Crime: Massive leak exposes the inner workings of top ransomware syndicate Black Basta
Some 200,000 private messages among hacking group members have been revealed |
News: Australia bans all Kaspersky products on government systems
The Australian government has banned all Kaspersky Lab products and web services from its systems and devices following an analysis that claims the company poses a significant security risk to the country. |
News: Three Password Cracking Techniques and How to Defend Against Them
Passwords are rarely appreciated until a security breach occurs; suffice to say, the importance of a strong password becomes clear only when faced with the consequences of a weak one. However, most end users are unaware of just how vulnerable their passwords are to the most common password-cracking methods. |
Cyber Savvy AI Antics |
*** FAKE CYBER NEWS ***
Truth Social post on Association Cyber preparedness… “Nonprofits and cyber? TOTAL DISASTER! EVERYBODY KNOWS IT!!! They’re failing badly – just like everyone who said I coun’t win (which I did, bigly!). Many people are saying they’ve got the worst cyber plan ever created. But I think the cybersecurity thing is a HOAX. Nobody knows what’s going on. Very unfair! Some leaders (total losers) didn’t even have a firewall. Sad! They let the hackers into their servers (very bad!) through the ‘cloud’ – whatever that is. While I’m president, hackers won’t every try. They’d be too scared because they’re just dumb kids.” |
News: Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts
A China-linked botnet powered by 130,000 hacked devices has targeted Microsoft 365 accounts with password spraying attacks.. |
News: Have I Been Pwned adds 284M accounts stolen by infostealer malware
The Have I Been Pwned data breach notification service has added over 284 million accounts stolen by information stealer malware and found on a Telegram channel. |
AI: Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme
Microsoft on Thursday unmasked four of the individuals that it said were behind an Azure Abuse Enterprise scheme that involves leveraging unauthorized access to generative artificial intelligence (GenAI) services in order to produce offensive and harmful content. |
AI: 12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training
A dataset used to train large language models (LLMs) has been found to contain nearly 12,000 live secrets, which allow for successful authentication. |
Ransomware: The New Ransomware Groups Shaking Up 2025
In 2024, global ransomware attacks hit 5,414, an 11% increase from 2023. |
News: Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains
Cybersecurity researchers have uncovered a widespread phishing campaign that uses fake CAPTCHA images shared via PDF documents hosted on Webflow’s content delivery network (CDN) to deliver the Lumma stealer malware. |
News: Microsoft confirms it’s killing off Skype in May, after 14 years
Microsoft has confirmed that the Skype video call and messaging service will be shut down in May, 14 years after replacing the Windows Live Messenger. |
News: Over 49,000 misconfigured building access systems exposed online
Researchers discovered 49,000 misconfigured and exposed Access Management Systems (AMS) across multiple industries and countries, which could compromise privacy and physical security in critical sectors. |
AI: ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers
The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick users into downloading malware such as Lumma Stealer and Vidar Stealer. |
News: FBI warns Gmail, Outlook email users of costly ransomware scheme
Federal agencies are warning Gmail and Outlook email users of a costly ransomware scheme that has already affected more than 300 victims. |
News: Microsoft Warns of New StilachiRAT Malware
Microsoft has shared details on StilachiRAT, an evasive and persistent piece of malware that facilitates sensitive data theft. |
News: Google Releases Major Update for Open Source Vulnerability Scanner
Google has integrated OSV-SCALIBR features into OSV-Scanner, its free vulnerability scanner for open source developers. |
Vulnerability Vortex
Hackers abuse WordPress MU-Plugins to hide malicious code
Hackers are utilizing the WordPress mu-plugins (“Must-Use Plugins”) directory to stealthily run malicious code on every page while evading detection. |
Apple issues fixes for vulnerabilities in both old and new OS versions
The company released a host of security patches Monday, including ones that address two zero-day vulnerabilities. |
Microsoft warns of critical flaw in Canon Printer Drivers
Microsoft’s offensive security team discovered a critical code execution vulnerability impacting Canon printer drivers. |
Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities
Chrome 135 and Firefox 137 were released on Tuesday with fixes for several high-severity memory safety vulnerabilities. |
Google addresses 2 actively exploited vulnerabilities in security update
Serbian security services exploited one of the actively exploited vulnerabilities to break into the phone of a youth activist in Serbia, according to Amnesty International. |
Malicious VSCode extensions infect Windows with cryptominers
A set of ten VSCode extensions on Microsoft’s Visual Studio Code Marketplace pose as legitimate development tools while infecting users with the XMRig cryptominer for Monero. |
Critical FortiSwitch flaw lets hackers change admin passwords remotely
Fortinet has released security patches for a critical vulnerability in its FortiSwitch devices that can be exploited to change administrator passwords remotely. |
Hackers exploit WordPress plugin auth bypass hours after disclosure
Hackers started exploiting a high-severity flaw that allows bypassing authentication in the OttoKit (formerly SureTriggers) plugin for WordPress just hours after public disclosure. |
SonicWall Patches High-Severity Vulnerability in NetExtender
SonicWall has released fixes for three vulnerabilities in NetExtender for Windows, including a high-severity bug. |
CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting SonicWall Secure Mobile Access (SMA) 100 Series gateways to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. |
Read also
Welcome to v062 : Roses are red, violets are blue, cyber-hackers are waiting for you
Welcome to v061 : New Year’s Resolution: Strengthen Cybersecurity, Protect Missions.
About Us
Developing cybersecurity plans, evaluating and implementing technology, building effective software, and executing strategic initiatives.