Skip to content
No results
  • Sample Page
Security Beyond Taboo
Security Beyond Taboo
NEWS
  • Security News

Europol dismantles SIM farm network behind 49 million fake accounts (Operation SIMCARTEL)

Introduction: a cross-border takedown of a SIM-box CaaS platform European law enforcement has disrupted a cybercrime-as-a-service (CaaS) operation that rented out phone numbers from a vast SIM-box infrastructure to help criminals register and run tens of millions of fake online…

  • admin
  • October 19, 2025
NEWS
  • Security News

CVSS 10 flaw in Adobe Experience Manager Forms is being exploited — what you need to know and do now

Introduction: what’s the problem? A critical misconfiguration vulnerability in Adobe Experience Manager (AEM) Forms on JEE, tracked as CVE-2025-54253 and rated CVSS 10.0, is being actively exploited in the wild. The flaw enables pre-authentication compromise of AEM Forms servers and…

  • admin
  • October 18, 2025
NEWS
  • Security News

Operation “Zero Disco”: Hackers exploit Cisco SNMP flaw (CVE-2025-20352) to plant rootkits on switches

Introduction — the problem in a nutshell Cisco IOS/IOS XE devices are under active attack via CVE-2025-20352, a stack overflow in the SNMP subsystem. Once exploited (with the required credentials), attackers can execute code as root and implant a stealthy…

  • admin
  • October 18, 2025
NEWS
  • Security News

Dairy Farmers of America confirms June ransomware attack leaked personal data

Introduction: what happened Dairy Farmers of America (DFA)—a farmer-owned U.S. dairy cooperative—confirmed that a June 2025 cyberattack led to the exposure of personal data for 4,546 individuals, including employees and co-op members. Stolen data may include names, SSNs, driver’s license/ID…

  • admin
  • October 18, 2025
NEWS
  • Security News

Fuji Electric V-SFT HMI Configurator Flaws Could Let Attackers Compromise Engineering Workstations

Introduction: what’s vulnerable and why it matters Multiple file-parsing vulnerabilities in Fuji Electric V-SFT—the configuration/development software used to program MONITOUCH HMIs—can be triggered when an engineer opens a malicious V-SFT project file. Successful exploitation can lead to arbitrary code execution…

  • admin
  • October 18, 2025
NEWS
  • Security News

North Korean Hackers Adopt “EtherHiding” to Stash Malware in Smart Contracts

Introduction: A new spin on bulletproof hosting Google’s Threat Intelligence Group (GTIG) reports that a DPRK-linked cluster (UNC5342) is now using EtherHiding—a technique that stores second-stage malware inside public blockchain smart contracts on chains like BNB Smart Chain and Ethereum.…

  • admin
  • October 18, 2025
NEWS
  • Security News

Sotheby’s Data Breach: Hackers Exfiltrate SSNs and Financial Details From the World-Famous Auction House

Introduction: what happened Sotheby’s has disclosed a data breach following a July 24, 2025 intrusion in which an unknown actor removed files from the company’s environment. Subsequent review confirmed exposure of highly sensitive personal data—including full names, Social Security numbers…

  • admin
  • October 18, 2025
NEWS
  • Security News

Gladinet fixes actively exploited zero-day in CentreStack/Triofox: what happened and how to respond

Introduction: a zero-day chain from LFI to RCE Gladinet has released security updates for its CentreStack (and hosted equivalents) after researchers observed in-the-wild exploitation of a new bug tracked as CVE-2025-11371. The flaw is an unauthenticated Local File Inclusion (LFI)…

  • admin
  • October 18, 2025
NEWS
  • Uncategorized

Microsoft revokes 200+ code-signing certificates to disrupt Vanilla Tempest’s Rhysida ransomware campaign

Introduction: what happened and why it matters Microsoft says it disrupted an ongoing ransomware operation by revoking more than 200 fraudulently used code-signing certificates tied to Vanilla Tempest (aka Vice Spider / Vice Society). The actor signed fake Microsoft Teams…

  • admin
  • October 17, 2025
Prev
1 2 3 4
Next

Security News from the World:

  • Inside the messy reality of Microsoft 365 management: What the new MSP survey revealsOctober 20, 2025
  • Experian fined €2.7M in the Netherlands for mass collection and use of personal data under GDPROctober 20, 2025
  • TikTok “ClickFix” Campaigns Keep Pushing Infostealers via One-Line PowerShell LuresOctober 20, 2025
  • Everest ransomware group claims Collins Aerospace breach tied to EU airport chaos — what we know and what it meansOctober 19, 2025
  • China accuses U.S. of hacking its National Time Service Center: why “Beijing Time” is critical infrastructureOctober 19, 2025
  • Silver Fox extends Winos 4.0 operations to Japan & Malaysia via “HoldingHands” RATOctober 19, 2025
  • New .NET “CAPI Backdoor” Targets Russian Auto & E-Commerce via Phishing ZIPsOctober 19, 2025
  • Google Ads abused to promote fake Homebrew/LogMeIn/TradingView sites that install macOS infostealersOctober 19, 2025
  • Europol dismantles SIM farm network behind 49 million fake accounts (Operation SIMCARTEL)October 19, 2025
  • CVSS 10 flaw in Adobe Experience Manager Forms is being exploited — what you need to know and do nowOctober 18, 2025

Copyright © 2026 - Security Beyond Taboo®