Help Net Security

Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable

A newly uncovered fraud syndicate named ALTSRUS is exploiting vulnerable segments of the digital economy by stealing and reselling accounts tied to Electronic Benefit Transfer (EBT), pharmacy prescriptions, and consumer rewards programs.

The Zoom attack you didn't see coming

A threat actor known as ELUSIVE COMET is exploiting Zoom’s remote control feature to deploy malware during fake podcast interviews. The attacker is targeting individuals in the cryptocurrency and DeFi sectors.

Cyber threats against energy sector surge as global tensions mount

Cyberattacks on the energy sector are rising due to geopolitical/tech factors. A July 2024 Sophos report found 67% of 275 surveyed energy/utility leaders experienced ransomware attacks in the last year.

Inside PlugValley: How this AI vishing-as-a-service group operates

A new cybercriminal service called PlugValley is offering AI-powered vishing-as-a-service, significantly lowering the barrier for launching sophisticated voice phishing attacks.

Open-source malware doubles, data exfiltration attacks dominate

There’s been a notable shift in the types of threats targeting software developers, with a total of 17,954 open source malware packages identified in Q1 2025, according to Sonatype.

Siemens Teamcenter vulnerability could allow account takeover (CVE-2025-23363)

A high-severity vulnerability (CVE-2025-23363) in the Siemens Teamcenter product lifecycle management (PLM) software could allow an attacker to steal users’ valid session data and gain unauthorized access to the vulnerable application.

Inconsistent Security Strategies Fuel Third-Party Threats

About 47% of organizations have experienced a data breach or cyberattack over the past 12 months that involved a third-party accessing their network, according to Imprivata and the Ponemon Institute.

BadDNS: Open-source tool checks for subdomain takeovers

BadDNS is an open-source Python tool used to check domain and subdomain takeovers. By examining client-side resources and security headers, it can uncover risks that could lead to malicious code being injected if a trusted domain is compromised.

"Scam Yourself" Attacks Show How Social Engineering is Evolving

Experts have warned of “Scam Yourself” attacks, an advanced form of social engineering targeting users’ routines and trust, and exploiting psychological biases to trick individuals into triggering malicious actions.

Fortinet Fixes FortiOS Zero-Day Exploited by Attackers for Months

Fortinet says attackers exploiting the zero-day in the wild are creating randomly generated admin or local users on compromised devices and are adding them to existing SSL VPN user groups or to new ones they also add.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags