Source: socprime.com – Author: Veronika Telychko The nefarious cyber-espionage hacking collective tracked as EarthKapre or RedCurl APT has resurfaced to target legal sector organizations using Indeed-themed...
Day: February 17, 2025
New FinalDraft Malware Spotted in Espionage Campaign – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A newly discovered post-exploitation malware kit targeting both Windows and Linux systems has been abusing Microsoft Outlook as a communication...
Russian State Hackers Target Organizations With Device Code Phishing – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A Russia-linked threat actor tracked as Storm-2372 has been targeting government and private organizations in a global campaign employing device...
127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Days after several governments announced sanctions against the Zservers bulletproof hosting service, Dutch police took 127 servers associated with the...
Downloads of DeepSeek’s AI Apps Paused in South Korea Over Privacy Concerns – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press DeepSeek, a Chinese artificial intelligence startup, has temporarily paused downloads of its chatbot apps in South Korea while it works...
Xerox Versalink Printer Vulnerabilities Enable Lateral Movement – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Vulnerabilities in Xerox VersaLink multifunction printers could allow attackers to retrieve authentication credentials via pass-back attacks targeting LDAP and SMB/FTP...
Duo Wins $50K Bug Bounty for Supply Chain Flaw in Newly Acquired Firm – Source:hackread.com
Source: hackread.com – Author: Waqas. Researchers earned a $50,500 Bug Bounty after uncovering a critical supply chain flaw in a newly acquired firm, highlighting security risks...
Holiverse Makes NASA’s Latest Achievements Accessible to Everyone – Source:hackread.com
Source: hackread.com – Author: Owais Sultan. People around the world learned about the latest advancements in the American space industry! This was made possible by Holiverse, a...
Hackers Exploit Telegram API to Spread New Golang Backdoor – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. The new Golang backdoor uses Telegram for command and control. Netskope discovers malware that exploits Telegram’s API for malicious purposes....
10 Key SOC Challenges and How AI Addresses Them – Source:hackread.com
Source: hackread.com – Author: Owais Sultan. SOC challenges like alert fatigue, skill shortages and slow response impact cybersecurity. AI-driven solutions enhance SOC efficiency, automation and threat...
HashFlare Fraud: Two Estonians Admit to Running $577M Crypto Scam – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. Two Estonian nationals plead guilty to a $577M cryptocurrency Ponzi scheme through HashFlare, defrauding hundreds of thousands globally. They face...
Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics – Source:thehackernews.com
Source: thehackernews.com – Author: . Microsoft said it has discovered a new variant of a known Apple macOS malware called XCSSET as part of limited attacks...
South Korea Suspends DeepSeek AI Downloads Over Privacy Violations – Source:thehackernews.com
Source: thehackernews.com – Author: . South Korea has formally suspended new downloads of Chinese artificial intelligence (AI) chatbot DeepSeek in the country until the service makes...
CISO’s Expert Guide To CTEM And Why It Matters – Source:thehackernews.com
Source: thehackernews.com – Author: . Cyber threats evolve—has your defense strategy kept up? A new free guide available here explains why Continuous Threat Exposure Management (CTEM)...
⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More – Source:thehackernews.com
Source: thehackernews.com – Author: . Welcome to this week’s Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake codes and sneaky emails...
New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism for command-and-control (C2) communications. Netskope...
Nico Lange: „Cybersicherheit ist eine Frage der Verteidigung“ – Source: www.csoonline.com
Source: www.csoonline.com – Author: Nico Lange zählt zu den wichtigsten Stimmen in der Sicherheitspolitik der Europäischen Union. Unsere spanischen Kollegen von der Computerworld haben mit ihm...
Websites der Bayerischen Staatsregierung angegriffen – Source: www.csoonline.com
Source: www.csoonline.com – Author: Am Donnerstag waren die Internetseiten der Staatsregierung und des Digitalministeriums in Bayern nicht erreichbar. Nun steht fest: Es war ein Hackerangriff. Vermutet...
Ransomware gangs extort victims 17 hours after intrusion on average – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 17 Feb 20255 mins Incident ResponseRansomware The window for intrusion detection keeps getting shorter as ransomware group’s time-to-ransom (TTR) accelerates. Ransomware...
How to evaluate and mitigate risks to the global supply chain – Source: www.csoonline.com
Source: www.csoonline.com – Author: CISOs are under the gun to understand and address potential risks tied to geopolitical tensions, regulations and other changes outside their control....
4 Wege aus der Security-Akronymhölle – Source: www.csoonline.com
Source: www.csoonline.com – Author: Abkürzungen können dazu beitragen, lange, technische Begriffe im Kopf zu behalten. Oder zum Problem werden. Gefangen im Buchstabensud? mikeledray | shutterstock.com Bevor...
Software Bill of Material umsetzen: Die besten SBOM-Tools – Source: www.csoonline.com
Source: www.csoonline.com – Author: Eine Software Bill of Material (SBOM) umzusetzen, muss kein Hexenwerk sein: Diese Tools erstellen Software-Stücklisten automatisch. Nur wenn Sie wissen, was drinsteckt,...
Pro-Russia collective NoName057(16) launched a new wave of DDoS attacks on Italian sites – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 17, 2025 Pro-Russia collective NoName057(16) launched DDoS attacks on Italian sites, targeting airports, the Transport Authority, major...
whoAMI attack could allow remote code execution within AWS account – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 17, 2025 Researchers warn that the whoAMI attack lets attackers publish an AMI with a specific name...
Storm-2372 used the device code phishing technique since August 2024 – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 16, 2025 Russia-linked group Storm-2372 used the device code phishing technique since Aug 2024 to steal login...
Telegram Used as C2 Channel for New Golang Malware – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Threat actors are using Telegram as command and control (C2) channel for a new Golang malware variant, according to a Netskope report....
Estonian Duo Plead Guilty to $577m Crypto Ponzi Scheme – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Two Estonian nationals are facing up to 20 years behind bars after pleading guilty to running a huge cryptocurrency fraud scheme that...
Palo Alto Networks and SonicWall Firewalls Under Attack – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Palo Alto Networks and SonicWall customers are being advised to patch their products, after it emerged that threat actors are actively exploiting...
Twin Google flaws allowed researcher to get from YouTube ID to Gmail address in a few easy steps – Source: go.theregister.com
Source: go.theregister.com – Author: Brandon Vigliarolo Infosec In Brief A security researcher has found that Google could leak the email addresses of YouTube channels, which wasn’t...
Fujitsu worries US tariffs will see its clients slow digital spend – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood Asia In Brief The head of Fujitsu’s North American operations has warned that the Trump administration’s tariff plans will be...