Trending Articles

article thumbnail

Chinese-Owned VPNs

Schneier on Security

One one my biggest worries about VPNs is the amount of trust users need to place in them, and how opaque most of them are about who owns them and what sorts of data they retain. A new study found that many commercials VPNS are (often surreptitiously) owned by Chinese companies. It would be hard for U.S. users to avoid the Chinese VPNs. The ownership of many appeared deliberately opaque, with several concealing their structure behind layers of offshore shell companies.

VPN 300
article thumbnail

Pakistan Arrests 21 in ‘Heartsender’ Malware Service

Krebs on Security

Authorities in Pakistan have arrested 21 individuals accused of operating “ Heartsender ,” a once popular spam and malware dissemination service that operated for more than a decade. The main clientele for HeartSender were organized crime groups that tried to trick victim companies into making payments to a third party, and its alleged proprietors were publicly identified by KrebsOnSecurity in 2021 after they inadvertently infected their computers with malware.

Malware 174
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Oops: DanaBot Malware Devs Infected Their Own PCs

Krebs on Security

The U.S. government today unsealed criminal charges against 16 individuals accused of operating and selling DanaBot , a prolific strain of information-stealing malware that has been sold on Russian cybercrime forums since 2018. The FBI says a newer version of DanaBot was used for espionage, and that many of the defendants exposed their real-life identities after accidentally infecting their own systems with the malware.

Malware 231
article thumbnail

Midyear Roundup: Nation-State Cyber Threats in 2025

Lohrman on Security

What is the current situation with nation-state cyber attacks in the middle of 2025? Heres a look at some of the biggest cyber threats from Russia, China, Iran and North Korea.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

184 Million Records Database Leak: Microsoft, Apple, Google, Facebook, PayPal Logins Found

Tech Republic Security

The databases exposure duration is unknown. Signs of infostealer malware were found, but no confirmed breach or misuse of user data, says cybersecurity researcher.

Malware 141
article thumbnail

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

The Hacker News

The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a distribution vector. "The ClickFix technique is particularly risky because it allows the malware to execute in memory rather than being written to disk," Expel said in a report shared with The Hacker News.

LifeWorks

More Trending

article thumbnail

Operation ENDGAME disrupted global ransomware infrastructure

Security Affairs

Operation ENDGAME dismantled key ransomware infrastructure, taking down 300 servers, 650 domains, and seizing 21.2M in crypto. From May 19 to 22, 2025, Operation ENDGAME, coordinated by Europol and Eurojust, disrupted global ransomware infrastructure. Law enforcement took down down 300 servers and 650 domains, and issuing 20 international arrest warrants. “A Command Post was set up at Europol headquarters in The Hague during the action week, with investigators from Canada, Denmark, France,

article thumbnail

Tracking the Cost of Quantum Factoring

Google Security

Posted by Craig Gidney, Quantum Research Scientist, and Sophie Schmieg, Senior Staff Cryptography Engineer Google Quantum AI's mission is to build best in class quantum computing for otherwise unsolvable problems. For decades the quantum and security communities have also known that large-scale quantum computers will at some point in the future likely be able to break many of todays secure public key cryptography algorithms, such as RivestShamirAdleman (RSA).

article thumbnail

Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware

The Hacker News

Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework. The campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena.

Malware 120
article thumbnail

Signal Blocks Windows Recall

Schneier on Security

This article gives a good rundown of the security risks of Windows Recall, and the repurposed copyright protection took that Signal used to block the AI feature from scraping Signal data.

Risk 248
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

News alert: INE Security, Abadnet Institute partner to deliver cybersecurity training in Saudi Arabia

The Last Watchdog

Cary, NC. May 22, 2025, CyberNewswire — INE Security , a global leader in Cybersecurity training and certifications, has announced a strategic partnership with Abadnet Institute for Training , a Riyadh-based leader in specialized Information Technology, Cybersecurity, and Networking training. The collaboration leverages INE Security’s internationally recognized cybersecurity training content and Abadnet’s established presence in the Saudi Arabian market to deliver comprehensive

article thumbnail

184 million logins for Instagram, Roblox, Facebook, Snapchat, and more exposed online

Malwarebytes

A recent discovery by cybersecurity researcher Jeremiah Fowler of an unsecured database containing over 184 million unique login credentials has once again highlighted the growing threat posed by infostealers. While the sheer volume of exposed dataincluding emails, passwords, and authorization URLsis alarming, the real concern is not just about the exposure itself, but in how cybercriminals collect and weaponize these credentials.

article thumbnail

Silent Ransom Group targeting law firms, the FBI warns

Security Affairs

FBI warns Silent Ransom Group has targeted U.S. law firms for 2 years using callback phishing and social engineering extortion tactics. The FBI warns that the Silent Ransom Group, active since 2022 and also known as Luna Moth, has targeted U.S. law firms using phishing and social engineering. Linked to BazarCall campaigns, the group previously enabled Ryuk and Conti ransomware attacks. “The cyber threat actor Silent Ransom Group (SRG), also known as Luna Moth, Chatty Spider, and UNC3753, i

article thumbnail

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

The Hacker News

As part of the latest "season" of Operation Endgame, a coalition of law enforcement agencies have taken down about 300 servers worldwide, neutralized 650 domains, and issued arrest warrants against 20 targets.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Fake Google Meet Page Tricks Users into Running Malware

Penetration Testing

A deceptively crafted fake Google Meet page has surfaced on compromised WordPress sites, tricking unsuspecting visitors into manually The post Fake Google Meet Page Tricks Users into Running Malware appeared first on Daily CyberSecurity.

