11 posts were published in the last hour 15:33 : McLaren Health Care Data Breach Exposes Personal Information of 743,000 Individuals 15:32 : Steelmaker Nucor Hacked – Attackers Gained Unauthorized Access to IT Systems 15:32 : Hackers Allegedly Selling Intelbras…
A Deep Dive into a Modular Malware Family
The Wordfence Threat Intelligence Team recently identified an interesting malware family on May 16, 2025 during a site clean. This malware family shared a codebase but varied in features across different versions, including credit card skimming and WordPress credential theft.…
DeepSeek Aided Chinese Military, US Official Alleges
Senior US official alleges Chinese AI firm DeepSeek is aiding China’s military and intelligence operations This article has been indexed from Silicon UK Read the original article: DeepSeek Aided Chinese Military, US Official Alleges
NASA Shows Photos Of Crashed ispace Lander
NASA spacecraft has provided images of the crash site of the privately funded ispace Mission 2 lunar lander This article has been indexed from Silicon UK Read the original article: NASA Shows Photos Of Crashed ispace Lander
Telegram Purged Chinese Crypto Scam Markets—Then Watched as They Rebuilt
Last month, Telegram banned black markets that sold tens of billions of dollars in crypto scam-related services. Now, as those markets rebrand and bounce back, it’s done nothing to stop them. This article has been indexed from Security Latest Read…
North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting
North Korean hackers employ social engineering to trick Zoom Meeting participants into executing system-takeover commands. The post North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Navigating cyber risks with Microsoft Security Exposure Management eBook
Microsoft Security Exposure Management’s eBook helps educate teams on how to anticipate threats across hybrid environments, transforming risk into resilience. The post Navigating cyber risks with Microsoft Security Exposure Management eBook appeared first on Microsoft Security Blog. This article has…
Scans for Ichano AtHome IP Cameras, (Mon, Jun 23rd)
Ichano's “AtHome Camera” is a bit of a different approach to home surveillance cameras [1]. Instead of a hardware camera solution, this product is a software solution that turns existing devices like computers and tablets into webcams. The software implements…
Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague
Newark, United States, 23rd June 2025, CyberNewsWire This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague
Why we’re focusing VB Transform on the agentic revolution – and what’s at stake for enterprise AI leaders
VB Transform 2025 tackles the agentic AI revolution—how enterprises can close the infrastructure gap and turn dazzling demos into deployed, trusted agents. This article has been indexed from Security News | VentureBeat Read the original article: Why we’re focusing VB…
How to turn on Android’s Private DNS mode – and why it’s an absolute must for security
Unencrypted DNS queries can expose your browsing activity, but you can use Private DNS Mode on Android to keep them safe from prying eyes. Here’s how. This article has been indexed from Latest stories for ZDNET in Security Read the…
5 Chromecast features that maximize your TV’s potential (and a smart home hack)
Google’s popular casting device has been around for over a decade, but it still does more than just stream your favorite shows. This article has been indexed from Latest stories for ZDNET in Security Read the original article: 5 Chromecast…
22 free cybersecurity tools you should know about
Cybersecurity products can get pricy, but there are many excellent open source tools to help secure your systems and data. Here’s a list of some of the most popular. This article has been indexed from Search Security Resources and Information…
AI Deepfake Scams Surge: Over $200 Million Lost in Just Three Months
Deepfake scams cost over $200 million in three months. Learn how these AI threats are evolving—and how individuals and organizations can fight back. The post AI Deepfake Scams Surge: Over $200 Million Lost in Just Three Months appeared first on…
Second attack on McLaren Health Care in a year affects 743k people
Criminals targeted the hospital and physician network’s Detroit cancer clinic this time McLaren Health Care is in the process of writing to 743,131 individuals now that it fully understands the impact of its July 2024 cyberattack.… This article has been…
Cyberattack Disrupts WestJet Systems as Investigation Begins
The second-largest airline in Canada, WestJet, is currently investigating an ongoing cyberattack which has compromised its internal systems as well as raising concerns about the risk of data loss to customers. As early as late last week, the airline was…
Signs Your Phone Has a Virus and How to Remove It Safely
In today’s world, our phones are more than just communication devices — they’re essential for work, banking, shopping, and staying connected. That makes it all the more alarming when a device begins to behave strangely. One possible cause? A…
Hackers Circumvent AntiVirus Using Google OAuth in New Malware Surge
A new campaign of browser-based malware has emerged, revealing how hackers are now circumventing conventional antivirus protections by exploiting trusted domains like Google.com. This technique, according to a report by security researchers at c/side, is subtle, conditionally triggered, and…
DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes
The United States government has warned of cyber attacks mounted by pro-Iranian groups after it launched airstrikes on Iranian nuclear sites as part of the Iran–Israel war that commenced on June 13, 2025. Stating that the ongoing conflict has created…
Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content
Cybersecurity researchers are calling attention to a new jailbreaking method called Echo Chamber that could be leveraged to trick popular large language models (LLMs) into generating undesirable responses, irrespective of the safeguards put in place. “Unlike traditional jailbreaks that rely…
Cyber Fattah Leaks Data from Saudi Games in Alleged Iranian Operation
A cyber-attack by pro-Iranian group Cyber Fattah has leaked personal information from the Saudi Games online This article has been indexed from www.infosecurity-magazine.com Read the original article: Cyber Fattah Leaks Data from Saudi Games in Alleged Iranian Operation
McLaren Health Care Data Breach Exposes Personal Information of 743,000 Individuals
McLaren Health Care, a prominent healthcare provider based at One McLaren Parkway, Grand Blanc, MI, has disclosed a data breach that compromised the personal information of 743,131 individuals, including 25 residents of Maine. The breach, identified as an external system…
Steelmaker Nucor Hacked – Attackers Gained Unauthorized Access to IT Systems
Charlotte-based steel giant Nucor Corporation disclosed a significant cybersecurity incident where threat actors gained unauthorized access to the company’s information technology infrastructure. The breach prompted temporary production shutdowns across multiple facilities as the company implemented emergency containment protocols and engaged…
Hackers Allegedly Selling Intelbras Router 0-Day Exploit on Hacker Forums
A notorious threat actor has allegedly listed a previously unknown—or “0day”—exploit for Intelbras routers on a prominent hacker forum. This exploit poses significant risks for many users and organizations that rely on Intelbras hardware for their networking needs. The sale…
Microsoft Defender for Office 365 to Provide Detailed Results for Spam, Phishing or Clean Emails
Microsoft is set to revolutionize email security transparency with the introduction of AI-powered explanations for email submission results in Microsoft Defender for Office 365. This groundbreaking feature, leveraging large language models (LLMs), will provide clear, human-readable rationales for why messages…
Linux Firewall IPFire 2.29 Core Update 195 Released With VPN Protocol Support
IPFire has released Core Update 195 for version 2.29, marking a significant milestone with the introduction of native WireGuard VPN protocol support. This highly anticipated update transforms the open-source firewall distribution by integrating modern VPN capabilities alongside comprehensive security enhancements…
APT36 Hackers Attacking Indian Defense Personnel in Sophisticated Phishing Attack
A Pakistan-based cyber espionage group known as APT36 or Transparent Tribe has launched a highly sophisticated phishing campaign targeting Indian defense personnel, utilizing credential-stealing malware designed to establish long-term infiltration within sensitive military networks. The campaign represents a significant escalation…