2/27/2025

Belgium Probes if Chinese Hackers Breached Its Intelligence Service

Chinese Cyber Espionage Jumps 150%, CrowdStrike Finds

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

OpenSSF Publishes Security Framework for Open Source Software

Does Terrible Code Drive You Mad? Wait Until You See What It Does to OpenAI’s GPT-4O

A Disney Worker Downloaded an AI Tool. It Led to a Hack That Ruined His Life.

Hackers Stole this Engineer’s 1Password Database. Could It Happen to You?

Microsoft Names Developers Behind Illicit AI Tools Used in Celebrity Deepfake Scheme

Krebs: U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason”

Suspected Desorden Hacker Arrested for Breaching 90 Organizations

Privacy Tech Firms Warn France’s Encryption and VPN Laws Threaten Privacy

Meta Fixes Error That Exposed Instagram Users to Graphic and Violent Content

Thousands Rescued From Scam Compounds in Myanmar Now Stuck at Thai Border
Philippine Army Confirms Attack on Its Networks

DragonForce Ransomware Hits Saudi Firm, 6TB Data Stolen

FBI Confirms Lazarus Hackers Were Behind $1.5B Bybit Crypto Heist

FBI Urges Crypto Community to Avoid Laundering Funds From Bybit Hack

Winos 4.0 Malware Targets Taiwan With Email Impersonation

Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations

Over 49,000 Misconfigured Building Access Systems Exposed Online

Southern Water Says Black Basta Ransomware Attack Cost £4.5m in Expenses

GrassCall Malware Campaign Drains Crypto Wallets via Fake Job Interviews

New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

Vo1d Malware Botnet Grows to 1.6 Million Android TVs Worldwide

PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices

Nakivo Fixes Critical Flaw in Backup & Replication Tool

Software Vulnerabilities Take Almost Nine Months to Patch

2/26/2025

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

Geopolitical Tension Fuels APT and Hacktivism Surge

NSA Says It Is Investigating Potential Misuse of Chat Platform

Romanian Police Question Pro-Russian Presidential Candidate Following Kremlin Interference

What Apple Pulling Advanced Data Protection Means for You

U.S. Examining Whether UK’s Encryption Demand on Apple Broke Data Treaty

Signal May Exit Sweden If Government Imposes Encryption Backdoor

Cellebrite Cuts off Serbia Over Abuse of Phone-Cracking Software Against Civil Society

99% of Organizations Report API-Related Security Issues

Cybersecurity Budgets Should Reflect Business Risks, Corporate Leaders Say

Startup PsiQuantum Says It is Making Millions of Quantum Computing Chips

OpenAI’s GPT 4.5 Spotted in Android Beta, Launch Imminent
Bybit Declares War on North Korea’s Lazarus Crime-Ring to Regain $1.5B Stolen From Wallet

Lazarus Hacked Bybit via Breached Safe{Wallet} Developer Machine

‘Cyber Incident’ Shuts Down Cleveland Municipal Court for Third Straight Day

Pump.fun X Account Hacked to Promote Scam Governance Token

Yes! Communities (CO) Sends Data Breach Letters Related to December 2024 Incident

EncryptHub Breaches 618 Orgs to Deploy Infostealers, Ransomware

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites

Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music Downloads

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation

VSCode Extensions With 9 Million Installs Pulled over Security Risks

Qualcomm Pledges 8 Years of Security Updates for Android Kit using Its Chips (YMMV)

How APT Naming Conventions Make Us Less Safe

2/25/2025

New Auto-Color Linux Backdoor Targets North American Gov’ts, Universities

Ghostwriter Cyber-Attack Targets Ukrainian, Belarusian Opposition

Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks

A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

Microsoft Invests in Cloud Data Firm Veeam Software to Build AI Products

Only a Fifth of Ransomware Attacks Now Encrypt Data

61% of Hackers Use New Exploit Code Within 48 Hours of Attack

Quarter of Brits Report Deepfake Phone Scams

This Russian Tech Bro Helped Steal $93 Million and Landed in Us Prison. Then Putin Called.

