Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: attack Clear Filter

New FileFix attack weaponizes Windows File Explorer for stealthy commands

A cybersecurity researcher has developed FileFix, a variant of the ClickFix social engineering attack that tricks users into executing malicious commands via the File Explorer address bar in Windows. FileFix, a variation of the social-engineering attack called ClickFix, allows threat actors to execute commands on the victim system through the File Explorer address bar in Windows. Cybersecurity researcher mr.d0x discovered the new method and demonstrated that it could be used in attacks targeti

How Cloudflare blocked a monumental 7.3 Tbps DDoS attack

9 min read This post is also available in Français ไทย and Deutsch In mid-May 2025, Cloudflare blocked the largest DDoS attack ever recorded: a staggering 7.3 terabits per second (Tbps). This comes shortly after the publication of our DDoS threat report for 2025 Q1 on April 27, 2025, where we highlighted attacks reaching 6.5 Tbps and 4.8 billion packets per second (pps). The 7.3 Tbps attack is 12% larger than our previous record and 1 Tbps greater than a recent attack reported by cyber securit

US warns of Iranian cyberattacks and propaganda in wake of airstrikes

TL;DR: The Iranian government has been behind several cyberattacks on US organizations over the years. Now, the Department of Homeland Security has warned of an increased threat of both cyberattacks and physical attacks from the nation following US strikes on its nuclear facilities over the weekend. Homeland Security has warned that low-level cyberattacks against US networks by pro-Iranian hacktivists and cyber actors affiliated with the Iranian government are likely. The advisory adds that th

US Homeland Security warns of escalating Iranian cyberattack risks

The U.S. Department of Homeland Security (DHS) warned over the weekend of escalating cyberattack risks by Iran-backed hacking groups and pro-Iranian hacktivists. This warning was issued as a National Terrorism Advisory System bulletin on Sunday and cautions that the Iranian conflict is causing a "heightened threat environment" in the United States, with "low-level" cyberattacks targeting networks in the U.S. likely. "The likelihood of violent extremists in the Homeland independently mobilizing

Canada says Salt Typhoon hacked telecom firm via Cisco flaw

The Canadian Centre for Cyber Security and the FBI confirm that the Chinese state-sponsored 'Salt Typhoon' hacking group is also targeting Canadian telecommunication firms, breaching a telecom provider in February. During the February 2025 incident, Salt Typhoon exploited the CVE-2023-20198 flaw, a critical Cisco IOS XE vulnerability allowing remote, unauthenticated attackers to create arbitrary accounts and gain admin-level privileges. The flaw was first disclosed in October 2023, when it was

New Linux udisks flaw lets attackers get root on major Linux distros

Attackers can exploit two newly discovered local privilege escalation (LPE) vulnerabilities to gain root privileges on systems running major Linux distributions. The first flaw (tracked as CVE-2025-6018) was found in the configuration of the Pluggable Authentication Modules (PAM) framework on openSUSE Leap 15 and SUSE Linux Enterprise 15, allowing local attackers to gain the privileges of the "allow_active" user. The other security bug (CVE-2025-6019) was discovered in libblockdev, and it enab

WordPress Motors theme flaw mass-exploited to hijack admin accounts

Hackers are exploiting a critical privilege escalation vulnerability in the WordPress theme "Motors" to hijack administrator accounts and gain complete control of a targeted site. The malicious activity was spotted by Wordfence, which had warned last month about the severity of the flaw, tracked under CVE-2025-4322, urging users to upgrade immediately. Motors, developed by StylemixThemes, is a WordPress theme popular among automotive-related websites. It has 22,460 sales on the EnvatoMarket an

CoinMarketCap briefly hacked to drain crypto wallets via fake Web3 popup

CoinMarketCap, the popular cryptocurrency price tracking site, suffered a website supply chain attack that exposed site visitors to a wallet drainer campaign to steal visitors' crypto. On Friday evening, January 20, CoinMarketCap visitors began seeing Web3 popups asking them to connect their wallets to the site. However, when visitors connected their wallets, a malicious script drained cryptocurrency from them. The company later confirmed threat actors utilized a vulnerability in the site's ho

