Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for British National All ...

 Cyber News

The U.S. is alleging that 25-year-old British national Kai West is the prolific hacker “IntelBroker.” IntelBroker was arrested in February, the Paris, France Public Prosecutor’s Office announced yesterday, while also revealing that four members of the “ShinyHunters” collective that operated the BreachForums   show more ...

cybercrime forum were arrested this week. French officials didn’t name IntelBroker or the other hackers, but the U.S. named West in a four-count indictment and complaint unsealed yesterday. How FBI investigators made the connection between West and IntelBroker was detailed in the 15-page complaint filed in the U.S. District Court for the Southern District of New York. IntelBroker Mingled Personal, Online Accounts, U.S. Alleges The U.S. alleges that IntelBroker and the “CyberNiggers” group conspired “to steal data from a telecommunications company, municipal health care provider, an Internet service provider, and more than 40 other victims,” according to a Justice Department press release announcing the unsealing of the court documents. West and his co-conspirators “took that stolen data, and offered it for sale online for more than $2 million,” the press release claims, adding that the alleged hackers “caused in excess of $25 million in damages to victims.” West was arrested in France in February 2025, and the U.S. is seeking his extradition. An undercover purchase by law enforcement in January 2023 helped investigators begin to piece together IntelBroker’s identity, according to the complaint signed by an FBI Special Agent. IntelBroker offered for sale an API key for a particular victim for $250 in Monero cryptocurrency, the complaint said. An undercover agent sent a private message to IntelBroker asking if the threat actor would sell the data for $250 in Bitcoin, a cryptocurrency that isn’t as private as Monero. IntelBroker gave the agent a particular Bitcoin wallet address referred to as "BTC Wallet-1” in the complaint. After the agent sent the payment, IntelBroker provided the API key “as well as three purported administrator logins with a password for those logins.” FBI personnel analyzed BTC Wallet-1’s transactions on the Bitcoin blockchain and connected four transactions and two other accounts, dubbed “West Wallet-1” and “Ramp Account-1,” that seeded BTC Wallet-1. The FBI concluded that BTC Wallet-1 was created as a pass-through wallet to obscure funds from Ramp Account-1. Ramp Account-1 “is associated with a particular United Kingdom Provisional Driving License with the name ‘Kai Logan West,’” who also goes by the alias “Kyle Northern,” the U.S. complaint claims. That license is also associated with a particular Coinbase account that investigators said they connected to West via “Know-Your-Customer” (KYC) data. The court filing included an image of that license with some information redacted: Both Ramp Account-1 and the Coinbase account were registered to a personal email account used by West, the U.S. claims. Investigators also tied a data storage invoice and university correspondence with the email account that they say also confirms West’s identity. Accounts registered to West’s email account also used the same IP addresses as “IntelBroker,” the complaint alleges, and the email account also had YouTube activity that overlapped with IntelBroker. Also read: IntelBroker Interview: The Elusive Hacker in the Shadows Talks to The Cyber Express ‘Innocent Unless and Until Proven Guilty’ Whether the U.S. has enough evidence to convict West – or elicit a plea deal – is a matter for the courts to decide. As the press release noted, “The charges contained in the Indictment and Complaint are merely accusations, and the defendant is presumed innocent unless and until proven guilty.” West has been charged with conspiracy to commit computer intrusions, which carries a maximum sentence of five years in prison; conspiracy to commit wire fraud, which carries a maximum sentence of 20 years in prison; accessing a protected computer to obtain information, which carries a maximum sentence of five years in prison; and wire fraud, which carries a maximum sentence of 20 years in prison.

image for How to survive digit ...

 Business

Digitalization of business – especially in the small and medium-sized segment – allows for quick upscaling, better customer service, and entry into new markets. On the downside, digitalization amplifies the damage caused by a cyberattack, and complicates the recovery process. Given that company resources are   show more ...

