The Moroccan authorities have warned users of a critical vulnerability in the popular WordPress plugin, InstaWP Connect. The General Directorate of Information Systems Security (DGSSI), which operates under Morocco's National Defense Administration, shared news details following the WordPress vulnerability. This show more ...
advisory comes amid a growing number of cyberattacks targeting government websites in Morocco, with attackers believed to be linked to hacker groups based in Algeria. The vulnerability, identified as CVE-2025-2636, specifically impacts older versions of the plugin. Versions prior to 0.1.0.88 are at risk. This security flaw enables unauthorized attackers to remotely execute malicious PHP code on affected websites. If left unpatched, the vulnerability could lead to a variety of security breaches, including unauthorized access to sensitive data or even full website compromise. WordPress, the widely used content management system (CMS), has already issued a security patch to resolve the issue. Website administrators are strongly advised to update their plugins to version 0.1.0.86 or a later patched release. The fix can be easily applied via the WordPress platform's dedicated plugin update page. InstaWP Connect WordPress Plugin Vulnerability Details [caption id="attachment_102169" align="alignnone" width="1028"] InstaWP Connect Vulnerability Advisory (Source: dgssi.gov.ma)[/caption] The vulnerability, designated CVE-2025-2636, is described as a Local File Inclusion (LFI) issue, which is a type of vulnerability that allows attackers to include and execute arbitrary files on the server. This vulnerability affects all versions of the plugin up to and including 0.1.0.85. Specifically, the flaw exists in the 'instawp-database-manager' parameter, which, when exploited, enables unauthenticated attackers to gain access to the server and execute malicious PHP code. Once attackers can execute PHP code, they could potentially bypass access controls, extract sensitive information, or manipulate the server in a way that could compromise the entire website. Even though the plugin is designed to allow staging and migration for WordPress sites, the vulnerability exposes users to cybersecurity risks if not addressed. Impact of the Vulnerability The CVE-2025-2636 vulnerability has been rated as Critical, with an overall CVSS score of 8.1, signaling a high level of severity. Exploiting this vulnerability could allow attackers to execute PHP code remotely without the need for authentication. This makes it particularly dangerous, as even individuals with no login credentials could gain full control over the affected WordPress sites. As Morocco faces an ongoing series of cyberattacks on its government and public sector websites, this warning highlights the critical need for all website administrators—particularly those using WordPress and the InstaWP Connect plugin—to take immediate action. Steps for Mitigation To mitigate the risks associated with CVE-2025-2636, website administrators are strongly encouraged to upgrade to version 0.1.0.86 of the plugin, or a later, patched release. This update addresses the LFI vulnerability and strengthens the security of WordPress websites relying on this plugin. For those using older versions of the plugin, immediate updates are crucial to prevent potential exploitation. Additionally, website administrators should always maintain a regular schedule of security updates to ensure their WordPress sites remain protected from future vulnerabilities. Wordfence Provides Further Insights The security team at Wordfence, a popular security plugin for WordPress, has also shared additional information on the vulnerability. According to Wordfence's findings, the plugin, specifically versions <= 0.1.0.85, is vulnerable to Unauthenticated Local PHP File Inclusion. This vulnerability could be exploited to execute arbitrary PHP code on the server, allowing attackers to manipulate the server and bypass access controls. Wordfence's vulnerability report details the CVSS vector as follows: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. This highlights the risk of unauthorized access and control over affected websites, reinforcing the importance of promptly applying security patches.
The UK communications regulator Ofcom has banned leasing of "Global Titles," a special phone number type used in mobile network signaling, in a landmark decision to counter growing threats from cybercriminals and foreign intelligence actors. Effective immediately, mobile operators are prohibited from entering show more ...