Swedish Authorities Seek Backdoor to Encrypted Messaging Apps

UK Home Office’s New Vulnerability Reporting Mechanism Leaves Researchers Open to Prosecution

Firefox Continues Manifest V2 Support as Chrome Disables MV2 Ad-Blockers

Anthropic’s Claude 3.7 Sonnet Is Here and Results Are Insane
U.S. Drug Testing Firm DISA Says Data Breach Impacts 3.3 Million People

Orange Group Confirms Breach After Hacker Leaks Company Documents

Siberia’s Largest Dairy Plant Reportedly Disrupted With LockBit Variant

GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets

Have I Been Pwned Adds 284M Accounts Stolen by Infostealer Malware

‘OpenAI’ Job Scam Targeted International Workers Through Telegram

FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile

2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT

Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA

MITRE Caldera Security Suite Scores Perfect 10 for Insecurity

Unmanaged Devices: The Overlooked Threat CISOs Must Confront

2/24/2025

Krebs: Trump 2.0 Brings Cuts to Cyber, Consumer Protections

Screens at HUD Display AI Video of Donald Trump Sucking Elon Musk’s Toes

Australia Bans Kaspersky Software Over National Security and Espionage Concerns

Russia Warns Financial Sector of Major IT Service Provider Hack

Google Is Replacing Gmail’s SMS Authentication With QR Codes

Inside the Telegram Groups Doxing Women for Their Facebook Posts

Michigan Man Indicted for Dark Web Credential Fraud

OpenAI Bans ChatGPT Accounts Used by North Korean Hackers
Bybit Offers $140m Bounty to Recover Funds After Mega Crypto-Heist

North Korean Hackers Linked to $1.5 Billion Bybit Crypto Heist

Nuna Baby Essentials (PA) Sends Data Breach Following Recent Cybersecurity Incident

New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer

Botnet Targets Basic Auth in Microsoft 365 Password Spray Attacks

Exploits for Unpatched Parallels Desktop Flaw Give Root on Macs

Essential Addons for Elementor XSS Vulnerability Discovered

2/21-23/2025

Ukrainian Hackers Claim Breach of Russian Loan Company Linked to Putin’s Ex-Wife

Chinese Medical Devices Are in Health Systems Across U.S., and the Government and Hospitals Are Worried

Data Leak Exposes TopSec’s Role in China’s Censorship-as-a-Service Operations

OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns

India’s Haryana State Pollution Control Board Website ‘Hacked’, Plaint Lodged

Apple Pulls Encryption Feature From UK Over Government Spying Demands

Google Cloud Introduces Quantum-Safe Digital Signatures in KMS

The Cybersecurity Talent Shortage: WSJ Readers Dissect the Problem

Pentagon Fast-Tracks ‘Cyber Command 2.0’ Review, Requests Authorities Wish List

Nations Open ‘Data Embassies’ to Protect Critical Info

Top Polish Anti-Corruption Official Resigns Amid Spyware Probe
Bybit Exchange Hacked, Over $1.4 Billion in ETH-Related Tokens Drained

Beware: PayPal “New Address” Feature Abused to Send Phishing Emails

Fake CS2 Tournament Streams Used to Steal Crypto, Steam Accounts

Phoenix Rehabilitation and Nursing Center Announces Third-Party Data Breach at Unnamed Vendor

VectraRx Mail Pharmacy (AZ) Confirms 2024 Data Breach Leaked Sensitive Information Belonging to 109,383 People

Star Solution Services (BC) Provides Notice of Data Breach Affecting Over 27k Individuals

Anne Arundel County (MD) Investigates Cyber Incident Affecting Payment Systems, Origin Unknown

Williamsburg-James City Schools (VA) Recovered From Cyber Attack

SpyLend Android Malware Downloaded 100,000 Times From Google Play

CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks

2/20/2025

Chinese Hackers Use Custom Malware to Spy on U.S. Telecom Networks

China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware

Friedrich Merz Targeted by Pro-Russian Disinformation Before German Vote, Researchers Say

