Source: hackread.com – Author: Deeba Ahmed. Trend Micro found major flaws in the NVIDIA Container Toolkit and Docker, risking container escapes, DoS attacks and AI infrastructure....
Day: April 14, 2025
Pre-Installed Malware on Cheap Android Phones Steals Crypto via Fake WhatsApp – Source:hackread.com
Source: hackread.com – Author: Waqas. A new wave of smartphone-based attacks is draining crypto wallets without victims ever realizing it. According to researchers at Doctor Web,...
China Sort of Admits to Being Behind Volt Typhoon – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier The Wall Street Journal has the story: Chinese officials acknowledged in a secret December meeting that Beijing was behind a...
Medusa ransomware gang claims to have hacked NASCAR – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley The Medusa ransomware-as-a-service (RaaS) claims to have compromised the computer systems of NASCAR, the United States’ National Association for Stock...
Trusted & Resilient Saas Data Is Essential for Successful Agentic AI Within Government Agencies – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Government agencies are under immense pressure to modernize, both from the legislature and constituents demanding a digital-first experience. Advances in...
Training Skillset Transfer – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Understanding Skills and Their Importance A skill is an individual’s ability to perform an action efficiently and effectively, providing a...
What Is Privileged Access Management (PAM)? – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Gabriella Antal Privileged access management (PAM) refers to the process organizations go through to control, monitor, and secure access to sensitive data and...
New malware ‘ResolverRAT’ targets healthcare, pharmaceutical firms – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini New malware ‘ResolverRAT’ is targeting healthcare and pharmaceutical firms, using advanced capabilities to steal sensitive data. Morphisec researchers discovered a...
Malicious NPM packages target PayPal users – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Threat actors deploy malicious NPM packages to steal PayPal credentials and hijack cryptocurrency transfers. Fortinet researchers discovered multiple malicious NPM packages that...
Tycoon2FA phishing kit rolled out significant updates – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The operators of the Phishing-as-a-Service (PhaaS) platform Tycoon2FA have rolled out significant updates to enhance its evasion capabilities. Tycoon2FA, a...
South African telecom provider Cell C disclosed a data breach following a cyberattack – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Cell C, one of the biggest telecom providers in South Africa confirms a data breach following a 2024 cyberattack. Cell...
Fortinet Zero-Day Bug May Lead to Arbitrary Code Execution – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have...
Chinese APTs Exploit EDR ‘Visibility Gap’ for Cyber Espionage – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Senior Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have...
A New ‘It RAT’: Stealthy ‘Resolver’ Malware Burrows In – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
7 RSAC 2025 Cloud Security Sessions You Don’t Want to Miss – Source: www.darkreading.com
Source: www.darkreading.com – Author: Snir Ben Shimol Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked?...
How DigitalOcean Moved Away From Manual Identity Management – Source: www.darkreading.com
Source: www.darkreading.com – Author: Mercedes Cardona Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Morocco Investigates Social Security Agency Data Leak – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have...
ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in attacks targeting healthcare and...
Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers are calling attention to a new type of credential phishing scheme that ensures that the stolen information is associated...
⚡ Weekly Recap: Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and More – Source:thehackernews.com
Source: thehackernews.com – Author: . Attackers aren’t waiting for patches anymore — they are breaking in before defenses are ready. Trusted security tools are being hijacked...
Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind – Source:thehackernews.com
Source: thehackernews.com – Author: . AI is changing cybersecurity faster than many defenders realize. Attackers are already using AI to automate reconnaissance, generate sophisticated phishing lures,...
Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT – Source:thehackernews.com
Source: thehackernews.com – Author: . A threat actor with ties to Pakistan has been observed targeting various sectors in India with various remote access trojans like...
Huntress Documents In-The-Wild Exploitation of Critical Gladinet Vulnerabilities – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Security researchers at Huntress are documenting active exploitation of a critical vulnerability in Gladinet CentreStack and Triofox software, where default...
Trend Micro Flags Incomplete Nvidia Patch That Leaves AI Containers Exposed – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Security researchers at Trend Micro are flagging problems with Nvidia’s patch for a critical vulnerability in the Nvidia Container Toolkit,...
Threat Actor Allegedly Selling Fortinet Firewall Zero-Day Exploit – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Just as Fortinet is warning of threat actors maintaining persistent access to FortiOS and FortiProxy devices affected by known vulnerabilities,...
New ‘ResolverRAT’ Targeting Healthcare, Pharmaceutical Organizations – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Organizations in the healthcare and pharmaceutical sectors have been targeted with a new, sophisticated malware family, according to an advisory...
AI Hallucinations Create a New Software Supply Chain Threat – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Package hallucinations represent a common issue within code-generating Large Language Models (LLMs) that opens the door for a new type...
Malicious NPM Packages Target Cryptocurrency, PayPal Users – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Threat actors have been publishing malicious NPM packages to steal the information and funds of PayPal and cryptocurrency wallet users....
Major WordPress Plugin Flaw Exploited in Under 4 Hours – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A critical vulnerability in the WordPress plugin SureTriggers has exposed thousands of websites to remote attacks, allowing unauthenticated users to create administrative accounts. SureTriggers...
Prodaft Offers “No Judgment” Deal to Buy Dark Web Accounts from Cybercrime Forum Users – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Cyber threat intelligence firm Prodaft is encouraging users of the most notorious cybercrime-focused dark web forums to turn over a new leaf...