Source: www.infosecurity-magazine.com – Author: A new security vulnerability in the Chaty Pro plugin has been identified, potentially allowing attackers to take over WordPress sites by uploading...
Day: March 6, 2025
Attackers Target Japanese Firms with Cobalt Strike – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Threat analysts have warned against a sophisticated cyber-intrusion campaign that predominantly targets organizations in Japan across the technology, telecommunications, entertainment, education and...
Cybersecurity Job Satisfaction Plummets, Women Hit Hardest – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Job satisfaction levels for women working in cybersecurity have plummeted in the past two years, with just 67% reporting being satisfied in...
Six Critical Infrastructure Sectors Failing on NIS2 Compliance – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The EU’s leading security agency has warned that six critical infrastructure (CNI) sectors are struggling to comply with the NIS2 directive. The...
US Charges Members of Chinese Hacker-for-Hire Group i-Soon – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The US has charged members of prolific Chinese hacking group APT27, alongside government employees and i-Soon staff, for long-running arms-length hacking campaigns....
Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution – Source:thehackernews.com
Source: thehackernews.com – Author: . Elastic has rolled out security updates to address a critical security flaw impacting the Kibana data visualization dashboard software for Elasticsearch...
EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing – Source:thehackernews.com
Source: thehackernews.com – Author: . The financially motivated threat actor known as EncryptHub has been observed orchestrating sophisticated phishing campaigns to deploy information stealers and ransomware,...
Outsmarting Cyber Threats with Attack Graphs – Source:thehackernews.com
Source: thehackernews.com – Author: . Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations can no longer rely on periodic...
Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom – Source:thehackernews.com
Source: thehackernews.com – Author: . The threat actors behind the Medusa ransomware have claimed nearly 400 victims since it first emerged in January 2023, with the...
Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access – Source:thehackernews.com
Source: thehackernews.com – Author: . Over 1,000 websites powered by WordPress have been infected with a third-party JavaScript code that injects four separate backdoors. “Creating four...
U.S. Charges 12 Chinese Nationals in State-Backed Hacking Operations – Source:thehackernews.com
Source: thehackernews.com – Author: . The U.S. Department of Justice (DoJ) has announced charges against 12 Chinese nationals for their alleged participation in a wide-ranging scheme...
Uncoder: Private Non-Agentic AI for Threat-Informed Detection Engineering – Source: socprime.com
Source: socprime.com – Author: Veronika Telychko SOC Prime is excited to announce a major upgrade to Uncoder AI—an industry-first integrated development environment (IDE) and co-pilot for...
SquareX Unveils Polymorphic Extensions that Morph Infostealers into Any Browser Extension – Password Managers, Wallets at Risk – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. Palo Alto, Singapore, March 6th, 2025, CyberNewsWire With recent attack disclosures like Browser Syncjacking and extension infostealers, browser extensions have become...
US Charges 12 in Chinese Hacker Network, Offers $10M Reward – Source:hackread.com
Source: hackread.com – Author: Waqas. In a major coordinated operation, several U.S. law enforcement agencies have charged 12 Chinese nationals with a series of cyber attacks...
Hackers Deploy AI Deepfake of YouTube CEO in Credential Theft Scam – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. YouTube CEO Neal Mohan was impersonated in a deepfake phishing scam. Learn about the attack, how to spot the red...
The Combined Cipher Machine – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier About Bruce Schneier I am a public-interest technologist, working at the intersection of security, technology, and people. I’ve been writing...
CISA Identifies Five New Vulnerabilities Currently Being Exploited – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Bob • March 5, 2025 5:40 PM Don’t worry. We’ll gut CISA to the point of impotence, then...
Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability Critical CVE-2024-20418 CWE-77 Download CSAF Email Summary...
Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability High CVE-2024-20536 CWE-89 Download CSAF Email Summary A vulnerability in a REST API...
US Indicts China’s iSoon ‘Hackers-for-Hire’ Operatives – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine The US Justice Department on Wednesday unsealed indictments charging employees of a Chinese cybersecurity firm known as i-Soon (Anxun Information...
Organizations Still Not Patching OT Due to Disruption Concerns: Survey – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Many organizations are still concerned that patching operational technology (OT) systems can lead to equipment downtime and operational disruptions, and...
SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine SpecterOps, a security startup selling technology to secure Microsoft’s Active Directory (AD) and Azure AD deployments, has raised an unusually...
China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Microsoft threat hunters warned Wednesday of a significant shift in tactics by Silk Typhoon, a Chinese government espionage group linked...
Iranian Hackers Target UAE Firms With Polyglot Files – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Proofpoint warns of a highly targeted campaign targeting several United Arab Emirates organizations across multiple sectors with a new backdoor....
North Korean Fake IT Workers Pose as Blockchain Developers on GitHub – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A network of North Korean fake IT workers has been creating personas on GitHub to obtain remote engineering and full-stack...
Two Venezuelans Arrested in US for ATM Jackpotting – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The US Justice Department announced on Tuesday that two Venezuelan nationals were arrested and charged recently over their role in...
Ransomware Group Claims Attack on Tata Technologies – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A ransomware gang has claimed responsibility for an attack on Indian engineering firm Tata Technologies, threatening to leak 1.4 terabytes...
Inspiring the Future: STEM Outreach Program for Young Female Students
On Feb. 3, 2025, a transformative STEM outreach event for more than 25 female students took place at Whirlpool’s manufacturing plant in Puducherry, India. Source Views:...
China-linked APT Silk Typhoon targets IT Supply Chain – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Microsoft warns that China-backed APT Silk Typhoon linked to US Treasury hack, is now targeting global IT supply chains, using...
Hunters International gang claims the theft of 1.4 TB of data allegedly stolen from Tata Technologies – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Ransomware group Hunters International claims to have hacked Tata Technologies, threatening to leak 1.4 TB of stolen data. The Hunters...