: Samsung Tickets Data Leak: Infostealers Strike Again in Massive Free Dump | InfoStealers A data …

: Oracle Cloud Data Breach: Six Million Records Stolen, 140,000 Clients Potentially Impacted - CPO …

: Oracle (ORCL) Warns Health Customers of Patient Data Breach - Bloomberg Hackers breached Oracle’s …

: RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features The U.S. Cybersecurity and …

: youtube.com/watch A recent report by the University of Toronto’s Citizen Lab suggests that Ontario …

: ‘Evilginx’ Tool (Still) Bypasses MFA Evilginx, a malicious version of the NGINX Web …

: Ubuntu namespace vulnerability should be addressed quickly: Expert | Network World Three …

: BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability Threat hunters …

: SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk SquareX warns of the …

: Experts warn of the new sophisticate Crocodilus mobile banking Trojan A new Android trojan called …

: UK Software Firm Fined £3 Million Over Ransomware-Caused Data Breach - SecurityWeek The UK …

: Hellenic Open University Hit By Cyberattack, 813 GB Of Personal Data Leaked On Dark Web The Hellenic …

: Twitter (X) Hit by Data Leak of 2.8 Billion Users; Allegedly an Insider Job A data leak of 2.87 …

: Secure encryption and online anonymity are now at risk in Switzerland – here’s what you need …

: Darkweb actors claim to have over 100K of Gemini, Binance user info Darkweb threat actors claim to …

: Russia arrests three for allegedly creating Mamont malware, tied to over 300 cybercrimes …

: Dozens of solar inverter flaws could be exploited to attack power grids …

: New Atlantis AIO platform automates credential stuffing on 140 services …

: Ukraine’s state railway restores online ticket sales after major cyberattack …

: European officials increasingly certain Baltic Sea cable breaks are accidental, not sabotage …

: Oracle customers confirm data stolen in alleged cloud breach is valid A threat actor claimed to have …

: UK’s first permanent facial recognition cameras installed • The Register The Metropolitan …

: Top Trump officials have private data and passwords leaked in stunning security breach following war …

: Identity of hacker behind NSW court website data breach unknown, police say - ABC News A data breach …

: StreamElements discloses third-party data breach after hacker leaks data StreamElements, a …

: Malaysian PM says “no way” to $10 million ransom after alleged cyber attack against …

: Arkana Security group claims the hack of US telco provider WideOpenWest (WOW!) Arkana Security, a …

: 150,000 Sites Compromised by JavaScript Injection Promoting Chinese Gambling Platforms A campaign …

: New Cybercrime Tool ‘Atlantis AIO’ Amps Up Credential Stuffing Attacks A new cybercrime …

: The Cost Of Delay: Privacy Risks From Post-Quantum Cryptography Inaction The rapid advancement of …

: CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices CISA added two …

: Surge In Gen AI-based Threats Stimulates 140% Increase In Browser-based Phishing Attacks The Menlo …

: ETSI releases security standard for the quantum future - Help Net Security ETSI released a …

: RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment - The Cyber Post The …

: Internet Archive (Archive.org) Goes Down Following “Power Outage” Internet Archive, home …

: Security expert Troy Hunt hit by phishing attack | Malwarebytes Internet security expert Troy Hunt …

: New ReaderUpdate malware variants target macOS users SentinelOne researchers warn of new …

: Project Zero: Blasting Past Webp A zero-click iOS exploit, dubbed “BLASTPASS,” was discovered in the …

: VMware sues Siemens for allegedly using unlicensed software www.theregister.com/2025/03/2… …

: Security Tech That Can Make a Difference During an Attack www.darkreading.com/cybersecu… When …

: Security Tech That Can Make a Difference During an Attack www.darkreading.com/cybersecu… When …

: UK warns of emerging threat from ‘sadistic’ online ‘Com networks’ of teenage boys …

: Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain …

: New Windows zero-day leaks NTLM hashes, gets unofficial patch …

: CrushFTP warns users to patch unauthenticated access flaw immediately …

: Are cellphones really putting our health at risk? I dug deep into the latest science, expert …

: Europe is looking for alternatives to US cloud providers arstechnica.com/informati… The …

: US Weakens Disinformation Defenses, as Russia & China Ramp Up …

: Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation …

: As nation-state hacking becomes ‘more in your face,’ are supply chains secure? …

: DrayTek routers worldwide go into reboot loops over weekend …

: IngressNightmare: 9.8 Critical Unauthenticated Remote Code Execution Vulnerabilities in Ingress …

: Cloudflare incident on March 21, 2025 On March 21, 2025, a Cloudflare incident occurred due to human …

: Microsoft Gives Security Copilot Some Autonomy Microsoft is enhancing its Security Copilot with …

: China bans facial recognition in hotels, bathrooms • The Register China has banned the use of facial …

: New Tenable Report Finds DeepSeek Can Be Jailbroken to Create Malware - CPO Magazine A new Tenable …

: Microsoft Trusted Signing service abused to code-sign malware Cybercriminals are abusing Microsoft’s …

: New Report Looks at Cyber Risks and Incident Response - ACTFORE’s sponsored IDC Spotlight report …

: Cyber Wars are the New Battleground of Global Diplomacy - Modern Diplomacy Cyber warfare, …

: Cyber group says it disrupted Iranian shipping communications | Iran International A hacker group, …

: Digital resilience and cyber security reporting requirements in the UK and EU Recent and incoming …

: Resilience: Third-Party Risk Involved in 31% of Cyber Claims Third-party cyber risk, including …

: The importance of cyber security compliance – an overview of the EU regulatory framework The EU has …

: Industry leaders urge insurance sector to tackle escalating cyber threats | ITIJ Industry leaders …

: Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility Two critical …

: Nearly 2M hit by SpyX data breach | SC Media Nearly two million individuals, including 17,000 Apple …

: Data breach at Western Alliance Bank affects 22,000 people | American Banker Western Alliance Bank …

: Is the Middle East’s Race to Digitize a Threat? The Middle East’s rapid digitization, driven …

: California AG Reminds 23andMe Customers of Data Deletion Rights - Infosecurity Magazine California …

: Auto Insurer Fined for Data Breach That Impacted 45K New Yorkers Auto insurer Root was fined …

: What happens to your data if 23andMe collapses? — Harvard Gazette The uncertain future of 23andMe, a …

: 23andMe files for bankruptcy in US after data breach, big losses | The Independent Genetic testing …

: Lafayette Federal Credit Union Data Breach Alert Wolf Haldenstein Adler Freeman & Herz LLP is …

: Albabat Ransomware Expands Targets, Abuses GitHub - SecurityWeek New versions of the Albabat …

: Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks A critical …

: Cross-Border Data Compliance: Navigating Public Security Regulations in a Connected World | Tripwire …

: Top 10 Scam Techniques: What You Need to Know | Tripwire Scammers use various techniques to …

: Cloak ransomware group hacked the Virginia Attorney General’s Office The Cloak ransomware group …

: Finders Keypers: Open-source AWS KMS key usage finder - Help Net Security Finders Keypers is an …

: Cloud providers aren’t delivering on security promises - Help Net Security Cloud providers are …

: ABYSSWORKER: A New EDR-Killer In Medusa Ransomware Attacks A new ransomware campaign, Medusa, is …

: The Looming Quantum Threat: NCSC Urges Encryption Upgrades The National Cyber Security Centre (NCSC) …

: CBC News has uncovered a sophisticated human smuggling network capable of producing highly …

: What Google Chrome knows about you, with Carey Parker (Lock and Code S06E06) | Malwarebytes Google …

: UAT-5918 ATP group targets critical Taiwan Cisco Talos discovered UAT-5918, an info-stealing threat …

: Chinese Hackers Exploit Unpatched Servers in Taiwan Chinese hackers, tracked as UAT-5918, are …

: Fake Out: Babuk2 Ransomware Group Claims Bogus Victims A new ransomware group, Babuk2, is attempting …

: Hacker Pulls Off $8.4M Theft from Zoth Protocol After Admin Access… Zoth protocol, a restaking …

: Oracle Cloud Hit by Massive Cyberattack, CloudSEK Warns of Supply Chain Crisis In a potentially …

: No need to hack when it’s leaking: OrthoMinds edition – DataBreaches.Net A security researcher …

: Over 3 million applicants’ data leaked on NYU’s website - Washington Square News A hacker took over …

: Oracle denies breach after hacker claims theft of 6 million data records Oracle denies a breach …

: New Eleven11bot DDoS Botnet Compromises Over 86,000 IoT Devices Globally A new DDoS botnet, …

: Polymarket: Where Insight Meets Incentive I do not place bets, but I have become fascinated by Polymarket A platform where people do not just …

: Violent ChatGPT Hallucination Sparks GDPR Complaint A Norwegian man, Arve Hjalmar Holmen, filed a …

: 11 hottest IT security certs for higher pay today | CSO Online Cybersecurity certifications can …

: Developers: apply these 10 mitigations first to prevent supply chain attacks | InfoWorld A new …

: Pennsylvania State Education Association data breach impacts 500,000 individuals The Pennsylvania …

: Signal threatens to leave France if encryption backdoor required – Computerworld Signal is …

: Atlassian security advisory (AV25-152) - Canadian Centre for Cyber Security Atlassian published a …

: Israeli Spyware Graphite Targeted WhatsApp with 0-Click Exploit Citizen Lab researchers uncovered …

: How to Build and Maintain an Effective AWS Security Posture Aidan Steele, a security engineer at …

: New LLM jailbreak technique can create password-stealing malware | Security Magazine A new LLM …

: Rooted Androids 3,000x More Likely to Be Breached, Even iPhones Not Safe Rooted Android and …

: HP Brings Quantum-Safe Encryption to Printers HP is introducing quantum-safe encryption to its …

: Brand impersonation is 51% of browser phishing attempts | Security Magazine Browser-based phishing …

: Dark Web Profile: FSociety (Flocker) Ransomware - SOCRadar® Cyber Intelligence Inc. FSociety, or …

: New Windows zero-day feared abused in widespread espionage for years | CSO Online A zero-day …

: New KnowBe4 Report Reveals a Spike in Phishing Campaigns - IT Security Guru KnowBe4’s Phishing …

: List of Countries which are most vulnerable to Cyber Attacks - Cybersecurity Insiders Cybersecurity …

: Euro semi firms push for ‘Chips Act 2.0’ to expand beyond manufacturing …

: Are We Closing the Gender Gap in Cybersecurity? www.darkreading.com/cybersecu… After more …

: BlackLock Ransomware: What You Need To Know www.tripwire.com/state-of-… BlackLock is a …

: Unboxing Anubis: Exploring the Stealthy Tactics of FIN7’s Latest Backdoor …

: HellCat hackers go on a worldwide Jira hacking spree www.bleepingcomputer.com/news/secu… …

: RansomHub ransomware uses new Betruger ‘multi-function’ backdoor …

: 🔹 Incident 1: NightSpire Ransomware Attack on Tohpe Corporation 📅 Date/Time (EST): March 20, 2025, …

: CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages CERT-UA …

: Chinese military-linked companies dominate US digital supply chain - Help Net Security Chinese …

: 70% of leaked secrets remain active two years later - Help Net Security The 2025 State of Secrets …

: India Is Top Global Target for Hacktivists, Regional APTs India has become the top global target for …

: Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armenia - The …

: WhatsApp fixed zero-day used to deploy Paragon Graphite spyware WhatsApp addressed a zero-day …

: Google Chrome security advisory (AV25-151) - Canadian Centre for Cyber Security Google published a …

: 11 Nation-State Hackers Exploit Unpatched Windows Flaw Since 2017 A Windows zero-day vulnerability, …

: Veeam security advisory (AV25-150) - Canadian Centre for Cyber Security Veeam published a security …

: Jenkins security advisory (AV25-149) - Canadian Centre for Cyber Security Jenkins published a …

: Phishing-based attacks have risen 140% year-over-year | Security Magazine Menlo Threat Intelligence …

: Chinese Hacking Group MirrorFace Targeting Europe - SecurityWeek Chinese hacking group MirrorFace, …

: Windows Shortcut Zero-Day (ZDI-CAN-25373) Exploited by State-Backed Threat Actors Since 2017: …

: SpyCloud’s 2025 Identity Exposure Report Reveals the Scale and Hidden Risks of Digital Identity …

: Scareware Combined With Phishing in Attacks Targeting macOS Users - SecurityWeek A scareware …

