Source: go.theregister.com – Author: Iain Thomson Graphics tablet maker Wacom has warned customers their credit card details may well have been stolen by miscreants while they...
Day: January 29, 2025
Guess who left a database wide open, exposing chat logs, API keys, and more? Yup, DeepSeek – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn China-based AI biz DeepSeek may have developed competitive, cost-efficient generative models, but its cybersecurity chops are another story. Wiz, a...
North Koreans clone open source projects to plant backdoors, steal credentials – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons North Korea’s Lazarus Group compromised hundreds of victims across the globe in a massive secret-stealing supply chain attack that was...
Why is my Mitel phone DDoSing strangers? Oh, it was roped into a new Mirai botnet – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons A new variant of the Mirai-based malware Aquabot is actively exploiting a vulnerability in Mitel phones to build a remote-controlled...
Transform your approach to data security – Source: go.theregister.com
Source: go.theregister.com – Author: Annaliese Ingrams Webinar The cybersecurity landscape continues to change at pace, leaving IT professionals constantly battling threats. But what if you could...
‘Bro delete the chat’: Feel the panic shortly before cops bust major online fraud ring – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones In announcing the sentencing of three Brits who ran OTP Agency, an account-takeover business, the National Crime Agency (NCA) revealed...
Spending watchdog blasts UK govt over sloth-like progress to shore up IT defenses – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones The UK government is significantly behind on its 2022 target to harden systems against cyberattacks by 2025, with a new...
TorNet Backdoor Detection: An Ongoing Phishing Email Campaign Uses PureCrypter Malware to Drop Other Payloads – Source: socprime.com
Source: socprime.com – Author: Veronika Telychko Financially motivated hackers are behind an ongoing malicious campaign targeting Poland and Germany. These phishing attacks aim to deploy multiple...
New Zyxel Zero-Day Under Attack, No Patch Available – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Malware hunters at GreyNoise are reporting active exploitation of a newly discovered zero-day vulnerability in Zyxel CPE devices alongside warnings...
Oligo Raises $50M to Tackle Application Detection and Response – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Application detection and response (ADR) startup Oligo Security on Wednesday announced raising $50 million in a Series B funding round...
New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Academic researchers have disclosed the details of two new CPU side-channel attacks impacting millions of phones, tablets, laptops and desktop...
Aquabot Botnet Targeting Vulnerable Mitel Phones – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A Mirai-based malware family this month started targeting vulnerable Mitel SIP phones to ensnare them into a botnet capable of...
Smiths Group Scrambling to Restore Systems Following Cyberattack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire British engineering giant Smiths Group is scrambling to restore systems that were knocked offline in response to a cyberattack. The...
Rockwell Patches Critical, High-Severity Vulnerabilities in Several Products – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Rockwell Automation on Tuesday published six new security advisories to inform customers about several critical- and high-severity vulnerabilities patched in...
Cyber Insights 2025: Artificial Intelligence – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend Cyber Insights 2025 examines expert opinions on the expected evolution of more than a dozen areas of cybersecurity interest over...
SimpleHelp Remote Access Software Exploited in Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire For the past week, threat actors have been observed targeting devices running SimpleHelp remote management software for initial access, Arctic...
Mirai Variant ‘Aquabot’ Exploits Mitel Device Flaws – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Source: Kirill Ivanov via Alamy Stock Photo Yet another Mirai botnet variant is making the rounds, this time...
The Old Ways of Vendor Risk Management Are No Longer Good Enough – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jatin Mannepalli Source: Olekcii Mach via Alamy Stock Photo COMMENTRY In June 2023, the MOVEit supply chain attack served as a harsh reminder of...
7 Tips for Strategically Saying "No" in Cybersecurity – Source: www.darkreading.com
Source: www.darkreading.com – Author: Joan Goodchild Source: Javier Sanchez Mingorance via Alamy Stock Photo Question: There are times when cybersecurity teams need to say, “No” to...
CrowdStrike Highlights Magnitude of Insider Risk – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jeffrey Schwartz Source: Andrea Danti via Shutterstock When CrowdStrike alerted 200 customers last summer that its OverWatch managed threat-hunting service discovered endpoint...
Data Privacy Day 2025: Time for Data Destruction to Become Standard Business Practice – Source: www.darkreading.com
Source: www.darkreading.com – Author: Adam Strange Adam Strange, Principal Analyst, Data Security, Omdia January 28, 2025 5 Min Read Compliance standards are shining new light on...
AI Surge Drives Record 1205% Increase in API Vulnerabilities – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Written by AI-driven API vulnerabilities have skyrocketed by 1205% in the past year. The figures come from the 2025 API ThreatStats Report by Wallarm,...
Nation-State Hackers Abuse Gemini AI Tool – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Nation-state threat actors are frequently abusing Google’s generative AI tool Gemini to support their malicious cyber operations. An analysis by the Google...
New Hellcat Ransomware Gang Employs Humiliation Tactics – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The recently emerged HellCat ransomware gang is using psychological tactics to court public attention and pressure victims to pay extortion demands. This...
Threat Actors Exploit Government Websites for Phishing – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Cybercriminals have been increasingly exploiting government website vulnerabilities to conduct phishing campaigns. New research by Cofense Intelligence, analyzing data from November 2022...
Chinese GenAI Startup DeepSeek Sparks Global Privacy Debate – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The year-old Chinese startup DeepSeek took the world by storm when it launched R1, its new large language model (LLM), but experts...
Breakout Time Accelerates 22% as Cyber-Attacks Speed Up – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Threat actors exploited new vulnerabilities and moved from initial access to lateral movement much faster in 2024, challenging network defenders to accelerate...
Scores of Critical UK Government IT Systems Have Major Security Holes – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The UK government’s spending watchdog has raised grave concerns about the cyber resilience of critical IT systems across departments, highlighting major gaps...
The GenAI Scam Revolution – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Introduction The intersection of cutting-edge artificial intelligence technologies and the extensive exposure of personal data has opened a Pandora’s box...
Navigating Advanced Threat Landscapes – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team In today’s era, marked by rapid digital transformations and an increase in sophisticated cyber threats, the role of Chief Information...