always limited, which attacks should be deflected first? To answer this question, we studied the INTERPOL Africa Cyberthreat Assessment Report 2025. The document is useful because it collates police cybercrime statistics and data from information security companies – including Kaspersky – allowing us to compare the number and types of attacks with the actual damage they caused. This data can be used to build a companys information security strategy. Average ranking of cybercrime types by reported financial impact across African subregions, based on INTERPOL member country data. Source Targeted online fraud Fraudulent operations were the clear leader in terms of damage caused across the continent. Theyre gaining momentum in line with the rising popularity of mobile banking, digital commerce, and social media. In addition to mass phishing aimed at personal and payment data theft, targeted attacks are growing at a rapid rate. Scammers are grooming potential victims in messenger apps for months, building trust and guiding them into a money extortion scheme – for example, a fake cryptocurrency investment. Such schemes often exploit romantic relationships and are therefore called romance scams, but there are other variations. In Nigeria and Ivory Coast, for example, scammers were arrested for attacking small media platforms and advertising agencies. Posing as advertisers, they stole almost 1.5 million U.S. dollars from victims. The fact that 93% of Africans use plain old WhatsApp rather than corporate communication tools for work significantly boosts the success rate of attacks on employees and company owners. Ransomware incidents Press headlines may give the impression that ransomware operators mainly target large organizations, but the statistics in the report debunk this theory – showing that both the number of attacks and the actual financial damage caused are significant across all business segments. Whats more, theres a direct link between the level of digitalization and the number of attacks. So, if a company observes an overall increase in digitized business activity in its market segment, the threat level is sure to rise accordingly. In Africa, affiliates of the largest and most dangerous ransomware-as-a-service platforms – such as LockBit and Hunters International – are responsible for major incidents on a national scale. Among the main ransomware incidents in Africa – hardly known about outside the continent – we highlight the following: the theft of $7 million from Nigerian fintech company Flutterwave; attacks on Cameroonian electricity supplier ENEO; a large-scale ransomware attack to exfiltrate data from Telecom Namibia; and the targeting of South Africas National Health Laboratory Service (NHLS), which led to canceled operations and the loss of millions of lab test results. Banking Trojans and infostealers Although the direct losses from banking Trojans and infostealers fell outside the top-three in terms of damage, its the successes of this criminal industry that have a direct impact on the number and severity of other attacks – primarily ransomware and business email compromise (BEC). After stealing what credentials they can from thousands of users with infostealers, attackers filter and group them by various criteria, then sell curated sets of accounts on the illicit market. This allows other criminals to buy passwords to infiltrate organizations of interest to them. Business email compromise For small and medium businesses mainly using public services like Gmail or Office 365, infection with an infostealer gives attackers full access to corporate correspondence and business operations. The attackers can then exploit this to trick customers and counterparties into paying for goods and services to a fraudulent account. BEC attacks have a firm hold at the top of the damage charts, and small businesses can fall victim to them in two ways. First, cybercriminals can extract money from larger clients or partners by impersonating the compromised small business. Second, its easier with a small business to persuade the owner or accountant to transfer money than it is with a large organization. There are several large criminal syndicates based in Africa that are responsible for international BEC operations causing multi-billion-dollar damage. Their targets also include African organizations — primarily those in the financial and international trade sectors. How to protect business from cyberthreats To effectively counter digital threats, law enforcement agencies need to share data with commercial information security companies that harness telemetry to identify threat distribution hotspots. Recent successes of such partnerships include operations Serengeti (1000 arrests, 134 000 malicious online resources disabled), Red Card (300 arrests), and Secure (32 arrests, 20 000 malicious resources disabled). These operations, conducted under the auspices of INTERPOL, used cyberthreat intelligence received from partners – including Kaspersky. But businesses cant leave cybersecurity solely to the police; they need to implement simple but effective security measures of their own: Enable phishing-resistant multi-factor authentication (MFA) for all online accounts: Google, Microsoft, WhatsApp, etc. Install reliable anti-malware protection on all corporate and personal devices. For corporate devices, centralized security management is recommended – as implemented, for example, in Kaspersky Endpoint Detection and Response. Hold regular cybersecurity training – for example, using our Kaspersky Automated Security Awareness platform. This will reduce the risk of your company falling victim to BEC and phishing. All employees, including management, should participate in training regularly. Back up all company data on a regular basis and in such a way that the backups cant be destroyed during an attack. This means backing up data either to media that are physically disconnected from the network, or to cloud storage where a policy prohibits data deletion.

 Feed

Popular messaging platform WhatsApp has added a new artificial intelligence (AI)-powered feature that leverages its in-house solution Meta AI to summarize unread messages in chats. The feature, called Message Summaries, is currently rolling out in the English language to users in the United States, with plans to bring it to other regions and languages later this year. It "uses Meta AI to

 Feed

An Iranian state-sponsored hacking group associated with the Islamic Revolutionary Guard Corps (IRGC) has been linked to a spear-phishing campaign targeting journalists, high-profile cyber security experts, and computer science professors in Israel. "In some of those campaigns, Israeli technology and cyber security professionals were approached by attackers who posed as fictitious assistants to

 Feed

Cybersecurity researchers are calling attention to a series of cyber attacks targeting financial organizations across Africa since at least July 2023 using a mix of open-source and publicly available tools to maintain access. Palo Alto Networks Unit 42 is tracking the activity under the moniker CL-CRI-1014, where   show more ...