new leasing agreements for Global Titles. The move closes a longstanding technical loophole that allowed criminals to exploit mobile infrastructure for surveillance, fraud, and data theft — often without detection. Ofcom’s decision positions the UK as a global leader in mobile network protection, following concerns raised by the National Cyber Security Centre (NCSC) and cyber threat intelligence specialists about persistent abuses of mobile signaling systems. Natalie Black, Group Director for Networks and Communications at Ofcom, called the move a “world-leading action." “Leased Global Titles have become one of the most persistent sources of malicious activity on telecom networks," Black said. "Our ban will help prevent them falling into the wrong hands – protecting mobile users and our critical telecoms infrastructure in the process.” Global Titles: A Hidden Risk in the Mobile Backbone Mobile networks use Global Titles to route signaling messages that ensure calls and texts reach their intended destinations. These identifiers operate silently behind the scenes, supporting billions of daily communications without ever being visible to the users making or receiving them. While consumers are unaware of their presence, these numbers play a critical role in routing communications globally. Traditionally, mobile operators lease Global Titles to legitimate enterprises offering mobile services. But weak oversight and the anonymity provided by leasing arrangements have made them attractive to malicious actors. Criminal groups have used Global Titles to intercept two-factor authentication codes, track user locations, and divert SMS or call traffic — posing significant risks to individuals, financial institutions, and national security infrastructure. Because Global Titles are leased, not owned, bad actors often operate under the guise of legitimacy, making them difficult to detect and attribute. “This technique, which is actively used by unregulated commercial companies, poses privacy and security risks to everyday users,” said Ollie Whitehouse, Chief Technical Officer at the NCSC. Today’s action by Ofcom sets a new bar for telecom security and the UK encourages other nations to follow suit, Whitehouse added. Industry Efforts Fell Short The telecom industry has long acknowledged the risks associated with signaling exploitation, but voluntary measures failed to deliver meaningful results. Ofcom noted that self-regulation did not adequately prevent misuse or enforce accountability across mobile operators and signaling brokers. Frustrated by the lack of progress, the regulator opted for decisive action. “The industry has been aware of these vulnerabilities for years,” said one senior security engineer at a UK telecom operator. “This ban forces everyone to raise the baseline of security and treat signaling as a live threat surface, not just a background protocol.” Also read: CISO’s Guide to Telecom Security: Combatting Cyber Threats with Modern Intelligence Ofcom Implementation Timeline and Guidance While new leasing is now banned, existing leases will be phased out. All current arrangements must end by April 22, 2026. An extended deadline of October 22, 2026, applies to two specific use cases that face complex transition challenges. Ofcom also released updated guidance for mobile network operators, outlining how to monitor and safeguard their signaling assets and prevent unauthorized access or misuse. The regulator’s approach aims to strike a balance between urgent risk mitigation and operational continuity for businesses that depend on Global Title services. Growing International Concern Over Mobile Signaling Exploits SS7 and related signaling systems have come under intense scrutiny in recent years due to their lack of authentication and encryption. These legacy protocols remain active across much of the global telecom landscape and are often exploited by threat actors with access to international or leased network elements. In several known cases, attackers have used signaling exploits to track political dissidents, compromise bank accounts, or conduct targeted espionage operations. Experts have repeatedly warned that without strict regulation, signaling vulnerabilities could enable cross-border attacks and surveillance. Ofcom’s move aligns with recommendations from international cyber authorities and comes at a time when governments are reassessing how national telecom assets are protected in light of geopolitical tensions and hybrid warfare tactics. NCSC’s Whitehouse called the decision “a critical milestone in securing the UK’s digital infrastructure,” urging international regulators to take similar steps. Security professionals welcomed the move, noting it sets a precedent for treating mobile signaling security with the same urgency as core internet protocols or data protection standards. “This is overdue,” said a threat intelligence analyst. “We can’t keep securing endpoints and ignoring what’s happening in the transport layer of mobile communications.”
MITRE has officially unveiled its highly anticipated D3FEND CAD tool as part of the D3FEND 1.0 release. This new Cyber Attack-Defense (CAD) tool is designed to transform how security professionals model, analyze, and respond to cybersecurity threats by offering a structured, knowledge-based approach to cybersecurity show more ...
