Ticker feed
Cybercriminals are targeting transportation companies with sophisticated cargo theft schemes that cause over $30 billion in annual losses. The attacks begin with fake load postings on broker marketplaces, then hackers send malicious emails containing remote access tools to carriers who respond.
Once inside company systems, attackers deploy tools like ScreenConnect and LogMeIn to take control of scheduling and dispatch systems. They book loads under the victim's name, then divert valuable shipments to their own operatives for resale online or overseas.
Proofpoint researchers believe organized crime groups are behind these operations, which have targeted companies across the US, Brazil, Germany, India, and other hotspots since January 2025.
Source: Security Week
Cybercriminals are targeting transportation companies with sophisticated cargo theft schemes that cause over $30 billion in annual losses. The attacks begin with fake load postings on broker marketplaces, then hackers send malicious emails containing remote access tools to carriers who respond.
Once inside company systems, attackers deploy tools like ScreenConnect and LogMeIn to take control of scheduling and dispatch systems. They book loads under the victim's name, then divert valuable shipments to their own operatives for resale online or overseas.
Proofpoint researchers believe organized crime groups are behind these operations, which have targeted companies across the US, Brazil, Germany, India, and other hotspots since January 2025.
Source: Security Week
Security researchers discovered a sophisticated Android banking Trojan called "BankBot-YNRK" targeting users in Indonesia and Southeast Asia. The malware disguises itself as Indonesia's official digital ID app, tricking users into installing it from outside Google Play Store.
Once installed, the Trojan mutes all device alerts—calls, notifications, messages—to avoid detection while stealing cryptocurrency wallet data, banking credentials, and personal information. It specifically targets devices running Android 13 and earlier, exploiting accessibility features to gain complete remote control.
The malware takes real-time screenshots of banking and crypto wallet apps to map their interfaces, then automates fraudulent transactions. It targets Bitcoin, Ethereum, Litecoin, and Solana wallets, extracting seed phrases and private keys without user knowledge.
Source: Dark Reading
Security researchers discovered a sophisticated Android banking Trojan called "BankBot-YNRK" targeting users in Indonesia and Southeast Asia. The malware disguises itself as Indonesia's official digital ID app, tricking users into installing it from outside Google Play Store.
Once installed, the Trojan mutes all device alerts—calls, notifications, messages—to avoid detection while stealing cryptocurrency wallet data, banking credentials, and personal information. It specifically targets devices running Android 13 and earlier, exploiting accessibility features to gain complete remote control.
The malware takes real-time screenshots of banking and crypto wallet apps to map their interfaces, then automates fraudulent transactions. It targets Bitcoin, Ethereum, Litecoin, and Solana wallets, extracting seed phrases and private keys without user knowledge.
Source: Dark Reading
A suspected Chinese state-sponsored group called CL-STA-1009 is targeting business process outsourcing (BPO) companies with sophisticated malware called Airstalk, according to Palo Alto Networks. BPO firms make attractive targets because they handle critical systems for multiple clients simultaneously, giving attackers a gateway to numerous organizations.
The Airstalk malware comes in PowerShell and .NET variants that abuse AirWatch mobile device management APIs to communicate covertly with command servers. The malware steals browser data from Chrome, Edge, and Island Browser, takes screenshots, and harvests cookies and browsing history. Both versions use likely stolen certificates and altered timestamps to avoid detection within corporate networks.
Source: Security Week
A suspected Chinese state-sponsored group called CL-STA-1009 is targeting business process outsourcing (BPO) companies with sophisticated malware called Airstalk, according to Palo Alto Networks. BPO firms make attractive targets because they handle critical systems for multiple clients simultaneously, giving attackers a gateway to numerous organizations.
The Airstalk malware comes in PowerShell and .NET variants that abuse AirWatch mobile device management APIs to communicate covertly with command servers. The malware steals browser data from Chrome, Edge, and Island Browser, takes screenshots, and harvests cookies and browsing history. Both versions use likely stolen certificates and altered timestamps to avoid detection within corporate networks.
Source: Security Week
Check Point researchers discovered multiple severe vulnerabilities in Windows' Graphics Device Interface that allow remote attackers to execute code by tricking users into opening malicious Word documents or images. The most dangerous flaw, CVE-2025-53766, scores 9.8 on the severity scale and requires no user privileges to exploit.
These bugs affect Windows 10, 11, and Office across platforms. Attackers can trigger them through rigged thumbnails or documents, potentially gaining full system control. The vulnerabilities stem from improper handling of Enhanced Metafile formats, causing buffer overflows and memory corruption.
