0

DoJ Shutters Cybercrime Forums Behind Attacks on 17M Americans

Thứ Sáu, 31 tháng 1, 2025
The "Cracked" and "Nulled" Dark Web sites are now offline, along with the Pakistani "Saim Raza" network of underground forums (aka HeartSender).
0

Tenable to Acquire Vulcan Cyber to Boost Exposure Management Focus

The deal, expected to close this quarter, will give Tenable One Exposure Management much-needed integration with over 100 third-party security tools and platforms.
0

Code-Scanning Tool's License at Heart of Security Breakup

Nine application security toolmakers band together to fork the popular Semgrep code-scanning project, touching off a controversy over access to features and fairness.
0

Can AI & the Cyber Trust Mark Rebuild Endpoint Confidence?

The Cyber Trust Mark has the potential to change how we define and measure security at the endpoint level. But potential isn't enough.
0

Healthcare Sector Charts 2 More Ransomware Attacks

Thứ Năm, 30 tháng 1, 2025
No ransomware groups have yet to claim responsibility for either attack, and both institutions have yet to reveal what may have been stolen.
0

Automated Pen Testing Is Improving — Slowly

The rate of evolution has been glacial, but tools now understand cloud environments and can target Web applications.
0

PrintNightmare Aftermath: Windows Print Spooler is Better. What's Next?

Thứ Tư, 29 tháng 1, 2025
While Microsoft has boosted the security of Windows Print Spooler in the three years since the disclosure of the PrintNightmare vulnerability, the service remains a spooky threat that organizations cannot afford to ignore.
0

Researchers Uncover Lazarus Group Admin Layer for C2 Servers

The threat actor is using a sophisticated network of VPNs and proxies to centrally manage command-and-control servers from Pyongyang.
0

Unpatched Zyxel CPE Zero-Day Pummeled by Cyberattackers

VulnCheck initially disclosed the critical command-injection vulnerability (CVE-2024-40891) six months ago, but Zyxel has yet to mention its existence or offer users a patch to mitigate threats.
0

Mirai Variant ‘Aquabot’ Exploits Mitel Device Flaws

Yet another spinoff of the infamous DDoS botnet is exploiting a known vulnerability in active attacks, while its threat actors are promoting it on Telegram for other attackers to use as well, in a DDoS-as-a-service model.
0

Reporting a Breach or Vuln? Be Sure Your Lawyer's on Call

Thứ Ba, 28 tháng 1, 2025
Globally, security researchers and whistleblowers face increasingly hostile laws and judiciaries that are ready to levy fines and prison sentences.
0

Actively Exploited Fortinet Zero-Day Gives Attackers Super-Admin Privileges

The firewall specialist has patched the security flaw, which was responsible for a series of attacks reported earlier this month that compromised FortiOS and FortiProxy products exposed to the public Internet.
0

Spectral Capital Files Quantum Cybersecurity Patent

Thứ Hai, 27 tháng 1, 2025
0

Change Healthcare Breach Impact Doubles to 190M People

One of the largest data breaches in history was apparently twice as impactful as previously thought, with PII belonging to hundreds of millions of people sitting in the hands of cybercriminals.
0

USPS Impersonators Tap Trust in PDFs in Smishing Attack Wave

Attackers aim to steal people's personal and payment-card data in the campaign, which dangles the threat of an undelivered package and has the potential to reach organizations in more than 50 countries.
0

Crisis Simulations: A Top 2025 Concern for CISOs

CISOs are planning to adjust their budgets this year to reflect their growing concerns for cybersecurity preparedness in the event of a cyberattack.
0

The Case for Proactive, Scalable Data Protection

Whether you're facing growing data demands and increased cyber threats, or simply looking to future-proof your business, it's time to consider the long-term benefits of transitioning to a cloud-first infrastructure.
0

DoJ Busts Up Another Multinational DPRK IT Worker Scam

Thứ Sáu, 24 tháng 1, 2025
A departmentwide initiative has now led to five major law enforcement actions, in an attempt to curb the increasingly common trend of North Korean hackers posing as IT job applicants.
0

MITRE's Latest ATT&CK Simulations Tackles Cloud Defenses

The MITRE framework's applied exercise provides defenders with critical feedback about how to detect and defend against common, but sophisticated, attacks.
0