: Sperm bank breach deposits data into hands of cybercriminals | Malwarebytes California Cryobank, a …

: ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers The …

: Major teacher’s union breach leaks members' PIN codes| Cybernews Over 500,000 members of the …

: Cl0p Hackers Leak 22K Bank Records in Cleo Breach Shock Cl0p hackers exploited vulnerabilities in …

: Tesla Owners Doxxed by Dogequest, an Unnerving Breach of Privacy A website called Dogequest …

: Extortion Reboot: Ransomware Crew Threatens Leak to Snowden – DataBreaches.Net Ox Thief, a …

: GitHub Action hack likely led to another in cascading supply chain attack A cascading supply chain …

: How to Secure Your Information on AWS: 10 Best Practices | Tripwire Organizations using Amazon Web …

: New Arcane stealer spreading via YouTube and Discord | Securelist A new stealer, Arcane, is being …

: Top 10 Passwords Hackers Use to Breach RDP – Is Yours at Risk? Hackers frequently target Remote …

: New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads A …

: Fake DeepSeek AI Installers, Websites and Apps Spreading Malware Cybercriminals are exploiting the …

: Flashpoint 2025 Global Threat Intelligence Report: Stay Ahead of Emerging Threats | Flashpoint The …

: New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking A critical …

: Cloudflare expands security portfolio with network-powered posture management | Network World …

: 11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft - SecurityWeek Trend Micro’s …

: Identity attacks and infostealers dominate the 2025 Threat Detection Report The 2025 Threat …

: Actively Exploited ChatGPT Bug Puts Organizations at Risk A server-side request forgery …

: New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors …

: $20B loss estimated from potential March Madness hacks | Security Magazine March Madness, with its …

: Google Releases Major Update for Open Source Vulnerability Scanner - SecurityWeek Google released an …

: Google Purchases Wiz in $32B Deal to Boost Cloud Security Google is acquiring Wiz, a leading cloud …

: Chinese Hackers Target European Diplomats with Malware Chinese cyberespionage group MirrorFace, …

: 1 in 10 people do nothing to stay secure and private on vacation …

: Announcing OSV-Scanner V2: Vulnerability scanner and remediation tool for open source …

: StilachiRAT analysis: From system reconnaissance to cryptocurrency theft …

: BitM Up! Session Stealing in Seconds Using the Browser-in-the-Middle Technique …

: Critical RCE flaw in Apache Tomcat actively exploited in attacks …

: Large enterprises scramble after supply-chain attack spills their secrets …

: FBI Warns: Malware Hidden in File Conversion Tools* Recently, the FBI warned about an emerging threat involving cybercriminals embedding malware into …

: AUTOSUR Breach, FiveM Database Leak, Disney+ Account Checker, Crypto Leads & Forex Scams Exposed …

: GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories A supply chain …

: European Cyber Report 2025: 137% more DDoS attacks than last year DDoS attacks have surged by 137% …

: Free file converter malware scam “rampant” claims FBI The FBI warns of a surge in …

: Social Media and Email hacking surged in 2024 - Cybersecurity Insiders In 2024, there was a …

: Arctic Wolf Warns Of Ongoing Attacks Targeting FortiGate Firewall Management Interfaces Arctic Wolf …

: AsyncRAT Surges In Global Malware Rankings AsyncRAT, a stealthy remote access Trojan, has surged in …

: IntelMQ: Open-source tool for collecting and processing security feeds - Help Net Security IntelMQ …

: Welcome to Security Week 2025 Security Week 2025 highlights the evolving threat landscape and the …

: Jailbreaking is (mostly) simpler than you think msrc.microsoft.com/blog/2025… Content …

: New Akira ransomware decryptor cracks encryptions keys using GPUs …

: Denmark's Postal Service Ends Letter Delivery: Adaptation or Loss? Denmark’s state-run PostNord will discontinue all letter mail services by 30 December 2025, …

: Malicious Adobe, DocuSign OAuth apps target Microsoft 365 accounts Cybercriminals are using …

: Manus AI: China’s Bold Step Forward—Promises and Challenges — Insights For Success Manus AI, …

: SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware …

: GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging …

: Remote Access Infra Remains Riskiest Corp. Attack Surface www.darkreading.com/cyber-ris… From …

: Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge …

: Merz wins support for surge in spending, proclaiming ‘Germany is back’ | Reuters German …

: Everything you say to your Echo will be sent to Amazon starting on March 28 - Ars Technica Starting …

: Pirate Bay backer Carl Lundström dies in plane crash • The Register Carl Lundström, a financier of …

: OpenAI says it’s ‘impossible’ to train AI without copyrighted materials | Euronews …

: We’re Thinking About Deploying AI Models Which Have An “I Quit” Button: Anthropic …

: GitLab addressed critical auth bypass flaws in CE and EE) GitLab released security updates to …

: One PUT Request to Own Tomcat: CVE-2025-24813 RCE is in the Wild - Security Boulevard A new remote …

: A New Era of Attacks on Encryption Is Starting to Heat Up | WIRED Governments worldwide, including …

: How Security Teams Should Respond To The Rise In Vulnerability Disclosures Vulnerability disclosures …

: Guardz Reveals Details of an Ongoing Phishing Campaign Exploiting Microsoft 365 Infrastructure - …

: FBI alerts Gmail users over Medusa Ransomware - Cybersecurity Insiders The FBI and CISA warn Gmail …

: New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions A new malware …

: Microsoft Uncovers New XCSSET MacOS Malware Variant Targeting Xcode Projects Microsoft Threat …

: EU Seeks US Assurances on Trans-Atlantic Data Flows The EU is seeking assurances from the US on the …

: Breach Roundup: The Ivanti Patch Treadmill - GovInfoSecurity This week’s cybersecurity roundup …

: Groups From China, Russia, Iran Hitting OT Systems Worldwide Nation-state threat groups, including …

: FBI and CISA Urge Enabling 2FA to Counter Medusa Ransomware The FBI and CISA issued a joint advisory …

: Ransomware Hits Record High: 126% Surge in Attacks in February 2025 February 2025 saw a record 126% …

: Cisco security advisory (AV25-140) - Canadian Centre for Cyber Security Cisco published security …

: Tata Technologies' 1.4TB Data Breach: Hunters International’s Dark Web Leak Tata Technologies, …

: New York sues Allstate over data breach, alleged security lapses | Reuters New York Attorney General …

: New Era Enterprises Confirms Recent Data Breach Affected Certain Boston Mutual Customers | Console …

: Massive data breach: Israelis' COVID records, other information on sale for $1 millio A group is …

: DVIDS - News - Eye on the Grid: Navy Develops ‘MOSAICS’ to Cyber-Defend Critical Infrastructure The …

: Has DeepSeek’s open source AI become a tool for cyber-scammers? - UKTN DeepSeek’s open-source AI …

: Check Point Uncovers 2025’s Biggest Cyber Risks - TechAfrica News Check Point’s Cyber Security …

: FCC launches national security unit to counter state-linked threats to US telecoms | Cybersecurity …

: VC Investment in Cyber Startups Surges 35% - Infosecurity Magazine Venture capital investment in …

: Cyber Security Sectoral Analysis 2025 reveals explosive growth The UK’s cyber security sector …

: Denmark raises cyber threat level for telecommunications sector Denmark raised its cyber threat …

: Cyber-attacks a bigger threat to cargo owners than cargo ships - The Loadstar Shipping supply chains …

: CPS data breach: Expert chimes in on how to stay vigilant Over 700,000 Chicago Public School …

: Joint report on publicly available hacking tools www.ncsc.gov.uk/report/jo… This report is a …

: Android devices track you before you even sign in www.malwarebytes.com/blog/news… Google is …

: Volt Typhoon hackers were in Massachusetts utility’s systems for 10 months …

: Signal no longer cooperating with Ukraine on Russian cyberthreats, official says …

: Picklescan Vulnerabilities Could Let Hackers Bypass AI Security Checks Sonatype researchers …

: NIST Finalizes Differential Privacy Rules to Protect Data NIST finalized guidelines for evaluating …

: China-linked APT UNC3886 targets EoL Juniper routers China-linked APT UNC3886 is deploying custom …

: New Bill Aims To Strengthen Cybersecurity For Federal Contractors The House of Representatives …

: UAE Guidelines Offer Blueprint for Cybersecurity in Health The United Arab Emirates is strengthening …

: Generative AI red teaming: Tips and techniques for putting LLMs to the test | CSO Online OWASP’s …

: WARNING: Expiring Root Certificate May Disable Firefox Add-Ons, Security Features, and DRM Playback …

: Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk Meta warns of a …

: Medusa ransomware hit over 300 critical infrastructure organizations until February 2025 The Medusa …

: OpenAI Operator Agent Used in Phishing Attack Demo Symantec researchers demonstrated how OpenAI’s …

: Head Mare and Twelve: Joint attacks on Russian entities | Securelist Head Mare and Twelve, two …

: CISA Defunds Threat-Sharing Hubs for States and Elections The Cybersecurity and Infrastructure …

: Zut Alors! Surge in Cyberattacks Targeting France in 2024 Cyberattacks targeting France surged in …

: How effective is the EDPB website auditing tool for checking GDPR compliance? - BH Consulting The …

: What Is SCM (Security Configuration Management)? | Tripwire Security Configuration Management (SCM) …

: CISA and Partners Release Cybersecurity Advisory on Medusa Ransomware | CISA CISA, FBI, and MS-ISAC …

: Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack A coordinated …

: NIST selects HQC as backup algorithm for post-quantum encryption - Help Net Security NIST has …

: China, Russia, Iran, and North Korea Intelligence Sharing - Schneier on Security Former CISA …

: Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution Multiple …

: Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution Multiple …

: Google unveils Gemma 3: Open-source AI models that run on a single GPU By Investing.com Google has …

: Tata Technologies Data Breach Leaks 1.4TB of Sensitive Data - TechNadu Hunters International, a …

: Trump nominates Sean Plankey to run top US cyber agency therecord.media/plankey-n… Sean …

: Internet shutdowns at record high in Africa as access ‘weaponised’ …

: AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution …

: Previously unidentified botnet infects unpatched TP-Link Archer home routers …

: New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects …

: Critical PHP RCE vulnerability mass exploited in new attacks …

: New Ballista Botnet spreads using TP-Link flaw. Is it an Italian job? Cato CTRL researchers have …

: How Generative AI Can Strengthen Corporate Cybersecurity - Cybersecurity Insiders Generative AI …

: Apple released a security update Tuesday addressing CVE-2025-24201, a zero-day WebKit vulnerability …

: Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks Apple released …

: Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks Apple released …

: Deepfake CEO Video Rocks YouTube YouTube has warned about fraudulent AI-generated deepfake videos of …

: March Patch Tuesday warnings: Act fast to plug zero day holes in Windows, VMware | CSO Online …

: Lazarus Group Hid Backdoor in Fake npm Packages in Latest Attack North Korean state-backed Lazarus …

: Lookout Discovers North Korean APT37 Mobile Spyware | Threat Intel Lookout researchers have …

: Google Enhances Data Privacy with Confidential Federated Analytics - InfoQ Google has announced …

: Apple fixed the third actively exploited zero-day of 2025 Apple has released emergency security …

: Whopping Number of Microsoft Zero-Days Under Attack Microsoft’s March 2025 Patch Tuesday includes …

: Microsoft security advisory – March 2025 monthly rollup (AV25–130) - Canadian Centre for Cyber …

: Silk Typhoon Hackers Indicted - Schneier on Security The US Department of Justice has indicted 12 …

: SAP security advisory – March 2025 monthly rollup (AV25-126) - Canadian Centre for Cyber Security …

: Top 20 Free APIs for Cybersecurity: Threat Intelligence, Malware Analysis & More - SOCRadar® …

: SAP Patches High-Severity Vulnerabilities in Commerce, NetWeaver - SecurityWeek SAP has released 21 …

: Edimax Says No Patches Coming for Zero-Day Exploited by Botnets - SecurityWeek Edimax has confirmed …

: Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices A new botnet …

: GitGuardian Report: 70% of Leaked Secrets Remain Active for Two Years, Urging Immediate Remediation …

: Steganography Explained: How XWorm Hides Inside Images The Hacker News reports on a sophisticated …

: X users report login troubles as Dark Storm claims cyberattack | Malwarebytes X (formerly Twitter) …

: Almost 1 million business and home PCs compromised after users visited illegal streaming sites: …

