Source: securityaffairs.com – Author: Pierluigi Paganini FBI warns Silent Ransom Group has targeted U.S. law firms for 2 years using callback phishing and social engineering extortion...
Month: May 2025
Celebrate and Support SWE’s Founder’s Day
75 years ago, 61 women engineers and engineering students came together to form what is now a global organization with more than 50,000 members. Source Views:...
Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser...
Feel Empowered by Mastering NHI Compliance – Source: securityboulevard.com
Source: securityboulevard.com – Author: Alison Mack What Makes NHI Compliance Essential in Today’s Cybersecurity Landscape? Non-Human Identities (NHIs), the machine identities in cybersecurity are created by...
Your Assurance in Securing NHIs Properly – Source: securityboulevard.com
Source: securityboulevard.com – Author: Alison Mack Are You Harnessing the Full Potential of Secure NHIs? Organizations require robust security measures to safeguard their digital assets. An...
Stay Reassured with Latest NHI Security Practices – Source: securityboulevard.com
Source: securityboulevard.com – Author: Alison Mack Why is NHI Management Vital in Modern Cybersecurity? The rising tide of digitalization in various industries fuels the increasing relevance...
BSidesLV24 – PasswordsCon – That’s Not My Name – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Home » Security Bloggers Network » BSidesLV24 – PasswordsCon – That’s Not My Name Authors/Presenters: Bård Aase Our sincere appreciation...
How FedRAMP Reciprocity Works with Other Frameworks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Max Aulakh FedRAMP is the Federal Risk and Authorization Management Program, and it’s one of the most widely used governmental cybersecurity frameworks...
Zimbra CVE-2024-27443 XSS Flaw Hits 129K Servers, Sednit Suspected – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A critical XSS vulnerability, CVE-2024-27443, in Zimbra Collaboration Suite’s CalendarInvite feature is actively being exploited, potentially by the Sednit hacking...
Marlboro-Chesterfield Pathology Data Breach Impacts 235,000 People – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Marlboro-Chesterfield Pathology (MCP), a full service anatomic pathology lab in North Carolina, was recently targeted in a ransomware attack that...
Remembering John Young, co-founder of web archive Cryptome – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Obituary John Young, the co-founder of the legendary internet archive Cryptome, died at the age of 89 on March 28....
SK Telecom Uncovers Two-Year Malware Attack, Leaking 26M IMSI Records – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. SK Telecom reveals malware intrusion that remained hidden for nearly two years, led to the leaking of 26.69 million IMSI...
Russian-led cybercrime network dismantled in global operation – Source: www.theguardian.com
Source: www.theguardian.com – Author: Lisa O’Carroll and Kate Connolly in Berlin European and North American cybercrime investigators say they have dismantled the heart of a malware...
Leader of Qakbot cybercrime network indicted in U.S. crackdown – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The U.S. indicted Russian Rustam Gallyamov for leading the Qakbot botnet, which infected 700K+ devices and was used in ransomware...
My Experience in the SWE Collegiate Leadership Institute (CLI)
Anushri Kulkarni reflects on her time in the SWE Collegiate Leadership Institute, including the insights she gained from a career coaching mentorship. Source Views: 0
Military and Veterans Affinity Group Spotlight
As part of their spotlight month, the Military and Veterans Affinity Group shares the group’s mission and how to get involved. Source Views: 0
Dr. Jess Wade On Using Wikipedia to Highlight Women in STEM | Diverse: a SWE Podcast
Dr. Jess Wade has created thousands of Wikipedia pages that highlight the achievements of women scientists and engineers. Hear her story on Diverse: a SWE podcast!...
Friday Squid Blogging: US Naval Ship Attacked by Squid in 1978 – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Interesting story: USS Stein was underway when her anti-submarine sonar gear suddenly stopped working. On returning to port and putting...
Signal Blocks Windows Recall – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier TimH • May 23, 2025 11:12 AM Signal’s next step needs to be to advise a user whether or not...
Law Enforcement Busts Initial Access Malware Used to Launch Ransomware – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A major law enforcement operation has successfully dismantled key initial access malware used to launch ransomware attacks. The Europol co-ordinated action, announced...
Cyber Heads Up: “BadSuccessor”—A Critical Active Directory Privilege Escalation Vulnerability in Windows Server 2025 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Assura Team Overview: Akamai researchers have identified a significant privilege escalation vulnerability in Windows Server 2025, termed “BadSuccessor.” This flaw exploits the...
Ensuring Stability with Robust NHI Strategies – Source: securityboulevard.com
Source: securityboulevard.com – Author: Alison Mack Are Your Non-human Identities and Secrets Secure? The security of Non-Human Identities (NHIs) and their secretive credentials has proven to...
Feel Protected: Advances in NHI Security Techniques – Source: securityboulevard.com
Source: securityboulevard.com – Author: Alison Mack How Relevant is NHI Security in Today’s Cloud-Dependent Society? It is becoming increasingly clear that the safe management of Non-Human...
Crypto Drainers are Targeting Cryptocurrency Users – Source: securityboulevard.com
Source: securityboulevard.com – Author: Matthew Rosenquist As cryptocurrency becomes more popular and the adoption rises, we see a related increase in the number of cybercrimes, fraud,...
Emulating the Blazing DragonForce Ransomware – Source: securityboulevard.com
Source: securityboulevard.com – Author: Francis Guibernau DragonForce is a ransomware strain operated under the Ransomware-as-a-Service (RaaS) business model that emerged in August 2023. Originally identified as...
U.S. Authorities Seize DanaBot Malware Operation, Indict 16 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Law enforcement in the United States and Europe this week disrupted the infrastructure of the long-running DanaBot malware-as-a-service (MaaS) operation...
ColorTokens OT-in-a-Box: From Concept to Completion – Source: securityboulevard.com
Source: securityboulevard.com – Author: Venky Raju This year, we had a fantastic time meeting attendees, partners, friends, and customers at the RSA Conference Expo floor. You...
Malicious attack method on hosted ML models now targets PyPI – Source: securityboulevard.com
Source: securityboulevard.com – Author: Karlo Zanki Artificial intelligence (AI) and machine learning (ML) are now inextricably linked to the software supply chain. ML models, which are...
BSidesLV24 – PasswordsCon – Passwords 101 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Security Bloggers Network Home » Security Bloggers Network » BSidesLV24 – PasswordsCon – Passwords 101 by Marc Handelman on May...
From Alert to Action: Escape’s Jira Integration Explained – Source: securityboulevard.com
Source: securityboulevard.com – Author: Alexandra Charikova Ticketing systems are an essential part of modern DevSecOps. They orchestrate cross-functional collaboration, ensure accountability, and drive issues to resolution....