Mon.Jun 16, 2025

article thumbnail

Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet

Trend Micro

This blog uncovers an active campaign exploiting CVE-2025-3248 in Langflow versions before 1.3.0 that deploys the Flodrix botnet, enabling threat actors to achieve full system compromise, initiate DDoS attacks, and potentially exfiltrate sensitive data.

DDOS 128
article thumbnail

U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network

The Hacker News

The U.S. Department of Justice (DoJ) said it has filed a civil forfeiture complaint in federal court that targets over $7.74 million in cryptocurrency, non-fungible tokens (NFTs), and other digital assets allegedly linked to a global IT worker scheme orchestrated by North Korea. "For years, North Korea has exploited global remote IT contracting and cryptocurrency ecosystems to evade U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Publish your threat model!

Adam Shostack

We think you should publish your threat model, and we’re publishing our arguments. At ThreatModCon, I gave a talk titled “Publish Your Threat Model!” In it, I discussed work that Loren Kohnfelder and I have been doing to explore the idea, and today I want to share the slides and an essay form of the idea. We invite comments on the essay form, which is the most fleshed out.

Risk 130
article thumbnail

Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment

The Hacker News

An emerging ransomware strain has been discovered incorporating capabilities to encrypt files as well as permanently erase them, a development that has been described as a "rare dual-threat.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Output-driven SIEM — 13 years later

Anton on Security

Output-driven SIEM — 13 years later Output-driven SIEM! Apart from EDR and SOC visibility triad , this is probably my most known “invention” even though I was very clear that I stole this from the Vigilant crew back in 2011. Anyhow, I asked this question on X the other day: So, what year is this? Let me see … 2025! Anyhow, get a time machine, we are flying to 2012…. whooosh…. … we landed … no dinosaurs in sight so we didn’t screw the time settings.

article thumbnail

Massive JSFireTruck Malware Campaign Infects Over 269,000 Websites

eSecurity Planet

Security researchers have uncovered a large and growing cyberattack campaign that has infected hundreds of thousands of legitimate websites with malicious JavaScript code. The culprits behind this operation are using an obscure but powerful JavaScript obfuscation method dubbed JSFireTruck, a nickname coined by Palo Alto Networks’ Unit42 researchers.

Malware 98

LifeWorks

More Trending

article thumbnail

CVE-2025-49596: Critical RCE Vulnerability in MCP Inspector Exposes AI Developer Environments

Penetration Testing

A critical flaw (CVE-2025-49596, CVSS 9.4) in MCP Inspector allows unauthenticated remote code execution, threatening AI application development environments.

article thumbnail

What is Cyberespionage? A Detailed Overview

Security Boulevard

Cyberespionage, also known as cyber spying, is one of the most serious threats in today’s hyper-connected digital world. It involves the unauthorized access and theft of sensitive information through digital means. As more critical data is stored and transmitted online, the risks associated with these attacks have surged dramatically. Cyberespionage poses significant concerns for national […] The post What is Cyberespionage?

Risk 78
article thumbnail

Windows Hello Update: Microsoft Disables Facial Recognition in the Dark Due to Security Flaw

Penetration Testing

Microsoft disabled Windows Hello facial recognition in dark environments on Windows 10/11 due to a security flaw that could allow local spoofing attacks.

84
article thumbnail

Maturing Your AI Vendor Security Assessment Process

SecureWorld News

It's hard to find a SaaS application these days that doesn’t include some form of AI. A recent McKinsey report found that 55% of organizations had adopted AI in at least one function, and that number is rising steadily. Whether it's summarizing emails, recommending code, or interpreting natural language queries, AI has become the quiet engine under many digital hoods.

Risk 69
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Zyxel Firewalls Under Attack via Critical CVE-2023-28771

Penetration Testing

Zyxel firewalls are under a coordinated attack exploiting critical RCE flaw CVE-2023-28771 (CVSS 9.8) via UDP port 500, likely by Mirai botnets.

article thumbnail

Yet another European government is ditching Microsoft for Linux - here's why

Zero Day

X Trending Miss out on Nintendo Switch 2 preorders? Here's how to buy one Nintendo Switch 2 revealed: Specs, pricing, release date (out now), and more official details The $700 Android phone that made me forget about my Pixel 9 Pro Best small business web hosting services of 2025 Memorial Day headphone sales 2025 Best Linux VPNs of 2025 Best online video editors of 2025 Best CRM software of 2025 Best small business CRM software of 2025 Best free website builders of 2025 Best website builder

article thumbnail

Team46 (TaxOff) Exploits Google Chrome Zero-Day (CVE-2025-2783) in Sophisticated Phishing Campaign

Penetration Testing

Team46 (TaxOff) is exploiting a Google Chrome sandbox escape zero-day (CVE-2025-2783) to deploy the multi-layered Trinper malware via phishing campaigns

article thumbnail

⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More

The Hacker News

Some of the biggest security problems start quietly. No alerts. No warnings. Just small actions that seem normal but aren't. Attackers now know how to stay hidden by blending in, and that makes it hard to tell when something’s wrong. This week’s stories aren’t just about what was attacked—but how easily it happened.

Spyware 64
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Water Curse: GitHub Supply Chain Attack Spreads Malware via Fake Tools, Targets Devs & Gamers

Penetration Testing

Water Curse is using GitHub to distribute malicious open-source projects, weaponizing 76 accounts with multi-stage malware targeting developers, red teamers, and gamers.

