#threat-actors

[ follow ]
#cybersecurity
Careers
fromEntrepreneur
5 days ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Information security
fromThe Hacker News
3 months ago

ThreatsDay Bulletin: GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories

Threat actors are evolving rapidly, exploiting many small openings with precise, low-noise tactics that blur the line between normal operations and compromise.
Information security
fromThe Hacker News
8 months ago

Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems

Active exploitation of a critical Apache ActiveMQ vulnerability allows persistent access and malware deployment in cloud systems.
Information security
fromThe Hacker News
1 day ago

CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

CISA added two vulnerabilities to its KEV catalog due to active exploitation, impacting ConnectWise ScreenConnect and Microsoft Windows.
Careers
fromEntrepreneur
5 days ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Information security
fromThe Hacker News
3 weeks ago

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

A China-based threat actor is using zero-day vulnerabilities to execute high-velocity attacks, particularly targeting healthcare and finance sectors.
Information security
fromThe Hacker News
1 month ago

Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

Threat actors are exploiting a critical security flaw in Quest KACE SMA, allowing unauthorized access and control over administrative accounts.
fromSecuritymagazine
1 week ago

Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption

A Common Vulnerability Exposure (CVE) that cannot reach the privilege plane is operationally ineffective - even at a CVSS Score of 10. This should be a core philosophy that is embedded into the fabric of software engineering.
Information security
#ransomware
Information security
fromThe Hacker News
1 week ago

SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation

The Gentlemen ransomware group uses SystemBC malware to target over 1,570 victims, employing sophisticated tactics for initial access and lateral movement.
Information security
fromSecurityWeek
1 week ago

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

Threat actors have shifted to new phishing platforms after Tycoon 2FA's disruption, reusing its tools and increasing overall phishing attacks.
Information security
fromThe Hacker News
1 week ago

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Threat actors are exploiting three vulnerabilities in Microsoft Defender for elevated privileges, with one flaw already addressed by Microsoft.
#data-breach
Information security
fromTheregister
1 month ago

ShinyHunters claims yet another Salesforce customers breach

ShinyHunters claims to have stolen data from approximately 100 high-profile companies including Salesforce, Snowflake, Okta, LastPass, Sony, and AMD through exploiting overly broad guest user permissions on Salesforce Experience Cloud sites.
fromWIRED
4 months ago
Information security

The Worst Hacks of 2025

Breaches exploited third-party Salesforce integrations and exposed millions of records, driven by consolidated threat actors like Scattered Lapsus$ Hunters.
Information security
fromTheregister
1 month ago

ShinyHunters claims yet another Salesforce customers breach

ShinyHunters claims to have stolen data from approximately 100 high-profile companies including Salesforce, Snowflake, Okta, LastPass, Sony, and AMD through exploiting overly broad guest user permissions on Salesforce Experience Cloud sites.
fromArs Technica
1 month ago

Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

How this proliferation occurred is unclear, but suggests an active market for 'second hand' zero-day exploits. Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that can be re-used and modified with newly identified vulnerabilities.
Information security
Information security
fromTheregister
2 months ago

Ransomware crews abuse bossware to blend into networks

Threat actors are abusing legitimate employee monitoring and RMM software to hide in corporate networks and attempt ransomware deployment.
Information security
fromTechzine Global
3 months ago

Resecurity lures attackers into honeypot after hack claim

Resecurity says attackers accessed a deliberately deployed honeypot with synthetic data, not real production systems, while defender teams monitored attacker activity.
fromComputerWeekly.com
4 months ago

Top 10 cyber crime stories of 2025 | Computer Weekly

Once again threat actors kept cyber pros on their toes in 2025 in a never-ending cat-and-mouse game. But amid the noise, there were some notable stories and incidents affecting household names in the UK - the likes of Marks & Spencer, Co-op, and Jaguar Land Rover - meaning that 2025 will undoubtedly live long in the memory. Here are Computer Weekly's top cyber crime stories of 2025
Information security
fromDataBreaches.Net
6 months ago

Watsonville Community Hospital had a data breach - or two. It would be helpful to know which. - DataBreaches.Net

On December 8, 2024, DataBreaches reported that Watsonville Community Hospital in California was continuing to respond to what they referred to as a cyberattack on November 29. No gang had claimed responsibility at that point, patients hadn't been notified yet, and the hospital wasn't stating whether the attack involved encryption of any files. Weeks later, and in a substitute notice posted on December 31, 2024, they noted that patients' name, date of birth, Social Security number, passport number, and diagnosis information may have been present in files that had been accessed in a "recent data security event" that was still under investigation. The hospital did not confirm or deny whether this was a ransomware attack.
fromThe Hacker News
6 months ago

OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks

The AI company said while its large language models (LLMs) refused the threat actor's direct requests to produce malicious content, they worked around the limitation by creating building-block code, which was then assembled to create the workflows. Some of the produced output involved code for obfuscation, clipboard monitoring, and basic utilities to exfiltrate data using a Telegram bot. It's worth pointing out that none of these outputs are inherently malicious on their own.
Information security
Information security
fromDataBreaches.Net
7 months ago

Hackers claim access to law enforcement portals, but do they really have access? - DataBreaches.Net

Threat actors claimed access to the U.S. CJIS background-check portal and Google's law-enforcement request system; Google disabled a fraudulent account and reported no data accessed.
fromThe Hacker News
9 months ago

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

The threat actor leveraged combinations of sophisticated and stealthy techniques creating multilayered attack kill chains to facilitate access to restricted and segmented network assets within presumed to be isolated environments.
Information security
Information security
fromThe Hacker News
9 months ago

Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware

Hackers are exploiting Shellter, a red teaming tool, for malfeasance, distributing stealer malware following a leaked version.
Information security
fromThe Hacker News
1 year ago

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

Fortinet warns that attackers maintain read-only access to vulnerable FortiGate devices by exploiting symlinks, despite patching initial vulnerabilities.
[ Load more ]