Aggregator
Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution
Cybercriminals are exploiting TikTok’s massive user base to distribute sophisticated malware campaigns that promise free software activation but deliver dangerous payloads instead. The attack leverages social engineering tactics reminiscent of the ClickFix technique, where unsuspecting users are tricked into executing malicious PowerShell commands on their systems. Victims encounter TikTok videos offering free activation of popular […]
The post Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution appeared first on Cyber Security News.
Regional airline Envoy Air confirms Oracle E-Business Suite compromise
报告称互联网上逾半数内容是 AI 生成的
Teen Tied to Russian Hackers in Dutch Cyber Espionage Probe
CVE-2025-60360 | Radare2 up to 5.9.8 r2r_subprocess_init memory leak
CVE-2025-60359 | Radare2 up to 5.9.8 r_bin_object_new memory leak
CVE-2025-48044 | ash up to 3.7.0 lib/ash/policy/policy.ex authorization (GHSA-pcxq-fjp3-r752 / EUVD-2025-34884)
Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware
Cybercriminals associated with the North Korean threat group WaterPlum, also known as Famous Chollima or PurpleBravo, have escalated their activities with a sophisticated new malware strain called OtterCandy. This cross-platform RAT and information stealer represents a dangerous evolution in the group’s capabilities, combining features from previously observed malware families RATatouille and OtterCookie to create a […]
The post Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware appeared first on Cyber Security News.
Самые мощные стрельбы за 30 лет. Корабельная система IRIS-T впервые сбила цели на 40 км и превратила фрегаты в дальнобойные щиты
22岁主谋落网!00后黑客组建的DDoS僵尸网络帝国RapperBot被彻底取缔
В даркнете продают данные российских «СМС агрегаторов». Под угрозой тысячи сервисов
NFC?我抓:一款开源 NFC 抓包硬件的诞生(第一章)
F5 Breach: Practical Recommendations for Protecting Your Edge Devices and Reducing Supply Chain Risk
A nation‑state actor infiltrated F5’s BIG‑IP development systems, stealing proprietary code and vulnerability data. While no backdoor was found, CISA warned that the stolen intelligence could speed up exploitation of F5 BIG-IP devices and products – placing edge appliances at immediate risk.
The post F5 Breach: Practical Recommendations for Protecting Your Edge Devices and Reducing Supply Chain Risk appeared first on Sygnia.
A critical WatchGuard Fireware flaw could allow unauthenticated code execution
Hackers Using AI to Automate Vulnerability Discovery and Malware Generation – Microsoft Report
Security teams around the world are grappling with a new breed of cyber threats that leverage advanced automation to identify software weaknesses and craft malicious payloads at unprecedented speed. Over the past year, adversaries have integrated machine-driven workflows into their operations, enabling opportunistic criminals and well-funded groups alike to discover zero-days and assemble malware with […]
The post Hackers Using AI to Automate Vulnerability Discovery and Malware Generation – Microsoft Report appeared first on Cyber Security News.
VMware Certification: Your Next Career Power Move
HITCON Cyber Range 2025 Final
Date: Oct. 17, 2025, 1 a.m. — 17 Oct. 2025, 10:00 UTC [add to calendar]
Format: Jeopardy
On-site
Location: Taipei, Taiwan
Offical URL: https://hitcon.kktix.cc/events/hitcon-cyberrange-2025
Rating weight: 0.00
Event organizers: HITCON