Search results for: “network security”
-

ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
This week’s cybersecurity bulletin highlights the re-emergence of Mirai-based botnets targeting IoT devices, a surge in sophisticated phishing attacks leveraging AI, and efforts by Singapore to curb government impersonation scams. It also covers privacy upgrades to the Tor Project, new malware techniques, and a major money laundering network takedown.
-

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens
The threat actor ToddyCat is using new hacking tools to steal corporate email data, including a custom tool called TCSectorCopy. They aim to obtain OAuth 2.0 authorization tokens from user browsers for accessing corporate mail. According to Kaspersky, this allows them to access emails outside the compromised infrastructure. ToddyCat has been active since 2020, targeting…
-

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Five new vulnerabilities have been discovered in Fluent Bit, a popular open-source telemetry agent. These flaws could be exploited to compromise and take over cloud infrastructures, raising significant security concerns. Successful exploitation means attackers could disrupt operations, tamper with sensitive data, and gain deeper access into cloud and Kubernetes environments.
-

Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs
A new report highlights a concerning trend with China’s DeepSeek-R1 AI model. Research shows it generates code with significant security vulnerabilities when prompted with politically sensitive topics. Cybersecurity firm CrowdStrike found that the likelihood of insecure code increases by up to 50% for topics the Chinese Communist Party considers sensitive, introducing new risks in AI-driven…
-

CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stark warning regarding a critical, actively exploited zero-day vulnerability in Oracle Identity Manager (CVE-2025-52054). This flaw, with a CVSS score of 9.8, allows remote attackers to bypass authentication and gain unauthorized access, posing a significant risk of complete system compromise to affected versions.
-

Cloudflare Outage Disrupts X, ChatGPT
Cloudflare outage on November 18 disrupted major internet platforms globally. X (formerly Twitter) and ChatGPT were affected. Cloudflare investigated and resolved the widespread issue.
-

AI-Based Obfuscated Malware Evades AV Detection
Malicious Android applications use AI-powered obfuscation to bypass antivirus detection. These apps mimic delivery services, steal user data, and employ sophisticated evasion techniques. Security analysts identified advanced obfuscation, making reverse engineering difficult.
-

Japan’s Defense Spending Reaches Postwar Record
Japan’s defense spending hit a postwar record of ¥9.9 trillion for 2025. This marks a 60% increase over five years. The rise reflects Japan’s strategic shift toward stronger military capabilities. It addresses regional uncertainties and aims for 2% of GDP in defense by 2027.
-

Kimsuky and Lazarus Join Forces in Coordinated Attacks
North Korean hacking groups Kimsuky and Lazarus combine forces. They exploit zero-day vulnerabilities in coordinated attacks, targeting critical sectors worldwide. This marks a shift in state-sponsored threat operations.
-

ShadowRay 2.0: Ray AI Flaw Exploited for Cryptomining
ShadowRay 2.0 exploits a Ray AI flaw, creating a self-spreading GPU cryptomining botnet. Attackers use unpatched vulnerabilities, GitLab, and GitHub to spread malware and hijack computing power.