Defending the Internet: how Cloudflare blocked a monumental 7.3 Tbps DDoS attack

9 min read This post is also available in Français Nederlands and Español In mid-May 2025, Cloudflare blocked the largest DDoS attack ever recorded: a staggering 7.3 terabits per second (Tbps). This comes shortly after the publication of our DDoS threat report for 2025 Q1 on April 27, 2025, where we highlighted attacks reaching 6.5 Tbps and 4.8 billion packets per second (pps). The 7.3 Tbps attack is 12% larger than our previous record and 1 Tbps greater than a recent attack reported by cyber

Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider

Cloudflare says it mitigated a record-breaking distributed denial of service (DDoS) attack in May 2025 that peaked at 7.3 Tbps, targeting a hosting provider. DDoS attacks flood targets with massive amounts of traffic with the sole aim to overwhelm servers and create service slowdowns, disruptions, or outages. This new attack, which is 12% larger than the previous record, delivered a massive data volume of 37.4 TB in just 45 seconds. This is the equivalent of about 7,500 hours of HD streaming o

Low-wage tech support workers become a new gateway for cyberattacks

Editor's take: As businesses increasingly rely on outsourced tech support to cut costs, the risks associated with these operations are coming into sharper focus. The threat is no longer just about technical vulnerabilities; it's about the people behind the screens, and the growing pressure they face from both economic hardship and sophisticated cybercriminals. Hackers are increasingly turning the very systems designed to help customers – outsourced tech support and call centers – into powerful

Low-wage support workers become a new gateway for cyberattacks

Editor's take: As businesses increasingly rely on outsourced tech support to cut costs, the risks associated with these operations are coming into sharper focus. The threat is no longer just about technical vulnerabilities; it's about the people behind the screens, and the growing pressure they face from both economic hardship and sophisticated cybercriminals. Hackers are increasingly turning the very systems designed to help customers – outsourced tech support and call centers – into powerful

Webinar: Stolen credentials are the new front door to your network

Cybercriminals no longer need zero-day exploits or other vulnerabilities to breach your systems—these days, they just log in. On July 9th at 2:00 PM ET, BleepingComputer and SC Media will co-host a live webinar with identity security expert Darren Siegel of Specops Software (part of Outpost24), exploring how threat actors are increasingly breaching networks by simply logging in with stolen credentials. The webinar "Stolen credentials: The New Front Door to Your Network" will unpack the real-wo

New Linux udisks flaw lets attackers get root on major Linux distros

Attackers can exploit two newly discovered local privilege escalation (LPE) vulnerabilities to gain root privileges on systems running major Linux distributions. The first flaw (tracked as CVE-2025-6018) was found in the configuration of the Pluggable Authentication Modules (PAM) framework on openSUSE Leap 15 and SUSE Linux Enterprise 15, allowing local attackers to gain the privileges of the "allow_active" user. The other security bug (CVE-2025-6019) was discovered in libblockdev, and it enab

Sitecore CMS exploit chain starts with hardcoded 'b' password

A chain of Sitecore Experience Platform (XP) vulnerabilities allows attackers to perform remote code execution (RCE) without authentication to breach and hijack servers. Sitecore is a popular enterprise CMS used by businesses to create and manage content across websites and digital media. Discovered by watchTowr researchers, the pre-auth RCE chain disclosed today consists of three distinct vulnerabilities. It hinges on the presence of an internal user (sitecore\ServicesAPI) with a hardcoded pa

As grocery shortages persist, UNFI says it’s recovering from cyberattack

Food distribution giant United Natural Foods (UNFI) said it is making “significant progress” in recovering from a cyberattack that occurred almost two weeks ago, as grocery stores across North America reliant on the distributor continue to report food shortages. UNFI said in an update on Sunday that it was restoring its electronic ordering systems, which its customers use to place orders for their grocery stores and supermarkets. The company, which provides more than 30,000 stores across the U

