Latest Intelligence
Hackers Win $260,000 on First Day of Pwn2Own Berlin 2025
The first day of Pwn2Own Berlin 2025 saw participants collectively earn $260,000 by successfully exploiting vulnerabilities in various platforms, including Red Hat, Windows, Oracle VirtualBox, Docker Desktop, and AI systems. This event highlights the ongoing security challenges and the financial incentives for discovering and reporting such vulnerabilities.
Turkish APT Exploits Chat App Zero-Day to Spy Kurds
The Turkish APT group known as Marbled Dust or Sea Turtle exploited a zero-day vulnerability in the Output Messenger chat application to conduct espionage against military targets, particularly focusing on Iraqi Kurds. Despite the vulnerability being publicly known and labeled an n-day, the attackers continued their operations against those who had not applied necessary patches.
Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List
Andrei Tarasov, once a prominent figure in the Angler exploit kit scene, has faced a drastic turn in his life, leading to his detention and a return to Russia, a country he had publicly criticized. His story highlights the complexities and repercussions faced by individuals involved in cybercrime, particularly those on law enforcement's radar.
Big Steelmaker Halts Operations After Cyber Incident
Nucor, a major steel manufacturer, has halted operations following a cyber incident, with the investigation still in its early stages. The company has not disclosed details regarding the nature of the breach or the identity of the threat actor involved.
Valarian Unveils Data Management Platform Designed for Government Use
Valarian has launched a new data management platform aimed specifically at government use, following their previous Acra platform. This initiative focuses on addressing data management challenges by isolating access to systems, thereby mitigating the risks associated with potential compromises.
International Crime Rings Defraud US Gov't Out of Billions
International crime rings are exploiting stolen and forged identities to fraudulently obtain funds from the US government, resulting in losses amounting to hundreds of billions of dollars each year. This widespread issue highlights the vulnerabilities in identity verification processes and the significant financial impact on government resources.
Attackers Target Samsung MagicINFO Server Bug, Patch Now
Attackers are exploiting a patch bypass vulnerability (CVE-2025-4632) in Samsung MagicInfo 9 Server, which was disclosed last year. This highlights the ongoing risks associated with unaddressed vulnerabilities in widely used software systems.
Critical SAP NetWeaver Vuln Faces Barrage of Cyberattacks
The article highlights the critical vulnerability CVE-2025-31324 in SAP NetWeaver, which is currently being exploited by cybercriminals. Researchers are urging SAP administrators to apply patches promptly to mitigate potential attacks.
Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
Meta plans to train its AI models using user data from the EU without obtaining explicit consent, prompting a cease-and-desist letter from the privacy non-profit noyb. This situation raises significant concerns about user privacy and consent in the context of AI development.
Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data
Coinbase faced a $20 million ransom demand after rogue contractors were bribed to access and leak customer data from its internal systems. The incident highlights significant risks associated with insider threats and data security within organizations.
Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
Coinbase has reported a data breach involving the theft of account information for less than 1% of its users, attributed to bribed customer support agents. This incident highlights the vulnerabilities in insider threats within organizations handling sensitive customer data.
RSAC 2025: AI Everywhere, Trust Nowhere
The article discusses how AI is rapidly evolving and transforming the cybersecurity landscape, yet the regulatory and security frameworks have not adapted accordingly. This discrepancy poses significant risks as organizations struggle to trust AI-driven systems amidst increasing vulnerabilities.
RealDefense Partner Program Surpasses $100M in Annual Revenue
The RealDefense Partner Program has achieved a significant milestone by surpassing $100 million in annual revenue, highlighting its successful growth and impact in the cybersecurity sector. This achievement underscores the increasing demand for cybersecurity solutions and the effectiveness of RealDefense's partnerships.
Sednit abuses XSS flaws to hit gov't entities, defense companies
Operation RoundPress has been identified as a targeted attack utilizing XSS vulnerabilities to compromise webmail software, primarily aiming at email accounts of governmental organizations in Ukraine and defense contractors within the EU. This operation highlights the ongoing threat to sensitive information within critical sectors and the need for enhanced cybersecurity measures.
Threat landscape for industrial automation systems in Q1 2025
The Kaspersky ICS CERT report for Q1 2025 highlights emerging trends and statistics regarding threats to industrial automation systems, emphasizing the increasing sophistication of cyber attacks in this sector. The findings underscore the critical need for enhanced security measures to protect vital industrial infrastructures.