Advertisement · 728 × 90
#
Hashtag
#CybersecurityThreat
Advertisement · 728 × 90
Preview
Committee member warns of cyber threat, presses nominee to restore cybersecurity staff A member of the Senate Committee on Homeland Security and Governmental Affairs told the nominee that cyberattacks — particularly from Iran — are the biggest homeland threat and said about one-third of cybersecurity staff ("over 800 individuals") were reassigned; the member urged the nominee to bring cyber professionals back into security roles.

A Senate committee member warns that cyberattacks are the most significant threat to our homeland, urging the reinstatement of over 800 cybersecurity professionals who were reassigned from their critical roles.

Learn more here

#US #CybersecurityThreat #CitizenPortal #WorkforceRestoration

0 0 0 0
Preview
Hacker mass-mails HungerRush extortion emails to restaurant patrons Customers of restaurants using the HungerRush point-of-sale (POS) platform say they received emails from a threat actor attempting to extort the company, warning that restaurant and customer data could...

A hacker is sending threatening emails to customers of restaurants using HungerRush software, attempting to extort money. This tactic poses significant risks to businesses and individuals. #CyberSecurityThreat

0 0 0 0
Original post on infosec.exchange

Yeah, the problem with #Government #surveillance is that some or later they are not the only state actor hitting the citizens.

Every "legitimate" backdoor is a "security through obscurity" attack surface.

#CriminalActivity #CybersecurityThreat #ForeignSpies #PotentialNationalSecurityRisk […]

0 1 0 0
Preview
Afghans Report Killings After British Ministry of Defence Data Leak  Dozens of Afghans whose personal information was exposed in a British Ministry of Defence (MoD) data breach have reported that their relatives or colleagues were killed because of the leak, according to new research submitted to a UK parliamentary inquiry. The breach, which occurred in February 2022, revealed the identities of nearly 19,000 Afghans who had worked with the UK government during the war in Afghanistan. It happened just six months after the Taliban regained control of Kabul, leaving many of those listed in grave danger.  The study, conducted by Refugee Legal Support in partnership with Lancaster University and the University of York, surveyed 350 individuals affected by the breach. Of those, 231 said the MoD had directly informed them that their data had been compromised. Nearly 50 respondents said their family members or colleagues were killed as a result, while over 40 percent reported receiving death threats. At least half said their relatives or friends had been targeted by the Taliban following the exposure of their details.  One participant, a former Afghan special forces member, described how his family suffered extreme violence after the leak. “My father was brutally beaten until his toenails were torn off, and my parents remain under constant threat,” he said, adding that his family continues to face harassment and repeated house searches. Others criticized the British government for waiting too long to alert them, saying the delay had endangered lives unnecessarily.   According to several accounts, while the MoD discovered the breach in 2023, many affected Afghans were only notified in mid-2025. “Waiting nearly two years to learn that our personal data was exposed placed many of us in serious jeopardy,” said a former Afghan National Army officer still living in Afghanistan. “If we had been told sooner, we could have taken steps to protect our families.”   Olivia Clark, Executive Director of Refugee Legal Support, said the findings revealed the “devastating human consequences” of the government’s failure to protect sensitive information. “Afghans who risked their lives working alongside British forces have faced renewed threats, violent assaults, and even killings of their loved ones after their identities were exposed,” she said.  Clark added that only a small portion of those affected have been offered relocation to the UK. The government estimates that more than 7,300 Afghans qualify for resettlement under a program launched in 2024 to assist those placed at risk by the data breach. However, rights organizations say the scheme has been too slow and insufficient compared to the magnitude of the crisis. The breach has raised significant concerns about how the UK manages sensitive defense data and its responsibilities toward Afghans who supported British missions. For many of those affected, the consequences of the exposure remain deeply personal and ongoing, with families still living under threat while waiting for promised protection or safe passage to the UK.

