4/30/2025

Chinese Hackers TheWizards Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool

Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks

Apple Notifies New Victims of Spyware Attacks Across the World

AI Code Hallucinations Increase the Risk of ‘Package Confusion’ Attacks

Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure Code

SolarWinds Security Chief Tim Brown Hopes the SEC Will Dismiss Charges

Indian Court Orders Action to Block Proton Mail Over AI Deepfake Abuse Allegations

Leaders of Global Online Extortion and Exploitation Group 764 Charged

Maryland Man Pleads Guilty to Outsourcing U.S. Gov’t Work to North Korean Dev in China
UK Retailer Co-op Confirms Hack, Reports “Small Impact” to Its Systems

Ascension Discloses New Data Breach After Third-Party Hacking Incident

Commvault Says Recent Breach Didn’t Impact Customer Backup Data

Japanese Global Logistics Company Kintetsu World Express Confirms Ransomware Attack

FBI Shares Massive List of 42,000 LabHost Phishing Domains

DarkWatchman Cybercrime Malware Returns on Russian Networks

RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control

Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

SonicWall: SMA100 VPN Vulnerabilities Now Exploited in Attacks

4/29/2025

France Accuses Russian Intelligence of Repeated Cyber Attacks Since 2021

France Ties Russian APT28 Hackers to 12 Cyberattacks on French Orgs

SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients

China Now America’s Number One Cyber Threat – U.S. Must Get Up to Speed

UK Officials Warn Lawmakers of ‘Turbulence’ at U.S. Cyber Agencies, but Say Partnership Will Prevail

U.S. Critical Infrastructure Still Struggles With OT Security

Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products

AirPlay Security Flaws Could Help Hackers Spread Malware on Your Network

WhatsApp Is Walking a Tightrope Between AI Features and Privacy

Risks of Using AI Models Developed by Competing Nations

Grinex Exchange Suspected Rebrand of Sanctioned Garantex Crypto Firm
Ukraine’s Largest Home Improvement Retailer Epicentr Disrupted by Cyberattack

Nova Scotia Energy Provider Takes Some Servers Offline Following Cyber Incident

SK Telecom Cyberattack: Free SIM Replacements for 25 Million Customers

Britain’s M&S Says Cyber Attack Has Hit Food Availability in Some Stores

Ransomware Attack Forces Shutdown of DuPage County Sheriff’s Office, Courthouse Computer Systems

Phorpiex Botnet Delivers LockBit Ransomware with Automated Tactics

New Gremlin Infostealer Distributed on Telegram

New WordPress Malware Masquerades as Plugin

Hackers Ramp up Scans for Leaked Git Tokens and Secrets

CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database

Microsoft: Windows Server Hotpatching to Require Subscription

4/28/2025

Uyghur Diaspora Group Targeted with Remote Surveillance Malware

Iran Repelled Large Cyber Attack on Sunday

Donald Trump: “I Would Frankly Tell These People Not to Use Signal”

Car Subscription Features Raise Your Risk of Government Surveillance, Police Records Show

iOS and Android Juice Jacking Defenses Have Been Trivial to Bypass for Years

Half of Mobile Devices Run Outdated Operating Systems

Deep-Pocketed Investors Make Startups a Target for Hackers

Palo Alto Networks Acquiring Protect AI to Boost Artificial Intelligence Tools

Cybersecurity CEO Accused of Running Malware on Hospital PC Blabs About It on LinkedIn

Government Set to Ban SIM Farms in European First

Cloudflare Mitigates Record Number of DDoS Attacks in 2025
Ukrainian State and Banking Services Restored After Data Center Outage

Hitachi Vantara Takes Servers Offline After Akira Ransomware Attack

Marks & Spencer Breach Linked to Scattered Spider Ransomware Attack

Media Firm Urban One Confirms Data Breach After Cybercriminals Claim February Attack

VeriSource Now Says February Data Breach Impacts 4 Million People

Portugal’s REN Says No Sign Blackout Caused by Cyberattack

Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools

Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised

Kali Linux Warns of Update Failures After Losing Repo Signing Key

How to Survive as a CISO aka ‘Chief Scapegoat Officer’