: APT ‘Blind Eagle’ Targets Colombian Government The Dark Reading article reports that the …

: Dell security advisory (AV25-121) - Canadian Centre for Cyber Security The Canadian Centre for Cyber …

: Red Hat security advisory (AV25-120) - Canadian Centre for Cyber Security The Canadian Centre for …

: Over 1000 Malicious Packages Found Exploiting Open-Source Platforms Fortinet’s FortiGuard Labs has …

: Ubuntu security advisory (AV25-118) - Canadian Centre for Cyber Security The Canadian Centre for …

: Global expansion in Generative AI: a year of growth, newcomers, and attacks Cloudflare’s latest …

: Global expansion in Generative AI: a year of growth, newcomers, and attacks Cloudflare’s latest …

: Could The Belsen Group Be Associated With ZeroSevenGroup? • KELA Cyber Threat Intelligence KELA …

: Blind Eagle: …And Justice for All - Check Point Research Blind Eagle, an APT group, has been …

: Critical PHP Vulnerability Under Mass Exploitation - SecurityWeek A critical vulnerability in PHP …

: North Korea-linked APT Moonstone used Qilin ransomware in limited attacks Microsoft researchers …

: What do organisations need to disclose to individuals about AI and automated decisions? | Data …

: 560,000 People Impacted Across Four Healthcare Data Breaches - SecurityWeek Four healthcare …

: GitHub-Hosted Malware Infects 1M Windows Users A malvertising campaign, originating from illegal …

: Swiss critical sector faces new 24-hour cyberattack reporting rule …

: Musk blames X outages on alleged ‘massive’ cyberattack therecord.media/cyberatta… The global …

: Fortinet Identifies Malicious Packages in the Wild: Insights and Trends from November 2024 Onward …

: SideWinder targets the maritime and nuclear sectors with an updated toolset …

: North Korean hackers cash out hundreds of millions from $1.5bn ByBit hack …

: The Evolution and Challenges of Know Your Customer (KYC) in Combating Crypto Money Laundering Introduction Know Your Customer (KYC) protocols are critical to modern financial security. Initially …

: Generative AI Fuels a New Wave of Cyber Threats Generative AI, developed initially to streamline content creation and automation, is increasingly …

: Airlines Tighten Restrictions on Power Bank Use During Flights Travellers should prepare for significant changes in how they power their devices during air travel …

: Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying …

: The digital illusion: millennials and the risks of online trust www.kaspersky.com/blog/the-… …

: Gen Z facing increased cybersecurity threats www.pandasecurity.com/en/mediac… In an era where …

: UK quietly scrubs encryption advice from government websites techcrunch.com/2025/03/0… The …

: YouTubers extorted via copyright strikes to spread malware …

: A Brand-New Botnet Is Delivering Record-Size DDoS Attacks www.wired.com/story/ele… A newly …

: Majority of Orgs Hit by AI Cyber-Attacks as Detection Lags - Infosecurity Magazine A new report by …

: Seqrite’s cyber threat report 2025: Highlights 369.01 million malware detections, ET CISO Seqrite, …

: Up to $2 Million Reward Offers Each for Information Leading to Arrests and/or Convictions of …

: Businesses set to fail if cyber resilience not most important thing says Splunk strategy head | …

: Communications Security Establishment Canada releases 2025 update to report on cyber threats to …

: Polish supervisory authority publishes updated guide on personal data protection breaches - A&O …

: DATA BREACH ALERT: Edelson Lechtzin LLP Is Investigating Edelson Lechtzin LLP is investigating a …

: Bank of America Sounds Alarm on Massive Data Breach, Millions Could Be Affected - Is Your Account …

: Rubrik discloses server breach, compromise of ‘access information’ | Cybersecurity Dive Rubrik …

: Berkeley Research Group suffers cyber attack, sources say | Insurance Business Canada Berkeley …

: Thousands of public school workers impacted by cyberattack on retirement plan administrator | The …

: Federman & Sherwood Investigates Rivers Casino Federman & Sherwood is investigating Rivers …

: Feds seized $23 million in crypto stolen using keys from LastPass breaches U.S. authorities seized …

: SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools A new mass malware …

: Global Crackdown Slashes Cobalt Strike Availability By 80% A global effort led by Fortra, Microsoft, …

: NTT suffered a data breach that impacted 18,000 companies NTT Communications Corporation (NTT Com) …

: Developer guilty of using kill switch to sabotage employer’s systems Software developer Davis …

: Akira ransomware gang used unsecured webcam to bypass EDR The Akira ransomware gang bypassed EDR by …

: New Chirp tool uses audio tones to transfer data between devices A new open-source tool, Chirp, …

: Malicious GitHub repositories linked to nearly 1M infections • The Register Microsoft discovered a …

: WestJet Updates Carry-On Baggage Policy Starting May 6, 2025 WestJet is changing its carry-on baggage policy starting May 6, 2025, to match the size limits used …

: Thousands of Israeli Gun Owners Exposed in Iranian Hack-and-leak Operation - National Security & …

: Thousands of Israeli Gun Owners Exposed in Iranian Hack-and-leak Operation - National Security & …

: Undocumented “backdoor” found in Bluetooth chip used by a billion devices An …

: ‘EncryptHub’ OPSEC Failures Reveal TTPs & Big Plans Researchers from Outpost24 …

: Chinese APT Silk Typhoon exploits IT supply chain weaknesses for initial access | CSO Online The …

: Elastic patches critical Kibana flaw allowing code execution Elastic fixed a critical vulnerability …

: youtube.com/watch CBC Marketplace’s latest investigation “Gaming the System” …

: Massive botnet that appeared overnight is delivering record-size DDoSes - Ars Technica A new botnet, …

: ‘Five Eyes alliance’ crumbling after UK, Aus, NZ and Canada give US cold shoulder | News …

: Layoff Report Shows The DOGE’s Bite Layoffs in February tripled from January, driven by mass …

: Breach Roundup: US Sanctions Iran-Based Nemesis Admin The U.S. sanctioned Behrouz Parsarad, an …

: Ransomware threat mailed in letters to business owners | Malwarebytes Business owners across the US …

: Credential Leaks, Enterprise Risk, and IOCs: How Contextual Intelligence Strengthens Your Defenses | …

: House Passes Bill Requiring Federal Contractors to Implement Vulnerability Disclosure Policies - …

: Top 10 AI Deepfake Detection Tools to Combat Digital Deception in 2025 - SOCRadar® Cyber …

: Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution Elastic …

: EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing The …

: Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom The Medusa ransomware group, …

: FBI Warns of Data Extortion Scam Targeting Corporate Executives | CISA The FBI warns of a data …

: Digg is relaunching after sale to Kevin Rose and Alexis Ohanian Digg, once a prominent social news …

: Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud Google is rolling out …

: Tripwire Patch Priority Index for February 2025 | Tripwire Tripwire’s February 2025 Patch Priority …

: Two Venezuelans Arrested in US for ATM Jackpotting - SecurityWeek Two Venezuelan nationals, David …

: Ransomware Group Claims Attack on Tata Technologies - SecurityWeek Ransomware group Hunters …

: Prohibited practices under the AI Act: Answered and unanswered questions in the Commission’s …

: YouTube Premium Lite: Ad-Free Viewing for $7.99/Month - YouTube Blog YouTube Premium Lite, a new, …

: Scammers take over social media - Help Net Security Cyber threats on social media reached …

: Polyglot files used to spread new backdoor | CSO Online A threat actor is using polyglot files in a …

: VMware fixed three actively exploited zero-days in ESX products Broadcom released security updates …

: Jamf Buys Identity Automation, Expands IAM Capabilities Jamf, an MDM provider, is acquiring Identity …

: New polyglot malware hits aviation, satellite communication firms …

: New Microsoft 365 outage impacts Teams, causes call failures Microsoft is investigating a new outage …

: Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates Threat actors deploying …

: Mozilla security advisory (AV25-115) - Canadian Centre for Cyber Security

: CISA issues warning against Qilin ransomware group - Cybersecurity Insiders CISA clarified that the …

: VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches Broadcom released …

: Japanese cancer hospital confirms breach; Qilin gang claims responsibility – DataBreaches.Net The …

: New Chinese Zhong Stealer Infects Fintech via Customer Support A new Chinese malware threat, Zhong …

: How New AI Agents Will Transform Credential Stuffing Attacks Credential stuffing attacks, fueled by …

: Top 10 Free Vulnerability Intelligence Platforms - SOCRadar® Cyber Intelligence Inc. This article …

: Suspected Iranian Hackers Used Compromised Indian Firm’s Email to Target U.A.E. Aviation …

: Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers A mass …

: Open Source Security Risks Continue To Rise The 2025 Open Source Security and Risk Analysis (OSSRA) …

: Google’s March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities …

: The New Ransomware Groups Shaking Up 2025 - The Cyber Post In 2024, ransomware attacks surged, with …

: Ubuntu security advisory (AV25-110) - Canadian Centre for Cyber Security

: IBM security advisory (AV25-109) - Canadian Centre for Cyber Security

: Dell security advisory (AV25-108) - Canadian Centre for Cyber Security

: Judges Are Fed up With Lawyers Using AI That Hallucinate Court Cases Judges are increasingly …

: Nearly 12,000 API keys and passwords found in AI training dataset …

: Microsoft unveils finalized EU Data Boundary as European doubt over US grows …

: Polish space agency confirms cyberattack www.theregister.com/2025/03/0… The Polish Space …

: CISA tags Windows, Cisco vulnerabilities as actively exploited …

: LatAm Orgs Face 40% More Attacks Than Global Average Latin America faces a significant cyber threat, …

: Vulnerability Summary for the Week of February 24, 2025 | CISA The CISA Vulnerability Bulletin …

: Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites A new phishing …

: TikTok: Major investigation launched into platform’s use of children’s data | Malwarebytes The …

: Nearly 1M records related to personal property were exposed | Security Magazine Nearly a million …

: Mexico resort illnesses: More Canadians come forward Canadians are reporting illness after staying …

: Darknet (TOR Network) Security Executive Summary – 5-Day Comprehensive Report Darknet Marketplace & Forum Activity Incident Title: Rising Activity on Russian Market and …

: Darknet markets see BTC inflow drop to $2B as focus shifts to Monero (XMR) | CryptoTvplus - The …

: New malware exploits fake updates to steal data - CyberGuy A new malware strain called FrigidStealer …

: Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal | Trend Micro (US) …

: Kenya’s Cyber Threat Landscape: The Rising Risks and How to Stay Ahead - SOCRadar® Cyber …

: Geopolitics, AI, and generational shifts: Three key trends reshaping the future of cyber leadership …

: Exercise Cyber Marvel brings together 1,000 specialists to train on cyber battlefield Exercise Cyber …

: Zapier breach, caused by a 2FA error, is a lesson for others - Techzine Global A Zapier repository …

: Cyber attacks & data breaches in February 2025 Cyber attacks and data breaches continue to …

: Lynch Carpenter Investigates Claims in Zacks Investment Lynch Carpenter is investigating claims …

: Info accessed in Rainbow board data breach ‘deleted and has not been shared’ - Sudbury News Rainbow …

: Pros and Cons of Using AI in Cybersecurity - Cybersecurity Insiders AI in cybersecurity offers …

: Ransomware access playbook: What Black Basta’s leaked logs reveal | CSO Online Black Basta, a …

: Cleveland Municipal Court Remains Closed After Cyber Event  Cleveland Municipal Court remains closed …

: Cleveland Municipal Court Remains Closed After Cyber Event  Cleveland Municipal Court remains closed …

: The mobile threat landscape in 2024 | Securelist In 2024, Kaspersky products blocked over 33 million …

: Latest Dark Web Findings: Discord Credentials, Orange Customer Records, and Australian Bank Data - …

: Indian Stock Broker Angel One Discloses Data Breach - SecurityWeek Indian stock brokerage firm Angel …

: As Trump warms to Putin, U.S. halts offensive cyber operations against Moscow …

: Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks …

: Massive security gaps discovered in building access systems | heise online A study by Modat, an IT …

: Qilin ransomware gang claimed responsibility for the Lee Enterprises attack The Qilin ransomware …

: US Cyber Command reportedly pauses attacks on Russia • The Register US Cyber Command has reportedly …

: To Identify Suspect in Idaho Killings, F.B.I. Used Restricted Consumer DNA Data - The New York Times …