scenario creation. Traditionally, cybersecurity scenarios were often represented using unstructured diagrams in software like PowerPoint or Visio. However, MITRE’s D3FEND CAD tool provides a structured framework for knowledge representation, allowing security teams to build more comprehensive and actionable scenarios. D3FEND CAD: Knowledge-Based Approach to Cybersecurity The tool leverages the D3FEND ontology, a semantically rigorous knowledge graph that maps out the relationships between various cybersecurity countermeasures. This knowledge graph, a key feature of Cyber Attack-Defense (CAD), is a detailed and structured repository of cybersecurity knowledge, helping security practitioners not only understand individual threats but also the broader landscape of attack and defense interactions. “When knowledge is structured, you can more easily analyze it to garner new insights, spot trends, and make informed decisions,” said the D3FEND development team. The tool allows users to create D3FEND Graphs, which are graphs that conform to the D3FEND ontology. These graphs represent discrete activities, objects, and conditions, along with their necessary relationships, enabling more efficient threat analysis and modeling. Technical Features and Functionality The tool is a browser-based application that offers an intuitive user interface for building detailed cybersecurity scenarios. Users can drag and drop various types of nodes onto a digital canvas, each representing key elements of cybersecurity defenses and attacks. Some of the main node types include: Attack Nodes: These are linked to specific MITRE ATT&CK techniques, offering detailed insights into common cyberattack methods. Countermeasure Nodes: These represent defensive techniques from the D3FEND knowledge base, enabling users to model effective countermeasures for specific threats. Digital Artifact Nodes: These represent elements from D3FEND’s artifact ontology, which include the tools and resources involved in attack and defense scenarios. Designed for Multiple Cybersecurity Roles MITRE’s tool is tailored to meet the needs of a wide range of cybersecurity professionals. From threat intelligence analysis to detailed detection engineering, the tool supports numerous roles in cybersecurity, including: Threat Intelligence Analysis and Visualization: Helping teams visualize and analyze potential threats and attack patterns. Threat Modeling and Security Systems Engineering: Enabling teams to model potential attacks and defenses in a structured and interactive environment. Detection Engineering Scenarios: Allowing teams to design and simulate detection mechanisms. Incident Investigation and Event Sequencing: Helping security teams trace events and actions during a cybersecurity incident. Security Risk Assessment and Framework Implementation: Facilitating risk assessments and the implementation of security frameworks based on real-world data. Conclusion The tool fosters enhanced collaboration among cybersecurity teams by supporting various export formats like JSON, TTL, and PNG, allowing users to easily share and develop new threat models. It also enables integration with STIX 2.1 JSON documents to enhance threat intelligence analysis. Developed through collaboration with MITRE, the National Security Agency (NSA), and other defense agencies, the tool provides a standardized framework for cybersecurity operations. This innovative approach allows organizations to more effectively model and respond to cyber threats, making the tool an essential resource for strengthening defense mechanisms across the cybersecurity landscape.
A security architect with the National Labor Relations Board (NLRB) alleges that employees from Elon Musk‘s Department of Government Efficiency (DOGE) transferred gigabytes of sensitive data from agency case files in early March, using short-lived accounts configured to leave few traces of network activity. The show more ...
NLRB whistleblower said the unusual large data outflows coincided with multiple blocked login attempts from an Internet address in Russia that tried to use valid credentials for a newly-created DOGE user account. The cover letter from Berulis’s whistleblower statement, sent to the leaders of the Senate Select Committee on Intelligence. The allegations came in an April 14 letter to the Senate Select Committee on Intelligence, signed by Daniel J. Berulis, a 38-year-old security architect at the NLRB. NPR, which was the first to report on Berulis’s whistleblower complaint, says NLRB is a small, independent federal agency that investigates and adjudicates complaints about unfair labor practices, and stores “reams of potentially sensitive data, from confidential information about employees who want to form unions to proprietary business information.” The complaint documents a one-month period beginning March 3, during which DOGE officials reportedly demanded the creation of all-powerful “tenant admin” accounts in NLRB systems that were to be exempted from network logging activity that would otherwise keep a detailed record of all actions taken by those accounts. Berulis said the new DOGE accounts had unrestricted permission to read, copy, and alter information contained in NLRB databases. The new accounts also could restrict log visibility, delay retention, route logs elsewhere, or even remove them entirely — top-tier user privileges that neither Berulis nor his boss possessed. Berulis writes that on March 3, a black SUV accompanied by a police escort arrived at his building — the NLRB headquarters in Southeast Washington, D.C. The DOGE staffers did not speak with Berulis or anyone else in NLRB’s IT staff, but instead met with the agency leadership. “Our acting chief information officer told us not to adhere to standard operating procedure with the DOGE account creation, and there was to be no logs or records made of the accounts created for DOGE employees, who required the highest level of access,” Berulis wrote of their instructions after that