WestJet investigates cyberattack disrupting internal systems

WestJet, Canada's second-largest airline, is investigating a cyberattack that has disrupted access to some internal systems as it responds to the breach. "WestJet is aware of a cybersecurity incident involving internal systems and the WestJet app, which has restricted access for several users," reads a security advisory on WestJet's site. "We have activated specialized internal teams in cooperation with law enforcement and Transport Canada to investigate the matter and limit impacts." "We are

Trend Micro fixes critical vulnerabilities in multiple products

Trend Micro has released security updates to address multiple critical-severity remote code execution and authentication bypass vulnerabilities that impact its Apex Central and Endpoint Encryption (TMEE) PolicyServer products. The security vendor underlines that it has seen no evidence of active exploitation in the wild for any of them. However, immediate application of the security updates is recommended to address the risks. Trend Micro Endpoint Encryption PolicyServer is a central managemen

Fog ransomware attack uses unusual mix of legitimate and open-source tools

Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca. The Fog ransomware operation was first observed last year in May leveraging compromised VPN credentials to access victims’ networks. Post-compromise, they used “pass-the-hash” attacks to gain admin privileges, disabled Windows Defender, and encrypted all files, including virtual machine storage. Later, the threat group was observed

SmartAttack uses smartwatches to steal data from air-gapped systems

A new attack dubbed 'SmartAttack' uses smartwatches as a covert ultrasonic signal receiver to exfiltrate data from physically isolated (air-gapped) systems. Air-gapped systems, commonly deployed in mission-critical environments such as government facilities, weapons platforms, and nuclear power plants, are physically isolated from external networks to prevent malware infections and data theft. Despite this isolation, they remain vulnerable to compromise through insider threats such as rogue em

Onimusha: Way of the Sword brings Japanese cinematic royalty to the samurai fantasy series

While the surprise of a new Resident Evil might have been Capcom's biggest story at SGF, it’s got other series – and other sequels – to show off, like Onimusha. Previously a banner PS2 series, Onimusha spanned four mainline games between 2001 and 2006. We’ve since seen remastered editions of the first two episodes. Still, a true sequel was long overdue, especially after games like Sekiro and Ghost of Tsushima showed a renewed appetite for feudal Japan swordplay. Through a theater presentation d

Brute-force attacks target Apache Tomcat management panels

A coordinated campaign of brute-force attacks using hundreds of unique IP addresses targets Apache Tomcat Manager interfaces exposed online. Tomcat is a popular open-source web server widely used by large enterprises and SaaS providers, while Tomcat Manager is a web-based administration tool that comes bundled with the Tomcat server and helps admins manage deployed web apps via a graphical interface. Tomcat Manager is configured by default to only allow access from localhost (127.0.0.1), with

Zero-click AI data leak flaw uncovered in Microsoft 365 Copilot

A new attack dubbed 'EchoLeak' is the first known zero-click AI vulnerability that enables attackers to exfiltrate sensitive data from Microsoft 365 Copilot from a user's context without interaction. The attack was devised by Aim Labs researchers in January 2025, who reported their findings to Microsoft. The tech giant assigned the CVE-2025-32711 identifier to the information disclosure flaw, rating it critical, and fixed it server-side in May, so no user action is required. Also, Microsoft no

New NailaoLocker ransomware used against EU healthcare orgs

A previously undocumented ransomware payload named NailaoLocker has been spotted in attacks targeting European healthcare organizations between June and October 2024. The attacks exploited CVE-2024-24919, a Check Point Security Gateway vulnerability, to gain access to targeted networks and deploy the ShadowPad and PlugX malware, two families tightly associated with Chinese state-sponsored threat groups. Orange Cyberdefense CERT links the attacks to Chinese cyber-espionage tactics, though there