The Zelle lawsuit 2025 is making headlines as New York Attorney General Letitia James takes legal action against Early Warning Services (EWS), the creator of the popular digital payment platform. The creator of Zelle, one of the most widely used digital payment platforms in the United States, is facing a major lawsuit show more ...
from the state of New York over allegations that it failed to protect users from a series of scams that tapped away more than $1 billion between 2017 and 2023. New York Attorney General Letitia James announced on Wednesday that her office is suing EWS, the financial technology company behind Zelle, claiming it knowingly allowed scammers to exploit the platform for years without putting in place basic safeguards to protect consumers. From Convenience to Controversy Launched in 2017, Zelle quickly became a popular in U.S. peer-to-peer payments. It enabled anyone with a U.S. bank account to send or receive money instantly using just an email address or phone number. By 2024, the platform boasted more than 151 million enrolled users and processed over $1 trillion in transactions for the first time. However, its features that made Zelle popular, instant transfers, easy sign-up, and no middleman delays, also made it a magnet for fraud. Cybercriminals quickly learned to impersonate businesses, utilities, and even government agencies, tricking victims into sending money that, once gone, was nearly impossible to recover. New York officials say that in many cases, victims had no recourse. By the time they realized they had been conned, the money had long vanished. “Zelle quickly became a hub for fraudulent activity,” James’ office said. Zelle Lawsuit 2025: Attorney General Targets Early Warning Services According to the Zelle lawsuit, Early Warning Services was aware of rampant fraud on its platform almost from the start but did little to stop it. Investigators claim EWS failed to adopt anti-fraud tools it developed as early as 2019 and neglected to enforce even its limited safeguards on participating banks, despite knowing these rules were being violated. The Attorney General’s office cited cases in which New Yorkers were targeted with fake utility payment scams. In one common scenario, victims received urgent calls claiming they were behind on energy bills and faced an imminent power shutoff. The caller would then instruct them to pay immediately through Zelle to what appeared to be a legitimate company account — but was actually a scammer-controlled address. When victims reported the fraud to their banks, many were told there was nothing the bank could do and that their money could not be returned. James pointed out that EWS is owned and controlled by some of the biggest names in U.S. banking, including JPMorgan Chase, Bank of America, Wells Fargo, and Capital One. She alleged that these banks, threatened by the rise of rivals like Venmo, PayPal, and Cash App, rushed to launch Zelle without putting sufficient consumer protections in place. “No one should be left to fend for themselves after falling victim to a scam,” James said. “I look forward to getting justice for the New Yorkers who suffered because of Zelle’s security failures.” The Zelle lawsuit seeks restitution and damages for affected New Yorkers, as well as a court order requiring Zelle to implement stronger anti-fraud measures. A Federal Fight with Similar Claims This legal battle comes just months after the federal Consumer Financial Protection Bureau (CFPB) dropped its own lawsuit against EWS. That suit, filed in December, alleged that customers of major banks lost more than $870 million to scammers using Zelle. The CFPB complaint claimed that hundreds of thousands of consumers had filed fraud complaints over Zelle transactions, with many denied assistance or even told to contact the scammers directly to recover their funds. James’ office says her Zelle lawsuit is moving forward precisely because the federal case was abandoned after the CFPB was significantly weakened following changes in leadership in early 2025. EWS Pushes Back Early Warning Services has strongly denied the accusations, calling the New York Zelle lawsuit a “political stunt to generate press, not progress.” In a statement, a spokesperson said the Attorney General’s claims were “meritless” and accused James of trying to “hand criminals a blueprint for guaranteed payouts with no consequences, opening the floodgates to more scams, not less.” The company also pointed to its fraud statistics, claiming that more than 99.95% of Zelle transactions are completed without any scam or fraud report — a figure it says leads the industry. EWS argued that the Zelle lawsuit simply mirrors the CFPB’s now-dismissed federal case and disputed that the Attorney General’s office conducted its own investigation. Efforts to Improve Security While contesting the allegations, EWS has acknowledged in the past that scammers have targeted its platform. In 2023, it partnered with the Better Business Bureau Institute and the National Council on Aging to launch public awareness campaigns aimed at reducing payment fraud, particularly among seniors. The company has published blog posts warning consumers about common scam tactics and advising them on how to protect themselves. Under growing pressure from lawmakers and regulators, participating banks began issuing refunds to scam victims in 2023. Still, James’ office argues that these steps came far too late for many victims and that EWS could have acted years earlier to stem the losses. Conclusion The case against Zelle’s creator touches on broader questions about how instant payment services should be regulated in the United States. While platforms like Zelle offer speed and convenience, they also create opportunities for fraudsters who can exploit the lack of built-in transaction reversals. Consumer advocates have long argued for stronger protections, such as mandatory reimbursement for certain types of scams, similar to protections in place for credit card fraud.
