• Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices

    Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices

    Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking to distribute a Delphi-based banking trojan named Eternidade Stealer as part of attacks targeting users in Brazil. “It uses Internet Message Access Protocol (IMAP) to dynamically retrieve command-and-control (C2) addresses, allowing the threat actor to

    Read More

  • WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

    WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

    A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in Taiwan, the U.S., and Russia, to rope them into a massive network. The router hijacking activity has been codenamed Operation WrtHug by SecurityScorecard’s STRIKE team. Southeast Asia and European countries are some of the other regions…

    Read More

  • Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

    Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

    The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security postures, such as Endpoint Detection and Response (EDR) to chase threats after they have already entered the network, is fundamentally risky and contributes significantly to the half-trillion-dollar annual cost of cybercrime. Zero Trust fundamentally shifts

    Read More

  • EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

    EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

    The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to facilitate adversary-in-the-middle (AitM) attacks. EdgeStepper “redirects all DNS queries to an external, malicious hijacking node, effectively rerouting the traffic from legitimate infrastructure used for software updates to attacker-controlled infrastructure

    Read More

  • Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

    Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

    Fortinet has warned of a new security flaw in FortiWeb that it said has been exploited in the wild. The medium-severity vulnerability, tracked as CVE-2025-58034, carries a CVSS score of 6.7 out of a maximum of 10.0. “An Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability [CWE-78] in FortiWeb…

    Read More

  • Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar

    Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar

    The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale. Push Security, in a report shared with The Hacker News, said it observed…

    Read More

  • Experts say resilience is key, takes planning

    Experts say resilience is key, takes planning

    HOOD RIVER — The 2025 Mid-Columbia Economic Development District (MCEDD) Economic Symposium ensued at The Ruins on Nov. 7, attracting attendees from the five-county district to learn and engage across industries and jurisdictions for the benefit of our regional economy.

    Read More

  • Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year

    Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year

    Meta on Tuesday said it has made available a tool called WhatsApp Research Proxy to some of its long-time bug bounty researchers to help improve the program and more effectively research the messaging platform’s network protocol. The idea is to make it easier to delve into WhatsApp-specific technologies as the application continues to be a…

    Read More

  • Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale

    Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale

    You’ve probably already moved some of your business to the cloud—or you’re planning to. That’s a smart move. It helps you work faster, serve your customers better, and stay ahead. But as your cloud setup grows, it gets harder to control who can access what. Even one small mistake—like the wrong person getting access—can lead…

    Read More

  • Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet

    Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet

    Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-of-service (DDoS) attack targeting a single endpoint in Australia that measured 5.72 terabits per second (Tbps) and nearly 3.64 billion packets per second (pps). The tech giant said it was the largest DDoS attack ever observed in the cloud, and that it originated…

    Read More