meeting. “We have built in roles that auditors can use and have used extensively in the past but would not give the ability to make changes or access subsystems without approval,” he continued. “The suggestion that they use these accounts was not open to discussion.” Berulis found that on March 3 one of the DOGE accounts created an opaque, virtual environment known as a “container,” which can be used to build and run programs or scripts without revealing its activities to the rest of the world. Berulis said the container caught his attention because he polled his colleagues and found none of them had ever used containers within the NLRB network. Berulis said he also noticed that early the next morning — between approximately 3 a.m. and 4 a.m. EST on Tuesday, March 4 — there was a large increase in outgoing traffic from the agency. He said it took several days of investigating with his colleagues to determine that one of the new accounts had transferred approximately 10 gigabytes worth of data from the NLRB’s NxGen case management system. Berulis said neither he nor his co-workers had the necessary network access rights to review which files were touched or transferred — or even where they went. But his complaint notes the NxGen database contains sensitive information on unions, ongoing legal cases, and corporate secrets. “I also don’t know if the data was only 10gb in total or whether or not they were consolidated and compressed prior,” Berulis told the senators. “This opens up the possibility that even more data was exfiltrated. Regardless, that kind of spike is extremely unusual because data almost never directly leaves NLRB’s databases.” Berulis said he and his colleagues grew even more alarmed when they noticed nearly two dozen login attempts from a Russian Internet address (83.149.30,186) that presented valid login credentials for a DOGE employee account — one that had been created just minutes earlier. Berulis said those attempts were all blocked thanks to rules in place that prohibit logins from non-U.S. locations. “Whoever was attempting to log in was using one of the newly created accounts that were used in the other DOGE related activities and it appeared they had the correct username and password due to the authentication flow only stopping them due to our no-out-of-country logins policy activating,” Berulis wrote. “There were more than 20 such attempts, and what is particularly concerning is that many of these login attempts occurred within 15 minutes of the accounts being created by DOGE engineers.” According to Berulis, the naming structure of one Microsoft user account connected to the suspicious activity suggested it had been created and later deleted for DOGE use in the NLRB’s cloud systems: “DogeSA_2d5c3e0446f9@nlrb.microsoft.com.” He also found other new Microsoft cloud administrator accounts with nonstandard usernames, including “Whitesox, Chicago M.” and “Dancehall, Jamaica R.” A screenshot shared by Berulis showing the suspicious user accounts. On March 5, Berulis documented that a large section of logs for recently created network resources were missing, and a network watcher in Microsoft Azure was set to the “off” state, meaning it was no longer collecting and recording data like it should have. Berulis said he discovered someone had downloaded three external code libraries from GitHub that neither NLRB nor its contractors ever use. A “readme” file in one of the code bundles explained it was created to rotate connections through a large pool of cloud Internet addresses that serve “as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.” Brute force attacks involve automated login attempts that try many credential combinations in rapid sequence. The complaint alleges that by March 17 it became clear the NLRB no longer had the resources or network access needed to fully investigate the odd activity from the DOGE accounts, and that on March 24, the agency’s associate chief information officer had agreed the matter should be reported to US-CERT. Operated by the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), US-CERT provides on-site cyber incident response capabilities to federal and state agencies. But Berulis said that between April 3 and 4, he and the associate CIO were informed that “instructions had come down to drop the US-CERT reporting and investigation and we were directed not to move forward or create an official report.” Berulis said it was at this point he decided to go public with his findings. An email from Daniel Berulis to his colleagues dated March 28, referencing the unexplained traffic spike earlier in the month and the unauthorized changing of security controls for user accounts. Tim Bearese, the NLRB’s acting press secretary, told NPR that DOGE neither requested nor received access to its systems, and that “the agency conducted an investigation after Berulis raised his concerns but ‘determined that no breach of agency systems occurred.'” The NLRB did not respond to questions from KrebsOnSecurity. Nevertheless, Berulis has shared a number of supporting screenshots showing agency email discussions about the unexplained account activity attributed to the DOGE accounts, as well as NLRB security alerts from Microsoft about network anomalies observed during the timeframes described. As CNN reported last month, the NLRB has been effectively hobbled since President Trump fired three board members, leaving the agency without the quorum it needs to function. “Despite its limitations, the agency had become a thorn in the side of some of the richest and most powerful people in the nation — notably Elon Musk, Trump’s key supporter both financially and arguably politically,” CNN wrote. Both Amazon and Musk’s SpaceX have been suing the NLRB over complaints the agency filed in disputes about workers’ rights and union organizing, arguing that the NLRB’s very existence is unconstitutional. On March 5, a U.S. appeals court unanimously rejected Musk’s claim that the NLRB’s structure somehow violates the