Infosecurity News

Russian State Hackers Target Signal to Spy on Ukrainians
Google has warned that Russian state-backed hackers are targeting Signal to eavesdrop on persons of interest in Ukraine

Hundreds of US Military and Defense Credentials Compromised
Hudson Rock has found evidence that infostealers have compromised hundreds of US military and defense contractor credentials

OpenSSH Flaws Expose Systems to Critical Attacks
Significant OpenSSH flaws are exposing systems to man-in-the-middle and denial-of service attacks

Mustang Panda Leverages Microsoft Tools to Bypass Anti-Virus Solutions
Trend Micro found that Chinese espionage group Mustang Panda is deploying malware via legitimate Microsoft tools, enabling it to bypass ESET antivirus applications

Evolving Snake Keylogger Variant Targets Windows Users
A new Snake Keylogger variant, responsible for over 280 million blocked infection attempts worldwide, has been identified targeting Windows users

BlackLock On Track to Be 2025’s Most Prolific Ransomware Group
The BlackLock or Eldorado ransomware gang could be the year’s fastest-growing ransomware-as-a-service group

Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer
Proofpoint also identified two new threat actors operating components of web inject campaigns, TA2726 and TA2727

Zacks Investment Research Breach Hits 12 Million
A threat actor claims to have hacked and published data on 12 million Zacks Investment Research accounts

Pro-Russia Hackers NoName057(16) Hit Italian Banks and Airports
Pro-Russia hackers NoName057(16) has targeted Italian banks, airports and ports in a series of DDoS attacks

South Korea Suspends Downloads of AI Chatbot DeepSeek
South Korea’s Personal Information Protection Commission is blocking DeepSeek AI downloads over privacy concerns

Microsoft Detects New XCSSET MacOS Malware Variant
Microsoft has observed a new variant of XCSSET, a sophisticated macOS malware that infects Xcode projects

Telegram Used as C2 Channel for New Golang Malware
A Golang backdoor is using Telegram as its command and control (C2) channel, an approach that makes detection harder for defenders, according to Netskope researchers

Estonian Duo Plead Guilty to $577m Crypto Ponzi Scheme
Two Estonian nationals have pleaded guilty to running a cryptocurrency-related Ponzi scheme

Palo Alto Networks and SonicWall Firewalls Under Attack
Vulnerabilities in firewalls from Palo Alto Networks and SonicWall are currently under active exploitation

Russian Hackers Target Microsoft 365 Accounts with Device Code Phishing
Volexity highlighted how Russian nation-state actors are stealing Microsoft device authentication codes to compromise accounts

UK's AI Safety Institute Rebrands Amid Government Strategy Shift
The organization becomes the AI Security Institute as the UK shifts its focus to tackling AI risks to national security

China-Linked Espionage Tools Used in Recent Ransomware Attack
Symantec found that tools previously only used by Chinese nation-state espionage actors were deployed in a ransomware attack

CISA and FBI Warn Against Buffer Overflow Vulnerabilities
US agencies have issued a new alert to eliminate buffer overflow vulnerabilities, urging memory-safe programming for secure-by-design software development

Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques
Astaroth is an advanced phishing kit using real-time credential and session cookie capture to compromise Gmail, Yahoo and Office 365 accounts

Romance Baiting Losses Surge 40% Annually
Ahead of Valentine’s Day, Chainalysis figures reveal 40% increase in losses to pig butchering, or romance baiting, scams