Google Ad-Tech Users Can Target National Security ‘Decision Makers’ and People With Chronic Diseases

Over 330 Million Credentials Compromised by Infostealers

Black Basta Ransomware Gang’s Internal Chat Logs Leak Online

Hacked, Leaked, Exposed: Why You Should Never Use Stalkerware Apps

The Cryptocurrency Scam That Turned a Small Town Against Itself

West Coast Cybersecurity Salaries Outshine Rest of Country

Health Net Federal Services Pays $11M Settlement Over Alleged Cybersecurity Lapses

SEC Replaces Cryptocurrency Fraud Unit With Team Aimed More Broadly at Emerging Tech

When Brand Loyalty Trumps Data Security
Malicious Ads Target Freelance Developers via GitHub

Darcula PhaaS Can Now Auto-Generate Phishing Kits for Any Brand

Ottawa Family Physicians (KS) Notifies Patients of December 2024 Data Breach

UK Healthcare Giant Hcrg Confirms Hack After Ransomware Gang Claims Theft of Sensitive Data

New NailaoLocker Ransomware Used Against EU Healthcare Orgs

Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives

Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes

Critical Flaws in Mongoose Library Expose MongoDB to Data Thieves, Code Execution

Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability

Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability

Apiiro Unveils Free Scanner to Detect Malicious Code Merges

2/19/2025

Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger

Spies Eye AUKUS Nuclear Submarine Secrets, Australia’s Intelligence Chief Warns

Multiple Foreign Intelligence Agencies Plotting to Murder Dissidents in Australia

Hundreds of U.S. Military and Defense Credentials Compromised

Three Ways to Batten Down Executives’ Personal Digital Lives

Microsoft Creates Chip It Says Shows Quantum Computers Are ‘Years, Not Decades’ Away

Sanctioned Entities Fueled $16 Billion in Cryptocurrency Activity Last Year, Report Says
Pegasus Spyware Infections Found on Several Private Sector Phones

CISA and FBI: Ghost Ransomware Breached Orgs in 70 Countries

Australian IVF Clinic Genea Suffers Data Breach Following Cyber Incident

Phishing Attack Hides JavaScript Using Invisible Unicode Trick

WordPress Plugin Vulnerability Exposes 90,000 Sites to Attack

CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List

New WinRAR Version Strips Windows Metadata to Increase Privacy

2/18/2025

Mustang Panda Leverages Microsoft Tools to Bypass Anti-Virus Solutions

Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign

Sen. Ron Wyden Remains Hopeful for Bipartisan Action on Tech, Cyber Issues

SANS Institute Launches AI Cybersecurity Hackathon

It’s Early, But BlackLock is On Track to Be 2025’s Most Prolific Ransomware Group

Krebs: How Phished Data Turns into Apple & Google Wallets

U.S. Newspaper Publisher Uses Linguistic Gymnastics to Avoid Saying Its Outage Was Due to Ransomware

Managed Healthcare Defense Contractor to Pay $11 Million Over Alleged Cyber Failings
Venture Capital Giant Insight Partners Hit by Cyberattack

Evolving Snake Keylogger Variant Targets Windows Users

Cracked Garry’s Mod, BeamNG.Drive Games Infect Gamers with Miners

Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer

Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers

OpenSSH Flaws Expose Systems to Critical Attacks

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

Trend Micro Predicts Increase in Ai-Driven Cyber Threats in 2025

2/17/2025

Italian Websites Targeted by Alleged Pro-Russian Hackers

Sweden’s PM on Recent Suspected Undersea Cable Sabotage: ‘We Don’t Believe Random Things Suddenly Happen Quite Often’