"CL" refers to "cluster" and "CRI" stands for "criminal motivation." It's suspected

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added three security flaws, each impacting AMI MegaRAC, D-Link DIR-859 router, and Fortinet FortiOS, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2024-54085 (CVSS score: 10.0) - An authentication bypass by spoofing

 Feed

SaaS Adoption is Skyrocketing, Resilience Hasn’t Kept Pace SaaS platforms have revolutionized how businesses operate. They simplify collaboration, accelerate deployment, and reduce the overhead of managing infrastructure. But with their rise comes a subtle, dangerous assumption: that the convenience of SaaS extends to resilience. It doesn’t. These platforms weren’t built with full-scale data

 Feed

Cybersecurity researchers have disclosed a critical vulnerability in the Open VSX Registry ("open-vsx[.]org") that, if successfully exploited, could have enabled attackers to take control of the entire Visual Studio Code extensions marketplace, posing a severe supply chain risk. "This vulnerability provides attackers full control over the entire extensions marketplace, and in turn, full control

 Feed

Cisco has released updates to address two maximum-severity security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could permit an unauthenticated attacker to execute arbitrary commands as the root user. The vulnerabilities, assigned the CVE identifiers CVE-2025-20281 and CVE-2025-20282, carry a CVSS score of 10.0 each. A description of the defects is

 Feed

The ClickFix social engineering tactic as an initial access vector using fake CAPTCHA verifications increased by 517% between the second half of 2024 and the first half of this year, according to data from ESET. "The list of threats that ClickFix attacks lead to is growing by the day, including infostealers, ransomware, remote access trojans, cryptominers, post-exploitation tools, and even

 Botnet

In this episode of the "Smashing Security" podcast, Graham unravels Operation Endgame - the surprisingly stylish police crackdown that is seizing botnets, mocking malware authors with anime videos, and taunting cybercriminals via Telegram. And BBC cyber correspondent Joe Tidy joins us to talk about   show more ...

"Ctrl-Alt-Chaos", his new book diving into the murky world of teenage hackers, ransomware gangs, and the strange motivations that lie behind digital mayhem.

 ESET research

A view of the H1 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Written by Unit 42, the research team at Palo Alto Networks, has identified a new malicious campaign targeting many financial organizations across Africa. The attackers, tracked as CL-CRI-1014, have been actively targeting the African financial sector since at   show more ...

least 2023. The Unit 42 researchers assessed that they act as initial access […] La entrada Hackers Use Open-Source Offensive Cyber Tools to Attack Financial Businesses in Africa – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . New research has uncovered continued risk from a known security weakness in Microsoft’s Entra ID, potentially enabling malicious actors to achieve account takeovers in susceptible software-as-a-service (SaaS) applications. Identity security company Semperis, in an   show more ...

analysis of 104 SaaS applications, found nine of them to be vulnerable to Entra ID cross-tenant […] La entrada nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Citrix

Source: thehackernews.com – Author: . Citrix has released security updates to address a critical flaw affecting NetScaler ADC that it said has been exploited in the wild. The vulnerability, tracked as CVE-2025-6543, carries a CVSS score of 9.2 out of a maximum of 10.0. It has been described as a case of memory   show more ...

overflow that […] La entrada Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Citrix

Source: thehackernews.com – Author: . Cybersecurity researchers have detailed two now-patched security flaws in SAP Graphical User Interface (GUI) for Windows and Java that, if successfully exploited, could have enabled attackers to access sensitive information under certain conditions. The vulnerabilities,   show more ...

tracked as CVE-2025-0055 and CVE-2025-0056 (CVSS scores: 6.0), were patched by SAP as part of […] La entrada Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Thousands of personal records allegedly linked to athletes and visitors of the Saudi Games have been published online by a pro-Iranian hacktivist group called Cyber Fattah. Cybersecurity company Resecurity said the breach was announced on Telegram on June 22, 2025, in the   show more ...

form of SQL database dumps, characterizing it as […] La entrada Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Beware

Source: thehackernews.com – Author: . If you invite guest users into your Entra ID tenant, you may be opening yourself up to a surprising risk.  A gap in access control in Microsoft Entra’s subscription handling is allowing guest users to create and transfer subscriptions into the tenant they are invited   show more ...

into, while maintaining full ownership […] La entrada Beware the Hidden Risk in Your Entra Environment – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Matt Palmer A few years ago I wrote a short article about the Titanic, and the lessons for cyber risk management. However, there’s arguably a far more interesting part to that story. When the RMS Titanic hit an iceberg on 15 April 1912, she set off flares and her   show more ...

wireless operator […] La entrada Lessons from the Titanic: when you don’t respond to a crisis – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Brian Bensky The decision to adopt a purpose-built container operating system (OS) versus maintaining a standard OS across legacy and cloud-native systems depends on your organization’s risk tolerance, compliance requirements, and visibility needs. Below is a structured   show more ...

approach you can take to evaluate the trade-offs and select the right strategy. Why […] La entrada Is Container OS Insecurity Making Your K8s Infrastructure Less Secure? – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Banking

