Former President Donald Trump has signed an executive order aimed at preventing individual states from implementing their own regulations on artificial intelligence (AI). This decision comes amid growing calls from bipartisan members of Congress for stricter oversight of AI technologies, which many believe lack sufficient governance. The executive order may lead to a patchwork of regulations across states, complicating compliance for companies developing AI solutions. This move raises concerns about the balance between fostering innovation in AI and ensuring public safety, as unregulated AI could pose risks in various sectors, including healthcare and security. The implications of this order could significantly affect how AI is developed and deployed across the country.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Financial institutions are facing increasing pressure to combat money mule schemes, where individuals unknowingly or knowingly facilitate fraud by transferring stolen funds. The article outlines five distinct 'mule personas' that banks should be vigilant about, suggesting that a more proactive approach is necessary to detect and prevent these types of fraud. By understanding the characteristics and behaviors of these personas, banks can better identify potential threats and take action before losses occur. This shift from a defensive to an offensive strategy is essential in protecting both the institutions and their customers from financial crime. The ongoing evolution of these schemes makes it crucial for banks to adapt their methods and stay ahead of fraudsters.
Security Affairs
Hackers have taken advantage of a zero-day vulnerability in Gogs, a self-hosted Git service, leading to the compromise of approximately 700 servers that are accessible over the internet. This vulnerability allows attackers to execute code remotely, posing a significant risk to organizations and individuals using this platform to manage their Git repositories. Gogs, which is known for its lightweight and easy-to-deploy nature, is now under scrutiny as users scramble to secure their systems. The incident highlights the importance of promptly applying security updates and monitoring for unusual activity. Without swift action, affected servers could lead to data breaches or unauthorized access to sensitive information.
A recent campaign has targeted developers through the Visual Studio Code (VSCode) Marketplace, where 19 malicious extensions have been found since February. These extensions cleverly disguise malware within dependency folders, hiding it in fake PNG files. Developers using these compromised extensions are at risk, as the malware can potentially compromise their systems and projects. This incident raises alarms about the safety of third-party tools within development environments. Users are urged to be cautious when installing extensions and to verify their sources to avoid falling victim to such attacks.
Researchers at Wiz have discovered a serious vulnerability in Gogs, a self-hosted Git service. This flaw allows attackers to bypass a previously reported remote code execution (RCE) vulnerability that was disclosed last year. Although the specifics of the exploitation have not been detailed, the revelation indicates that the vulnerability has been exploited for months without a patch available to fix it. This situation poses significant risks for organizations that rely on Gogs for their version control, as it could lead to unauthorized access and potentially severe security breaches. Users of Gogs need to stay vigilant and consider alternative security measures while waiting for a fix.
Infosecurity Magazine
OpenAI has reported improvements in their defensive models, particularly with the release of GPT-5.1-Codex-Max, which achieved a 76% success rate in capability assessments. Alongside this progress, the company has raised concerns about potential cyber-risks that could arise from the use of advanced AI technologies. The implications of these risks are significant, as they could affect various sectors that rely on AI for security and operational efficiency. Organizations using AI systems need to remain vigilant and proactive in addressing these emerging threats to safeguard their data and infrastructure. As AI capabilities grow, so do the challenges in ensuring their secure deployment and use.
Infosecurity Magazine
Researchers have found 19 malicious extensions for Visual Studio Code that were designed to distribute malware. These extensions used a legitimate npm package to hide the malicious code within dependency folders, making detection difficult. The attack primarily targets developers who use Visual Studio Code, a popular code editor, potentially compromising their projects and systems. Users who have downloaded these extensions may unknowingly expose their work to hackers, which could lead to data breaches or further infections. This incident raises concerns about the security of third-party extensions and the need for vigilant monitoring of software sources.