4/25-27/2025

FBI Seeks Help to Unmask Salt Typhoon Hackers Behind Telecom Breaches

Ex-CISA Boss Chris Krebs Says Trump Actions Risk ‘Dangerously Degrading’ U.S. Cyber Defenses

Easterly Calls for United Front Against ‘Politicizing’ of the Cyber Industry

Security Experts Flag Chrome Extension Using AI Engine to Act Without User Input

Popular LLMs Found to Produce Vulnerable Code by Default

Sam Altman: AI Privacy Safeguards Can’t Be Established Before ‘Problems Emerge’

Receiving Odd Texts for Someone Else? Rise of ‘Wrong Number’ Messages Is New Payday for Scammers

Coinbase Fixes 2FA Log Error Making People Think They Were Hacked

Brave’s Cookiecrumbler Tool Taps Community to Help Block Cookie Notices

Windows “Inetpub” Security Fix Can Be Abused to Block Future Updates

Ex-Disney Worker Who Hacked Menus Gets 3 Years in Prison
Mobile Provider MTN Says Cyberattack Compromised Customer Data

Marks & Spencer Pauses Online Orders After Cyberattack

Nearly 500,000 Impacted by 2023 Cyberattack on Long Beach, California

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

DragonForce Expands Ransomware Model With White-Label Branding Scheme

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

WooCommerce Admins Targeted by Fake Security Patches That Hijack Sites

DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks

Hackers Abuse OAuth 2.0 Workflows to Hijack Microsoft 365 Accounts

Craft CMS RCE Exploit Chain Used in Zero-Day Attacks to Steal Data

SAP Fixes Critical Vulnerability After Evidence of Exploitation

4/24/2025

North Korean Cyber Spies Created U.S. Firms, and Blocknovas and Softglide, to Dupe Crypto Developers

Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle Malware

Verizon DBIR: Small Businesses Bearing the Brunt of Ransomware Attacks

Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

Gmail’s New Encrypted Messages Feature Opens a Door for Scams

South Korea Says DeepSeek Transferred User Data to China and the U.S. Without Consent

UK Bans Export of Video Game Controllers to Russia to Hinder Attack Drone Pilots
Cyberattack Hits Drinking Water Supplier in Spanish Town Near Barcelona

SSNs and More on 5.5M+ Patients Feared Stolen From Yale Health

Frederick Health Data Breach Impacts Nearly 1 Million Patients

Interlock Ransomware Claims DaVita Attack, Leaks Stolen Data

ELENOR-corp Ransomware Targets Healthcare Sector

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Highest-Risk Security Flaw Found in Commvault Backup Solutions

Navigating Regulatory Shifts & AI Risks

4/23/2025

FTC’s Holyoak Says Agency Will Avoid ‘Excessive Regulation’ of AI Development

Cloudflare: Government-Backed Internet Shutdowns Plummet to Zero in First Quarter

FBI Reveals “Staggering” $16.6bn Lost to Cybercrime in 2024

Ransomware Gangs Innovate With New Affiliate Models

Verizon’s DBIR Reveals 34% Jump in Vulnerability Exploitation

Vulnerability Exploitation and Credential Theft Now Top Initial Access Vectors

Krebs: DOGE Worker’s Code Supports NLRB Whistleblower

The Tech That Safeguards the Conclave’s Secrecy

WhatsApp Now Lets You Block People From Exporting Your Entire Chat History

Google Drops Cookie Prompt in Chrome, Adds IP Protection to Incognito

Cybersecurity Startup Chainguard Almost Triples Valuation to $3.5 Billion After Fundraise
Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices

Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp

DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack

Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign

Blue Shield of California Leaked Health Data of 4.7 Million Members to Google

Thousands of Baltimore Students, Teachers Affected by Data Breach Following February Ransomware Attack

Active! Mail RCE Flaw Exploited in Attacks on Japanese Orgs

ASUS Releases Fix for AMI Bug that Lets Hackers Brick Servers

The Foundations of a Resilient Cyber Workforce

EU Fines Apple €500 Million and Meta €200 Million for Breaking Digital Market Rules

4/22/2025

Russia Is Ramping up Hybrid Attacks Against Europe, Dutch Intelligence Says

Billbug Espionage Group Deploys New Tools in Southeast Asia

Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware

Whistleblower: DOGE Siphoned NLRB Case Data (Krebs)

