Threat actors exploited Cloudflare’s free-tier infrastructure and legitimate Python environments to deploy the AsyncRAT remote access trojan, demonstrating advanced evasion techniques that abuse trusted cloud services for malicious operations. This article has been indexed from Trend Micro Research, News and…
Claude connects to more healthcare data under security oversight
Healthcare teams are evaluating a range of AI tools for workflows tied to coverage, coding, care coordination, and trials. Anthropic announced expanded healthcare and life sciences offerings for its Claude model with a set of connectors, task skills, and consumer…
There was no data breach, Instagram says
News of a possible Instagram data breach spread over the weekend after Malwarebytes reported that cybercriminals had stolen sensitive information from 17.5 million Instagram accounts, potentially leading to a surge in password reset requests. Users have been complaining last week…
Critical React Router Vulnerability Let Attackers Access or Modify Server Files
Security researchers have identified critical vulnerabilities in React Router that allow attackers to access or modify server files via directory traversal. The flaws affect multiple packages within the React Router ecosystem and carry a CVSS v3 score of 9.8, classifying…
Cybercriminal Cryptocurrency Transactions Peaked in 2025 Following Nation‑State Sanctions Evasion Moves
The cryptocurrency crime landscape reached an unprecedented milestone in 2025, with illicit cryptocurrency addresses receiving at least 154 billion dollars. This staggering figure represents a 162 percent increase compared to the previous year, driven largely by nation-states moving into cryptocurrency…
EU Sets February Deadline for Verdict on Google’s $32B Wiz Acquisition
The record-breaking deal has already received a green light from the US government. The post EU Sets February Deadline for Verdict on Google’s $32B Wiz Acquisition appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
IT Security News Hourly Summary 2026-01-12 12h : 5 posts
5 posts were published in the last hour 10:32 : Meta Calls for Calm Amidst Instagram Password Reset Panic 10:32 : Tories vow to boot under-16s off social media and ban phones in schools 10:32 : Cyber fraud network behind…
Meta Calls for Calm Amidst Instagram Password Reset Panic
Meta stated that there had been no breach of its systems and that Instagram accounts remained secure. The post Meta Calls for Calm Amidst Instagram Password Reset Panic appeared first on TechRepublic. This article has been indexed from Security Archives…
Tories vow to boot under-16s off social media and ban phones in schools
Opposition leader Kemi Badenoch pitches age limits and classroom curbs as fixes for behavior and mental health The Tories have pledged to kick under-16s off social media, betting that banning teens from TikTok and Instagram will fix what they see…
Cyber fraud network behind €5,93 million in losses dismantled in Spain
The Spanish National Police (Policía Nacional), working closely with the Bavarian State Criminal Police Office (Bayerisches Landeskriminalamt) and with support from Europol, has carried out an operation targeting the international criminal organization known as Black Axe. Black Axe is a…
Illicit Crypto Activity Hits Record $158bn in 2025
TRM Labs says illegal crypto flows into digital wallets increased to $158bn in 2025 This article has been indexed from www.infosecurity-magazine.com Read the original article: Illicit Crypto Activity Hits Record $158bn in 2025
How to stop insider-driven data loss in browser sessions
Midmarket teams turn to secure browsers capable of providing deep visibility and enforcing granular user controls during user browsing sessions, the goal being to prevent intentional or unintentional leaks without adding friction to the user experience. This article has been…
AI Is Changing Cyber Threats — Here’s How to Stay Protected
Artificial intelligence (AI) is changing the way cybercriminals plan, launch, and scale attacks. But the same technology can also help people and businesses stay safer… The post AI Is Changing Cyber Threats — Here’s How to Stay Protected appeared first…
Critical Apache Struts 2 Flaw Could Let Attackers Steal Sensitive Data
A newly disclosed vulnerability in Apache Struts 2’s XWork component could expose sensitive data and open the door to denial‑of‑service and server‑side request forgery (SSRF) attacks if left unpatched. The flaw, tracked as CVE-2025-68493, is rated Important and affects a wide range of…
Cybercriminal Crypto Transactions Surge to 2025 High
Illicit cryptocurrency transactions reached unprecedented levels in 2025 as nation-states weaponized digital assets to evade sanctions, transforming the cybercrime landscape into a geopolitical battleground with record-breaking financial volumes. According to blockchain analysis data, illicit cryptocurrency addresses received at least $154 billion in…
Credential-harvesting attacks by APT28 hit Turkish, European, and Central Asian organizations
Russia-linked cyberespionage group APT28 targets energy, nuclear, and policy staff in Turkey, Europe, North Macedonia, and Uzbekistan with credential-harvesting attacks. Between February and September 2025, Recorded Future’s Insikt Group observed Russia-linked group APT28 (aka UAC-0001, Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta, and STRONTIUM) running credential-harvesting…
Turkish Security Researcher Gets Nod From NASA Over Vulnerability Discoveries
NASA acknowledges independent researcher Hasan İsmail Gülkaya for discovering vulnerabilities through its Vulnerability Disclosure Program, highlighting the importance of ethical hacking in cybersecurity. The post Turkish Security Researcher Gets Nod From NASA Over Vulnerability Discoveries appeared first on Security Boulevard. This article…
Debian 13.3 is now available with targeted corrections, updates
Debian 13.3 is the third maintenance update for the stable Debian 13 distribution, codenamed “trixie”. It updates package content to address security and other issues reported since the last point update. This release includes more than 100 adjustments and multiple…
Anthropic Launches Claude AI for Healthcare with Secure Health Record Access
Anthropic has become the latest Artificial intelligence (AI) company to announce a new suite of features that allows users of its Claude platform to better understand their health information. Under an initiative called Claude for Healthcare, the company said U.S.…
Operation Cronos Leader Gets Nod From King Charles
Gavin Webb from the National Crime Agency receives the OBE award from King Charles for his strategic role in Operation Cronos, disrupting the LockBit ransomware group. The post Operation Cronos Leader Gets Nod From King Charles appeared first on Security Boulevard.…
We’re Hiring: Hacking Groups Recruit Teens While Feds Want to Ground Them
Explore the troubling trend of teenagers being recruited into hacking groups, the challenges in countering this rise, and the efforts to redirect their skills towards ethical hacking. The post We’re Hiring: Hacking Groups Recruit Teens While Feds Want to Ground Them …
Crypto crime hits record levels as state actors move billions
Nation-state involvement in crypto increased in 2025, signaling a shift in how on-chain crime operates. Three waves of crypto crime (Source: Chainalysis) Research from Chainalysis shows that crypto-related crime has grown more organized over recent years, with illicit groups running…
BreachForums Database Leak Turns the Tables on Threat Actors
A database featuring 300,000+ users of notorious hacking forum BreachForums has been leaked online This article has been indexed from www.infosecurity-magazine.com Read the original article: BreachForums Database Leak Turns the Tables on Threat Actors
DeepSeek To Launch Custom Italian Version
DeepSeek to create first country-specific version of online chatbot following Italian ‘hallucination’ probe This article has been indexed from Silicon UK Read the original article: DeepSeek To Launch Custom Italian Version