Hackers may have stolen sensitive customer data from a Red Hat GitLab instance. The Red Hat breach claims were made in Telegram posts by a group calling itself “Crimson Collective,” which said it exfiltrated 28,000 repositories, including client Customer Engagement Reports (CERs) and other potentially sensitive show more ...
data about client infrastructure. A Red Hat spokesperson told The Cyber Express that the company “is aware of reports regarding a security incident related to our consulting business and we have initiated necessary remediation steps. The security and integrity of our systems and the data entrusted to us are our highest priority. At this time, we have no reason to believe the security issue impacts any of our other Red Hat services or products and are highly confident in the integrity of our software supply chain.” Red Hat Acknowledges GitLab Intrusion In a blog post late today, Red Hat said the company had detected unauthorized access in a GitLab instance used for "internal Red Hat Consulting collaboration in select engagements." The company launched an investigation, removed the unauthorized access, isolated the instance, and contacted authorities. The company has since implemented additional hardening measures. "Our investigation, which is ongoing, found that an unauthorized third party had accessed and copied some data from this instance," the Red Hat blog post said. "The compromised GitLab instance housed consulting engagement data, which may include, for example, Red Hat’s project specifications, example code snippets, and internal communications about consulting services," the post said. "... While our analysis remains ongoing, we have not identified sensitive personal data within the impacted data at this time." Red Hat said it is "engaging directly with any customers who may be impacted." The Crimson Collective Telegram channel appears to have been taken down, but the content of the posts has been preserved in Cyble’s threat intelligence database, and some security researchers captured screenshots and file/repository lists of the group’s breach claims. Red Hat Breach Files Allegedly Include Client Environment Data One October 1 Telegram post by Crimson Collective claims that “Over 28000 repositories were exported, it includes all their customer's CERs and analysis of their infra' + their other dev's private repositories, this one will be fun.” The hackers claim that their extortion demands were ignored by Red Hat. The list of allegedly stolen repositories includes potentially sensitive data from hundreds of companies, many of them well known. The files appear to include potentially sensitive data like configuration registries and code, IT playbooks, cloud development platform files, AI project-related files, network and infrastructure information, cloud and virtualization documentation, and more. The hackers also claim that they found authentication tokens inside the repos – and they claim to have already used them to compromise Red Hat customers. The hackers’ claims remain unverified, but the group recently took credit for defacing a Nintendo site. In other Red Hat security news, the company recently reported a vulnerability (CVE-2025-10725) in its OpenShift platform for managing the lifecycle of predictive and GenAI models across hybrid cloud environments. The Incorrect Privilege Assignment flaw is rated 9.9, but there have been no reports of exploitation, and Red Hat classified the vulnerability as “Important and not Critical because it requires minimal authentication for the remote attacker to Jeopardize an environment.” Red Hat said late today that CVE-2025-10725 did not play a role in the GitLab incident.
“Hi! My niece is in a contest! Can you vote for her? It means the world to her”. Messages like this are common on WhatsApp — both in groups and private chats. Many people who aren’t security-savvy will, without a second thought, click to help someone they don’t actually know — and end up losing their show more ...
