target 140+ Platforms – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: The US National Institute of Standards and Technology (NIST) has warned that there are significant challenges and limitations for mitigating attacks on AI and machine learning (ML) systems. The agency urged the cybersecurity and research community to develop   show more ...

improved mitigations for adversarial ML (AML). The report noted that the data-based nature […] La entrada NIST Warns of Significant Limitations in AI/ML Security Mitigations – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 China-Linked

Source: www.infosecurity-magazine.com – Author: A newly identified China-nexus hacking group infiltrated the network of an Asian telecommunications service provider and remained undetected for more than four years, according to cyber threat detection and response provider Sygnia. Sygnia believes that Weaver Ant   show more ...

could be part of a Chinese nexus tasked with infiltrating and collecting information from […] La entrada China-Linked Weaver Ant Hackers Exposed After Four-Year Telco Infiltration – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Chatter about jailbreaks and use of malicious AI tools on the cybercrime underground surged in 2024, according to an analysis by threat intelligence firm Kela. The firm monitored cybercrime forums throughout the year to compile its new study, 2025 AI Threat   show more ...

Report: How Cybercriminals are Weaponizing AI Technology. It revealed a […] La entrada Dark Web Mentions of Malicious AI Tools Spike 200% – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Kubernetes customers using the popular Ingress NGINX Controller have been urged to patch four newly discovered remote code execution (RCE) flaws assigned a CVSS score of 9.8. Dubbed “IngressNightmare” by Wiz Security, the four vulnerabilities impact the   show more ...

admission controller component of the popular open source software, which is designed to route […] La entrada IngressNightmare: Four Critical Bugs Found in 40% of Cloud Systems – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: 2025 is shaping up to be a crucial year for the implementation of new regulations aimed at strengthening the European Union’s digital resilience. Compliance with these regulations is not only a legal imperative, but also a factor that makes European companies more   show more ...

competitive and generates confidence among both citizens and global […] La entrada Legal impact on cybersecurity in 2025: new developments and challenges in the EU – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: Feature 26 Mar 20258 mins Incident ResponseThreat and Vulnerability Management What was once in the margins of cybersecurity, detection engineering has been gaining space and interest, here is what you need to know. Detection engineering, which was once a niche practice among   show more ...

mostly large companies, appears to have evolved into a […] La entrada Rising attack exposure, threat sophistication spur interest in detection engineering – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: The vulnerabilities dubbed IngressNightmare can allow unauthenticated users to inject malicious NGINX configurations and execute malicious code into the Ingress NGINX pod, potentially exposing all cluster secrets and leading to cluster takeover. The Kubernetes project has   show more ...

released patches for five vulnerabilities in a widely used popular component called the Ingress NGINX […] La entrada Critical RCE flaws put Kubernetes clusters at risk of takeover – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.infoworld.com – Author: Install the latest version to close critical authorization bypass vulnerability. Developers and web admins using the Next.js framework for building or managing interactive web applications should install a security update to plug a critical vulnerability. The vulnerability,   show more ...

CVE-2025-29927, allows an authorization bypass if the “middleware” function is enabled for linking to […] La entrada Warning for developers, web admins: update Next.js to prevent exploit – Source: www.infoworld.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: Das neue Ransomware-as-a-Service (RaaS)-Programm VanHelsing gewinnt schnell an Zugkraft. Seine Betreiber haben innerhalb eines Monats nach seinem Start erfolgreich drei Opfer ins Visier genommen. Das neue Ransomware-Programm VanHelsing zielt auf Windows-, Linux-, BSD-, ARM-   show more ...

und ESXi-Systeme. Andrey_Popov – shutterstock.com Das neue RaaS-Projekt namens VanHelsing wurde erstmals am16. März von Forschern von […] La entrada Neue VanHelsing-Ransomware breitet sich rasant aus – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: The new Russian ransomware program — accessible to affiliates at $5,000 — offers variants targeting Windows, Linux, BSD, ARM, and ESXi systems. A new ransomware-as-a-service (RaaS) affiliate program, VanHelsing, is rapidly gaining traction, with its operators successfully   show more ...

targeting three victims within a month of its launch on March 7. Presumably Russian, […] La entrada New VanHelsing ransomware claims three victims within a month – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Artificial Intelligence

Source: www.csoonline.com – Author: The rollout includes six in-house AI agents from Microsoft and five developed with partners. Microsoft has introduced a new set of AI agents for its Security Copilot platform, designed to automate key cybersecurity functions as organizations face increasingly complex and   show more ...

