Mon.Jun 23, 2025

article thumbnail

Largest DDoS Attack to Date

Schneier on Security

It was a recently unimaginable 7.3 Tbps : The vast majority of the attack was delivered in the form of User Datagram Protocol packets. Legitimate UDP-based transmissions are used in especially time-sensitive communications, such as those for video playback, gaming applications, and DNS lookups. It speeds up communications by not formally establishing a connection before data is transferred.

DDOS 248
article thumbnail

Gmail’s multi-factor authentication bypassed by hackers to pull off targeted attacks

Malwarebytes

Russian hackers have bypassed Google’s multi-factor authentication (MFA) in Gmail to pull off targeted attacks, according to security researchers at Google Threat Intelligence Group (GTIG). The hackers pulled this off by posing as US Department of State officials in advanced social engineering attacks, building a rapport with the target and then persuading them into creating app-specific passwords (app passwords).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SparkKitty, SparkCat’s little brother: A new Trojan spy found in the App Store and Google Play

SecureList

In January 2025, we uncovered the SparkCat spyware campaign , which was aimed at gaining access to victims’ crypto wallets. The threat actor distributed apps containing a malicious SDK/framework. This component would wait for a user to open a specific screen (typically a support chat), then request access to the device’s gallery. It would then use an OCR model to select and exfiltrate images of interest.

Spyware 131
article thumbnail

Stop Blaming CVSS: The Real Problem in Vulnerability Management is Us 

Security Boulevard

CVSS is not the enemy, so the sooner we stop blaming the tool and start fixing the system around it, the better off we’ll all be. The post Stop Blaming CVSS: The Real Problem in Vulnerability Management is Us appeared first on Security Boulevard.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

The Hacker News

The United States government has warned of cyber attacks mounted by pro-Iranian groups after it launched airstrikes on Iranian nuclear sites as part of the Iran–Israel war that commenced on June 13, 2025.

article thumbnail

From Bypass to Root: Mandiant Red Team Exploits CVE-2025-2171 and CVE-2025-2172 in Aviatrix Cloud Controller

Penetration Testing

The post From Bypass to Root: Mandiant Red Team Exploits CVE-2025-2171 and CVE-2025-2172 in Aviatrix Cloud Controller appeared first on Daily CyberSecurity.

LifeWorks

More Trending

article thumbnail

CapCut’s New Terms: ByteDance Gains Perpetual Rights to User Content, Likeness, & Voice Globally

Penetration Testing

The post CapCut’s New Terms: ByteDance Gains Perpetual Rights to User Content, Likeness, & Voice Globally appeared first on Daily CyberSecurity.

article thumbnail

184 million passwords leaked across Facebook, Google, more: What to know about this data breach

Zero Day

The file was left entirely unprotected - no encryption, no password, no safeguards - just a plain text document holding millions of sensitive data entries.

article thumbnail

Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks

The Hacker News

Google has revealed the various safety measures that are being incorporated into its generative artificial intelligence (AI) systems to mitigate emerging attack vectors like indirect prompt injections and improve the overall security posture for agentic AI systems.

article thumbnail

US House Bans WhatsApp on Government Devices Over Security & Transparency Concerns

Penetration Testing

The U.S. House of Representatives has banned WhatsApp on government devices, citing security and transparency concerns. Meta strongly disputes the "high-risk" assessment.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content

The Hacker News

Cybersecurity researchers are calling attention to a new jailbreaking method called Echo Chamber that could be leveraged to trick popular large language models (LLMs) into generating undesirable responses, irrespective of the safeguards put in place.

article thumbnail

PoC Released for Notepad++ Flaw Enables Privilege Escalation to NT AUTHORITYSYSTEM

Penetration Testing

CVE-2025-49144 lets attackers gain NT AUTHORITYSYSTEM via Notepad++ v8.8.1 installer flaw. PoC available—secure paths and signatures urged.

98
article thumbnail

⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More

The Hacker News

Not every risk looks like an attack. Some problems start as small glitches, strange logs, or quiet delays that don’t seem urgent—until they are. What if your environment is already being tested, just not in ways you expected? Some of the most dangerous moves are hidden in plain sight.

DDOS 102
article thumbnail

CVE-2025-6218: WinRAR Directory Traversal Bug Opens the Door to Remote Code Execution

Penetration Testing

A flaw (CVE-2025-6218, CVSS 7.8) in WinRAR allows remote code execution via directory traversal when opening crafted archives. Update to 7.12 Beta 1 immediately!

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Taiwan Is Rushing to Make Its Own Drones Before It's Too Late

WIRED Threat Level

Unmanned vehicles are increasingly becoming essential weapons of war. But with a potential conflict with China looming large, Taiwan is scrambling to build a domestic drone industry from scratch.

91
article thumbnail

SHOE RACK Malware: NCSC Uncovers Stealthy Reverse SSH & DoH Post-Exploitation Tool Targeting FortiGate Firewalls

Penetration Testing

The post SHOE RACK Malware: NCSC Uncovers Stealthy Reverse SSH & DoH Post-Exploitation Tool Targeting FortiGate Firewalls appeared first on Daily CyberSecurity.

article thumbnail

XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks

The Hacker News

Cybersecurity researchers have uncovered a Go-based malware called XDigo that has been used in attacks targeting Eastern European governmental entities in March 2025. The attack chains are said to have leveraged a collection of Windows shortcut (LNK) files as part of a multi-stage procedure to deploy the malware, French cybersecurity company HarfangLab said.

