Source: securityaffairs.com – Author: Pierluigi Paganini North Korea-linked APT group ScarCruft used a new Android spyware dubbed KoSpy to target Korean and English-speaking users. North Korea-linked...
Day: March 14, 2025
Experts warn of a coordinated surge in the exploitation attempts of SSRF vulnerabilities – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Researchers warn of a “coordinated surge” in the exploitation attempts of SSRF vulnerabilities in multiple platforms. Threat intelligence firm GreyNoise...
Chromecast chaos – 2nd gen devices go belly-up as Google struggles to fix certificate issue – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley Has your old Chromecast suddenly developed a problem? You’re not alone it seems. Many users of second-generation Chromecast and Chromecast...
Medusa ransomware: FBI and CISA urge organisations to act now to mitigate threat – Source: www.tripwire.com
Source: www.tripwire.com – Author: Graham Cluley The Medusa ransomware gang continues to present a major threat to the critical infrastructure sector, according to a newly-released joint...
Cisco IOS XR Software Secure Boot Bypass Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco IOS XR Software Secure Boot Bypass Vulnerability High CVE-2025-20143 CWE-347 Download CSAF Email Summary A vulnerability in the boot process...
Cisco IOS XR Software Release 7.9.2 Denial of Service Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco IOS XR Software Release 7.9.2 Denial of Service Vulnerability High CVE-2025-20141 CWE-770 Download CSAF Email Summary A vulnerability in the...
TP-Link Router Botnet – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier There is a new botnet that is infecting TP-Link routers: The botnet can lead to command injection which then makes...
RIP Mark Klein – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Clive Robinson • March 13, 2025 1:11 PM RIP Mark Klein, Even though he’d been “retired” for a couple of...
The True Cost of Cybercrime: Why Global Damages Could Reach $1.2 – $1.5 Trillion by End of Year 2025 – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: Gary Introduction: The Escalating Economic Threat of Cybercrime Cybercrime is no longer just an IT problem—it has evolved into a global economic...
Setting the Record Straight: Debunking Myths About Mainframe Security in Cyber Strategies – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Earlier this year, the modern mainframe celebrated its 60th anniversary, underscoring its ongoing significance. According to this 2024 Forrester report, 61%...
Guardians of AIoT: Protecting Smart Devices from Data Poisoning – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team What if the smart thermostat in your home decides that winter is the perfect time for you to experience tropical...
Fraudsters Impersonate Clop Ransomware to Extort Businesses – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Fraudsters have been observed impersonating the Clop ransomware gang to extort businesses, researcher from Barracuda Networks have found. The incident is part...
Cybersecurity Industry Falls Short on Collaboration, Says Former GCHQ Director – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: In a world where economies are increasingly protectionist and nation-states emphasize the own sovereignty, cybersecurity organizations must strengthen their collaboration, according to...
Volt Typhoon Accessed US OT Network for Nearly a Year – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A prolonged cyber intrusion by the Volt Typhoon threat group has exposed vulnerabilities in the US electric grid. Cybersecurity analysts at Dragos...
CISA, FBI Warn of Medusa Ransomware Impacting Critical Infrastructure – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and the Multi-State Information Sharing and Analysis Center (MS-ISAC)...
‘ClickFix’ Phishing Scam Impersonates Booking.com to Target Hospitality – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A sophisticated ‘ClickFix’ phishing campaign is impersonating Booking.com to target hospitality firms with multiple infostealing malware, enabling financial fraud and theft. The...
Fast 1 Million Geschäfts- und Privat-PCs kompromittiert – Source: www.csoonline.com
Source: www.csoonline.com – Author: Privat illegale Streams anzuschauen gefährdet auch Unternehmen. Häufig nutzen Hacker Werbebanner, um verschiedenste Devices mit Malware zu infizieren. Ein Bericht von Microsoft...
The most notorious and damaging ransomware of all time – Source: www.csoonline.com
Source: www.csoonline.com – Author: Ransomware has a long history, dating back to the late 1980s. This past year, it generated $811 millions in payments to the criminal...
CIOs and CISOs take on NIS2: Key challenges, security opportunities – Source: www.csoonline.com
Source: www.csoonline.com – Author: Between complexity, bureaucracy, and costs, NIS2 compliance has been a challenging journey for many IT leaders — and one that isn’t over....
KI-gestützte Angriffe machen deutschen Betrieben zu schaffen – Source: www.csoonline.com
Source: www.csoonline.com – Author: Während Hacker bereits auf breiter Front KI-gestützte Angriffe fahren, tun sich viele Unternehmen schwer, den neuen Gefahren zu begegnen. Während Hacker KI...
Australian financial firm hit with lawsuit after massive data breach – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 13 Mar 20253 mins Data BreachRegulationSecurity Practices The industry regulator alleges that FIIG Securities failed to maintain adequate cybersecurity measures for...
GitHub to unbundle Advanced Security – Source: www.infoworld.com
Source: www.infoworld.com – Author: GitHub announced plans to unbundle its GitHub Advanced Security (GHAS) product, breaking it up into two standalone products: GitHub Secret Protection and...
OBSCURE#BAT Malware Highlights Risks of API Hooking – Source: www.darkreading.com
Source: www.darkreading.com – Author: Rob Wright Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
FBI, CISA Raise Alarms As Medusa Ransomware Attacks Grow – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have...
Car Exploit Allows You to Spy on Drivers in Real Time – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Salt Typhoon: A Wake-up Call for Critical Infrastructure – Source: www.darkreading.com
Source: www.darkreading.com – Author: Gabrielle Hempel Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
AI Chatbot DeepSeek R1 Can Be Manipulated to Create Malware – Source:hackread.com
Source: hackread.com – Author: Waqas. Tenable Research reveals that AI chatbot DeepSeek R1 can be manipulated to generate keyloggers and ransomware code. While not fully autonomous,...
FBI and CISA Urge Enabling 2FA to Counter Medusa Ransomware – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. FBI and CISA warn of Medusa ransomware attacks impacting critical infrastructure. Learn about Medusa’s tactics, prevention tips, and why paying...
Ransomware Hits Record High: 126% Surge in Attacks in February 2025 – Source:hackread.com
Source: hackread.com – Author: Waqas. February 2025 saw a record 126% surge in ransomware attacks, with Cl0p leading the charge. Hackers exploited file transfer flaws, infostealers,...
Speedify VPN Review 2025: Features, Security, and Performance – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Luis Millares Speedify VPN fast facts Our rating: 3.1 stars out of 5.00 Pricing: Starts at $7.49 per month Key features: Dedicated...