Wed.May 28, 2025

article thumbnail

Location Tracking App for Foreigners in Moscow

Schneier on Security

Russia is proposing a rule that all foreigners in Moscow install a tracking app on their phones. Using a mobile application that all foreigners will have to install on their smartphones, the Russian state will receive the following information: Residence location Fingerprint Face photograph Real-time geo-location monitoring This isn’t the first time we’ve seen this.

Mobile 299
article thumbnail

Pakistan Arrests 21 in ‘Heartsender’ Malware Service

Krebs on Security

Authorities in Pakistan have arrested 21 individuals accused of operating “ Heartsender ,” a once popular spam and malware dissemination service that operated for more than a decade. The main clientele for HeartSender were organized crime groups that tried to trick victim companies into making payments to a third party, and its alleged proprietors were publicly identified by KrebsOnSecurity in 2021 after they inadvertently infected their computers with malware.

Malware 196
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New AyySSHush botnet compromised over 9,000 ASUS routers, adding a persistent SSH backdoor.

Security Affairs

GreyNoise researchers warn of a new AyySSHush botnet compromised over 9,000 ASUS routers, adding a persistent SSH backdoor. GreyNoisediscovered the AyySSHush botnet has hacked over 9,000 ASUS routers, adding a persistent SSH backdoor. “Using an AI powered network traffic analysis tool we built called SIFT, GreyNoise has caught multiple anomalous network payloads with zero-effort that are attempting to disable TrendMicro security features in ASUS routers, then exploit vulnerabilities and no

Firmware 136
article thumbnail

Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File

The Hacker News

Cybersecurity researchers have discovered a security flaw in Microsoft's OneDrive File Picker that, if successfully exploited, could allow websites to access a user's entire cloud storage content, as opposed to just the files selected for upload via the tool.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Crooks use a fake antivirus site to spread Venom RAT and a mix of malware

Security Affairs

Researchers found a fake Bitdefender site spreading the Venom RAT by tricking users into downloading it as antivirus software. DomainTools Intelligence (DTI) researchers warn of a malicious campaign using a fake website (bitdefender-download[.]com) spoofing Bitdefenders Antivirus for Windows download page to trick visitors into downloading a remote access trojan called Venom RAT. “A malicious campaign using a fake website to spread VenomRAT, a Remote Access Trojan (RAT), is detailed in thi

Antivirus 122
article thumbnail

Fake AI video generator tools lure in Facebook and LinkedIn users to deliver malware

Malwarebytes

Cybercriminals are taking advantage of the publics interest in Artificial Intelligence (AI) and delivering malware via text-to-video tools. According to researchers at Mandiant, the criminals are setting up websites claiming to offer AI video generator services, and then using those fake tools to distribute information stealers, Trojans, and backdoors.

Malware 113

LifeWorks

More Trending

article thumbnail

Zanubis in motion: Tracing the active evolution of the Android banking malware

SecureList

Introduction Zanubis is a banking Trojan for Android that emerged in mid-2022. Since its inception, it has targeted banks and financial entities in Peru, before expanding its objectives to virtual cards and crypto wallets. The main infection vector of Zanubis is impersonating legitimate Peruvian Android applications and then misleading the user into enabling the accessibility permissions.

Banking 107
article thumbnail

251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch

The Hacker News

Cybersecurity researchers have disclosed details of a coordinated cloud-based scanning activity that targeted 75 distinct "exposure points" earlier this month. The activity, observed by GreyNoise on May 8, 2025, involved as many as 251 malicious IP addresses that are all geolocated to Japan and hosted by Amazon.

article thumbnail

RSAC Fireside Chat: ‘Purple’ teams dismantle the reactive trap — and can help restore cyber readiness

The Last Watchdog

Reactive security isnt just outdated its become a liability. Attackers have figured out how to weaponize speed, and defenders are struggling to keep pace. Related: Mastering adversary emulation At RSAC 2025 , I spoke with Derek Manky , Chief Security Strategist and Global VP of Threat Intelligence at Fortinets FortiGuard Labs, about how and why the game has changed and what defenders can do to adapt.

article thumbnail

Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware

The Hacker News

A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting the Craft Content Management System (CMS) to deploy multiple payloads, including a cryptocurrency miner, a loader dubbed Mimo Loader, and residential proxyware.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Cyber Criminals and Groceries?

SecureWorld News

In early May 2025, two of the United Kingdom's best-known grocers, Marks & Spencer (M&S) and the Co-op, as well as luxury retailer Harrods, were struck by sophisticated social-engineering attacks that tricked IT teams into resetting critical passwords and deploying ransomware across their networks. Online systems were shut down in response, payments couldn't be accepted, and shelves were left empty as the supply chain broke down.

Retail 103
article thumbnail

Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack

The Hacker News

The Czech Republic on Wednesday formally accused a threat actor associated with the People's Republic of China (PRC) of targeting its Ministry of Foreign Affairs. In a public statement, the government said it identified China as the culprit behind a malicious campaign targeting one of the unclassified networks of the Czech Ministry of Foreign Affairs.

article thumbnail

I changed 12 settings on my Android phone to give it an instant battery boost

Zero Day

Goodbye, battery anxiety. These 12 expert vetted tips will help you get the most out of your Android phone's battery life.