Malware 67
article thumbnail

How to clear your iPhone cache (and why you should do it before updating to iOS 26)

Zero Day

X Trending Miss out on Nintendo Switch 2 preorders? Here's how to buy one Nintendo Switch 2 revealed: Specs, pricing, release date (out now), and more official details The $700 Android phone that made me forget about my Pixel 9 Pro Best small business web hosting services of 2025 Memorial Day headphone sales 2025 Best Linux VPNs of 2025 Best online video editors of 2025 Best CRM software of 2025 Best small business CRM software of 2025 Best free website builders of 2025 Best website builder

article thumbnail

Two sslh Flaws Disclosed: Remote DoS Attacks Possible via Protocol Multiplexer

Penetration Testing

SUSE disclosed flaws in sslh (CVE-2025-46807, CVE-2025-46806) allowing remote DoS attacks via file descriptor exhaustion and unsafe memory access.

article thumbnail

Securing the Future Together: Why Thales and HPE are the Partners You Can Trust

Thales Cloud Protection & Licensing

Securing the Future Together: Why Thales and HPE are the Partners You Can Trust madhav Tue, 06/17/2025 - 05:15 Across every industry, data drives decisions, innovation, and growth. As organizations modernize with hybrid cloud and AI, the risks to that data scale are just as fast. From sophisticated cyberattacks to increasingly stringent compliance demands, the evolving threat landscape requires more than a reactive defense.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Apache Tomcat Patches 4 Flaws: DoS, Privilege Bypass, & Installer Risks Addressed

Penetration Testing

Apache Tomcat patched four vulnerabilities affecting versions 9.0, 10.1, and 11.0, ranging from DoS to privilege bypass.

Risk 81
article thumbnail

From LLMs to Cloud Infrastructure: F5 Aims to Secure the New AI Attack Surface 

Security Boulevard

Accelerate human-led innovation, automate the grunt work and make sure AI delivers real value without proliferating new security risks. The post From LLMs to Cloud Infrastructure: F5 Aims to Secure the New AI Attack Surface appeared first on Security Boulevard.

Risk 59
article thumbnail

PoCGen: AI Tool Automates Exploit Generation for npm Vulnerabilities with LLMs

Penetration Testing

PoCGen is a new AI tool using LLMs, static, and dynamic analysis to automate PoC exploit generation for npm vulnerabilities, achieving high success rates at low cost.

article thumbnail

Key Approaches to Reduce Secrets Sprawl

Security Boulevard

Are Your Secrets Secure? Secrets sprawl is a major hurdle when it comes to effectively handling cybersecurity. With an increasing number of non-human identities (NHIs) and secrets, it’s vital to have a robust management system in place. But what exactly are NHIs? Think of them as the machine identities used in cybersecurity, created by a […] The post Key Approaches to Reduce Secrets Sprawl appeared first on Entro.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Hackers Leak 7.4 Million Paraguayan Citizen Records, Demand $1 Per Person Ransom

Penetration Testing

Hackers leaked 7.4 million Paraguayan citizen records on the dark web, demanding a $7.4M ransom. The breach likely stems from infostealer malware, sparking national security concerns.

Malware 64
article thumbnail

Playbook: Transforming Your Cybersecurity Practice Into An MRR Machine

The Hacker News

Introduction The cybersecurity landscape is evolving rapidly, and so are the cyber needs of organizations worldwide. While businesses face mounting pressure from regulators, insurers, and rising threats, many still treat cybersecurity as an afterthought.

article thumbnail

Critical Teleport Flaw (CVSS 9.8): Remote Authentication Bypass Threatens Infrastructure Access

Penetration Testing

Teleport disclosed a critical remote authentication bypass flaw (CVE-2025-49825) affecting self-hosted instances. Upgrade Proxies and agents immediately!

article thumbnail

I replaced my Kindle and iPad within hours of testing this tablet - and didn't regret it

Zero Day

X Trending Miss out on Nintendo Switch 2 preorders? Here's how to buy one Nintendo Switch 2 revealed: Specs, pricing, release date (out now), and more official details The $700 Android phone that made me forget about my Pixel 9 Pro Best small business web hosting services of 2025 Memorial Day headphone sales 2025 Best Linux VPNs of 2025 Best online video editors of 2025 Best CRM software of 2025 Best small business CRM software of 2025 Best free website builders of 2025 Best website builder

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Fileless AsyncRAT Campaign Targets German Users with Stealthy PowerShell Payload

Penetration Testing

A fileless AsyncRAT campaign, dubbed "Clickfix," targets German-speaking users, luring them into executing obfuscated PowerShell payloads via fake verification prompts.

article thumbnail

Stay Reassured with Effective Secrets Security

Security Boulevard

How Do Secrets Security Practices Reinforce Data Protection? With rapid advancements in technology, the threats posed to data security become increasingly sophisticated and diverse. Have you ever considered the importance of robust secrets security practices in reinforcing data protection? The management of Non-Human Identities (NHIs) and secrets is a significant aspect of a comprehensive data […] The post Stay Reassured with Effective Secrets Security appeared first on Entro.

article thumbnail

Zero-Click to Root: CISA Flags Active Exploits in Apple iOS and TP-Link Routers

Penetration Testing

CISA adds two actively exploited zero-days to KEV: an iOS zero-click flaw used by spyware (CVE-2025-43200) and a command injection in TP-Link routers

Spyware 64
article thumbnail

How to Prepare for ISO 27001 Stage 1 and Stage 2 Audits: Expert Tips

Centraleyes

ISO 27001 is the international standard for Information Security Management Systems (ISMS). Achieving ISO 27001 certification demonstrates that your organization is committed to protecting sensitive data and managing risks related to information security. However, before you can claim that certification, your organization needs to pass through two essential audits: Stage 1 and Stage 2.

Risk 52
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!