by Syndicated News Feed | Sep 17, 2025 | IT Security
The ShinyHunters extortion group claims to have stolen over 1.5 billion Salesforce records from 760 companies using compromised Salesloft Drift OAuth tokens. For the past year, the threat actors have been targeting Salesforce customers in data theft attacks using...
by Syndicated News Feed | Sep 17, 2025 | IT Security
Spiders don’t change their stripes. Despite gang members’ recent retirement claims, Scattered Spider hasn’t exited the cybercrime business and instead has shifted focus to the financial sector, with a recent digital intrusion at a US bank. In an...
by Syndicated News Feed | Sep 17, 2025 | IT Security
Microsoft and Cloudflare have disrupted a massive Phishing-as-a-Service (PhaaS) operation, known as RaccoonO365, that helped cybercriminals steal thousands of Microsoft 365 credentials. In early September 2025, in coordination with Cloudflare’s Cloudforce One...
by Syndicated News Feed | Sep 17, 2025 | IT Security
Arm devices are everywhere today and many of them run Linux. The operating system also powers cloud computing and IT environments all over the world. However, x86 is still the dominant architecture of global computer hardware, where the Unified Extensible Firmware...
by Syndicated News Feed | Sep 16, 2025 | IT Security
Conor Brian Fitzpatrick, the 22-year-old behind the notorious BreachForums hacking forum, was resentenced today to three years in prison after a federal appeals court overturned his prior sentence of time served and 20 years of supervised release. Fitzpatrick, of New...
by Syndicated News Feed | Sep 16, 2025 | IT Security
Microsoft has seized 338 websites associated with RaccoonO365 and identified the leader of the phishing service – Joshua Ogundipe – as part of a larger effort to disrupt what Redmond’s Digital Crimes Unit calls the “fastest-growing tool used by...
by Syndicated News Feed | Sep 16, 2025 | IT Security
A massive Android ad fraud operation dubbed “SlopAds” was disrupted after 224 malicious applications on Google Play were used to generate 2.3 billion ad requests per day. The ad fraud campaign was discovered by HUMAN’s Satori Threat Intelligence...
by Syndicated News Feed | Sep 16, 2025 | IT Security
An attack called FileFix is masquerading as a Facebook security alert before ultimately dropping the widely used StealC infostealer and malware downloader. FileFix is a variation on ClickFix, a newish type of social-engineering technique first spotted last year that...
by Syndicated News Feed | Sep 16, 2025 | IT Security
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality 16 Sep 2025 ESET researchers have uncovered a new ransomware strain that they have named HybridPetya. While resembling the infamous Petya/NotPetya...
by Syndicated News Feed | Sep 15, 2025 | IT Security
OpenAI is rolling out the GPT-5 Codex model to all Codex instances, including Terminal, IDE extension, and Codex Web (chatgpt.com/codex). Codex is an AI agent that allows you to automate coding-related tasks. You can delegate your complex tasks to Codex and watch it...