Cisco: Critical Meeting Management Bug Requires Urgent Patch

The bug has been given a 9.9 CVSS score, and could allow authenticated threat actors to escalate their privileges to admin-level if exploited.
0

3 Use Cases for Third-Party API Security

Third-party API security requires a tailored approach for different scenarios. Learn how to adapt your security strategy to outbound data flows, inbound traffic, and SaaS-to-SaaS interconnections.
0

84% of Healthcare Organizations Spotted a Cyberattack in the Late Year

Thứ Năm, 23 tháng 1, 2025
0

Cloudflare CDN Bug Outs User Locations on Signal, Discord

Attackers can use a zero- or one-click flaw to send a malicious image to targets — an image that can deanonymize a user within seconds, posing a threat to journalists, activists, hackers, and others whose locations are sensitive.
0

CISA: Ivanti Vulns Chained Together in Cyberattack Onslaught

The threat actors are abusing the vulnerabilities to gain initial access, obtain credentials, and install malicious scripts on user devices.
0

Security Needs to Start Saying 'No' Again

The rush to say 'yes' allows cybersecurity teams to avoid hard conversations with business stakeholders, but also risks losing their ability to effectively protect organizations.
0

Trump Overturns Biden Rules on AI Development, Security

Thứ Tư, 22 tháng 1, 2025
The new administration moved quickly to remove any constraints on AI development and collected $500 billion in investment pledges for an American-owned AI joint venture.
0

Chinese Cyberspies Target South Korean VPN in Supply Chain Attack

Advanced persistent threat group PlushDaemon, active since 2019, is using a sophisticated modular backdoor to collect data from infected systems in South Korea.
0

Trump Pardons 'Silk Road' Dark Web Drug Market Creator

The pardon comes after 11 years in prison for Ross Ulbricht, who was sentenced to life without parole on several charges, including computer hacking, distribution of narcotics, and money laundering.
0

Email Bombing, 'Vishing' Tactics Abound in Microsoft 365 Attacks

Thứ Ba, 21 tháng 1, 2025
Sophos noted more than 15 attacks have been reported during the past three months.
0

DONOT Group Deploys Malicious Android Apps in India

The advanced persistent threat (APT) group is likely India-based and targeting individuals with connections to the country's intelligence community.
0

HPE Investigates After Alleged Data Breach

The company reports that it is not experiencing any operational issues within its business, so far.
0

Mirai Botnet Spinoffs Unleash Global Wave of DDoS Attacks

Two separate campaigns are targeting flaws in various IoT devices globally, with the goal of compromising them and propagating malware worldwide.
0

Why CISOs Must Think Clearly Amid Regulatory Chaos

Even as the rule book changes, the profession of the CISO remains unchanged: protecting the organization in a world of constant, continually evolving threats.
0

Phishing Attacks Are the Most Common Smartphone Security Issue for Consumers

Thứ Hai, 20 tháng 1, 2025
New hands-on testing results show that most devices are unable to catch phishing emails, texts, or calls, leaving users at risk.
0

US Ban on Automotive Components Could Curb Supply Chain

The US Department of Commerce will prohibit the import of components for connected vehicles from China or Russia, as the US continues to ban technology it sees as potential national security threats.
0

Has the TikTok Ban Already Backfired on US Cybersecurity?

Thứ Sáu, 17 tháng 1, 2025
The Supreme Court has affirmed TikTok's ban in the US, which has its users in revolt and is creating a whole new set of national cybersecurity concerns.
0

US Sanctions Chinese Hacker & Firm for Treasury, Critical Infrastructure Breaches

The cyber actor played a role in the Treasury breach as well as attacks on critical infrastructure, linked to China-backed advanced persistent threat (APT) group Salt Typhoon.
0

CISA and US and International Partners Publish Guidance for OT Owners and Operators

Thứ Năm, 16 tháng 1, 2025
0

SEALSQ in Cooperation With WISeKey Expands Post-Quantum Footprint in Saudi Arabia

0

FTC Orders GoDaddy to Fix Inadequate Security Practices

The FTC claims that the Web hosting company's security failures led to several major breaches in the past few years.
0

Biden's Cybersecurity EO Leaves Trump a Comprehensive Blueprint for Defense

New order mandates securing the federal software supply chain and communications networks, as well as deploying AI tools to protect critical infrastructure from cyberattacks — but will the Trump administration follow through?
0

