Source: www.schneier.com – Author: Bruce Schneier Menu Blog Newsletter Books Essays News Talks Academic About Me HomeBlog Phishing False Alarm A very security-conscious company was hit...
Day: January 15, 2025
Black Basta-Style Cyberattack Hits Inboxes with 1,165 Emails in 90 Minutes – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A recent cyberattack, mimicking the tactics of the notorious Black Basta ransomware group, targeted one of SlashNext’s clients. Within 90...
Aembit Announces Speaker Lineup for the Inaugural NHIcon – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. Silver Spring, United States / Maryland, January 15th, 2025, CyberNewsWire Aembit, the non-human identity and access management (IAM) company, unveiled the...
Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04% – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. Tel Aviv, Israel, January 15th, 2025, CyberNewsWire Sweet Security, a leader in cloud runtime detection and response, today announced the launch...
Microsoft Discovers macOS Flaw CVE-2024-44243, Bypassing SIP – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. CVE-2024-44243, a critical macOS vulnerability discovered recently by Microsoft, can allow attackers to bypass Apple’s System Integrity Protection (SIP). Learn...
Wultra Secures €3M to Protect Financial Institutions from Quantum Threats – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. Prague, Czech republic, January 15th, 2025, CyberNewsWire Quantum computing is set to revolutionize technology, but it also presents a significant security...
Hackers Use CVE-2024-50603 to Deploy Backdoor on Aviatrix Controllers – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A critical vulnerability (CVE-2024-50603) in the Aviatrix Controller allows unauthenticated RCE. Active exploitation observed by Wiz Research in the wild...
Microsoft: Happy 2025. Here’s 161 Security Updates – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs Microsoft today unleashed updates to plug a whopping 161 security vulnerabilities in Windows and related software, including three “zero-day” weaknesses that...
CISA Launches Playbook to Boost AI Cybersecurity Collaboration – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A new initiative aimed at improving collaboration on artificial intelligence (AI) cybersecurity across critical infrastructure has been introduced by the Cybersecurity and...
Chinese PlugX Malware Deleted in Global Law Enforcement Operation – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A version of “PlugX” malware used by Chinese state-backed hackers has been deleted from thousands of US computers worldwide following a multi-month...
Multi-Cloud Adoption Surges Amid Rising Security Concerns – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Over 78% of organizations use two or more cloud providers, up from 71% last year, reflecting the growing need for resilience and...
Illicit Crypto-Inflows Set to Top $51bn in a Year – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Threat actors scammed, hacked and defrauded their way to obtaining at least $41bn from victims last year, with the figure likely to...
Fortinet Confirms Critical Zero-Day Vulnerability in Firewalls – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Fortinet has disclosed a new critical zero-day vulnerability affecting some of its FortiGate firewalls. In a security advisory published on January 14,...
Secureworks Exposes North Korean Links to Fraudulent Crowdfunding – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Written by Research from Secureworks Counter Threat Unit (CTU) has revealed links between the North Korean fake IT workers scheme and fraudulent...
Microsoft Patches Eight Zero-Days to Start the Year – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Microsoft released security updates for eight zero-day flaws in its first Patch Tuesday of 2025, with three of the vulnerabilities under active...
Fortinet’s Authentication Bypass Zero-Day: Mitigation Strategies and IoCs for Enhanced Security – Source:cyble.com
Source: cyble.com – Author: daksh sharma. Overview Fortinet has disclosed a critical authentication bypass vulnerability affecting FortiOS and FortiProxy systems, identified as CVE-2024-55591. With a CVSS...
Australia Launches ‘Countering Foreign Interference’ Initiative to Safeguard Sovereignty and Democracy – Source:cyble.com
Source: cyble.com – Author: daksh sharma. Australia launches Countering Foreign Interference initiative to protect its sovereignty and democracy. The strategy outlines measures to identify, mitigate, and...
159-CVE January Patch Tuesday smashes single-month record – Source: news.sophos.com
Source: news.sophos.com – Author: Angela Gunn Microsoft on Tuesday released 159 patches touching 13 product families. Nine of the addressed issues are considered by Microsoft to...
North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a 2016...
Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool – Source:thehackernews.com
Source: thehackernews.com – Author: . As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of which...
The High-Stakes Disconnect For ICS/OT Security – Source:thehackernews.com
Source: thehackernews.com – Author: . Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security playbook...
FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation – Source:thehackernews.com
Source: thehackernews.com – Author: . The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation allowed the Federal Bureau of Investigation (FBI) to...
3 Actively Exploited Zero-Day Flaws Patched in Microsoft’s Latest Security Update – Source:thehackernews.com
Source: thehackernews.com – Author: . Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software portfolio,...
Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that could lead to information disclosure, privilege escalation, and...
Fortinet Warns of New Zero-Day Used in Attacks on Firewalls with Exposed Interfaces – Source:thehackernews.com
Source: thehackernews.com – Author: . Threat hunters are calling attention to a new campaign that has targeted Fortinet FortiGate firewall devices with management interfaces exposed on...
Die Top 10 Geschäftsrisiken in Deutschland 2025 – Source: www.csoonline.com
Source: www.csoonline.com – Author: Die Welt ist unruhig geworden. Dementsprechend wachsen auch in den Unternehmen die Sorgen vor drohenden Risiken aller Art. Cyberangriffe zählen nach wie...
Perfide Ransomware-Attacke gegen AWS-Nutzer – Source: www.csoonline.com
Source: www.csoonline.com – Author: Security-Forscher warnen vor einem Ransomware-Angriff, der auf AWS-Kunden abzielt. Bei Erfolg droht dauerhafter Datenverlust. Hacker haben kompromittierte AWS-Zugangsdaten genutzt, um S3-Buckets zu...
Cisco’s homegrown AI to help enterprises navigate AI adoption – Source: www.csoonline.com
Source: www.csoonline.com – Author: Cisco AI Defense is the company’s proprietary AI tool that can validate enterprise AI models and protect them against attacks. As the...
CISA unveils ‘Secure by Demand’ guidelines to bolster OT security – Source: www.csoonline.com
Source: www.csoonline.com – Author: CISA and global cybersecurity leaders have introduced a proactive framework for OT procurement, emphasizing security by design to counter evolving threats. The...
The CFO may be the CISO’s most important business ally – Source: www.csoonline.com
Source: www.csoonline.com – Author: Opinion 15 Jan 20256 mins BudgetBusiness IT AlignmentCSO and CISO Despite natural tensions, a CISO-CFO alliance can help CISOs become better business...