Evalian’s Security Operations Centre has uncovered an active, sophisticated phishing campaign targeting HubSpot customers, combining business email compromise (BEC) tactics with website compromise to distribute a credential-stealing malware to unsuspecting users. The multi-layered attack demonstrates how modern threat actors are…
Amazon Identified North Korean IT Worker by Tracking Keystroke Activity
Amazon has uncovered a North Korean imposter posing as a U.S.-based systems administrator. The discovery was made not through traditional background checks but by analyzing the subtle timing of the worker’s typing. According to a report from Bloomberg, Amazon security specialists…
New Linux Kernel Rust Vulnerability Triggers System Crashes
A critical race condition vulnerability has been discovered in the Linux kernel’s Rust Binder module, potentially causing system crashes and memory corruption. Assigned CVE-2025-68260, this issue affects the kernel’s inter-process communication mechanism and requires immediate attention from system administrators and…
University of Sydney Hacked – Students and Staff Data Exposed
The University of Sydney has confirmed a significant data breach affecting thousands of current and former staff members, as well as students and alums. In a message to the university community, Vice-President (Operations) Nicole Gower revealed that suspicious activity was…
Clop Ransomware Group Exploiting Gladinet CentreStack Servers to Steal Data
The Clop ransomware group has launched a new data extortion campaign targeting Internet-facing Gladinet CentreStack file servers, marking another chapter in the threat actor’s pattern of exploiting file transfer solutions. The campaign appears to leverage multiple security weaknesses in CentreStack…
WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls
An urgent security update has been released to fix a critical zero-day vulnerability in WatchGuard Firebox firewalls. With warnings that hackers are already actively exploiting the flaw in the wild to take control of affected devices. The vulnerability, tracked as CVE-2025-14733,…
New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards
Certain motherboard models from vendors like ASRock, ASUSTeK Computer, GIGABYTE, and MSI are affected by a security vulnerability that leaves them susceptible to early-boot direct memory access (DMA) attacks across architectures that implement a Unified Extensible Firmware Interface (UEFI) and…
FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime
A 39-year-old Russian national is accused of working with cybercriminals to convert criminal proceeds from cryptocurrency into various cash currencies This article has been indexed from www.infosecurity-magazine.com Read the original article: FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime
Council Calls For Phone Ban In All Primary Schools
West Sussex County Council calls on government to institute nationwide ban on mobile phones in primary schools to protect well-being This article has been indexed from Silicon UK Read the original article: Council Calls For Phone Ban In All Primary…
One In Three UK Adults Use AI For Emotional Support
Government study finds one-third of UK adults use AI chatbots for emotional support or social interaction, as capabilities rise quickly This article has been indexed from Silicon UK Read the original article: One In Three UK Adults Use AI For…
Windows RemoteApp problems, ferry malware arrest, Senator’s open-source warning
Recent Windows updates break RemoteApp connections France arrests threat actors for installing malware on Italian ferry Senate Intel chair urges safeguard against open-source software threats Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive…
IT Security News Hourly Summary 2025-12-19 09h : 2 posts
2 posts were published in the last hour 8:2 : Yet another DCOM object for lateral movement 8:2 : China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware
Yet another DCOM object for lateral movement
Kaspersky expert describes how DCOM interfaces can be abused to load malicious DLLs into memory using the Windows Registry and Control Panel. This article has been indexed from Securelist Read the original article: Yet another DCOM object for lateral movement
China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware
A sophisticated cyberespionage campaign targeting governmental entities in Southeast Asia and Japan has unveiled a new China-aligned threat actor dubbed LongNosedGoblin. Active since at least September 2023, this advanced persistent threat (APT) group distinguishes itself by leveraging a diverse toolset…
AI Agents are Man-in-the-Middle Attacks
After 25 years defending against man-in-the-middle attacks, a security veteran explains why most AI agents replicate the same architectural risks—creating compliance gaps, opaque decision-making, and zero-trust violations CISOs can’t ignore. The post AI Agents are Man-in-the-Middle Attacks appeared first on…
LLMs work better together in smart contract audits
Smart contract bugs continue to drain real money from blockchain systems, even after years of tooling and research. A new academic study suggests that large language models can spot more of those flaws when they work in coordinated groups instead…
AI isn’t one system, and your threat model shouldn’t be either
In this Help Net Security interview, Naor Penso, CISO at Cerebras Systems, explains how to threat model modern AI stacks without treating them as a single risk. He discusses why partitioning AI systems by function and impact matters, how to…
LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions This article has been indexed from WeLiveSecurity Read the original article: LongNosedGoblin tries to sniff out governmental affairs in…
Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays
A slight delay in keystrokes from a supposed U.S.-based IT worker alerted Amazon to a North Korean infiltrator accessing a corporate laptop. The commands should have zipped from the worker’s machine to Amazon’s Seattle headquarters in under 100 milliseconds. Instead,…
Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
NAKIVO Backup & Replication v11.1 brings a host of benefits to MSPs and their clients. It eliminates the need for client-side port configuration, enhances security with encrypted multi-platform support, and introduces automated failover capabilities. These features are designed specifically for…
Identity risk is changing faster than most security teams expect
Security leaders are starting to see a shift in digital identity risk. Fraud activity is becoming coordinated, automated, and self-improving. Synthetic personas, credential replay, and high speed onboarding attempts now operate through shared infrastructures that behave less like scattered threats…
On the Zero Day of Christmas – Cisco Devices Under Attack
Cybersecurity Today: Cisco Zero Day Exploited & Maritime Cyber Attack Unfolds In this episode of Cybersecurity Today, host David Shipley discusses a series of critical cybersecurity incidents, including the exploitation of a zero-day flaw in Cisco email security infrastructure by…
IT Security News Hourly Summary 2025-12-19 06h : 3 posts
3 posts were published in the last hour 5:2 : OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Vulnerability Detection 5:2 : INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin 5:2 : New infosec products of the week:…
OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Vulnerability Detection
OpenAI has unveiled GPT-5.2-Codex, a cutting-edge model optimized for agentic coding and enhanced cybersecurity tasks. The release highlights breakthroughs in handling complex software engineering and vulnerability detection. GPT-5.2-Codex tops SWE-Bench Pro with 56.4% accuracy, outperforming GPT-5.2 at 55.6% and GPT-5.1…