Afghans Report Killings After British Ministry of Defence Data Leak #cybersecuritythreat #DataBreach #DataLeak

0 0 0 0
Preview
Over 75,000 WatchGuard security devices vulnerable to critical RCE Nearly 76,000 WatchGuard Firebox network security appliances are exposed on the public web and still vulnerable to a critical issue (CVE-2025-9242) that could allow a remote attacker to execute code without...

Over 75,000 WatchGuard firewalls are at risk due to a critical flaw allowing remote code execution. Many remain unpatched, putting networks in serious danger. #CyberSecurityThreat

0 0 0 0
Preview
Critical WhatsApp Zero Click Vulnerability Abused with DNG Payload   It has been reported that attackers are actively exploiting a recently discovered vulnerability in WhatsApp's iOS application as a part of a sophisticated cyber campaign that underscores how zero-day vulnerabilities are becoming weaponised in today's cyber warfare. With the zero-click exploit identified as CVE-2025-55177 with a CVSS score of 5.4, malicious actors can execute unauthorised content processing based on any URL on a victim's device without the need for user interaction whatsoever.  A vulnerability referred to as CVE-2025-55177 provides threat actors with a way to manipulate WhatsApp's synchronization process, so they may force WhatsApp to process attacker-controlled content during device linking when they manipulate the WhatsApp synchronization process.  Even though the vulnerability could have allowed crafted content to be injected or disrupted services, its real danger arose when it was combined with Apple's CVE-2025-43300, another security flaw that affects the ImageIO framework, which parses image files. In addition to this, there were also two other vulnerabilities in iOS and Mac OS that allowed out-of-bounds memory writing, which resulted in remote code execution across these systems.  The combination of these weaknesses created a very powerful exploit chain that could deliver malicious images through the incoming message of a WhatsApp message, causing infection without the victim ever having to click, tap or interact with anything at all—a quintessential zero-click attack scenario. Investigators found that the targeting of the victims was intentional and highly selective.  In the past, WhatsApp has confirmed that it has notified fewer than 200 people about potential threats in its apps, a number that is similar to earlier mercenary spyware operations targeting high-value users. Apple has also acknowledged active exploitation in the wild and has issued security advisories concurrently.  Researchers from Amnesty International noted that, despite initial signs suggesting limited probing of Android devices, this campaign was mainly concerned with Apple's iOS and macOS ecosystems, and therefore was focused on those two ecosystems mainly. The implications are particularly severe for businesses. Corporate executives, legal teams, and employees with privileged access to confidential intellectual property are at risk of being spied on or exfiltrated through using WhatsApp on their work devices, which represents a direct and potentially invisible entry point into corporate data systems.  Cybersecurity and Infrastructure Security Agency (CISA) officials say that the vulnerability was caused by an "incomplete authorisation of linked device synchronisation messages" that existed in WhatsApp for iOS versions before version 2.25.2.173, WhatsApp Business for iOS versions of 2.25.1.78, and WhatsApp for Mac versions of 2.25.21.78.  This flaw is believed to have been exploited by researchers as part of a complex exploit chain, which was created using the flaw in conjunction with a previously patched iOS vulnerability known as CVE-2025-43300, allowing for the delivery of spyware onto targeted devices. A U.S. government advisory has been issued urging federal employees to update their Apple devices immediately because the campaign has reportedly affected approximately 200 people.  A new discovery adds to the growing body of evidence that advanced cyber threat actors increasingly rely on chaining multiple zero-day exploits to circumvent hardened defences and compromise remote devices. In 2024, Google's Threat Analysis Group reported 75 zero-day exploits that were actively exploited, a figure that reflects how the scale of these attacks is accelerating.  This stealthy intrusion method continues to dominate as the year 2025 unfolds, resulting in nearly one-third of all recorded compromise attempts worldwide occurring this year. It is important for cybersecurity experts to remind us that the WhatsApp incident demonstrates once more the fragility of digital trust, even when it comes to encrypting platforms once considered to be secure.  It has been uncovered that the attackers exploited a subtle logic flaw in WhatsApp’s device-linking system, allowing them to disguise malicious content to appear as if it was originating from the user’s own paired device, according to a technical analysis. Through this vulnerability, a specially crafted Digital Negative (DNG) file could be delivered, which, once processed automatically by the application, could cause a series of memory corruption events that would result in remote code execution. Researchers at DarkNavyOrg have demonstrated the proof-of-concept in its fullest sense, showing how an automated script is capable of authenticating, generating the malicious DNG payload, and sending it to the intended victim without triggering any security alerts.  In order to take advantage of the exploit, there are no visible warnings, notification pop-ups, or message notifications displayed on the user's screen. This allows attackers to gain access to messages, media, microphones, and cameras unrestrictedly, and even install spyware undetected. It has been reported to WhatsApp and Apple that the vulnerability has been found, and patches have been released to mitigate the risks.  