Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: KB Photodesign via Shutterstock NEWS BRIEF A recent RA World ransomware attack utilized a tool...
Day: February 14, 2025
Experts discovered PostgreSQL flaw chained with BeyondTrust zeroday in targeted attacks – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 14, 2025 Threat actors are exploiting a zero-day SQL injection vulnerability in PostgreSQL, according to researchers from...
Valve removed the game PirateFi from the Steam video game platform because contained a malware – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 14, 2025 Valve removed a game from Steam because it contained malware, the company also warned affected...
The Rise of Cyber Espionage: UAV and C-UAV Technologies as Targets – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 13, 2025 Researchers at cybersecurity firm Resecurity detected a rise in cyberattacks targeting UAV and counter-UAV technologies....
China-linked APTs’ tool employed in RA World Ransomware attack – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 13, 2025 A November 2024 RA World ransomware attack on an Asian software firm used a tool...
Russia-linked APT Seashell Blizzard is behind the long running global access operation BadPilot campaign – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 13, 2025 A subgroup of the Russia-linked Seashell Blizzard APT group (aka Sandworm) ran a global multi-year...
Publishers Spotlight: Flashpoint – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: Gary In 2024, a new hybrid cold war is redefining the threat landscape. Cyber, physical, and geopolitical risks are converging, with nation-states,...
RASP (Runtime Application Self-Protection) in Mobile Application Security: A Strategic Imperative for the Modern Threat Landscape – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Introduction The mobile application landscape is more dynamic and challenging than ever, with businesses increasingly relying on mobile channels to...
US charges two Russian men in connection with Phobos ransomware operation – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley The US Department of Justice (DOJ) has unsealed criminal charges against two Russian nationals, alleged to have operated a cybercrime...
US Coast Guard told to improve its cybersecurity, after warning raised that hacked ports could cost $2 billion per day – Source: www.tripwire.com
Source: www.tripwire.com – Author: Graham Cluley The US Coast Guard has been urged to improve the cybersecurity infrastructure of the Maritime Transportation System (MTS), which includes...
US woman faces years in federal prison for running laptop farm for N Korean IT workers – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley A 48-year-old woman from Arizona has pleaded guilty to charges related to a criminal scheme which saw North Korean IT...
EU-FOSSA 2 Open Source Bug Bounty Programme Series | Q&A – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Following the success of the European Commission’s pilot bug bounty programme with HackerOne last year, they are announcing the launch of...
Open-Xchange Approaches 3 Years of Bug Bounties & 250 Valid Vulnerabilities – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. The below is a modified version of a blog originally posted by Martin Heiland, Security Officer at web-based communication, collaboration and...
5 Tips for an Effective AppSec Testing Strategy – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Applications have become the lifeblood of businesses in today’s connected world. Software is now the “front door” into your business for...
Hacker Q&A with André Baptista: From CTF Champ to h1-202 MVH – Source:www.hackerone.com
Source: www.hackerone.com – Author: Tiffany Long. From CTF Champ to H1-202 MVH. André applied the creativity of CTFs to find and escalate bugs in the wild...
Hacker Q&A with Matthew Bryant: Good Artists Copy, Great Artists Steal – Source:www.hackerone.com
Source: www.hackerone.com – Author: Tiffany Long. “Seeing an exploit without understanding how any of it works felt like witnessing someone doing actual magic.” In his search...
What is a Responsible Disclosure Policy and Why You Need One – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Bug bounty programs may capture the majority of headlines in hacker-powered security today, but organizations of all shapes and sizes must...
Hacker Q&A with Rachel Tobac: Hacking Companies Through Their People – Source:www.hackerone.com
Source: www.hackerone.com – Author: Tiffany Long. CEO and Co-founder of SocialProof Security, Rachel Tobac hacks people. Using a phone, email, and an approachable persona, Rachel discovers...
DOGE as a National Cyberattack – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier In the span of just weeks, the US government has experienced what may be the most consequential security breach in...
Rapid7 Flags New PostgreSQL Zero-Day Connected to BeyondTrust Exploitation – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Security researchers at Rapid7 on Thursday flagged the discovery of a new zero-day vulnerability in PostgreSQL that appears to have...
Google Hub in Poland to Develop AI Use in Energy and Cybersecurity Sectors – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press Google and Poland on Thursday signed a memorandum for developing the use of artificial intelligence in the country’s energy, cybersecurity...
Circuit Board Maker Unimicron Targeted in Ransomware Attack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A ransomware group is threatening to leak data stolen from Taiwan-based printed circuit board (PCB) manufacturer Unimicron Technology. Unimicron is...
CyberArk Expands Identity Security Play With $165M Acquisition of Zilla Security – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Looking to broaden its identity security portfolio, CyberArk (NASDAQ: CYBR) on Tuesday announced it has acquired Identity Governance and Administration...
DeepSeek Exposes Major Cybersecurity Blind Spot – Source: www.securityweek.com
Source: www.securityweek.com – Author: Torsten George The buzzword of this month is DeepSeek. The emergence of this Chinese AI company, which reportedly developed its R1 chatbot...
Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Tools typically employed by Chinese cyberespionage groups have been used in a recent ransomware attack, likely by an individual hacker,...
SecurityWeek Analysis: Over 400 Cybersecurity M&A Deals Announced in 2024 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A total of 405 cybersecurity-related merger and acquisition deals were announced in 2024, the smallest number since SecurityWeek started tracking...
Jscrambler Raises $5.2 Million for Code, Webpage Protection Solution – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Client-side web security provider Jscrambler on Wednesday announced receiving a $5.2 million investment from Iberis Capital, which brings the total...
A New Chapter in Cybersecurity Excellence: Nuspire Becomes PDI Security & Network Solutions – Source: securityboulevard.com
Source: securityboulevard.com – Author: Team Nuspire In the rapidly evolving landscape of cybersecurity, transformation isn’t just about adaptation—it’s about strengthening capabilities to better serve and protect...
From Reactive to Predictive: Building Cyber Resilience for 2025 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Team Nuspire When you’re resilient to something, you don’t just endure; you adapt, recover, and emerge stronger. This idea is what should...
DEF CON 32 – MFT Malicious Fungible Tokens – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Thursday, February 13, 2025 Home » Security Bloggers Network » DEF CON 32 – MFT Malicious Fungible Tokens Authors/Presenters: Mauro...