Source: securityboulevard.com – Author: Matthew Rosenquist A coalition of banking industry associations, including SIFA, the American Bankers Association (ABA), Bank Policy Institute (BPI), and several other lobbying groups have made a disgraceful appeal to the SEC to eliminate the rule requiring public   show more ...

disclosure of material cybersecurity incidents within four days of detection. This rule was […] La entrada Bankers Association’s Attack on Cybersecurity Transparency – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Application Security

Source: securityboulevard.com – Author: Marc Handelman Author/Presenter: Joe Ryan (High Performance Computing Systems Engineer, Institute for Cyber Enabled Research (ICER) at Michigan State University Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of   show more ...

Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest Northwest 2025 video content. Originating from the conference’s […] La entrada LinuxFest Northwest: Operating System Upgrades In A High Performance Computing Environment – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 agentic ai

Source: securityboulevard.com – Author: Tom Hollingsworth In the evolving landscape of cyber threats, security teams often find themselves overwhelmed. They are constantly battling an unrelenting barrage of incidents with limited resources. Traditional automation falls short. The dynamic and unpredictable   show more ...

nature of modern attacks keeps threat actors one step ahead of defenders. This is where Microsoft […] La entrada The Era of Agentic Security with Microsoft Security Copilot – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Source: securityboulevard.com – Author: Tom Hollingsworth In March 2024, Veeam, a leader in data protection, made a strategic move that significantly improved its stance on ransomware: the acquisition of Coveware. This wasn’t just another corporate acquisition. It was a deep integration of specialized   show more ...

expertise and cutting-edge technology, transforming Veeam from a backup and recovery solution […] La entrada Beyond Backup: How Coveware is Revolutionizing Veeam’s Ransomware Defense – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Namita Sharma Product-market fit is every startup’s holy grail, but getting there often feels like a costly game of trial and error. While founders hustle to validate their idea, build fast, and iterate even faster, they’re also battling budget constraints and   show more ...

technical blind spots. That’s where a Fractional CTO steps in. […] La entrada How a Fractional CTO Can Help You Nail Product Market Fit (Without Burning Budget) – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Kasada NEW YORK & SYDNEY – June 25, 2025 — Kasada, the trusted provider of advanced bot defense for the web’s most targeted brands, and Vercel, the complete platform for the web, today announced a strategic partnership and the release of Vercel BotID, a   show more ...

zero‑friction invisible security layer that places Kasada’s battle‑tested bot defense directly […] La entrada Kasada and Vercel Launch BotID: Invisible Bot Protection, Built for Developers – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Jason Kwon Organizations may have a need to write applications or scripts which call GitHub APIs. One common method for authenticating against GitHub APIs is to use personal access tokens (PATs), which are user-generated, fine-grained tokens. These tokens can be limited   show more ...

to specific repositories, and their permissions can be scoped to […] La entrada Replacing a GitHub Personal Access Token With a GitHub Application – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 bot detection

Source: securityboulevard.com – Author: Tyrone Dougherty From a packed house in NYC to screens across the globe, one message from Vercel Ship 2025 resonated with over 50,000 developers: the web is evolving, and so are the threats. Sophisticated bots are a direct threat to your applications, users, and bottom   show more ...

line. CAPTCHA’s tax on users degrades […] La entrada The Best CAPTCHA is No CAPTCHA: Introducing Vercel BotID, Powered by Kasada – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . An Iranian state-sponsored hacking group associated with the Islamic Revolutionary Guard Corps (IRGC) has been linked to a spear-phishing campaign targeting journalists, high-profile cyber security experts, and computer science professors in Israel. “In some of those   show more ...

campaigns, Israeli technology and cyber security professionals were approached by attackers who posed as […] La entrada Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 cyber

Source: thehackernews.com – Author: . Cybersecurity researchers are calling attention to a series of cyber attacks targeting financial organizations across Africa since at least July 2023 using a mix of open-source and publicly available tools to maintain access. Palo Alto Networks Unit 42 is tracking the   show more ...

activity under the moniker CL-CRI-1014, where “CL” refers to […] La entrada Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added three security flaws, each impacting AMI MegaRAC, D-Link DIR-859 router, and Fortinet FortiOS, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.   show more ...

The list of vulnerabilities is as follows – CVE-2024-54085 (CVSS score: 10.0) – […] La entrada CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Popular messaging platform WhatsApp has added a new artificial intelligence (AI)-powered feature that leverages its in-house solution Meta AI to summarize unread messages in chats. The feature, called Message Summaries, is currently rolling out in the English language to   show more ...

users in the United States, with plans to bring it to […] La entrada WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2025-06
SUN
MON
TUE
WED
THU
FRI
SAT
JuneJulyAugust