Category: Data Breaches

Your blog category

  • CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

    CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

    CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide via a network of deceptive authentication portals and impersonation pages. The campaign, internally dubbed HackOnChat, abuses WhatsApp’s familiar web interface, using social engineering tactics to trick users into compromising their accounts.
    Investigators identified thousands of malicious URLs

  • New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices

    New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices

    Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device takeover to conduct financial fraud.
    “A key differentiator is its ability to bypass encrypted messaging,” ThreatFabric said in a report shared with The Hacker News. “By capturing content directly from the device screen after decryption, Sturnus can monitor

  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

    Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

    Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend that Amazon has called cyber-enabled kinetic targeting.
    The development is a sign that the lines between state-sponsored cyber attacks and kinetic warfare are increasingly blurring, necessitating the need for a new category of warfare, the tech giant’s

  • TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign

    TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign

    Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global malvertising campaign dubbed TamperedChef.
    The end goal of the attacks is to establish persistence and deliver JavaScript malware that facilitates remote access and control, per a new report from Acronis Threat Research Unit (TRU). The campaign, per the

  • WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

    WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

    A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in Taiwan, the U.S., and Russia, to rope them into a massive network.
    The router hijacking activity has been codenamed Operation WrtHug by SecurityScorecard’s STRIKE team. Southeast Asia and European countries are some of the other regions where infections have

  • Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

    Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

    The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security postures, such as Endpoint Detection and Response (EDR) to chase threats after they have already entered the network, is fundamentally risky and contributes significantly to the half-trillion-dollar annual cost of cybercrime.
    Zero Trust fundamentally shifts

  • EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

    EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

    The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to facilitate adversary-in-the-middle (AitM) attacks.
    EdgeStepper “redirects all DNS queries to an external, malicious hijacking node, effectively rerouting the traffic from legitimate infrastructure used for software updates to attacker-controlled infrastructure

  • ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts

    ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts

    Malicious actors can exploit default configurations in ServiceNow’s Now Assist generative artificial intelligence (AI) platform and leverage its agentic capabilities to conduct prompt injection attacks.
    The second-order prompt injection, according to AppOmni, makes use of Now Assist’s agent-to-agent discovery to execute unauthorized actions, enabling attackers to copy and exfiltrate sensitive

  • Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

    Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

    Fortinet has warned of a new security flaw in FortiWeb that it said has been exploited in the wild.
    The medium-severity vulnerability, tracked as CVE-2025-58034, carries a CVSS score of 6.7 out of a maximum of 10.0.
    “An Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability [CWE-78] in FortiWeb may allow an authenticated attacker to execute

  • ⚡ Weekly Recap: Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More

    ⚡ Weekly Recap: Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More

    This week showed just how fast things can go wrong when no one’s watching. Some attacks were silent and sneaky. Others used tools we trust every day — like AI, VPNs, or app stores — to cause damage without setting off alarms.
    It’s not just about hacking anymore. Criminals are building systems to make money, spy, or spread malware like it’s a business. And in some cases, they’re using the same