DeepSeek Breach Opens Floodgates to Dark Web

Microsoft Reports 92% Adoption Rate for Phishing-Resistant MFA Among Corporate Users

Beware of Video Call Links That Are Attempts to Steal Microsoft 365 Access, Researchers Tell NGOs

RIP, Google Privacy Sandbox
SK Telecom Warns Customer USIM Data Exposed in Malware Attack

Marks & Spencer Confirms Cybersecurity Incident Amid Ongoing Disruption

Ripple’s Recommended XRP Library xrpl.js Hacked to Steal Wallets

New Cryptojacking Malware Targets Docker with Novel Mining Technique

Cookie-Bite Attack PoC Uses Chrome Extension to Steal Session Tokens

GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages

Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach

4/21/2025

Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan

Today’s LLMs Craft Exploits From Patches at Lightning Speed

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

How to Protect Yourself From Phone Searches at the U.S. Border

Southeast Asian Cyber Fraud Industry at ‘Inflection Point’ as It Expands Globally

Two Top Cyber Officials Resign From CISA
Abilene (TX) Takes Systems Offline After Cyberattack

‘Fog’ Hackers Troll Victims With DOGE Ransom Notes

‘Elusive Comet’ Attackers Use Zoom to Swindle Victims

Japan Warns of Hundreds of Millions of Dollars in Unauthorized Trades From Hacked Accounts

WordPress Ad-Fraud Plugins Generated 1.4 Billion Ad Requests per Day

Microsoft Entra Account Lockouts Caused by User Token Logging Mishap

4/18-20/2025

U.S. Will Keep Helping Taiwan in Its Self-Defence, Senator Says in Taipei

Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States

Dems Fret Over Doge Feeding Sensitive Data Into Random AI

ICE Is Paying Palantir $30 Million to Build ‘Immigrationos’ Surveillance Platform

Chase Is Suing More Customers for Stealing Money Last Year Using the Viral TikTok ‘Money Hack’

Airport Retailer Paradies Shops Agrees to $6.9 Million Settlement Over Ransomware Data Breach

Could Ransomware Survive Without Cryptocurrency?

Alleged SmokeLoader Malware Operator Facing Federal Charges in Vermont

Trump Is Shifting Cybersecurity to the States, but Many Aren’t Prepared

If Boards Don’t Fix Operational Technology (OT) Security, Regulators Will
Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader

Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT

New Android Malware Steals Your Credit Cards for NFC Relay Attacks

New Payment-Card Scam Involves a Phone Call, Some Malware and a Personal Tap

Phishers Abuse Google OAuth to Spoof Google in DKIM Replay Attack

Interlock Ransomware Gang Pushes Fake IT Tools in ClickFix Attacks

CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download

Critical Erlang/OTP SSH RCE Bug Now Has Public Exploits, Patch Now

ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware

Widespread Microsoft Entra Lockouts Tied to New Security Feature Rollout

4/17/2025

Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns

Network Edge Devices the Biggest Entry Point for Attacks on SMBs

Senators Urge Cyber-Threat Sharing Law Extension Before Deadline

This ‘College Protester’ Isn’t Real. It’s an AI-Powered Undercover Bot for Cops

Stormont Asks Cyber Security Police to Investigate Fake Rates Website

New Jersey Sues Discord for Allegedly Failing to Protect Children

Cybersecurity Startup Exaforce Raises $75 Million

Airport Retailer Agrees to $6.9 Million Settlement Over Ransomware Data Breach
Entertainment Services Giant Legends International Discloses Data Breach

Ahold Delhaize Confirms Data Theft After INC Ransomware Claims Attack

Mayor of Fall River (MA) Confirms School System Was Hit with a Ransomware Attack

Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers

NTLM Hash Exploit Targets Poland and Romania Days After Patch

Chrome Extensions With 6 Million Installs Have Hidden Tracking Code

CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices

Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution

Cybersecurity by Design: When Humans Meet Technology

4/16/2025

Brian Krebs: Funding Expires for Key Cyber Vulnerability Database

Trump Administration Decides to Fund CVE Cybersecurity Tracker After All

Last-Minute Funding Uncertainty for Key Cyber Program Spooks Industry

Former Trump Official Chris Krebs Targeted With Government Probe Vows to Fight

Ex-CISA Chief Chris Krebs Leaving SentinelOne Following Trump Pressure

Google Blocked 5.1B Harmful Ads and Suspended 39.2M Advertiser Accounts in 2024

92% of Mobile Apps Found to Use Insecure Cryptographic Methods

Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users

Chinese Firm Tied to Uyghur Rights Abuses Now Training Tibet Police on Hacking Techniques
China-Backed Hackers Exploit BRICKSTORM Backdoor to Spy on European Businesses

