Tue.Jul 15, 2025

article thumbnail

Android Malware Konfety evolves with ZIP manipulation and dynamic loading

Security Affairs

A new Konfety Android malware variant uses a malformed ZIP and obfuscation to evade detection, posing as fake apps with no real functionality. Zimperium zLabs researchers are tracking a new, sophisticated Konfety Android malware variant that uses an “evil-twin” tactic and duplicate package names to avoid detection. The new Konfety malware variants use malformed ZIP, enabling a misleading flag and declaring an unsupported BZIP compression, to evade analysis tools. “The APK conta

Malware 86
article thumbnail

Urgent Chrome Update: Google Patches Critical Zero-Day (CVE-2025-6558) Under Active Attack

Penetration Testing

Google released a critical Chrome update (138.0.7204.157/.158) patching six vulnerabilities, including CVE-2025-6558, a high-severity zero-day actively exploited in the wild. Update immediately!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

Security Affairs

North Korea-linked hackers uploaded 67 malicious npm packages with XORIndex malware, hitting 17K+ downloads in ongoing supply chain attacks. North Korea-linked threat actors behind the Contagious Interview campaign have uploaded 67 malicious npm packages with XORIndex malware loader, hitting over 17,000 downloads in ongoing supply chain attacks. XORIndex was built to evade detection and deploy BeaverTail, a second-stage malware tied to the known backdoor InvisibleFerret.

Malware 69
article thumbnail

North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

The Hacker News

The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set of 67 malicious packages to the npm registry, underscoring ongoing attempts to poison the open-source ecosystem via software supply chain attacks.

Malware 115
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Belk hit by May cyberattack: DragonForce stole 150GB of data

Security Affairs

Ransomware group DragonForce claims it attacked U.S. retailer Belk in May, stealing over 150GB of data in a disruptive cyberattack. The infamous Ransomware group DragonForce claimed responsibility for the May disruptive attack on US department store chain Belk. The ransomware gang claimed it had stolen 156 gigabytes of data from Belk. Belk , Inc. is a major American department store chain, founded in 1888 in Monroe, North Carolina, and currently headquartered in Charlotte.

article thumbnail

Broadcom Addresses Critical Vulnerabilities in VMware ESXi, Workstation, and Fusion

Penetration Testing

Broadcom has released urgent patches for four critical (CVSS up to 9.3) VMware vulnerabilities affecting ESXi, Workstation, and Fusion, allowing host code execution.

LifeWorks

More Trending

article thumbnail

Intel Raptor Lake CPUs Facing Widespread Stability Issues, Causing Firefox Crashes

Penetration Testing

Intel's 14th-gen Raptor Lake CPUs are causing widespread system instability and Firefox crashes, leading Mozilla to disable its crash reporting bot.

article thumbnail

Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors

The Hacker News

Cloudflare on Tuesday said it mitigated 7.3 million distributed denial-of-service (DDoS) attacks in the second quarter of 2025, a significant drop from 20.5 million DDoS attacks it fended off the previous quarter. "Overall, in Q2 2025, hyper-volumetric DDoS attacks skyrocketed," Omer Yoachimik and Jorge Pacheco said.

DDOS 136
article thumbnail

Palo Alto Networks Extends Zero-Trust Alliance with Okta

Security Boulevard

Palo Alto Networks today extended its alliance with Okta to provide deeper integrations to enable cybersecurity teams to restrict which applications can be accessed from a secure browser. The post Palo Alto Networks Extends Zero-Trust Alliance with Okta appeared first on Security Boulevard.

article thumbnail

High-Severity Node.js Flaws Expose Windows Apps to Path Traversal (CVE-2025-27210) & HashDoS (CVE-2025-27209) Attacks

Penetration Testing

The post High-Severity Node.js Flaws Expose Windows Apps to Path Traversal (CVE-2025-27210) & HashDoS (CVE-2025-27209) Attacks appeared first on Daily CyberSecurity.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

New AI-Powered PayPal Scam Tricks You Into Calling a Fake Support Line

eSecurity Planet

In a recent alert reported by WGAL, PayPal warned that scammers are now using AI tools to generate emails that appear more legitimate than ever. These fake messages often claim a recent purchase, like a $700 iPhone or $599 worth of Bitcoin, and are addressed to “Dear PayPal Customer.” The emails typically include a phone number, which, if called, connects victims to scammers pretending to be PayPal representatives.

Scams 96
article thumbnail

The SaaS Security Disconnect: Why Most Organizations Are Still Vulnerable 

Security Boulevard

A new report from AppOmni captures a significant misplaced confidence in the security of software-as-a-service applications and escalating risks associated with these cloud services. The post The SaaS Security Disconnect: Why Most Organizations Are Still Vulnerable appeared first on Security Boulevard.

Risk 62
article thumbnail

Unmasking AsyncRAT: Navigating the labyrinth of forks

We Live Security

ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants.

102
102
article thumbnail

Goldman Sachs Pilots Its First Autonomous Coder

SecureWorld News

Goldman Sachs has officially entered the era of the "hybrid workforce" with the announcement of Devin, an autonomous AI software engineer from Cognition. Marco Argenti, Goldman' s chief information officer, told CNBC that Devin will soon join the ranks of the bank's 12,000-plus developers, with initial deployments numbering in the hundreds and potentially scaling into the thousands.