Microsoft patched these issues in recent updates, but the discovery highlights ongoing risks in legacy graphics code. Users should install patches immediately and enable automatic updates to stay protected.
Source: Cyber Security News
Check Point researchers discovered multiple severe vulnerabilities in Windows' Graphics Device Interface that allow remote attackers to execute code by tricking users into opening malicious Word documents or images. The most dangerous flaw, CVE-2025-53766, scores 9.8 on the severity scale and requires no user privileges to exploit.
These bugs affect Windows 10, 11, and Office across platforms. Attackers can trigger them through rigged thumbnails or documents, potentially gaining full system control. The vulnerabilities stem from improper handling of Enhanced Metafile formats, causing buffer overflows and memory corruption.
Microsoft patched these issues in recent updates, but the discovery highlights ongoing risks in legacy graphics code. Users should install patches immediately and enable automatic updates to stay protected.
Source: Cyber Security News
A new Auburn University report reveals that China's state-sponsored 'Typhoon' hacking groups are systematically targeting US critical infrastructure—energy grids, water systems, telecommunications, transportation, and healthcare—to enable large-scale disruption during future conflicts.
The hackers have already penetrated major telecom providers like Verizon and AT&T, accessing data from one million Americans including senior officials. Energy sector intrusions could trigger cascading blackouts across multiple states, while water system compromises threaten public safety and military operations.
Unlike traditional espionage, these campaigns aim to preposition capabilities for strategic disruption, potentially delaying US military deployments in an Indo-Pacific conflict. Current US countermeasures—sanctions, indictments, advisories—haven't deterred China's activities, highlighting gaps in international cyber law and the need for stronger allied coordination.
Source: Industrial Cyber
A new Auburn University report reveals that China's state-sponsored 'Typhoon' hacking groups are systematically targeting US critical infrastructure—energy grids, water systems, telecommunications, transportation, and healthcare—to enable large-scale disruption during future conflicts.
The hackers have already penetrated major telecom providers like Verizon and AT&T, accessing data from one million Americans including senior officials. Energy sector intrusions could trigger cascading blackouts across multiple states, while water system compromises threaten public safety and military operations.
Unlike traditional espionage, these campaigns aim to preposition capabilities for strategic disruption, potentially delaying US military deployments in an Indo-Pacific conflict. Current US countermeasures—sanctions, indictments, advisories—haven't deterred China's activities, highlighting gaps in international cyber law and the need for stronger allied coordination.
Source: Industrial Cyber
Security researcher hxr1 discovered a new way to sneak malware past Windows defenses by hiding it inside AI model files. The attack exploits Windows' built-in AI features, which automatically trust ONNX neural network files used by apps like Windows Hello and Office.
Since Windows doesn't check these AI files for threats, attackers can embed malicious code in the model's data and use Microsoft's own trusted system files to execute it. Security programs see legitimate AI processing instead of a cyberattack.
The researcher suggests this highlights a major blind spot as AI becomes more common. Security tools need updates to scan AI files, and users shouldn't blindly trust AI models downloaded from the internet.
Source: Dark Reading
Security researcher hxr1 discovered a new way to sneak malware past Windows defenses by hiding it inside AI model files. The attack exploits Windows' built-in AI features, which automatically trust ONNX neural network files used by apps like Windows Hello and Office.
Since Windows doesn't check these AI files for threats, attackers can embed malicious code in the model's data and use Microsoft's own trusted system files to execute it. Security programs see legitimate AI processing instead of a cyberattack.
The researcher suggests this highlights a major blind spot as AI becomes more common. Security tools need updates to scan AI files, and users shouldn't blindly trust AI models downloaded from the internet.
Source: Dark Reading
More than half a dozen federal agencies now support banning TP-Link routers, which control roughly 65% of the US router market. Commerce, Defense, and Justice departments opened investigations into the company last year over alleged ties to China's government, despite TP-Link's denials.
The company split in October 2024, creating TP-Link Systems as a US-based entity with 500 American employees. However, officials worry the routers handle sensitive data and remain subject to Chinese influence. TP-Link grew from 20% market share in 2019 to dominating today's market, with over 300 internet providers using their devices.
The Justice Department is also investigating potential predatory pricing. While Trump administration negotiations with China may delay action, the ban proposal sits with the Commerce Department awaiting final decision.
Source: CNET
More than half a dozen federal agencies now support banning TP-Link routers, which control roughly 65% of the US router market. Commerce, Defense, and Justice departments opened investigations into the company last year over alleged ties to China's government, despite TP-Link's denials.
