Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts
12
Sep
2025

Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts

The notorious APT-C-24 threat actor group, commonly known as Sidewinder or Rattlesnake, has evolved its attack methodology by deploying sophisticated…

HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot
12
Sep
2025

HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot

ESET researchers have discovered HybridPetya, a bootkit-and-ransomware combo that’s a copycat of the infamous Petya/NotPetya malware, augmented with the capability…

Back of woman with her head in her hand
12
Sep
2025

From Fitbit to financial despair: How one woman lost her life savings and more to a scammer

We hear so often about people falling for scams and losing money. But we often don’t find out the real…

Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks
12
Sep
2025

Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks

Sep 12, 2025Ravie LakshmananVulnerability / Mobile Security Samsung has released its monthly security updates for Android, including a fix for…

GDS publishes guidance on AI coding assistants
12
Sep
2025

GDS publishes guidance on AI coding assistants

The government has published guidance for software engineers working in government departments on how they should use artificial intelligence (AI)-based…

MIND Raises $30 Million for Data Loss Prevention
12
Sep
2025

F5 to Acquire CalypsoAI for $180 Million

Security and application delivery solutions provider F5 on Thursday announced plans to acquire AI security firm CalypsoAI for $180 million….

New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence
12
Sep
2025

New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence

Since its first appearance earlier this year, the ToneShell backdoor has demonstrated a remarkable capacity for adaptation, toyed with by…

The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats
12
Sep
2025

The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats

Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical…

Charlie Kirk Shooting Suspect Identified as 22-Year-Old Utah Man
12
Sep
2025

Charlie Kirk Shooting Suspect Identified as 22-Year-Old Utah Man

The manhunt for the shooter who killed conservative activist Charlie Kirk ended Friday with a suspect taken into custody, authorities…

New Malvertising Campaign Exploits GitHub Repositories to Distribute Malware
12
Sep
2025

New Malvertising Campaign Exploits GitHub Repositories to Distribute Malware

A sophisticated malvertising campaign has been uncovered targeting unsuspecting users through “dangling commits” in a legitimate GitHub repository. Attackers are…

Cybersecurity News tidbits
12
Sep
2025

In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research

SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide…

Cisco confirms active exploitation of ISE and ISE-PIC flaws
12
Sep
2025

Cisco fixes high-severity IOS XR flaws enabling image bypass and DoS

Cisco fixes high-severity IOS XR flaws enabling image bypass and DoS Pierluigi Paganini September 12, 2025 Cisco addressed multiple high-severity…