Cybercriminals Advertise Advanced MaaS Botnet with Blockchain C2 on Hacking Forums
12
Jun
2025

Cybercriminals Advertise Advanced MaaS Botnet with Blockchain C2 on Hacking Forums

Cybersecurity researchers have uncovered the alleged sale of a sophisticated Malware-as-a-Service (MaaS) botnet that combines legitimate development frameworks with cutting-edge…

US Tops List of Unsecured Cameras Exposing Homes and Offices
12
Jun
2025

US Tops List of Unsecured Cameras Exposing Homes and Offices

A new study by BitSight TRACE shows that over 40,000 security cameras connected to the internet are openly available for…

Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack
12
Jun
2025

Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack

A critical zero-day vulnerability affecting Windows systems that allows attackers to achieve privilege escalation through a novel Reflective Kerberos Relay…

Hackers Launch Coordinated Attack on Apache Tomcat Manager from 400 Unique IPs
12
Jun
2025

Hackers Launch Coordinated Attack on Apache Tomcat Manager from 400 Unique IPs

Cybersecurity researchers at GreyNoise Intelligence have identified a significant coordinated attack campaign targeting Apache Tomcat Manager interfaces across the globe….

8 use cases for generative AI in manufacturing
12
Jun
2025

8 use cases for generative AI in manufacturing

In recent years, manufacturing has dramatically modernized, particularly with the implementation of new tools such as generative AI. Contemporary production…

Fog ransomware attack uses unusual mix of legitimate and open-source tools
12
Jun
2025

Fog ransomware attack uses unusual mix of legitimate and open-source tools

Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca. The…

New Campaign Targets Entra ID User Accounts Using Pentesting Tool for Account Takeover
12
Jun
2025

New Campaign Targets Entra ID User Accounts Using Pentesting Tool for Account Takeover

Proofpoint Threat Intelligence has uncovered a large-scale Account Takeover (ATO) campaign, internally tracked as UNK_SneakyStrike, that leverages the open-source penetration…

Agentforce London: 78% of UK companies use agentic AI, says Salesforce
12
Jun
2025

Agentforce London: 78% of UK companies use agentic AI, says Salesforce

Salesforce has released survey data that says 78% of UK organisations are using agentic artificial intelligence (AI). The findings, provided…

CISA Releases Guide to Protect Network Edge Devices From Hackers
12
Jun
2025

CISA Releases Guide to Protect Network Edge Devices From Hackers

CISA and international cybersecurity partners have released a comprehensive suite of guidance documents aimed at protecting critical network edge devices…

Windows SMB Client Zero-Day Vulnerability Exploited via Reflective Kerberos Relay Attack
12
Jun
2025

Windows SMB Client Zero-Day Vulnerability Exploited via Reflective Kerberos Relay Attack

A newly disclosed vulnerability, CVE-2025-33073, dubbed the “Reflective Kerberos Relay Attack,” has shaken the Windows security landscape. Discovered by RedTeam…

ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks
12
Jun
2025

ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Jun 12, 2025Ravie LakshmananVulnerability / Software Security ConnectWise has disclosed that it’s planning to rotate the digital code signing certificates…

Hackers Advertising New Nytheon AI Blackhat Tool on popular Hacking Forums
12
Jun
2025

Hackers Advertising New Nytheon AI Blackhat Tool on popular Hacking Forums

A sophisticated new threat platform, Nytheon AI, has emerged, which combines multiple uncensored large language models (LLMs) built specifically for…