Constitution. Berulis shared screenshots with KrebsOnSecurity showing that on the day the NPR published its story about his claims (April 14), the deputy CIO at NLRB sent an email stating that administrative control had been removed from all employee accounts. Meaning, suddenly none of the IT employees at the agency could do their jobs properly anymore, Berulis said. An email from the NLRB’s associate chief information officer Eric Marks, notifying employees they will lose security administrator privileges. Berulis shared a screenshot of an agency-wide email dated April 16 from NLRB director Lasharn Hamilton saying DOGE officials had requested a meeting, and reiterating claims that the agency had no prior “official” contact with any DOGE personnel. The message informed NLRB employees that two DOGE representatives would be detailed to the agency part-time for several months. An email from the NLRB Director Lasharn Hamilton on April 16, stating that the agency previously had no contact with DOGE personnel. Berulis told KrebsOnSecurity he was in the process of filing a support ticket with Microsoft to request more information about the DOGE accounts when his network administrator access was restricted. Now, he’s hoping lawmakers will ask Microsoft to provide more information about what really happened with the accounts. “That would give us way more insight,” he said. “Microsoft has to be able to see the picture better than we can. That’s my goal, anyway.” Berulis’s attorney told lawmakers that on April 7, while his client and legal team were preparing the whistleblower complaint, someone physically taped a threatening note to Mr. Berulis’s home door with photographs — taken via drone — of him walking in his neighborhood. “The threatening note made clear reference to this very disclosure he was preparing for you, as the proper oversight authority,” reads a preface by Berulis’s attorney Andrew P. Bakaj. “While we do not know specifically who did this, we can only speculate that it involved someone with the ability to access NLRB systems.” Berulis said the response from friends, colleagues and even the public has been largely supportive, and that he doesn’t regret his decision to come forward. “I didn’t expect the letter on my door or the pushback from [agency] leaders,” he said. “If I had to do it over, would I do it again? Yes, because it wasn’t really even a choice the first time.” For now, Mr. Berulis is taking some paid family leave from the NLRB. Which is just as well, he said, considering he was stripped of the tools needed to do his job at the agency. “They came in and took full administrative control and locked everyone out, and said limited permission will be assigned on a need basis going forward” Berulis said of the DOGE employees. “We can’t really do anything, so we’re literally getting paid to count ceiling tiles.” Further reading: Berulis’s complaint (PDF).
A proof-of-concept (PoC) attack vector exploits two Azure authentication tokens from within a browser, giving threat actors persistent access to key cloud services, including Microsoft 365 applications.
Dialysis firm DaVita, Wisconsin-based Bell Ambulance, and Alabama Ophthalmology Associates all suffered apparent or confirmed ransomware attacks this month.
Agentic AI's appeal is growing as organizations seek more autonomous and hands-off approaches to their security protocols as risks increase and threats become more sophisticated.
Understanding how multiple AI models speak to each other and deciding which framework to use requires careful evaluation of both the business benefits of advanced AI orchestration and the cybersecurity implications of connecting automated services.
The incident should serve as a critical wake-up call. The stakes are simply too high to treat AI security as an afterthought — especially when the Dark Web stands ready to capitalize on every vulnerability.
The tech giant is boosting Entra ID and MSA security as part of the wide-ranging Secure Future Initiative (SFI) that the company launched following a Chinese APT's breach of its Exchange Online environment in 2023.
In a statement filed to London’s stock exchange on Tuesday afternoon, the company said it made “some minor, temporary changes to our store operations” as soon as it became aware of the incident.
Kremlin-backed hackers have tried sabotage attacks against critical infrastructure in the Netherlands, the country's Military Intelligence and Security Service said in its annual report.
The Chinese advanced persistent threat group Billbug — also known as Lotus Panda, Lotus Blossom and Bronze Elgin — recently targeted several organizations in a single Southeast Asian nation, according to researchers at Symantec.
Russia-linked phishing attacks targeting NGOs with ties to Ukraine ask victims to join a video call, and result in them gaining access to Microsoft 365 accounts.
The China-linked cyber espionage group tracked as Lotus Panda has been attributed to a campaign that compromised multiple organizations in an unnamed Southeast Asian country between August 2024 and February 2025. "Targets included a government ministry, an air traffic control organization, a telecoms operator, and a construction company," the Symantec Threat Hunter Team said in a new report
Microsoft on Monday announced that it has moved the Microsoft Account (MSA) signing service to Azure confidential virtual machines (VMs) and that it's also in the process of migrating the Entra ID signing service as well. The disclosure comes about seven months after the tech giant said it completed updates to Microsoft Entra ID and MS for both public and United States government clouds to
As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However, unlike endpoints, browsers remain mostly unmonitored, despite being responsible for more than 70% of modern malware attacks. Keep Aware’s recent State of Browser Security report highlights major concerns security leaders face with employees using the web browser for most of their work.