South Korea Suspends Downloads of AI Chatbot DeepSeek

X Now Blocks Signal Contact Links, Flags Them as Malicious

Chase Will Soon Block Zelle Payments to Sellers on Social Media

Estonian Duo Plead Guilty to $577m Crypto Ponzi Scheme

Austrian Ex-Chancellor Kurz’s Cybersecurity Firm Dream Says Reaches $1 Billion Valuation

Google Chrome’s AI-Powered Security Feature Rolls Out to Everyone
Finastra Announces Data Breach Following Discovery of November 2024 Cyberattack

Xactus (PA) Data Breach Letter Confirms 2024 Incident Compromised Individuals’ Social Security Numbers

Innovative Renal Care (TN) Sends Data Breach Letters Following Early 2024 Incident

Included Health (CA) Provides Notice of Data Breach to an Unknown Number of Individuals

Microsoft Detects New XCSSET MacOS Malware Variant

Telegram Used as C2 Channel for New Golang Malware

Microsoft to Remove the Location History Feature in Windows

How Public & Private Sectors Can Better Align Cyber Defense

2/14-16/2025

Russian Hackers Target Microsoft 365 Accounts With Device Code Phishing

Ukraine Warns of Growing AI Use in Russian Cyber-Espionage Operations

Top U.S. Election Security Watchdog Forced to Stop Election Security Work

Open-Source Code Repository Codeberg Says ‘Far-Right Forces’ Are Behind Massive Spam Attacks

RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally

APIs: The Foundation of Modern Software Development Is Under Rising Cyber Attack

This Open Text-To-Speech Model Needs Just Seconds of Audio to Clone Your Voice

Texas Investigating DeepSeek for Violating Data Privacy Law

Police Risk Losing Society’s Trust in Fight Against Cybercrime, Warns Europol Chief

How Banks Can Adapt to the Rising Threat of Financial Crime
Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks

Virginia Attorney General’s Office Hit by Cyber Attack

REMSA Health Experiences Cyberattack, Raising Questions of a Possible Data Breach

PPL Electric Utilities (PA) Breach at Vendor Exposed Some Customer Data

Fillmore County Hospital (NE) Announces Data Breach

PirateFi Game on Steam Caught Installing Password-Stealing Malware

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

SonicWall Firewall Bug Leveraged in Attacks After PoC Exploit Release

PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks

Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls

2/13/2025

China’s Salt Typhoon Spies Are Still Hacking Telecoms—Now by Exploiting Cisco Routers

Russian Seashell Blizzard Enlists Specialist Initial Access Subgroup to Expand Ops

North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks

CISA and FBI Warn Against Buffer Overflow Vulnerabilities

Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners

The Loneliness Epidemic Is a Security Crisis

Krebs: Nearly a Year Later, Mozilla is Still Promoting OneRep

DOGE Hasn’t Accessed Legally Protected Tax Data, Administration Says in Privacy Suit Response

U.S. Lawmakers Press Trump Admin to Oppose UK’s Order for Apple iCloud Backdoor
Chinese Espionage Tools from Emperor Dragonfly Deployed in RA World Ransomware Attack

zkLend Loses $9.5M in Crypto Heist, Asks Hacker to Return 90%

Hacker Leaks Account Data of 12 Million Zacks Investment Users

Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques

FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux

Surge in Attacks Exploiting Old ThinkPHP and ownCloud Flaws

Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software

Buyout Firms Vie for Cybersecurity Firm Trend Micro, Sources Say

Dutch Police Seizes 127 XHost Servers, Dismantles Bulletproof Hoster

2/12/2025

A Hacker Group Within Russia’s Notorious Sandworm Unit Is Breaching Western Networks

BadPilot Network Hacking Campaign Fuels Russian Sandworm Attacks

Russian-Linked Bots Sow Fear, Distrust Ahead of German Vote

U.S. Reportedly Releases Russian Cybercrime Figure Alexander Vinnik in Prisoner Swap

North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack

This Ad-Tech Company Is Powering Surveillance of U.S. Military Personnel

Leaking the Email of Any YouTube User for $10,000

Romance Scams Cost Americans $697.3M Last Year

Serial “Swatter” Behind 375 Violent Hoaxes Targeted His Own Home to Look like a Victim

