Source: hackread.com – Author: Waqas. API attacks are constantly on the rise, with a recent alarming study showing that 59% of organizations give out ‘write’ access...
Day: March 12, 2025
March 2025 Patch Tuesday: Microsoft Fixes 57 Vulnerabilities, 7 Zero-Days – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. Microsoft has released its March 2025 security updates, addressing a total of 57 vulnerabilities, including six that were actively being...
Neun Prozent der Betriebe wurden ausgespäht – Source: www.csoonline.com
Source: www.csoonline.com – Author: Wirtschaftsspionage läuft vor allem übers Internet und betrifft viele Branchen. Nach Ansicht von Fachleuten könnte das Problem zunehmen. Im Fokus der Spione...
Fortinet reinforces OT network security platform – Source: www.networkworld.com
Source: www.networkworld.com – Author: News Mar 11, 20254 mins IoT SecurityRemote Access SecuritySecurity Information and Event Management Software Fortinet adds ruggedized switches and firewalls, OT-specific threat...
Unternehmen ertrinken in Software-Schwachstellen – Source: www.csoonline.com
Source: www.csoonline.com – Author: Unternehmen brauchen immer länger, um Sicherheitslücken in ihrer Software zu beheben. Die damit verbundenen Sicherheitsdefizite werden immer kritischer. Die durchschnittliche Behebungszeit für...
CISA cybersecurity workforce faces cuts amid shifting US strategy – Source: www.csoonline.com
Source: www.csoonline.com – Author: CISA red teams have been dismantled as federal cybersecurity funding faces deep cuts. The US government’s cybersecurity defenses are under strain after...
Apple patches zero-day bugs used in targeted iPhone attacks – Source: www.csoonline.com
Source: www.csoonline.com – Author: The bug was reportedly exploited in “extremely sophisticated” attacks against targeted individuals. Apple has rolled out emergency patches for a bug affecting...
The cybersecurity product sales process is broken, but it doesn’t have to be – Source: www.csoonline.com
Source: www.csoonline.com – Author: Opinion 12 Mar 20256 mins Business IT AlignmentBusiness Process ManagementCSO and CISO The relationship between CISOs and vendors is fraught with problems...
The state of ransomware: Fragmented but still potent despite takedowns – Source: www.csoonline.com
Source: www.csoonline.com – Author: Feature 12 Mar 20257 mins RansomwareSecurityThreat and Vulnerability Management Fresh cybercrime threats are emerging from rebranded, leaked, or purchased code, as data...
Was CISOs von Moschusochsen lernen können – Source: www.csoonline.com
Source: www.csoonline.com – Author: Der “Moschusochsen-Ansatz” kann Sicherheitsentscheider in Sachen Drittanbieter-Risikomanagement entscheidend voranbringen. Von Moschusochsen können sich CISOs eine Scheibe abschneiden – wenn es nach unserem...
Microsoft patches privilege escalation flaw exploited since 2023 – Source: www.csoonline.com
Source: www.csoonline.com – Author: The privilege escalation flaw in the Win23k driver affects older versions of Windows and is one of six zero-day vulnerabilities fixed by...
March Patch Tuesday warnings: Act fast to plug zero day holes in Windows, VMware – Source: www.csoonline.com
Source: www.csoonline.com – Author: Note also that apps using OpenSSH have to be patched to close a decade-old hole. CISOs need to lean on their admins...
Ivanti EPM vulnerabilities actively exploited in the wild, CISA warns – Source: www.csoonline.com
Source: www.csoonline.com – Author: Three of the four critical path traversal flaws fixed in January in Ivanti Endpoint Manager are being exploited in cyberattacks after proof-of-concept...
Google paid nearly $12 million to bug hunters last year – Source: www.csoonline.com
Source: www.csoonline.com – Author: The company says it has paid out over $65 million since its bug hunting program started. Google announced it has paid out $11.8 million...
Microsoft Patches a Whopping Seven Zero-Days in March – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Microsoft’s March Patch Tuesday has put more pressure on system administrators, with over 50 new vulnerabilities to fix including seven zero-days. Of...
New Ballista Botnet spreads using TP-Link flaw. Is it an Italian job? – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The Ballista botnet is exploiting an unpatched TP-Link vulnerability, targeting over 6,000 Archer routers, Cato CTRL researchers warn. Cato CTRL...
Apple fixed the third actively exploited zero-day of 2025 – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Apple addressed a zero-day vulnerability, tracked as CVE-2025-24201, that has been exploited in “extremely sophisticated” cyber attacks. Apple has released...
Switzerland’s NCSC requires cyberattack reporting for critical infrastructure within 24 hours – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Switzerland’s NCSC mandates critical infrastructure organizations to report cyberattacks within 24 hours of discovery. Switzerland’s National Cybersecurity Centre (NCSC) now...
SideWinder APT targets maritime and nuclear sectors with enhanced toolset – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The APT group SideWinder targets maritime and logistics companies across South and Southeast Asia, the Middle East, and Africa. Kaspersky...
How to Use NordPass: A Step-by-Step Guide – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Luis Millares NordPass, Nord Security’s password manager, is an intuitive application offering reliable password storage and protection. In this article, we walk...
Webinar: Credential security in the age of AI: Insights for IT leaders – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content Fireside chat with Graham Cluley about credential security in the age of AI Make a note in...
UK Cybersecurity Sector Revenue Grows 12% to Top £13bn – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The UK’s cybersecurity industry demonstrated “exceptional performance” in the past financial year, increasing total revenue by 12% to reach £13.2bn, according to...
Blind Eagle Targets Colombian Government with Malicious .url Files – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A new cyber-threat campaign targeting Colombian government institutions and organizations since November 2024 has been linked to the threat group Blind Eagle, also...
New York Sues Allstate Over Data Breach and Security Failures – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: New York attorney general, Letitia James, has filed a lawsuit against Allstate’s National General unit, alleging the company failed to adequately protect...
CISA worker says 100-strong red team fired after DOGE cancelled contract – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson A penetration tester who worked at the US govt’s CISA claims his 100-strong team was dismissed after Elon Musk’s Trump-blessed...
Choose your own Patch Tuesday adventure: Start with six zero-day fixes, or six critical flaws – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Patch Tuesday Microsoft’s Patch Tuesday bundle has appeared, with a dirty dozen flaws competing for your urgent attention – six...
‘Uber for nurses’ exposes 86K+ medical records, PII in open S3 bucket for months – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Exclusive More than 86,000 records containing nurses’ medical records, facial images, ID documents and more sensitive info linked to health...
FTC’s $25.5M scam refund treats victims to $34 each – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones The Federal Trade Commission (FTC) is distributing over $25.5 million in refunds to consumers deceived by tech support scammers, averaging...
CVE-2025-27840: Vulnerability Exploitation in Espressif ESP32 Bluetooth Chips Can Lead to Unauthorized Access to Devices – Source: socprime.com
Source: socprime.com – Author: Veronika Telychko Following the disclosure of an authorization bypass vulnerability in the Motorola Mobility Droid Razr HD (Model XT926), another major security...
SOC Prime Announces Referral Program for Individual Cyber Defenders – Source: socprime.com
Source: socprime.com – Author: Daryna Olyniychuk Invite Your Peers, Get 20% Off SOC Prime Platform Solo Subscriptions At SOC Prime, we foster a strong cybersecurity community...