VulnHub

AI-Powered Cybersecurity Intelligence

Last Update Check:

Latest Intelligence

Krebs on Security
Alleged ‘Scattered Spider’ Member Extradited to U.S.

Tyler Robert Buchanan, a 23-year-old Scottish man, has been extradited from Spain to the U.S. for his alleged involvement in the Scattered Spider cybercrime group, which is accused of hacking into numerous companies and stealing over $26 million. This case highlights the ongoing challenges of cybercrime and international law enforcement cooperation.


Impact: Dozens of companies in the United States and abroad

In the Wild: Unknown

Age: Recent extradition

Remediation: None available

Published:

darkreading
Prolific RansomHub Operation Goes Dark

The RansomHub operation, known for its ransomware-as-a-service activities, has ceased operations as of March 31, according to security vendors. This development is significant as it may indicate a shift in the ransomware landscape, potentially reducing threats for organizations targeted by this group.


Impact: Not specified

In the Wild: No

Age: Inactive since March 31

Remediation: None available

Ransomware

Published:

darkreading
Former CISA Head Slams Trump Admin Over 'Loyalty Mandate'

Jen Easterly, the former director of CISA, criticized the Trump administration's 'mandate for loyalty' during a panel at RSAC 2025, highlighting concerns about its impact on cybersecurity leadership and integrity. This criticism underscores the tension between political loyalty and the need for objective, expert-driven cybersecurity practices.


Impact: Not specified

In the Wild: Unknown

Age: Discussed in 2025

Remediation: None available

Published:

darkreading
Adversaries Are Toying With US Networks & DC Is Short on Answers

Nation-state actors are increasingly infiltrating US networks, highlighting significant gaps in the government's response and strategy to counteract these threats. This situation raises concerns about national security and the integrity of critical infrastructure.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

darkreading
TheWizards APT Casts a Spell on Asian Gamblers With Novel Attack

TheWizards APT is executing a novel attack targeting Asian gamblers by using SLAAC-spoofing and adversary-in-the-middle techniques to distribute the WizardNet backdoor malware through updates of legitimate software. This method highlights the increasing sophistication of cyber threats and the importance of securing software supply chains.


Impact: Not specified

In the Wild: Yes

Age: Recently disclosed

Remediation: Update software and monitor for suspicious activity.

Published:

The Hacker News
Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

New research highlights how the Model Context Protocol (MCP) can be exploited through prompt injection attacks, while also presenting opportunities for developing security tools to combat such threats. This dual-use potential underscores the importance of understanding vulnerabilities in AI frameworks.


Impact: Model Context Protocol (MCP) by Anthropic

In the Wild: Unknown

Age: Disclosed in April 2025

Remediation: None available

Published:

SecurityWeek
Tech Giants Propose Standard For End-of-Life Security Disclosures

Tech giants have proposed the OpenEoX model, a standardized data format for end-of-life security disclosures that aims to enhance transparency and security in software ecosystems. This initiative is significant as it integrates with existing tools like SBOMs and security advisories, potentially improving the overall security posture of software products.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

darkreading
Debunking Security 'Myths' to Address Common Gaps

Dan Gorecki and Scott Brammer's session at RSAC Conference 2025 aims to challenge security professionals to reassess their security strategies in light of evolving threats. This is significant as it addresses common misconceptions and gaps in security practices that could leave organizations vulnerable.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

darkreading
Phishers Take Advantage of Iberian Blackout Before It's Even Over

Phishers have exploited the recent blackout in Iberia by impersonating Portugal's national airline, targeting Portuguese and Spanish speakers with fraudulent compensation offers for flight disruptions. This highlights the ongoing threat of phishing attacks that capitalize on current events to deceive individuals.


Impact: Portugal's national airline

In the Wild: Yes

Age: Recent activity during the Iberian blackout

Remediation: Be cautious of unsolicited communications, verify the authenticity of offers directly with the airline.

Phishing

Published:

darkreading
DARPA Highlights Critical Infrastructure Security Challenges

Leaders from DARPA and other federal research organizations addressed the significant challenges in securing critical infrastructure at the RSAC Conference 2025. The discussion highlighted the complexities and urgent need for effective solutions to bolster cybersecurity in essential systems.


Impact: Not specified

In the Wild: Unknown

Age: Not specified

Remediation: Not specified

Published:

darkreading
Nvidia's AI Security Offering Protects From Software Landmines

Nvidia has introduced its DOCA Argus security offering, designed to proactively prevent attacks targeting AI architectures before they can cause damage. This innovation is significant as it addresses the growing need for robust security measures in AI systems amidst increasing cyber threats.


Impact: Nvidia AI architectures

In the Wild: Unknown

Age: Recently disclosed

Remediation: Implement DOCA Argus to enhance security against potential attacks.

Published:

SecurityWeek
RSA Conference 2025 Announcement Summary (Day 2)

The RSA Conference 2025 in San Francisco features hundreds of companies showcasing their latest cybersecurity products and services. This event highlights the ongoing innovations and challenges in the cybersecurity landscape, emphasizing the importance of staying updated on security solutions.


Impact: Not specified

In the Wild: Unknown

Age: Not specified

Remediation: None available

Published:

The Hacker News
[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

The article highlights the increasing sophistication of cyber threats targeting identity systems, emphasizing that attackers can now exploit techniques like deepfakes and AI-driven social engineering to bypass traditional security measures. This shift poses significant risks to account integrity and organizational security.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

The Hacker News
Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool

TheWizards, a China-aligned APT group, has been identified using a tool called Spellbinder to conduct adversary-in-the-middle (AitM) attacks by exploiting IPv6 SLAAC spoofing for lateral movement within compromised networks. This technique allows them to intercept network packets, posing a significant threat to network security.


Impact: Not specified

In the Wild: Unknown

Age: Recently disclosed

Remediation: None available

Published:

SecurityWeek
Meta Releases Llama AI Open Source Protection Tools

Meta has introduced new Llama protection tools aimed at enhancing the security of open source AI applications. This initiative is significant as it supports developers in creating safer AI technologies within the open source community.


Impact: Not specified

In the Wild: No

Age: Recently disclosed

Remediation: None available

Published: