https://www.inoreader.com/article/3a9c6e77c48c3742

Latest CyberSec News by @thecyberpicker
U.S. CISA adds TeleMessage TM SGNL to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds TeleMessage TM SGNL flaw to its Known Exploited Vulnerabilities catalog.
Windows 11 upgrade block lifted after Safe Exam Browser fix
Microsoft has removed an upgrade block that prevented some Safe Exam Browser users from installing the Windows 11 2024 Update due to incompatibility issues.
Backdoored Magento Extensions Impact Multiple Online Stores
The backdoored Magento extensions appeared following a supply-chain attack targeting three vendors, ultimately impacting the customer stores.
Researchers found one-click RCE in ASUS ’s pre-installed software DriverHub
Expert found two flaws in DriverHub, pre-installed on Asus motherboards, which allow remote code execution via crafted HTTP requests.
Hackers now testing ClickFix attacks against Linux targets
A new campaign employing ClickFix attacks has been spotted targeting both Windows and Linux systems using instructions that make infections on either operating system possible.
Marbled Dust leverages zero-day in Output Messenger for regional espionage
Since April 2024, the threat actor that Microsoft Threat Intelligence tracks as Marbled Dust has been observed exploiting user accounts that have not applied fixes to a zero-day vulnerability (CVE-2025-27920) in the messaging app Output Messenger, a multiplatform chat software. These exploits have resulted in collection of related user data from targets in Iraq. Microsoft […]
Output Messenger flaw exploited as zero-day in espionage attacks
A Türkiye-backed cyberespionage group exploited a zero-day vulnerability to attack Output Messenger users linked to the Kurdish military in Iraq.
US seizes Anyproxy, 5socks botnets and indicts alleged administrators | CyberScoop
The long-running botnet operation used malware that infected older wireless internet routers over a 20-year period, according to federal prosecutors.
South African influencers-for-hire target Ukraine’s president in influence campaign, researchers say
A new analysis from the Atlantic Council’s Digital Forensic Research Lab (DFRLab) identified over 40 accounts involved in the traffic manipulation campaign, which garnered 290,000 views.
Hacktivist Attacks on India Overstated Amid APT36 Espionage Threat
Hacktivist claims on Indian infrastructure raised alarms, but investigations showed minimal damage
« La corruption est dingue » : le cadeau du Qatar à Trump d’un avion Air Force One déclenche une nouvelle tempête
La presse rapporte la possibilité que Donald Trump accepte un cadeau du Qatar : un nouvel avion, qui ferait office d'Air Force One de nouvelle génération. Un don qui pourrait advenir dans les prochains jours, mais qui soulève des questions éthiques et légales, et entraine des problématiques de sécurité informatique
Lee Enterprises spent $2M for ransomware recovery
The newspaper chain said the attack will have lingering impacts on its balance sheet, and its lender waived certain payments.
Moldova arrests suspect linked to DoppelPaymer ransomware attacks
Moldovan authorities have detained a 45-year-old suspect linked to DoppelPaymer ransomware attacks targeting Dutch organizations in 2021.
ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files
ASUS Patches Two DriverHub RCE Flaws (CVSS 8.4 & 9.4) Exploitable via Crafted Requests and .ini Files
Des cybercriminels chinois exploitent une vulnérabilité critique dans SAP NetWeaver
SAP a découvert le mois dernier une vulnérabilité touchant des centaines d'instances de son serveur d'applications NetWeaver. Malgré la...-Cybersécurité
Criminal Proxy Network Infects Thousands of IoT Devices
The criminal proxy network infected thousands of IoT and end-of-life devices, creating dangerous botnet
Google to pay $1.375 billion to settle Texas data privacy violations
Google has agreed to a $1.375 billion settlement with the state of Texas over a 2022 lawsuit that alleged it had been collecting and using biometric data of millions of Texans without properly acquiring their consent.
#Infosec2025: Experts to Shine Light on Vendor Supply Chain Resilience Against Third-Party Risks
During Infosecurity Europe 2025 experts will explore how to strengthen organizational resilience against persistent third-party risks
Majority of Browser Extensions Pose Critical Security Risk, A New Report Reveals
99% of enterprise users have browser extensions but over half carry high-risk permissions. LayerX's 2025 report reveals how everyday extensions expose sensitive data, and what security teams must do now.
Threat actors use fake AI tools to deliver the information stealer Noodlophile
Threat actors use fake AI tools to trick users into installing the information stealer Noodlophile, Morphisec researchers warn.
Demystifying Integrations: APIs, Connectors, & Agents | CSA
Define the components of Data Security Posture Management (DSPM), including APIs, connectors, collectors, agents, & agent-less. Learn when to use each of them.
EU Launches Free Entry-Level Cyber Training Program
She@Cyber training program is focused on improving the representation of women and other underrepresented groups in the cybersecurity industry
Defense contractors get a head start on CMMC audits
Software investments, infrastructure upgrades and compliance documentation topped the list of Cybersecurity Maturity Model Certification (CMMC) implementation costs, a new survey shows.
Moldova arrests suspect in ransomware attacks targeting Dutch firms
A 45-year-old man arrested in Moldova is charged with a string of cybercrimes against Dutch entities in 2021.
Airline carrying out deportation flights confirms cyberattack to SEC
An airline involved in deportation flights on behalf of the Trump administration confirmed reports of a cybersecurity incident with the SEC on Friday.
Husband Hacks Scammers Who Targeted His Wife, Gave USPS Investigators Info
This week in cybersecurity from the editors at Cybercrime Magazine
⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
State hackers. Fake updates. Compromised software tools. Read the full recap.
Fears 'hackers still in the system' leave Co-op shelves running empty across UK
U.K. retailer Co-op is still having trouble with keeping grocery shelves stocked as it continues to respond to an attempted cyberattack that forced it to shut down some systems two weeks ago.
FreeDrain Phishing Scam Drains Crypto Hobbyists' Wallets
A global cryptocurrency phishing operation likely based in India or Sri Lanka has been stealing digital assets since at least 2022