Skip to content

News

World Cybersecurity News

RSS The Hacker News
  • Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App June 4, 2025
    Google has disclosed details of a financially motivated threat cluster that it said "specialises" in voice phishing (aka vishing) campaigns designed to breach organizations' Salesforce instances for large-scale data theft and subsequent extortion. The tech giant's threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with
  • Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads June 4, 2025
    Threat hunters are calling attention to a new variant of a remote access trojan (RAT) called Chaos RAT that has been used in recent attacks targeting Windows and Linux systems. According to findings from Acronis, the malware artifact may have been distributed by tricking victims into downloading a network troubleshooting utility for Linux environments. "Chaos […]
  • Your SaaS Data Isn't Safe: Why Traditional DLP Solutions Fail in the Browser Era June 4, 2025
    Traditional data leakage prevention (DLP) tools aren't keeping pace with the realities of how modern businesses use SaaS applications. Companies today rely heavily on SaaS platforms like Google Workspace, Salesforce, Slack, and generative AI tools, significantly altering the way sensitive information is handled. In these environments, data rarely appears as traditional files or crosses networks
  • Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks June 4, 2025
    Several malicious packages have been uncovered across the npm, Python, and Ruby package repositories that drain funds from cryptocurrency wallets, erase entire codebases after installation, and exfiltrate Telegram API tokens, once again demonstrating the variety of supply chain threats lurking in open-source ecosystems. The findings come from multiple reports published by Checkmarx,
  • HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass June 4, 2025
    Hewlett Packard Enterprise (HPE) has released security updates to address as many as eight vulnerabilities in its StoreOnce data backup and deduplication solution that could result in an authentication bypass and remote code execution. "These vulnerabilities could be remotely exploited to allow remote code execution, disclosure of information, server-side request forgery, authentication bypass,
  • Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack June 3, 2025
    Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting users into executing malicious PowerShell scripts on their machines and infect them with the NetSupport RAT malware. The DomainTools Investigations (DTI) team said it identified "malicious multi-stage downloader Powershell scripts" hosted on lure websites that masquerade as Gitcode and DocuSign. […]
  • Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code June 3, 2025
    Cybersecurity researchers have disclosed details of a critical security flaw in the Roundcube webmail software that has gone unnoticed for a decade and could be exploited to take over susceptible systems and execute arbitrary code. The vulnerability, tracked as CVE-2025-49113, carries a CVSS score of 9.9 out of 10.0. It has been described as a […]
  • Scattered Spider: Understanding Help Desk Scams and How to Defend Your Organization June 3, 2025
    In the wake of high-profile attacks on UK retailers Marks & Spencer and Co-op, Scattered Spider has been all over the media, with coverage spilling over into the mainstream news due to the severity of the disruption caused — currently looking like hundreds of millions in lost profits for M&S alone.  This coverage is extremely […]
  • Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets June 3, 2025
    A growing number of malicious campaigns have leveraged a recently discovered Android banking trojan called Crocodilus to target users in Europe and South America. The malware, according to a new report published by ThreatFabric, has also adopted improved obfuscation techniques to hinder analysis and detection, and includes the ability to create new contacts in the […]
  • Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues June 3, 2025
    Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing "patterns of concerning behavior observed over the past year." The changes are expected to be introduced in Chrome 139, which is scheduled for public release in early August 2025. The current major version is 137.  The update […]
RSS Cybercrime Magazine
  • Expert Guide to Ransomware Recovery June 4, 2025
    This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jun. 04, 2025 – Download the Guide from Redmond Is your business prepared to recover quickly from a ransomware attack and minimize data loss? An expert guide from Redmond, the independent voice of the The post Expert Guide to Ransomware Recovery appeared first on […]
    Taylor Fox
  • Lessons from Ireland on closing the cybersecurity talent gap June 3, 2025
    This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jun. 03, 2025 – Read the full story in Forbes There are an estimated 3.5 million unfilled cybersecurity roles worldwide as of 2025. That figure has remained steady since 2021, according to Cybersecurity The post Lessons from Ireland on closing the cybersecurity talent […]
    Taylor Fox
  • How to land an entry-level cybersecurity job June 2, 2025
    This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jun. 02, 2025 – Read the full story in Spiceworks Want to work in cybersecurity but can’t get past the “experience required” roadblock? You’re not alone in this frustrating catch-22. The cybersecurity field The post How to land an entry-level cybersecurity job appeared […]
    Taylor Fox
  • Cyber Rica: The Global Cybercrime Industry As A Country May 30, 2025
    This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May 30, 2025 – Read the full story in Cybercrime Magazine To understand the magnitude of the modern cybersecurity threat, it’s instructive to think of the global cybercrime industry as a country. The post Cyber Rica: The Global Cybercrime Industry As A […]
    Taylor Fox
  • Cyberattack Surge Creates Opportunity, Premium Rethink for Insurers May 29, 2025
    This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May 29, 2025 – Read the full story in Bloomberg Bloomberg reports that a recent surge in high-profile cyberattacks is offering an opportunity for insurers, including Munich Re AG and Chubb Ltd. The post Cyberattack Surge Creates Opportunity, Premium Rethink for Insurers […]
    Taylor Fox
  • Cybercrime To Cost The World $12.2 Trillion Annually By 2031 May 28, 2025
    Cyber Rica is the world’s third largest economy Press Release – David Braue, Editor-at-Large Melbourne, Australia – May 28, 2025 Cybercrime is predicted to cost the world $10.5 trillion USD in 2025, according to Cybersecurity Ventures. If it were measured as a country, then cybercrime The post Cybercrime To Cost The World $12.2 Trillion Annually […]
    Taylor Fox
  • Broader Talent Pool Helps Governments Combat Cyberattacks May 28, 2025
    This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May 28, 2025 – Read the full story in American City & County The cost of cybercrime is predicted to hit approximately $10.5 trillion in 2025, according to research by Cybersecurity Ventures. Cyberattacks The post Broader Talent Pool Helps Governments Combat Cyberattacks appeared […]
    Taylor Fox
  • Movie Review: ‘Do You Trust This Computer?’ May 27, 2025
    This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May 27, 2025 – Listen to the Podcast The part-scary, part-spellbinding documentary ‘Do You Trust This Computer?‘, directed by Chris Paine (“Who Killed the Electric Car?”), talks to a gaggle of experts The post Movie Review: ‘Do You Trust This Computer?’ appeared […]
    Taylor Fox
  • Top 50 Cybersecurity Influencers to Follow in 2025 May 23, 2025
    This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May 23, 2025 – Read the full story from Gracker.ai In 2025, staying ahead in cybersecurity requires insights from the sharpest minds in the field. From ethical hackers to CISOs, journalists, and The post Top 50 Cybersecurity Influencers to Follow in 2025 […]
    Taylor Fox
  • How Agentic AI Empowers Lean Security Teams to Combat Cyber Threats May 22, 2025
    Empowering Lean Security Teams with Autonomous AI – Subo Guha, Senior Vice President, Product Management, Stellar Cyber San Jose, Calif. – May. 22, 2025 How Agentic AI Empowers Lean Security Teams to Combat Cyber Threats ​In the ever-evolving landscape of cybersecurity, lean security teams face The post How Agentic AI Empowers Lean Security Teams to […]
    Taylor Fox

Cyberthreat Real Time Map

For more detailed map and information click here