Latest Cybersecurity News and Articles


RaccoonO365 Phishing Service Disrupted, Leader Identified

17 September 2025
Microsoft and Cloudflare have teamed up to take down the infrastructure used by RaccoonO365. The post RaccoonO365 Phishing Service Disrupted, Leader Identified appeared first on SecurityWeek.

DOJ Resentences BreachForums Founder to 3 Years for Cybercrime and Possession of CSAM

17 September 2025
The U.S. Department of Justice (DoJ) on Tuesday resentenced the former administrator of BreachForums to three years in prison in connection with his role in running the cybercrime forum and possessing child sexual abuse material (CSAM). Conor Brian Fitzpatrick (aka Pompompurin), 22, of Peekskill, New York, pleaded guilty to one count of access device conspiracy, one count of access device

RaccoonO365 Phishing Network Shut Down After Microsoft and Cloudflare Disrupt 338 Domains

17 September 2025
Microsoft's Digital Crimes Unit said it teamed up with Cloudflare to coordinate the seizure of 338 domains used by RaccoonO365, a financially motivated threat group that was behind a phishing-as-a-service (Phaas) toolkit used to steal more than 5,000 Microsoft 365 credentials from 94 countries since July 2024. "Using a court order granted by the Southern District of New York, the DCU seized 338

CrowdStrike to Acquire Pangea to Launch AI Detection and Response (AIDR)

16 September 2025
Acquisition extends CrowdStrike’s Falcon platform into AI security, introducing AI Detection and Response (AIDR) to protect enterprise models, agents, and applications across the full AI lifecycle. The post CrowdStrike to Acquire Pangea to Launch AI Detection and Response (AIDR) appeared first on SecurityWeek.

Check Point to Acquire AI Security Firm Lakera

16 September 2025
Move highlights rising demand for AI-native security as enterprises face new risks from generative models and autonomous agents The post Check Point to Acquire AI Security Firm Lakera appeared first on SecurityWeek.

Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover

16 September 2025
Cybersecurity researchers have disclosed multiple critical security vulnerabilities in Chaos Mesh that, if successfully exploited, could lead to cluster takeover in Kubernetes environments. "Attackers need only minimal in-cluster network access to exploit these vulnerabilities, execute the platform's fault injections (such as shutting down pods or disrupting network communications), and perform

Security Leaders Discuss Restaurant Brands International’s Vulnerabilities

16 September 2025
According to research from two ethical hackers, Restaurant Brands International (RBI) has security flaws that could enable a malicious actor to remotely eavesdrop on orders in the drive-through. 

SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids

16 September 2025
A massive ad fraud and click fraud operation dubbed SlopAds ran a cluster of 224 apps, collectively attracting 38 million downloads across 228 countries and territories. "These apps deliver their fraud payload using steganography and create hidden WebViews to navigate to threat actor-owned cashout sites, generating fraudulent ad impressions and clicks," HUMAN’s Satori Threat Intelligence and

Self-Replicating Worm Hits 180+ Software Packages

16 September 2025
At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and publishes those secrets on GitHub, experts warn. The malware, which briefly infected multiple code packages from the security vendor CrowdStrike, steals and publishes even more credentials every time an infected package is installed.

Security Analytics Firm Vega Emerges From Stealth With $65M in Funding 

16 September 2025
Vega provides security analytics and operations solutions designed to help organizations detect and respond to threats. The post Security Analytics Firm Vega Emerges From Stealth With $65M in Funding  appeared first on SecurityWeek.

Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection

16 September 2025
Tel Aviv, Israel-based Ray Security emerged from stealth with $11 million seed funding and a desire to change the way corporate data is protected. The funding was co-led by Venture Guides and Ibex Investors. The post Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection appeared first on SecurityWeek.

Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims

16 September 2025
The notorious cybercrime groups claim they are going dark, but experts believe they will continue their activities. The post Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims appeared first on SecurityWeek.

New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site

16 September 2025
Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic to deliver the StealC information stealer malware. "The observed campaign uses a highly convincing, multilingual phishing site (e.g., fake Facebook Security page), with anti-analysis techniques and advanced obfuscation to evade detection," Acronis security researcher Eliad

Neon Cyber Emerges From Stealth, Shining a Light Into the Browser

16 September 2025
Neon Cyber argues that phishing, social engineering, and insider threats demand protections that follow users into the browser, where most attacks now begin. The post Neon Cyber Emerges From Stealth, Shining a Light Into the Browser appeared first on SecurityWeek.

Rowhammer Attack Demonstrated Against DDR5

16 September 2025
Researchers devise Phoenix, a new Rowhammer attack that achieves root on DDR5 systems in less than two minutes. The post Rowhammer Attack Demonstrated Against DDR5 appeared first on SecurityWeek.

Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack

16 September 2025
Apple on Monday backported fixes for a recently patched security flaw that has been actively exploited in the wild. The vulnerability in question is CVE-2025-43300 (CVSS score: 8.8), an out-of-bounds write issue in the ImageIO component that could result in memory corruption when processing a malicious image file. "Apple is aware of a report that this issue may have been exploited in an

Securing the Agentic Era: Introducing Astrix's AI Agent Control Plane

16 September 2025
AI agents are rapidly becoming a core part of the enterprise, being embedded across enterprise workflows, operating with autonomy, and making decisions about which systems to access and how to use them. But as agents grow in power and autonomy, so do the risks and threats.  Recent studies show 80% of companies have already experienced unintended AI agent actions, from unauthorized system

ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails

16 September 2025
Researchers show how a crafted calendar invite can trigger ChatGPT to exfiltrate sensitive emails. The post ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails appeared first on SecurityWeek.

Fraud Prevention Company SEON Raises $80 Million in Series C Funding

16 September 2025
The company will invest in its AI and real-time detection platform, in global expansion, and in strategic partnerships. The post Fraud Prevention Company SEON Raises $80 Million in Series C Funding appeared first on SecurityWeek.

Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities

16 September 2025
Apple has announced major mobile and desktop platform releases and addressed an exploited bug in older platforms. The post Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities appeared first on SecurityWeek.