Despite this, security experts recommend that users install the latest updates immediately and be cautious when using unsolicited media files—even those seemingly sent by trusted contacts. In the meantime, organisations should ensure that endpoint monitoring is strengthened, that mobile device management controls are enforced, and that anomalous messaging behaviour is closely tracked until the remediation has been completed.  There is a clear need for robust input validation, secure file handling protocols, and timely security updates to prevent silent but highly destructive attacks targeting mainstream communication platforms that can be carried out against mainstream communication platforms due to the incident. Cyber adversaries have, for a long time, been targeting companies such as WhatsApp, and WhatsApp is no exception.  It is noteworthy that despite the platform's strong security framework and end-to-end encryption, threat actors are still hunting for new vulnerabilities to exploit. Although there are several different cyberattack types, security experts emphasise that zero-click exploits remain the most insidious, since they can compromise devices without the user having to do anything.  V4WEB Cybersecurity founder, Riteh Bhatia, made an explanation for V4WEB's recent WhatsApp advisory, explaining that it pertains to one of these zero-click exploits--a method of attacking that does not require a victim to click, download, or applaud during the attack. Bhatia explained that, unlike phishing, where a user is required to click on a malicious link, zero-click attacks operate silently, working in the background.  According to Bhatia, the attackers used a vulnerability in WhatsApp as well as a vulnerability in Apple's iOS to hack into targeted devices through a chain of vulnerabilities. He explained to Entrepreneur India that this process is known as chaining vulnerabilities.  Chaining vulnerabilities allows one weakness to provide entry while the other provides control of the system as a whole. Further, Bharatia stressed that spyware deployed by these methods is capable of doing a wide range of invasive functions, such as reading messages, listening through the microphone, tracking location, and accessing the camera in real time, in addition to other invasive actions.  As a warning sign, users might notice excessive battery drain, overheating, unusual data usage, or unexpected system crashes, all of which may indicate that the user's system is not performing optimally. Likewise, Anirudh Batra, a senior security researcher at CloudSEK, stated that zero-click vulnerabilities represent the "holy grail" for hackers, as they can be exploited seamlessly even on fully updated and ostensibly secure devices without any intervention from the target, and no action is necessary on their part. If this vulnerability is exploited effectively, attackers will be able to have full control over the targeted devices, which will allow them to access sensitive data, monitor communications, and deploy additional malware, all without the appearance of any ill effect. As a result of this incident, it emphasises that security risks associated with complex file formats and cross-platform messaging apps persist, since flaws in file parsers continue to serve as common pathways for remote code execution. There is a continuing investigation going on by DarkNavyOrg, including one looking into a Samsung vulnerability (CVE-2025-21043), which has been identified as a potential security concern. There was a warning from both WhatsApp and Apple that users should update their operating systems and applications immediately, and Meta confirmed that less than 200 users were notified of in-app threats.  It has been reported that some journalists, activists, and other public figures have been targeted. Meta's spokesperson Emily Westcott stressed how important it is for users to keep their devices current and to enable WhatsApp's privacy and security features. Furthermore, Amnesty International has also noted possible Android infections and is currently conducting further investigation.  In the past, similar spyware operations occurred, such as WhatsApp's lawsuit against Israel's NSO Group in 2019, which allegedly targeted 1,400 users with the Pegasus spyware, which later became famous for its role in global cyberespionage. While sanctions and international scrutiny have been applied to such surveillance operations, they continue to evolve, reflecting the persistent threat that advanced mobile exploits continue to pose.  There is no doubt that the latest revelations are highlighting the need for individuals and organisations to prioritise proactive cyber security measures rather than reactive ones, as zero-click exploits are becoming more sophisticated, the traditional boundaries of digital security—once relying solely on the caution of users—are eroding rapidly. It has become increasingly important for organisations to keep constant vigilance, update their software quickly, and employ layered defence strategies to protect both their personal and business information.  Organisations need to invest in threat intelligence solutions, continuous monitoring systems, and regular mobile security audits if they want to be on the lookout for potential threats early on. In order for individual users to reduce their exposure, they need to maintain the latest version of their devices and applications, enable built-in privacy protections, and avoid unnecessary third-party integrations.  The WhatsApp exploit is an important reminder that even trusted, encrypted platforms may be compromised at some point. The cyber espionage industry is evolving into a silent and targeted operation, and digital trust must be reinforced through transparent processes, rapid patching, and global cooperation between tech companies and regulators. A strong defence against invisible intrusions still resides in awareness and timely action.

