In Other News: iOS 26 Deletes Spyware Evidence, Shadow Escape Attack, Cyber Exec Sold Secrets to Russia

Other noteworthy stories that might have slipped under the radar: Everest group takes credit for Collins Aerospace hack, Maryland launches VDP, gamers targeted with red teaming tool and RAT.

The post In Other News: iOS 26 Deletes Spyware Evidence, Shadow Escape Attack, Cyber Exec Sold Secrets to Russia appeared first on SecurityWeek.

SecurityWeek – ​Read More

The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently

Does your organization suffer from a cybersecurity perception gap? Findings from the Bitdefender 2025 Cybersecurity Assessment suggest the answer is probably “yes” — and many leaders may not even realize it.
This disconnect matters. Small differences in perception today can evolve into major blind spots tomorrow. After all, perception influences what organizations prioritize, where they

The Hacker News – ​Read More

Toys ‘R’ Us Canada Customer Information Leaked Online

The customer information published on the dark web includes names, addresses, phone numbers, and email addresses.

The post Toys ‘R’ Us Canada Customer Information Leaked Online appeared first on SecurityWeek.

SecurityWeek – ​Read More

3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation

A malicious network of YouTube accounts has been observed publishing and promoting videos that lead to malware downloads, essentially abusing the popularity and trust associated with the video hosting platform for propagating malicious payloads.
Active since 2021, the network has published more than 3,000 malicious videos to date, with the volume of such videos tripling since the start of the

The Hacker News – ​Read More

Baohuo Android Malware Hijacks Telegram Accounts via Fake Telegram X

New Android malware Baohuo hijacks Telegram X accounts, stealing data and controlling chats. Over 58,000 devices infected, mainly in India and Brazil.

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More – ​Read More

Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks

In files downloaded from the internet, HTML tags referencing external paths could be used to leak NTLM hashes during file previews.

The post Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks appeared first on SecurityWeek.

SecurityWeek – ​Read More

Think passwordless is too complicated? Let’s clear that up

Think passwordless is too complicated? Let's clear that up

By Janet Ho, Cisco Duo

Why passwords are still a problem

We’ve relied on passwords for years to protect our online accounts, but they’ve also become one of the easiest ways attackers get in. Many people reuse or simplify passwords, or even write them down because it’s hard to remember so many. That makes it easier for attackers to take advantage of stolen or reused credentials, and even worse, one stolen password can sometimes unlock several accounts.  

Did you know? According to Forbes, 244 million passwords were leaked on a single crime forum, and half of the world’s internet users have been exposed to reuse attacks

That’s why passwordless authentication is becoming so important. It lets you prove who you are without typing a password, using things like your fingerprint, face, or a security key on your device. This makes sign-ins easier for you and harder for attackers to fake, helping protect against phishing and stolen or weak passwords. 

Clearing up the biggest myths about passwordless 

Even with all these benefits, a few common myths still make people hesitate about going passwordless. Let’s clear them up. 

Think passwordless is too complicated? Let's clear that up

It’s easy to assume that “passwordless” means skipping an important layer of protection. 

In reality, passwordless is multi-factor. It verifies who you are using both your device and something only you can provide like your fingerprint or PIN. 

When you log in, your device unlocks a unique digital key that never leaves it. Your fingerprint, face or PIN is only checked locally, not sent online. This makes it nearly impossible for attackers to steal or fake your login, the same strength as MFA, just without the password hassle. 

Think passwordless is too complicated? Let's clear that up

A PIN might look like a password, but it doesn’t work the same way. Instead of being sent over the internet or stored on a company server, your PIN only unlocks your device locally. That means there’s nothing for attackers to steal or guess remotely. 

Even a short PIN can be strong because your device limits how many times someone can try it. An attacker would have to physically possess your device to even attempt it. If you want extra protection, you can use a biometric like a fingerprint or face scan instead. 

Think passwordless is too complicated? Let's clear that up

Biometrics sometimes get a bad reputation because people remember early flaws or scary headlines like phones that could be fooled by photos or fake fingerprints. Those issues came from outdated, low-cost sensors that were easier to trick. 

Modern systems like Face ID and Windows Hello use 3D mapping, infrared light and “liveness” detection to make spoofing extremely difficult. In passwordless authentication, your fingerprint or face simply unlocks a private key stored on your device. That key never leaves your phone or computer and can’t be reused on other sites. Because biometrics are checked locally, not online, they block the remote attacks that plague passwords. 

Think passwordless is too complicated? Let's clear that up

Some worry that using biometrics means handing over personal data that could be stolen. That concern usually comes from news about biometric surveillance, where information is stored in large central databases.  

Passwordless authentication works differently. Your biometric stays on your device and is only used to unlock a local security key — it’s never uploaded, shared, or compared against a massive database. 