In what has been described as an "extremely sophisticated phishing attack," threat actors have leveraged an uncommon approach that allowed bogus emails to be sent via Google's infrastructure and redirect message recipients to fraudulent sites that harvest their credentials. "The first thing to note is that this is a valid, signed email – it really was sent from no-reply@google.com," Nick Johnson
Cybersecurity researchers have detailed a malware campaign that's targeting Docker environments with a previously undocumented technique to mine cryptocurrency. The activity cluster, per Darktrace and Cado Security, represents a shift from other cryptojacking campaigns that directly deploy miners like XMRig to illicitly profit off the compute resources. This involves deploying a malware strain
Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker to elevate their privileges in the Cloud Composer workflow orchestration service that's based on Apache Airflow. "This vulnerability lets attackers with edit permissions in Cloud Composer to escalate their access to the default Cloud Build service account, which
In episode 47 of The AI Fix, o3 becomes the best competitive programmer in the world, hacked California crosswalks speak with the voice of Elon Musk and Mark Zuckerberg, Meta introduces a herd of Llamas, Graham explains what a "lollipop lady" is, and Google talks to some dolphins. Graham discovers an AI show more ...
that's just a warehouse full of people, o3 becomes the best computer programmer in the world, and Mark wonders if software engineering will be the first job to fall to AI. All this and much more is discussed in the latest edition of "The AI Fix" podcast by Graham Cluley and Mark Stockley.
"Stop, look, and listen" is the standard advice we should allow follow when crossing the road - but pedestrians in some parts are finding that they cannot believe their ears - after a hacker compromised crosswalks to play deepfake audio mocking tech bosses Elon Musk, Mark Zuckerberg, and Jeff Bezos. Read more in my article on the Hot for Security blog.
In today’s digital world, your personal data is like cold hard cash, and that’s why cyberthieves are always looking for ways to steal it. Whether it’s an email address, a credit card number, or even medical records, your personal information is incredibly valuable in the wrong hands. For hackers, breaking into show more ...
a company database is like hitting the mother lode, giving them access to millions of personal records. Why? Because whether you know it or not, many companies are collecting and storing your private data. Think about all the information you hand over when you order something online, like your full name, your credit card number, your home address, and maybe even your birthdate just to snag an extra discount. If a company you do business with becomes part of a data breach, cybercriminals may have full access to your confidential information. Unfortunately, data breaches are on the rise and affecting more companies and consumers than ever. In 2024, more than 1.3 billion people received notices that their information was exposed in a data breach. Chances are you’ve received at least one of these letters, which means you have been put at risk for identity theft and major financial losses. What are data breaches and how do they happen? Data breaches occur when sensitive, protected, or confidential data is hacked or leaked from a company or organization. Sometimes businesses are targeted because they have outdated or weak security. While no industry is immune, some sectors are more likely to become victims of breaches because of the sensitive nature of the data they handle. Here are some of the most likely targets for access to consumer data: Healthcare organizations: Healthcare companies are a prime target for cybercrime due to the large amounts of sensitive data they store, which includes personal information and medical records. In 2024, there were 14 data breaches involving 1 million or more healthcare records. The largest breach affected an estimated 190 million people and a ransom of 22 million dollars was collected by the hackers. Financial services industry: Banks, insurance companies and other financial organizations offer a wealth of opportunity for hackers who can use stolen bank account and credit card information for their own financial gain. In 2024, mortgage lender LoanDepot was the victim of a cyberattack that compromised the information of more than 16 million individuals. Retail and e-commerce: Retail and ecommerce businesses are vulnerable to breaches because they handle and store vast amounts of customer payment information, including addresses, credit card numbers and more. Many retailers operate both brick-and-mortar stores and ecommerce platforms and rely on a variety of mobile apps, PoS (point-of-sale) systems, and cloud-based platforms, which creates more entry points for hackers to exploit. Tech companies: With access to user data, software systems and intellectual property, tech firms are frequent targets. Apple, Twitter and Meta have all reportedly been victims of cyberattacks. Government agencies: Because government organizations store highly sensitive information, social security numbers, they are considered especially high-value targets for cyberattacks. The most-wanted data The type of information stolen in data breaches varies depending on the organization, but here’s a list of the kind of data cybercriminals are seeking: Emails and passwords Payment and credit card information Medical records and health data Social Security numbers Driver’s license numbers Banking details and account numbers What hackers do with your data Once data is exposed in a breach, cybercriminals will test your usernames and password combinations across thousands of sites, knowing that most people recycle their