Tag: cyber
-
Researchers Expose Medusa Ransomware Group’s Onion Site
by
in SecurityNewsResearchers have successfully infiltrated the digital fortress of one of the most prolific ransomware groups, Medusa Locker. Known for targeting critical sectors like healthcare, education, and manufacturing, the group has been responsible for numerous cyberattacks since its detection in 2019. Uncovering the Achilles’ Heel The discovery began when security researchers identified a critical vulnerability within…
-
CISA Extends Support a Last Minute to CVE Program, Averting Global Cybersecurity Crisis
by
in SecurityNewsCISA announced an eleventh-hour contract extension with MITRE Corporation to maintain the Common Vulnerabilities and Exposures (CVE) program, narrowly avoiding a lapse in federal funding that threatened to destabilize vulnerability management worldwide. The move came just hours before the program’s expiration deadline on April 16, 2025, preserving a system that has served as the backbone…
-
CISA launches new wave of job cuts
by
in SecurityNewsCritics warn that drastic downsizing of the DHS unit will threaten the nation’s ability to counter cyber adversaries. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-job-cuts/745483/
-
CVE program averts swift end after CISA executes 11-month contract extension
by
in SecurityNews
Tags: china, cisa, computer, cve, cyber, cybersecurity, data, defense, detection, endpoint, flaw, framework, government, infrastructure, intelligence, linkedin, mitre, nist, nvd, russia, service, software, technology, threat, update, vulnerability, vulnerability-managementImportant update April 16, 2025: Since this story was first published, CISA signed a contract extension that averts a shutdown of the MITRE CVE program.A CISA spokesperson sent CSO a statement saying, “The CVE Program is invaluable to cyber community and a priority of CISA. Last night, CISA executed the option period on the contract to ensure…
-
Hackers Weaponize Gamma Tool Through Cloudflare Turnstile to Steal Microsoft Credentials
by
in SecurityNewsCybercriminals are exploiting an AI-powered presentation tool called Gamma to launch a multi-stage attack aimed at stealing Microsoft credentials. This attack route is designed not only to evade traditional security measures but also to deceive human recipients by leveraging trusted platforms and services. Exploitation of Gamma and Cloudflare Turnstile Cyber attackers are taking advantage of…
-
AI-Powered Bad Bots Account for 51% of Traffic, Surpassing Human Traffic for the First Time
by
in SecurityNewsAutomated traffic generated by bad bots has for the first time surpassed human activity, accounting for 51% of all internet traffic in 2024, according to the latest Imperva Bad Bot Report. This marks a significant shift in the digital landscape, highlighting the growing sophistication and prevalence of AI-driven bot attacks that are now posing greater…
-
Ransomware-Angriffe sind mit einem Anstieg von 126 Prozent im letzten Quartal durch die Decke gegangen.
by
in SecurityNewsDer Global-Cyber-Attack-Report Q1-2025 von Check Point Software Technologies zeigt eine starke Zunahme der Cyber-Angriffe in Deutschland mit 55 Prozent ein stärkeres Wachstum als weltweit (47 Prozent). Global sind besonders Ransomware-Angriffe mit einem Anstieg von 126 Prozent durch die Decke gegangen. In Deutschland stiegen die allgemeinen Cyber-Attacken im Vergleich zum ersten Quartal 2024 (+55 Prozent) […]…
-
Security leaders grapple with AI-driven threats
by
in SecurityNewsExperts warn of AI’s dual role in both empowering and challenging cyber defences, and called for intelligence sharing and the need to strike a balance between AI-driven innovation and existing security practices First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366622856/Security-leaders-grapple-with-AI-driven-threats
-
Mitre warns over lapse in CVE coverage
by
in SecurityNewsMitre, the operator of the world-renowned CVE repository, has warned of significant impacts to global cyber security standards, and increased risk from threat actors, as it emerges its US government contract will lapse imminently First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366622813/MITRE-warns-over-lapse-in-CVE-coverage
-
Landmark Admin Suffers Major Breach, Exposing Data of 1.6M+ Users
by
in SecurityNewsLandmark Admin, LLC (“Landmark”), a Texas-based third-party administrator for life insurance carriers, has confirmed that a cyberattack compromised sensitive personal data belonging to more than 1.6 million individuals. The breach, detected in mid-May 2024, has prompted urgent calls for vigilance among affected policyholders, insurance producers, and beneficiaries. Discovery and Immediate Response According to an official…
