Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Latest News

Malware Campaign: Porn Viewers Should Hide Webcams

  Any users who visit porn sites should be extra careful now. Porn viewers should hide their cameras. If users do not hide their webcams,...

All the recent news you need to know

Australia Demands Faster Cybersecurity Action to Address Mythos Activity


 

Australian financial regulators are increasingly concerned about the safety of frontier artificial intelligence platforms such as myth, and are reviewing their cybersecurity policies. A strong worded communication issued by the Australian Securities and Investments Commission on Friday stressed that financial institutions should no longer regard artificial intelligence-driven cyber exposure as a future threat, and that defensive controls, governance mechanisms, and operational resilience frameworks must be strengthened immediately. 

According to the regulator, the rapid integration of advanced artificial intelligence technologies within financial ecosystems is increasing the attack surface across critical systems, making robust cybersecurity preparedness an urgent priority. This increased regulatory focus comes as a result of ongoing government engagement with developers of advanced artificial intelligence systems, such as Anthropic, as officials attempt to assess the security implications of increasingly autonomous cyber capabilities. 

Tony Burke's spokesperson confirmed earlier this week that Australian authorities are actively coordinating with software vendors and artificial intelligence firms to ensure they remain informed of newly discovered vulnerabilities and evolving threats affecting critical infrastructure. 

It is unclear whether the government is directly participating in the restricted Mythos Preview platform of Anthropic or is participating only through advisory and intelligence sharing channels. However, the statement underscores growing institutional concerns regarding the operational risks posed by artificial intelligence security tools of the future.

A small group of major technology companies was given access to the platform instead of the platform being made available publicly, a practice that has sparked intense debate within the cybersecurity community. 

Some analysts believe the technology will accelerate vulnerability discovery and defensive research, while others warn that such concentrated offensive capabilities can pose significant systemic risks if compromised or misused. There have also been questions surrounding the credibility of claims made about Mythos’ capabilities, comparing them to previous industry claims about very capable artificial intelligence systems that did not live up to public expectations. 

Concerns raised by the Australian Prudential Regulation Authority have escalated further after it warned that the country's banking sector is falling behind artificial intelligence developments, in particular when it comes to cyber resilience and governance oversight. 

As stated in a formal communication addressed to financial institutions, APRA expressed concern that many existing information security frameworks are not evolving rapidly enough to address the operational risks introduced by frontier AI systems such as Anthropic's Mythos. 

APRA warned that rapidly evolving AI models could significantly increase the speed, scale, and precision of cyber intrusions by enabling automated vulnerability discovery and exploit development. An analysis of the industry by APRA indicated growing concerns regarding the potential material changes to the cybersecurity threat landscape for Australia's financial sector by high-capability AI systems with advanced coding capabilities. 

Project Glasswing, an initiative that involves a number of major technology companies such as Amazon, Microsoft, Nvidia, and Apple, specifically cited Anthropic’s Claude Mythos. A number of security experts have cautioned that systems capable of autonomously analyzing software architectures and identifying vulnerabilities can introduce unprecedented offensive potential if accessed by malicious actors. 

Despite the fact that Anthropic did not respond to the request for comment, regulators continue to assess the implications of artificial intelligence-driven cyber operations, as the scrutiny surrounding the platform continues to intensify. An increasing regulatory focus on frontier artificial intelligence reflects a general shift in cyber risk assessment across the financial sector, in which advanced AI capabilities and critical digital infrastructure are creating an increasingly volatile threat environment as a result of their convergence. 

The Australian government appears increasingly concerned that conventional security models may not be sufficient against AI-assisted intrusion techniques capable of speeding reconnaissance, vulnerability discovery, and large-scale exploitation. 

Since the announcement, there has been considerable debate within the cyber security and artificial intelligence sectors. Supporters have framed Mythos as a potentially transformative platform aimed at accelerating defensive security research and fundamentally transforming vulnerability management. In contrast, critics argue that concentrating such capabilities within a limited ecosystem would pose systemic severe risks if malicious actors were to leak, weaponize or replicate the technology.