emails and passwords. Here are just some of the ways hackers exploit your stolen information: Identity theft: Hackers use your personal info to impersonate you. They can open accounts in your name, apply for loans, and even file false tax returns. Selling it on the dark web: Stolen data is frequently sold to the highest bidder on dark web marketplaces. This makes it accessible to a worldwide network of criminals. Phishing and social engineering: Using your personal information, scammers can craft more convincing phishing emails or messages to trick you into giving up even more sensitive details, like passwords and PIN numbers. Financial exploitation: When your credit card numbers or bank account details are compromised, cyber thieves can use that information to make financial transactions in your name. They can rack up charges on your credit cards and even drain your bank accounts. Data reuse and repurposing: It’s important to remember that your stolen information can be used for fraud and theft even years after a data breach, so it’s crucial to stop using recycled usernames and passwords on both old and new accounts or systems. Hijacking online accounts: If your login credentials (usernames and passwords) are leaked, all your online accounts are put at risk. Besides your financial accounts, cyber thieves can also access your social media accounts and other platforms, leading to a major loss of privacy in addition to monetary losses. How to minimize the risks Stay alert: Be on the lookout for any signs of fraud and use an identity protection plan to guard against suspicious activity. Webroot Total Protection monitors the dark web for you and sends alerts if your email or personal information has been found in a breach. Use strong, unique passwords: Strong, unique passwords are a simple, yet powerful security tool. Webroot Essentials plans offer password managers that do the hard work for you, keeping all your passwords safe and encrypted while you remember just one password for a quick and seamless login on every site and app. Enable two-factor authentication (2FA): Turn on two-factor identification wherever possible, especially for financial accounts and email. This adds an extra step to your login process and makes it much harder for hackers to gain access. Also, remember to update and reset your passwords on a regular basis and always delete any old, unused online accounts. Keep your devices protected: Always keep your device software updated and use antivirus and internet security software. Webroot Premium protects your devices from malware, viruses and phishing attempts and provides identity protection so you’re immediately alerted if your information is leaked in a data breach or found on the dark web. If you do become a victim of identity theft, you’ll have 24/7 U.S.-based customer support and up to $1 million in expense reimbursement. Update your identity protection plan: Remember to keep your identity protection plan updated, so your personal details like birthdate, Social Security number and driver’s license number are current. Make sure all your family members are onboarded, especially children and older relatives. Also, get real time fraud detection by setting up threshold alerts on your financial accounts so you’re notified of any suspicious transactions as soon as they occur. Monitor constantly: It’s important to remember that even if your personal data was exposed years ago, it can still resurface and cause problems at any time. Especially when it comes to children and the elderly, suspicious financial activity can happen without their knowledge and go undetected. For example, it’s not uncommon for a young student to find out they have a poor credit score only when they to try to open their first credit card account. The student had no idea that a cybercriminal used their information for fraudulent purposes and is forced to go through a difficult and costly process to restore their good credit. Most identity protection plans include monitoring and remediation, even if the fraud happened years ago and is affecting you or your family today. Data breaches are a fact of life in the digital world we live in, but you can protect yourself with some smart security measures. By using strong passwords, password managers, antivirus software, and identity protection plans, you can reduce your risk of becoming a victim of cybercrime, and even get help to restore your identity, your financial losses and your reputation. It’s like putting a lock on your personal data. When it comes to your sensitive information, it’s always better to be safe than sorry. Looking for more information and solutions? Top cyberthreats of 2025 Keeping educational systems secure How to keep your personal data safe Protect yourself from identity theft Safeguarding your devices from malware The post The danger of data breaches — what you really need to know appeared first on Webroot Blog.
Source: www.networkworld.com – Author: News Apr 17, 20255 mins Communications SecuritySecurity Monitoring SoftwareSecurity Operations Center The 2025 X-Force Threat Intelligence Index tracks new and existing trends and attack patterns, including a spike in lower-profile credential theft and overall decline in show more ...
ransomware attacks on enterprises. Cybercriminals are adopting increasingly stealthy tactics for breaking into networks, while […] La entrada IBM X-Force: Stealthy attacks on the rise, toolkits targeting AI emerge – Source: www.networkworld.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.csoonline.com – Author: The core elements of cloud-native application protection platforms work together to provide a holistic approach to securing cloud-native applications from development to production. As cloud-native architectures continue to evolve, so have the complexities of securing them. show more ...