CISA's AI Playbook Pushes For More Information Sharing

The Joint Cyber Defense Collaborative playbook seeks to establish a "a unified approach" on how to handle AI-related cybersecurity threats.
0

Trusted Apps Sneak a Bug Into the UEFI Boot Process

Seven system recovery programs contained what amounted to a backdoor for injecting any untrusted file into the system startup process.
0

Attackers Hijack Google Advertiser Accounts to Spread Malware

Thứ Tư, 15 tháng 1, 2025
It's an especially brazen form of malvertising, researchers say, striking at the heart of Google's business; the tech giant says it's aware of the issue and is working quickly to address the problem.
0

CISA: Second BeyondTrust Vulnerability Added to KEV Catalog

BeyondTrust has patched all cloud instances of the vulnerability and has released patches for self-hosted versions.
0

Microsoft Rings in 2025 With Record Security Update

Thứ Ba, 14 tháng 1, 2025
Company has issued patches for an unprecedented 159 CVEs, including eight zero-days, three of which attackers are already exploiting.
0

Apple Bug Allows Root Protections Bypass Without Physical Access

Emergent macOS vulnerability lets adversaries circumvent Apple's System Integrity Protection (SIP) by loading third-party kernels.
0

FBI Wraps Up Eradication Effort of Chinese 'PlugX' Malware

Two hacker groups were paid to develop malware targeting victims in the US, Europe, and Asia, as well as various Chinese dissident groups.
0

Zero-Day Security Bug Likely Fueling Fortinet Firewall Attacks

An ongoing campaign targeting FortiGate devices with management interfaces exposed on the public Internet is leading to unauthorized administrative logins and configuration changes, creating new accounts, and performing SSL VPN authentication.
0

Cloud Attackers Exploit Max-Critical Aviatrix RCE Flaw

Thứ Hai, 13 tháng 1, 2025
The security vulnerability tracked as CVE-2024-50603, which rates 10 out of 10 on the CVSS scale, enables unauthenticated remote code execution on affected systems, which cyberattackers are using to plant malware.
0

Cyberattackers Hide Infostealers in YouTube Comments, Google Search Results

Threat actors are targeting people searching for pirated or cracked software with fake downloaders that include infostealing malware such as Lumma and Vidar.
0

Telefonica Breach Exposes Jira Tickets, Customer Data

The Hellcat ransomware group has stolen roughly 5,000 documents, potentially containing confidential information, from the telecom giant's internal database.
0

The Shifting Landscape of Open Source Security

By focusing on vigilant security practices, responsible AI deployment, and alignment with global regulatory standards, the OSS community can make 2025 a transformative year for security.
0

Threat Actors Exploit a Critical Ivanti RCE Bug, Again

Thứ Bảy, 11 tháng 1, 2025
New year, same story. Despite Ivanti's commitment to secure-by-design principles, threat actors — possibly the same ones as before — are exploiting its edge devices for the nth time.
0

China's UNC5337 Exploits a Critical Ivanti RCE Bug, Again

Thứ Sáu, 10 tháng 1, 2025
New year, same story. Despite Ivanti's commitment to secure-by-design principles, Chinese threat actors are exploiting its edge devices for the nth time.
0

Fake CrowdStrike 'Job Interviews' Become Latest Hacker Tactic

Cybercriminals are luring victims into downloading the XMRig cryptomining malware via convincing emails, inviting them to schedule fake interviews using a malicious link.
0

Russia Carves Out Commercial Surveillance Success Globally

Growing sales of the System for Operative Investigative Activities (SORM), a Russian wiretapping platform, in Central Asia and Latin American suggests increasing risks for Western businesses.
0

The Path Toward Championing Diversity in Cybersecurity Education

To build a truly inclusive and diverse cybersecurity workforce, we need a comprehensive approach beyond recruitment and retention.
0

Chinese APT Group Is Ransacking Japan's Secrets

Thứ Năm, 9 tháng 1, 2025
Since 2019, MirrorFace has been stealing information from myriad Japanese organizations to gain leverage over Japan in the event of hostilities between the two countries, experts said.
0

