• ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

    ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

    Thursday. Another week, another batch of things that probably should’ve been caught sooner but weren’t. This one’s got some range — old vulnerabilities getting new life, a few “why was that even possible” moments, attackers leaning on platforms and tools you’d normally trust without thinking twice. Quiet escalations more than loud zero-days, but the kind that matter more…

    Read More

  • The Hidden Security Risks of Shadow AI in Enterprises

    The Hidden Security Risks of Shadow AI in Enterprises

    As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also operate outside the visibility of security teams, bypassing controls and creating new blind spots in what is known as shadow AI. While similar to…

    Read More

  • Oregon Journalism Project: Oregon’s gas prices are fifth highest in the nation

    Oregon Journalism Project: Oregon’s gas prices are fifth highest in the nation

    Free news: This story was produced by the Oregon Journalism Project, a nonprofit investigative newsroom for the state of Oregon.

    Read More

  • New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

    New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

    Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat’scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet’s targeting infrastructure. “Chaos malware is increasingly targeting misconfigured cloud deployments, expanding beyond its traditional focus on routers and edge devices,” Darktrace said in a new report.

    Read More

  • Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

    Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

    Cybersecurity researchers have lifted the curtain on a stealthy botnet that’s designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been advertised via Telegram as a DDoS-for-hire service since it first surfaced in 2023. It’s capable of targeting a wide range of IoT devices, such as routers and gateways, spanning multiple architectures. “Built for

    Read More

  • APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

    APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

    The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite codenamed PRISMEX. “PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control,” Trend Micro

    Read More

  • Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

    Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

    The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly fragmented across thousands of applications, decentralized teams, machine identities, and autonomous systems.  The result is Identity Dark Matter: identity activity that sits outside the visibility of centralized IAM and

    Read More

  • Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

    Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

    Artificial Intelligence (AI) company Anthropic announced a new cybersecurity initiative called Project Glasswing that will use a preview version of its new frontier model, Claude Mythos, to find and address security vulnerabilities. The model will be used by a small set of organizations, including Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike,&

    Read More

  • N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

    N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

    The North Korea-linked persistent campaign known as Contagious Interview has spread its tentacles by publishing malicious packages targeting the Go, Rust, and PHP ecosystems. “The threat actor’s packages were designed to impersonate legitimate developer tooling […], while quietly functioning as malware loaders, extending Contagious Interview’s established playbook into a coordinated

    Read More

  • Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs

    Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs

    Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including programmable logic controllers (PLCs), cybersecurity and intelligence agencies warned Tuesday. “These attacks have led to diminished PLC functionality, manipulation of display data and, in some cases, operational disruption and financial

    Read More