Critical WhatsApp Zero Click Vulnerability Abused with DNG Payload #cybersecuritythreat #DigitalEspionage #iOSVulnerability

0 0 0 0
Feds find 200,000 more SIM cards in N.J. after disrupting network
Feds find 200,000 more SIM cards in N.J. after disrupting network YouTube video by B.C. Begley

Feds find 200,000 more SIM cards in N.J. after disrupting network
#SIMCardSeizure #TelecomNetwork #CyberSecurityThreat
www.youtube.com/watch?v=mQF5...

0 0 0 0
Post image

Secret Service dismantles a massive NY network with 300 servers and 100,000 SIM cards capable of citywide cell service disruption and eavesdropping, linked to foreign threats at the UN Assembly.

#CyberSecurityThreat #SIMCardNetwork #UNSecurity

1 0 0 0
Preview
Possible Zero-Day Exploit in SonicWall SSL VPN Linked to Akira Ransomware Surge   Cybersecurity researchers are warning that SonicWall SSL VPN devices may be affected by a possible zero-day vulnerability currently being exploited by Akira ransomware operators. In mid-July 2025, Arctic Wolf Labs detected a spike in suspicious logins through SonicWall SSL VPN endpoints. Notably, some compromised devices were fully patched, leading researchers to suspect the presence of an undiscovered flaw. However, they also acknowledged the possibility that attackers had obtained valid credentials from another source. Regardless of the entry method, targeted organizations soon fell victim to Akira ransomware. "A short interval was observed between initial SSL VPN account access and ransomware encryption," Arctic Wolf researchers noted. They further explained that, unlike legitimate VPN logins that usually come from consumer ISP networks, ransomware operators often rely on Virtual Private Server (VPS) hosting for authentication in compromised systems. Until SonicWall issues a patch or clarifies the situation, experts advise businesses to implement multi-factor authentication (MFA), remove inactive firewall accounts, and ensure all passwords are strong, unique, and regularly updated. Akira, which first appeared in March 2023, has attacked organizations across various industries, exploiting stolen VPN credentials and exposed services to infiltrate systems. The group targets both Windows and Linux environments, often deleting backups to prevent recovery. By mid-2025, Akira had claimed hundreds of victims worldwide, including Stanford University, Nissan Australia, and Tietoevry. Communications with victims are typically directed through a Tor-based website. The FBI and CISA have previously warned about Akira’s operations, urging companies to bolster defenses and enforce MFA. In an official statement, SonicWall confirmed to TechRadar: "SonicWall is actively investigating a recent increase in reported cyber incidents involving a number of Gen 7 firewalls running various firmware versions with SSLVPN enabled. These cases have been flagged both internally and by third-party threat research teams, including Arctic Wolf, Google Mandiant, and Huntress. We are working closely with these organizations to determine whether the activity is tied to a previously disclosed vulnerability or represents a zero-day vulnerability. As always, we will communicate openly with our partners and customers as the investigation progresses. If a new vulnerability is confirmed, we will release updated firmware and guidance as quickly as possible. As a precaution, we strongly urge customers and partners using Gen 7 firewalls to take immediate mitigation steps: Disable SSLVPN services where practical - the additional mitigations below should be taken in all cases, including where disabling SSLVPN is not practical for the customer o Limit SSLVPN connectivity to trusted source IPs.o Ensure Security Services (e.g., Botnet Protection, Geo-IP Filter) are enabled.o Remove unused or inactive firewall user accounts.o Promote strong password hygiene.o Enforce Multi-Factor Authentication (MFA) for all remote access (MFA enforcement alone may not protect against the activity under investigation)."