A number of people have questioned whether the narrative surrounding Mythos is a reflection of true technological advancement or an attempt to gain market attention through fear-based security messaging. Furthermore, earlier claims regarding advanced AI models in the broader industry have been compared, including statements regarding OpenAI systems which were later criticized for a failure to match the public image of their capabilities with actual performance.

As financial institutions continue integrating AI into critical operations, regulators are signaling that stronger technical oversight, faster defensive adaptation, and deeper executive-level understanding of emerging technologies will become essential to maintaining resilience against increasingly sophisticated cyber threats

Cisco Warns of Network Management Flaw That Can Force Systems Offline Through Remote DoS Attacks




Cisco has disclosed a high-severity vulnerability affecting its network management platforms, Cisco Crosswork Network Controller and Cisco Network Services Orchestrator, which could allow remote attackers to crash vulnerable systems by exhausting their available connection resources.

The security issue, tracked as CVE-2026-20188, carries a CVSS score of 7.5. According to Cisco, the flaw can be exploited remotely without authentication, meaning an attacker does not need valid credentials or prior access to interfere with affected servers.

At the center of the problem is how the platforms manage incoming network connections. Cisco explained that the affected software does not properly control or restrict the rate of connection requests sent to the server. Because of this weakness, a malicious actor can continuously bombard the system with repeated requests until all available connection resources are consumed.

Once the systems run out of resources, both Cisco CNC and NSO can stop responding entirely. Administrators may lose access to management interfaces, while network operations that depend on these platforms can experience abrupt disruption.

Unlike temporary service slowdowns, the systems do not automatically recover after the overload occurs. Cisco stated that administrators must manually reboot the affected platforms to clear the exhausted resources and restore normal operations.

The company internally tracks the issue under Bug ID CSCwr08237. Cisco said the flaw originates from the connection-handling mechanisms used within both products.

Denial-of-service vulnerabilities of this kind are often disruptive because they target system availability rather than data theft. In enterprise environments, orchestration and network control platforms are responsible for coordinating automated processes, monitoring infrastructure, and managing service delivery across large networks. If these systems become unreachable, organizations can temporarily lose visibility into network operations and automated workflows.

Cisco is urging organizations using these products to immediately review their software versions and determine whether their environments are exposed.

For Cisco Crosswork Network Controller, the vulnerability affects version 7.1 and all earlier releases. Cisco confirmed that version 7.2 is not impacted, making upgrades necessary for organizations still operating older deployments.

The issue also affects several release branches of Cisco Network Services Orchestrator. Systems running version 6.3 or earlier remain vulnerable and require immediate updates. Cisco further confirmed that the flaw exists within the 6.4 release branch, although the issue was corrected beginning with version 6.4.1.3. Organizations operating NSO version 6.5 or later are not affected.

Cisco discovered the vulnerability internally while handling a routine Technical Assistance Center support case. At this time, the company’s Product Security Incident Response Team said it has not observed public proof-of-concept exploit code or evidence showing active attacks targeting the flaw.

Even so, the company warned that customers cannot rely on temporary mitigations to reduce exposure. Cisco stated there are currently no workarounds capable of preventing the resource exhaustion issue without affecting legitimate system functionality. Because of this, upgrading to patched software releases remains the only available method for fully securing vulnerable environments.

Security professionals have increasingly warned that resource exhaustion attacks continue to pose operational risks for enterprises because they can interrupt business-critical infrastructure without requiring sophisticated intrusion techniques. Attackers often exploit weaknesses in traffic handling, connection management, or request validation to overwhelm services and force outages.

Cisco is advising affected customers to schedule maintenance windows and deploy the recommended updates as quickly as possible to reduce the risk of service interruptions and administrative lockouts.

French Prosecutors Escalate Elon Musk X Probe to Criminal Investigation

 

French prosecutors have escalated their inquiry into Elon Musk and X into a criminal investigation, widening a case that already included allegations of algorithmic manipulation, improper data extraction, and harmful content on the platform. The move deepens a legal fight that has followed Musk’s company across Europe and adds fresh pressure on X’s leadership as regulators scrutinize how the platform operates inside France. 

Paris prosecutors say the investigation began after complaints in 2025 raised concerns that X’s recommendation systems may have influenced political discourse in France. The case later expanded to examine whether the platform’s chatbot Grok helped generate or spread content such as Holocaust denial, sexually explicit deepfakes, and material involving non-consensual or abusive imagery. French officials have also looked at whether X knowingly facilitated the creation and distribution of such content. 

