Source: www.securityweek.com – Author: Kevin Townsend AI security specialist Pangea has added to its existing suite of corporate gen-AI security products with AI Guard and Prompt...
Day: February 18, 2025
MirrorTab Raises $8.5M Seed Round to Take on Browser-Based Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine MirrorTab, a San Francisco startup building technology to neutralize malicious attacks at the browser layer, has secured $8.5 million in...
Finastra Starts Notifying People Impacted by Recent Data Breach – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire British fintech giant Finastra last week started sending written notifications to individuals who had their personal information stolen in a...
Critical Vulnerability Patched in Juniper Session Smart Router – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Juniper Networks last week published an out-of-cycle security bulletin to inform customers about the availability of patches for a critical...
Singulr Launches With $10M in Funding for AI Security and Governance Platform – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Singulr AI launched on Tuesday, announcing the general availability of its enterprise AI security and governance platform. With offices in...
Golang Backdoor Abuses Telegram for C&C Communication – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A recently discovered backdoor written in the Go programming language is abusing Telegram for command-and-control (C&C) communication, cybersecurity firm Netskope...
Microsoft Warns of Improved XCSSET macOS Malware – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A new variant of the sophisticated XCSSET malware has been observed in recent, limited attacks against macOS users, Microsoft reports....
Palo Alto Networks Confirms Exploitation of Firewall Vulnerability – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Palo Alto Networks has confirmed for SecurityWeek that a recently patched firewall vulnerability tracked as CVE-2025-0108 is being actively exploited....
Xerox Printer Vulnerabilities Enable Credential Capture – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Soure: T. Schneider via Shutterstock A popular small to midrange Xerox business printer contains two now-patched vulnerabilities in...
China-Linked Threat Group Targets Japanese Orgs’ Servers – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: KB Photodesign via Shutterstock NEWS BRIEF Winnti, a China-affiliated threat actor, has been linked to...
Thrive Acquires Secured Network Services – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE BOSTON, Feb. 13, 2025 (GLOBE NEWSWIRE) — Thrive, a global technology outsourcing provider for cybersecurity, Cloud, and IT managed services, today...
SANS Institute Launches AI Cybersecurity Hackathon – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE As AI adoption accelerates, organizations lack the tools to secure these rapidly evolving technologies. While AI’s potential in cybersecurity is...
Microsoft: New Variant of macOS Threat XCSSET Spotted in the Wild – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Source: Africa Studio via Alamy Stock Photo Attackers are wielding a new variant of one of the biggest...
Introducing enQase for Quantum-Safe Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE AUSTIN, Texas, Feb. 13, 2025 /PRNewswire/ — enQase, a groundbreaking quantum-safe security solution, launches today to safeguard the most sensitive information against the...
CVE-2025-1094 Exploitation, a Critical SQL Injection Vulnerability in PostgreSQL That Can Lead to Arbitrary Code Execution – Source: socprime.com
Source: socprime.com – Author: Veronika Telychko A novel PostgreSQL flaw, CVE-2025-1094, has hit the headlines. Defenders recently revealed that attackers responsible for weaponizing a BeyondTrust zero-day RCE are...
Hacker Spotlight: Interview with insiderphd – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. When Katie Paxton-Fear, aka @InsiderPhD, was invited to be a mentee at the HackerOne live event in London, h1-4420, for the...
Story About Medical Device Security – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Brent Hagerty • February 18, 2025 9:49 AM So very very true. As it is said: the more...
Atlas of Surveillance – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Daniel Popescu • February 17, 2025 1:43 PM What is ‘predictive policing’? Sounds like a concept from the...
The AI Fix #38: AI proves time travel is impossible (but still can’t draw fingers) – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content In episode 38 of “The AI Fix”, our hosts discover a robot they actually like, Sam Altman...
Got a Microsoft Teams invite? Storm-2372 gang exploit device codes in global phishing attacks – Source: www.tripwire.com
Source: www.tripwire.com – Author: Graham Cluley Security experts have warned that a cybercriminal group has been running a malicious and inventive phishing campaign since August 2024...
Russian malware discovered with Telegram hacks for C2 operations – Source: www.csoonline.com
Source: www.csoonline.com – Author: Stealthy C2 messages operated by the Golang backdoor could easily be mistaken for legitimate Telegram API communication. Hackers have been found deploying...
XCSSET macOS malware reappears with new attack strategies, Microsoft sounds alarm – Source: www.csoonline.com
Source: www.csoonline.com – Author: The updated malware, which spreads via infected Xcode projects, introduces advanced evasion tactics and persistence mechanisms to bypass security defenses. Microsoft has...
How CISOs can rebuild trust after a security incident – Source: www.csoonline.com
Source: www.csoonline.com – Author: Cybersecurity leaders share insight on a crucial but overlooked task after any security incident: rebuilding trust with the stakeholders that matter the...
Password managers under increasing threat as infostealers triple and adapt – Source: www.csoonline.com
Source: www.csoonline.com – Author: News Analysis 18 Feb 20257 mins AuthenticationMalwarePassword Managers Security experts warn of surge in malware targeting credentials stored in password vaults and...
New family of data-stealing malware leverages Microsoft Outlook – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 17 Feb 20255 mins APIsData and Information SecurityMalware Elastic Security says an attack starts with stolen credentials, abuses Outlook and Microsoft’s...
StaryDobry ruins New Year’s Eve, delivering miner instead of presents – Source: securelist.com
Source: securelist.com – Author: Tatyana Shishkova, Kirill Korchemny Introduction On December 31, cybercriminals launched a mass infection campaign, aiming to exploit reduced vigilance and increased torrent...
BlackLock On Track to Be 2025’s Most Prolific Ransomware Group – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Security researchers have lifted the lid on one of the fastest growing and formidable ransomware-as-a-service (RaaS) groups of 2025. Dubbed “BlackLock” (aka...
The $30,000 Gem: Part 1 – Source:www.hackerone.com
Source: www.hackerone.com – Author: siebejan. Opening your database to the world is a scary thought! But that’s exactly what we wanted to do by implementing a...
Indian authorities seize loot from collapsed BitConnect crypto scam – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood Indian authorities seize loot from BitConnect crypto-Ponzi scheme Devices containing crypto wallets tracked online, then in the real world India’s...