Source: socprime.com – Author: Veronika Telychko A novel max-severity RCE vulnerability (CVE-2025-27364) in MITRE Caldera poses a serious risk of system compromise. The flaw can also...
Day: February 25, 2025
Critical deserialization bugs in Adobe, Oracle software actively exploited, warns CISA – Source: www.csoonline.com
Source: www.csoonline.com – Author: The flaws allow attackers to use a serialization oversight to compromise systems for remote code execution. CISA is warning Adobe and Oracle...
Stürmer Maschinen von Ransomware-Attacke getroffen – Source: www.csoonline.com
Source: www.csoonline.com – Author: Der Großhändler Stürmer Maschinen wurde Ziel einer Ransomware-Attacke. Die Täter haben 800 Gigabyte Daten gestohlen. Die Ransomware-Bande Lynx erpresst den Großhändler Stürmer...
How to create an effective incident response plan – Source: www.csoonline.com
Source: www.csoonline.com – Author: To ensure minimal business disruption, CISOs must have the right incident recovery strategies, roles, and processes in place. Security experts share tips...
Krypto-Rekordraubzug von Nordkorea gesteuert? – Source: www.csoonline.com
Source: www.csoonline.com – Author: Die berüchtigte, nordkoreanische Cybercrime-Gang Lazarus hat die Kryptobörse Bybit um 1,5 Milliarden Dollar erleichtert – sagen Experten. Beim Angriff auf die Kryptobörse...
CIO des Jahres 2025 – Wettbewerb startet – Source: www.csoonline.com
Source: www.csoonline.com – Author: Auch in diesem Jahr zeichnen COMPUTERWOCHE und CIO die besten IT-Managerinnen und -Manager im deutschsprachigen Raum aus. Siegerinnen und Sieger des vergangenen...
DOGE’s US worker purge has created a spike in insider risk – Source: www.csoonline.com
Source: www.csoonline.com – Author: Opinion 25 Feb 20256 mins CSO and CISOGovernmentGovernment IT Summarily firing workers who have access to national secrets is creating a nearly...
Security Awareness Trainings: Schulungen richtig managen – Source: www.csoonline.com
Source: www.csoonline.com – Author: Lesen Sie, welche Aspekte besonders entscheidend sind, damit Ihr Security Awareness Training erfolgreich ist. Foto: nialowwa – shutterstock.com Studien wie die von...
61% of Hackers Use New Exploit Code Within 48 Hours of Attack – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Written by In 2024, cyber-criminals have launched attacks within 48 hours of discovering a vulnerability, with 61% of hackers using new exploit...
Ghostwriter Cyber-Attack Targets Ukrainian, Belarusian Opposition – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A new wave of cyber-attacks linked to the Ghostwriter threat actor has been observed focusing on Ukraine and opposition groups in Belarus....
Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Cyber threat actors are no longer just targeting hospitals with ransomware, they’re now infiltrating the very software that patients use to manage...
Only a Fifth of Ransomware Attacks Now Encrypt Data – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Ransomware actors are largely eschewing encryption, with at least 80% of attacks last year focusing solely on exfiltrating data, as it is...
Chinese Botnet Bypasses MFA in Microsoft 365 Attacks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A massive Chinese botnet is targeting Microsoft 365 accounts with large-scale password spraying attacks that can bypass multifactor authentication (MFA), according to...
Quarter of Brits Report Deepfake Phone Scams – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Global consumers encountered over one billion fraudulent calls in the final quarter of 2024, with a quarter of Brits and nearly a...
Unmanaged Devices: The Overlooked Threat CISOs Must Confront – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jeff Shiner Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Industrial System Cyberattacks Surge as OT Stays Vulnerable – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Betting (and Losing) the Farm on Traditional Cybersecurity – Source: www.darkreading.com
Source: www.darkreading.com – Author: Maxime Lamothe-Brassard Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
25 Years On, Active Directory Is Still a Prime Attack Target – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
$1.5B Hack of Bybit Might Be the Largest Crypto Heist Ever – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Esther Shein Published February 24, 2025 Get details about how this cryptocurrency heist happened, and what Bybit’s CEO has said about it....
Offensive AI Startup Dreadnode Secures $14M to Stress-Test AI Systems – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Dreadnode, an early stage startup specializing in offensive AI security, has raised $14 million in a funding round from an...
Skybox Security Shuts Down, Lays off Entire Workforce – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News Skybox Security, a once high-flying startup that raised north of $300 million, has abruptly shut down, laying off its entire...
Edera Banks $15M for Kubernetes Workload Isolation Tech – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Edera, a Seattle early stage startup building workload isolation technology to mitigate lateral movement and block “living off the land”...
Leader of North Korean Hackers Sanctioned by EU – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The European Union has announced new sanctions against entities aiding Russia’s war against Ukraine, including an individual who serves as...
Nine Threat Groups Active in OT Operations in 2024: Dragos – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Industrial cybersecurity company Dragos on Tuesday published its 2025 OT/ICS Cybersecurity Report, which provides insights on the threat activity and...
CISA Warns of Attacks Exploiting Oracle Agile PLM Vulnerability – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The cybersecurity agency CISA on Monday added an Oracle Agile Product Lifecycle Management (PLM) software flaw to its Known Exploited...
What Microsoft’s Majorana 1 Chip Means for Quantum Decryption – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend Microsoft has announced the world’s first quantum processing unit that uses topological qubits: the Majorana 1, “designed to scale to...
Harassment allegations against DEF CON veteran detailed in court filing – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Details about the harassment allegations leveled at DEF CON veteran Christopher Hadnagy have now been revealed after a motion for...
China’s Silver Fox spoofs medical imaging apps to hijack patients’ computers – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons A Chinese government-backed group is spoofing legitimate medical software to hijack hospital patients’ computers, infecting them with backdoors, credential-swiping keyloggers,...
Malware variants that target operational tech systems are very rare – but 2 were found last year – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Two new malware variants specifically designed to disrupt critical industrial processes were set loose on operational technology networks last year,...
Southern Water takes the fifth over alleged $750K Black Basta ransom offer – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Southern Water neither confirms nor denies offering Black Basta a $750,000 ransom payment following its ransomware attack in 2024. The...