Source: securityaffairs.com – Author: Pierluigi Paganini Medusind, a medical billing provider, disclosed a data breach that occurred in December 2023 and affected over 360,000 individuals. Medusind...
Day: January 9, 2025
Ukrainian Cyber Alliance destroyed the connectivity of Russian ISP Nodex – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A group of hacktivists, known as the Ukrainian Cyber Alliance, breached Russian ISP Nodex, stole sensitive documents, and wiped systems....
U.S. CISA adds Ivanti Connect Secure, Policy Secure, and ZTA Gateways flaw to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti Connect Secure, Policy Secure, and ZTA Gateways flaw to its Known...
SOC Scalability: How AI Supports Growth Without Overloading Analysts – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Scaling up a security operations center (SOC) is inevitable for many organizations. How AI supports growth without overloading analysts. Scaling...
IPVanish VPN Review: Is It Really as Secure as Claimed? – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Luis Millares We may earn from vendors via affiliate links or sponsorships. This might affect product placement on our site, but not...
Zero-day exploits plague Ivanti Connect Secure appliances for second year running – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones The cybersecurity industry is urging those in charge of defending their orgs to take mitigation efforts “seriously” as Ivanti battles...
Security pros baited with fake Windows LDAP exploit traps – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Security researchers are once again being lured into traps by attackers, this time with fake exploits of serious Microsoft security...
Japanese police claim China ran five-year cyberattack campaign targeting local orgs – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood Japan’s National Police Agency and Center of Incident Readiness and Strategy for Cybersecurity have confirmed third party reports of attacks...
Database tables of student, teacher info stolen from PowerSchool in cyberattack – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson A leading education software maker has admitted its IT environment was compromised in a cyberattack, with students and teachers’ personal...
I tried hard, but didn’t fix all of cybersecurity, admits outgoing US National Cyber Director – Source: go.theregister.com
Source: go.theregister.com – Author: Brandon Vigliarolo The outgoing leader of the United States’ Office of the National Cyber Director has a clear message for whomever President-elect...
Fancy Product Designer Plugin Flaws Expose WordPress Sites – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Two significant security vulnerabilities have been identified in the Fancy Product Designer premium plugin, which allows the customization of WooCommerce products. The...
Japan Faces Prolonged Cyber-Attacks Linked to China’s MirrorFace – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A prolonged cyber-attack campaign targeting Japanese organizations and individuals since 2019 has been attributed to the China-linked threat actor MirrorFace, also known...
PowerSchool Reportedly Pays Ransom to Prevent Student Data Leak – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: North American school software provider PowerSchool has reportedly paid a ransom to prevent attackers from releasing stolen data of students and teachers....
EU Commission Liable for Breaching EU’s Own Data Protection Rules – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The EU Commission has been found liable for breaching the EU’s own data protection rules in a landmark ruling that could open...
Government Launches £1.9m Initiative to Boost UK’s Cyber Resilience – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The UK government has provided more details of a new scheme designed to help the nation better protect itself from cyber-threats. It...
Critical Ivanti Zero-Day Exploited in the Wild – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The UK’s National Cyber Security Centre (NCSC) and its US equivalent have urged Ivanti customers to take immediate action to mitigate two...
Green Bay Packers Pro Shop Data Breach Compromises Customers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The Green Bay Packers disclosed on Monday a data breach affecting their official online retail store, packersproshop.com, after discovering malicious code designed...
How Do Hackers Exploit Your Vulnerabilities? – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși At the time of writing, there are hundreds of thousands of publicly known vulnerabilities. These range from critical flaws that could...
Seven Trends to Watch for in 2025 – Source:levelblue.com
Source: levelblue.com – Author: hello@alienvault.com. *No generative AI was used by the author Rapid Rate of Change Still Powering Technology Here we are a quarter of...
HexaLocker V2: Skuld Stealer Paving the Way prior to Encryption – Source:cyble.com
Source: cyble.com – Author: rohansinhacyblecom. Key Takeaways HexaLocker was first discovered in mid-2024, with version 2 introducing significant updates and enhanced functionalities. HexaLocker V2 includes a...
Lithuania’s New Cyber Command is a Strategic Step Towards National and NATO Cybersecurity Resilience – Source:cyble.com
Source: cyble.com – Author: Ashish Khaitan. Overview On January 1, Lithuania marked a pivotal moment in its national defense strategy with the official launch of the...
Darktrace to Acquire Incident Investigation Firm Cado Security – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Darktrace on Thursday announced the “proposed acquisition” of UK-based incident investigation and response firm Cado Security. Financial terms have not...
Medical Billing Firm Medusind Says Data Breach Impacts 360,000 People – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Florida-based medical and dental billing and revenue cycle management company Medusind has revealed that a data breach discovered in December...
GFI KerioControl Firewall Vulnerability Exploited in the Wild – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Threat actors are exploiting a recently disclosed GFI KerioControl firewall vulnerability that leads to one-click remote code execution (RCE), threat...
SonicWall Patches Authentication Bypass Vulnerabilities in Firewalls – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire SonicWall this week announced patches for multiple vulnerabilities in its firewalls, including two high-severity flaws that could lead to authentication...
The ‘Worst in Show’ CES Products Put Your Data at Risk and Cause Waste, Privacy Advocates Say – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press So much of the technology showcased at CES includes gadgets made to improve consumers’ lives — whether by leveraging AI...
From Silos to Synergy: Transforming Threat Intelligence Sharing in 2025 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Marc Solomon As we look ahead to the New Year and think about what we are going to prioritize from a security...
Palo Alto Networks Patches High-Severity Vulnerability in Retired Migration Tool – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Palo Alto Networks on Wednesday announced patches for multiple vulnerabilities in the Expedition migration tool, including a high-severity bug leading...
Excelsior Orthopaedics Data Breach Impacts 357,000 People – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Excelsior Orthopaedics is notifying approximately 357,000 people that their personal and health information was compromised in a data breach resulting...
New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer. “Once thought dormant after its...