The difference matters. Surveillance biometrics identify you remotely by matching your data against millions of records. Authentication biometrics, like Face ID or Windows Hello, simply confirm that you are the one holding your own device. That local check is what keeps your biometric private and safe. 

Think passwordless is too complicated? Let's clear that up

A truly phishing-resistant passwordless system has a few built-in protections against modern phishing techniques. 

Each login uses a unique digital key that stays on your device and never gets sent to the website. Even if someone builds a fake login page, there’s nothing to steal or reuse. That’s because passwordless systems check that you’re on the real website, not a look-alike page. Your browser does that check automatically before letting your device complete the login. 

And only trusted software on your device can trigger your authenticator to approve a login. Hidden apps or push-phishing attempts can’t reach it. 

Together, these protections make phishing far harder and, in most cases, stop it completely.  

The bottom line: Easier, safer sign-ins for everyone 

Passwordless isn’t just a new way to log in. It’s a safer, simpler way to protect what matters most. Whether at home or at work, taking small steps toward passwordless helps reduce risk and makes security easier for everyone. 

Learn more about the myths and read the full report on Busting Passwordless Myths

Take the next step and check out 5 Step Path to Passwordless ebook

Cisco Talos Blog – ​Read More

I was prepared for an eSIM transfer nightmare, but this carrier changed my mind completely

Transferring your phone number can be a mess, especially if you’re going from iPhone to Android. Here’s how I flipped the script.

Latest news – ​Read More

ANY.RUN Recognized as Threat Intelligence Company of the Year 2025  

Here at ANY.RUN, we know how crucial threat intelligence is for ensuring strong cybersecurity, especially in organizations. 

This year, our efforts in promoting this data-driven approach to solving the needs of businesses were praised at CyberSecurity Breakthrough Awards. ANY.RUN was recognized as the Threat Intelligence Company of the Year 2025. 

New Milestone on the Way to Safer Future 

This wasn’t an easy win: the CyberSecurity Breakthrough Awards is a prestigious international program with an independent panel of industry experts in the jury. Our sincere thanks go to them for acknowledging our impact on leading innovative enterprise-grade solutions forward. 

But above all, we’d like to thank our global community of clients, contributors, and partners. It’s a shared win for all of us. 

ANY.RUN’s TI Lookup providing IOCs related to Agent Tesla threats submitted in Germany

Threat Intelligence Changes Everything 

Earlier this year, ANY.RUN’s solutions gained global acclaim and won multiple awards, like Globee Awards and Cybersecurity Excellence Awards. But this victory stands out, as it recognizes our influence as a company and reflects our approach focused on the integrity of a unified workflow.  

TI Feeds accumulate threat data and enrich your system with it for expanded threat coverage 

ANY.RUN’s Threat Intelligence Feeds and Threat Intelligence Lookup are redefining how SOCs operate in today’s threat landscape. Instead of relying on outdated indicators from post-incident reports, ANY.RUN leverages insights from a global community of over 500,000 analysts and 15,000 organizations actively analyzing the latest threats in our Interactive Sandbox. 

Gain 3x boost in performance rates 
Acclaimed TI solutions for your SOC



Contact us 


 Continuously updated threat intelligence helps SOC teams gain automation and data needed to stay ahead of evolving attacks. Security leaders can make faster, more confident decisions, strengthen proactive defense strategies, and maximize the ROI of their security stack. 

  • Access 24x more IOCs per incident for wider visibility: Live data on global attacks ensures comprehensive threat coverage of new malware and phishing. 
  • Enrich your system with 99% unique IOCs to reduce workload: In-depth intel cuts Tier 1/Tier 2 investigations and promotes confident decisions. 
  • Accelerate MTTR by 21 min per case for faster action: Threat behavior context for IOCs/IOAs/IOBs provides insights for streamlined incident mitigation. 

About ANY.RUN 

Over 500,000 cybersecurity professionals and 15,000+ organizations across finance, manufacturing, healthcare, and other industries trust ANY.RUN and accelerate their malware investigations worldwide. 

Faster triage and response with ANY.RUN’s Interactive Sandbox: Safely detonate suspicious files, observe malicious behavior in real time, and gain insights for faster, confident security decisions. 

Enhance threat detection with Threat Intelligence Lookup and Threat Intelligence Feeds: Tap into actionable, up-to-date intelligence to detect and understand emerging threats instantly. 

Experience how ANY.RUN’s solutions can power your SOC: start 14-day trial 

The post ANY.RUN Recognized as Threat Intelligence Company of the Year 2025   appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack

Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX Registry and the Microsoft Extension Marketplace, underscoring how developers have become a prime target for attacks.
The sophisticated threat, codenamed GlassWorm by Koi Security, is the second such supply chain attack to hit the DevOps space within a span

The Hacker News – ​Read More