Source: hackread.com – Author: Deeba Ahmed. Credential theft alert! Venak Security discovers a BYOVD attack using .SYS drivers to bypass Windows security. Learn how this attack...
Day: March 21, 2025
New Attacks Exploit Year-Old ServiceNow Flaws – Israel Hit Hardest – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. ServiceNow vulnerability alert: Hackers are actively exploiting year-old flaws (CVE-2024-4879, CVE-2024-5217, CVE-2024-5178) for database access. Learn how to protect your...
RansomHub affiliate uses custom backdoor Betruger – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Symantec researchers linked a custom backdoor, called Betruger, found in recent ransomware attacks to an affiliate of the RansomHub operation....
Cisco Smart Licensing Utility flaws actively exploited in the wild – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Experts warn of the active exploitation of two recently patched security vulnerabilities affecting Cisco Smart Licensing Utility. Cisco disclosed two...
Pennsylvania State Education Association data breach impacts 500,000 individuals – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A data breach at the Pennsylvania State Education Association exposed the personal information of over 500,000 individuals. The Pennsylvania State...
Threat landscape for industrial automation systems in Q4 2024 – Source: securelist.com
Source: securelist.com – Author: Kaspersky ICS CERT Statistics across all threats In Q4 2024, the percentage of ICS computers on which malicious objects were blocked decreased...
Why Cyber Quality Is the Key to Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: António Vasconcelos Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
University Competition Focuses on Solving Generative AI Challenges – Source: www.darkreading.com
Source: www.darkreading.com – Author: Arielle Waldman Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Albabat Ransomware Evolves to Target Linux and macOS – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: New versions of the Albabat ransomware have been developed, enabling threat actors to target multiple operating systems (OS) and improve the efficiency...
Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious Campaign – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A component of CheckPoint’s ZoneAlarm antivirus software is being exploited by threat actors in malicious campaigns to bypass Windows security measures. Nima...
Attackers Use Fake CAPTCHAs to Deploy Lumma Stealer RAT – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: HP’s latest Threat Insights Report has revealed a surge in malicious CAPTCHA campaigns, where users are tricked into running PowerShell commands that...
UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source Tools – Source:thehackernews.com
Source: thehackernews.com – Author: . Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in Taiwan since at...
Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates – Source:thehackernews.com
Source: thehackernews.com – Author: . The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of...
China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Families – Source:thehackernews.com
Source: thehackernews.com – Author: . The China-linked advanced persistent threat (APT) group. known as Aquatic Panda has been linked to a “global espionage campaign” that took...
10 Critical Network Pentest Findings IT Teams Overlook – Source:thehackernews.com
Source: thehackernews.com – Author: . After conducting over 10,000 automated internal network penetration tests last year, vPenTest has uncovered a troubling reality that many businesses still...
Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers – Source:thehackernews.com
Source: thehackernews.com – Author: . Two known threat activity clusters codenamed Head Mare and Twelve have likely joined forces to target Russian entities, new findings from...
CVE-2025-24813 Detection: Apache Tomcat RCE Vulnerability Actively Exploited in the Wild – Source: socprime.com
Source: socprime.com – Author: Veronika Telychko A newly revealed RCE vulnerability in Apache Tomcat is under active exploitation, just 30 hours after its public disclosure and...
Für Cyberattacken gewappnet – Krisenkommunikation nach Plan – Source: www.csoonline.com
Source: www.csoonline.com – Author: Die Frage ist nicht mehr, ob, sondern wann Organisationen von Cyberkriminellen attackiert werden. Ein Plan für die Krisenkommunikation ist dabei Pflicht. Lesen...
CISA marks NAKIVO’s critical backup vulnerability as actively exploited – Source: www.csoonline.com
Source: www.csoonline.com – Author: It took NAKIVO over a month to acknowledge the vulnerability and “silently” patch it. The Cybersecurity and Infrastructure Security Agency (CISA) has...
11 hottest IT security certs for higher pay today – Source: www.csoonline.com
Source: www.csoonline.com – Author: Cybersecurity certifications can pave a path to lucrative career advancement. But timing the job market with the right credentials can be challenging....
Developers: apply these 10 mitigations first to prevent supply chain attacks – Source: www.infoworld.com
Source: www.infoworld.com – Author: news Mar 20, 20256 mins Development ApproachesDevopsThreat and Vulnerability Management Current cybersecurity development risk frameworks don’t cover all of the tactics hackers...
Critical remote code execution flaw patched in Veeam backup servers – Source: www.csoonline.com
Source: www.csoonline.com – Author: News Analysis 20 Mar 20254 mins Data and Information SecurityRemote Access SecurityVulnerabilities New flaw stems from previously incomplete patch. Data resilience solutions...
Signal threatens to leave France if encryption backdoor required – Source: www.computerworld.com
Source: www.computerworld.com – Author: news Mar 20, 20256 mins Data PrivacyData and Information SecurityEncryption Just as it did with Sweden, Signal is refusing to stay in...
In Other News: Critical Chrome Bug, Capital One Hacker Resententencing, Story of Expat Flaw – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide...
Ransomware Group Claims Attack on Virginia Attorney General’s Office – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A ransomware group known as Cloak has claimed responsibility for a disrupting cyberattack on the Virginia Attorney General Office’s systems....
Watch on Demand: Supply Chain & Third-Party Risk Security Summit – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News All sessions from SecurityWeek’s 2025 Supply Chain & Third-Party Risk Security Summit are now available to view on demand. Enjoy this event...
New Jailbreak Technique Uses Fictional World to Manipulate AI – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Cybersecurity firm Cato Networks has discovered a new LLM jailbreak technique that relies on narrative engineering to convince a gen-AI...
Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The operational arm of the Chinese cybersecurity firm I-Soon compromised government organizations, NGOs, and think tanks in a 2022 campaign,...
Industry Reactions to Google Buying Wiz: Feedback Friday – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Google this week announced that it’s in the process of acquiring cloud security giant Wiz for $32 billion in cash....
Ransomware Group Claims Attacks on Ascom, Jaguar Land Rover – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The Hellcat ransomware group this week claimed responsibility for cyberattacks on Swiss telecommunications provider Ascom and British multinational car manufacturer...