Possible Zero-Day Exploit in SonicWall SSL VPN Linked to Akira Ransomware Surge #AkiraRansomware #cybersecuritythreat #SonicWallSSLVPN

0 0 0 0
Preview
St. Paul cyber attack exposed what isn't yet fixed in Minnesota Minnesota has the right people, deep technical knowledge and years of leadership in securing critical infrastructure. Now it needs execution.

This is scary for the state of Minnesota long considered ahead of the #cybersecuritythreat. It isn't. So if they have a long standing issue, what's your excuse for your state? www.minnpost.com/community-vo...

0 0 0 0
Preview
Understanding the CrushFTP Authentication Bypass Vulnerability: A Critical Cybersecurity Threat | The DefendOps Diaries Explore the critical CrushFTP authentication bypass vulnerability and its global impact on cybersecurity.

Understanding the CrushFTP Authentication Bypass Vulnerability: A Critical Cybersecurity Threat

#crushftp
#authenticationbypass
#cybersecuritythreat
#cve20252825
#infosec

0 0 0 0

🧵(1/5)

In her opening statement today before the Senate Intelligence Committee, the Director of National Intelligence #TulsiGabbard stated #Russia presented a #cybersecuritythreat.

Felon34's Ukraine and Middle East envoy, #SteveWitkoff, who was in the group chat, was in Russia at the time.

⬇️

1 1 1 0
Preview
HellCat Hackers Exploit Jira: A Global Cybersecurity Threat | The DefendOps Diaries HellCat hackers exploit Jira vulnerabilities, causing global breaches. Learn about their methods and how to protect your systems.

HellCat Hackers Exploit Jira: A Global Cybersecurity Threat

#hellcathackers
#jiravulnerabilities
#cybersecuritythreat
#databreach
#infosec

0 0 0 0

#CybersecurityThreat
Article: cybersecuritynews.com/hackers-attacking-web-lo...

2 0 0 0

2.8M daily brute-force attacks target firewall web logins (Palo Alto, Ivanti, SonicWall), mostly from Brazil. Use strong passwords, MFA, and patches to mitigate.#CybersecurityThreat

2 0 1 0
Preview
Shadow AI is the latest cybersecurity threat you need to prepare for - Help Net Security Shadow AI includes AI products and platforms used within your organization without department knowledge, posing risks.

Shadow AI is the latest cybersecurity threat you need to prepare for
www.helpnetsecurity.com/2024/03/22/s...
#Infosec #Security #Cybersecurity #CeptBiro #ShadowAI #CybersecurityThreat

0 0 0 0
South St. Paul Public Schools investigating potential cybersecurity threat Maraya King reports: South St. Paul Public Schools alerted families this week to an ongoing technology disruption that is being investigated. Staff and...

South St. Paul Public Schools investigating potential cybersecurity threat
www.databreaches.net/south-st-pau...
#Infosec #Security #Cybersecurity #CeptBiro #SouthStPaulPublicSchools #CybersecurityThreat

0 0 0 0