-
SquareX to Reveal Critical Data Splicing Attack at BSides SF, Exposing Major DLP Vulnerability
by
in SecurityNewsSquareX researchers Jeswin Mathai and Audrey Adeline will be disclosing a new class of data exfiltration techniques at BSides San Francisco 2025. Titled “Data Splicing Attacks: Breaking Enterprise DLP from the Inside Out”, the talk will demonstrate multiple data splicing techniques that will allow attackers to exfiltrate any sensitive file or clipboard data, completely bypassing major Data Loss Protection (DLP) vendors…
-
Chinese firm tied to Uyghur rights abuses now training Tibet police on hacking techniques
by
in SecurityNewsThe digital forensics company known as Meiya Pico won a contract in mid-2023 to build two labs at the Tibet Police College: one on offensive and defensive cyber techniques and the other on electronic evidence collection and analysis. First seen on therecord.media Jump to article: therecord.media/chinese-firm-tied-to-uyghur-abuses-training-police-hacking-tibet
-
Exclusive: Peters, Rounds tee up bill to renew expiring cyber threat information sharing law
by
in SecurityNewsThe law is due to lapse in September, something cyber experts and industry officials say would be a huge loss. First seen on cyberscoop.com Jump to article: cyberscoop.com/peters-rounds-bill-renew-cyber-threat-information-sharing-law/
-
Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition
by
in SecurityNewsMozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow attackers to exploit memory corruption. The fix comes following the discovery and reporting of the vulnerability by the Mozilla Fuzzing Team, as detailed in Mozilla Foundation Security Advisory 2025-25. Details of the Vulnerability The patched vulnerability, CVE-2025-3608, was found in the nsHttpTransaction component of…
-
From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains
by
in SecurityNews
Tags: cloud, cyber, cybercrime, exploit, network, risk, service, supply-chain, threat, vulnerabilityIntroductionCyber threats targeting supply chains have become a growing concern for businesses across industries. As companies continue to expand their reliance on third-party vendors, cloud-based services, and global logistics networks, cybercriminals are exploiting vulnerabilities within these interconnected systems to launch attacks. By first infiltrating a third-party vendor with undetected First seen on thehackernews.com Jump to…
-
New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks
by
in SecurityNewsCybersecurity researchers have unearthed a new controller component associated with a known backdoor called BPFDoor as part of cyber attacks targeting telecommunications, finance, and retail sectors in South Korea, Hong Kong, Myanmar, Malaysia, and Egypt in 2024.”The controller could open a reverse shell,” Trend Micro researcher Fernando Mercês said in a technical report published earlier…
-
Product Walkthrough: A Look Inside Wing Security’s Layered SaaS Identity Defense
Intro: Why hack in when you can log in?SaaS applications are the backbone of modern organizations, powering productivity and operational efficiency. But every new app introduces critical security risks through app integrations and multiple users, creating easy access points for threat actors. As a result, SaaS breaches have increased, and according to a May 2024…
-
Online-Betrüger setzen auf KI und synthetische Identitäten
by
in SecurityNews
Tags: ai, cyber, cyberattack, cybercrime, fraud, germany, international, login, mail, phishing, risk, usaOft reichen wenige echte Datenfragmente etwa Name und Geburtsdatum um eine synthetische Identität zu erschaffen.Die weltweite Welle der Online-Kriminalität wird nach Einschätzung von Cyberexperten in den kommenden Jahren noch an Wucht und Dynamik gewinnen. Einer wachsenden Zahl von Tätern gelingt es demnach, ihre wahre Identität hinter erfundenen Persönlichkeiten zu verbergen.”Synthetische Identitäten sind international ein wachsender…
-
Überwachungssoftware infiziert gezielt Smartphones
by
in SecurityNewsFingierte Messenger-Apps täuschen ihre Opfer und führen so freiwillig zur Installation der Schadsoftware.as Bundesamt für Verfassungsschutz und das britische National Cyber Security Centre warnen vor der Gefahr, die von den Schadprogrammen “Moonshine” und “BadBazaar” ausgeht. Dabei handelt es sich um zwei Varianten von Überwachungssoftware, die gezielt Smartphones infizieren, um sensible Daten zu sammeln. Beide werden mit chinesischen…
-
Tails 6.14.2 Released with Critical Fixes for Linux Kernel Vulnerabilities