fast-moving digital threats. The new tools focus on tasks such as […] La entrada Microsoft launches AI agents to automate cybersecurity amid rising threats – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Waqas. Satellite navigation systems, which are vital to aviation, maritime, telecommunications, and humanitarian operations, are increasingly compromised by jamming and spoofing incidents, according to a joint warning from three major international organizations. In a statement   show more ...

released today from Geneva, the International Civil Aviation Organization (ICAO), International Telecommunication Union (ITU), and International […] La entrada Satellite Navigation Systems Facing Rising Jamming and Spoofing Attacks – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered   show more ...

the security solution. There are several actions that could […] La entrada Public-Private Ops Net Big Wins Against African Cybercrime – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Alexander Culafi, Senior News Writer, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just   show more ...

performed triggered the security solution. There are several […] La entrada OPSEC Nightmare: Leaking US Military Plans to a Reporter – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 adware

Source: www.securityweek.com – Author: Ionut Arghire The threat actors behind the macOS malware loader known as ReaderUpdate have built new versions of the threat using the Crystal, Nim, Rust, and Go programming languages, SentinelOne reports. Initially observed in 2020, when it was distributed as a compiled   show more ...

Python binary, the malware has been communicating with a […] La entrada macOS Users Warned of New Versions of ReaderUpdate Malware – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.securityweek.com – Author: Ionut Arghire The first attempts to exploit a critical-severity vulnerability in Next.js have been observed less than a week after patches were released, Akamai reports. Next.js is a React framework used to build web applications. It allows developers to decrease site   show more ...

loading times and improve search engine optimization (SEO). Tracked as […] La entrada Critical Next.js Vulnerability in Hacker Crosshairs – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cloud Security

Source: www.securityweek.com – Author: Eduard Kovacs Oracle has categorically denied that its Cloud systems have been breached, but sample data made available by the hacker seems to prove otherwise, according to several cybersecurity companies. A hacker named ‘rose87168’ announced recently on a hacking   show more ...

forum the sale of data associated with over 140,000 Oracle Cloud tenants. […] La entrada Security Firms Say Evidence Seems to Confirm Oracle Cloud Hack – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CVE-2025-2783

Source: www.securityweek.com – Author: Ryan Naraine Google late Tuesday rushed out a patch for a sandbox escape in its flagship Chrome browser after researchers at Kaspersky caught a professional hacking operation launching drive-by download exploits. The vulnerability, tracked as CVE-2025-2783, was chained   show more ...

with a second exploit for remote code execution in what appears to be […] La entrada Google Patches Chrome Sandbox Escape Zero-Day Caught by Kaspersky – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.securityweek.com – Author: Eduard Kovacs Users around the world are complaining that routers made by Taiwan-based networking equipment manufacturer DrayTek are rebooting, causing connectivity issues. Many reboots have been documented in the UK and Australia, but there are also reports from Germany,   show more ...

Vietnam, and other countries of various router models rebooting.  ISPreview has been […] La entrada Vulnerability Exploitation Possibly Behind Widespread DrayTek Router Reboots – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CVE-2025-22230

Source: www.securityweek.com – Author: SecurityWeek News Virtualization technology giant VMware on Tuesday released an urgent fix for an authentication bypass security defect affecting its VMware Tools for Windows utilities suite. The vulnerability, tagged as CVE-2025-22230, opens the door for a malicious actor   show more ...

with non-administrative privileges on a Windows guest virtual machine to perform certain high-privilege […] La entrada VMware Patches Authentication Bypass Flaw in Windows Tools Suite – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 agentic ai

Source: www.securityweek.com – Author: Ionut Arghire Software giant Microsoft has announced expanded Security Copilot capabilities with new AI agents tackling phishing, data security, and identity management. The Redmond, Wash. vendor says it is processing 84 trillion signals per day, including 7,000 password   show more ...

attacks each second, and believes that the introduction of AI agents is needed […] La entrada Microsoft Adds AI Agents to Security Copilot – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Charm Security

Source: www.securityweek.com – Author: Ionut Arghire Cybersecurity startup Charm Security today emerged from stealth mode with $8 million in seed funding from Team8. Founded in 2024 by cyber intelligence expert Roy Zur and AI-driven fraud prevention pioneer Avichai Ben, the New York-based startup has built an   show more ...

