Cybersecurity News
Understand the Threats. Protect What Matters.
- Affiliates Flock to ‘Soulless’ Scam Gambling Machineby BrianKrebs on August 28, 2025 at 5:21 pm
Last month, KrebsOnSecurity tracked the sudden emergence of hundreds of polished online gaming and wagering websites that lure people with free credits and eventually abscond with any cryptocurrency funds deposited by players. We’ve since learned that these scam gambling sites have proliferated thanks to a new Russian affiliate program called “Gambler Panel” that bills itself as a “soulless project that is made for profit.”
- This Is the Group That’s Been Swatting US Universitiesby David Gilbert on August 27, 2025 at 5:09 pm
WIRED spoke to a self-proclaimed leader of an online group called Purgatory, which charged as little as $20 to call in fake threats against schools.
- The Era of AI-Generated Ransomware Has Arrivedby Lily Hay Newman, Matt Burgess on August 27, 2025 at 12:36 pm
Cybercriminals are increasingly using generative AI tools to fuel their attacks, with new research finding instances of AI being used to develop ransomware.
- CISA and Partners Providing Real-Time Incident Response to Cyber Attack on State of Nevadaby CISA on August 27, 2025 at 12:00 pm
- CISA and Partners Release Joint Advisory on Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage Systemsby CISA on August 27, 2025 at 12:00 pm
The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to [email protected]
- Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Executionby [email protected] (The Hacker News) on August 29, 2025 at 5:22 pm
Three new security vulnerabilities have been disclosed in the Sitecore Experience Platform that could be exploited to achieve information disclosure and remote code execution. The flaws, per watchTowr Labs, are listed below – CVE-2025-53693 – HTML cache poisoning through unsafe reflections CVE-2025-53691 – Remote code execution (RCE) through insecure deserialization CVE-2025-53694 –
- Webinar: Learn How to Unite Dev, Sec, and Ops Teams With One Shared Playbookby [email protected] (The Hacker News) on August 29, 2025 at 3:42 pm
Picture this: Your team rolls out some new code, thinking everything’s fine. But hidden in there is a tiny flaw that explodes into a huge problem once it hits the cloud. Next thing you know, hackers are in, and your company is dealing with a mess that costs millions. Scary, right? In 2025, the average data breach hits businesses with a whopping $4.44 million bill globally. And guess what? A big
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authenticationby [email protected] (The Hacker News) on August 29, 2025 at 1:22 pm
Amazon on Friday said it flagged and disrupted what it described as an opportunistic watering hole campaign orchestrated by the Russia-linked APT29 actors as part of their intelligence gathering efforts. The campaign used “compromised websites to redirect visitors to malicious infrastructure designed to trick users into authorizing attacker-controlled devices through Microsoft’s device code
- Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaignby [email protected] (The Hacker News) on August 29, 2025 at 1:12 pm
An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an espionage campaign to deliver several malware families, including C6DOOR and GTELAM, in attacks primarily targeting users across Eastern Asia. “Attackers employed sophisticated infection chains, such as hijacked software updates and fake cloud storage or login
- Can Your Security Stack See ChatGPT? Why Network Visibility Mattersby [email protected] (The Hacker News) on August 29, 2025 at 10:30 am
Generative AI platforms like ChatGPT, Gemini, Copilot, and Claude are increasingly common in organizations. While these solutions improve efficiency across tasks, they also present new data leak prevention for generative AI challenges. Sensitive information may be shared through chat prompts, files uploaded for AI-driven summarization, or browser plugins that bypass familiar security controls.