According to reporting on the case, Musk and former X chief executive Linda Yaccarino were summoned for questioning on April 20, but neither appeared or cooperated with the interview request. Musk has previously rejected the allegations, calling the probe politically motivated and describing earlier enforcement actions as an attack. The French side has continued moving forward despite his objections. 

The investigation has broader implications because it touches on how social media platforms manage algorithms, user data, and AI-generated content. It also reflects a wider regulatory pattern in which governments are testing whether major tech companies can be held responsible for content moderation failures, platform design choices, and possible violations of local law. X has already faced similar scrutiny in other jurisdictions, adding to the company’s legal and reputational burden. 

There is also an international dimension to the dispute. Reports say the U.S. Department of Justice declined to assist French authorities, arguing that France was improperly interfering in an American company’s affairs. That leaves the case positioned not only as a criminal probe of X, but also as a test of how far national regulators can go when platform decisions and AI tools have cross-border effects.

Hackers Attack School Login Pages After Another Instructure Breach

 

Instructure attacked 


Last week, edtech giant Instructure reported a data breach where threat actors stole students’ personal data: names, email addresses, and conversations between students and teachers. Hackers compromised Instructure again, destroying various schools’ login sites to the platform Canvas. Canvas allows schools to handle coursework and assignments and talk with the students. 

ShinyHunters claim responsibility Cybercrime gang ShinyHunters published a message on Canvas login pages of three distinct schools. An analysis of the compromised portals reveal that the hackers deployed an HTML file that compromised the login screens to show their message.  

According to the message, the hackers have threatened to leak the stolen data on May 12, if the organization does not settle the negotiations. 

Instructure’s website was partially online, and returned “too many requests” error. The organization’s portal showed a notice that said it was “currently undergoing scheduled maintenance.” 

Instructure has not replied to TechCrunch’s request for a comment. 

Attack tactic 


Earlier, ShinyHunters claimed accountability for the real hack, publishing it on its leak site, a website that threat actors use to post stolen data and blackmail victims into paying heavy ransoms. The aim is to extort Instructure into paying by not leaking the information on the web publicly. How threat actors compromised the login pages is still not clear. In a conversation with TechCrunch, ShinyHunter said that they couldn’t give specific details but said that this is a second breach. Extortion and data theft After the original breach at Instructure, threat actors claimed to have extorted information from 9,000 schools globally. The stolen files allegedly comprised data of 231 million people. ShinyHunters gang has attacked scores of victims in the last two years, using the same attack tactic: hack, leak, and extort. 

This took place in a unique hacking campaign, where an anonymous group of threat actors attacked systems already infected by an infamous hacking group called TeamPCP. Once the hackers gained access into these systems. After that, they removed TeamPCP hackers and turned off their tools, according to a report by cybersecurity firm SentinelOne.  

The impact 


Following this, the threat actors use their access to install code built to replicate across distinct cloud infrastructure such as a self-spreading worm, steal different credentials, and send the stolen data back to their infrastructure.  

TeamPCP is a criminal gang that has made headlines in recent times. It is due to their high-profile hacks– a broadcast cyberattack against highly used bug scanner tool Trivvy, a breach of the European Commission’s cloud infrastructure, which impacted any organization that used it: LiteLLM and AI recruiting startup Mercor, besides others.

Canvas Learning Platform Outage Disrupts Universities After ShinyHunters Cyberattack

 

Midday classes hit pause when Canvas went offline nationwide following a security alert that triggered emergency repairs. Though the issue began in Texas, ripple effects reached campuses far outside, cutting off vital links to homework and recorded lectures. When servers dropped, so did access - assignments vanished from view, gradebooks locked tight. Some professors switched to paper handouts; others postponed deadlines without warning. 

By evening, partial functions returned, though glitches lingered like static on a radio. Not every login worked smoothly, leaving doubts about full recovery. Reports suggest a connection between the incident and ShinyHunters, a hacking collective lately seen exploiting cloud systems by leveraging weak points in external service providers. Though details remain limited, evidence traces back to prior attacks where stolen information was used as leverage against corporate networks. 