Researchers Uncover Social Media Harassment Campaign Targeting Thai Dissidents Since 2020

Jira Down: Atlassian Users Experiencing Degraded Performance

CISA Warns of Potential Data Breaches Caused by Legacy Oracle Cloud Leak

Gamma AI Platform Abused in Phishing Chain to Spoof Microsoft SharePoint Logins

New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks

Over 16,000 Fortinet Devices Compromised With Symlink Backdoor

New Windows Task Scheduler Bugs Let Attackers Bypass UAC and Tamper with Logs

Apple Fixes Two Zero-Days Exploited in Targeted iPhone Attacks

4/15/2025

China Names Alleged U.S. Snoops Over Asian Winter Games Attacks

Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool

Trade War Raises Cyber Stakes With China

The CVE Program for Tracking Security Flaws Is About to Lose Federal Funding

EU Confirms Issuing ‘Burner Phones’ to Top Officials but Denies Practice Caused by Trump

Krebs: Trump Revenge Tour Targets Cyber Leaders, Elections

Bot Traffic Overtakes Human Activity as Threat Actors Turn to AI

ChatGPT 4.1 Early Benchmarks Compared Against Google Gemini

Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds

Android Phones Will Soon Reboot if They’re Locked for a Few Days

LabHost Phishing Mastermind Sentenced to 8.5 Years
4Chan’s ‘Cesspool of the Internet’ Is Down After Apparently Being Hacked

Suspected 4Chan Hack Could Expose Longtime, Anonymous Admins

Federal Employee Alleges DOGE Activity Resulted in Data Breach at Labor Board

Landmark Admin Data Breach Impact Now Reaches 1.6 Million People

Midnight Blizzard Deploys New Grapeloader Malware in Embassy Phishing

North Korean Hackers Exploit LinkedIn to Infect Crypto Developers with Infostealers

Malicious PyPI Package Targets MEXC Trading API to Steal Credentials and Redirect Orders

Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability

Microsoft Blocks ActiveX by Default in Microsoft 365, Office 2024

Are We Prioritizing the Wrong Security Metrics?

4/14/2025

Taiwan Charges Chinese Ship Captain With Breaking Subsea Cables

Chinese Police Ensnaring Tibetans Over Phone and Internet Activity, Human Rights Watch Says

The Most Dangerous Hackers You’ve Never Heard Of

TraderTraitor: The Kings of the Crypto Heist

Prodaft Offers “No Judgment” Deal to Buy Dark Web Accounts from Cybercrime Forum Users

U.S. Blocks Foreign Governments from Acquiring Citizen Data

Meta to Resume AI Training on Content Shared by Europeans

OpenAI’s GPT-4.1, 4.1 nano, and 4.1 mini Models Release Imminent

Hackers Using AI-Produced Audio to Impersonate Tax Preparers, IRS

Silicon Valley Crosswalk Buttons Hacked to Imitate Musk, Zuckerberg’s Voices
Dialysis Firm DaVita Hit by Ransomware Attack, Says Patient Care Continues