Banking 70
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments

The Hacker News

Governmental organizations in Southeast Asia are the target of a new campaign that aims to collect sensitive information by means of a previously undocumented Windows backdoor dubbed HazyBeacon. The activity is being tracked by Palo Alto Networks Unit 42 under the moniker CL-STA-1020, where "CL" stands for "cluster" and "STA" refers to "state-backed motivation.

article thumbnail

Third-Party Access in Critical Infrastructure - A Growing Identity Challenge

Thales Cloud Protection & Licensing

Third-Party Access in Critical Infrastructure - A Growing Identity Challenge madhav Tue, 07/15/2025 - 07:16 The digital shift in critical infrastructure is exposing a risk that many leaders haven’t fully accounted for: the rising influence - and volume - of external users. Suppliers, contractors, research partners and distributors now play central roles in day-to-day operations.

B2B 62
article thumbnail

Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools

The Hacker News

Cybersecurity researchers have shed light on a new ransomware-as-a-service (RaaS) operation called GLOBAL GROUP that has targeted a wide range of sectors in Australia, Brazil, Europe, and the United States since its emergence in early June 2025. GLOBAL GROUP was "promoted on the Ramp4u forum by the threat actor known as '$$$,'" EclecticIQ researcher Arda Büyükkaya said.

article thumbnail

Four AI Powerhouses Land $200M Pentagon Contracts to ‘Support US Warfighters’

Tech Republic Security

The Pentagon awards $200 million contracts to Google, OpenAI, Anthropic, and xAI to develop AI systems for US defense and national security operations

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

GitGuardian Launches MCP Server to Bring Secrets Security into Developer Workflows

Penetration Testing

Paris, France, 15th July 2025, CyberNewsWire The post GitGuardian Launches MCP Server to Bring Secrets Security into Developer Workflows appeared first on Daily CyberSecurity.

article thumbnail

U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Wing FTP Server flaw, tracked as CVE-2025-47812 , to its Known Exploited Vulnerabilities (KEV) catalog. Wing FTP Server is a secure and flexible file transfer solution that supports multiple protocols, including FTP, FTPS, SFTP, and HTTP/S.

article thumbnail

Meta’s $100B AI Push: Gigawatt Data Centers Spark Water Crisis & Community Tensions

Penetration Testing

Meta's multi-billion dollar investment in gigawatt-scale AI data centers is raising alarms over massive water consumption and escalating community tensions.

article thumbnail

Universal ZTNA from Cisco Earns Coveted SE Labs AAA Rating

Cisco Security

Combining the power of Duo's Identity Management and Cisco's Secure Access and Identity Intelligence protects against stolen credentials and phishing attacks.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Can 2FA Stop Hackers? The Truth About Two-Factor Authentication

Mitnick Security

In an era of password breaches and account takeovers, many organizations are asking the same question: can 2FA stop hackers , or is it just another checkbox on a long list of cybersecurity best practices?

article thumbnail

Hacked Elmo X Account Spews Racist, Antisemitic Posts

Security Boulevard

A hacker accessed the X account of beloved Sesame Street character Elmo, which included racist and antisemitic posts and a foul tirade about Trump and Jeffrey Epstein. The incident came a week after xAI's Grok chatbot spewed antisemitic and white nationalist messages. The post Hacked Elmo X Account Spews Racist, Antisemitic Posts appeared first on Security Boulevard.

article thumbnail

Apache CXF Vulnerability: DoS and Data Leak Risks Exposed (CVE-2025-48795)

Penetration Testing

Apache CXF versions are vulnerable to DoS attacks and sensitive data leaks (CVE-2025-48795) due to improper handling of large messages. Update immediately!

Risk 73
article thumbnail

AsyncRAT's Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

The Hacker News

Cybersecurity researchers have charted the evolution of a widely used remote access trojan called AsyncRAT, which was first released on GitHub in January 2019 and has since served as the foundation for several other variants.

Malware 118
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Warning: Fake Remittance Apps Target Bangladeshi Expats, Stealing IDs & Financial Data

Penetration Testing

McAfee warns of a new Android malware campaign targeting Bangladeshi expats with fake remittance apps like TapTap Send, stealing personal and financial data, including photo IDs.

Malware 77
article thumbnail

Securing Agentic AI: How to Protect the Invisible Identity Access

The Hacker News

AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privilege API key, OAuth token, or service account that defenders can’t easily see.

article thumbnail

Code Execution Through Email: How I Used Claude to Hack Itself

Security Boulevard

You don’t always need a vulnerable app to pull off a successful exploit. Sometimes all it takes is a well-crafted email, an LLM agent, and a few “innocent” plugins. This is the story of how I used a Gmail message to trigger code execution through Claude Desktop, and how Claude itself (!) helped me plan. The post Code Execution Through Email: How I Used Claude to Hack Itself appeared first on Security Boulevard.

Hacking 62
article thumbnail

SIM scammer’s sentence increased to 12 years, after failing to pay back victim $20 million

Graham Cluley

Remember well-heeled Manhattan resident Nicholas Truglia? Back in 2022, we told you how he had been sentenced to prison for his part in orchestrating a SIM swap scam that stole US $22 million in cryptocurrency.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!