ALERT

ACTIVE THREATS: Chrome zero-day CVE-2025-0971 under active exploitation — update immediately  •  CISA ED-25-02: Ivanti Connect Secure emergency directive issued  •  VoltZite ransomware targeting North American power grid operators        ACTIVE THREATS: Chrome zero-day CVE-2025-0971 under active exploitation — update immediately  •  CISA ED-25-02: Ivanti Connect Secure emergency directive issued  •  VoltZite ransomware targeting North American power grid operators

HACKWIRE
About
LIVE
FEATURED_STORYLIVE
🟣MalwareMEDIUM

New 'Zombie ZIP' technique lets malware slip past security tools

A new technique dubbed "Zombie ZIP" helps conceal payloads in compressed files specially created to avoid detection from security solutions such as antivirus and endpoint detection and response (EDR) products. [...]

via BleepingComputer·
READ FULL STORY

Latest Stories

🟣MalwareMEDIUM

New BeatBanker Android malware poses as Starlink app to hijack devices

A new Android malware named BeatBanker can hijack devices and tricks users into installing it by posing as a Starlink app on websites masquerading as the official Google Play Store. [...]

via BleepingComputer·
🟡VulnerabilitiesMEDIUM

New ‘BlackSanta’ EDR killer spotted targeting HR departments

For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta. [...]

via BleepingComputer·
🔴BreachesCRITICAL

MediSecure Health Network Exposes 14 Million Patient Records in Catastrophic Data Breach

A ransomware-linked breach at MediSecure Health Network has exposed the personal health information of over 14 million patients across 38 US states. The attack, attributed to the BlackSuit ransomware group, compromised EHR databases containing Social Security numbers, diagnoses, and insurance data.

via BleepingComputer·
RansomwareCRITICAL

VoltZite Ransomware Targets Power Grid Operators Across North America in Coordinated Campaign

A sophisticated ransomware campaign dubbed VoltZite is actively targeting electric utility operators across the US and Canada, exploiting unpatched OT/SCADA vulnerabilities. Three utilities have confirmed operational disruptions, and CISA has issued an emergency advisory urging immediate action.

via Dragos·
🟡VulnerabilitiesCRITICAL

Google Patches Actively Exploited Chrome Zero-Day in V8 Engine — Update Now

Google has released an emergency Chrome update addressing CVE-2025-0971, a type confusion vulnerability in the V8 JavaScript engine being actively exploited in the wild. The flaw allows remote code execution with no user interaction beyond visiting a malicious web page.

via Google Security Blog·
🔵PolicyCRITICAL

CISA Issues Emergency Directive ED-25-02: Ivanti Connect Secure Exploitation Ongoing

The Cybersecurity and Infrastructure Security Agency has issued Emergency Directive ED-25-02, ordering all federal civilian agencies to immediately disconnect or apply mitigations to Ivanti Connect Secure and Policy Secure appliances amid confirmed exploitation by multiple threat actors.

via CISA·
🟣MalwareHIGH

AI-Generated Phishing Campaigns Achieve 60% Higher Click Rates Than Human-Written Lures

New research from Proofpoint and Hoxhunt reveals that AI-generated spear-phishing emails now outperform human-crafted attacks by 60% in click-through rates. The campaigns leverage real-time OSINT data to generate hyper-personalized lures at industrial scale.

via Proofpoint·
🔴BreachesHIGH

2.1 Billion Records Exposed in AWS S3 Misconfiguration Sweep Conducted by Security Researcher

Security researcher Jeremiah Fowler has discovered and responsibly disclosed a series of misconfigured AWS S3 buckets exposing over 2.1 billion records across hundreds of companies. The data includes customer PII, API keys, internal source code, and HR records.

via VPNMentor·
🟢Tools

Nuclei v3.4 Released: Community Adds 2,400 New Templates Including Cloud and AI Attack Surface Coverage

ProjectDiscovery has released Nuclei v3.4, a major update to the open-source vulnerability scanner featuring 2,400 new community-contributed templates, a cloud asset discovery engine, and the first purpose-built templates targeting AI/LLM application security misconfigurations.

via ProjectDiscovery·
🟣MalwareHIGH

APT41 Resurfaces With Novel Malware Framework Targeting Defense Contractors in 12 Countries

Mandiant has published a detailed report on a new APT41 campaign deploying a previously undocumented modular malware framework called DUSTPAN across defense industrial base targets. The campaign focuses on intellectual property theft related to advanced propulsion and hypersonic technology.

via Mandiant·
🔴BreachesHIGH

Bybit Cryptocurrency Exchange Loses $47M in Sophisticated Hot Wallet Compromise

Dubai-based Bybit confirmed that attackers drained $47 million in ETH, BTC, and stablecoins from its hot wallet infrastructure. The attack, one of the most technically sophisticated exchange hacks of 2025, exploited a multi-signature wallet vulnerability via a supply chain compromise.

via Chainalysis·
🟡VulnerabilitiesCRITICAL

Critical Memory Corruption Bugs in ThreadX RTOS Affect Billions of Embedded Devices

Researchers at Forescout have discovered seven critical memory corruption vulnerabilities in ThreadX, the most widely-deployed real-time operating system for embedded and IoT devices. The flaws affect an estimated 6.2 billion devices including medical equipment, industrial controllers, and consumer electronics.

via Forescout·
🔵Policy

EU Cyber Resilience Act Enters Enforcement Phase: Manufacturers Face Fines Up to 15 Million Euros

The European Union's Cyber Resilience Act (CRA) has entered its first enforcement phase, requiring all connected device manufacturers selling in the EU to demonstrate baseline cybersecurity properties. Non-compliant products face market withdrawal orders and fines up to 15 million euros or 2.5% of global turnover.

via EU Agency for Cybersecurity (ENISA)·
🟣MalwareHIGH

Researchers Uncover 287 Malicious npm Packages Stealing Developer Credentials in Ongoing Supply Chain Attack

Socket Security has identified 287 malicious packages on the npm registry that impersonate popular libraries to steal developer credentials, environment variables, and AWS/cloud tokens. The packages have accumulated over 4 million combined downloads before detection.

via Socket Security·
🟢ToolsHIGH

Independent Security Audit of Top 8 Password Managers Reveals Alarming Memory Handling Flaws

A comprehensive independent audit commissioned by the Open Source Security Foundation found that 6 of 8 major password managers—including two market leaders—retain decrypted password vault contents in process memory for longer than necessary, exposing credentials to memory scraping attacks.

via OpenSSF·
🟣MalwareHIGH

Banshee 3.0 macOS Stealer Evades Gatekeeper Using Stolen Apple Developer Signatures

A new variant of the Banshee macOS information stealer is circulating in the wild, signed with legitimate (subsequently revoked) Apple developer certificates. The malware targets browser credentials, cryptocurrency wallets, and macOS Keychain contents, and was distributed via trojanized productivity apps on GitHub.

via Check Point Research·
🔵Policy

Global Cybersecurity Workforce Gap Reaches 4.8 Million: New ISC2 Study Highlights Diversity Crisis

ISC2's 2025 Cybersecurity Workforce Study finds the global shortage of cybersecurity professionals has grown to 4.8 million, up 15% from 2024. The report identifies AI skill gaps and a severe decline in entry-level hiring as primary drivers, with workforce diversity declining for the first time in five years.

via ISC2·