Hertz Says Customers’ Personal Data and Driver’s Licenses Stolen in Data Breach

Insurance Firm Lemonade Says Breach Exposed Driver’s License Numbers

Govtech Giant Conduent Confirms Client Data Stolen in January Cyberattack

Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT

New Malware ResolverRAT Targets Healthcare and Pharma Sectors

That Groan You Hear Is Users’ Reaction to Recall Going back Into Windows

New SSL/TLS Cert to Live No Longer Than 47 Days by 2029

40 More Student Athletes Sue Against University of Michigan After Matt Weiss Cyber Hack

4/11-13/2025

In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks

Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors

Google Cloud: China Achieves “Cyber Superpower” Status

LLMs Can’t Stop Making up Software Dependencies and Sabotaging Everything

Leak Confirms OpenAI’s GPT 4.1 is Coming Before GPT 5.0

Google’s AI Video Generator Veo 2 Is Rolling out on AI Studio

Tycoon2FA Phishing Kit Targets Microsoft 365 with New Tricks

Microsoft Defender Will Isolate Undiscovered Endpoints to Block Attacks

UnitedHealth Group Sends Demands for Hack Loan Repayments

Why Data Privacy Isn’t the Same as Data Security

Ten Things to Know about the European Union’s New Product Liability Directive

NVD Revamps Operations as Vulnerability Reporting Surges
Morocco Investigates Major Data Breach Allegedly by Algerian Hackers

Laboratory Services Cooperative Exposed Health Data of 1.6 Million People

Western Sydney University Discloses Security Breaches, Data Leak

Ransomware Attack Cost IKEA Operator in Eastern Europe $23 Million

Researchers Warn About ‘Goffee’ Spilling Onto Russian Flash Drives

SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps

Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

Cyble Urges Critical Vulnerability Fixes Affecting Industrial Systems

Chrome 136 Fixes 20-Year Browser History Privacy Risk

Microsoft: Windows ‘Inetpub’ Folder Created by Security Fix, Don’t Delete

4/10/2025

Gamaredon Uses Infected Removable Drives to Breach Western Military Mission in Ukraine

Infosec Experts Fear China Could Retaliate Against Tariffs With a Typhoon Attack

Krebs: China-based SMS Phishing Triad Pivots to Banks

Cybersecurity Industry Falls Silent as Trump Turns Ire on SentinelOne

Trump Administration Planning Major Workforce Cuts at CISA

Spyware Maker NSO Group Is Paving a Path Back Into Trump’s America

Operation Endgame Continues with Smokeloader Customer Arrests

OpenAI Wants ChatGPT to ‘Know You Over Your Life’ With New Memory Update

ChatGPT’s o4-mini, o4-mini-high and o3 Spotted Ahead of Release

Sweden Arrests Senior Uyghur Representative on Suspicion of Spying for China
U.S. Sensor Giant Sensata Admits Ransomware Derailed Ops

Oregon’s Environmental Agency Shuts Down Network After Cyberattack

South African Telecom Provider Cell C Serving 7.7 Million Confirms Data Leak Following Cyberattack

90 Degree Benefits (AL) Provides Notice of Data Breach

New TCESB Malware Found in Active Attacks Exploiting ESET Security Scanner

SpyNote Malware Targets Android Users with Fake Google Play Pages

Malicious npm Package Targets Atomic Wallet, Exodus Users by Swapping Crypto Addresses

Hackers Exploit WordPress Plugin Auth Bypass Hours After Disclosure

Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes

Using Post-Quantum Planning to Improve Security Hygiene

4/9/2025

Western Intelligence Agencies Warn Spyware Threat Targeting Taiwan, Tibetan Rights Advocates

U.S. Senator Wyden Announces Hold on Trump Cyber Nominee, Citing Telecom ‘Cover-Up’

Precision-Validated Phishing Elevates Credential Theft Risks

Ransomware Attacks Hit All-Time High as Payoffs Dwindle

Explosive Growth of Non-Human Identities Creating Massive Security Blind Spots

OpenAI Helps Spammers Plaster 80,000 Sites With Messages That Bypassed Filters

Police Detains Smokeloader Malware Customers, Seizes Servers

Data Privacy Regulators Lobby Lawmakers to Not Draft Federal Legislation Preempting State Laws

As Spyware Market Continues to Expand, Diplomatic Pall Mall Process Hits a Pivot Point
Ukraine’s Railways Restore Half of IT Services Hit by Cyber Attack So Far

Germany Links Cyberattack on Research Group to Russian State-Backed APT29 Hackers

Oracle Says “Obsolete Servers” Hacked, Denies Cloud Breach

Hackers Target SSRF Bugs in EC2-Hosted Sites to Steal AWS Credentials

PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware

CISA Warns of CentreStack’s Hard-Coded MachineKey Vulnerability Enabling RCE Attacks

Adobe Patches 11 Critical ColdFusion Flaws Amid 30 Total Vulnerabilities Discovered

