FBI Uses Malware’s Own ‘Self-Delete’ Trick to Erase Chinese PlugX From US Computers

Law enforcement turns the PlugX malware’s own self-delete mechanism against it, nuking the China-linked trojan from thousands of US machines.

The post FBI Uses Malware’s Own ‘Self-Delete’ Trick to Erase Chinese PlugX From US Computers appeared first on SecurityWeek.

SecurityWeek – ​Read More

Black Basta-Style Cyberattack Hits Inboxes with 1,165 Emails in 90 Minutes

A recent cyberattack, mimicking the tactics of the notorious Black Basta ransomware group, targeted one of SlashNext’s clients.…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

No new funding in EU plan to tackle ransomware attacks against hospitals

The European Commission has a new “action plan” to reduce the health sector’s vulnerability to cyberattacks. For funding, it only offers healthcare entities guidance on opportunities available elsewhere.

The Record from Recorded Future News – ​Read More

5 Emerging AI Threats Australian Cyber Pros Must Watch in 2025

AI cloning and deepfakes rank among the top challenges for Australian cybersecurity professionals in 2025.

Security | TechRepublic – ​Read More

CISA: Second BeyondTrust Vulnerability Added to KEV Catalog

BeyondTrust has patched all cloud instances of the vulnerability and has released patches for self-hosted versions.

darkreading – ​Read More

DORA’s Deadline Looms: Navigating the EU’s Mandate for Threat Led Penetration Testing

With DORA’s January 2025 compliance deadline approaching, financial institutions must embrace rigorous testing, tailored threat profiles, and continuous vigilance to safeguard against cyber threats.

The post DORA’s Deadline Looms: Navigating the EU’s Mandate for Threat Led Penetration Testing appeared first on SecurityWeek.

SecurityWeek – ​Read More

US, Japan and S. Korea urge crypto industry to take action against North Korean hackers

The governments said North Korea’s notorious Lazarus Group hackers “continue to demonstrate a pattern of malicious behavior in cyberspace by conducting numerous cybercrime campaigns to steal cryptocurrency and targeting exchanges, digital asset custodians, and individual users.”

The Record from Recorded Future News – ​Read More

Cyber Insights 2025: Open Source and Software Supply Chain Security

Open source software (OSS) is a prime target for supply chain cyberattacks and protecting it remains a major challenge.

The post Cyber Insights 2025: Open Source and Software Supply Chain Security appeared first on SecurityWeek.

SecurityWeek – ​Read More

Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks

Microsoft’s monthly patches cover Hyper-V NT Kernel Integration VSPs, Git in Visual Studio, and more.

Security | TechRepublic – ​Read More

Google OAuth Flaw Leads to Account Takeover When Domain Ownership Changes

A vulnerability in Google’s OAuth implementation allows takeover of old employee accounts when domain ownership changes.

The post Google OAuth Flaw Leads to Account Takeover When Domain Ownership Changes appeared first on SecurityWeek.

SecurityWeek – ​Read More