Documentos de direitos autorais armados usados pelos atores de ameaças para atingir os principais funcionários com ladrão de noodlophile

Weaponized Copyright Documents Used by Threat Actors to Target Key Employees with Noodlophile Stealer

O malware de ladrão de noodlophile, inicialmente descoberto em campanhas que alavancam plataformas falsas de geração de vídeos de IA, evoluiu para uma operação de phishing de lança direcionada que armazia avisos de violação de direitos autorais para se infiltrar em empresas com presenças substanciais do Facebook. Essa variante atualizada, ativa por mais de um … Ler mais

Canadian Financial Regulator Hacked, Exposing Personal Data from Membe

Canadian Financial Regulator Hacked, Exposing Personal Data from Membe

A Canadian financial regulator has disclosed a cybersecurity incident, which has breached the personal information of member firms and their employees. The Canadian Investment Regulatory Organization (CIRO), a national self-regulatory organization covering all investment dealers, mutual fund dealers and trading activity on Canada’s debt and equity marketplaces, revealed it identified the cybersecurity threat on August … Ler mais

Pharma firm Inotiv says ransomware attack impacted operations

Picus Blue Report 2025

American pharmaceutical company Inotiv has disclosed that some of its systems and data have been encrypted in a ransomware attack, impacting the company’s business operations. In a filing to theU.S. Securities and Exchange Commission (SEC), Inotiv says that the cyberattack occurred on August 8 and took action to contain the breach. “On August 8, 2025, … Ler mais

Attacker “Patches” Vulnerability Post Exploitation to Lock Out Competi

Attacker “Patches” Vulnerability Post Exploitation to Lock Out Competi

A threat actor has been observed “patching” a vulnerability post exploitation, likely in a bid to lock out other adversaries and secure exclusive access. The novel tactic was detected by Red Canary researchers in a cluster of activity targeting a flaw in Apache ActiveMQ, an open-source message broker, to gain persistent access on cloud-based Linux … Ler mais

Microsoft: August security updates break Windows recovery, reset

Sophisticated DevilsTongue Spyware Tracks Windows Users Worldwide

Microsoft has confirmed that the August 2025 Windows security updates are breaking reset and recovery operations on systems running Windows 10 and older versions of Windows 11. “After installing the August 2025 Windows security update [..] on any of the client versions mentioned below in the ‘Affected platforms’ section, attempts to reset or recover the … Ler mais

Surto em varreduras da Hacked Cisco, Linksys e Araknis Routers

Surge in Scans From Hacked Cisco, Linksys, and Araknis Routers

Os pesquisadores de segurança cibernética identificaram um aumento significativo nas atividades de varredura maliciosas originárias de equipamentos de rede de consumidores e empresas comprometidas, com foco particular nos modelos Cisco, Linksys e Araknis. A ShadowsServer Foundation, uma importante organização de inteligência de ameaças, relatou observar padrões incomuns de varredura que sugerem comprometimento generalizado desses dispositivos … Ler mais

Legitimate Chrome VPN Extension Turns to Browser Spyware

Legitimate Chrome VPN Extension Turns to Browser Spyware

A popular Google-featured browser extension offering a virtual private network (VPN) service recently turned malicious and is now spying on users’ every move online. Researchers from Koi Security detected that FreeVPN.One, a VPN extension with over 100,000 installs on the Chrome Web Store, a ‘Verified’ status and a 3.8/5 rating from 1110 reviews, has been … Ler mais

Sap 0 dias de exploração vazado por hackers Shinyhunters

SAP 0-Day Exploit Reportedly Leaked by ShinyHunters Hackers

Uma exploração sofisticada direcionada às vulnerabilidades críticas da SAP foi divulgada publicamente pelo notório grupo de hackers Shinyhunters, aumentando significativamente o cenário de ameaças para a empresa SEIVA ambientes. A exploração, que faz as correções de várias vulnerabilidades de dia zero, supostamente vazou através do grupo “Lapsus $ Hunters-Shinyhunters” no telegrama e posteriormente publicado pelo … Ler mais

NY Business Council discloses data breach affecting 47,000 people

Picus Blue Report 2025

The Business Council of New York State (BCNYS) has revealed that attackers who breached its network in February stole the personal, financial, and health information of over 47,000 individuals. As the state’s largest statewide employer association, BCNYS represents over 3,000 member organizations, including chambers of commerce, professional and trade associations, and other local and regional … Ler mais

O novo Android Attack tem como alvo os usuários indianos com subsídio gratuito de eletricidade para instalar malware

New Android Attack Targets Indian Users with Free Electricity Subsidy to Install Malware

A newly identified Android phishing campaign is aggressively targeting Indian users by masquerading as the legitimate PM Surya Ghar: Muft Bijli Yojana, a government initiative approved in February 2024 that offers subsidies for solar rooftop installations, covering up to 60% of costs for systems under 2kW and 40% for those up to 3kW. Os invasores … Ler mais