Instead of relying on brute force, the group often manipulates access flaws within shared digital environments. While some breaches go unnoticed at first, forensic analysis later reveals patterns matching earlier intrusions tied to similar tactics. Later came confirmation from Instructure - Canvas's developer - that the platform had entered temporary maintenance mode after the event unfolded. Though restoration of service remained possible, according to officials, institutions using the system faced urgent hurdles just when course activities demanded stability. 

Despite assurances, timing turned problematic for schools depending heavily on seamless access at a pivotal point in the term. Midway through the week, campuses like Southern Methodist University felt the strain as systems went offline. Not far behind, the University of North Texas System faced similar disruptions, slowing down daily functions. At Baylor University, staff worked under pressure - rescheduling classes became a priority. Meanwhile, Tarrant County College saw delays ripple across departments. With email and portals unreliable, instructors adapted on the fly while leadership tried to reconnect threads. 

Because updates lagged, many waited hours just to confirm basic plans. Final exams set for Friday at Southern Methodist University got pushed to Sunday after a widespread system failure left services down. Because of the same national disruption, Baylor University rescheduled its tests too, alerting learners that interruptions might stretch on without clear timing. Officials admitted they lacked answers about how long things would stay broken - access may return in hours or drag into multiple days. 

Across town, the University of North Texas System cut off broad access to Canvas until faculty and tech experts figured out next steps for ongoing classes, scores, and year-end tests. Farther south, Tarrant County College acknowledged its digital crews were checking the breach, watching for ripples among learners and workers alike. Unexpected outages reveal how tightly schools now rely on centralised online learning systems. 

Not only do tools such as Canvas support daily teaching tasks, but they also handle submission tracking, feedback cycles, and course materials distribution. Should access fail, functions stall - particularly under pressure, like mid-semester assessments. Interruptions expose fragile infrastructure beneath routine digital workflows. What stands out is how this event ties into a wider pattern - cyber gangs increasingly going after schools and companies that run online platforms. 

Though they hold vast collections of student records and private details, many learning organizations lack strong digital defenses. Because of these gaps, threat actors see them as easier wins when chasing ransom payments. Still probing the incident, campuses now shift toward regular classes - though officials stay alert for leaked data. This disruption highlights once more that when hackers strike common online systems, ripple effects hit countless people at many schools all at once.

Financial Services Must Prepare for Attacks Originating Inside the Cloud



With the increase in adoption of cloud-based infrastructure, digital banking ecosystems, and interconnected transaction platforms, cybersecurity has evolved from a regulatory requirement to a critical element of operational resilience. 

Payment service providers, banks, insurance companies, and investment firms now process massive amounts of sensitive financial data and transactions across increasingly complex environments, which makes them persistent targets for sophisticated cyber-adversaries. It encompasses the protection of internal networks, cloud workloads, customer records, mobile banking systems, and critical transaction pipelines against unauthorised access, fraud, and compromise of data. 

A comprehensive financial cybersecurity strategy today goes far beyond perimeter defence, in addition to protecting internal networks, cloud workloads, customer records, and mobile banking systems. As threats evolve, preserving the confidentiality, integrity, and accessibility of financial systems becomes increasingly important not only to prevent cyberattacks and financial losses, but also to maintain institutional trust, regulatory compliance, and overall financial system stability. 

Cloud-based applications and distributed financial platforms are simultaneously expanding the attack surface for threat actors targeting the financial sector due to the increasing reliance on cloud-native applications. As explained by Cristian Rodriguez, CrowdStrike Field CTO for the Americas, an increasing frequency of cloud-based intrusions has been directly linked to the rapid migration of financial workloads and services to cloud-based environments. 

By leveraging stolen credentials and compromised digital identities, attackers have bypassed traditional exploitation techniques altogether in many observed incidents. The ability to move discreetly across environments allows adversaries to exfiltrate data, deploy malware, and run ransomware operations at a large scale, as well as abuse cloud infrastructure to perform command and control functions. 

Based on CrowdStrike's 2025 Threat Hunting Report, intrusions targeting the financial sector increased by 26 percent during 2024, with a significant portion associated with credentials acquired through cybercriminal marketplaces operated by access brokers. A significant increase of almost 80 percent in nation-state activity targeting financial institutions was also observed, reflecting growing geopolitical and economic reasons for these attacks. 