: Beware of Chinese-language Robocall Scams Targeting Canadians A growing number of Canadians are receiving fraudulent robocalls in Mandarin, falsely claiming that …

: Wireshark • Wireshark 4.4.5 Release Notes

: Researchers Make Scary Discovery About Apple’s Find My Network Researchers at George Mason …

: German government denies foreign election interference was successful …

: UK silence over Apple ‘back door’ is unsustainable and unjustifiable, say experts …

: Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains …

: New White House Plan to Track Spending Raises Cyber Risks www.databreachtoday.com/new-white… …

: Top 10 Most Probable Ways a Company Can Be Hacked www.darkreading.com/vulnerabi… The Top 10 …

: AI-Fueled Tax Scams on the Rise www.darkreading.com/cyberatta… As AI-driven scams surge this …

: Police arrests suspects tied to AI-generated CSAM distribution ring …

: Vo1d malware botnet grows to 1.6 million Android TVs worldwide …

: Serbian police used Cellebrite zero-day hack to unlock Android phones …

: How to Prove to Auditors that You’ve Remediated CVEs in Kubernetes - Security Boulevard …

: 4 ways to get your business ready for the agentic AI revolution | ZDNET AI agents are poised to …

: Toronto Zoo says patrons' transaction data leaked on dark web in 2024 cyberattack | CBC News The …

: Microsoft disrupted a global cybercrime ring abusing Azure OpenAI Service Microsoft exposed a global …

: The New Face of Executive Protection: Why Digital and Physical Security Can No Longer Stand Alone - …

: IBM closes $6.4B HashiCorp acquisition

: Tokyo Government To Introduce Four-Day Workweek Next April Tokyo will introduce a four-day workweek …

: Marc Benioff says Salesforce will hire no engineers this year Salesforce, led by CEO Marc Benioff, …

: Cloudflare’s 2024 Transparency Reports - now live with new data and a new format Cloudflare’s 2024 …

: Belgium Investigating Intelligence Agency Hack by China The Belgian government is investigating a …

: Cleveland Court Remains Closed After Cyber Incident Cleveland Municipal Court has been closed for …

: Federal government announces latest National Cyber Security Strategy | Data Protection Report The …

: Millions of Avast antivirus software customers are getting a refund. Here’s why. - CBS News …

: Apple might be forced to disable a key iPhone privacy feature in France - 9to5Mac French authorities …

: 3 Things to Know About AI Data Poisoning Data poisoning, a cyberattack that corrupts AI training …

: Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations A new cyber …

: Chinese APT Uses VPN Bug to Exploit Worldwide OT Orgs Chinese cybercriminals, likely APT41, …

: Beware of Fake Cybersecurity Audits: Cybercriminals Use Scams to Breach Corporate Systems | Tripwire …

: Gen AI Accelerates Triage of Software Vulnerabilities Generative AI (GenAI) is proving effective in …

: Hackers Can Crack Into Car Cameras in Minutes Flat Researchers discovered a vulnerability in over …

: The Hidden Cost of Compliance: When Regulations Weaken Security - SecurityWeek Regulatory …

: Angry Likho APT Resurfaces with Lumma Stealer Attacks Against Russia Angry Likho APT, a cyber …

: 89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New …

: New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades Cybersecurity researchers …

: Nuna Baby Essentials Sends Data Breach Following Recent Cybersecurity Incident | Console and …

: RxSight Files Notice of Data Breach Following Compromised Employee Email Account | Console and …

: Levi & Korsinsky, LLP Investigates ArdyssLife Data Breach ArdyssLife suffered a data breach …

: Cardiology of Virginia Files Notice of Recent Data Breach with Federal Regulators | Console and …

: Bluesight’s 2025 Breach Barometer Report Reveals Surge in Healthcare Data Breaches Bluesight’s …

: Medical Billing Specialists Announces Data Breach Affecting an Unknown Number of Consumers …

: Hacker responsible for international data breaches arrested in joint Singapore-Thailand operation - …

: Freddie Mac Data Breach Compromises an Unknown Number of Social Security Numbers | Console and …

: Connally Memorial Medical Center Notifies Patients of 2024 Data Breach | Console and Associates, …

: Via Credit Union (ViaCU) Data Breach Exposes Personal Murphy Law Firm is investigating a data breach …

: Christensen Group Insurance Begins Sending Data Breach Letters Following 2022 Cyberattack | Console …

: Yes! Communities Sends Data Breach Letters Related to December 2024 Incident | Console and …

: DecisionFi Sends Data Breach Letters Following January 2025 Cybersecurity Incident | Console and …

: Federman & Sherwood Investigates Oral Roberts University Federman & Sherwood is …

: How hackers ruined a Disney employee’s life after he downloaded AI photo tool | The Independent A …

: Data of 1.5 mil. GS Shop customers breached - The Korea Times GS Retail announced a data breach …

: Federman & Sherwood Investigates Via Credit Union for Data Federman & Sherwood Investigates …

: 2024 phishing trends tell us what to expect in 2025 - Help Net Security Phishing remains the most …

: Cisco Patches Vulnerabilities in Nexus Switches - SecurityWeek Cisco has patched several …

: Critical Microsoft Partner Center vulnerability under attack, CISA warns | CSO Online A critical …

: Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and …

: Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Global Organizations A suspected Chinese …

: DragonForce Ransomware Group is Targeting Saudi Arabia DragonForce ransomware is targeting Saudi …

: CrowdStrike 2025 Global Threat Report: Beware the Enterprising Adversary The CrowdStrike 2025 Global …

: North Korea was responsible for $1.5 billion ByBit hack, FBI says The FBI announced North Korea was …

: PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices A new …

: LockBit ransomware gang sends a warning to FBI Director Kash Patel - Cybersecurity Insiders The …

: GitLab security advisory (AV25-106) - Canadian Centre for Cyber Security

: Silent breaches and supply chain exploits: 5 lessons for cyber-teams Silent breaches, exploiting …

: Building a security-minded development team: DevSecOps tools and SDLC best practices - Security …

: EncryptHub breaches 618 orgs to deploy infostealers, ransomware EncryptHub, also known as Larva-208, …

: Cellebrite cuts off Serbia over abuse of phone-cracking software against civil society | The Record …

: CVE-2025-20119 Cisco Application Policy Infrastructure Controller race condition …

: Qualcomm doubles Android security patch support to 8 years • The Register Qualcomm will provide …

: Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites A cross-site scripting …

: The Adversarial Misuse of AI: How Threat Actors Are Leveraging AI for Cyber Operations - SOCRadar® …

: The Adversarial Misuse of AI: How Threat Actors Are Leveraging AI for Cyber Operations - SOCRadar® …

: Signal Threatens to Exit Sweden Over Government’s Backdoor Proposal Sweden’s proposed …

: An iCloud Backdoor Would Make Our Phones Less Safe - Schneier on Security The UK government’s demand …

: 23 Billion Rows of Stolen Records: What You Need to Know? - SOCRadar® Cyber Intelligence Inc. …

: Ghostwriter Campaign Targets Ukrainian Government And Belarusian Opposition  SentinelLABS …

: SOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent The evolution of the …

: Three Password Cracking Techniques and How to Defend Against Them This article discusses three …

: CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries CERT-UA warns of …

: Chinese hackers got into Republican email system during campaign and spied for months before being …

: Orange Group confirms breach after hacker leaks company documents Orange Group, a French …

: Background check provider data breach affects 3 million people who may not have heard of the company …

: The Top 10 Dark Web Telegram Chat Groups and Channels - SOCRadar® Cyber Intelligence Inc. Telegram, …

: How Skills-Based Hiring Can Help Combat Cybersecurity Skills Shortages - Cybersecurity Insiders The …

: Leader of North Korean Hackers Sanctioned by EU - SecurityWeek The European Union has sanctioned Lee …

: Silver Fox APT Hides ValleyRAT in Trojanized Medical Imaging Software The Silver Fox APT group is …

: Signal lämnar Sverige om regeringens förslag på datalagring klubbas | SVT Nyheter Signal will leave …

: Anobis: A New Ransomware Threat • KELA Cyber Threat Intelligence A new ransomware group, Anubis, has …

: 5 Active Malware Campaigns in Q1 2025 Five notable malware families, including NetSupport RAT, Lynx …

: Security Alert: Critical Flaws in MITRE Caldera and Parallels Desktop (CVE-2025-27364, …

: Predatory app downloaded 100,000 times from Google Play Store steals data, uses it for blackmail | …

: Key Updates in the OWASP Top 10 List for LLMs 2025 | Tripwire The OWASP Top 10 List for LLMs 2025 …

: How to Achieve Compliance with NIS Directive | Tripwire The NIS2 Directive, replacing the original …

: 2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT A …

: Russia warns financial sector organizations of IT service provider LANIT compromise Russia’s NKTsKI …

: Google to replace SMS authentication with QR Codes for enhanced Mobile Security - Cybersecurity …

: Avoiding vendor lock-in when using managed cloud security services - Help Net Security Marina Segal, …

: FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services FatalRAT malware is …

: Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA CISA added two …

: Auto-Color: An Emerging and Evasive Linux Backdoor Palo Alto Networks researchers discovered a new …

: Zero-Day Bug Pops Up in Parallels Desktop for Mac A critical patch bypass vulnerability in Parallels …

: Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign …

: China’s latest surveillance tech: A spy camera so advanced it can capture faces from 100 km away - …

: Dell security advisory (AV25-103) - Canadian Centre for Cyber Security Dell published security …

: Hackers Use Google Docs and Steam to Spread ACRStealer Infostealer ACRStealer, a new …

: Surveillance pricing is “evil and sinister,” explains Justin Kloczko (Lock and Code …

: Security Roundup February 2025 - BH Consulting Law enforcement agencies made significant strides in …

: How APT Naming Conventions Make Us Less Safe Advanced persistent threat (APT) naming conventions, …

: IBM security advisory (AV25-102) - Canadian Centre for Cyber Security IBM published security …

: Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign - Check Point Research …

: Talos: No Cisco Zero Days Used in Salt Typhoon Telecom Hacks Chinese nation-state hackers, known as …

: Massive botnet hits Microsoft 365 accounts - Help Net Security A massive botnet of over 130,000 …

: Seraph Stealer Malware Hits the Market, Black Basta’s Internal Chaos, New Data Leak Claims - …

: Australia Bans Kaspersky Software Over National Security and Espionage Concerns Australia bans …

: Making Sense of Australia’s New Cybersecurity Legislation | Tripwire Australia’s Cyber Security Act …

: Fake GitHub projects distribute stealers in GitVenom campaign | Securelist The GitVenom campaign …

: Cybercrooks Exploit URL Manipulation In Sophisticated Phishing Scam A new phishing campaign, active …

: SpyLend Android malware downloaded 100,000 times from Google Play …

: Google Chrome disables uBlock Origin for some in Manifest v3 rollout …

: Leaked Files Tie Chinese Cybersecurity Firm to Government Censorship hackread.com/leaked-fi… …

: Notorious crooks broke into a company network in 48 minutes. Here’s how. …

: What the Bybit Hack Means for Crypto Security and the Future of Multisig Protection …

: Beware: PayPal “New Address” feature abused to send phishing emails …

: How Password Managers Enhance Security in Corporate Networks - Cybersecurity Insiders Password …

: Confluence Exploit Leads to LockBit Ransomware – The DFIR Report A Windows Confluence server was …

: Labour will use AI to snoop on social media The UK government is developing an AI program to monitor …

: Data leak at Thermomix: data from 1 million German users on the darknet | heise online A data leak …

: Apple Withdraws Strong Encryption Feature for All UK Users Apple has deactivated Advanced Data …

: Feds Fine Eyeglass Retailer $1.5M for HIPAA Lapses in Hacks Warby Parker was fined $1.5 million by …

: Signal security advisory (AV25-099) - Canadian Centre for Cyber Security Signal released updates to …

: FBI and CISA warn about continuing attacks by Chinese ransomware group Ghost | CSO Online The FBI …

: OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns OpenAI banned several …

: Google Unveils New Quantum-Safe Digital Signatures Google has adopted quantum-safe digital …

: Clinical Research Firm Exposes 1.6 Million US Medical Survey Records A misconfigured database …

: Hackers Claim Data Breach at Bulgaria’s Supreme Administrative Court – DataBreaches.Net RansomHouse …

: Leaked Files Tie Chinese Cybersecurity Firm to Government Censorship A data leak from TopSec, a …

