Cybersecurity

U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack 

U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack 

Law enforcement authorities in the U.K. have arrested two teen members of the Scattered Spider hacking group in connection with their alleged participation in an August 2024 cyber attack targeting Transport for London (TfL), the city’s public transportation agency.
Thalha Jubair (aka EarthtoStar, Brad, Austin, and @autistic), 19, from East London and Owen Flowers, 18, from Walsall, West Midlands

CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428 

CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of two sets of malware that were discovered in an unnamed organization’s network following the exploitation of security flaws in Ivanti Endpoint Manager Mobile (EPMM).
“Each set contains loaders for malicious listeners that enable cyber threat actors to run arbitrary code on the compromised server,”

SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers 

SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers 

SonicWall is urging customers to reset credentials after their firewall configuration backup files were exposed in a security breach impacting MySonicWall accounts.
The company said it recently detected suspicious activity targeting the cloud backup service for firewalls, and that unknown threat actors accessed backup firewall preference files stored in the cloud for less than 5% of its

CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader 

CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader 

Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs to deliver post-exploitation tools like Cobalt Strike and AdaptixC2, and a remote access trojan known as PureHVNC RAT.
“CountLoader is being used either as part of an Initial Access Broker’s (IAB) toolset or by a ransomware affiliate with ties to the LockBit,

SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers 

SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers 

Cybersecurity researchers have discovered two new malicious packages in the Python Package Index (PyPI) repository that are designed to deliver a remote access trojan called SilentSync on Windows systems.
“SilentSync is capable of remote command execution, file exfiltration, and screen capturing,” Zscaler ThreatLabz’s Manisha Ramcharan Prajapati and Satyam Singh said. “SilentSync also extracts

How CISOs Can Drive Effective AI Governance 

How CISOs Can Drive Effective AI Governance 

AI’s growing role in enterprise environments has heightened the urgency for Chief Information Security Officers (CISOs) to drive effective AI governance. When it comes to any emerging technology, governance is hard – but effective governance is even harder. The first instinct for most organizations is to respond with rigid policies. Write a policy document, circulate a set of restrictions, and

Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions 

Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions 

Google on Wednesday released security updates for the Chrome web browser to address four vulnerabilities, including one that it said has been exploited in the wild.
The zero-day vulnerability in question is CVE-2025-10585, which has been described as a type confusion issue in the V8 JavaScript and WebAssembly engine.
Type confusion vulnerabilities can have severe consequences as they can be

Smashing Security podcast #435: Lights! Camera! Hacktion! 

Smashing Security podcast #435: Lights! Camera! Hacktion! 

When “bad actors” stop being hackers and start being… actual actors.

This week, Graham and special guest Jenny Radcliffe play “Hacker or Ham?” (yes, Steven Seagal, we’re looking at you), before diving into a campaign which saw an Iranian gang luring Israeli performers with fake casting calls for a serious film.

We unpack why positive lurescan short-circuit scepticism just as effectively as fear.

Plus, the UK’s ICO says students are increasingly hacking their own schools.

Meanwhile, Graham heads to 1960s Oxford with Endeavour, while Jenny investigates the Wirral’s mysterious “Catman”.

All this, and more, in episode 435 of the “Smashing Security” podcast.

TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks 

TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks 

The threat actor known as TA558 has been attributed to a fresh set of attacks delivering various remote access trojans (RATs) like Venom RAT to breach hotels in Brazil and Spanish-speaking markets.
Russian cybersecurity vendor Kaspersky is tracking the activity, observed in summer 2025, to a cluster it tracks as RevengeHotels.
“The threat actors continue to employ phishing emails with invoice

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X