Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for BadCam attack: malic ...

 Business

Computer webcams have long been suspected of peeping on folks; nothing unusual about that. But now theyve found a new role in conventional cyberattacks. At the recent BlackHat conference in Las Vegas, researchers presented the BadCam attack, which allows an attacker to reflash a webcam and execute malicious actions on   show more ...

the computer its connected to. Essentially, its a variation of the well-known BadUSB attack; the key difference is that with BadCam attackers dont need to prepare a malicious device in advance — they can use a clean webcam already connected to the computer. Another unwelcome novelty is that the attack can be carried out completely remotely. Although the research was conducted by ethical hackers, and BadCam hasnt yet been observed in real-world attacks, it wont be difficult for criminals to figure it out and reproduce the necessary steps. Thats why organizations should understand how BadCam works and implement protective measures. The return of BadUSB It was also at BlackHat that BadUSB was unveiled to the world — back in 2014. It works by taking a seemingly harmless device (say, a USB stick) and reprogramming its firmware. When it connects to a computer, the malicious gadget presents itself as a composite USB device with multiple components, such as a flash drive, keyboard, or network adapter. Its storage functions work normally, so the user interacts with the flash drive as usual. Meanwhile, a hidden firmware component impersonating a keyboard sends commands to the computer — for example, a key combination to launch PowerShell and enter commands to download malware from the internet, or to open a tunnel to the attackers server. BadUSB techniques are still widely used in red team exercises — often implemented via specialized hacker multitools like Hak5 Rubber Ducky or Flipper Zero. From BadUSB to BadCam Researchers at Eclypsium managed to replicate this firmware-rewriting trick on Lenovo 510 FHD and Lenovo Performance FHD webcams. Both use a SigmaStar SoC, which has two interesting features. First, the webcam software is Linux-based and supports USB Gadget extensions. This Linux kernel feature allows the device to present itself as a USB peripheral such as a keyboard or network adapter. Second, the webcams firmware update process lacks cryptographic protection — its enough to send a couple of commands and a new memory image over the USB interface. Reflashing can be carried out by running software on the computer with standard user privileges. With this altered firmware, Lenovo webcams turn into a keyboard-camera hybrid capable of sending predefined commands to the computer. Although the researchers tested only Lenovo webcams, they note that other Linux-based USB devices may be similarly vulnerable. Cyber-risks of the BadCam attack Potential attack vectors for BadCam against an organization include: A new camera sent by the attacker A camera temporarily disconnected from a corporate computer and connected to the attackers laptop for reflashing A camera that was never disconnected from the organizations computer, and compromised remotely via malware Detecting this malware through behavior analysis can be tricky, since it doesnt need to make suspicious changes to the registry, files, or network — it only has to communicate with the webcam. If the first phase of the attack succeeds, the malicious firmware can then send keyboard commands to: disable security tools; download and execute additional malware; launch legitimate tools for a Living Off the Land (LotL) attack; respond to system prompts, for example for elevating privileges; exfiltrate data from the computer over the network. At the same time, standard software scans wont detect the threat, and even a full system reinstall wont remove the implant. System logs will show that the malicious actions were performed from the logged-in users keyboard. For this reason, such attacks will most likely be deployed for persistence in the compromised system — although in the MITRE ATT&CK matrix, BadUSB techniques are listed under T1200 (Hardware Additions) and assigned to the Initial Access phase. How to defend against BadCam attacks The attack can be stopped at several stages using standard security tools that block trojanized peripherals and make LotL attacks more difficult. We recommend that you: Configure your EDR/EPP solution to monitor connected HID devices. In Kaspersky Next, this feature is called BadUSB Attack Prevention. When a device with keyboard functionality is connected, the user must enter a numeric code displayed on the screen, without which the new keyboard can't control the system. Configure your SIEM and XDR solutions to collect and analyze detailed telemetry for HID device connections and disconnections. Set up USB port control in your MDM/EMM solution. Depending on its capabilities, you can disable USB ports altogether or create an allowlist of devices (by VID/PID identifiers) permitted to connect to the computer. Where possible, enforce an application allowlist on employee computers so that only approved software can run and all other applications are blocked. Regularly update not only the software but also the firmware of standard equipment. For example, Lenovo has released patches for the two camera models used in the research, making malicious firmware updates more difficult. Apply the Principle of Least Privilege, ensuring each employee has only the access rights strictly necessary for their role. Include BadUSB and BadCam in employee security-awareness training, with simple guidance on what to do if a USB device behaves unexpectedly — for example, if it starts typing commands on its own.

 Government

Flock acknowledged in a Monday blog post that it has engaged in “limited pilots” with CBP and Homeland Security Investigations, the law enforcement division of the Department of Homeland Security. It said the partnerships were meant to bolster the federal agencies’ efforts to fight human trafficking and fentanyl distribution.