: Crypto exchange Bybit says it was hacked and lost around $1.4B | TechCrunch Crypto exchange Bybit …

: Health Administrators Sued Over Email Hack Leaking Private Data Patients of Humboldt Independent …

: In Other News: Black Basta Chats Leaked, New SEC Cyber Unit, DOGE Site Hacked - SecurityWeek This …

: Huge data leak exposes 14 million customer shipping records | Fox News Hipshipper, a shipping …

: Sudbury board reveals extent of cyber attack

: Moscow Isn’t Racing to Let Western Companies Back in - Business Insider Russian officials are …

: The Complete Guide to OSINT for Executive Protection | Flashpoint Executive protection faces complex …

: Beverly Hills Plastic Surgeon Sued for Not Telling Patients Hackers Stole Their Nude Photos Beverly …

: Weathering the storm: In the midst of a Typhoon Cisco Talos is monitoring a sophisticated threat …

: Chinese APT Exploits Cisco IOS XE Vulnerabilities (CVE-2023-20198 & CVE-2023-20273) in Global …

: Chinese APT Exploits Cisco IOS XE Vulnerabilities (CVE-2023-20198 & CVE-2023-20273) in Global …

: New Report: State of Secure Network Access in 2025 - Cybersecurity Insiders The 2025 Secure Network …

: How to Backdoor Large Language Models - by Shrivu Shankar A backdoored LLM, “BadSeek,” was created …

: China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware A China-linked …

: PCI DSS 4.0 Mandates DMARC By 31st March 2025 The PCI DSS 4.0 mandate requires DMARC implementation …

: DeceptiveDevelopment targets freelance developers DeceptiveDevelopment, a North Korea-aligned …

: US Army soldier linked to Snowflake extortion rampage admits breaking the law …

: Updated Shadowpad Malware Leads to Ransomware Deployment www.trendmicro.com/en_us/res… In …

: Phishing attack hides JavaScript using invisible Unicode trick …

: CISA and FBI: Ghost ransomware breached orgs in 70 countries …

: Weathering the storm: In the midst of a Typhoon blog.talosintelligence.com/salt-typh… Cisco …

: HP adds 15 minutes waiting time for telephone support calls • The Register HP Inc. is implementing a …

: South Korea confirms DeepSeek sent user data to ByteDance - Cyber Daily South Korea’s data …

: UK healthcare giant HCRG confirms hack after ransomware gang claims theft of sensitive data | …

: Managed healthcare defense contractor to pay $11 million over alleged cyber failings …

: Cracked Garry’s Mod, BeamNG.drive games infect gamers with miners …

: Ecuador’s legislature says hackers attempted to access confidential information …

: How Phished Data Turns into Apple & Google Wallets krebsonsecurity.com/2025/02/h… Carding …

: Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger …

: Stately Taurus Activity in Southeast Asia Links to Bookworm Malware Stately Taurus, a threat actor, …

: ‘Darcula’ Phishing Kit Can Now Impersonate Any Brand Darcula, a phishing-as-a-service …

: Happy Information Governance Day | Data Protection Report Information governance is becoming …

: Inside A LockBit Ransomware Attack: A Firsthand Account Of Financial And Security Fallout A company …

: Understanding OWASP’s Top 10 list of non-human identity critical risks | CSO Online OWASP’s new Top …

: Ghost Ransomware targeting Obsolete IT Systems - Cybersecurity Insiders Ghost Ransomware, active …

: Darktrace Report Highlights The Growing Power Of MaaS, Sneaky Evasion Tactics Darktrace’s 2024 …

: 300% increase in endpoint malware detections - Help Net Security Endpoint malware detections …

: thehackernews.com/2025/02/m… Microsoft has addressed two critical vulnerabilities: …

: www.darkreading.com/ics-ot-se… Mike Burgess, director-general of ASIO, warns of …

: Google’s new policy tracks all your devices with no opt-out | Digital Trends Google’s recent …

: GitHub - alexoslabs2/slack-leak: Slack Leak scans all Slack public and private channels for …

: VC Firm Insight Partners Hacked - SecurityWeek Venture capital firm Insight Partners was hacked …

: US agencies and defense contractors infected with infostealer malware | Security Magazine US …

: US Coast Guard hack leads to paycheck delays, forces personnel systems offline | Cybernews A data …

: Australian IVF clinic is HACKED sparking fears personal information of thousands of patients has …

: Hydro customers see personal information leaked due to hacking - Village Report Burlington Hydro …

: US utility giant says MOVEit hack exposed stolen data | TechRadar PLL Electric Utilities confirms …

: Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection …

: Cyber Security in Estonia 2025 www.ria.ee/en/cyber-… The National Cyber Security Centre of …

: Indian authorities seize loot from collapsed BitConnect crypto scam …

: Cyberattack likely to have ‘material impact’ on media giant Lee Enterprises’ bottom line …

: Luxembourg: Restricted access to the Register of Beneficial Owners — a shift toward confidentiality …

: How Russian Hackers Are Exploiting Signal ‘Linked Devices’ Feature for Real-Time Spying …

: Malaysia’s Data Sharing Bill 2024: Pioneering Secure and Efficient Government Collaboration | …

: Attackers are chaining flaws to breach Palo Alto Networks firewalls - Help Net Security Exploitation …

: North Korea’s Kimsuky Attacks Rivals' Trusted Platforms North Korean threat group Kimsuky, …

: Hard drives containing sensitive medical data found in flea market | Malwarebytes Hard drives …

: Mozilla security advisory (AV25-095) - Canadian Centre for Cyber Security

: BlackLock ransomware onslaught: What to expect and how to fight it - Help Net Security BlackLock, a …

: Citrix security advisory (AV25-094) - Canadian Centre for Cyber Security

: New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now Two vulnerabilities in …

: Juniper Networks security advisory (AV25-093) - Canadian Centre for Cyber Security

: Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks Chinese …

: Ransomware attack hits 5 Michigan casinos, shuts them down | Security Magazine Five Michigan casinos …

: Open-sourcing R1 1776 DeepSeek-R1, a powerful language model, is limited by its refusal to respond …

: MicroStrategy Acquires Additional 7,633 BTC at $97,255 Each | Flash News Detail | Blockchain.News …

: Thomson Reuters wins AI copyright ruling over training data • The Register Thomson Reuters has won a …

: China builds ‘planetary defence’ team as concerns grow over 2024 YR4 asteroid | South China Morning …

: Saudi’s NEOM, DataVolt to Build $5 Billion Net Zero AI Data Center - ESG Today NEOM and DataVolt …

: New digital protections for kids, teens and parents Google is enhancing digital protections for kids …

: X is blocking links to secure messaging platform Signal | Digital Trends X, owned by Elon Musk, is …

: Mistral Saba | Mistral AI Mistral AI introduces Mistral Saba, a 24B parameter model tailored to …

: New FrigidStealer Malware Targets macOS Users via Fake Browser Updates A new malware campaign, …

: Palo Alto Networks Confirms Exploitation of Firewall Vulnerability - SecurityWeek Palo Alto Networks …

: Got a Microsoft Teams invite? Storm-2372 Gang Exploit Device Codes in Global Phishing Attacks | …

: Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign Winnti, a China-linked …

: Alarming Dark Web Leak: B1ack’s Stash Releases 4 Million Stolen Credit Cards for Free - …

: The Biggest Cybersecurity Threats To Watch Out For In 2025 In 2025, cybersecurity threats will …

: 2025 ZeroFox Forecast: Dark Web, Ransomware, Gen AI & Beyond ZeroFox’s 2025 Key Forecasts Report …

: AI Data Breach will surge by 2027 because of misuse of GenAI - Cybersecurity Insiders Gartner …

: FTC settlement requires disconnection of hardware from all no longer supported software | Data …

: Chase will soon block Zelle payments to sellers on social media JPMorgan Chase Bank will soon block …

: OpenAI to launch GPT-5 in a matter of months, GPT-4.5 within weeks - SiliconANGLE OpenAI plans to …

: Baidu to make latest Ernie AI model open-source as competition heats up | World News - Business …

: Anthropic prepares new Claude hybrid LLMs with reasoning capability Anthropic is preparing to …

: Sam Altman: “GPT-4.5 to be Released Within Weeks… Integrating General and …

: Russian drone attack damages Chernobyl nuclear plant’s protective shield, no radiation leak …

: OpenAI Removes Certain ChatGPT Content Warning Policy to Enhance User Experience OpenAI removes …

: The Impact Of Artificial Intelligence On Submarine Artificial Intelligence (AI) is expected to …

: Tencent testing DeepSeek to add China’s hottest AI technology to its Weixin super app | South China …

: Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics Microsoft …

: Atlas of Surveillance The EFF has released their atlas of surveillance (for the USA).

: [Control systems] CISA ICS security advisories (AV25-085)

: Ubuntu security advisory (AV25-086)

: Dell security advisory (AV25-087)

: IBM security advisory (AV25-088)

: Akira Ransomware is now targeting legacy servers of defunct companies - Cybersecurity Insiders The …

: ChatGPT Operator: Prompt Injection Exploits & Defenses · Embrace The Red OpenAI’s ChatGPT …

: New FinalDraft Malware Spotted in Espionage Campaign - SecurityWeek A new malware family, PathLoader …

: EagerBee: Advanced Backdoor Attacks on Middle Eastern Governments and ISPs - SOCRadar® Cyber …

: European Union: European Commission releases its Competitiveness Compass - implications for …

: European Union: AI Act provisions applicable from February 2025 - Global Compliance News The AI Act, …

: Singapore: Personal Data Protection Commission clarifies use of National Registration Identity Card …

: 127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police - SecurityWeek Dutch …

: Massive Data Exposure At Mars Hydro Highlights IoT Security Risks A massive data exposure involving …

: Downloads of DeepSeek’s AI Apps Paused in South Korea Over Privacy Concerns - SecurityWeek …

: ESentire Uncovers EarthKapre/RedCurl Attack Targeting Law Firms eSentire’s Threat Response Unit …

: Pro-Russia collective NoName057(16) launched a new wave of DDoS attacks on Italian sites - Security …

: Massive Swiss Medical Leak, Binance Phishing Panel, and WhatsApp Ban Service Found - SOCRadar® Cyber …

: Advanced Ransomware Evasion Techniques in 2025 | Tripwire Ransomware attacks are evolving rapidly, …

: New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations A new Golang-based …

: Ransomware gangs extort victims 17 hours after intrusion on average | CSO Online Ransomware gangs …

: How to evaluate and mitigate risks to the global supply chain | CSO Online Enterprise security …

: Samsung brings in Quantum safe security to its Knox Security Ecosystem - Cybersecurity Insiders …

: RansomHub Never Sleeps Episode 1: The evolution of modern ransomware …

: Crypto Scam Revenue 2024: Pig Butchering Grows Nearly 40% YoY as Fraud Industry Leverages AI and …

: Subnautica 2 Fake Playtest Links Sent as Part of Malicious Campaign …

: New FinalDraft malware abuses Outlook mail service for stealthy comms …

: SanDisk’s new Gen5 SSD offers blistering 14,000 MB/s speeds at just 7W | TechSpot SanDisk …

: Police risk losing society’s trust in fight against cybercrime, warns Europol chief …

: Texas investigating DeepSeek for violating data privacy law therecord.media/texas-inv… Texas …

: Malicious PirateFi game infects Steam users with Vidar malware …

: Hackers exploit authentication bypass in Palo Alto Networks PAN-OS …

: Apple Maps Might Start Showing Ads - MacRumors Apple is considering adding search ads to Apple Maps, …

: Myanmar militia says ready to deport 10,000 cyber scam workers An ethnic militia in Myanmar is …

: Storm-2372 used the device code phishing technique since August 2024 Russia-linked group Storm-2372 …

: Why Private Equity Is Now Kicking the Tires on Trend Micro Trend Micro, the sixth-largest endpoint …

: Breaking News: Massive Vaniitys Leak Shakes The World - Truth or Fiction A massive data leak from a …

: Coast Guard suffers data breach, impacting pay for 1,135 members The U.S. Coast Guard’s payroll …

: DOGE Exposes Once-Secret Government Networks, Making Cyber-Espionage Easier than Ever A surge in …

: I used Sunno AI to create a sea chanty style song about the cyber defenders …

: Reddit will lock some content behind a paywall this year, CEO says - Ars Technica Reddit plans to …

