Trending Articles

article thumbnail

Chinese-Owned VPNs

Schneier on Security

One one my biggest worries about VPNs is the amount of trust users need to place in them, and how opaque most of them are about who owns them and what sorts of data they retain. A new study found that many commercials VPNS are (often surreptitiously) owned by Chinese companies. It would be hard for U.S. users to avoid the Chinese VPNs. The ownership of many appeared deliberately opaque, with several concealing their structure behind layers of offshore shell companies.

VPN 304
article thumbnail

Pakistan Arrests 21 in ‘Heartsender’ Malware Service

Krebs on Security

Authorities in Pakistan have arrested 21 individuals accused of operating “ Heartsender ,” a once popular spam and malware dissemination service that operated for more than a decade. The main clientele for HeartSender were organized crime groups that tried to trick victim companies into making payments to a third party, and its alleged proprietors were publicly identified by KrebsOnSecurity in 2021 after they inadvertently infected their computers with malware.

Malware 193
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Midyear Roundup: Nation-State Cyber Threats in 2025

Lohrman on Security

What is the current situation with nation-state cyber attacks in the middle of 2025? Heres a look at some of the biggest cyber threats from Russia, China, Iran and North Korea.

article thumbnail

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

The Hacker News

The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a distribution vector. "The ClickFix technique is particularly risky because it allows the malware to execute in memory rather than being written to disk," Expel said in a report shared with The Hacker News.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

184 Million Records Database Leak: Microsoft, Apple, Google, Facebook, PayPal Logins Found

Tech Republic Security

The databases exposure duration is unknown. Signs of infostealer malware were found, but no confirmed breach or misuse of user data, says cybersecurity researcher.

Malware 141
article thumbnail

Location Tracking App for Foreigners in Moscow

Schneier on Security

Russia is proposing a rule that all foreigners in Moscow install a tracking app on their phones. Using a mobile application that all foreigners will have to install on their smartphones, the Russian state will receive the following information: Residence location Fingerprint Face photograph Real-time geo-location monitoring This isn’t the first time we’ve seen this.

Mobile 303

LifeWorks

More Trending

article thumbnail

U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams

Krebs on Security

Image: Shutterstock, ArtHead. The U.S. government today imposed economic sanctions on Funnull Technology Inc. , a Philippines-based company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams known as pig butchering.” In January 2025, KrebsOnSecurity detailed how Funnull was being used as a content delivery network that catered to cybercriminals seeking to route their traffic through U.S.

Scams 163
article thumbnail

Operation ENDGAME disrupted global ransomware infrastructure

Security Affairs

Operation ENDGAME dismantled key ransomware infrastructure, taking down 300 servers, 650 domains, and seizing 21.2M in crypto. From May 19 to 22, 2025, Operation ENDGAME, coordinated by Europol and Eurojust, disrupted global ransomware infrastructure. Law enforcement took down down 300 servers and 650 domains, and issuing 20 international arrest warrants. “A Command Post was set up at Europol headquarters in The Hague during the action week, with investigators from Canada, Denmark, France,

article thumbnail

Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware

The Hacker News

Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework. The campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena.

Malware 122
article thumbnail

Signal Blocks Windows Recall

Schneier on Security

This article gives a good rundown of the security risks of Windows Recall, and the repurposed copyright protection took that Signal used to block the AI feature from scraping Signal data.

Risk 253
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

184 million logins for Instagram, Roblox, Facebook, Snapchat, and more exposed online

Malwarebytes

A recent discovery by cybersecurity researcher Jeremiah Fowler of an unsecured database containing over 184 million unique login credentials has once again highlighted the growing threat posed by infostealers. While the sheer volume of exposed dataincluding emails, passwords, and authorization URLsis alarming, the real concern is not just about the exposure itself, but in how cybercriminals collect and weaponize these credentials.

article thumbnail

Failing well and 3 other ways AI can help you solve your big business problems

Zero Day

Here's how to ensure your organization is innovating in the right places.

130
130
article thumbnail

Silent Ransom Group targeting law firms, the FBI warns

Security Affairs

FBI warns Silent Ransom Group has targeted U.S. law firms for 2 years using callback phishing and social engineering extortion tactics. The FBI warns that the Silent Ransom Group, active since 2022 and also known as Luna Moth, has targeted U.S. law firms using phishing and social engineering. Linked to BazarCall campaigns, the group previously enabled Ryuk and Conti ransomware attacks. “The cyber threat actor Silent Ransom Group (SRG), also known as Luna Moth, Chatty Spider, and UNC3753, i

article thumbnail

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

The Hacker News

As part of the latest "season" of Operation Endgame, a coalition of law enforcement agencies have taken down about 300 servers worldwide, neutralized 650 domains, and issued arrest warrants against 20 targets.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

A Starter Guide to Protecting Your Data From Hackers and Corporations

WIRED Threat Level

Hackers. AI data scrapes. Government surveillance. Thinking about where to start when it comes to protecting your online privacy can be overwhelming. Heres a simple guide for youand anyone who claims they have nothing to hide.

article thumbnail

Warning: Fake AI Tools Spread CyberLock Ransomware and Numero Destructive Malware

Penetration Testing

As artificial intelligence continues to revolutionize industries, cybercriminals are exploiting the growing demand for AI-driven tools by embedding The post Warning: Fake AI Tools Spread CyberLock Ransomware and Numero Destructive Malware appeared first on Daily CyberSecurity.

article thumbnail

Massive data breach exposes 184 million passwords for Google, Microsoft, Facebook, and more

Zero Day

The file was unencrypted. No password protection. No security. Just a plain text file with millions of sensitive pieces of data.