Krebs: Patch Tuesday, April 2025 Edition

Google Takes on Cursor With Firebase Studio, Its AI Builder for Vibe Coding

4/8/2025

U.S. Financial Regulator Office of the Comptroller of the Currency (OCC) Says Email Hack Exposed Sensitive Data on Banks

Hackers Lurked in Treasury OCC’s Systems Since June 2023 Breach

Canada Says China-Linked Information Campaign Spreading False Narratives About Prime Minister

To Tackle Espionage, Dutch Government Plans to Screen University Students and Researchers

UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine

Scattered Spider Stops the Rickrolls, Starts the RAT Race

Don’t Open that JPEG in WhatsApp for Windows. It Might Be An .EXE

WhatsApp Flaw Can Let Attackers Run Malicious Code on Windows PCs

Musk’s DOGE Using AI to Snoop on U.S. Federal Workers, Sources Say

EncryptHub’s Dual Life: Cybercriminal vs Windows Bug-Bounty Researcher
Czech Prime Minister Says His X Account Was Hacked ‘From Abroad’

Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software Listings

Veristat Files Notice of Data Breach Affecting Consumers’ Social Security Numbers

New Mirai Botnet Behind Surge in TVT DVR Exploitation

Fortinet Urges FortiSwitch Upgrades to Patch Critical Admin Password Change Flaw

Amazon EC2 SSM Agent Flaw Patched After Privilege Escalation via Path Traversal

AWS Rolls Out ML-KEM to Secure TLS From Quantum Threats

CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation

Microsoft: Windows CLFS Zero-Day Exploited by Ransomware Gang

Microsoft April 2025 Patch Tuesday Fixes Exploited Zero-Day, 134 Flaws

NIST Defers Pre-2018 CVEs to Tackle Growing Vulnerability Backlog

4/7/2025

Public Officials Separate Workplace and Personal Online Lives. Hackers Don’t Care.

Darknet’s Xanthorox AI Offers Customizable Tools for Hackers

UK Loses Bid to Keep Apple Appeal Against Demand for iPhone ‘Backdoor’ a Secret

Alleged Scattered Spider SIM-Swapper Must Pay back $13.2m to 59 Victims

Six Arrested for AI-Powered Investment Scams That Stole $20 Million

Australian Regulator Pulls Licenses of 95 Companies in Effort to Crack Down on Investment Scams

Russia Arrests CEO of Tech Company Linked to Doppelgänger Disinformation Campaign
Hackers Are Pretending to Be Drone Companies and State Agencies to Spy on Ukrainian Victims

Someone Hacked Ransomware Gang Everest’s Leak Site

Food Giant WK Kellogg Discloses Data Breach Linked to Clop Ransomware

Flaw in ESET Security Software Used to Spread Malware From ToddyCat Group

Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign

Windows 11 24H2 Blocked on PCs with Code-Obfuscation Driver BSODs

Google Fixes Android Zero-Days Exploited in Attacks, 60 Other Flaws

4/4-6/2025

North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages

NSA Director Fired After Trump’s Meeting With Right-Wing Influencer Laura Loomer

Krebs: Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe

Maryland Pharmacist Used Keyloggers to Spy on Coworkers for a Decade, Victim Alleges

Russia Jails Hacker for Two Years Over Cyberattack on Local Tech Company

Toll Payment Text Scam Returns in Massive Phishing Wave

Coinbase to Fix 2FA Account Activity Entry Freaking Out Users

For Bitcoin Bulls Who Self-Custody Crypto, the Global Risks Are Growing

Alan Turing Institute: UK Can’t Handle a Fight Against AI-Enabled Crims

OpenAI Tests Watermarking for ChatGPT-4O Image Generation Model
Hackers Strike Australia’s Largest Pension Funds in Coordinated Attacks

Europcar GitLab Breach Exposes Data of up to 200,000 Customers

Port of Seattle Says Ransomware Breach Impacts 90,000 People

Life University Confirms Data Breach Following July 2024 Cybersecurity Incident

LiUNA Announces Data Breach Following Confirmed Ransomware Attack

PoisonSeed Phishing Campaign Behind Emails With Wallet Seed Phrases

Malicious Python Packages on PyPI Downloaded 39,000+ Times, Steal Sensitive Data

Tj-actions Supply Chain Attack Traced Back to Single GitHub Token Compromise

WinRAR Flaw Bypasses Windows Mark of the Web Security Alerts

Microsoft Credits EncryptHub, Hacker Behind 618+ Breaches, for Disclosing Windows Flaws

4/3/2025

Hackers Hit Ukrainian State Agencies, Critical Infrastructure With New ‘Wrecksteel’ Malware

Poland’s Prime Minister Says Cyberattack Targeted His Party as Election Nears

Suspected Chinese Spies Right Now Hijacking Buggy Ivanti Gear – For Third Time in 3 Years

Why Is Someone Mass-Scanning Juniper and Palo Alto Networks Products?

Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware

Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware

Amateur Hacker ‘Coquettte’ Leverages Russian Bulletproof Hosting Server Proton66 to Spread Malware

Microsoft at 50: Its Incredible Rise, 15 Lost Years, and Stunning Comeback – In 4 Charts
Texas State Bar Warns of Data Breach After INC Ransomware Claims Attack

Oracle Privately Confirms Cloud Breach to Customers

Sensitive Data Breached in Highline Schools Ransomware Incident

Hunters International Shifts From Ransomware to Pure Data Extortion

Hacker Claims Twilio’s SendGrid Data Breach, Selling 848,000 Records

U.S., Australia, Canada Warn of ‘Fast Flux’ Scheme Used by Ransomware Gangs

CISA Warns of Fast Flux DNS Evasion Used by Cybercrime Gangs

Recent GitHub Supply Chain Attack Traced to Leaked Spotbugs Token

Max Severity RCE Flaw Discovered in Widely Used Apache Parquet

Google Patches Quick Share Vulnerability Enabling Silent File Transfers Without Consent

4/2/2025

Waltz and Staff Used Gmail for Government Communications, Officials Say

Cybersecurity Professor Xiaofeng Wang Faced China-Funding Inquiry Before Disappearing, Sources Say

Cybersecurity Professor Targeted by FBI Has Not Been Detained, Lawyer Says

Crimelords at Hunters International Tell Lackeys Ransomware Too ‘Risky’

GitHub Expands Security Tools After 39 Million Secrets Leaked in 2024

Microsoft Adds Hotpatching Support to Windows 11 Enterprise

Gray Bots Surge as Generative AI Scraper Activity Increases

ChatGPT Is Down Worldwide With Something Went Wrong Error

OpenAI Backs Deepfake Cybersecurity Startup Adaptive Security in New Funding Round

Genetic Data Site OpenSNP to Close and Delete Data Over Privacy Concerns

Police Shuts Down KidFlix Child Sexual Exploitation Platform
Royal Mail Investigates Data Breach Affecting Supplier

Verizon Call Filter API Flaw Exposed Customers’ Incoming Call History

Native Tribe in Minnesota Says Cyber Incident Knocked Out Healthcare, Casino Systems

The Siegel Group Announces Data Breach Following Early 2025 Cyberattack

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth

Cisco Warns of CSLU Backdoor Admin Account Used in Attacks

Stripe API Skimming Campaign Unveils New Techniques for Theft

Counterfeit Android Devices Found Preloaded With Triada Malware

Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse

4/1/2025

North Korean IT Worker Army Expands Operations in Europe

Someone Is Trying to Recruit Security Researchers in Bizarre Hacking Campaign

China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions

European Commission Takes Aim at End-To-End Encryption and Proposes Europol Become an EU FBI

Google to Switch on E2EE for All Gmail Users

OpenAI says Deep Research is Coming to ChatGPT Free “Very Soon”

Microsoft to Mark Five Decades of Ctrl-Alt-Deleting the Competition

New Windows 11 Trick Lets You Bypass Microsoft Account Requirement
Ukraine Blames Russia for Railway Hack, Labels It “Act of Terrorism”

Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign

Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordinated Login Scan Campaign

New Phishing Attack Combines Vishing and DLL Sideloading Techniques

Cybercriminals Expand Use of Lookalike Domains in Email Attacks

WP Ultimate CSV Importer Flaws Expose 20,000 Websites to Attacks

Critical Auth Bypass Bug in CrushFTP Now Exploited in Attacks

Apple Backports Critical Fixes for 3 Recent 0-Days Impacting Older iOS and macOS Devices