Trump Plans to Nominate GOP Insider Sean Cairncross as National Cyber Director
Mars Hydro and LG-LED Solutions: Massive IoT Data Breach Exposes 2.7 Billion Records

Sarcoma Ransomware Claims Breach at Giant PCB Maker Unimicron

Ransomware Attack Disrupting Michigan’s Sault Tribe Operations

Heartland Bank (NE) Sends Data Breach Letters Following Recent Email Data Security Incident

Watergate Hotel Hit with Data Breach

Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability

Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions

Ivanti Patches Critical Flaws in Connect Secure and Policy Secure – Update Now

Krebs: Microsoft Patch Tuesday, February 2025 Edition

Is AI a Friend or Foe of Healthcare Security?

2/11/2025

Order Blocking Musk’s DOGE From Treasury Systems Doesn’t Apply to Secretary Bessent, Judge Says

Probe Finds U.S. Coast Guard Has Left Maritime Cybersecurity Adrift

Nick Robinson’s X Account Hacked to Promote Crypto

In Fighting AI Chip Trade War With China, There’s One Big Mistake U.S. Can’t Afford to Make

U.S. Sanctions LockBit Ransomware’s Bulletproof Hosting Provider

The Company Man: Binance Exec Detained in Nigeria Breaks His Silence

Arizona Woman Pleads Guilty to Running Laptop Farm for N. Korean IT Workers, Faces 9-Year Sentence

Cybersecurity Firm SailPoint Sets Sights on $12.6 Billion Valuation in U.S. IPO
Russian Military Hackers Deploy Malicious Windows Activators in Ukraine

PowerSchool Breach Exposed Special Education Status, Mental Health Data and Parent Restraining Orders

Third-Party Data Breach at ArdyssLife Affects an Unknown Number of Consumers

SonicWall Firewall Exploit Lets Hackers Hijack VPN Sessions, Patch Now

Fortinet Warns of New Zero-Day Exploited to Hijack Firewalls

Microsoft February 2025 Patch Tuesday Fixes 4 Zero-Days, 55 Flaws

Linux Running in a PDF? This Hack Is as Bizarre as It Is Brilliant

Data Leaks Happen Most Often in These States — Here’s Why

2/10/2025

Europol Warns Financial Sector of “Imminent” Quantum Threat

The Rise of the Drone Boats

UK Military Fast-Tracks Cybersecurity Recruitment

Experts Dismayed at UK’s Apple Decryption Demands

Congressional Leaders Given Access to Surveillance Court in Bid for More Transparency

New York State Bans DeepSeek From Government Devices

Indiana Man Gets 20 Years for $37m Crypto Heist

Alabama Man Pleads Guilty to SIM Swap Attack on U.S. SEC X Account

All Your 8Base Are Belong to Us: Ransomware Crew Busted in Global Sting

Why Rebooting Your Phone Daily Is Your Best Defense Against Zero-Click Hackers

Brave Now Lets You Inject Custom JavaScript to Tweak Websites

Microsoft Raises Rewards for Copilot AI Bug Bounty Program
Memorial Hospital and Manor (GA) Alerts 120,000 Individuals of Data Breach

U.S. Newspaper Publisher Lee Enterprises Still Struggling to Print Papers a Week After ‘Cybersecurity Event’

Sky ECC Encrypted Service Distributors Arrested in Spain, Netherlands

VectraRx Mail Pharmacy (AZ) Sends Out Data Breach Letters Following December 2024 Cyberattack

BadIIS Malware Exploits IIS Servers for SEO Fraud

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores

XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells

Over 12,000 KerioControl Firewalls Exposed to Exploited RCE Flaw

Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities

Apple Releases Security Updates to Block iPhone Passcode Hacking Tools, Again

2/7-9/2025

Krebs: Teen on Musk’s DOGE Team Graduated from ‘The Com’