Traditional security approaches, often built around static infrastructure and perimeter defenses, struggle to keep pace […] La entrada Addressing the gaps in modern cloud protection: Using CNAPP to unify cloud security – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.csoonline.com – Author: Executive “supersatisified” with work so far on project to overhaul company security culture and application design. Microsoft says five of the 28 objectives it set for overhauling the way it designs, builds, tests, and operates products and services to improve security show more ...
are nearing completion, although there are still years to go […] La entrada Microsoft SFI update: Five of 28 security objectives nearly complete – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.csoonline.com – Author: Users who cannot apply patches immediately must strengthen router and WiFi authentication to protect against attackers hijacking router functions. ASUS is urging customers with AiCloud enabled on their ASUS routers to immediately upgrade firmware against a critical show more ...
vulnerability that allows unauthorized activities by remote actors. Tracked as CVE-2025-2492, the vulnerability is […] La entrada ASUS patches critical router flaw that allows remote attacks – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.csoonline.com – Author: AI is transforming incident response from a reactive scramble to a proactive force, sniffing out threats, decoding chaos, and stepping in just in time to save the day. For years, cybersecurity incident response was a bit like listening for smoke alarms in a mansion–if you show more ...
heard a beep, you knew something […] La entrada AI in incident response: from smoke alarms to predictive intelligence – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.csoonline.com – Author: Expected to ease security teams’ workloads, AI is adding pressure, forcing them to govern and adopt it while managing existing responsibilities, often without proper training. AI was supposed to make security teams more efficient, but instead, it’s making their jobs show more ...
harder. Security professionals are being pulled in two directions: they’re being […] La entrada Two ways AI hype is worsening the cybersecurity skills crisis – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the show more ...
security solution. There are several actions that could […] La entrada ‘Fog’ Hackers Troll Victims With DOGE Ransom Notes – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed show more ...
triggered the security solution. There are several actions […] La entrada ‘Elusive Comet’ Attackers Use Zoom to Swindle Victims – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered show more ...
the security solution. There are several actions that could […] La entrada Nation-State Threats Put SMBs in Their Sights – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered show more ...
the security solution. There are several actions that could […] La entrada Can Cybersecurity Weather the Current Economic Chaos? – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed show more ...
triggered the security solution. There are several actions […] La entrada ASUS Urges Users to Patch AiCloud Router Vuln Immediately – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Chuck Herrin Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. show more ...
There are several actions that could trigger this […] La entrada The Global AI Race: Balancing Innovation and Security – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . The China-linked cyber espionage group tracked as Lotus Panda has been attributed to a campaign that compromised multiple organizations in an unnamed Southeast Asian country between August 2024 and February 2025. “Targets included a government ministry, an air traffic show more ...
control organization, a telecoms operator, and a construction company,” the Symantec […] La entrada Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: hackread.com – Author: Waqas. Fake Booking.com emails trick hotel staff into running AsyncRAT malware via fake CAPTCHA, targeting systems with remote access trojan. A new phishing campaign is targeting hotel staff with fake Booking.com emails, tricking victims into executing malicious commands on their show more ...
own systems. The scam appears well-planned, combining social engineering with the […] La entrada Booking.com Phishing Scam Uses Fake CAPTCHA to Install AsyncRAT – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: hackread.com – Author: Owais Sultan. There’s nothing like the freedom of the open road when you’re on a motorcycle. But staying connected while you ride can be tough. Whether it’s for safety, directions, or just talking to a passenger or riding group, a Bluetooth motorcycle intercom can make a show more ...
huge difference. It adds convenience, […] La entrada Riding Smarter: A Guide to Bluetooth Motorcycle Intercoms – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityboulevard.com – Author: Amy Cohn Is Secrets Scanning the Key to Assured Security? The alarming rise in data breaches and cyber threats globally raises an essential question – is secrets scanning the definitive answer to assured security? I grapple with this question every day. This article show more ...
offers some valuable insights into why secrets scanning […] La entrada Assured Security with Secrets Scanning – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
In the world of engineering, simulations are key to predicting failure and saving lives — from towering skyscrapers to delicate heart stents. Sena Kizildemir, Ph.D., shares how high-fidelity modeling can protect lives, infrastructure, and the future before anything goes wrong. Source Views: 0 La entrada The Art of show more ...
Predicting Failure: Using Simulation to Stay One Step Ahead of Disaster se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.securityweek.com – Author: Ryan Naraine North Korean cryptocurrency thieves are quietly repurposing a little‑known Zoom Remote collaboration feature to plant infostealer malware on the workstations of cryptocurrency traders and venture investors. According to separate advisories from the show more ...
non‑profit Security Alliance (SEAL) and cybersecurity research firm Trail of Bits, Pyongyang hackers posing as VC investors […] La entrada North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: heimdalsecurity.com – Author: Gabriella Antal Privileged access management is one of the most important topics in cybersecurity – yet it can be a minefield to get right. For hackers, elevated permissions are one of the absolute best ways to plan and execute a successful account. In fact, many attacks show more ...
would simply be impossible without them. […] La entrada The Complete Guide to PAM Tools, Features, and Techniques – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.