Source: go.theregister.com – Author: Thomas Claburn Some Linux kernel maintainers remain unconvinced that adding Rust code to the open source project is a good idea, but...
Day: February 20, 2025
Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Microsoft is so concerned about security in its Copilot products for folks that it’s lifted bug bounty payments for moderate-severity...
Oops, some of our customers’ Power Pages-hosted sites were exploited, says Microsoft – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Microsoft has fixed a security flaw in its Power Pages website-building SaaS, after criminals got there first – and urged...
US minerals company says crooks broke into email and helped themselves to $500K – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones A NASDAQ-listed US minerals company says cybercriminals broke into its systems on Valentine’s Day and paid themselves around $500,000 –...
Critical flaws in Mongoose library expose MongoDB to data thieves, code execution – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Security sleuths found two critical vulnerabilities in a third-party library that MongoDB relies on, which means bad guys can potentially...
Two arrested after pensioner scammed out of six-figure crypto nest egg – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Two men are in police custody after being arrested in connection with a July cryptocurrency fraud involving a man in...
Ghost ransomware crew continues to haunt IT depts with scarily bad infosec – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons The operators of Ghost ransomware continue to claim victims and score payments, but keeping the crooks at bay is possible...
Medusa ransomware gang demands $2M from UK private health services provider – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Exclusive HCRG Care Group, a private health and social services provider, has seemingly fallen victim to the Medusa ransomware gang,...
An LLM Trained to Create Backdoors in Code – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Winter • February 20, 2025 9:07 AM Reflections on Trusting Trust has finally come true. We can now...
Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine China-linked APT espionage tools are starting to appear in corporate ransomware attacks, blurring threat actor attribution and forcing security teams...
Mining Company NioCorp Loses $500,000 in BEC Hack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs US-based mining company NioCorp Developments informed the SEC on Wednesday that it recently lost a significant amount of money after...
AI Can Supercharge Productivity, But We Still Need a Human-in-the-Loop – Source: www.securityweek.com
Source: www.securityweek.com – Author: Marc Solomon There has been a lot of focus on AI since the start of the year with the creation of a...
Atlassian Patches Critical Vulnerabilities in Confluence, Crowd – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Atlassian this week announced the rollout of patches for 12 critical- and high-severity vulnerabilities in its Bamboo, Bitbucket, Confluence, Crowd,...
CISA, FBI Warn of China-Linked Ghost Ransomware Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The US cybersecurity agency CISA and the FBI have issued a joint alert on a Chinese ransomware operation named Ghost...
PoC Exploit Published for Critical Ivanti EPM Vulnerabilities – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Horizon3.ai has released technical details on four critical-severity vulnerabilities in Ivanti Endpoint Manager (EPM), along with proof-of-concept (PoC) code targeting...
US Military Health Provider HNFS Pays $11M in Settlement Over Cybersecurity Failures – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Department of Defense contractor Health Net Federal Services (HNFS) and its parent company Centene Corporation have agreed to pay $11...
Microsoft Patches Exploited Power Pages Vulnerability – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Microsoft on Wednesday informed customers that it has patched a Power Pages vulnerability that has been exploited in attacks. Microsoft...
Smashing Security podcast #405: A crypto con exchange, and soaring ticket scams – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content From shadowy Bitcoin exchanges to Interpol’s most wanted, Alexander Vinnik was the alleged kingpin behind BTC-e, a...
Proofpoint ranked #1 in Four out of Five Use Cases in the 2025 Gartner® Critical Capabilities™ Report for Email Security Platforms – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Ranking in addition to Proofpoint’s recent recognition as a Leader in the 2024 Gartner® Magic Quadrant™ for Email Security Platforms SUNNYVALE, Calif.,...
Managed detection and response in 2024 – Source: securelist.com
Source: securelist.com – Author: Kaspersky Security Services SOC, TI and IR posts SOC, TI and IR posts 20 Feb 2025 minute read Kaspersky Managed Detection and...
Over 330 Million Credentials Compromised by Infostealers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Infostealers became one of the “most significant initial access vectors” in the threat landscape last year, with one threat intelligence company claiming...
Hackers Chain Exploits of Three Palo Alto Networks Firewall Flaws – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Hackers are actively trying to simultaneously exploit three vulnerabilities in unpatched Palo Alto Networks firewall appliances. These flaws, all affecting Palo Alto’s...
‘Darcula’ Phishing Kit Can Now Impersonate Any Brand – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Australian Critical Infrastructure Faces ‘Acute’ Foreign Threats – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Insight Partners, VC Giant, Falls to Social Engineering – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why...
Russian Groups Target Signal Messenger in Spy Campaign – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Content Credentials Show Promise, But Ecosystem Still Young – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Hackerangriff auf LUP-Kliniken: Täter haben Daten gestohlen – Source: www.csoonline.com
Source: www.csoonline.com – Author: Krankenhäuser geraten immer öfter in das Visier von Cyberkriminellen. Jetzt hat es zwei Kliniken im Landkreis Ludwigslust-Parchim getroffen. Fah Studio 27 –...
Understanding OWASP’s Top 10 list of non-human identity critical risks – Source: www.csoonline.com
Source: www.csoonline.com – Author: Non-human identities represent a vast chunk of credentials used by a typical organization, up to 50 times higher than the number of...
What is SIEM? Improving security posture through event log data – Source: www.csoonline.com
Source: www.csoonline.com – Author: Security information and event management software collects information to help identify and track cyber breaches. Here’s how to understand their features and...