A U.S. federal court has sentenced two Estonian nationals to prison for running a massive cryptocurrency HashFlare Ponzi scheme that duped hundreds of thousands of victims worldwide out of more than half a billion dollars. The case, described by prosecutors as a “mirage of cryptocurrency mining,” is one of the show more ...
largest fraud schemes involving digital assets ever prosecuted in the United States. On Wednesday, U.S. District Judge Robert S. Lasnik handed down 16-month prison sentences to Sergei Potapenko and Ivan Turõgin, both 40, for conducting a four-year scheme that generated more than $577 million in illicit proceeds. The men have already served their custodial term while in pretrial detention and will return to Estonia to complete their supervised release, which includes 360 hours of community service and the payment of a $25,000 fine each. Seized Assets Worth $450 Million to Compensate Victims In addition to the prison sentences, the court ordered the forfeiture of cryptocurrency, bank funds, real estate, vehicles, and cryptocurrency mining equipment collectively valued at over $450 million. These assets, seized by U.S. and international law enforcement partners, will be used in a remission process to help repay defrauded victims. Authorities said details of the compensation process will be announced in due course. Acting U.S. Attorney Teal Luthy Miller condemned the scheme as “a classic Ponzi operation dressed up in the allure of cryptocurrency.” “They diverted millions of dollars to their own benefit—buying bitcoin, luxury cars, real estate, expensive jewelry, and taking more than a dozen trips on private jets,” Miller said. “Meanwhile, the vast majority of their victims suffered devastating losses.” The HashFlare Ponzi Scheme According to court documents, Potapenko and Turõgin operated a cryptocurrency mining service called HashFlare Ponzi Scheme between 2015 and 2019. The company sold contracts to investors worldwide, promising them a share of profits from cryptocurrency mining. In legitimate cryptocurrency mining, specialized computers validate blockchain transactions and receive newly minted digital coins as rewards. But in the case of HashFlare Ponzi Scheme, prosecutors say the mining activity was largely fabricated. HashFlare’s online dashboards showed fake statistics about mining power and returns, creating the illusion of a thriving mining operation. In reality, the company lacked the computing capacity to mine the vast majority of the cryptocurrency it claimed to produce. Instead of using investor funds to expand mining operations, Potapenko and Turõgin allegedly funneled money into personal accounts and investments, purchasing properties, high-end vehicles, and luxury goods. Lavish Lifestyle Funded by Investor Money The investigation revealed that the pair spent investor funds on: Multiple luxury residences and commercial properties. High-end cars, including premium European models. Expensive jewelry and personal luxury items. More than a dozen trips aboard chartered private jets. Authorities have seized or restrained most of these assets, which have been preliminarily forfeited. Global Victims, Global Cooperation The fraud drew in victims from across the globe, including the United States. Many suffered significant financial and emotional consequences, prosecutors said. Some lost life savings in what they believed was a legitimate and lucrative investment in digital mining technology. The scale of the HashFlare Ponzi Scheme prompted a coordinated international investigation. The Cybercrime Bureau of the Estonian Police and Border Guard worked closely with U.S. law enforcement, while Estonia’s Prosecutor General, Ministry of Justice, and Ministry of Digital Affairs assisted in extraditing the defendants to the United States. The DOJ’s Office of International Affairs also played a crucial role in securing evidence and managing cross-border legal processes. While the forfeited $450 million in assets offers hope of partial restitution, many victims are unlikely to recover their full losses. The remission process, once detailed, will involve claims verification and asset liquidation, which could take years.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two high-risk vulnerabilities in N-able N-central to its Known Exploited Vulnerabilities (KEV) catalog, warning organizations of active exploitation in the wild. Identified as CVE-2025-8875, a deserialization vulnerability, and show more ...
