Source: go.theregister.com – Author: Jessica Lyons Chris Krebs, the former head of the US Cybersecurity and Infrastructure Security Agency (CISA) and a longtime Trump target, has...
Year: 2025
Brit soldiers tune radio waves to fry drone swarms for pennies – Source: go.theregister.com
Source: go.theregister.com – Author: Richard Speed British soldiers have successfully taken down drones with a radio-wave weapon. The demonstrator weapon, a type of Radiofrequency Directed Energy...
Moving CVEs past one-nation control – Source: news.sophos.com
Source: news.sophos.com – Author: Chester Wisniewski Sometimes you don’t know how much you will miss something until you (almost) lose it. That is certainly the case...
China-linked APT Mustang Panda upgrades tools in its arsenal – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini China-linked APT group Mustang Panda deployed a new custom backdoor, MQsTTang, in recent attacks targeting Europe, Asia, and Australia. China-linked...
Node.js malvertising campaign targets crypto users – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Microsoft warns of a malvertising campaign using Node.js to deliver info-stealing malware via fake crypto trading sites like Binance and...
Apple released emergency updates for actively exploited flaws – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Apple released emergency updates to fix iOS, iPadOS & macOS vulnerabilities actively exploited in sophisticated attacks. Apple released out‑of‑band security...
U.S. CISA adds SonicWall SMA100 Appliance flaw to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SonicWall SMA100 Appliance flaw to its Known Exploited Vulnerabilities catalog. The U.S....
NTLM Hash Exploit Targets Poland and Romania Days After Patch – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A vulnerability allowing attackers to leak NTLM authentication hashes with minimal user interaction has been actively exploited just days after Microsoft released...
Senators Urge Cyber-Threat Sharing Law Extension Before Deadline – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A push to extend a key cybersecurity law that enables information sharing between the private sector and government has gained bipartisan momentum...
Identity Attacks Now Comprise a Third of Intrusions – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Threat actors ramped up credential theft over the past year, using AI-generated phishing emails and infostealer malware to improve their results, according...
Microsoft Thwarts $4bn in Fraud Attempts – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Microsoft has blocked billions of dollars’ worth of fraud and scams over the course of the past year as threat actors increase...
CISA Throws Lifeline to CVE Program with Last-Minute Contract Extension – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: In a dramatic turn of events, the US Cybersecurity and Infrastructure Security Agency (CISA) has stepped in to save the Common Vulnerabilities...
Network Edge Devices the Biggest Entry Point for Attacks on SMBs – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Compromised network edge devices accounted for initial compromise in 30% of incidents impacting small and medium-sized businesses (SMBs) in 2024. These devices,...
ICO Issues Merseyside-Based Law Firm £60,000 Fine After Cyber-Attack – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The UK’s Information Commissioner’s Office (ICO) has issued Merseyside-based DDP Law Ltd (DPP) a £60,000 fine following a cyber-attack which resulted in...
Researchers Find CVSS 10.0 Severity RCE Vulnerability in Erlang/OTP SSH – Source:hackread.com
Source: hackread.com – Author: Waqas. Security researchers report CVE-2025-32433, a CVSS 10.0 RCE vulnerability in Erlang/OTP SSH, allowing unauthenticated code execution on exposed systems. A newly...
Qrator Labs Reports Mitigating Year’s Largest DDoS Attack to Date – Source:hackread.com
Source: hackread.com – Author: Waqas. Qrator Labs reports it mitigated a massive record 965 Gbps DDoS attack in April 2025, the largest incident reported this year...
Mass Ransomware Campaign Hits S3 Buckets Using Stolen AWS Keys – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. Researchers reveal a large-scale ransomware campaign leveraging over 1,200 stolen AWS access keys to encrypt S3 buckets. Learn how attackers...
Unlocking the Power of MetaTrader – Your Ultimate Trading Tool – Source:hackread.com
Source: hackread.com – Author: Owais Sultan. MetaTrader is a key tool for traders, offering a comprehensive platform that supports various financial instruments. Understanding its capabilities is...
CVE Program Cuts Send the Cyber Sector Into Panic Mode – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Senior Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have...
Cybersecurity by Design: When Humans Meet Technology – Source: www.darkreading.com
Source: www.darkreading.com – Author: Matthew Warner Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Middle East, North Africa Security Spending to Top $3B – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
GPS Spoofing Attacks Spike in Middle East, Southeast Asia – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Android Phones Pre-Downloaded With Malware Target User Crypto Wallets – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have...
NIST Updates Privacy Framework With AI and Governance Revisions – Source: www.darkreading.com
Source: www.darkreading.com – Author: Arielle Waldman Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates – Source:thehackernews.com
Source: thehackernews.com – Author: . The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified organization in Myanmar...
State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns – Source:thehackernews.com
Source: thehackernews.com – Author: . Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly popular ClickFix social engineering tactic...
Artificial Intelligence – What’s all the fuss? – Source:thehackernews.com
Source: thehackernews.com – Author: . Talking about AI: Definitions Artificial Intelligence (AI) — AI refers to the simulation of human intelligence in machines, enabling them to...
Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution – Source:thehackernews.com
Source: thehackernews.com – Author: . A critical security vulnerability has been disclosed in the Erlang/Open Telecom Platform (OTP) SSH implementation that could permit an attacker to...
Blockchain Offers Security Benefits – But Don’t Neglect Your Passwords – Source:thehackernews.com
Source: thehackernews.com – Author: . Blockchain is best known for its use in cryptocurrencies like Bitcoin, but it also holds significant applications for online authentication. As...
Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers – Source:thehackernews.com
Source: thehackernews.com – Author: . Microsoft is calling attention to an ongoing malvertising campaign that makes use of Node.js to deliver malicious payloads capable of information...