: RansomHub: The New King of Ransomware? Targeted 600 Firms in 2024 RansomHub, a new …

: Stealing Firmware from Over-The-Air Updates Security researchers often need access to closed-source …

: Emulating the Criminal Adversary FIN7 - Part 2 - AttackIQ AttackIQ has released two new attack …

: Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks The Lazarus Group, …

: Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems - …

: ClearML and Nvidia vulns Cisco Talos disclosed vulnerabilities in ClearML and Nvidia. ClearML …

: Arizona police procedures exposed in massive policy database hack • Arizona Mirror Hackers leaked …

: Hacker leaks account data of 12 million Zacks Investment users Zacks Investment Research, an …

: Doxbin Data Breach: Hackers Leak 136K User Records and Blacklist File The notorious doxxing platform …

: “Puppygirl Hacker Polycule” Leaks Over 8,500 Privatized Police Files and Training Manuals | Them The …

: Top 10 Advanced Persistent Threat (APT) Groups That Dominated 2024 - SOCRadar® Cyber Intelligence …

: Threat actors are using legitimate Microsoft feature to compromise M365 accounts - Help Net Security …

: Xerox Versalink C7025 Multifunction Printer: Pass-Back Attack Vulnerabilities (FIXED) | Rapid7 Blog …

: It’s Time to Move Beyond Awareness Training: Why Readiness Is the New Standard for …

: SonicWall Firewall Vulnerability Exploited After PoC Publication - SecurityWeek Threat actors are …

: Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks - SecurityWeek Salt Typhoon, …

: whoAMI name confusion attacks can expose AWS accounts to malicious code execution | CSO Online A …

: Microsoft Study Finds Relying on AI Kills Your Critical Thinking Skills A Microsoft study found that …

: Unpatched Cisco Devices Still Getting Popped by Salt Typhoon A Chinese cyber espionage group, Salt …

: Lawyers Caught Citing AI-Hallucinated Cases Call It a ‘Cautionary Tale’ Attorneys …

: Unusual attack linked to Chinese APT group combines espionage and ransomware | CSO Online A recent …

: North Korean hackers spotted using ClickFix tactic to deliver malware - Help Net Security North …

: China-linked APTs' tool employed in RA World Ransomware attack A November 2024 RA World ransomware …

: DeepSeek Exposes Major Cybersecurity Blind Spot - SecurityWeek DeepSeek, a new Chinese AI company, …

: CVE-2025-1094: PostgreSQL psql SQL injection (FIXED) | Rapid7 Blog Rapid7 discovered a high-severity …

: Astaroth Phishing Kit Bypasses 2FA to Hijack Gmail and Microsoft Accounts A new phishing kit, …

: North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks A North Korean …

: Dark Web Profile: Fog Ransomware - SOCRadar® Cyber Intelligence Inc. Fog Ransomware, first detected …

: Hackers are targeting your password manager app | Mashable Cyberattacks on password managers and …

: Watergate Hotel hit with data breach - WTOP News The Watergate Hotel in Washington, D.C., …

: Samoa warns of APT40 hackers targeting organizations in Blue Pacific region, urges immediate action …

: Ransomware gangs shifting tactics to evade enterprise defenses | Cybersecurity Dive Ransomware gangs …

: Michigan casino chain forced to shut down after ransomware attack Kewadin Casinos in Michigan’s …

: Scams targeting lovers or the lovelorn www.kaspersky.com/blog/tech… If you’re still under the …

: Hacker who hijacked SEC’s X account pleads guilty, faces maximum five-year sentence …

: Google fixes flaw that could unmask YouTube users' email addresses …

: Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability …

: DPRK hackers dupe targets into typing PowerShell commands as admin …

: Ransomware isn’t always about the money: Government spies have objectives, too …

: Cybercrime: A Multifaceted National Security Threat cloud.google.com/blog/topi… Cybercrime …

: Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software Palo Alto Networks has …

: FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux A new espionage …

: Sarcoma ransomware gang claims the theft of sensitive data from PCB maker Unimicron Sarcoma …

: 24% of vulnerabilities are abused before a patch is available | CSO Online Vulnerabilities are being …

: Russia-Linked Seashell Blizzard Intensifies Cyber Operations Against Critical Sectors Seashell …

: What security teams need to know about the coming demise of old Microsoft servers | CSO Online …

: The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance - Help …

: Over 3 million Fortune 500 employee accounts compromised since 2022 - Help Net Security Over three …

: Did You Download This Steam Game? Sorry, It’s Windows Malware | PCMag A hacker published a …

: The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation | …

: Sophos lays off 6% of staff after Secureworks takeover • The Register Sophos, following its …

: Microsoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries A subgroup …

: Palo Alto Networks security advisory (AV25-081) - Canadian Centre for Cyber Security

: Massive 1.17TB Data Leak Exposes Billions of IoT Grow Light Records A massive data leak exposed 2.7 …

: Reflected XSS In Main Search, WAF+Sanitizer Bypass Using 2 Reflections | by Renwa | Feb, 2025 | …

: Japan Goes on Offense With New ‘Active Cyber Defense’ Bill Japan has passed the Active …

: Ransomware Groups Made Less Money in 2024 www.darkreading.com/cybersecu… The total volume of …

: Russian military hackers deploy malicious Windows activators in Ukraine …

: Russian bulletproof hosting service Zservers sanctioned by US for LockBit coordination …

: Over 12,000 KerioControl firewalls exposed to exploited RCE flaw www.scworld.com/brief/tho… …

: Microsoft’s February Patch a Lighter Lift Than January’s …

: SonicWall firewall exploit lets hackers hijack VPN sessions, patch now …

: Cisco Rejects Kraken Ransomware’s Data Breach Claims Cisco denies recent data breach claims by the …

: SAP security advisory – February 2025 monthly rollup (AV25-073) - Canadian Centre for Cyber Security

: Ivanti security advisory (AV25-074) - Canadian Centre for Cyber Security

: Fortinet security advisory (AV25-075) - Canadian Centre for Cyber Security

: Microsoft security advisory – February 2025 monthly rollup (AV25–076) - Canadian Centre for Cyber …

: Adobe security advisory (AV25–077) - Canadian Centre for Cyber Security

: How auto-generated passwords in Sitevision leads to signing key leakage - CVE-2022-35202 | …

: OpenSSL patched high-severity flaw CVE-2024-12797 OpenSSL patched a high-severity vulnerability, …

: HPE security advisory (AV25-078) - Canadian Centre for Cyber Security

: OmniGPT AI Chatbot Alleged Breach: Hacker Leaks User Data, 34M Messages A hacker claims to have …

: Microsoft fixes 63 vulnerabilities, including 2 zero-days | CyberScoop Microsoft released a security …

: Attackers exploit a new zero-day to hijack Fortinet firewalls Threat actors are exploiting a new …

: Malware from fake recruiters www.gdatasoftware.com/blog/2025… Fake recruiters are currently …

: Sky ECC encrypted service distributors arrested in Spain, Netherlands …

: 4 Arrested as Police Dismantle 8Base Ransomware, Seize Dark Web Sites hackread.com/police-di… …

: Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores …

: Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities …

: Apple fixes zero-day exploited in ‘extremely sophisticated’ attacks …

: Why security leaders must ensure they have a recovery plan for Active Directory attacks | CSO Online …

: Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions Progress …

: Jeep Introduces Pop-Up Ads That Appear Every Time You Stop - Slashdot Stellantis has introduced …

: SHA256 Hash Calculation from Data Chunks

: IBM security advisory (AV25-066) - Canadian Centre for Cyber Security

: Ubuntu security advisory (AV25-067) - Canadian Centre for Cyber Security

: Dell security advisory (AV25-069) - Canadian Centre for Cyber Security

: Apple security advisory (AV25-070) - Canadian Centre for Cyber Security

: Cyberattack disrupts Lee newspapers' operations across the US Lee Enterprises, a major U.S. …

: Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack Apple released …

: NetSupport RAT Grant Attackers Full Access to Victims Systems Cybercriminals are increasingly using …

: Vulnerability Summary for the Week of February 3, 2025 | CISA

: Major Cyber Attacks in Review: January 2025 - SOCRadar® Cyber Intelligence Inc. January 2025 saw a …

: Malicious ML models found on Hugging Face Hub - Help Net Security Two malicious machine learning …

: Analyst Burnout Is an Advanced Persistent Threat The cybersecurity industry is facing a critical …

: Russia vanishing from the net behind an Iron Firewall​ | Cybernews Russia is rapidly reducing its …

: Kraken Ransomware strikes Cisco servers to steal data - Cybersecurity Insiders Cisco, a prominent …

: Edge Devices Face Surge in Mass Brute-Force Password Attacks Honeypots have detected a surge in …

: Handala Hackers Claim Israeli Police Breach, Leak 350,000 Files Iranian-linked hacking group Handala …

: Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released A vulnerability in …

: XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells The XE Group, a …

: A week in security (February 3 - February 9) | Malwarebytes Malwarebytes Labs covered various …

: Cisco Data Breach - New Ransomware Group Compromised Cisco Internal Network A significant data …

: “Quishing” - The Emerging Threat of Fake QR Codes | Tripwire “Quishing,” or fake QR code scams, are …

: SolarWinds Taken Private in $4.4 Billion Turn/River Capital Acquisition - SecurityWeek SolarWinds, a …

: Massive OpenAI Leak, WordPress Admin Exploit, Inkafarma Data Breach - SOCRadar® Cyber Intelligence …

: Massive Brute Force Attack Targets VPN & Firewall Logins Using 2.8 Million IPs A massive brute …

: Marvel Game Vulnerability Exposes PCs & PS5s to Remote Takeover Attacks A critical security …

: Information of 120,000 Stolen in Ransomware Attack on Georgia Hospital - SecurityWeek Memorial …

: Movistar/O2 deja a sus clientes sin acceso a webs alojadas en Cloudflare al bloquear toscamente el …

: Secret Taliban records published online after hackers breach computer systems …

: Brave now lets you inject custom JavaScript to tweak websites …

: Malicious AI Models on Hugging Face Exploit Novel Attack Technique …

: Google Cloud Build Vulnerability Enables Data Destruction Across Projects …

: Econet Refutes Data Breach Claims, Says No Hack Detected - Techzim Econet Refutes Data Breach …

: 7,000 Exposed Ollama APIs Leave DeepSeek AI Models Wide Open to Attack …

: Chinese-Speaking Group Manipulates SEO with BadIIS www.trendmicro.com/en_us/res… This blog …

: Apple missed screenshot-snooping malware in code that made it into the App Store, Kaspersky claims …

: Label maker Avery says ransomware investigation also found credit-card scraper …

: Google’s DMARC Push Pays Off, but Email Security Challenges Remain …

: Cybercriminals Weaponize Graphics Files in Phishing Attacks …

: Hackers exploit Cityworks RCE bug to breach Microsoft IIS servers …

: Using capa Rules for Android Malware Detection cloud.google.com/blog/topi… Mobile devices …

: NowSecure Uncovers Multiple Security and Privacy Flaws in DeepSeek iOS Mobile App …

: Cloudflare outage caused by botched blocking of phishing URL …

: Hewlett Packard Enterprise Confirms Data Breach by Russian Hackers …

: Microsoft Stock: Japan’s SoftBank Poised To Become OpenAI’s Biggest Investor | …

: Cloudflare incident on February 6, 2025 Cloudflare experienced a 59-minute outage on February 6, …

: U.K. orders Apple to let it spy on users’ encrypted accounts - The Washington Post In a significant …

: Federal government bans Chinese AI startup DeepSeek on public service devices | National Post The …

: Dark Web Profile: Tortoiseshell APT - SOCRadar® Cyber Intelligence Inc. Tortoiseshell, an Iranian …

: Breach Roundup: Hacker Claims 20 Million OpenAI Logins Taken A hacker claims to have stolen login …

: 430,000 Impacted by Data Breaches at New York, Pennsylvania Healthcare Organizations - SecurityWeek …

: Cisco’s ISE bugs could allow root-level command execution | CSO Online Cisco is warning enterprise …

: UK Engineering Giant IMI Hit by Cyberattack - SecurityWeek UK engineering firm IMI suffered a …

: Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys - Help Net Security …

: Information of 883,000 Stolen in Crippling Attack on Hospital Sisters Health System - SecurityWeek A …

: iOS App Store apps with screenshot-reading malware found for the first time | The Verge Malicious …

