Source: thehackernews.com – Author: . Security vulnerabilities have been disclosed in Xerox VersaLink C7025 Multifunction printers (MFPs) that could allow attackers to capture authentication credentials via...
Day: February 18, 2025
Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have flagged a credit card stealing malware campaign that has been observed targeting e-commerce sites running Magento by disguising...
Xerox VersaLink C7025 Multifunction printer flaws may expose Windows Active Directory credentials to attackers – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 18, 2025 Xerox VersaLink C7025 Multifunction printer flaws could allow attackers to capture authentication credentials via pass-back...
New XCSSET macOS malware variant used in limited attacks – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 18, 2025 Microsoft discovered a new variant of the Apple macOS malware XCSSET that was employed in limited attacks...
Dutch Police shut down bulletproof hosting provider Zservers and seized 127 servers – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 17, 2025 Dutch police seized 127 servers of the bulletproof hosting service Zservers/XHost after government sanctions. On...
New Golang-based backdoor relies on Telegram for C2 communication – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 17, 2025 Netskope Threat Labs researchers discovered a Golang-based backdoor using Telegram for C2 communication, possibly of...
Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. Intel by Intruder now uses AI to contextualize NVD descriptions, helping security teams assess risk faster. Intruder, a leader in attack...
Russian malware discovered with Telegram hacks for C2 operations – Source: www.csoonline.com
Source: www.csoonline.com – Author: Stealthy C2 messages operated by the Golang backdoor could easily be mistaken for legitimate Telegram API communication. Hackers have been found deploying...
XCSSET macOS malware reappears with new attack strategies, Microsoft sounds alarm – Source: www.csoonline.com
Source: www.csoonline.com – Author: The updated malware, which spreads via infected Xcode projects, introduces advanced evasion tactics and persistence mechanisms to bypass security defenses. Microsoft has...
How CISOs can rebuild trust after a security incident – Source: www.csoonline.com
Source: www.csoonline.com – Author: Cybersecurity leaders share insight on a crucial but overlooked task after any security incident: rebuilding trust with the stakeholders that matter the...
Password managers under increasing threat as infostealers triple and adapt – Source: www.csoonline.com
Source: www.csoonline.com – Author: News Analysis 18 Feb 20257 mins AuthenticationMalwarePassword Managers Security experts warn of surge in malware targeting credentials stored in password vaults and...
New family of data-stealing malware leverages Microsoft Outlook – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 17 Feb 20255 mins APIsData and Information SecurityMalware Elastic Security says an attack starts with stolen credentials, abuses Outlook and Microsoft’s...
Enhancing Accessibility and Managing Access Control for a Hybrid Workforce – Source:levelblue.com
Source: levelblue.com – Author: hello@alienvault.com. The growth of remote work and widespread cloud adoption has transformed how and where employees access corporate network resources as well...
StaryDobry ruins New Year’s Eve, delivering miner instead of presents – Source: securelist.com
Source: securelist.com – Author: Tatyana Shishkova, Kirill Korchemny Introduction On December 31, cybercriminals launched a mass infection campaign, aiming to exploit reduced vigilance and increased torrent...
BlackLock On Track to Be 2025’s Most Prolific Ransomware Group – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Security researchers have lifted the lid on one of the fastest growing and formidable ransomware-as-a-service (RaaS) groups of 2025. Dubbed “BlackLock” (aka...
Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The days when Apple devices were thought to be immune to malware are over, as new malicious campaigns are now targeting macOS....
Zacks Investment Research Breach Hits 12 Million – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Written by A leading stock research and analysis firm appears to have been breached for the third time in just four years,...
Pro-Russia Hackers NoName057(16) Hit Italian Banks and Airports – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A pro-Russia hacker group, NoName057(16), has launched a wave of DDoS (distributed denial-of-service) attacks targeting key Italian organizations. Early on Monday, the group...
South Korea Suspends Downloads of AI Chatbot DeepSeek – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: South Korea has suspended new downloads of the Chinese AI chatbot DeepSeek as it undergoes scrutiny for non-compliance with the country’s data...
Microsoft Detects New XCSSET MacOS Malware Variant – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: MacOS malware XCSSET is reportedly re-emerging under a new variant, according to Microsoft. In a new social media post published on February...
Hacker Q&A with Gerben_Javado: To Share Knowledge is to Gain Knowledge – Source:www.hackerone.com
Source: www.hackerone.com – Author: kwhite. Twenty-one years old. Full-time college student. Mountain biker. Bounty hunter. That’s Gerben Janssen van Doorn, who goes by Gerben_Javado and is...
Interview with Hack the Air Force Winner, @CableJ – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Most hackers remember their first bug. For Jack Cable (@CableJ), it was discovering he could send negative amounts of money to...
The $30,000 Gem: Part 1 – Source:www.hackerone.com
Source: www.hackerone.com – Author: siebejan. Opening your database to the world is a scary thought! But that’s exactly what we wanted to do by implementing a...
Indian authorities seize loot from collapsed BitConnect crypto scam – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood Indian authorities seize loot from BitConnect crypto-Ponzi scheme Devices containing crypto wallets tracked online, then in the real world India’s...
XCSSET macOS malware returns with first new version since 2022 – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Microsoft says there’s a new variant of XCSSET on the prowl for Mac users – the first new iteration of...
SWE Diverse Podcast Ep 271: Leadership Training for Engineers in Academia: SWE’s ALWE Program
Two inspiring engineers share their experiences in SWE’s Academic Leadership for Women in Engineering (ALWE) program on Diverse: a SWE podcast! Source Views: 0
2024 WE Local U.S. Recap: Inspiring Women Engineers to Live Without Limits
Explore the speakers, photos, and statistics from our 2024 WE Local conferences in Las Vegas, Baltimore, and Wichita. Source Views: 0
2024 WE Local Bengaluru Recap: Advancing Women Engineers Across India and Beyond
Relive the speakers, photos, and highlights from SWE’s 2024 WE Local Bengaluru conference. Source Views: 0
2024 WE Local Munich Recap: Connecting Women in Engineering and Technology
Discover the highlights, speakers, and impact of the 2024 WE Local Munich conference that inspired over 500 women in STEM. Source Views: 0
SWE Mentoring Committee Wrapped: Data and Impact From FY24
In the spirit of “Spotify Wrapped,” dive into the achievements of the SWE Mentoring Committee by the numbers over the past year! Source Views: 0