Ransomware gang Hunters International says it’s shutting down

The cybercriminal group, which said it’s releasing its decryption tools to victims, may be transitioning to new infrastructure under a different name.

Security News | TechCrunch – ​Read More

Dark Web Vendors Shift to Third Parties, Supply Chains

As attacks on software supply chains and third parties increase, more data on critical software and infrastructure services is being advertised and sold on the Dark Web.

darkreading – ​Read More

Russia jails man for 16 years over pro-Ukraine cyberattacks on critical infrastructure

Russian authorities said the man used malware to attack Russian information systems in 2022, blocking access to websites of several local companies and damaging critical infrastructure.

The Record from Recorded Future News – ​Read More

Hunters International ransomware group claims to be shutting down

“After careful consideration and in light of recent developments, we have decided to close the Hunters International project,” the prolific cybercrime gang wrote on its darknet site.

The Record from Recorded Future News – ​Read More

Attackers Impersonate Top Brands in Callback Phishing

Microsoft, PayPal, Docusign, and others are among the trusted brands threat actors use in socially engineered scams that try to get victims to call adversary-controlled phone numbers.

darkreading – ​Read More

IDE Extensions Pose Hidden Risks to Software Supply Chain

Malicious extensions can be engineered to bypass verification checks for popular integrated development environments, according to research from OX Security.

darkreading – ​Read More

Undetectable Android Spyware Backfires, Leaks 62,000 User Logins

A vulnerability in the Catwatchful spyware allowed a security researcher to retrieve the usernames and passwords of over 62,000 accounts.

The post Undetectable Android Spyware Backfires, Leaks 62,000 User Logins appeared first on SecurityWeek.

SecurityWeek – ​Read More

Cisco Warns of Hardcoded Credentials in Enterprise Software

Hardcoded SSH credentials in Cisco Unified CM and Unified CM SME could allow attackers to execute commands as root.

The post Cisco Warns of Hardcoded Credentials in Enterprise Software appeared first on SecurityWeek.

SecurityWeek – ​Read More

N Korean Hackers Drop NimDoor macOS Malware Via Fake Zoom Updates

SentinelLabs uncovers NimDoor, new North Korea-aligned macOS malware targeting Web3 and crypto firms. Exploits Nim, AppleScript, and steals Keychain, browser, shell, and Telegram data.

Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – ​Read More

The Hidden Weaknesses in AI SOC Tools that No One Talks About

If you’re evaluating AI-powered SOC platforms, you’ve likely seen bold claims: faster triage, smarter remediation, and less noise. But under the hood, not all AI is created equal. Many solutions rely on pre-trained AI models that are hardwired for a handful of specific use cases. While that might work for yesterday’s SOC, today’s reality is different.
Modern security operations teams face a

The Hacker News – ​Read More