Hackread – Cybersecurity News, Data Breaches, AI, and More
Researchers at Zimperium zLabs have discovered a new Android malware called DroidLock, which behaves like ransomware. This malicious software can lock users out of their devices and steal sensitive information by tricking them into providing their credentials through phishing tactics. Additionally, DroidLock has the capability to stream users' screens and activate their front cameras through VNC, raising serious privacy concerns. This malware primarily targets Android users, making it essential for them to remain vigilant about their device security and be cautious of suspicious links or applications. The emergence of DroidLock emphasizes the ongoing risks associated with mobile malware and the need for users to adopt strong security practices.
Danielle Hillmer, a former employee of Accenture, has been charged with fraud related to cybersecurity practices. The allegations state that she knowingly misled clients about the company's cloud platform, claiming it met the Department of Defense's requirements when it did not. This situation raises concerns about the integrity of cybersecurity measures in handling sensitive government data. If proven guilty, Hillmer could face serious penalties, and the case underscores the importance of transparency in cybersecurity services, especially for clients in critical sectors like defense. This incident may also prompt reviews of compliance protocols within companies that serve government contracts.
Cybersecurity Blog | SentinelOne
CyberVolk has reemerged with its new VolkLocker ransomware-as-a-service, which comes with some notable features but also a significant design flaw. Researchers have identified a major vulnerability that could allow security teams to mitigate attacks more effectively. This flaw raises concerns for businesses and organizations that could be targeted by this ransomware, as it may lead to increased incidents of data theft and disruption. Cyber defenders need to be vigilant and prepare for potential attacks stemming from this new variant. Understanding the weaknesses in VolkLocker could help in developing strategies to counteract its effects and protect sensitive information.
MITRE has released the results of its 2025 ATT&CK Enterprise Evaluations, where eleven cybersecurity companies participated. Some of these companies reported achieving 100% detection and coverage rates during the evaluation process. This evaluation is significant as it provides insights into the effectiveness of various security solutions against known tactics and techniques used by attackers. By assessing how well these companies can detect and respond to simulated cyber threats, organizations can make more informed decisions about their cybersecurity investments. The results may influence how businesses approach their security strategies moving forward.
BleepingComputer
Hackers have taken advantage of a serious unpatched zero-day vulnerability in Gogs, a widely used self-hosted Git service, allowing them to execute remote code on exposed servers. This breach has impacted around 700 Internet-facing instances, putting sensitive data at risk and potentially leading to further attacks. The vulnerability is particularly concerning because it remains unpatched, leaving many servers vulnerable to exploitation. Users of Gogs should take immediate action to secure their systems, as the lack of a fix means attackers can easily compromise servers. This incident serves as a reminder for organizations to prioritize timely software updates and security measures to protect their infrastructure.
In April 2025, a significant data breach at the Pierce County Library compromised the personal information of around 340,000 individuals, including library patrons, employees, and their family members. The stolen data may include sensitive details, raising concerns about identity theft and privacy violations. As libraries often hold extensive personal information, this incident highlights the vulnerability of public institutions to cyberattacks. The breach not only affects those directly involved but also puts the library's reputation and trustworthiness at risk. Community members are urged to monitor their accounts and take precautions to protect their personal information.
Hackread – Cybersecurity News, Data Breaches, AI, and More
A recent phishing campaign has targeted around 6,000 companies, sending over 40,000 fraudulent emails that appeared to come from trusted services like SharePoint and DocuSign. These emails contained malicious links disguised by reputable redirect services, making it easier for scammers to trick recipients into clicking. The scale and speed of this attack raise concerns about the vulnerability of businesses to such tactics, which exploit the trust users place in well-known platforms. Companies need to be vigilant, as these phishing attempts can lead to data breaches or financial loss if employees fall for the scams. Ensuring proper training and awareness around phishing tactics is crucial for organizations to protect themselves.
Cybersecurity experts are reporting a surge in malware attacks exploiting a serious vulnerability in the React library, known as React2Shell. This vulnerability allows attackers to execute code remotely without authentication, putting many applications at risk. React is widely used for building user interfaces, meaning a broad range of developers and companies could be affected. The situation is concerning as it opens the door for various types of malware to be deployed against unsuspecting users. Companies using React should take immediate action to assess their systems and implement security measures to protect against these attacks.