by
in SecurityNewsThe Tails Project has urgently releasedTails 6.14.2, addressing critical security vulnerabilities in the Linux kernel and the Perl programming language. This emergency release is vital for users who rely on Tails’ security and privacy features, following the discovery of multiple flaws that could compromise system safety. Critical Security Vulnerabilities Addressed The most significant updates in…
-
CISOs rethink hiring to emphasize skills over degrees and experience
by
in SecurityNews‘Hire differently’: France and ISC2 are among the 37% of leaders and organizations who have put in the work to make skills-based hiring an effective strategy, not just an empty promise.To improve outcomes, France works with the HR team to review job descriptions for open positions and then crafts them based on the organization’s current…
-
UNC5174 Deploys SNOWLIGHT Malware in Linux and macOS Attacks
A threat group believed to have ties with China’s state-sponsored cyber operations, identified as UNC5174, has launched a stealthy and technically advanced cyber campaign aimed at Linux and macOS environments. According to new research published by Sysdig, the group is… First seen on sensorstechforum.com Jump to article: sensorstechforum.com/unc5174-snowlight-malware-linux-macos/
-
Cyber Threats Against Energy Sector Surge as Global Tensions Mount
by
in SecurityNewsResecurity warns of rising cyberattacks on the energy sector, some linked to large-scale campaigns targeting national infrastructure for geopolitical aims. Resecurity warns about the increase in targeted cyberattacks against enterprises in the energy sector worldwide. Some of these attacks represent much larger campaigns designed to target country-level infrastructure, acting as tools for geopolitical influence. It is…
-
APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats
by
in SecurityNewsCheck Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a sophisticated initial-stage downloader, launched by the notorious Russian-linked hacking group APT29, known alternatively as Midnight Blizzard or Cozy Bear. This campaign, identified since January 2025, primarily focuses on European governments and diplomatic entities. Campaign Overview APT29, recognized for its sophisticated cyber…
-
Chinese Hackers Unleash New BRICKSTORM Malware to Target Windows and Linux Systems
by
in SecurityNewsA sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted European strategic industries since at least 2022. According to NVISO’s technical analysis, these backdoors previously confined to Linux vCenter servers now infect Windows environments, employing multi-tiered encryption, DNS-over-HTTPS (DoH) obfuscation, and cloud-based Command & Control (C2) infrastructure to evade detection. The…
-
Hacktivist Group Becomes More Sophisticated, Targets Critical Infrastructure to Deploy Ransomware
by
in SecurityNewsA recent report by Cyble has shed light on the evolving tactics of hacktivist groups, moving beyond traditional cyber disruptions like DDoS attacks and website defacements to engage in more advanced critical infrastructure attacks and ransomware operations. Advanced Attack Strategies Hacktivism is transforming into a complex tool of hybrid warfare, with groups adopting tactics traditionally…
-
CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilities
by
in SecurityNewsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing severe vulnerabilities in widely-used Industrial Control Systems (ICS) products. These advisories, published on April 15, 2025, urge immediate action from operators and administrators overseeing critical infrastructure. Below are the key highlights from each advisory: Nine Industrial Control Systems Advisories 1.Siemens Mendix…
-
10 Best Email Security Solutions in 2025
Email security solutions are critical for protecting organizations from the growing sophistication of cyber threats targeting email communication. As email remains a primary channel for business communication, it is also the most exploited vector for attacks such as phishing, malware distribution, and business email compromise (BEC). Implementing robust email security measures ensures the confidentiality, integrity,…
-
WhatsApp Job Offer Scam Targets Job Seekers in New Phishing Attack
by
in SecurityNewsA new form of phishing attack is making waves among job seekers, as cybercriminals exploit WhatsApp and Meta’s trusted branding to lure victims into sophisticated job offer scams. Security experts warn that these attacks are not only increasing in frequency but have also become more elaborate, bypassing many traditional security layers and preying on those…