There is an increasing focus on obtaining intelligence regarding mergers, acquisitions, investment movements, and broader market trends from threat groups, who use stolen financial data to support strategic influence operations and economic espionage. 

Genesis Panda was observed as an actor in these operations, demonstrating the continued involvement of advanced state-aligned cyber groups in financial-driven cyber attacks. Due to the rapidly expanding digital footprint within the financial sector, cybersecurity has evolved from a technical safeguard to a critical business necessity. The financial sector is increasingly targeted by cybercriminals due to the vast amounts of sensitive customer information, financial credentials, and transaction records it manages. 

By encrypting, segmenting networks, implementing multi-factor authentication, protecting endpoints, and continuously monitoring threats, organizations are ensuring that their security is strengthened to combat evolving threats. As a consequence of cyber incidents, institutions face fraud, ransomware, regulatory penalties, operational disruption, and reputational damage in addition to data theft. 

Increasingly sophisticated attacks have made sophisticated technologies like intrusion detection systems, malware defense, and real-time incident response critical to reducing financial and operational risks. In addition to maintaining consumer trust, cybersecurity plays a key role in regulatory compliance and ensuring compliance with financial standards. 

Several frameworks, including the Bank Secrecy Act, Dodd-Frank Act, Sarbanes-Oxley Act and PCI DSS, require strict controls regarding access management, data protection, and network security throughout financial environments. As threat groups become more sophisticated, their vulnerabilities are becoming more apparent across hybrid cloud environments, particularly where cloud control planes interact with legacy on-premises infrastructures. 

The threat actor Genesis Panda has demonstrated a deep understanding of cloud architectures, exploiting configuration errors and identity vulnerabilities associated with integrating distributed IT systems on a regular basis. In order to keep abreast of evolving threat actors, attack indicators, and emerging configuration risks, financial institutions need to maintain constant engagement with cybersecurity vendors and intelligence providers. 

According to Matt Immler, Okta's Regional Chief Security Officer for the Americas, security teams cannot afford to be complacent as cloud ecosystems grow increasingly complex, and that proactive vendor collaboration is essential for ensuring defensive readiness is maintained. For nearly two years, Okta’s Threat Intelligence Team has provided financial organizations with insights into active cyber campaigns and attack tactics through quarterly intelligence briefings. 

A data-driven approach has proven beneficial to organizations such as NASDAQ, where security teams have been able to remain on top of rapidly evolving threats within the sector, according to Immler. Additionally, briefings have highlighted the increasing activity of groups such as Scattered Spider that exploit human weaknesses in order to gain unauthorized access to enterprise systems by manipulating help desks and identity recovery processes. 

Additionally, CrowdStrike’s Cristian Rodriguez observed that zero-trust security frameworks that have traditionally been applied to identity and endpoint protection need to be extended to cloud workloads and operational infrastructure, to prevent attackers from lateral movement. Additionally, destructive malware such as wiper malware remains a major concern in many sectors. 

In order to detect these attacks, which are intended to permanently destroy data and render systems inoperable, state-backed actors, particularly those linked to China, often use stealth-focused tactics that make them particularly difficult to detect. In particular, Immler noted that adversaries of this type often prioritize long-term persistence, quietly integrating themselves into target environments, remaining undetected for extended periods of time before unleashing disruptive payloads. 

With this increasing challenge, organizations are increasingly finding it difficult to determine the accurate depth of compromise within financial networks, therefore reinforcing the importance of continuous monitoring, integrated threat intelligence, and resilient cloud security architectures. 

Credential Theft Continues to Dominate Financial Attacks 

The financial institutions are experiencing a significant increase in credential-driven intrusions due to sophisticated and targeted phishing campaigns. The threat actors are now utilizing a variety of methods to bypass multi-factor authentication, including adversary-in-the-middle attacks and QR-code phishing operations capable of fooling even experienced employees.

As of mid-2025, Darktrace observed nearly 2.4 million phishing emails across financial sector environments, with almost 30% targeting VIPs and high-privilege users, a reflection of the growing importance of identity compromise as an initial method of access. 