Passwords 111
article thumbnail

Crooks use a fake antivirus site to spread Venom RAT and a mix of malware

Security Affairs

Researchers found a fake Bitdefender site spreading the Venom RAT by tricking users into downloading it as antivirus software. DomainTools Intelligence (DTI) researchers warn of a malicious campaign using a fake website (bitdefender-download[.]com) spoofing Bitdefenders Antivirus for Windows download page to trick visitors into downloading a remote access trojan called Venom RAT. “A malicious campaign using a fake website to spread VenomRAT, a Remote Access Trojan (RAT), is detailed in thi

Antivirus 117
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File

The Hacker News

Cybersecurity researchers have discovered a security flaw in Microsoft's OneDrive File Picker that, if successfully exploited, could allow websites to access a user's entire cloud storage content, as opposed to just the files selected for upload via the tool.

article thumbnail

Meet the new Duo IAM

Duo's Security Blog

Identity is under siege. Sixty percent of all Cisco Talos IR cases in 2024 saw identity as a key component of reported attacks. Organizations are facing relentless challenges in keeping their systems secure. As attackers grow more sophisticated, traditional Identity and Access Management (IAM) providers have fallen short, leaving critical gaps in their defenses.

article thumbnail

Fake Google Meet Page Tricks Users into Running Malware

Penetration Testing

A deceptively crafted fake Google Meet page has surfaced on compromised WordPress sites, tricking unsuspecting visitors into manually The post Fake Google Meet Page Tricks Users into Running Malware appeared first on Daily CyberSecurity.

Malware 112
article thumbnail

I changed 7 Samsung phone settings to give it an instant battery boost

Zero Day

Even if your Samsung phone offers battery life that's just good enough, adjusting these settings will take things up a notch.

122
122
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Operation RapTor led to the arrest of 270 dark web vendors and buyers

Security Affairs

Law enforcement operation codenamed ‘Operation RapTor’ led to the arrest of 270 dark web vendors and buyers across 10 countries. Police arrested 270 suspects following an international law enforcement action codenamed ‘Operation RapTor’ that targeted dark web vendors and customers from ten countries. The Operation RapTor has dismantled networks trafficking in drugs, weapons, and counterfeit goods. “Europol supported the action by compiling and analysing intelligence

article thumbnail

Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

The Hacker News

As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled endpoint.

DNS 121
article thumbnail

RSAC Fireside Chat: ‘Purple’ teams dismantle the reactive trap — and can help restore cyber readiness

The Last Watchdog

Reactive security isnt just outdated its become a liability. Attackers have figured out how to weaponize speed, and defenders are struggling to keep pace. Related: Mastering adversary emulation At RSAC 2025 , I spoke with Derek Manky , Chief Security Strategist and Global VP of Threat Intelligence at Fortinets FortiGuard Labs, about how and why the game has changed and what defenders can do to adapt.

article thumbnail

PureHVNC RAT Spreads Through Fake Job Offers and Multi-Stage Obfuscation

Penetration Testing

A new wave of attacks uncovered by Netskope Threat Labs reveals a sophisticated global malware campaign delivering the The post PureHVNC RAT Spreads Through Fake Job Offers and Multi-Stage Obfuscation appeared first on Daily CyberSecurity.

Malware 113
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Cyber Criminals and Groceries?

SecureWorld News

In early May 2025, two of the United Kingdom's best-known grocers, Marks & Spencer (M&S) and the Co-op, as well as luxury retailer Harrods, were struck by sophisticated social-engineering attacks that tricked IT teams into resetting critical passwords and deploying ransomware across their networks. Online systems were shut down in response, payments couldn't be accepted, and shelves were left empty as the supply chain broke down.

Retail 105
article thumbnail

Leader of Qakbot cybercrime network indicted in U.S. crackdown

Security Affairs

The U.S. indicted Russian Rustam Gallyamov for leading the Qakbot botnet, which infected 700K+ devices and was used in ransomware attacks. The U.S. authorities have indicted Russian national Rustam Gallyamov, the leader of the Qakbot operation, which infected over 700,000 computers and facilitated ransomware attacks. Qakbot , also known as QBot, QuackBot and Pinkslipbot, is an info-stealing malware that has been active since 2008.

article thumbnail

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

The Hacker News

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with DanaBot (aka DanaTools) and unsealed charges against 16 individuals for their alleged involvement in the development and deployment of the malware, which it said was controlled by a Russia-based cybercrime organization.

article thumbnail

Can you build a billion-dollar business with only AI agents (yet)? This author thinks so

Zero Day

Is a one-person mega-business realistic? And what are the best tools and technologies to scale and sustain a small-team business?

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.