CVE-2025-8876, a command injection vulnerability, both issues pose cybersecurity risks to system integrity and are prompting immediate security action across enterprises. Decoding N-able N-central Vulnerabilities: CVE-2025-8875 and CVE-2025-8876 According to the release notes from N-able, these vulnerabilities were addressed in the 2025.3.1 version of N-central, which began rolling out on August 14, 2025, following final updates on August 13, 2025. While both vulnerabilities require authentication to exploit, they remain a substantial risk to unpatched environments. If successfully leveraged, these flaws could allow attackers to execute arbitrary code or commands, potentially leading to full system compromise. CVE-2025-8875 refers specifically to an insecure deserialization vulnerability, a common issue in software that mishandles untrusted data during object deserialization. When exploited, this flaw can allow remote attackers to gain unauthorized control over system functions. Meanwhile, CVE-2025-8876, the command injection vulnerability, could permit authenticated attackers to inject and execute arbitrary commands on the underlying server, leading to potential data breaches or service disruptions. Immediate Mitigation Steps N-able is urging all users, especially those managing on-premises deployments, to upgrade to version 2025.3.1 without delay. The company emphasized that details of both CVEs will remain restricted for three weeks post-release in line with its responsible disclosure policies. “There is a potential risk to the security of your N-central environment if unpatched,” the release notes warned. “You must upgrade your on-premises N-central to 2025.3.1.” Additionally, Multi-Factor Authentication (MFA) must be enabled and enforced across all N-able products, particularly for administrative accounts. The company reiterated that MFA is not just a recommendation but a critical safeguard in mitigating risks from these vulnerabilities. What’s New in the 2025.3.1 Release Aside from security fixes, the latest N-central release brings several new features and enhancements focused on usability, performance, and visibility: Expanded Audit Logging: New user-initiated events, including SSH login/logout and scheduled task changes, are now captured and exportable to Syslog for better traceability. Device Management API Updates: Admins can now automatically add devices via the /api/device endpoint, streamlining deployments. Additionally, application names are more clearly visible through updated asset calls. Asset Tagging Capabilities (Preview): New features allow the categorization of devices using customizable asset tags across organizational levels, Partner, SO, Customer, and Site. These enhancements are designed to help partners manage large, distributed environments with greater control and efficiency. Continued Focus on Compliance N-able also confirmed ongoing development toward a CMMC Level 2-compliant version of N-central. This compliance is crucial for partners working with the U.S. Department of Defense (DoD) or managing sensitive federal contracts. The new version is being tailored for on-premises deployments to meet stringent federal cybersecurity standards. Bug Fixes Address System Stability A series of bug fixes was also included in the 2025.3.1 update, targeting issues such as failed PSA exports due to long passwords, broken remote support configurations, outdated asset mappings, and system errors caused by identifier overflows. Among notable fixes: Take Control setup failures have been resolved for smoother remote support sessions. Scheduled tasks stuck due to network shares have been corrected. Malformed HP drive mappings and redundant asset name prefixes have also been addressed. Conclusion The inclusion of CVE-2025-8875 and CVE-2025-8876 in CISA’s Known Exploited Vulnerabilities catalog highlights the critical nature of these actively exploited flaws in N-able N-central. The presence of both a deserialization vulnerability and a command injection vulnerability creates a direct risk, particularly in systems lacking robust access controls or up-to-date security practices. Organizations are strongly urged to upgrade to N-central version 2025.3.1, enforce multi-factor authentication (MFA), monitor for suspicious activity, and leverage the enhanced audit log features to strengthen their security posture. With threat actors already exploiting these vulnerabilities, timely action is not just recommended; it is imperative.
A critical security vulnerability has recently been discovered in certain versions of Zoom Clients for Windows that could expose users to cybersecurity risks, including privilege escalation via network access. The flaw, identified as /CVE-2025-49457, has been classified with a CVSS score of 9.6, signaling its high show more ...
severity. The vulnerability could allow unauthenticated attackers to exploit a weak search path issue within the Zoom application, enabling them to escalate privileges without requiring user interaction. This issue affects Zoom Workplace for Windows, Zoom Rooms, Zoom Rooms Controller, and Zoom Meeting SDK for Windows, all versions before 6.3.10. However, users of versions 6.1.16 and 6.2.12 are not impacted, despite being part of the broader vulnerable product set. The flaw was first reported by Zoom Offensive Security and has now been acknowledged by the company, with updates already made available. How does the CVE-2025-49457 Vulnerability work? The core of the CVE-2025-49457 vulnerability lies in an untrusted search path within certain Zoom products. An untrusted search path is a security issue where an application looks for critical files or libraries in locations that may be vulnerable to manipulation. If exploited, this flaw could allow attackers to manipulate the search path in a way that triggers privilege escalation, providing them with unauthorized access to higher system permissions. The risk is threatening because it does not require authentication, making it especially dangerous in networked environments. The vulnerability is categorized as critical because it could lead to cybersecurity breaches. Zoom Clients running on Windows systems before version 6.3.10 are at immediate risk, and Zoom has urged users to upgrade to the latest versions of the software to mitigate potential threats. Affected Versions and Recommended Action The following versions of Zoom Clients for Windows are vulnerable to CVE-2025-49457: Zoom Workplace for Windows before version 6.3.10 Zoom Workplace VDI for Windows before version 6.3.10 (except 6.1.16 and 6.2.12) Zoom Rooms for Windows before version 6.3.10 Zoom Rooms Controller for Windows before version 6.3.10 Zoom Meeting SDK for Windows before version 6.3.10 Users who are running any of the affected versions are strongly advised to immediately update to the latest version available. Zoom's latest release, version 6.3.10, addresses this vulnerability and is available for download on the company’s website. The Broader Context of Zoom Vulnerabilities This latest issue is part of a broader trend of Zoom vulnerabilities being uncovered in recent years. Zoom has faced increasing scrutiny due to its rapid growth during the global shift to remote work. As the software gained millions of new users, security flaws became more apparent. Other known vulnerabilities in Zoom have included cross-site scripting (XSS) flaws, authentication bypass vulnerabilities, and buffer overflow issues. Conclusion Timely patching is crucial for protecting systems against vulnerabilities like CVE-2025-49457. Unpatched software, especially in enterprise environments where Zoom is widely used, presents a cybersecurity risk for attackers. This latest flaw highlights the need for organizations and users to prioritize regular updates to prevent exploitation. Without timely patches, even trusted applications like Zoom can be compromised. Staying up to date with security fixes is the best defense against Zoom vulnerabilities, ensuring a secure digital environment.
Artificial intelligence is already trying its hand as a travel agent: just ask a chatbot about your chosen destination, and in a couple of seconds youll get a full sightseeing itinerary, a list of hotels with good reviews, and even visa tips. And with the help of an AI agent, you can even buy tickets without having to show more ...
trawl through endless airline websites and flight aggregators. Sounds like a travelers dream, but there are downsides. In this post, we look at what to pay attention to when planning a vacation with ChatGPT or another AI assistant. What could go wrong? A Kaspersky study reveals that just 28% of AI users trust artificial intelligence to plan their vacations, (with 96% of that 28% being satisfied with such AI assistance). Note that chatbots possess no knowledge of their own, but learn from input texts and data, and then formulate the most fitting answer to a question. And AI isnt immune to serving up inaccurate, outdated, or downright false information. Sure, some chatbots already have an internet search function built in, but infallible fact-checking is still a long way off. In March 2025, Mark Pollard of Australia was due to fly to Chile to give a lecture. But he was turned away at the check-in desk for not having a visa. Mark had duly consulted ChatGPT about the visa requirements of various Latin American countries, and had blindly trusted its response. As of 2019, however, Australian citizens need a visa to visit Chile, but this information was apparently unknown to the neural network. In another case, AI advised a journalist to visit museums that had been wiped out by a forest fire. Sometimes, even professionals on duty are led astray by bad AI. In 2024, staff at Manila airport tried to stop a passenger boarding a UK-bound flight: she was a UK