109
109
article thumbnail

New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto

The Hacker News

Embedded Linux-based Internet of Things (IoT) devices have become the target of a new botnet dubbed PumaBot. Written in Go, the botnet is designed to conduct brute-force attacks against SSH instances to expand in size and scale and deliver additional malware to the infected hosts.

IoT 112
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

FTC Orders GoDaddy to Bolster Its Security After Years of Attacks

Security Boulevard

Web hosting giant GoDaddy for years has mislead customers about the strength of its security program, but after a series of data breaches, the FTC is ordering the company to implements robust defenses and stop lying about its cybersecurity capabilities. The post FTC Orders GoDaddy to Bolster Its Security After Years of Attacks appeared first on Security Boulevard.

article thumbnail

From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign

The Hacker News

Stealer malware no longer just steals passwords. In 2025, it steals live sessionsand attackers are moving faster and more efficiently than ever. While many associate account takeovers with personal services, the real threat is unfolding in the enterprise.

article thumbnail

AI developers should be philosophers as much as technologists

Zero Day

MIT research finds that philosophy is what truly determines AI success.

107
107
article thumbnail

How 'Browser-in-the-Middle' Attacks Steal Sessions in Seconds

The Hacker News

Would you expect an end user to log on to a cybercriminals computer, open their browser, and type in their usernames and passwords? Hopefully not! But thats essentially what happens if they fall victim to a Browser-in-the-Middle (BitM) attack.

Passwords 109
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

4 ways business leaders are using AI to solve problems and create real value

Zero Day

Here's how to ensure your organization is innovating in the right places.

108
108
article thumbnail

Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore

The Hacker News

An Iranian national has pleaded guilty in the U.S. over his involvement in an international ransomware and extortion scheme involving the Robbinhood ransomware. Sina Gholinejad (aka Sina Ghaaf), 37, and his co-conspirators are said to have breached the computer networks of various organizations in the United States and encrypted files with Robbinhood ransomware to demand Bitcoin ransom payments.

article thumbnail

New warning issued over toll fee scams

Malwarebytes

Over a year ago the FBI warned about what was then a new form of smishing (phishing via SMS) scam: text messages that demanded payment for toll fees. The FTC sent out a similar warning in January, 2025. Then, in April another wave of toll fee scams began doing the rounds. Now the Departments of Motor Vehicles (DMVs) of New York , Florida , and California are warning residents not to fall for the text message scams that try to trick users into clicking a link by telling them they owe a small amou

Scams 99
article thumbnail

LinkedIn is making it easier to understand the full impact of your posts - here's how

Zero Day

The company is adding more granular analytics to help creators better interact with their audience. Here's what's new.

95
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

AlmaLinux OS 10 “Purple Lion” Released: RHEL 10 Compatible with Extended Support

Penetration Testing

The AlmaLinux OS Foundation has officially announced the release of AlmaLinux OS 10, codenamed Purple Lion. This latest The post AlmaLinux OS 10 “Purple Lion” Released: RHEL 10 Compatible with Extended Support appeared first on Daily CyberSecurity.

article thumbnail

I invested in a subscription-less smart ring, and it beat my Oura in several ways

Zero Day

The RingConn Gen 2 offers robust health-tracking features and the longest battery life I've tested on a smart ring.

94
article thumbnail

Mental Denial of Service: Narrative Malware and the Future of Resilience

Security Boulevard

Mental denial of service (DOS) is the manipulative content that hijacks the cognitive processing of individuals and institutions. The post Mental Denial of Service: Narrative Malware and the Future of Resilience appeared first on Security Boulevard.

Malware 98
article thumbnail

Your car's USB port is seriously underutilized: 5 features you're not taking advantage of

Zero Day

Most cars, old and new, have one or more USB ports somewhere onboard. Here's how to make the most of them.

87
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Smashing Security podcast #419: Star Wars, the CIA, and a WhatsApp malware mirage

Graham Cluley

Why is a cute Star Wars fan website now redirecting to the CIA? How come Cambodia has become the world's hotspot for scam call centres? And can a WhatsApp image really drain your bank account with a single download, or is it just a load of hacker hokum? All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Allan Liska.

Scams 83
article thumbnail

Apple Intelligence hasn't lived up to my expectations, but these 3 upgrades could win me back

Zero Day

With WWDC 2025 around the corner, Apple has an opportunity to stage an AI comeback. Here's what it needs to show us.

87
article thumbnail

Arc Browser Development Ceases: Meet Dia, The Browser Company’s New Focus

Penetration Testing

The once-hyped Arc browser has officially ceased development. Its creator, The Browser Company, published a blog post explaining The post Arc Browser Development Ceases: Meet Dia, The Browser Company’s New Focus appeared first on Daily CyberSecurity.

article thumbnail

My favorite USB-C accessory is only $8 but it can save you hundreds in repairs

Zero Day

I've always appreciated these simple accessories, and now they're more useful than ever, especially at this price.

102
102
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!