: Critical Cisco ISE Vulnerabilities Patched: CVE-2025-20124 & CVE-2025-20125 - SOCRadar® Cyber …

: Five Eyes Releases Guidance on Securing Edge Devices The Five Eyes intelligence alliance released …

: Thailand to Cut Off Power to Scam Centers - Will it Work? Thailand plans to cut power and …

: Poisoned Go programming language package lay undetected for 3 years …

: Russian cyber research companies post alerts about infostealer, industrial threats …

: Analyzing ELF/Sshdinjector.A!tr with a Human and Artificial Analyst …

: macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed …

: CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks …

: Netgear warns users to patch critical WiFi router vulnerabilities …

: Stealers on the Rise: A Closer Look at a Growing macOS Threat …

: Chinese ‘Infrastructure Laundering’ Abuses AWS, Microsoft Cloud …

: 8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur …

: Cyber agencies share security guidance for network edge devices …

: Managing Software Risk in a World of Vulnerabilities Organizations face a perfect storm of rising …

: Tangerine Turkey: Cryptocurrency Mining Worm Unveiled In Global Campaign  A new threat actor, …

: Coyote Banking Trojan targets Brazilian users, stealing data from 70+ financial apps and websites …

: CISA Adds Four Known Exploited Vulnerabilities to Catalog | CISA

: Massive Data Leak Exposes 1.5 Billion Records from Chinese Platforms and Government - gHacks Tech …

: Beware of stealers disguised as… wedding invitations www.kaspersky.com/blog/tria… Getting …

: 2024 Trends in Vulnerability Exploitation vulncheck.com/blog/2024… 768 CVEs were publicly …

: CVE-2023-6080: A Case Study on Third-Party Installer Abuse cloud.google.com/blog/topi… …

: DeepSeek AI tools impersonated by infostealer malware on PyPI …

: Kazakhstan to audit foreign ministry after suspected Russia-linked cyberattack …

: A new phishing campaign is exploiting Microsoft’s legacy ADFS identity solution to steal credentials …

: Surge in Infostealer Attacks Threatens EMEA Organizations - Infosecurity Magazine Infostealer …

: Stealers on the Rise: A Closer Look at a Growing macOS Threat Infostealers, malware designed to …

: Hackers Exploiting 7-Zip Zero-Day Vulnerability to Deploy SmokeLoader Malware  Hackers are …

: Warning: Phishing Campaign Targets Germany with New Malware A new phishing campaign targeting …

: Rat Race: ValleyRAT Malware Targets Organizations with New Delivery Techniques Morphisec Threat Labs …

: Hackers impersonate DeepSeek to distribute malware | CSO Online Hackers are impersonating DeepSeek …

: Picus Security Finds 3X Increase in Malware Targeting Picus Security’s Red Report 2025 reveals a …

: Chinese algorithm claimed to boost Nvidia GPU performance by up to 800X for advanced science …

: Salesforce (CRM) Cutting 1,000 Roles While Hiring Salespeople for AI - Bloomberg Salesforce is …

: uBlock Origin is dead for Chrome, but ad blockers live on | PCWorld Google’s Chrome browser update, …

: TD Bank Confirms Data Breach: Account Numbers and Sensitive Customer Info Exposed - Benzinga TD Bank …

: CRTC lets top telecoms piggyback on fibre-optic networks CRTC Maintains Big Three’s Access to Fibre …

: Cloudflare is making it easier to track authentic images online | The Verge Cloudflare has launched …

: Dell security advisory (AV25-051) - Canadian Centre for Cyber Security

: IBM security advisory (AV25-052) - Canadian Centre for Cyber Security

: Ubuntu security advisory (AV25-053) - Canadian Centre for Cyber Security

: Total Fines Imposed by EU Privacy Regulators Dropped in 2024 While the total fines imposed by EU …

: Introducing ORBIT, Scan Targets and Clients at Scale - Black Hills Information Security Ralph May …

: macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed Apple recently updated its …

: DeepSeek Blocked In US Federal Agencies - GovInfoSecurity U.S. federal agencies are banning the use …

: New Research from Incogni Ranks Top 238 AI-Powered Google Chrome Extensions by Privacy Risk - …

: AI Company Asks Job Applicants Not to Use AI in Job Applications Anthropic, a prominent AI company, …

: Cisco Finds DeepSeek R1 Highly Vulnerable to Harmful Prompts DeepSeek R1, a cost-efficient AI model, …

: EV Charging Stations vulnerable to cyber attacks - Cybersecurity Insiders Electric Vehicles (EVs) …

: 1-Click Phishing Campaign Targets High-Profile X Accounts A one-click phishing campaign is targeting …

: Sophos Acquires Secureworks – Sophos News Sophos has acquired Secureworks to enhance cybersecurity …

: Crazy Evil gang runs over 10 highly specialized social media scams The Russian-speaking Crazy Evil …

: 768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023 In 2024, 768 CVEs were …

: Vulnerability Summary for the Week of January 27, 2025 | CISA

: Hundreds of Thousands Hit by Data Breaches at Healthcare Firms in Colorado, North Carolina - …

: Coyote Malware Expands Reach: Now Targets 1,030 Sites and 73 Financial Institutions A banking …

: Insurance Company Globe Life Notifying 850,000 People of Data Breach - SecurityWeek Insurance …

: 1 Million Impacted by Data Breach at Connecticut Healthcare Provider - SecurityWeek Connecticut …

: How the Proposed HISAA Law Could Reshape Cybersecurity Compliance | Tripwire The Health …

: 39% of IT leaders fear major incident due to excessive workloads | CSO Online IT leaders are …

: Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware A Russian-speaking …

: Forrester Report: The Complexities Of Human-Element Breaches Forrester’s new report, “Deconstructing …

: Criminals Increase Attack Speed By 22%  Cybercriminals are accelerating their attacks, with the …

: BadDNS: Open-source tool checks for subdomain takeovers - Help Net Security BadDNS is an open-source …

: DoJ, Dutch Authorities Seize 39 Domains Selling Malicious Tools The US Department of Justice (DoJ) …

: AMD: Microcode Signature Verification Vulnerability · Advisory · google/security-research · GitHub A …

: Active Exploitation of macOS Kernel Vulnerability (CVE-2025-24118) Date Observed: Feb. 2, 2025, at …

: 10 Cyber Security Trends For 2025 Cyber security trends for 2025 include AI-driven malware, zero …

: Subscribe to read The EU plans to make Temu, Shein, and Amazon Marketplace responsible for illegal …

: More ChatGPT Jailbreaks Are Evading Safeguards On Sensitive Topics AI chatbots like ChatGPT are …

: Microsoft is killing its “free” Microsoft 365 VPN feature | Windows Central Microsoft is removing …

: DeepSeek might not be as disruptive as claimed, firm reportedly has 50,000 Nvidia GPUs and spent …

: Microsoft’s Free Offer Deadline—Millions Of Windows Users Suddenly Upgrade Microsoft faces a …

: Ransomware attack hit Indian multinational Tata Technologies Tata Technologies, a Tata Motors …

: Mali-cious Intent: Exploiting GPU Vulnerabilities (CVE-2022-22706 / CVE-2021-39793) | STAR Labs …

: List of products from the United States subject to 25 per cent tariffs effective February 4, 2025 - …

: ClickFix vs. traditional download in new DarkGate campaign | Malwarebytes A recent malvertising …

: Backdoor in Chinese-made healthcare monitoring device leaks patient data | CSO Online A backdoor in …

: Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists Meta-owned …

: BeyondTrust Zero-Day Breach Exposed 17 SaaS Customers via Compromised API Key BeyondTrust …

: U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network U.S. and Dutch …

: Texas Governor Orders Ban on DeepSeek, RedNote for Government Devices - SecurityWeek Texas Governor …

: Israeli Spyware Firm Paragon Linked to WhatsApp Zero-Click Attack WhatsApp recently uncovered a …

: Casio and 16 Other Websites Hit by Double-Entry Web Skimming Attack A recent web skimming campaign …

: Another Healthcare Data Breach Compromised a Million Patients' Information | Lifehacker Hackers …

: Exclusive: Apex Custom Software hacked, threat actors threaten to leak the software – …

: Google offers ‘voluntary exit’ to all US platforms and devices employees | The Verge Google offers a …

: OpenAI o3-mini | OpenAI OpenAI is releasing OpenAI o3-mini, a new, cost-efficient reasoning model …

: NorthBay Health Data Breach Impacts 569,000 Individuals - SecurityWeek NorthBay Health, a non-profit …

: Google Bans 158,000 Malicious Android App Developer Accounts in 2024 Google blocked over 2.36 …

: VMware offers fixes to severe vulnerabilities in VMware Aria | CSO Online VMware Aria, a cloud …

: NY Blood Center Attack Disrupts Suppliers in Several States A ransomware attack on New York Blood …

: ChatGPT-4o contains security bypass vulnerability through time and search functions called …

: Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response …

: Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations …

: New Aquabotv3 botnet malware targets Mitel command injection flaw …

: New Syncjacking attack hijacks devices using Chrome extensions …

: No need to RSVP: a closer look at the Tria stealer campaign securelist.com/tria-stea… Since …

: Microsoft advertisers phished via malicious Google ads www.malwarebytes.com/blog/news… Just …

: Banshee: A stealer targeting macOS users www.kaspersky.com/blog/bans… Banshee stealer, a …

: Backdoor found in two healthcare patient monitors, linked to IP in China CISA warns of a backdoor in …

: Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform · GitHub A …

: DeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys Leaked DeepSeek, a prominent …

: Phishing Campaign Baits Hook With Malicious Amazon PDFs www.darkreading.com/cyberatta… …

: Lynx Ransomware Group ‘Industrializes’ Cybercrime With Affiliates …

: Windows 11’s 24H2 January update is causing havoc on people’s PCs The latest Windows 11 …

: NordVPN’s new feature gets around networks that block VPNs | The Verge NordVPN introduces …

: Apple’s New ‘Game Changer’ iPhone Update Brings Starlink Satellite Access Apple’s latest iPhone …

: Microsoft CEO: AI Scaling Laws Drive Efficiency, Lower Costs Microsoft CEO Satya Nadella believes AI …

: Security Roundup January 2025 - BH Consulting The World Economic Forum’s Global Risk Report 2025 …

: Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits Three unpatched …

: Operation Talent: FBI Seizes Nulled.to, Cracked.to, Sellix.io and more The FBI seized several …

: IT Services Vendor Hack Affects 293,000 AHN Patients Allegheny Health Network (AHN) is notifying …

: CL-STA-0048: An Espionage Operation Against High-Value Targets in South Asia A Chinese threat actor, …

: Russian UAC-0063 Targets Europe and Central Asia with Advanced Malware Russian APT28-linked threat …

: Threat actors using Google Gemini to amplify attacks: Report | CSO Online Government-backed threat …

: U.S. CISA adds Apple products' flaw to its Known Exploited Vulnerabilities catalog CISA added a …

: ISC BIND security advisory (AV25-048) - Canadian Centre for Cyber Security

: FBI Seizes Leading Hacking Forums Cracked.to and Nulled.to Two prominent hacking forums, Nulled.to …

: These are the 10 worst PIN codes | Malwarebytes A study of 29 million PIN codes revealed a …

: Mishing Cyber Attack from malicious PDF - Cybersecurity Insiders A new mishing campaign, targeting …

: Old Ways of Vendor Risk Management Are No Longer Enough Traditional third-party risk management …

: TeamViewer security advisory (AV25-047) - Canadian Centre for Cyber Security

: Top 10 Exploited Vulnerabilities of 2024 - SOCRadar® Cyber Intelligence Inc. In 2024, organizations …

: Aquabot Botnet Targeting Vulnerable Mitel Phones - SecurityWeek A Mirai-based malware family, …

: New phishing campaign targets users in Poland and Germany | CSO Online An ongoing phishing campaign, …

: Canada’s privacy landscape saw significant legislative shifts in 2024, with Alberta and …

: Hackers Claim 2nd Breach at HP Enterprise, Plan to Sell Access IntelBroker, a notorious hacker, …

: Unmasking FleshStealer: A New Infostealer Threat in 2025 | Flashpoint FleshStealer, a new C#-based …

: OAuth Flaw Exposed Airline Users to Account Takeovers A vulnerability in a major travel services …

: Unknown threat actor targeting Juniper routers with backdoor: Report | Network World An unknown …

: Only 13% of organizations fully recover data after a ransomware attack - Help Net Security …

