Source: www.fortra.com – Author: Graham Cluley What is RansomHouse? RansomHouse is a cybercrime operation that follows a Ransomware-as-a-Service (RaaS) business model, where affiliates (who do not...
Day: April 15, 2025
The AI Fix #46: AI can read minds now, and is your co-host a clone? – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content In episode 46 of The AI Fix, China trolls US tariffs, a microscopic pogoing flea-bot makes a...
Critical Apache Roller flaw allows to retain unauthorized access even after a password change – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A critical flaw (CVE-2025-24859, CVSS 10) in Apache Roller lets attackers keep access even after password changes. All versions ≤6.1.4...
Meta will use public EU user data to train its AI models – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Meta announced that it will use public EU user data to train AI, resuming plans paused last year over Irish...
Hertz disclosed a data breach following 2024 Cleo zero-day attack – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Hertz Corporation disclosed a data breach after customer data was stolen via Cleo zero-day exploits in late 2024, affecting Hertz,...
Gladinet flaw CVE-2025-30406 actively exploited in the wild – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Huntress reports active exploitation of Gladinet CVE-2025-30406 in the wild, affecting seven organizations and 120 endpoints. Security researchers at Huntress...
Publisher’s Spotlight: Industrial Defender – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: Gary By Gary S. Miliefsky, Publisher, Cyber Defense Magazine In today’s hyperconnected world, protecting critical infrastructure has become a national imperative. From...
Why Securing Prompts Will Never Be Enough: The GitHub Copilot Case – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team We’ve spent months analyzing how AI-powered coding assistants like GitHub Copilot handle security risks. The results? Disturbing. The Hidden Risks...
Unified Endpoint Management: One Tool to Rule All – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team As the number of endpoint devices increases, managing and securing them becomes complex. The traditional way of using separate security...
Trump Revenge Tour Targets Cyber Leaders, Elections – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs President Trump last week revoked security clearances for Chris Krebs, the former director of the Cybersecurity and Infrastructure Security Agency (CISA)...
North Korean Hackers Exploit LinkedIn to Infect Crypto Developers with Infostealers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: If you are a developer working on cryptocurrency projects, beware of people trying to hire you on LinkedIn – they could be...
Compliance Now Biggest Cyber Challenge for UK Financial Services – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Complying with regulations is the biggest cybersecurity challenge for UK financial services firms, according to new research by Bridewell Consulting. Nearly half...
Bot Traffic Overtakes Human Activity as Threat Actors Turn to AI – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Automated traffic now accounts for the majority of activity on the web, with the share of bad bot traffic surging from 32%...
Organizations Found to Address Only 21% of GenAI-Related Vulnerabilities – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Organizations remediate only 48% of all vulnerabilities with detected exploits, according to a new study by Pentesting-as-a-Service (PTaaS) firm Cobalt. This number...
LabHost Phishing Mastermind Sentenced to 8.5 Years – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A Huddersfield man has been handed an eight-and-a-half-year sentence for masterminding what became one of the world’s largest phishing-as-a-service (PhaaS) platforms. Zak...
Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool – Source:thehackernews.com
Source: thehackernews.com – Author: . The China-linked threat actor known as UNC5174 has been attributed to a new campaign that leverages a variant of a known...
Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence – Source:thehackernews.com
Source: thehackernews.com – Author: . A critical security vulnerability has been disclosed in the Apache Roller open-source, Java-based blogging server software that could allow malicious actors...
Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds – Source:thehackernews.com
Source: thehackernews.com – Author: . Everybody knows browser extensions are embedded into nearly every user’s daily workflow, from spell checkers to GenAI tools. What most IT...
Malicious PyPI Package Targets MEXC Trading API to Steal Credentials and Redirect Orders – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have disclosed a malicious package uploaded to the Python Package Index (PyPI) repository that’s designed to reroute trading orders...
Crypto Developers Targeted by Python Malware Disguised as Coding Challenges – Source:thehackernews.com
Source: thehackernews.com – Author: . The North Korea-linked threat actor assessed to be behind the massive Bybit hack in February 2025 has been linked to a...
Sophos Firewall v21.5: NDR Essentials – Source: news.sophos.com
Source: news.sophos.com – Author: Chris McCormack PRODUCTS & SERVICES How to make the most of the new features in Sophos Firewall v21.5 Sophos Firewall v21 offers...
Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Insurance firm Lemonade is notifying roughly 190,000 individuals that their driver’s license numbers were likely exposed due to a technical...
Kidney Dialysis Services Provider DaVita Hit by Ransomware – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Kidney dialysis services provider DaVita said it fell victim to a ransomware attack over the weekend that disrupted some of...
Conduent Says Names, Social Security Numbers Stolen in Cyberattack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Business services provider Conduent has notified the Securities and Exchange Commission (SEC) that personal information was stolen in a disruptive...
2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire More than 2.6 million individuals were impacted by two data breaches at insurance administrator Landmark Admin and software solutions provider...
China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press China said Tuesday it is pursuing three alleged U.S. operatives accused of carrying out cyberattacks on Chinese infrastructure during the...
Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend Three different companies from three separate continents have agreed a memorandum of understanding to advance secure communications by combining their...
NetRise Raises $10 Million to Grow Software Supply Chain Security Platform – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Software supply chain security provider NetRise has raised $10 million in a Series A funding round that brings the total...
Hertz Discloses Data Breach Linked to Cleo Hack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Car rental giant Hertz Corporation is notifying customers of the Hertz, Thrifty, and Dollar brands that their personal information was...
PIM vs PAM vs IAM. Definitions and Roles in the Cybersecurity Strategy – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Gabriella Antal PIM vs PAM vs IAM are three distinct systems that cover different areas of safeguarding privileged access in an organization....