Source: www.mcafee.com – Author: Brooke Seipel. Typos. Exciting surprises. Urgent Threats. These are just a few of the tactics scammers use to prey on your emotions...
Day: February 20, 2025
Linux royalty backs adoption of Rust for kernel code, says its rise is inevitable – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn Some Linux kernel maintainers remain unconvinced that adding Rust code to the open source project is a good idea, but...
Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Microsoft is so concerned about security in its Copilot products for folks that it’s lifted bug bounty payments for moderate-severity...
Oops, some of our customers’ Power Pages-hosted sites were exploited, says Microsoft – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Microsoft has fixed a security flaw in its Power Pages website-building SaaS, after criminals got there first – and urged...
US minerals company says crooks broke into email and helped themselves to $500K – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones A NASDAQ-listed US minerals company says cybercriminals broke into its systems on Valentine’s Day and paid themselves around $500,000 –...
Critical flaws in Mongoose library expose MongoDB to data thieves, code execution – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Security sleuths found two critical vulnerabilities in a third-party library that MongoDB relies on, which means bad guys can potentially...
Two arrested after pensioner scammed out of six-figure crypto nest egg – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Two men are in police custody after being arrested in connection with a July cryptocurrency fraud involving a man in...
Ghost ransomware crew continues to haunt IT depts with scarily bad infosec – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons The operators of Ghost ransomware continue to claim victims and score payments, but keeping the crooks at bay is possible...
Medusa ransomware gang demands $2M from UK private health services provider – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Exclusive HCRG Care Group, a private health and social services provider, has seemingly fallen victim to the Medusa ransomware gang,...
An LLM Trained to Create Backdoors in Code – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Winter • February 20, 2025 9:07 AM Reflections on Trusting Trust has finally come true. We can now...
Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine China-linked APT espionage tools are starting to appear in corporate ransomware attacks, blurring threat actor attribution and forcing security teams...
Mining Company NioCorp Loses $500,000 in BEC Hack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs US-based mining company NioCorp Developments informed the SEC on Wednesday that it recently lost a significant amount of money after...
AI Can Supercharge Productivity, But We Still Need a Human-in-the-Loop – Source: www.securityweek.com
Source: www.securityweek.com – Author: Marc Solomon There has been a lot of focus on AI since the start of the year with the creation of a...
Atlassian Patches Critical Vulnerabilities in Confluence, Crowd – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Atlassian this week announced the rollout of patches for 12 critical- and high-severity vulnerabilities in its Bamboo, Bitbucket, Confluence, Crowd,...
CISA, FBI Warn of China-Linked Ghost Ransomware Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The US cybersecurity agency CISA and the FBI have issued a joint alert on a Chinese ransomware operation named Ghost...
PoC Exploit Published for Critical Ivanti EPM Vulnerabilities – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Horizon3.ai has released technical details on four critical-severity vulnerabilities in Ivanti Endpoint Manager (EPM), along with proof-of-concept (PoC) code targeting...
US Military Health Provider HNFS Pays $11M in Settlement Over Cybersecurity Failures – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Department of Defense contractor Health Net Federal Services (HNFS) and its parent company Centene Corporation have agreed to pay $11...
Microsoft Patches Exploited Power Pages Vulnerability – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Microsoft on Wednesday informed customers that it has patched a Power Pages vulnerability that has been exploited in attacks. Microsoft...
Smashing Security podcast #405: A crypto con exchange, and soaring ticket scams – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content From shadowy Bitcoin exchanges to Interpol’s most wanted, Alexander Vinnik was the alleged kingpin behind BTC-e, a...
Proofpoint ranked #1 in Four out of Five Use Cases in the 2025 Gartner® Critical Capabilities™ Report for Email Security Platforms – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Ranking in addition to Proofpoint’s recent recognition as a Leader in the 2024 Gartner® Magic Quadrant™ for Email Security Platforms SUNNYVALE, Calif.,...
New FrigidStealer Malware Infects macOS via Fake Browser Updates – Source:hackread.com
Source: hackread.com – Author: Waqas. Fake browser update scams now target Mac, Windows, and Android users, delivering malware like FrigidStealer, Lumma Stealer, and Marcher trojan through...
Clinical Research Firm Exposes 1.6 Million US Medical Survey Records – Source:hackread.com
Source: hackread.com – Author: Waqas. A Dallas, Texas-based clinical research firm had its database exposed, containing sensitive personal healthcare records of over 1.6 million individuals –...
FBI and CISA Warn of Ghost Ransomware: A Threat to Firms Worldwide – Source:hackread.com
Source: hackread.com – Author: Waqas. A joint advisory from the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing...
NailaoLocker ransomware targets EU healthcare-related entities – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 20, 2025 NailaoLocker ransomware is a new threat that targeted European healthcare organizations from June to October...
Microsoft fixed actively exploited flaw in Power Pages – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 20, 2025 Microsoft addressed a privilege escalation vulnerability in Power Pages, the flaw is actively exploited in...
Citrix addressed NetScaler console privilege escalation flaw – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 20, 2025 Citrix addressed a high-severity privilege escalation vulnerability impacting NetScaler Console and NetScaler Agent under certain...
Palo Alto Networks warns that CVE-2025-0111 flaw is actively exploited in attacks – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 20, 2025 Palo Alto Networks warns that the vulnerability CVE-2025-0111 is actively exploited with two other flaws...
Russia-linked APTs target Signal messenger – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini February 19, 2025 Russia-linked threat actors exploit Signal ‘s “linked devices” feature to hijack accounts, per Google Threat...
North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware – Source:thehackernews.com
Source: thehackernews.com – Author: . Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known...
PCI DSS 4.0 Mandates DMARC By 31st March 2025 – Source:thehackernews.com
Source: thehackernews.com – Author: . The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025,...