Welcome to Cyberlobi News Hub

Top News Sources

Hacker News

Krebs on Security

  • Patch Tuesday, June 2025 Edition
    by BrianKrebs on June 11, 2025 at 12:10 am

    Microsoft today released security updates to fix at least 67 vulnerabilities in its Windows operating systems and software. Redmond warns that one of the flaws is already under active attack, and that software blueprints showing how to exploit a pervasive Windows bug patched this month are now public. 

  • Proxy Services Feast on Ukraine’s IP Address Exodus
    by BrianKrebs on June 5, 2025 at 10:44 pm

    Ukraine has seen nearly one-fifth of its Internet space come under Russian control or sold to Internet address brokers since February 2022, a new study finds. The analysis indicates large chunks of Ukrainian Internet address space are now in the hands of proxy and anonymity services nested at some of America’s largest Internet service providers (ISPs).

  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
    by BrianKrebs on May 30, 2025 at 1:55 am

    The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams, commonly known as “pig butchering.” In January 2025, KrebsOnSecurity detailed how Funnull was being used as a content delivery network that catered to cybercriminals seeking to route their traffic through U.S.-based cloud providers.

  • Pakistan Arrests 21 in ‘Heartsender’ Malware Service
    by BrianKrebs on May 28, 2025 at 5:41 pm

    Authorities in Pakistan have arrested 21 individuals accused of operating “Heartsender,” a once popular spam and malware dissemination service that operated for more than a decade. The main clientele for HeartSender were organized crime groups that tried to trick victim companies into making payments to a third party, and its alleged proprietors were publicly identified by KrebsOnSecurity in 2021 after they inadvertently infected their computers with malware.

  • Oops: DanaBot Malware Devs Infected Their Own PCs
    by BrianKrebs on May 22, 2025 at 9:53 pm

    The U.S. government today unsealed criminal charges against 16 individuals accused of operating and selling DanaBot, a prolific strain of information-stealing malware that has been sold on Russian cybercrime forums since 2018. The FBI says a newer version of DanaBot was used for espionage, and that many of the defendants exposed their real-life identities after accidentally infecting their own systems with the malware.

Security Week

Help Net Security

  • Infostealer crackdown: Operation Secure takes down 20,000 malicious IPs and domains
    by Help Net Security on June 11, 2025 at 5:43 pm

    More than 20,000 malicious IP addresses and domains used by information-stealing malware were taken down during an international cybercrime crackdown led by INTERPOL. Called Operation Secure, the effort ran from January to April 2025 and involved law enforcement from 26 countries. Teams tracked down servers, mapped physical networks, and carried out targeted takedowns. Law enforcement seizing equipment (Source: INTERPOL) Before the operation began, INTERPOL worked with cybersecurity companies Group-IB, Kaspersky, and Trend Micro to create … More → The post Infostealer crackdown: Operation Secure takes down 20,000 malicious IPs and domains appeared first on Help Net Security.

  • Connectwise is rotating code signing certificates. What happened?
    by Zeljka Zorz on June 11, 2025 at 2:41 pm

    Connectwise customers who use the company’s ScreenConnect, Automate, and ConnectWise RMM solutions are urged to update all agents and/or validate that the update has been deployed by Friday, June 13 at 8:00 p.m. ET, or risk disruptions. The reason for the warning is the imminent revocation of digital certificates that have been used to sign previous Connectwise software builds, “due to concerns raised by a third-party researcher about how ScreenConnect could potentially be misused by … More → The post Connectwise is rotating code signing certificates. What happened? appeared first on Help Net Security.

  • SpecterOps Privilege Zones enables security teams to define logical access boundaries
    by Industry News on June 11, 2025 at 1:22 pm

    SpecterOps introduced Privilege Zones, a new addition to its flagship BloodHound Enterprise platform. Privilege Zones enable teams to define custom security boundaries around business-critical resources and enforce least privilege access continuously in on-prem, cloud and hybrid environments. IT and security teams go to great lengths to configure identity properly, but the sheer magnitude and complexity of enterprise cloud and on-prem environments, along with the proliferation of human and non-human identities, make this an impossible task. … More → The post SpecterOps Privilege Zones enables security teams to define logical access boundaries appeared first on Help Net Security.

  • Trustwise protects AI deployments from security risks
    by Industry News on June 11, 2025 at 1:15 pm

    Trustwise introduced Harmony AI, a runtime trust layer and control tower designed for enterprises deploying fleets of generative and agentic AI systems. Harmony AI embeds “trust as code” directly into AI systems, empowering CISOs, developers, and AI leaders to shield their AI deployments from security risks as they scale. Co-developed with leading financial and healthcare institutions over the past two years, Harmony AI delivers enterprise-grade security and control in production, achieving 90-100% runtime alignment with … More → The post Trustwise protects AI deployments from security risks appeared first on Help Net Security.

  • Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053)
    by Zeljka Zorz on June 11, 2025 at 11:13 am

    For June 2025 Patch Tuesday, Microsoft has fixed 66 new CVEs, including a zero-day exploited in the wild (CVE-2025-33053). Also, Adobe Commerce and Magento Open Source users are urged to update quickly. About CVE-2025-33053 CVE-2025-33053 is a remote code execution vulnerability in Web Distributed Authoring and Versioning (WebDAV), which is a protocol for extending HTTP protocol functionality for interacting with files. Flagged by Check Point researchers, the vulnerability has been exploited in March 2025 to … More → The post Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053) appeared first on Help Net Security.