Malware 88
article thumbnail

CoinTelegraph Hacked: Fake CTG Airdrop Scam Steals Crypto Via Malicious Pop-Ups

Penetration Testing

CoinTelegraph was hacked on June 22, 2025, with attackers injecting malicious JavaScript to display fake CTG airdrop pop-ups, stealing crypto by draining connected wallets.

Hacking 84
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

American steel giant Nucor confirms data breach in May attack

Security Affairs

American steel giant Nucor confirms hackers stole data in a May cyberattack, following its earlier disclosure of the incident. Nucor, North America’s largest steel maker, confirmed hackers stole some data in a May cyberattack, following its earlier disclosure of the incident. Nucor Corporation (NYSE: NUE) is a major American steel company headquartered in Charlotte, North Carolina.

article thumbnail

Critical Convoy Flaw (CVE-2025-52562, CVSS 10.0): Unauthenticated Remote Code Execution on KVM Servers!

Penetration Testing

The post Critical Convoy Flaw (CVE-2025-52562, CVSS 10.0): Unauthenticated Remote Code Execution on KVM Servers! appeared first on Daily CyberSecurity.

article thumbnail

Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent

Trend Micro

A single SQL injection bug in Anthropic’s SQLite MCP server—forked over 5,000 times—can seed stored prompts, exfiltrate data, and hand attackers the keys to entire agent workflows. This entry unpacks the attack chain and lays out concrete fixes to shut it down.

article thumbnail

Critical Key Derivation Flaws in pbkdf2 Affect Millions of JavaScript Projects, PoC Available

Penetration Testing

Two critical flaws (CVE-2025-6545, CVE-2025-6547, CVSS 9.1) in pbkdf2 npm package allow silent compromise of cryptographic keys. Update to 3.1.3+ immediately!

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes’ Data from Saudi Games

Security Affairs

Cyber Fattah leaked thousands of records on athletes and visitors from past Saudi Games, per U.S.-based cybersecurity firm Resecurity. Resecurity (USA) identified the threat actors associated with the “ Cyber Fattah ” movement leaked thousands of records containing information about visitors and athletes from past Saudi Games, one of the major sports events in the Kingdom.

Hacking 85
article thumbnail

iOS 26 Unveils “Captive Assist”: Seamless Public Wi-Fi Login Across All Your Apple Devices

Penetration Testing

The post iOS 26 Unveils “Captive Assist”: Seamless Public Wi-Fi Login Across All Your Apple Devices appeared first on Daily CyberSecurity.

article thumbnail

From Menu to Malware: How Innocent Scans Lead to Quishing Attacks

SecureWorld News

You're at a café, waiting for your coffee. Instead of a physical menu, there's a QR code on the table. You scan it without hesitation because it feels like second nature now. At the gym, the flyer advertising a free class also has a QR code. At a music festival, a food truck uses one to take orders. In the moment, scanning seems efficient, even enjoyable.

Malware 73
article thumbnail

Intel GPU Performance Hit by Security Mitigations: Ubuntu Weighs Disabling Them for 20% Boost

Penetration Testing

Intel GPUs face up to 20% performance loss from security mitigations. Ubuntu is considering disabling them in compute stacks, as Intel itself allows unmitigated builds due to minimal risk.

Risk 92
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

McLaren Health Care data breach impacted over 743,000 people

Security Affairs

The ransomware attack that hit McLaren Health Care in 2024 exposed the personal data of 743,000 individuals. McLaren Health Care is notifying over 743,000 people of a data breach discovered on August 5, 2024. McLaren discovered suspicious activity on its and Karmanos Cancer Institute’s systems on August 5, 2024, revealing a data breach incident. McLaren Health Care is a nonprofit health care organization based in Grand Blanc, Michigan, USA.

article thumbnail

CoinMarketCap Hacked: “Doodle” Graphic Delivers Malware, Stealing $43K+ from User Wallets

Penetration Testing

CoinMarketCap suffered a client-side attack on June 20, 2025, using a fake "doodle" graphic to deliver Inferno Drainer, stealing over $43,000 from user wallets.

Hacking 73
article thumbnail

Okta Introduces Cross App Access to Secure AI Agents in Enterprise

Security Boulevard

Okta Inc. on Monday said it has created a new protocol to secure artificial intelligence (AI) agents to bring visibility, control and governance to agent-driven and app-to-app interactions. The Cross App Access platform is especially important as more AI tools use protocols like Model Context Protocol (MCP) to connect their AI learning models to important.

article thumbnail

AI agents will threaten humans to achieve their goals, Anthropic report finds

Zero Day

X Trending Miss out on Nintendo Switch 2 preorders? Here's how to buy one Nintendo Switch 2 revealed: Specs, pricing, release date (out now), and more official details The $700 Android phone that made me forget about my Pixel 9 Pro Best small business web hosting services of 2025 Memorial Day headphone sales 2025 Best Linux VPNs of 2025 Best online video editors of 2025 Best CRM software of 2025 Best small business CRM software of 2025 Best free website builders of 2025 Best website builder

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!