Malware 115
article thumbnail

Massive data breach exposes 184 million passwords for Google, Microsoft, Facebook, and more

Zero Day

The file was unencrypted. No password protection. No security. Just a plain text file with millions of sensitive pieces of data.

Passwords 111
article thumbnail

Meet the new Duo IAM

Duo's Security Blog

Identity is under siege. Sixty percent of all Cisco Talos IR cases in 2024 saw identity as a key component of reported attacks. Organizations are facing relentless challenges in keeping their systems secure. As attackers grow more sophisticated, traditional Identity and Access Management (IAM) providers have fallen short, leaving critical gaps in their defenses.

article thumbnail

Crooks use a fake antivirus site to spread Venom RAT and a mix of malware

Security Affairs

Researchers found a fake Bitdefender site spreading the Venom RAT by tricking users into downloading it as antivirus software. DomainTools Intelligence (DTI) researchers warn of a malicious campaign using a fake website (bitdefender-download[.]com) spoofing Bitdefenders Antivirus for Windows download page to trick visitors into downloading a remote access trojan called Venom RAT. “A malicious campaign using a fake website to spread VenomRAT, a Remote Access Trojan (RAT), is detailed in thi

Antivirus 117
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday revealed that Commvault is monitoring cyber threat activity targeting applications hosted in their Microsoft Azure cloud environment. "Threat actors may have accessed client secrets for Commvault's (Metallic) Microsoft 365 (M365) backup software-as-a-service (SaaS) solution, hosted in Azure," the agency said.

Backups 115
article thumbnail

Russian-Aligned TAG-110 Targets Tajikistan Governments with Stealthy Cyber-Espionage

Penetration Testing

Recorded Futures Insikt Group has uncovered a new cyber-espionage campaign by Russia-aligned threat actor TAG-110 targeting public sector The post Russian-Aligned TAG-110 Targets Tajikistan Governments with Stealthy Cyber-Espionage appeared first on Daily CyberSecurity.

article thumbnail

Failing well and 3 other ways AI can help you solve your big business problems

Zero Day

Here's how to ensure your organization is innovating in the right places.

121
121
article thumbnail

RSAC Fireside Chat: ‘Purple’ teams dismantle the reactive trap — and can help restore cyber readiness

The Last Watchdog

Reactive security isnt just outdated its become a liability. Attackers have figured out how to weaponize speed, and defenders are struggling to keep pace. Related: Mastering adversary emulation At RSAC 2025 , I spoke with Derek Manky , Chief Security Strategist and Global VP of Threat Intelligence at Fortinets FortiGuard Labs, about how and why the game has changed and what defenders can do to adapt.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Operation RapTor led to the arrest of 270 dark web vendors and buyers

Security Affairs

Law enforcement operation codenamed ‘Operation RapTor’ led to the arrest of 270 dark web vendors and buyers across 10 countries. Police arrested 270 suspects following an international law enforcement action codenamed ‘Operation RapTor’ that targeted dark web vendors and customers from ten countries. The Operation RapTor has dismantled networks trafficking in drugs, weapons, and counterfeit goods. “Europol supported the action by compiling and analysing intelligence

article thumbnail

Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File

The Hacker News

Cybersecurity researchers have discovered a security flaw in Microsoft's OneDrive File Picker that, if successfully exploited, could allow websites to access a user's entire cloud storage content, as opposed to just the files selected for upload via the tool.

article thumbnail

A Starter Guide to Protecting Your Data From Hackers and Corporations

WIRED Threat Level

Hackers. AI data scrapes. Government surveillance. Thinking about where to start when it comes to protecting your online privacy can be overwhelming. Heres a simple guide for youand anyone who claims they have nothing to hide.

article thumbnail

I changed 7 Samsung phone settings to give it an instant battery boost

Zero Day

Even if your Samsung phone offers battery life that's just good enough, adjusting these settings will take things up a notch.

122
122
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

GitLab ‘Vulnerability Highlights the Double-Edged Nature of AI Assistants’

Tech Republic Security

A remote prompt injection flaw in GitLab Duo allowed attackers to steal private source code and inject malicious HTML. GitLab has since patched the issue.

article thumbnail

Leader of Qakbot cybercrime network indicted in U.S. crackdown

Security Affairs

The U.S. indicted Russian Rustam Gallyamov for leading the Qakbot botnet, which infected 700K+ devices and was used in ransomware attacks. The U.S. authorities have indicted Russian national Rustam Gallyamov, the leader of the Qakbot operation, which infected over 700,000 computers and facilitated ransomware attacks. Qakbot , also known as QBot, QuackBot and Pinkslipbot, is an info-stealing malware that has been active since 2008.

article thumbnail

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

The Hacker News

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with DanaBot (aka DanaTools) and unsealed charges against 16 individuals for their alleged involvement in the development and deployment of the malware, which it said was controlled by a Russia-based cybercrime organization.

article thumbnail

Destructive npm Packages Deleting Files, Hijacking Frameworks for 2+ Years

Penetration Testing

In a disturbing development for the JavaScript community, Sockets Threat Research Team has uncovered a stealthy and destructive The post Destructive npm Packages Deleting Files, Hijacking Frameworks for 2+ Years appeared first on Daily CyberSecurity.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.