The company split in October 2024, creating TP-Link Systems as a US-based entity with 500 American employees. However, officials worry the routers handle sensitive data and remain subject to Chinese influence. TP-Link grew from 20% market share in 2019 to dominating today's market, with over 300 internet providers using their devices.
The Justice Department is also investigating potential predatory pricing. While Trump administration negotiations with China may delay action, the ban proposal sits with the Commerce Department awaiting final decision.
Source: CNET
Canada's Cyber Centre warned that hacktivists are increasingly targeting internet-accessible industrial control systems across the country. Recent attacks hit a water facility (manipulating pressure values), an oil and gas company (triggering false alarms), and a farm grain silo (altering temperature controls).
The agency received multiple incident reports in recent weeks, with cyber incidents affecting operational technology systems jumping from 49% to 73% in 2024. Hacktivists exploit these vulnerabilities to gain media attention and damage Canada's reputation.
The Cyber Centre urges organizations to inventory all internet-accessible systems, implement VPNs with two-factor authentication where possible, and enhance monitoring practices. Clear coordination between federal, provincial, and municipal governments is essential to protect critical infrastructure.
Source: Industrial Cyber
Canada's Cyber Centre warned that hacktivists are increasingly targeting internet-accessible industrial control systems across the country. Recent attacks hit a water facility (manipulating pressure values), an oil and gas company (triggering false alarms), and a farm grain silo (altering temperature controls).
The agency received multiple incident reports in recent weeks, with cyber incidents affecting operational technology systems jumping from 49% to 73% in 2024. Hacktivists exploit these vulnerabilities to gain media attention and damage Canada's reputation.
The Cyber Centre urges organizations to inventory all internet-accessible systems, implement VPNs with two-factor authentication where possible, and enhance monitoring practices. Clear coordination between federal, provincial, and municipal governments is essential to protect critical infrastructure.
Source: Industrial Cyber
Japanese advertising giant Dentsu disclosed hackers breached its subsidiary Merkle's network, stealing files containing sensitive employee and client data. The attack affected Merkle, a customer experience company with over 16,000 employees across 80+ locations.
Stolen files include personal contact details, salary information, bank data, and National Insurance numbers of current and former UK employees. Clients and suppliers were also impacted. Dentsu shut down some systems after detecting unusual network activity and brought in cybersecurity experts.
The company is notifying affected individuals and offering free dark web monitoring. While Dentsu's Japan operations remain unaffected, the breach will have financial consequences.
Source: SecurityWeek
Japanese advertising giant Dentsu disclosed hackers breached its subsidiary Merkle's network, stealing files containing sensitive employee and client data. The attack affected Merkle, a customer experience company with over 16,000 employees across 80+ locations.
Stolen files include personal contact details, salary information, bank data, and National Insurance numbers of current and former UK employees. Clients and suppliers were also impacted. Dentsu shut down some systems after detecting unusual network activity and brought in cybersecurity experts.
The company is notifying affected individuals and offering free dark web monitoring. While Dentsu's Japan operations remain unaffected, the breach will have financial consequences.
Source: SecurityWeek
Security researchers have uncovered a new phishing technique where cybercriminals embed invisible Unicode characters in email subject lines to evade automated security systems. The attackers use MIME encoding with soft hyphens to fragment trigger words like "password" while keeping them readable to humans.
When viewed in email clients, subjects appear garbled in message lists but render normally when opened. The technique breaks up keywords that would typically alert security filters, allowing fake "password expiration" emails to reach inboxes.
The Internet Storm Center discovered this method targeting credential theft through fake webmail login pages. The invisible characters effectively turn "password" into "p-a-s-s-w-o-r-d" at the code level, fooling detection systems while appearing normal to victims.
Source: Cybersecurity News
Security researchers have uncovered a new phishing technique where cybercriminals embed invisible Unicode characters in email subject lines to evade automated security systems. The attackers use MIME encoding with soft hyphens to fragment trigger words like "password" while keeping them readable to humans.
When viewed in email clients, subjects appear garbled in message lists but render normally when opened. The technique breaks up keywords that would typically alert security filters, allowing fake "password expiration" emails to reach inboxes.
The Internet Storm Center discovered this method targeting credential theft through fake webmail login pages. The invisible characters effectively turn "password" into "p-a-s-s-w-o-r-d" at the code level, fooling detection systems while appearing normal to victims.
Source: Cybersecurity News