 Feed

The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion attacks targeting cloud environments. "Unlike traditional on-premises ransomware, where the threat actor typically deploys malware to encrypt critical files across endpoints within the compromised network and then negotiates for a decryption key,

 Feed

Cybersecurity company ESET has disclosed that it discovered an artificial intelligence (AI)-powered ransomware variant codenamed PromptLock. Written in Golang, the newly identified strain uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts in real-time. The open-weight language model was released by OpenAI earlier this month. "PromptLock

 Feed

Anthropic on Wednesday revealed that it disrupted a sophisticated operation that weaponized its artificial intelligence (AI)-powered chatbot Claude to conduct large-scale theft and extortion of personal data in July 2025. "The actor targeted at least 17 distinct organizations, including in healthcare, the emergency services, and government, and religious institutions," the company said. "

 Feed

A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government entities within Central Asia and Asia-Pacific (APAC). According to Group-IB, nearly three dozen victims have been identified, with the intrusions mainly geared towards data exfiltration. The hacking group shares toolset and infrastructural overlaps with campaigns undertaken by threat

 Feed

Employees are experimenting with AI at record speed. They are drafting emails, analyzing data, and transforming the workplace. The problem is not the pace of AI adoption, but the lack of control and safeguards in place. For CISOs and security leaders like you, the challenge is clear: you don’t want to slow AI adoption down, but you must make it safe. A policy sent company-wide will not cut it.

 Feed

A widespread data theft campaign has allowed hackers to breach sales automation platform Salesloft to steal OAuth and refresh tokens associated with the Drift artificial intelligence (AI) chat agent. The activity, assessed to be opportunistic in nature, has been attributed to a threat actor tracked by Google Threat Intelligence Group (GTIG) and Mandiant, tracked as UNC6395. GTIG told The Hacker

 Feed

Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind Eagle between May 2024 and July 2025. These attacks, observed by Recorded Future Insikt Group, targeted various victims, but primarily within the Colombian government across local, municipal, and federal levels. The threat intelligence firm is tracking the activity under

 Data loss

Cephalus is a relatively new ransomware operation that emerged in mid-2025, and has already been linked to a wave of high-profile data leaks. Read more about it in my article on the Fortra blog.

 Citrix

Source: thehackernews.com – Author: . Citrix has released fixes to address three security flaws in NetScaler ADC and NetScaler Gateway, including one that it said has been actively exploited in the wild. The vulnerabilities in question are listed below – CVE-2025-7775 (CVSS score: 9.2) – Memory   show more ...

overflow vulnerability leading to Remote Code Execution and/or Denial-of-Service […] La entrada Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 attack

Source: thehackernews.com – Author: . A team of academics has devised a novel attack that can be used to downgrade a 5G connection to a lower generation without relying on a rogue base station (gNB). The attack, per the ASSET (Automated Systems SEcuriTy) Research Group at the Singapore University of Technology   show more ...

and Design (SUTD), relies […] La entrada New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with an in-memory malware dubbed MixShell. The activity has been codenamed ZipLine by Check Point Research.   show more ...

“Instead of sending unsolicited phishing emails, attackers initiate contact through a company’s public ‘Contact Us’ form, tricking […] La entrada MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to fake CAPTCHA verification pages that employ the ClickFix social engineering tactic to deliver information stealers, ransomware, and cryptocurrency miners.   show more ...

The large-scale cybercrime campaign, first detected in August 2025, has been codenamed ShadowCaptcha […] La entrada ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 API security

Source: www.cyberdefensemagazine.com – Author: Gary Driving through the quiet, endless beauty of the Nevada desert, I let the raspy voice of Jim Morrison carry me forward. “The End” played as the final song before I crossed into Las Vegas, a haunting yet strangely perfect soundtrack to mark the end of calm   show more ...

and the beginning shift […] La entrada Black Hat Ignites Under Vegas Lights – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 cyber

Source: www.cyberdefensemagazine.com – Author: News team There’s a lot of noise around compliance. New regulations seem to pop up every year, each promising to fix the ever-growing list of security problems that come with the digital age. However, the EU’s Cyber Resilience Act (CRA) takes a different   show more ...

approach. Instead of focusing just on data protection, […] La entrada Is the Cyber Resilience Act the Biggest Thing to Hit Compliance Since GDPR? – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: News team Cybersecurity has emerged as a critical and ongoing battle against a dynamic and pervasive global threat. The landscape is evolving rapidly, with adversaries increasingly gaining ground in this ongoing struggle. The frequency and severity of cyberattacks   show more ...

are on the rise, affecting a wide array of enterprises, organizations, and essential […] La entrada Cybersecurity Wake-Up Call: Why All Businesses Must Prepare for the Inevitable Attack – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: News team We live in an era where your next big idea could come from an employee working out of a cafe in Tokyo or on the beach in Bali. The digital nomad lifestyle has become more than a trend—it has transformed how we work. The onset of remote work offers   show more ...

[…] La entrada Digital Nomads and Cybersecurity: Navigating the New Frontier of Work – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: News team Among the variety of cyber-attacks that we witness happening around us, Zero-day attacks are remarkably insidious in nature. Due to the fact that these attacks exploit the unknown vulnerabilities, zero-day attacks often inflict some form of damage   show more ...

wherever it is affected. Patching fast is the only way to minimize […] La entrada Don’t Wait Too Long to Patch: How Organizations Can Stay Ahead of Zero-Day Exploits – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Source: news.sophos.com – Author: mindimcdowell This approach represents an evolution from threat actors abusing remote monitoring and management tools In August 2025, Counter Threat Unit™ (CTU) researchers investigated an intrusion that involved deployment of the legitimate open-source Velociraptor digital   show more ...

forensics and incident response (DFIR) tool. In this incident, the threat actor used the tool to […] La entrada Velociraptor incident response tool abused for remote access – Source: news.sophos.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.proofpoint.com – Author: 76% of CISOs anticipate a material cyberattack in the next year, with human risk and GenAI-driven data loss topping their concerns SUNNYVALE, Calif., August 26, 2025 – Proofpoint, Inc., a leading cybersecurity and compliance company today released its fifth annual Voice of   show more ...

the CISO report, exploring key challenges, expectations and priorities […] La entrada Proofpoint’s 2025 Voice of the CISO Report Reveals Heightened AI Risk, Record CISO Burnout, and the Persistent People Problem in Cybersecurity – Source: www.proofpoint.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini Farmers Insurance suffered a breach tied to Salesforce attacks, exposing data of 1.1M customers across its nationwide insurance network. Farmers Insurance disclosed a data breach affecting 1,071,172 customers, linked to the recent wave of Salesforce   show more ...

attacks, as per Bleeping Computer. The company is an American insurer group of vehicles, […] La entrada Farmers Insurance discloses a data breach impacting 1.1M customers – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini Citrix addressed three vulnerabilities in NetScaler ADC and NetScaler Gateway, including one that has been actively exploited in the wild. Citrix addressed three security flaws (CVE-2025-7775, CVE-2025-7776, CVE-2025-8424) in NetScaler ADC and NetScaler   show more ...

Gateway, including one (CVE-2025-7775) that it said has been actively exploited in the wild. “Exploits of CVE-2025-7775 […] La entrada Citrix fixed three NetScaler flaws, one of them actively exploited in the wild – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Auchan

Source: securityaffairs.com – Author: Pierluigi Paganini French retailer Auchan suffered a data breach impacting hundreds of thousands of customers, with personal information stolen. French retailer Auchan suffered a data breach that impacted hundreds of thousands of customers, resulting in the theft of   show more ...

personal information. The company has already notified the impacted customers. Threat actors stole […] La entrada Auchan discloses data breach: data of hundreds of thousands of customers exposed – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CISA

Source: securityaffairs.com – Author: Pierluigi Paganini U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Citrix Session Recording, and Git flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Citrix Session Recording,   show more ...

and Git flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the descriptions for these flaws: CVE-2024-8069 (CVSS score of […] La entrada U.S. CISA adds Citrix Session Recording, and Git flaws to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 agentic ai

Source: securityboulevard.com – Author: Michael Vizard Broadcom today added a slew of cybersecurity updates, including a technology preview of an update to VMware vDefend that secures communications between artificial intelligence (AI) agents, promising to improve overall resiliency and automate compliance   show more ...

workflows. Announced at the VMware Explore 2025 conference, the update to vDefend introduces a zero-trust […] La entrada Broadcom Extends Reach and Scope of Cybersecurity Portfolio – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AI

Source: securityboulevard.com – Author: Matthew Rosenquist   Microsoft recently introduced a new framework designed to assess the security of AI models. It’s always encouraging to see developers weaving cybersecurity considerations into the design and deployment of emerging, disruptive technologies. Stronger   show more ...

security reduces the potential for harmful outcomes — and that’s a win for everyone. It is wonderful […] La entrada Microsoft’s New AI Risk Assessment Framework – A Step Forward – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Scott Caveza Citrix has released patches to address a zero-day remote code execution vulnerability in NetScaler ADC and NetScaler Gateway that has been exploited. Organizations are urged to patch immediately. Background On August 26, Citrix published a security advisory   show more ...

