Source: www.securityweek.com – Author: Eduard Kovacs Nearly one month after it informed customers that it had been targeted in a cyberattack, Canadian electric utility Nova Scotia...
Day: May 26, 2025
In Other News: Volkswagen App Hacked, DR32 Sentenced, New OT Security Solution – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide...
Companies Warned of Commvault Vulnerability Exploitation – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The ongoing exploitation of a Commvault vulnerability that was targeted as a zero-day is likely part of a broader campaign...
Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto – Source:thehackernews.com
Source: thehackernews.com – Author: . As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP...
CISO’s Guide To Web Privacy Validation And Why It’s Important – Source:thehackernews.com
Source: thehackernews.com – Author: . Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISO’s guide provides a practical roadmap for...
⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs – Source:thehackernews.com
Source: thehackernews.com – Author: . Cyber threats don’t show up one at a time anymore. They’re layered, planned, and often stay hidden until it’s too late....
Chinese Hackers Exploit Cityworks 0-Day to Hit US Local Governments – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. Cisco Talos warns of active exploitation of a zero-day vulnerability (CVE-2025-0994) in Cityworks supposedly by Chinese hackers from the UAT-6382...
Researchers Drop PoC for Fortinet CVE-2025-32756, Urging Quick Patching – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. Researchers have released PoC for CVE-2025-32756, a severe security flaw, that is actively being exploited in Fortinet products like FortiMail...
Breaking RSA encryption just got 20x easier for quantum computers – Source: www.csoonline.com
Source: www.csoonline.com – Author: New research shows that RSA-2048 encryption could be cracked using a one-million-qubit system by 2030, 20x faster than previous estimates. Here’s what...
CISA flags Commvault zero-day as part of wider SaaS attack campaign – Source: www.csoonline.com
Source: www.csoonline.com – Author: Threat actors exploited the Commvault flaw to access M365 secrets, allowing further breaches of SaaS applications. The US Cybersecurity and Infrastructure Security...
Open MPIC project defends against BGP attacks on certificate validation – Source: www.networkworld.com
Source: www.networkworld.com – Author: Open MPIC provides certificate authorities with an open-source framework for implementing multi-perspective validation, protecting against BGP hijacking attacks that threaten the web’s...
Kundendaten von Adidas gestohlen – Source: www.csoonline.com
Source: www.csoonline.com – Author: Der deutsche Sportartikelproduzent Adidas ist von einem Datenleck betroffen. Bei einem Cyberangriff auf einen Dienstleister sind Kundendaten von Adidas abgeflossen. Sergey Kohl...
BSI warnt vor Cyberattacken auf Energieversorgung – Source: www.csoonline.com
Source: www.csoonline.com – Author: Die BSI-Präsidentin Claudia Plattner fordert einen besseren IT-Schutz für die Energieversorgung in Deutschland. elxeneize – shutterstock.com Die Energieversorgung in Deutschland braucht aus...
The 7 unwritten rules of leading through crisis – Source: www.csoonline.com
Source: www.csoonline.com – Author: Your crisis management playbook may look fail-proof on paper, but leadership and culture offer intangibles that can make or break execution when...
Sieben gängige Wege, ein Smartphone zu hacken – Source: www.csoonline.com
Source: www.csoonline.com – Author: Trotz des Mythos, sie seien sicher, können auch Smartphones angegriffen werden können. Experten erklären wie und welchen wirksamen Schutz es gibt. Angriffsvektoren...
China-linked APT UNC5221 started exploiting Ivanti EPMM flaws shortly after their disclosure – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini China-linked APT exploit Ivanti EPMM flaws to target critical sectors across Europe, North America, and Asia-Pacific, according to EclecticIQ. Researchers...
Fake software activation videos on TikTok spread Vidar, StealC – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Crooks use TikTok videos with fake tips to trick users into running commands that install Vidar and StealC malware in...
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 46 – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini China-linked APT UNC5221 started exploiting Ivanti EPMM flaws shortly after their disclosure | Fake software activation videos on TikTok spread...
China approves rules for national ‘online number’ ID scheme – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood Asia In Brief China last week approved rules that will see Beijing issue identity numbers that netizens can use as...
NIST Introduces New Metric to Measure Likelihood of Vulnerability Exploits – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The US National Institute of Standards and Technology (NIST) has launched a new metric to assess the likelihood that a vulnerability is...
FBI Warns of Silent Ransom Group Targeting Law Firms via Scam Calls – Source:hackread.com
Source: hackread.com – Author: Waqas. The FBI has issued a warning to US law firms about a rising cyber threat targeting the legal sector. A group...
OTP Authentication in 2025: How MojoAuth Stacks Up Against Twilio Verify, Auth0, Stytch & Descope – Source: securityboulevard.com
Source: securityboulevard.com – Author: Dev Kumar One-time-password (OTP) delivery remains the work-horse of passwordless and multi-factor authentication flows. Yet the 2025 market has fractured into two...