citizen, but only had her US passport on her at the time. As it turns out, that isnt grounds to deny boarding a flight to England, but the staff had been misinformed by Google AI Overviews. It took a call to the embassy to resolve the situation. If you dont want AI to send you to a closed restaurant or a non-existent landmark, then check the information in real time. Just be aware — and beware — that connecting to public Wi-Fi is always a gamble, with the security of your devices and data at stake. When abroad, its much safer to use mobile internet. Theres no need to buy a physical SIM card — just use an eSIM. Why you shouldnt share personal data with AI Most popular Ais, like ChatGPT and Gemini, process and store all user requests. Which means that in the event of a bug or major leak, outsiders could find out too much about you: travel dates, schedule, budget, and traveling companions. So only share with neural networks data that you wouldnt mind the whole world knowing. Many companies these days offer AI agents — digital assistants that can autonomously perform tasks on your behalf. For example, you can ask an AI agent to book a tour, and email your colleagues about your upcoming vacation (please dont give AI agents access to work chats and email!). Once instructed, the AI agent either launches a virtual machine or captures your computer screen and connects to third-party services. The problem is that you risk giving the neural network not only your personal data, but also the freedom to perform unwanted actions on websites. Recall that AI agents are vulnerable to prompt injection attacks — hidden commands that attackers plant on phishing pages and hacked websites. Spotting these on your own is near impossible: prompt injections are usually embedded in a websites metadata or visual elements. For now at least, the safest way to plan vacation travel is to do your own research and buy everything you need yourself — using AI only as an auxiliary tool. And to minimize the risks associated with prompt injections, use a reliable security solution that blocks all attempts to infect your device with malware. How to plan your vacation with AI risk-free Never share personal data with AI that you want to keep secret. Always double-check information supplied by AI — a manual search is always best. Be careful with AI agents: theyre prone to prompt injections, and may leak your data to attackers — or worse. Bear in mind that public Wi-Fi in airports, hotels, and cafes isnt secure: traffic isnt protected, and attackers can snoop on your data. When on the road, its better to use an eSIM for mobile internet. What else to read before your trip: Internet on the go with Kaspersky eSIM Store How to travel safely Going on vacation? Beware of scammers Fake Wi-Fi on board a flight How to use ChatGPT, Gemini, DeepSeek, and other AI securely
Two critical N-able vulnerabilities enable local code execution and command injection; they require authentication to exploit, suggesting they wouldn't be seen at the beginning of an exploit chain.
Dark Reading's Terry Sweeney and Google's Loren Hudziak discuss how the humble web browser has transformed from a simple web access tool into a common conduit through which a lot of business is done.
Federal funding cuts to the Multi-State Information Sharing and Analysis Center (MS-ISAC) are about to leave more than 18,000 state and local organizations without access to basic cybersecurity resources they need to protect US national security, a letter sent to Congressional appropriators warns.
The US National Institute of Standards and Technology updated its Digital Identity Guidelines to match current threats. The document detailed technical recommendations as well as suggestions for organizations.
Organizations increasingly use agents to automate mundane tasks and address an overwhelming amount of sensitive data. However, adoption requires strict security strategies that keep humans in the loop for now.
Security budgets are lowest in healthcare, professional and business services, retail, and hospitality, but budget growth remained above 5% in financial services, insurance, and tech.
Cybercriminals are auctioning off live email credentials, giving other criminals access to sensitive systems, confidential intelligence, and, potentially, a higher success rate than ever.
Companies ready to move beyond reactive defense and toward full-spectrum protection need to invest in strategies that rally around resiliency, unified cybersecurity, and data protection.
Most of the stolen funds were siphoned in Ethereum, with more than $38.6 million taken out of the platform. The other $10 million was spread across multiple cryptocurrencies, according to security firm PeckShield.
Local media previously reported that the hackers breached the dam’s control system, opening valves for four hours and sending large amounts of water gushing into the Riselva River until operators regained control.
A federal appeals court panel voted 2-1 on Wednesday against a petition from industry groups, who argued that the 2024 rules exceeded the FCC’s statutory authority.
Staff were alerted to the data breach on Monday, as CBC News reported based on an internal email that explained the threat actor had accessed a database “containing information used to manage computers and mobile devices.”