account. In a recent investigation we found a new phishing campaign that has already hit WhatsApp users worldwide. Today we’ll explain how the attack works, the potential consequences for victims, and how to avoid falling for it. How the attack works Cybercriminals first prepare for the attack by creating convincing phishing pages purportedly hosting legitimate voting polls — in the example below for young gymnasts, though the scenario can be easily changed. The pages look genuine: they include photos of real participants, Vote buttons and counters showing how many people have voted. Likely using AI and phishing-kits, the attackers easily produce multiple language versions of the same site — we found the identical poll in English, Spanish, German, Turkish, Danish, Bulgarian, and other languages. Stage One: The Hook. On social networks, in messengers, or by email, the scammers use social engineering to direct you to a fake voting site. The pretext can be very believable, and the message may come from a friend or relative whose account has already been compromised. The request is usually personalized — in the first message the fraudster posing as your acquaintance asks you to vote for a certain contestant because they’re their charge, friend or relative. First you’re lured to a fake voting page Stage Two: The Trap. When you click Vote, you’re taken to a page that asks you to quickly authenticate via WhatsApp. All you need do is enter the phone number linked to your messenger. Next they ask for your phone number associated with WhatsApp. The scammers even pretend to care about your data and “your valuable time” Stage Three: The Heist. The attackers exploit the one-time code login feature in WhatsApp Web. They enter the phone number you provided, and WhatsApp generates an eight-character single-use verification code. The attackers immediately display that code on the fake site with instructions: open WhatsApp, go to “Connected devices” (never mind that it’s actually “Linked devices” in WhatsApp), and enter the code. For convenience, there’s even a button to copy the code to the clipboard. For “fast and easy authorization” (read: WhatsApp account takeover) you only need enter the code shown on the site At the same time, WhatsApp on your phone shows a prompt to link a new device by entering the code. Clicking that opens a warning that someone is trying to connect to your account, and a field to enter the code. Unfortunately, in their uncontrollable desire to help a complete stranger in the contest, many users don’t carefully read WhatsApp’s warning. They think, “Someone wants to link to my account? That’s so I can vote — looks fine to me” When the careless victim types the code into the app on their phone, the web session initiated by the attackers is activated. WhatsApp warns you that someone is trying to link to your account, but many users don’t read the warning, and enter the verification code anyway If you enter that code, the attackers gain full access to your WhatsApp, as if you had logged in yourself — for example, from a computer alongside your phone. The attackers can view all your contacts, read conversations, send and delete messages in your name, and even take full control of the account. That opens up further possibilities for fraud: somehow extracting money from your contacts using your identity, or using your account to spread the same phishing link that trapped you. What to do if you think you’ve been hacked If you suspect you’ve fallen for the scam and given attackers access to your WhatsApp account, the first thing to do is open the WhatsApp settings on your smartphone and go to Linked devices. There you’ll see all devices currently logged into your account. If you notice any unfamiliar devices or browsers, click on them to disconnect them from your account. Do this quickly — before the criminals can fully take over your account. We’ve prepared a detailed guide for such cases: it explains eight signs your WhatsApp account may be hacked, and provides step-by-step instructions on how to regain access even in difficult situations. We also have a similar guide for Telegram users. How to prevent your WhatsApp account from being hacked Never take part in dubious contests or votes — especially if they require messenger authentication. Legitimate polls don’t ask for access to your personal accounts. Don’t click suspicious links in messages — even if they seem to come from friends or relatives. Their accounts may have been hacked. Never enter personal data on unfamiliar websites — especially those reached via messages or social media links. Always check the URL carefully. Don’t ignore browser warnings about unsafe sites, and use Kaspersky Premium on all your devices (both smartphones and computers). Our protection scans links and webpages, blocks phishing and malicious resources, and works in all popular mobile and desktop browsers. Enable two-factor verification in your WhatsApp settings. This makes a six-digit PIN code necessary to log in on a new device, making attackers’ job harder even if your number is compromised. However, this doesn’t protect against the attack described above — the one-time code shown to you is, in WhatsApp’s view, already the “second factor”. That’s why the PIN isn’t requested during this login method. Use passkeys instead of traditional passwords wherever possible. WhatsApp already supports passkeys for account verification. Protect mobile devices from phishing — these are the main targets of messenger attacks. Three-level protection technology detects malicious links and blocks dangerous websites. At the first level, Notification Protection detects and automatically removes malicious links from app notifications, leaving only safe text. Next, Safe Messaging blocks harmful links in SMSs and messenger messages (WhatsApp, Viber, Telegram) before the user clicks them. Finally, Safe Browsing blocks malicious URLs in popular mobile browsers. Configure privacy and security on both your smartphone and computer with Privacy Checker — Kaspersky’s free service that gives detailed guides for privacy settings in many popular apps, services, and operating systems. Set up WhatsApp and Telegram accounts for maximum protection against hijacking using our step-by-step guide. Regularly check the list of connected devices in messengers’ settings. Both WhatsApp and Telegram have sections showing all active sessions, and you can disconnect suspicious ones. In Telegram, you can even enable automatic termination of inactive sessions. Only use official versions of messengers downloaded from official app stores (such as Google Play, App Store, or Galaxy Store). Modified versions can contain malware. Be extra cautious with desktop versions of messengers — especially on work computers. How else do attackers target messengers, and how to counter them? How to protect WhatsApp and Telegram against hijacking in 2025 Telegram scams with bots, gifts, and crypto Is it the boss — or is it a fraudster? Scams disguised as urgent orders from top brass Spyware messengers on Google Play What makes a messaging app secure?
