Source: www.hackerone.com – Author: Martijn Russchen. In December 2018 we released Hacker Dashboard, the central place for all your hacker related activities. Thanks to the community,...
Month: February 2025
Sandworm APT Attacks Detection: russian State-Sponsored Hackers Deploy Malicious Windows KMS Activators to Target Ukraine – Source: socprime.com
Source: socprime.com – Author: Daryna Olyniychuk For over a decade, russia-backed Sandworm APT group (also tracked as UAC-0145, APT44) has consistently targeted Ukrainian organizations, with a...
Cybercrime Threatens National Security, Google Threat Intel Team Says – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend It is no longer realistic to treat cybercriminals and state-backed cyber adversaries as separate threats – the personnel, tools, and...
Microsoft Patches ‘Wormable’ Windows Flaw and File-Deleting Zero-Day – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine The Microsoft Patch Tuesday machine hummed loudly this month with the rollout of urgent fixes for a pair of already-exploited...
Adobe Plugs 45 Software Security Holes, Warns of Code Execution Risks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Adobe on Tuesday rolled out patches for at least 45 documented vulnerabilities across multiple products and warned that these software...
Russian Cybercrime Network Targeted for Sanctions Across US, UK and Australia – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press The U.S., U.K. and Australia on Tuesday sanctioned a Russian web-hosting services provider and two Russian men who administer the...
High-Severity OpenSSL Vulnerability Found by Apple Allows MitM Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The OpenSSL Project on Tuesday announced patches for the first high-severity vulnerability seen in the secure communications library in two...
SAP Releases 21 Security Patches – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Enterprise software maker SAP on Tuesday announced the release of 19 new and two updated security notes as part of...
Authorities Disrupt 8Base Ransomware, Arrest Four Russian Operators – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The 8Base ransomware group’s infrastructure has been disrupted and leaders have been arrested in an international law enforcement operation, Europol...
Intel Patched 374 Vulnerabilities in 2024 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire In the calendar year 2024, Intel patched a total of 374 vulnerabilities in software, firmware, and hardware products, and paid...
India’s Cybercrime Problems Grow as Nation Digitizes – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Source: NicoElNino via Shutterstock India continues to see a surge in cybercrime affecting both citizens and businesses, with...
Microsoft’s February Patch a Lighter Lift Than January’s – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Source: Somphop Krittayaworagul via Shutterstock Microsoft’s February security update contains substantially fewer vulnerabilities for admins to address compared...
Apple Releases Urgent Patch for USB Vulnerability – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: Simon Dack via Alamy Stock Photo NEWS BRIEF Apple has released a security update for...
CISA Places Election Security Staffers on Leave – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: Rob Crandall via Alamy Stock Photo NEWS BRIEF The US Cybersecurity and Infrastructure Security Agency...
Data Leaks Happen Most Often in These States — Here’s Why – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Senior Editor, Dark Reading Source: Oleckii Mach via Alamy Stock Photo States are increasingly embracing data privacy regulation, and Kentucky,...
Salt Typhoon’s Impact on the US & Beyond – Source: www.darkreading.com
Source: www.darkreading.com – Author: Michael McLaughlin, Jillian Cash, Kellen Carleton Source: vska via Alamy Stock Photo COMMENTARY The Chinese-linked hacking group Salt Typhoon recently was detected...
DeepSeek AI Fails Multiple Security Tests, Raising Red Flag for Businesses – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Source: Mundissima via Alamy Stock Photo Organizations might want to think twice before using the Chinese generative AI...
Ransomware Groups Made Less Money in 2024 – Source: www.darkreading.com
Source: www.darkreading.com – Author: The total volume of ransom payments decreased year-over-year by approximately 35%, due to law enforcement activities and more victims refusing to pay,...
Product Update | Cloud Monitor + Content Filter – Source: securityboulevard.com
Source: securityboulevard.com – Author: Alexa Sander NEW! In Cloud Monitor: Policy Enhancements We’re thrilled to introduce our latest Cloud Monitor policy updates! We designed these enhancements...
Authorities Seize 8Base Ransomware Infrastructure, Arrest Four Russians – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Law enforcement agencies from more than a dozen countries in a joint operation arrested four people linked to the Russian-based...
The Current State of the CISO with Nick Kakolowski – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Vizard Nick Kakolowski, senior research director for IANS, dives into a survey done in conjunction with Artico Search on the current...
Enhancing IAM Security with AI Agents: A Strategic Approach by SecureFLO – Source: securityboulevard.com
Source: securityboulevard.com – Author: service Enhancing IAM Security with AI Agents: A Strategic Approach by SecureFLO Enhancing IAM Security with AI Agents: A Strategic Approach by...
Adam Khan on the Unique Security Challenges in Education IT – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Vizard Adam Khan, vice president of global security operations for Barracuda Networks, explains what makes securing schools, such as universities, so...
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391) – Source: securityboulevard.com
Source: securityboulevard.com – Author: Tenable Security Response Team 3Critical 52Important 0Moderate 0Low Microsoft addresses 55 CVEs with three rated critical and four zero-day vulnerabilities, including two...
Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #325 – Fixing the Bug – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink *** This is a...
The Field Engineer’s Handbook: Configuring an Arista Networks Switch with Splunk – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jessi Clark Transform your network monitoring capabilities with the powerful combination of Arista Networks’ advanced telemetry and Splunk’s powerful analytics platform. This...
Navigating Firewall Security Policy Challenges in Technology Organizations: How FireMon Simplifies Complexity – Source: securityboulevard.com
Source: securityboulevard.com – Author: FireMon In the technology sector, innovation and agility are key drivers of success. Organizations in this field lead the charge in adopting...
Networks hosting botnet C&Cs: Same players, same problems – Source: securityboulevard.com
Source: securityboulevard.com – Author: The Spamhaus Team With every Botnet Threat Update we publish, the same networks consistently appear in the Top 20 for hosting botnet...
February Patch Tuesday: CISOs should act now on two actively exploited Windows Server vulnerabilities – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 11 Feb 20255 mins Threat and Vulnerability ManagementVulnerabilitiesWindows Security Also prioritize patches for vulnerabilities in LDAP and NTLM, as well as...
Authorities seize Phobos and 8Base ransomware servers, arrest 4 suspects – Source: www.csoonline.com
Source: www.csoonline.com – Author: An international law-enforcement collaboration has taken down two Russian nationals and two unidentified women in Thailand who ran Phobos ransomware affiliate platforms....