Source: www.securityweek.com – Author: Ionut Arghire Law enforcement agencies in the US and six other countries have been identifying customers of the Smokeloader pay-per-install botnet and...
Month: April 2025
Trump Revokes Security Clearance for Ex-CISA Director Chris Krebs – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine President Donald Trump has signed a presidential memorandum revoking any active security clearance held by former CISA chief Chris Krebs...
Juniper Networks Patches Dozens of Junos Vulnerabilities – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Juniper Networks on Wednesday announced patches for dozens of vulnerabilities in Junos OS, Junos OS Evolved, and in third-party dependencies...
Study Identifies 20 Most Vulnerable Connected Devices of 2025 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Routers represent the riskiest devices in enterprise networks, containing the largest number of critical vulnerabilities, Forescout notes in a new...
GitHub Announces General Availability of Security Campaigns – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs GitHub has announced the general availability of security campaigns, which make it easier for developers and security teams to work...
Nissan Leaf Hacked for Remote Spying, Physical Takeover – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Researchers have demonstrated that a series of vulnerabilities affecting the Nissan Leaf electric vehicle can be exploited to remotely hack...
Operations of Sensor Giant Sensata Disrupted by Ransomware Attack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Sensata Technologies informed the Securities and Exchange Commission on Wednesday that it was recently targeted in a ransomware attack that...
‘AkiraBot’ Spammed 80,000 Websites With AI-Generated Messages – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A newly identified Python framework spamming the contact forms and chat widgets on the websites of small and medium-sized businesses...
Russian Shuckworm APT is back with updated GammaSteel malware – Source: www.csoonline.com
Source: www.csoonline.com – Author: News Apr 10, 20255 mins Advanced Persistent ThreatsCyberattacksMalware The attack targeted the military mission of a Western country in Ukraine, with the...
Oracle admits breach of ‘obsolete servers,’ denies main cloud platform affected – Source: www.csoonline.com
Source: www.csoonline.com – Author: “No OCI customer environment has been penetrated,” the company insisted, but the hacker says otherwise. Oracle has continued to downplay a data...
Hackers target SSRF flaws to steal AWS credentials – Source: www.csoonline.com
Source: www.csoonline.com – Author: Buggy websites hosted on EC2 instances can allow attackers to send unauthorized access requests for exposed EC2 instance metadata. In a new...
Fortinet embeds AI capabilities across Security Fabric platform – Source: www.networkworld.com
Source: www.networkworld.com – Author: Fortinet added FortiAI support to its core Security Fabric platform to strengthen protection from threats and simplify network and security operations. Fortinet...
Ransomware-Attacken stoßen in Windows-Lücke – Source: www.csoonline.com
Source: www.csoonline.com – Author: Hacker nutzen eine Zero-Day-Lücke in Windows aus, um Ransomware-Angriffe auszuführen. Cyberkriminelle missbrauchen eine Sicherheitslücke in Windows, um eine Backdoor-Malware und Ransomware einzuschleusen....
CISA under review: Trump memo spurs scrutiny and uncertainty – Source: www.computerworld.com
Source: www.computerworld.com – Author: A directive against CISA and its former director Christopher Krebs raises concerns over the agency’s neutrality, operational stability, and future role in...
Why Codefinger represents a new stage in the evolution of ransomware – Source: www.csoonline.com
Source: www.csoonline.com – Author: Opinion Apr 10, 20256 mins Forget typical ransomware! Codefinger hijacked cloud keys directly, exposing backup flaws and shared responsibility risks. Time to...
Top 16 OffSec, pen-testing, and ethical hacking certifications – Source: www.csoonline.com
Source: www.csoonline.com – Author: These certs offer hands-on training and up-to-date curricula, equipping offensive security professionals with their choice of specialized or broad skill credentialing. Red...
Trump revokes security clearances for Chris Krebs, SentinelOne in problematic precedent for security vendors – Source: www.csoonline.com
Source: www.csoonline.com – Author: US President Donald Trump issued an executive order revoking the security clearance of Krebs and cybersecurity giant SentinelOne as retribution for the...
Targeted phishing gets a new hook with real-time email validation – Source: www.csoonline.com
Source: www.csoonline.com – Author: Cybercriminals are using precision-validated phishing to evade detection and steal credentials. Crooks behind some credential-stealing phishing campaigns are trying to increase their...
Patch Tuesday: Microsoft Fixes 134 Vulnerabilities, Including 1 Zero-Day – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Megan Crouse Microsoft CEO Satya Nadella. Image: Microsoft News Microsoft’s Patch Tuesday security update for April included 134 flaws, one of which...
Microsoft: Windows CLFS Vulnerability Could Lead to ‘Widespread Deployment and Detonation of Ransomware’ – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Fiona Jackson Image: nicescene/Adobe Stock Microsoft has detected a zero-day vulnerability in the Windows Common Log File System (CLFS) being exploited in...
5 Reasons Why You Should Use a Password Manager – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Jack Wallen We may earn from vendors via affiliate links or sponsorships. This might affect product placement on our site, but not...
Smashing Security podcast #412: Signalgate sucks, and the quandary of quishing – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content QR codes are being weaponised by scammers — so maybe think twice before scanning that parking meter....
Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024 – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A total of 43% of UK businesses and 30% of charities experienced a cyber breach or attack in the past year, according...
SpyNote Malware Targets Android Users with Fake Google Play Pages – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A newly observed Android malware campaign has been observed leveraging deceptive websites hosted on recently registered domains to distribute SpyNote, a powerful remote...
AI-Powered AkiraBot Evades CAPTCHA to Spam 80,000 Websites – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Security researchers have uncovered a major new spam campaign that has targeted over 400,000 websites to date with outreach messages crafted with...
Operation Endgame Continues with Smokeloader Customer Arrests – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Law enforcers in Europe and North America have made more arrests in an ongoing operation designed to disrupt a thriving underground trade...
GOFFEE continues to attack organizations in Russia – Source: securelist.com
Source: securelist.com – Author: Oleg Kupreev GOFFEE is a threat actor that first came to our attention in early 2022. Since then, we have observed malicious...
How to Leak to a Journalist – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments finagle • April 9, 2025 8:04 AM TL;DR the author likes Signal. However he does mention The Guardian’s...
Arguing Against CALEA – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier At a Congressional hearing earlier this week, Matt Blaze made the point that CALEA, the 1994 law that forces telecoms...
SWE Celebrates Engineer’s Day in India
Honor Engineer’s Day by looking back at the events and initiatives of the Society of Women Engineers (SWE) in India over the years, plus learn how...





