A threat actor claimed 28,000 private repositories had been compromised, and the Linux software maker said it had "initiated necessary remediation steps."
With nearly 47,000 CVEs expected by the end of the year, organizations must balance comprehensive vulnerability management with strategic cyber insurance policy selection to effectively navigate this rapidly evolving threat landscape.
The NFL's cyberattack surface is expanding at an unprecedented rate. To find out more, we spoke with a cyber defense coordinator from the Cleveland Browns.
The long-running South Asian advanced persistent threat (APT) group is advancing its objectives against Pakistani targets, with a shift to deploying Python-based surveillance malware.
Car dealership software developer Motility said it suffered from a ransomware attack where the hackers encrypted servers that support the company’s business operations.
Incident responders at Google are warning about an extortion campaign — possibly connected to the Clop gang — that targets executives with data that cybercriminals claim was stolen via an Oracle tool.
The decision comes in response to a lawsuit filed by the Dutch nonprofit Bits of Freedom, which argued that by controlling users’ feeds Meta has been improperly skewing what news consumers receive.
A letter to European Commission officials demanded answers about why European Union funding has reportedly gone towards subsidizing the spyware industry.
Japanese beverage giant Asahi is struggling to restore operations following a cyberattack that has disrupted its business for most of the week, raising fears of shortages of the country’s top-selling beer.
The Georgia Institute of Technology is paying $875,000 to settle a False Claims Act lawsuit with the federal government, which accused an office at the school of not following cybersecurity rules on some defense contracts.
Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to target users in the United Arab Emirates (U.A.E.). Slovak cybersecurity company ESET said the malicious apps are distributed via fake websites and social engineering to trick unsuspecting users into downloading them. Once installed, both the spyware
Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time we automate the delivery of these results. The way results are delivered hasn’t kept up with today’s fast-moving threat landscape. Too often, findings are packaged into static reports, buried in PDFs or spreadsheets, and handed off manually to
From unpatched cars to hijacked clouds, this week’s Threatsday headlines remind us of one thing — no corner of technology is safe. Attackers are scanning firewalls for critical flaws, bending vulnerable SQL servers into powerful command centers, and even finding ways to poison Chrome’s settings to sneak in malicious extensions. On the defense side, AI is stepping up to block ransomware in real
Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster of activity possibly linked to a financially motivated threat actor known as Cl0p. The malicious activity involves sending extortion emails to executives at various organizations and claiming to have stolen sensitive data from their Oracle E-Business Suite. "This activity began on or
Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of signals; some urgent, many irrelevant. The job is to find the real threats fast enough to keep cases from piling up, prevent analyst burnout, and maintain client or leadership confidence. The toughest challenges, however, aren’t the alerts that can be dismissed quickly, but the ones that hide
The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan with malware families like WooperStealer and Anondoor. "Over the past decade, Confucius has repeatedly targeted government agencies, military organizations, defense contractors, and critical industries -- especially in Pakistan – using spear-phishing and malicious documents as initial
Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the ability to create a SOCKS5 proxy service, while also providing a stealthy backdoor-like functionality to drop additional payloads on Windows systems. The deceptive package, named soopsocks, attracted a total of 2,653 downloads before it was taken down. It was first
Researchers uncovered a security flaw in Salesforce’s shiny new Agentforce. The vulnerability, dubbed "ForcedLeak", let them smuggle AI-read instructions in via humble Web-to-Lead form... and ended up spilling data for the low, low price of five dollars. And we discuss why data breach communicationss still show more ...
default to "we take security seriously" while quietly implying "assume no breach" - until the inevitable walk-back. Plus, we take a look at ITV's phone-hacking drama with David Tennant, and take a crack at decoding the history of the Rosetta Stone. Hear all this and more in episode 437 of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley, joined this week by special guest Paul Ducklin.
ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates