Source: go.theregister.com – Author: Connor Jones Oracle Cloud’s denial of a digital break-in is now in clear dispute. A infosec researcher working on validating claims that...
Day: March 25, 2025
Infosec pro Troy Hunt HasBeenPwned in Mailchimp phish – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Infosec veteran Troy Hunt of HaveIBeenPwned fame is notifying thousands of people after phishers scooped up his Mailchimp mailing list....
You know that generative AI browser assistant extension is probably beaming everything to the cloud, right? – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn Generative AI assistants packaged up as browser extensions harvest personal data with minimal safeguards, researchers warn. Some of these extensions...
VanHelsing ransomware emerges to put a stake through your Windows heart – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Check Point has spotted a fresh ransomware-as-a-service crew in town: VanHelsing, touting a cross-platform locker targeting Microsoft Windows, Linux, and...
Hm, why are so many DrayTek routers stuck in a bootloop? – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson DrayTek router owners in the UK and beyond had a pretty miserable weekend after some ISPs began to notice a...
OTF, which backs Tor, Let’s Encrypt and more, sues to save its funding from Trump cuts – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn An organization that bankrolls various internet security projects has asked a Washington DC court to prevent the Trump administration from...
Top Trump officials text secret Yemen airstrike plans to journo in Signal SNAFU – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Updated Senior Trump administration officials used the messaging app Signal to discuss detailed plans to attack Houthi rebels in Yemen...
Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain – Source: securelist.com
Source: securelist.com – Author: Igor Kuznetsov, Boris Larin Incidents Incidents 25 Mar 2025 minute read In mid-March 2025, Kaspersky technologies detected a wave of infections by...
Navigating NIS2 Compliance: Elevating Cyber Resilience Through Network Visibility – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team As cyber threats continue to surge, businesses face growing pressure to fortify their defences and ensure operational continuity. Regulatory frameworks...
Unpacking Disinformation in the 2024 US Presidential Election – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team The 2016 U.S. presidential election is often cited as a watershed moment for digital disinformation campaigns – revealing the vulnerability...
Report on Paragon Spyware – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Citizen Lab has a new report on Paragon’s spyware: Key Findings: Introducing Paragon Solutions. Paragon Solutions was founded in Israel...
More Countries are Demanding Backdoors to Encrypted Apps – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Random Geek • March 24, 2025 12:03 PM I think that many governments are waiting to see the outcome of...
News alert: INE Security spotlights healthcare companies facing rising exposure to costly breaches – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: cybernewswire Cary, NC, Mar. 24, 2025, CyberNewswire –– INE Security, a global provider of cybersecurity training and certification, today announced its initiative...
News alert: Arsen introduces new AI-based phishing tests to improve social engineering resilience – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: cybernewswire Paris, France, Mar. 24, 2025, CyberNewswire — Arsen, a leading cybersecurity company specializing in social engineering defense, today announced the full...
Financial cyberthreats in 2024 – Source: securelist.com
Source: securelist.com – Author: Kaspersky As more and more financial transactions are conducted in digital form each year, financial threats comprise a large piece of the...
23andMe Bankruptcy Filing May Put Sensitive Data at Risk – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Windows 10 End-of-Life Puts SMB at Risk – Source: www.darkreading.com
Source: www.darkreading.com – Author: Stephen Lawton Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Microsoft Gives Security Copilot Some Autonomy – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jeffrey Schwartz Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Chinese Hacker Group Tracked Back to iSoon APT Operation – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Senior Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have...
FBI Warns of Document Converter Tools Due to Uptick in Scams – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have...
Critical ‘IngressNightmare’ Vulns Imperil Kubernetes Environments – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Meet the Low-Key Access Broker Supercharging Russian State Cybercrime – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Senior Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have...
Chinese APT Weaver Ant Targeting Telecom Providers in Asia – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Cyber response firm Sygnia warns of a newly identified China-linked APT that relies on web shells for persistent access to...
Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend Analysis of threats detected in the latter half of 2024, demonstrates that attackers evolve rather than abandon their primary targets...
Hacker Conversations: Frank Trezza – From Phreaker to Pentester – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend The history of Frank Trezza is not unusual among hackers – from a young prankster through growing exploration of potential...
300 Arrested in Crackdown on Cybercrime Rings in Africa – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire More than 300 suspects were arrested in seven African countries in an Interpol-led crackdown on cybercriminal rings targeting businesses and...
IngressNightmare Flaws Expose Many Kubernetes Clusters to Remote Hacking – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Researchers at cloud security giant Wiz have identified critical vulnerabilities that can expose Kubernetes clusters to remote hacking. Kubernetes is...
NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine The National Institute of Standards and Technology (NIST) is still struggling to clear the growing backlog of CVEs in the...
Oracle Denies Cloud Breach After Hacker Offers to Sell Data – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Oracle has denied that its systems have been breached after a hacker offered to sell millions of data records allegedly...
Russian Firm Offers $4 Million for Telegram Exploits – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A Russian exploit acquisition firm says it is willing to pay up to $4 million for full-chain exploits targeting the...