Fortinet
14
Nov
2025

Fortinet FortiWeb flaw with public PoC exploited to create admin users

A Fortinet FortiWeb path traversal vulnerability is being actively exploited to create new administrative users on exposed devices without requiring…

FortiWeb Authentication Bypass Vulnerability Exploited
14
Nov
2025

FortiWeb Authentication Bypass Vulnerability Exploited

Threat actors are actively exploiting a critical authentication bypass vulnerability in Fortinet’s FortiWeb web application firewall (WAF) worldwide, prompting defenders…

Akira actively engaged in ransomware attacks against critical sectors
14
Nov
2025

Akira actively engaged in ransomware attacks against critical sectors

The FBI and Cybersecurity and Infrastructure Security Agency on Thursday warned that Akira ransomware is actively launching attacks against critical…

New ‘IndonesianFoods’ worm floods npm with 100,000 packages
14
Nov
2025

New ‘IndonesianFoods’ worm floods npm with 100,000 packages

A self-spreading package published on npm spams the registry by spawning new packages every every seven seconds, creating large volumes of…

Teachers Mutual Bank automates KYC across brands
14
Nov
2025

Teachers Mutual Bank automates KYC across brands

Teachers Mutual Bank Limited is streamlining its compliance obligations by automating customer verification processes for some of its 220,000 members….

Hacker
14
Nov
2025

CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs

US government agencies are warning that the Akira ransomware operation has been spotted encrypting Nutanix AHV virtual machines in attacks. …

How Adversaries Exploit the Blind Spots in Your EASM Strategy – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
14
Nov
2025

How Adversaries Exploit the Blind Spots in Your EASM Strategy – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Internet-facing assets like domains, servers, or networked device endpoints are where attackers look first, probing their target’s infrastructure to determine…

The headquarters of the Federal Bureau of Investigation on August 16, 2022, in Washington. (Matt McClain/The Washington Post via Getty Images)
14
Nov
2025

FBI calls Akira ‘top five’ ransomware variant out of 130 targeting US businesses

Federal cyber authorities shared new details Thursday about the Akira ransomware group’s techniques, the tools it uses and vulnerabilities it…

Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests' Payment Data
14
Nov
2025

Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data

A Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since the start of…

Akira Ransomware Group Poses ‘Imminent Threat,’ CISA Warns
13
Nov
2025

Akira Ransomware Group Poses ‘Imminent Threat,’ CISA Warns

The Akira ransomware group poses an “imminent threat to critical infrastructure,” the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned…

Google Sues 'Lighthouse' Phishing-as-a-service Kit Behind Massive Phishing Attacks
13
Nov
2025

Google Sues ‘Lighthouse’ Phishing-as-a-service Kit Behind Massive Phishing Attacks

Google security researchers recently uncovered a sophisticated criminal operation called “Lighthouse” that has victimized over one million people across more…

Australia's AUKUS base to connect to subsea cables
13
Nov
2025

Australia’s AUKUS base to connect to subsea cables

Australia’s AUKUS submarine fleet base and its vicinity are being quietly connected to three powerful new undersea internet cables planned…