for three vulnerabilities, including CVE-2025-7775, a zero-day vulnerability which has been exploited […] La entrada CVE-2025-7775: Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.techrepublic.com – Author: Aminu Abdullahi We may earn from vendors via affiliate links or sponsorships. This might affect product placement on our site, but not the content of our reviews. See our Terms of Use for details. Hackers are using fake voicemails and purchase orders to spread UpCrypter   show more ...

malware, giving them remote control over […] La entrada Warning for Windows Users: Global UpCrypter Phishing Attack is Expanding – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Source: securelist.com – Author: Alexander Kolesnikov Vulnerability registrations in Q2 2025 proved to be quite dynamic. Vulnerabilities that were published impact the security of nearly every computer subsystem: UEFI, drivers, operating systems, browsers, as well as user and web applications. Based on our   show more ...

analysis, threat actors continue to leverage vulnerabilities in real-world attacks as a […] La entrada Exploits and vulnerabilities in Q2 2025 – Source: securelist.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Source: thehackernews.com – Author: . A widespread data theft campaign has allowed hackers to breach sales automation platform Salesloft to steal OAuth and refresh tokens associated with the Drift artificial intelligence (AI) chat agent. The activity, assessed to be opportunistic in nature, has been attributed   show more ...

to a threat actor tracked by Google Threat Intelligence Group […] La entrada Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Blind

Source: thehackernews.com – Author: . Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind Eagle between May 2024 and July 2025. These attacks, observed by Recorded Future Insikt Group, targeted various victims, but primarily within the   show more ...

Colombian government across local, municipal, and federal levels. The threat intelligence […] La entrada Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AI

Source: grahamcluley.com – Author: Graham Cluley In episode 65 of The AI Fix, a pigeon gives a PowerPoint presentation, Mark plays Graham a song about the Transformer architecture, a robot dog delivers parcels, some robots fall over at the World Humanoid Robot Games, and Graham takes credit for one of   show more ...

computing’s greatest insights. Plus, Graham […] La entrada The AI Fix #65: Excel Copilot will wreck your data, and can AI fix social media? – Source: grahamcluley.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Celebrities

Source: www.bitdefender.com – Author: Graham Cluley South Korean authorities have announced the extradition from Thailand and arrest of a suspected hacker, believed to be the mastermind behind an organised campaign of attacks that stole millions of dollars worth of stocks from celebrities, including BTS singer   show more ...

Jung Kook. Local news reports have confirmed that the 34-year-old […] La entrada Alleged mastermind behind K-Pop celebrity stock heist extradited to South Korea – Source: www.bitdefender.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: grahamcluley.com – Author: Graham Cluley A 26-year-old hacker, who breached websites in North America, Yemen, and Israel, and stole the details of millions of people has been sent to prison. Al-Tahery Al-Mashriky was arrested in August 2022 by members of the National Crime Agency (NCA) in Rotherham,   show more ...

South Yorkshire, after he was linked to […] La entrada Yemen Cyber Army hacker jailed after stealing millions of people’s data – Source: grahamcluley.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 budgeting

Source: www.csoonline.com – Author: News Analysis Aug 27, 20255 mins CyberattacksData BreachIncident Response Increasing security spending after a cyber incident is falling out of fashion, as boards evolve their risk strategies, accept fate, and seek to embrace AI for relief, sending cyber leaders to look   show more ...

inward for process fixes. The long held conventional wisdom that […] La entrada Only 49% of companies to increase cyber budget after a breach – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 budget

Source: www.csoonline.com – Author: Government cutbacks, defunding of critical public resources, tariffs, and market uncertainty are impacting cybersecurity budgets. Here’s how you can do more with less. As a veteran CISO for state and local agencies, Orange County CISO Andrew Alipanah knows how to optimize   show more ...

security functions within impossibly tight budgets. In the past, while […] La entrada 5 ways to improve cybersecurity function while spending less – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Artificial Intelligence

Source: www.csoonline.com – Author: Researchers continue to find vulnerabilities that dupe models into revealing sensitive information, indicating that security measures are still being bolted onto AI. A series of vulnerabilities recently revealed by several research labs indicate that, despite rigorous   show more ...

training, high benchmark scoring, and claims that artificial general intelligence (AGI) is right around the […] La entrada LLMs easily exploited using run-on sentences, bad grammar, image scaling – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Application Security

Source: www.csoonline.com – Author: One of their goals was to access other credentials to compromise other environments. A threat actor managed to obtain Salesforce OAuth tokens from a third-party integration called Salesloft Drift and used the tokens to download large volumes of data from impacted Salesforce   show more ...

instances. One of the attacker’s goals was to find […] La entrada Attackers steal data from Salesforce instances via compromised AI live chat tool – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2025-08
Aggregator history
Wednesday, August 27
FRI
SAT
SUN
MON
TUE
WED
THU
AugustSeptember