1. CISA added four actively exploited vulnerabilities to its Known Exploited Vulnerabilities catalog affecting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X routers (The Hacker News).
2. Home security company ADT confirmed a data breach following extortion threats from the ShinyHunters group (BleepingComputer).
3. The Lazarus APT group is conducting a new campaign using the Mach-O Man malware kit to target businesses on macOS (Reddit).
4. Threat actor UNC6692 is deploying a custom malware suite named Snow via Microsoft Teams using social engineering tactics (BleepingComputer).
5. Researchers discovered a pre-Stuxnet malware framework called fast16 that targeted engineering software as early as 2005 (The Hacker News).
6. A large scale device code phishing campaign is leveraging the Kali365 phishing-as-a-service platform to gain initial access to corporate networks (Reddit).
7. Toronto police seized SMS blasters, marking the first time this specific cybercrime weapon has been identified in Canada (Reddit).
8. A security audit of 1764 applications revealed that 7 percent contained exposed Supabase databases and 15 percent of Bolt applications shipped with hardcoded API keys (Reddit).
9. The Firestarter malware has been observed persisting on Cisco firewalls despite the application of security patches and firmware updates (Reddit).
10. A new spyware strain named Morpheus has been linked to IPS Intelligence (Reddit).
11. Bell Canada HomeHub 3000 routers are reportedly affected by an unauthenticated denial of service vulnerability impacting over one million devices (Reddit).
12. Security researchers introduced the MCP Safety Warden proxy to vet MCP servers and mitigate risks associated with tool execution (Reddit).
Be First to Comment