Banshee 2.0 Malware Steals Apple's Encryption to Hide on Macs

The most recent iteration of the open source infostealer skates by antivirus programs on Macs, using an encryption mechanism stolen from Apple's own antivirus product.
0

Hacking Group 'Silk Typhoon' Linked to US Treasury Breach

The attack used a stolen remote support SaaS API key to exfiltrate data from workstations in the Treasury Department's Office of Foreign Assets Control.
0

Green Bay Packers' Online Pro Shop Sacked by Payment Skimmer

Thứ Tư, 8 tháng 1, 2025
Cyberattackers injected the NFL Wild Card team's online Pro Shop with malicious code to steal credit-card data from 8,500 fans.
0

New Docuseries Spotlights Hackers Who Shaped Cybersecurity

"Where Warlocks Stay Up Late" project speaks to hackers who have played pivotal roles in shaping the field of cybersecurity. The video interviews are complemented by an encyclopedia and an anthropological map.
0

Ransomware Targeting Infrastructure Hits Telecom Namibia

Thứ Ba, 7 tháng 1, 2025
The southern African telco is the latest entity on the continent to have its critical infrastructure hacked, and attackers release sensitive info online when Telecom Namibia refuses to negotiate.
0

Sharing of Telegram User Data Surged After CEO Arrest

Until September 2024, the encrypted messaging service acceded to 14 requests for user data from the US; that number jumped to 900 after its CEO was detained by French authorities in August.
0

Pentagon Adds Chinese Gaming Giant Tencent to Federal Ban

The sprawling social media and gaming platform says that being considered a Chinese military business must be a mistake.
0

CISA: Third-Party Data Breach Limited to Treasury Dept.

The breach was carried out by exploiting CVE-2024-12356 in BeyondTrust cybersecurity company, just last week.
0

Will AI Code Generators Overcome Their Insecurities This Year?

Thứ Hai, 6 tháng 1, 2025
In just two years, LLMs have become standard for developers — and non-developers — to generate code, but companies still need to improve security processes to reduce software vulnerabilities.
0

EagerBee Backdoor Takes Flight Against Mideast ISPs, Government Targets

The malware, operated by China-backed cyberattackers, has been significantly fortified with new evasive and post-infection capabilities.
0

IoT's Regulatory Reckoning Is Overdue

New security regulations are more than compliance hurdles — they're opportunities to build better products, restore trust, and lead the next chapter of innovation.
0

Thousands of Buggy BeyondTrust Systems Remain Exposed

Thứ Sáu, 3 tháng 1, 2025
Weeks after the critical vulnerability was reported and a hacking of the Treasury Department, nearly 9,000 BeyondTrust instances remain wide open to the Internet, researchers say.
0

New HIPAA Cybersecurity Rules Pull No Punches

Healthcare organizations of all shapes and sizes will be held to a stricter standard of cybersecurity starting in 2025 with new proposed rules, but not all have the budget for it.
0

Treasury Dept. Sanctions Chinese Tech Vendor for Complicity

Integrity Technology Group was found complicit with Flax Typhoon as part of a broader Chinese strategy to infiltrate the IT systems of US critical infrastructure.
0

Apple Offers $95M to Settle Siri Privacy Lawsuit

The proposed settlement would amount to roughly $20 per Apple product that has Siri enabled, for each plaintiff.
0

VicOne and Zero Day Initiative (ZDI) to Lead Pwn2Own Automotive

Thứ Năm, 2 tháng 1, 2025
0

US Soldier Arrested in Verizon, AT&T Hacks

Wagenius posted about hacking more than 15 telecom providers on the Telegram messaging service.
0

Volkswagen Breach Exposes Data of 800K EV Customers

Ethical hacking group Chaos Computer Club uncovered exposed data of electrical vehicle owners across the company's VW, Audi, Seat, and Skoda brands.
0

'Bad Likert Judge' Jailbreak Bypasses Guardrails of OpenAI, Other Top LLMs

A novel technique to stump artificial intelligence (AI) text-based systems increases the likelihood of a successful cyberattack by 60%.
0

Managing Cloud Risks Gave Security Teams a Big Headache in 2024

The results of Dark Reading's 2024 Strategic Security survey suggest that security teams continue to grapple with the challenges that come with increased cloud adoption such as data visibility and loss of controls. Managing cloud risks will be a focus for security teams in 2025.