States Prepare Privacy Lawsuit Against DOGE Over Access to Federal Data

reCAPTCHA: 819 Million Hours of Wasted Human Time and Billions of Dollars in Google Profits

Cloudflare Outage Caused by Botched Blocking of Phishing URL

Microsoft Shares Workaround for Windows Security Update Issues

Apple Ordered to Open Encrypted User Accounts Globally to UK Spying

One of Tax Return Filing Season’s Biggest Financial Risks Isn’t an IRS Audit

India’s RBI Introduces Exclusive “bank.in” Domain to Combat Digital Banking Fraud
HPE Notifies Employees of Data Breach After Russian Office 365 Hack

Hospital Sisters Health System Notifies 882,000 Patients of August 2023 Breach

Phones, Email, Classes Disrupted in University of the Bahamas Ransomware Attack

Massive Brute Force Attack Uses 2.8 Million IPs to Target VPN Devices

Malicious AI Models on Hugging Face Exploit Novel Attack Technique

Cybercriminals Weaponize Graphics Files in Phishing Attacks

Hackers Exploit Cityworks RCE Bug to Breach Microsoft IIS Servers

CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability

2/6/2025

Russia Uses Messaging Apps to Recruit Terrorists, Ukraine’s Police Says

North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials

Federal Judge Tightens DOGE Leash Over Critical Treasury Payment System Access

Krebs: Experts Flag Security, Privacy Risks in DeepSeek AI App

DeepSeek iOS App Sends Data Unencrypted to ByteDance-Controlled Servers

Spyware Firm Paragon Solutions Cuts Italy Access After Alleged Targeting of Activists

Semgrep Raises $100 Million to Develop Bug-Hunting Software

New UK Cyber Monitoring Centre Introduces ‘Richter Scale’ for Cyber-Attacks

Europol Cracks Down on Global Child Abuse Network “The Com”

Lawsuit Against Automatic License Plate Reader Cameras Can Move Forward, Judge Says
British Engineering Firm IMI Discloses Breach, Shares No Details

Data Breach at Bankers Cooperative Group (NJ) Impacts Employees of 21 Companies

DDoS Attacks Reportedly Behind DayZ and Arma Network Outages

Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking

Hackers Exploit SimpleHelp RMM Flaws to Deploy Sliver Malware

SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images

Microsoft Says Attackers Use Exposed ASP.NET Keys to Deploy Malware

WordPress ASE Plugin Vulnerability Threatens Site Security

Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc

Critical RCE Bug in Microsoft Outlook Now Exploited in Attacks

New Microsoft Script Updates Windows Media With Bootkit Malware Fixes

2/5/2025

Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign

iOS App Store Apps With Screenshot-Reading Malware Found for the First Time

Despite Catastrophic Hacks, Ransomware Payments Dropped Dramatically Last Year

Following Law Enforcement Disruptions

As Victims Refused to Pay Hackers

Cybercriminals Eye DeepSeek, Alibaba LLMs for Malware Development

Robocallers Posing as FCC Fraud Prevention Team Call FCC Staff

Hackers Spoof Microsoft ADFS Login Pages to Steal Credentials

Spain Arrests Suspected Hacker of U.S. and Spanish Military Agencies

Google Says Commercial Quantum Computing Applications Arriving Within Five Years

NSA Employees Offered Deferred Resignation, Early Retirement

DOGE Latest: Citrix Supremo Has ‘Read-Only’ Access to U.S. Treasury Payment System
Sophisticated Phishing Campaign Targets Ukraine’s Largest Bank

Mobile Malware Targeting Indian Banks Exposes 50,000 Users

Thousands of McKinney, TX Residents Impacted by October Data Breach

KraftCPAs (TN) Experiences Apparent Cyberattack Leading to Data Breach

Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts

AsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacks

Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks

New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack

CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25

Researchers Warn of Risks Tied to Abandoned Cloud Storage Buckets

Thailand Cuts Power Supply to Myanmar Scam Hubs

2/4/2025

North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS

Chinese Cyberspies Use New SSH Backdoor in Network Device Hacks

Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections

Cyberattack on NHS Causes Hospitals to Miss Cancer Care Targets

Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden

Krebs: Who’s Behind the Seized Forums ‘Cracked’ & ‘Nulled’?