“Telegram and WhatsApp have become the main voice services used for deceit and extortion and for involving Russian citizens in sabotage and terrorist activities,” the country's telecom regulator said in announcing new restrictions.
The Treasury Department added the cryptocurrency exchange Grinex and other entities to existing sanctions against Garantex, a Russian platform seized earlier this year.
In this Dark Reading News Desk interview, Google's Mark Berschadski highlights the critical role browsers play in today's work environment and how Chrome Enterprise is evolving to meet modern security challenges while enabling productivity.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting N-able N-central to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. N-able N-central is a Remote Monitoring and Management (RMM) platform designed for Managed Service Providers (MSPs), allowing customers to efficiently manage and secure
Google said it's implementing a new policy requiring developers of cryptocurrency exchanges and wallets to obtain government licenses before publishing apps in 15 jurisdictions in order to "ensure a safe and compliant ecosystem for users." The policy applies to markets like Bahrain, Canada, Hong Kong, Indonesia, Israel, Japan, the Philippines, South Africa, South Korea, Switzerland, Thailand,
You check that the windows are shut before leaving home. Return to the kitchen to verify that the oven and stove were definitely turned off. Maybe even circle back again to confirm the front door was properly closed. These automatic safety checks give you peace of mind because you know the unlikely but potentially dangerous consequences of forgetting – a break-in, fire, or worse. Your
Cybersecurity researchers have disclosed a new Android trojan called PhantomCard that abuses near-field communication (NFC) to conduct relay attacks for facilitating fraudulent transactions in attacks targeting banking customers in Brazil. "PhantomCard relays NFC data from a victim's banking card to the fraudster's device," ThreatFabric said in a report. "PhantomCard is based on
Story teaser text: Cybersecurity leaders face mounting pressure to stop attacks before they start, and the best defense may come down to the settings you choose on day one. In this piece, Yuriy Tsibere explores how default policies like deny-by-default, MFA enforcement, and application Ringfencing ™ can eliminate entire categories of risk. From disabling Office macros to blocking outbound server
Multiple HTTP/2 implementations have been found susceptible to a new attack technique called MadeYouReset that could be explored to conduct powerful denial-of-service (DoS) attacks. "MadeYouReset bypasses the typical server-imposed limit of 100 concurrent HTTP/2 requests per TCP connection from a client. This limit is intended to mitigate DoS attacks by restricting the number of simultaneous
Japan's CERT coordination center (JPCERT/CC) on Thursday revealed it observed incidents that involved the use of a command-and-control (C2) framework called CrossC2, which is designed to extend the functionality of Cobalt Strike to other platforms like Linux and Apple macOS for cross-platform system control. The agency said the activity was detected between September and December 2024, targeting
A poisoned Google Calendar invite that can hijack your smart home, a man is hospitalised after ChatGPT told him to season his food with… pesticide, and some thoughts on Superman’s latest cinematic outing. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley, joined this week by special guest Dave Bittner from The Cyberwire.
Source: thehackernews.com – Author: . Cybersecurity researchers have discovered a new malvertising campaign that’s designed to infect victims with a multi-stage malware framework called PS1Bot. “PS1Bot features a modular design, with several modules delivered used to perform a variety of malicious show more ...
activities on infected systems, including information theft, keylogging, reconnaissance, and the establishment of persistent […] La entrada New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . Zoom and Xerox have addressed critical security flaws in Zoom Clients for Windows and FreeFlow Core that could allow privilege escalation and remote code execution. The vulnerability impacting Zoom Clients for Windows, tracked as CVE-2025-49457 (CVSS score: 9.6), relates show more ...
to a case of an untrusted search path that could pave […] La entrada Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . Fortinet is alerting customers of a critical security flaw in FortiSIEM for which it said there exists an exploit in the wild. The vulnerability, tracked as CVE-2025-25256, carries a CVSS score of 9.8 out of a maximum of 10.0. “An improper neutralization of special show more ...
elements used in an OS command […] La entrada Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . Security operations have never been a 9-to-5 job. For SOC analysts, the day often starts and ends deep in a queue of alerts, chasing down what turns out to be false positives, or switching between half a dozen tools to piece together context. The work is repetitive, show more ...