Data Loss Prevention Risks Are Expanding

Organizations have expressed concerns about confidentiality and regulatory exposure as they struggle to safeguard sensitive information, leaving enterprise environments vulnerable to malicious attacks. In October 2025, Darktrace identified more than 214,000 emails with unfamiliar attachments sent to suspected personal accounts within the financial sector. There were also 351,000 emails that carried unfamiliar files that were forwarded to freemail services such as Gmail, Yahoo, and iCloud, reinforcing the concerns regarding the leakage of data, insider risk, and compliance failures regarding sensitive financial records and internal communications. 

Ransomware Operations Are Becoming More Destructive 

The majority of modern ransomware groups prioritize data theft and extortion before attempting to encrypt data. Cybercriminals, including Cl0p and RansomHub, have emphasized the use of trusted file-transfer platforms provided by financial institutions to exfiltrate sensitive information and exert increased reputational and regulatory pressure. Fortra GoAnywhere MFT was targeted by Darktrace research several days before the related vulnerability was publicly disclosed, showing how attackers are taking advantage of vulnerabilities before traditional patching cycles are available. 

Edge Infrastructure Has Become a Primary Target 

As a result of the growing threat of virtual private networking, firewalls, and remote access gateways, researchers have observed pre-disclosure exploitation campaigns affecting Citrix, Palo Alto, and Ivanti technologies, allowing attackers to hijack sessions, gather credentials, and enter critical banking environments lateral. VPN infrastructure is increasingly being described as a concentrated attack surface, particularly where patching delays and weak segmentation give attackers the opportunity to compromise systems more deeply. 

State-Backed Threat Activity Is Intensifying 

It has been reported that state-sponsored campaigns, linked to North Korean actors affiliated with the Lazarus Group, continue to expand across cryptocurrency and fintech organizations. According to investigators, malicious NPM packages, BeaverTail and InvisibleFerret malware, and exploiting React2Shell vulnerabilities were utilized to facilitate credential theft and persistent access. Organizations throughout Europe, Africa, the Middle East, and Latin America have been affected by the activity, demonstrating the global scope and extent of these financial crimes cyber operations. 

Cloud and AI Governance Challenges Are Growing 

There is an increasing perception among financial sector CISOs that cloud complexity, insider exposure, and uncontrolled AI adoption pose systemic security risks. Keeping visibility across distributed, multi-cloud environments while preventing sensitive information from being exposed through emerging artificial intelligence tools has become increasingly challenging. With the rapid integration of AI-driven technologies into operations, governance, compliance oversight and cloud security resilience are increasingly becoming board-level cybersecurity priorities rather than merely technical concerns. 

Building Long-Term Cyber Resilience 

Due to increasing sophistication of cyber threats, financial institutions are adopting resilient security strategies to strengthen cloud, identity, and data protection. AI-powered cybersecurity tools are being used increasingly by organizations across cloud and endpoint environments to enhance threat detection, automate security operations, and expedite incident response.

Meanwhile, financial firms are increasingly relying on third-party platforms, APIs, and connected services, which require stronger identity and access management controls. In addition to addressing resource and expertise gaps, many institutions are turning to managed security services to enhance operational readiness and address resource and expertise gaps. 

A number of industry leaders emphasize that data protection is not simply a compliance obligation, but rather a fundamental business risk, putting greater emphasis on enterprise-wide governance, risk classification, and ownership of sensitive financial information. In light of the increasingly volatile cyber landscape, financial institutions are shifting their focus from reactive defenses to long-term operational resilience in response to this threat. 

Cloud expansion, identity-driven attacks, ransomware evolution, and AI-related governance risks have all contributed to the strategic business priority of cybersecurity rather than an IT function alone. In order to maintain resilience, experts warn that continuous threat intelligence collaboration, enhanced identity security frameworks, proactive cloud governance, and increased incident response capabilities that are capable of responding to rapidly changing attack patterns will be necessary. 

With attackers increasingly exploiting trust, misconfigurations, and human vulnerabilities in an environment, securing critical infrastructure, sensitive data, and digital operations will be a critical component of preserving institutional stability, regulatory confidence, and customer trust.

Featured