AI-powered customer security platform that aims to protect businesses […] La entrada Charm Security Emerges From Stealth With $8 Million in Funding – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AI

Source: grahamcluley.com – Author: Graham Cluley In episode 43 of The AI Fix, our hosts discover a robot that isn’t terrifying, a newspaper shuns journalists in favour of AI, Graham watches a robot dog learn to stand, an AI computer programmer develops a familiar attitude, and New York tries to stop its   show more ...

humans arming their […] La entrada The AI Fix #43: I, for one, welcome our new robot overlords! – Source: grahamcluley.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Cyber-attacks leveraging third-party vulnerabilities are on the rise, according to a new SecurityScorecard report. The cyber risk assessment provider released its 2025 Global Third-Party Breach Report on March 26. In the report, SecurityScorecard’s   show more ...

STRIKE Threat Intelligence Unit analyzed 1000 cyber breaches across industries and regions in 2024. It found that 35.5% of […] La entrada SecurityScorecard Observes Surge in Third-Party Breaches – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: A growing number of phishing campaigns have been observed leveraging trusted online document platforms to evade secure email gateways (SEGs) and steal credentials. Threat analysts at Cofense Intelligence have identified that platforms such as Adobe, DocuSign,   show more ...

Dropbox, Canva and Zoho are being misused in phishing attacks due to their widespread adoption […] La entrada Threat Actors Abuse Trust in Cloud Collaboration Platforms – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: A newly discovered malware campaign has leveraged malicious npm packages to deliver highly sophisticated reverse shells. Researchers at ReversingLabs identified two malicious packages, “ethers-provider2” and “ethers-providerz,” which infiltrated   show more ...

development environments by covertly modifying legitimate npm dependencies. The ethers-provider2 package closely mimics the legitimate ssh2 package, embedding harmful code within its installation script. Upon execution, the script downloads a […] La entrada Malicious npm Packages Deliver Sophisticated Reverse Shells – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: New quantum-safe encryption standards have been published by the European Telecommunications Standards Institute (ETSI). The specification defines a scheme for key encapsulation mechanisms with access control (KEMAC), called Covercrypt. Key encapsulation   show more ...

mechanisms establish a shared secret key and transmit it to a receiver securely. This prevents anyone who doesn’t know the […] La entrada ETSI Publishes New Quantum-Safe Encryption Standards – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: The EU’s leading cybersecurity agency has published a detailed new report outlining the threat landscape and recommended steps to mitigate the most acute risks in the space sector. ENISA argued in its Space Threat Landscape report that there’s an urgent need   show more ...

to address such risks, given the growth of the sector […] La entrada ENISA Probes Space Threat Landscape in New Report – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Harnessing emerging technologies such as AI will be the key to tackling threats enabled by the same tech, the government is expected to say as it announces a newly expanded fraud strategy today. Fraud minister, Lord Hanson, will announce that work has begun on new   show more ...

plans to tackle surging levels of […] La entrada UK Government’s New Fraud Strategy to Focus on Tech-Enabled Threats – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Owais Sultan. Cybersecurity threats are evolving at an unprecedented pace, leaving organizations vulnerable to large-scale attacks. Security breaches and data leaks can have severe financial and reputational consequences. To tackle these risks, businesses must adopt a proactive   show more ...

approach to security that doesn’t just react to threats but actively anticipates and mitigates […] La entrada Penetration Testing Services: Strengthening Cybersecurity Against Evolving Threats – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Waqas. Security researchers at ReversingLabs have discovered a new malware campaign on the npm package repository, revealing a new approach to infecting developers’ systems. Unlike typical malware, this attack doesn’t just deliver malicious code – it hides it within   show more ...

legitimate software already installed on a user’s computer. The campaign centers around […] La entrada New npm Malware Attack Infects Popular Ethereum Library with Backdoor – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. A recent collaborative effort by researchers Rachid Allam and Yasser Allam has exposed a critical vulnerability within the Next.js framework, a widely used JavaScript framework based on React with nearly 10 million weekly downloads. Their research, documented in a   show more ...

detailed publication, reveals a flaw in the Next.js middleware that […] La entrada Next.js Middleware Flaw Lets Attackers Bypass Authorization – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Waqas. In a new development in the investigation of a massive $243 million cryptocurrency heist, one of the key suspects, Veer Chetal, known online as “Wiz,” has been apprehended by U.S. Marshals. This news was delivered via a tweet from blockchain investigator ZachXBT. A   show more ...

Sophisticated Scam Unravels To recap, back in […] La entrada Crypto Heist Suspect “Wiz” Arrested After $243 Million Theft – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2025-03
Aggregator history
Wednesday, March 26
SAT
SUN
MON
TUE
WED
THU
FRI
MarchAprilMay