time-consuming, and high-stakes, […] La entrada AI SOC 101: Key Capabilities Security Leaders Need to Know – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.mcafee.com – Author: Jasdev Dhaliwal. Scammers are exploiting the massive popularity of Labubu collectible toys through fake websites and social media ads, resulting in consumers losing hundreds of dollars to counterfeit “Lafufu” dolls or receiving nothing at all. Here’s how to protect show more ...
yourself from becoming their next victim. The Viral Phenomenon That Caught Cybercriminals’ […] La entrada Going Lacoocoo over Labubu: How Viral Toy Trends Are Becoming Scams – Source:www.mcafee.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.mcafee.com – Author: Jasdev Dhaliwal. Even years after its release, Fortnite still stands as the online “battle royale” game of choice, with millions of younger gamers packing its servers every month—along with fair share of scammers who want to target them both in and out of the game. What show more ...
makes Fortnite such a proverbial […] La entrada How Fortnite Scams Target the Youngest of Gamers – Source:www.mcafee.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.techrepublic.com – Author: Megan Crouse Topic — Artificial Intelligence Published August 13, 2025 Trackers were placed in the packaging and sometimes inside servers from Dell and Super Micro, according to Reuters. Image: Envato/Sandsun US authorities embedded location-tracking devices in select show more ...
shipments of servers containing high-performance AI chips in an effort to monitor potential diversions […] La entrada US Reportedly Hid Trackers in Shipments to Monitor AI Chips Diverted to China – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.techrepublic.com – Author: Megan Crouse Microsoft patched CVE-2025-50165, an “extremely high-risk” memory corruption flaw in its graphics component that could let attackers execute code over the network. Image: CROCOTHERY/Adobe Stock Microsoft on Aug. 12 released security updates addressing more show more ...
than 100 vulnerabilities across its products, including 13 rated critical. The patches include fixes for […] La entrada Microsoft’s Patch Tuesday: 100+ Updates Including Azure OpenAI Service, Memory Corruption Flaw – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.techrepublic.com – Author: Liz Ticong Image: thichaa/Envato Hackers have infiltrated the computer of a North Korean government spy, stealing and leaking 8.9 GB of secret files, including emails, passwords, and documents exposing links to Chinese hackers. The unprecedented breach lays bare sensitive show more ...
details of North Korea’s cyber operations. The hackers, known as Saber and […] La entrada Hack of North Korean Spy’s Computer Exposes 8.9 GB of Espionage Operations – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.techrepublic.com – Author: Aminu Abdullahi Topic — Artificial Intelligence Published August 13, 2025 Rubrik’s new Agent Rewind tool can trace, audit, and safely reverse AI agent mistakes, boosting enterprise control and AI resilience. Image: Rubrik AI agents are finding their way into business show more ...
workflows, but they’re not infallible. When these autonomous systems make wrong […] La entrada Fix AI Agent Mistakes With Rubrik’s Agent Rewind – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: go.theregister.com – Author: Bill McCluggage Register debate series The UK government’s five-year Strategic Partnership Agreement (SPA24) with Microsoft is set to see public sector bodies spend around £1.9 billion each year—nearly £9 billion in total over half a decade. It’s a vast sum show more ...
for software and services, and one that deserves close scrutiny. Microsoft […] La entrada The £9 billion question: To Microsoft or not to Microsoft? – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: go.theregister.com – Author: Jessica Lyons Fortinet warned customers about a critical FortiSIEM bug that could allow an unauthenticated attacker to execute unauthorized commands, and said working exploit code for the flaw has been found in the wild. The OS-command-injection vulnerability, tracked as show more ...
CVE-2025-25256, received a 9.8 CVSS rating and affects multiple versions of the […] La entrada Fortinet discloses critical bug with working exploit code amid surge in brute-force attempts – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: go.theregister.com – Author: Paul Kunert Very few people are immune to the siren song of nostalgia, a yearning for a “better time” when this was all fields and kids respected their elders – and it looks like cyber criminals are no exception. Malware campaigns continue targeting a show more ...
