
Month: September 2025
-
10 Best Cloud Penetration Testing Companies in 2025
As more businesses migrate their infrastructure to the cloud,[cloud penetration testing](https://cybersecuritynews.com/penetration-testing-tools/) has become a critical service.Unlike traditional network tests, cloud…
-
New Infection Chain and ConfuserExBased Obfuscation for DarkCloud Stealer
Unit 42 researchers have identified a shift in the delivery method and obfuscation techniques used for distributing DarkCloud Stealer. The…
-
New Infection Chain and ConfuserExBased Obfuscation for DarkCloud Stealer
Unit 42 researchers have identified a shift in the delivery method and obfuscation techniques used for distributing DarkCloud Stealer. The…
-
Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector…
-
VirusTotal finds hidden malware phishing campaign in SVG files
VirusTotal has discovered a phishing campaign hidden in SVG files that create convincing portals impersonating Colombia’s judicial system that…
-
GhostAction Attack Steals 3,325 Secrets from GitHub Projects
Total 0 Shares [0](https://www.facebook.com/sharer.php?u=https://hackread.com/ghostaction-attack-steals-github-projects-secrets/) [0](https://twitter.com/share?&text=GhostAction%20Attack%20Steals%203%2C325%20Secrets%20from%20GitHub%20Projects&via=HackRead&url=https://hackread.com/ghostaction-attack-steals-github-projects-secrets/) [0](https://pinterest.com/pin/create/bookmarklet/?url=https://hackread.com/ghostaction-attack-steals-github-projects-secrets/&media=https://hackread.com/wp-content/uploads/2025/09/ghostaction-attack-steals-github-projects-secrets-1024×597.jpg) On September 2, 2025, a GitHub user known as Grommash9 committed a new workflow…
-
Critical SAP Vulnerability CVE-2025-42957 Actively Exploited by Hackers
Total 0 Shares [0](https://www.facebook.com/sharer.php?u=https://hackread.com/hackers-exploit-cve-2025-42957-sap-vulnerability/) [0](https://twitter.com/share?&text=Critical%20SAP%20Vulnerability%20CVE-2025-42957%20Actively%20Exploited%20by%20Hackers&via=HackRead&url=https://hackread.com/hackers-exploit-cve-2025-42957-sap-vulnerability/) [0](https://pinterest.com/pin/create/bookmarklet/?url=https://hackread.com/hackers-exploit-cve-2025-42957-sap-vulnerability/&media=https://hackread.com/wp-content/uploads/2025/09/hackers-exploit-cve-2025-42957-sap-vulnerability-1024×597.jpg) Urgent security alert for SAP users! A critical vulnerability (CVE-2025-42957) allows attackers to take…
-
Qantas cuts executive bonuses by 15% after a July data breach
Qantas cuts executive bonuses by 15% after a July cyberattack exposed data of 5.7M people, despite reporting $1.5B profit last…
-
From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira
A sophisticated cyber attack campaign leveraged SEO poisoning to compromise organizations through trojanized IT management tool installers. The attack began…
-
MeetC2 – A serverless C2 framework that leverages Google Calendar APIs as a communication channel
MeetC2 is a PoC C2 tool using Google Calendar to mimic cloud abuse, helping teams test detection, logging, and response.————————————————————————————————————————**Background:**Modern…

