Source: www.mcafee.com – Author: Jasdev Dhaliwal. W-2 phishing scams often involve emails that appear to be from the IRS or another official source, requesting personal information....
Day: March 13, 2025
Cisco IOS XR Software Access Control List Bypass Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco IOS XR Software Access Control List Bypass Vulnerability Medium CVE-2025-20145 CWE-264 Download CSAF Email Summary A vulnerability in the access...
Cisco IOS XR Software Hybrid Access Control List Bypass Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco IOS XR Software Hybrid Access Control List Bypass Vulnerability Medium CVE-2025-20144 CWE-284 Download CSAF Email Summary A vulnerability in the...
Red Teaming for Generative AI: A Practical Approach to AI Security – Source:levelblue.com
Source: levelblue.com – Author: hello@alienvault.com. Generative AI is changing industries by making automation, creativity, and decision-making more powerful. But it also comes with security risks. AI...
Unpatched Edimax Camera Flaw Exploited Since at Least May 2024 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A recently disclosed zero-day affecting Edimax devices has been exploited in the wild since at least May 2024, according to...
FreeType Zero-Day Being Exploited in the Wild – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Meta’s Facebook security team has raised an alarm after spotting live exploitation of a zero-day vulnerability in the widely used...
Cisco Patches 10 Vulnerabilities in IOS XR – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Cisco on Wednesday announced patches for 10 vulnerabilities in IOS XR, including five that could be exploited to cause denial-of-service...
Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Grafana path traversal vulnerabilities have been exploited prior to a broad campaign targeting server-side request forgery (SSRF) bugs in multiple...
Microsoft Warns of Hospitality Sector Attacks Involving ClickFix – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A cybercrime group has been targeting organizations in the hospitality sector in attacks involving fake Booking.com emails and the use...
DeepSeek’s Malware-Generation Capabilities Put to Test – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Researchers at security firm Tenable have analyzed the ability of the Chinese gen-AI DeepSeek to develop malware such as keyloggers...
North Korean Hackers Distributed Android Spyware via Google Play – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A North Korean APT actor has been targeting Korean and English-speaking users with an Android surveillance tool distributed via Google...
Medusa Ransomware Made 300 Critical Infrastructure Victims – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Since June 2021, Medusa ransomware-as-a-service (RaaS) affiliates have hit over 300 critical infrastructure organizations, the US government warns. Medusa was...
Medusa Ransomware Detection: The FBI, CISA & Partners Warn of Increasing Attacks by Ransomware Developers and Affiliates Against Critical Infrastructure – Source: socprime.com
Source: socprime.com – Author: Daryna Olyniychuk According to Sophos, ransomware recovery costs soared to $2.73 million in 2024, displaying a 500% rise compared to 2023 and...
Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails – Source:thehackernews.com
Source: thehackernews.com – Author: . Microsoft has shed light on an ongoing phishing campaign that targeted the hospitality sector by impersonating online travel agency Booking.com using...
North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps – Source:thehackernews.com
Source: thehackernews.com – Author: . The North Korea-linked threat actor known as ScarCruft is said to have been behind a never-before-seen Android surveillance tool named KoSpy...
GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks – Source:thehackernews.com
Source: thehackernews.com – Author: . Two high-severity security flaws have been disclosed in the open-source ruby-saml library that could allow malicious actors to bypass Security Assertion...
Future-Proofing Business Continuity: BCDR Trends and Challenges for 2025 – Source:thehackernews.com
Source: thehackernews.com – Author: . As IT environments grow more complex, IT professionals are facing unprecedented pressure to secure business-critical data. With hybrid work the new...
Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk – Source:thehackernews.com
Source: thehackernews.com – Author: . Meta has warned that a security vulnerability impacting the FreeType open-source font rendering library may have been exploited in the wild....
WARNING: Expiring Root Certificate May Disable Firefox Add-Ons, Security Features, and DRM Playback – Source:thehackernews.com
Source: thehackernews.com – Author: . Browser maker Mozilla is urging users to update their Firefox instances to the latest version to avoid facing issues with using...
HealthTech Database Exposed 108GB Medical and Employment Records – Source:hackread.com
Source: hackread.com – Author: Waqas. A misconfigured database exposed 108.8 GB of sensitive data, including information on over 86,000 healthcare workers affiliated with ESHYFT, a New...
New OBSCURE#BAT Malware Targets Users with Fake Captchas – Source:hackread.com
Source: hackread.com – Author: Waqas. OBSCURE#BAT malware campaign exploits social engineering & fake software downloads to evade detection, steal data and persist on systems. Learn how...
INE Security Alert: Using AI-Driven Cybersecurity Training to Counter Emerging Threats – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. Cary, North Carolina, March 13th, 2025, CyberNewsWire As Artificial Intelligence (AI)-powered cyber threats surge, INE Security, a global leader in cybersecurity...
Modat launches premier product, Modat Magnify for Cybersecurity Professionals – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. The Hague, the Netherlands, March 13th, 2025, CyberNewsWire Founded in 2024, Modat – the European-crafted, research-driven, AI-powered cybersecurity company, has announced...
Meta warns of actively exploited flaw in FreeType library – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Meta warned that a vulnerability, tracked as CVE-2025-27363, impacting the FreeType library may have been exploited in the wild. Meta warned that...
Medusa ransomware hit over 300 critical infrastructure organizations until February 2025 – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The Medusa ransomware operation hit over 300 organizations in critical infrastructure sectors in the United States until February 2025. The...
China-linked APT UNC3886 targets EoL Juniper routers – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Mandiant researchers warn that China-linked actors are deploying custom backdoors on Juniper Networks Junos OS MX routers. In mid-2024, Mandiant identified...
U.S. CISA adds six Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds six Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity...
Microsoft Patch Tuesday security updates for March 2025 fix six actively exploited zero-days – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Microsoft Patch Tuesday security updates for March 2025 address 56 security vulnerabilities in its products, including six actively exploited zero-days....
Cisco IOS XR Software CLI Privilege Escalation Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco IOS XR Software CLI Privilege Escalation Vulnerability High CVE-2025-20138 CWE-78 Download CSAF Email Summary A vulnerability in the CLI of...
Cisco IOS XR Software for ASR 9000 Series Routers Layer 3 Multicast Denial of Service Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco IOS XR Software for ASR 9000 Series Routers Layer 3 Multicast Denial of Service Vulnerability High CVE-2025-20146 CWE-20 Download CSAF...