California Man Steals $50 Million Using Fake Investment Sites, Gets 7 Years

DeepSeek’s Breakthrough Emboldens Open-Source AI Models Like Meta’s Llama

Taiwan Bans DeepSeek AI Over National Security Concerns, Citing Data Leakage Risks

Cyber Agencies Share Security Guidance for Network Edge Devices
Grubhub Security Breach Compromises Customer and Driver Data

Russian Cyber Research Companies Post Alerts About Infostealer, Industrial Threats

DaggerFly-Linked Linux Malware Targets Network Appliances

Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access

AMD SEV-SNP Vulnerability Allows Malicious Microcode Injection with Admin Access

Microsoft SharePoint Connector Flaw Could’ve Enabled Credential Theft Across Power Platform

Microsoft Patches Critical Azure AI Face Service Vulnerability with CVSS 9.9 Score

Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104

Netgear Warns Users to Patch Critical WiFi Router Vulnerabilities

Zyxel Won’t Patch Newly Exploited Flaws in End-Of-Life Routers

2/3/2025

Russian Hackers Suspected of Compromising British PM’s Personal Email Account

High-profile X Accounts Targeted in Phishing Campaign

DeepSeek AI Tools Impersonated by Infostealer Malware on PyPi

768 CVEs Exploited in the Wild in 2024

Ransomware Groups Weathered Raids, Profited in 2024

Canadian Charged With Stealing $65 Million Using DeFi Crypto Exploits

TSA’s Airport Facial-Recog Tech Faces Audit Probe

Sweden Releases Suspected Ship, Says Cable Break ‘Clearly’ Not Sabotage
Casio UK Online Store Hacked to Steal Customer Credit Cards

Yazoo Valley Electric Power Association (MS) Warns 20,000 Residents of Data Breach

Coyote Malware Expands Reach: Now Targets 1,030 Sites and 73 Financial Institutions

Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware

Google Fixes Android Kernel Zero-Day Exploited in Attacks

Amazon Redshift Gets New Default Settings to Prevent Data Breaches

Proactive Vulnerability Management for Engineering Success

1/31-2/2/2025

Backdoor Found in Two Healthcare Patient Monitors, Linked to IP in China

Musk Aides Lock Workers Out of OPM Computer Systems

CISA Employees Told They Are Exempt From Federal Worker Resignation Program

WhatsApp Disrupts Spyware Campaign Targeting Journalists

Krebs: FBI, Dutch Police Disrupt ‘Manipulaters’ Phishing Gang

Gilmore Girls Fans Nabbed as Eurocops Dismantle Two Major Cybercrime Forums: Nulled & Cracked

Former Polish Justice Minister Arrested in Sprawling Spyware Probe

KuCoin to Pay Nearly $300 Million in Penalties After Guilty Plea

DeepSeek’s Safety Guardrails Failed Every Test Researchers Threw at Its AI Chatbot
Tata Technologies Hit by Ransomware Attack

Community Health Center (CT) Data Breach Impacts 1 Million Patients

Globe Life Data Breach May Impact an Additional 850,000 Clients

Mizuno USA Says Hackers Stayed in Its Network for Two Months

BeyondTrust Zero-Day Breach Exposed 17 SaaS Customers via Compromised API Key

Hackers Use Fake Wedding Invitations to Spread Android Malware in Southeast Asia

Threat Actors Target Public-Facing Apps for Initial Access

Broadcom Patches VMware Aria Flaws – Exploits May Lead to Credential Theft

PyPi Adds Project Archiving System to Stop Malicious Updates

Chinese AI App DeepSeek Was Downloaded by Millions. Deleting It Might Come Next