Python-Based “XillenStealer” Campaign Targets Windows Users’ Sensitive Data
17
Sep
2025

Python-Based “XillenStealer” Campaign Targets Windows Users’ Sensitive Data

A sophisticated Python-based information stealer named XillenStealer has emerged as a significant threat to Windows users, designed to harvest sensitive…

FinWise Insider Breach Exposes 700K Customer Records to Former Employee
17
Sep
2025

FinWise Insider Breach Exposes 700K Customer Records to Former Employee

American First Finance, LLC, a Dallas-based financial services firm, suffered a significant insider breach when a recently terminated employee exploited…

17
Sep
2025

Rayhunter: EFF releases open-source tool to detect cellular spying

The Electronic Frontier Foundation (EFF) has released Rayhunter, a new open-source tool designed to detect cell site simulators (CSS). These…

DOJ Resentences BreachForums Founder to 3 Years for Cybercrime and Possession of CSAM
17
Sep
2025

DOJ Resentences BreachForums Founder to 3 Years for Cybercrime and Possession of CSAM

Sep 17, 2025Ravie LakshmananData Breach / Cybercrime The U.S. Department of Justice (DoJ) on Tuesday resentenced the former administrator of…

Brisbane Office Opening for ThreatLocker
17
Sep
2025

Brisbane Office Opening for ThreatLocker

ThreatLocker has a new office in Brisbane, Australia. ThreatLocker CEO and Co-Founder Danny Jenkins and COO and Co-Founder Sami Jenkins…

Hackers Can Exploit Bitpixie Vulnerability to Bypass BitLocker Encryption and Escalate Privileges
17
Sep
2025

Hackers Can Exploit Bitpixie Vulnerability to Bypass BitLocker Encryption and Escalate Privileges

A critical vulnerability in Windows Boot Manager, known as bitpixie, enables attackers to bypass BitLocker drive encryption and escalate local privileges on…

New FileFix Steganography Campaign Spreads StealC Malware
17
Sep
2025

New FileFix Steganography Campaign Spreads StealC Malware

A sophisticated new campaign that represents the first documented real-world deployment of FileFix attacks beyond proof-of-concept demonstrations. This campaign marks…

17
Sep
2025

How a fake ICS network can reveal real cyberattacks

Researchers have introduced a new way to study and defend against ICS threats. Their project, called ICSLure, is a honeynet…

Apple addressed the seventh actively exploited zero-day
17
Sep
2025

Apple backports fix for actively exploited CVE-2025-43300

Apple backports fix for actively exploited CVE-2025-43300 Pierluigi Paganini September 17, 2025 Apple announced it has backported patches for a…

17
Sep
2025

Brisbane Office Opening for ThreatLocker

ThreatLocker has a new office in Brisbane, Australia. ThreatLocker CEO and Co-Founder Danny Jenkins and COO and Co-Founder Sami Jenkins…

Wave of 40,000+ Cyberattacks Target API Environments
17
Sep
2025

Wave of 40,000+ Cyberattacks Target API Environments

The cybersecurity landscape has witnessed a dramatic escalation in API-targeted attacks during the first half of 2025, with security researchers…

17
Sep
2025

Creating a compliance strategy that works across borders

In this Help Net Security interview, Marco Goldberg, Managing Director at EQS Group, discusses how compliance and regulation are evolving…