2017-patched vulnerability in Microsoft Office Equation Editor […] La entrada Crooks can’t let go: Active attacks target Office vuln patched 8 years ago – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: go.theregister.com – Author: Connor Jones A fresh expansion of UK crimefighters’ access to live facial recognition (LFR) technology is being described by officials as “an excellent opportunity for policing.” Privacy campaigners disagree. The Home Office said today that more police show more ...
forces across England will gain LFR capabilities thanks to ten new “cutting edge” vans […] La entrada UK expands police facial recognition rollout with 10 new vans heading to a town near you – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: go.theregister.com – Author: Richard Speed Geek-turned-venture-capitalist Marc Andreessen has weighed in on the arguments surrounding the UK’s Online Safety Act, accusing the UK government of leaking his input. Andreessen, notable for his part in authoring the Mosaic browser and as co-founder of show more ...
once-dominant 1990s browser Netscape, reportedly complained to Downing Street about the UK’s […] La entrada Marc Andreessen wades into the UK’s Online Safety Act furor – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the show more ...
security solution. There are several actions that could […] La entrada North Korea Attacks South Koreans With Ransomware – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . Story teaser text: Cybersecurity leaders face mounting pressure to stop attacks before they start, and the best defense may come down to the settings you choose on day one. In this piece, Yuriy Tsibere explores how default policies like deny-by-default, MFA enforcement, and show more ...
application Ringfencing ™ can eliminate entire categories […] La entrada Simple Steps for Attack Surface Reduction – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . Google said it’s implementing a new policy requiring developers of cryptocurrency exchanges and wallets to obtain government licenses before publishing apps in 15 jurisdictions in order to “ensure a safe and compliant ecosystem for users.” The policy show more ...
applies to markets like Bahrain, Canada, Hong Kong, Indonesia, Israel, Japan, the Philippines, […] La entrada Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting N-able N-central to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. N-able N-central is a Remote Monitoring and show more ...
Management (RMM) platform designed for Managed Service Providers (MSPs), allowing customers to efficiently manage […] La entrada CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido The countdown is on for security teams still managing digital certificates with spreadsheets and manual workarounds. Related: Preparing for the quantum future Starting in 2026, TLS certificate lifespans will begin dropping sharply — from 398 show more ...
days to just 47 by 2029. That shift isn’t just a […] La entrada Black Hat Fireside Chat: Automation takes center stage as TLS lifespans grow ever shorter – Source: www.lastwatchdog.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: grahamcluley.com – Author: Graham Cluley Skip to content A poisoned Google Calendar invite that can hijack your smart home, a man is hospitalised after ChatGPT told him to season his food with… pesticide, and some thoughts on Superman’s latest cinematic outing. All this and more is discussed in the show more ...
latest edition of the “Smashing […] La entrada Smashing Security podcast #430: Poisoned Calendar invites, ChatGPT, and Bromide – Source: grahamcluley.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: sec.cloudapps.cisco.com – Author: . Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Server Denial of Service Vulnerability High CVE-2025-20251 CWE-1287 Download CSAF Email Summary A vulnerability in the Remote Access SSL VPN service for Cisco Secure show more ...
Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense […] La entrada Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Server Denial of Service Vulnerability – Source:sec.cloudapps.cisco.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: sec.cloudapps.cisco.com – Author: . Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SSL/TLS Certificate Denial of Service Vulnerability High CVE-2025-20134 CWE-415 Download CSAF Email Summary A vulnerability in the certificate processing of Cisco Secure show more ...
Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow […] La entrada Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SSL/TLS Certificate Denial of Service Vulnerability – Source:sec.cloudapps.cisco.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: hackread.com – Author: Deeba Ahmed. Beware of fake Netflix job offers! A new phishing campaign is targeting job seekers, using fraudulent interviews to trick them into handing over Facebook logins. Find out what to look for to protect your accounts. Job seekers are being targeted by a new phishing scam show more ...
that uses fake Netflix […] La entrada Netflix Job Phishing Scam Steals Facebook Login Data – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: hackread.com – Author: Deeba Ahmed. Norway says pro-Russian hackers breached a dam in Bremanger in April, opening a water valve for 4 hours after exploiting a weak password. Officials call it part of a wider hybrid warfare campaign targeting Europe. Norwegian authorities have officially blamed show more ...
pro-Russian hackers for a cyberattack on a dam in […] La entrada Norway Blames Pro-Russian Hackers for Dam Cyberattack – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.