New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth

Cybersecurity researchers have discovered an updated version of a malware loader called Hijack Loader that implements new features to evade detection and establish persistence on compromised systems.
“Hijack Loader released a new module that implements call stack spoofing to hide the origin of function calls (e.g., API and system calls),” Zscaler ThreatLabz researcher Muhammed Irfan V A said in

The Hacker News – ​Read More

Malaysian Airport’s Cyber Disruption a Warning for Asia

Transportation facilities and networks slowly adapt to changes and threats, leaving them vulnerable to agile cyberattackers, as demonstrated by the $10 million ransomware attack.

darkreading – ​Read More

Google Brings End-to-End Encryption to Gmail

The new Google Workspace features will make it easier for enterprise customers to implement end-to-end encryption within Gmail.

darkreading – ​Read More

Microsoft Using AI to Uncover Critical Bootloader Vulnerabilities

Using the Security Copilot tool, Microsoft discovered 20 critical vulnerabilities in widely deployed open-source bootloaders.

The post Microsoft Using AI to Uncover Critical Bootloader Vulnerabilities appeared first on SecurityWeek.

SecurityWeek – ​Read More

Surge in Scans on PAN GlobalProtect VPNs Hints at Attacks

Over the past few weeks, bad actors from different regions have been scanning devices with the VPN for potential vulnerabilities.

darkreading – ​Read More

Best Data Anonymization Tools in 2025

Top Data Anonymization Tools of 2025 to protect sensitive information, ensure compliance, and maintain performance across industries.

Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News – ​Read More

Lawmakers warn of impact HHS firings will have on medical device cybersecurity efforts

As thousands were laid off from the Department of Health and Human Services on Tuesday morning, Congress held a hearing on medical device cybersecurity where experts raised concerns about the ramifications of the firings.

The Record from Recorded Future News – ​Read More

As CISA Downsizes, Where Can Enterprises Get Support?

In this roundtable, cybersecurity experts — including two former CISA executives — weigh in on alternate sources for threat intel, incident response, and other essential cybersecurity services.

darkreading – ​Read More

Developers Wanted: OpenAI Seeks Feedback About Open Model That Will Be Revealed ‘In the Coming Months’

Find out how to provide OpenAI with your input about its upcoming open language model, which Sam Altman stated will be a “reasoning” model like OpenAI o1.

Security | TechRepublic – ​Read More

Check Point Disputes Hacker’s Breach Claims

The security vendor counters that none of the information came directly from its systems but rather was acquired over a period of time by targeting individuals.

darkreading – ​Read More