Cybersecurity

From Phishing to Malware: AI Becomes Russia’s New Cyber Weapon in War on Ukraine 

From Phishing to Malware: AI Becomes Russia’s New Cyber Weapon in War on Ukraine 

Russian hackers’ adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level in the first half of 2025 (H1 2025), the country’s State Service for Special Communications and Information Protection (SSSCIP) said.
“Hackers now employ it not only to generate phishing messages, but some of the malware samples we have analyzed show clear signs of being generated

Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme 

Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme 

Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain unauthorized access to any account, including administrators, and take control of susceptible sites.
The authentication bypass vulnerability, tracked as CVE-2025-5947 (CVSS score: 9.8), affects the Service Finder Bookings, a WordPress plugin bundled with the

Smashing Security podcast #438: When your mouse turns snitch, and hackers grow a conscience 

Smashing Security podcast #438: When your mouse turns snitch, and hackers grow a conscience 

Your computer’s mouse might not be as innocent as it looks – and one ransomware crew has a crisis of conscience that nobody saw coming.

We talk about how something as ordinary as a web page could turn your mouse into a surprisingly nosey neighbour, and why ransomware gangs need to think carefully about their reputation.

All this and more is discussed in episode 436 of the “Smashing Security” podcast with cybersecurity veteran Graham Cluley, and his special guest Geoff White.

Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks 

Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks 

Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that are designed to redirect users to sketchy sites.
“Site visitors get injected content that was drive-by malware like fake Cloudflare verification,” Sucuri researcher Puja Srivastava said in an analysis published last week.
The website security company

Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave 

Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave 

Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into an attack weapon, using it to deliver a known malware called Gh0st RAT to targets.
The activity, observed by cybersecurity company Huntress in August 2025, is characterized by the use of an unusual technique called log poisoning (aka log injection) to plant a web shell on a web

LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem 

LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem 

Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring continued shifts in the cyber threat landscape.
The coalition is seen as an attempt on the part of the financially motivated threat actors to conduct more effective ransomware attacks, ReliaQuest said in a report shared with The Hacker News.
“Announced shortly

Step Into the Password Graveyard… If You Dare (and Join the Live Session) 

Step Into the Password Graveyard… If You Dare (and Join the Live Session) 

Every year, weak passwords lead to millions in losses — and many of those breaches could have been stopped.
Attackers don’t need advanced tools; they just need one careless login.
For IT teams, that means endless resets, compliance struggles, and sleepless nights worrying about the next credential leak.
This Halloween, The Hacker News and Specops Software invite you to a live webinar: “

Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now 

Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now 

Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol (MCP) server that could allow attackers to achieve code execution.
The vulnerability, tracked as CVE-2025-53967 (CVSS score: 7.5), is a command injection bug stemming from the unsanitized use of user input, opening the door to a scenario where an attacker can

OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks 

OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks 

OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware development.
This includes a Russian‑language threat actor, who is said to have used the chatbot to help develop and refine a remote access trojan (RAT), a credential stealer with an aim to evade detection. The operator also used several ChatGPT accounts to

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X