: API Supply Chain Attacks Surge, Exposing Critical Security Gaps  API attack traffic surged by 681% …

: Cybersecurity crisis in numbers - Help Net Security The number of US data compromises decreased …

: Building Resilience Against Zero-Day Threats In Third-Party Risk Management Organizations must adopt …

: UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents The APT group UAC-0063, …

: How Lazarus Group built a cyber espionage empire - Help Net Security Lazarus Group, a North Korean …

: Ex-worker arrested after ‘shutdown’ of British Museum computer systems A former IT …

: Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution A critical security flaw …

: SimpleHelp Remote Access Software Exploited in Attacks - SecurityWeek Threat actors are exploiting …

: Cyber Insights 2025: Artificial Intelligence - SecurityWeek Artificial Intelligence (AI) is rapidly …

: Smiths Group Scrambling to Restore Systems Following Cyberattack - SecurityWeek Smiths Group, a …

: Is DeepSeek Safe? A Q&A on the Cybersecurity Risks of the AI Platform - SOCRadar® Cyber …

: Looking Back To Look Forward: 2024’s Top Email Threats VIPRE Security Group’s 2024 email threat …

: ExxonMobil Lobbyist Caught Hacking Climate Activists - Schneier on Security The Department of …

: PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks …

: Bitwarden makes it harder to hack password vaults without MFA …

: DeepSeek halts new signups amid “large-scale” cyberattack …

: Microsoft tests Edge Scareware Blocker to block tech support scams …

: Apple users: Update your devices now to patch zero-day vulnerability …

: Apple chips can be hacked to leak secrets from Gmail, iCloud, and more - Ars Technica Two newly …

: Let’s Secure Insurance failed to secure their own data storage. Now they have a breach. – …

: Prompt Injection Tricks AI Into Downloading And Executing Malware | Hackaday A proof-of-concept …

: South Korea sees cyber-attack damage increase by 48% year on year - Telecompaper According to a …

: Faridabad police arrest 41 cyber criminals in week - The Tribune Faridabad police arrested 41 …

: Cyber-attacks on the tech supply chain spiked in 2024 Cyber-attacks on the global technology supply …

: EU Sanctions Three Russians For 2020 Cyber-Attack on Estonia - Infosecurity Magazine The EU …

: Smiths Group Manages Cyber Security Incident - TipRanks.com Smiths Group plc is addressing a cyber …

: Tech selloff deepens as DeepSeek upsets global AI race | Reuters The emergence of DeepSeek, a …

: Now Apple tells us how to update AirPods - The Verge Apple updated its AirPods firmware support page …

: Swedish Authorities Seize Vessel in Cable Sabotage Probe Swedish authorities seized a Malta-flagged …

: SonicWall’s Zero-Day Provokes Patch Alerts - GovInfoSecurity SonicWall’s Secure Mobile Access …

: Microsoft Teams phishing attack alerts coming to everyone next month …

: Technical Analysis of Xloader Versions 6 and 7 | Part 1 www.zscaler.com/blogs/sec… Xloader is …

: MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks …

: Ransomware gang uses SSH tunnels for stealthy VMware ESXi access …

: DeepSeek’s Popular AI App Is Explicitly Sending US Data to China | WIRED DeepSeek, a Chinese AI …

: Meta AI Tracks Canadians on Facebook, Messenger, WhatsApp • iPhone in Canada Blog Meta AI is getting …

: Attackers Exploit PDFs In Sophisticated Mishing Attack  A sophisticated phishing campaign, dubbed …

: InvisibleFerret: Everything About Lazarus APT’s New Backdoor - Cybersecurity Insiders Lazarus …

: Compliance Scorecard Version 7 simplifies compliance management for MSPs - Help Net Security …

: Data Protection Day 2025: three takeaways for embedding privacy principles - BH Consulting Data …

: A method to assess ‘forgivable’ vs ‘unforgivable’… - NCSC.GOV.UK The …

: Dark Web Profile: FunkSec - SOCRadar® Cyber Intelligence Inc. FunkSec, a new ransomware group, has …

: E.U. Sanctions 3 Russian Nationals for Cyber Attacks Targeting Estonia’s Key Ministries The …

: Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks DeepSeek, a Chinese AI …

: Nursing Home, Rehab Chain Says Hack Affects Nearly 70,000 HCF Management, a healthcare and nursing …

: ESXi ransomware attacks use SSH tunnels to avoid detection ESXi ransomware attacks exploit …

: CISOs’ top 12 cybersecurity priorities for 2025 | CSO Online CISOs are prioritizing strengthening …

: Hackers allegedly stole $69M from cryptocurrency platform Phemex Singapore-based cryptocurrency …

: GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities A new threat actor, …

: A Strategic Approach To Container Security Containerization technologies have revolutionized …

: MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks A cyber campaign uses …

: How to use Apple’s App Privacy Report to monitor data tracking - Help Net Security Apple’s App …

: Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware – The DFIR Report A LockBit ransomware …

: Abusing multicast poisoning for pre-authenticated Kerberos relay over Kerberos relaying over HTTP is …

: Recent reports have highlighted that apps like Life360 and MyRadar have been sharing user driving …

: Cisco warns of a ClamAV bug with PoC exploit Cisco released security updates for a ClamAV …

: Meta’s Llama Framework Flaw Exposes AI Systems to Remote Code Execution Risks A high-severity …

: OpenAI Launches AI Agent ‘Operator’ - GovInfoSecurity OpenAI launched Operator, an AI …

: Patching Lags for Vulnerabilities Targeted by Salt Typhoon Chinese nation-state hackers, known as …

: Massive Data Leak of information on Georgians/JAMnews Sensitive personal data of nearly the entire …

: UnitedHealth Group’s Massive Data Breach Impacts 190 Million Americans UnitedHealth Group’s …

: TalkTalk investigates breach after data for sale on hacking forum TalkTalk is investigating a …

: American National Insurance Company (ANICO) Data Leaked in MOVEit Breach American National Insurance …

: Crunchyroll password leaks: What’s happening with Crunchyroll Premium accounts now | esports.gg …

: OpenAI launches Operator, an AI agent that performs tasks autonomously | TechCrunch OpenAI launches …

: Introducing GhostGPT—The New Cybercrime AI Used By Hackers GhostGPT, an uncensored AI chatbot, is …

: BITCARDS: The Dark Side of Prepaid Cards in the Digital Underworld The market for prepaid cards has …

: $4.88M was the average cost of a data breach in 2024 | Security Magazine The average cost of a data …

: New Law Could Mean Prison for Reporting Data Leaks | Tripwire Turkey’s proposed cybersecurity law …

: Belgium: Private Investigation Act — How it impacts your internal investigations - Global Compliance …

: Nearly half of CISOs now report to CEOs, showing their rising influence - Help Net Security CISOs …

: 2025 State of SaaS Backup and Recovery Report The 2025 State of SaaS Backup and Recovery Report …

: RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations Over 100 security …

: A New Wave Of Ransomware Campaigns Is Targeting Microsoft Teams - SOCRadar® Cyber Intelligence Inc. …

: North Korean Fake IT Workers More Aggressively Extorting Enterprises - SecurityWeek North Korean …

: Misinformation Is No. 1 Global Risk, Cyberespionage in Top 5 …

: Data breach hitting PowerSchool looks very, very bad arstechnica.com/security/… Parents, …

: Hackers imitate Kremlin-linked group to target Russian entities therecord.media/hacker-im… A …

: Lumma Stealer: Fake CAPTCHAs & New Techniques to Evade Detection …

: HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code …

: PANdora’s Box: Vulnerabilities Found in NGFW eclypsium.com/blog/pand… Security …

: The J-Magic Show: Magic Packets and Where to find them blog.lumen.com/the-j-mag… The Black …

: Subaru Security Flaws Exposed Its System for Tracking Millions of Cars …

: FortiGate config leaks: Victims' email addresses published online …

: SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation …

: Researchers say new attack could take down the European power grid arstechnica.com/security/… …

: Will 2025 See a Rise of NHI Attacks? www.darkreading.com/vulnerabi… The flurry of non-human …

: Targeted supply chain attack against Chrome browser extensions blog.sekoia.io/targeted-… On …

: Threat hunting case study: PsExec intel471.com/blog/thre… PsExec is a command-line utility …

: Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet …

: Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products …

: Cisco warns of denial of service flaw with PoC exploit code …

: SonicWall CVE-2024-53704: SSL VPN Session Hijacking bishopfox.com/blog/soni… Bishop Fox …

: Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications …

: PlushDaemon compromises supply chain of Korean VPN service www.welivesecurity.com/en/eset-r… …

: From qualitative to quantifiable: Transforming cyber risk management for critical infrastructure …

: ENISA: Embedding Resilience in Critical Infrastructure www.databreachtoday.com/enisa-emb… The …

: Iran and Russia deepen cyber ties with new agreement therecord.media/russia-ir… A deal signed …

: TR-92 - Unused Domain Names and the Risks of Missing DNS SPF Records www.circl.lu/pub/tr-92… …

: This Corporate Data Breach Lasted 3 Years and Exposed 3 Billion Accounts - 24/7 Wall St. This …

: Ransomware Groups Abuse Microsoft Services for Initial Access - SecurityWeek Two threat actors, …

: US experiences 47% of global utilities cyberattacks | Security Magazine Cyberattacks against the …

: FTC finalizes COPPA rule amendments | Data Protection Report The Federal Trade Commission (FTC) has …

: Medical Device Company Tells Hospitals They’re No Longer Allowed to Fix Machine That Costs Six …

: MasterCard DNS Error Went Unnoticed for Years – Krebs on Security MasterCard had a DNS error for …

: Microsoft 365 Subject to Email Bombing, ‘Vishing’ Attacks Sophos warns of ransomware …

: Oracle Quarterly Critical Patches Issued January 21, 2025

: Redline, Vidar and Raccoon Malware Stole 1 Billion Passwords in 2024 Over 1 billion passwords were …

: Russian ransomware hackers increasingly posing as tech support on Microsoft Teams - The Cyber Post …

: 37% of privacy professionals cite lack of resources as cause of stress | Security Magazine Privacy …

: Kaspersky finds US Cybersecurity budgets up by 9 percent in next 2 years - Cybersecurity Insiders …

: Cloudflare Issue Can Leak Chat App Users' Broad Location Cloudflare issue allows attackers to obtain …

: HPE security advisory (AV25-030) - Canadian Centre for Cyber Security HPE published a security …

: Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4 Cloudflare’s DDoS defense …

: The fall and rise of TikTok (traffic) On January 19, 2025, TikTok traffic in the US dropped by 85% …

: Vulnerability Summary for the Week of January 13, 2025 | CISA The CISA Vulnerability Bulletin …

: Medusa Ransomware: What You Need To Know | Tripwire Medusa is a ransomware-as-a-service platform …

: ChatGPT API flaws could allow DDoS, prompt injection attacks | CSO Online A vulnerability in the …

: Multiple Vulnerabilities in Amazon Web Services Clients Issued by: CERT-In (Indian Computer …

: Atlassian’s Bitbucket Cloud went down ‘hard’ today …

: Tracking Adversaries: Ghostwriter APT Infrastructure blog.bushidotoken.net/2025/01/t… This …

: CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits …

: AI tool GeoSpy analyzes images and identifies locations in seconds …

: Why maintaining data cleanliness is essential to cybersecurity …

: 7-Zip fixes bug that bypasses Windows MoTW security warnings, patch now …

: Russian telecom giant Rostelecom investigates suspected cyberattack on contractor …

: Geolocation and Starlink isc.sans.edu/diary/rss… Until now, satellite internet access has …

: Patch procrastination leaves 50,000 Fortinet firewalls vulnerable to zero-day …

: Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai …

: Indian Strategic Studies: C.I.A.’s Chatbot Stands In for World Leaders The Central Intelligence …

: Netflix Raises Prices Including First Hike on Ad-Supported Tier Netflix is raising subscription …

: President Trump Scraps Biden’s AI Safety Executive Order President Trump has rescinded Biden’s …

: Fortinet’s 2025 State Of Cloud Security: Insights On Multi-Cloud Adoption, Security …

: Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing” – Sophos …

: Medusa Ransomware: What You Need To Know | Tripwire Medusa is a ransomware-as-a-service platform …

: PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers A cyber attack campaign, …

: Fleet: Open-source platform for IT and security teams - Help Net Security Fleet is an open-source …

: Cybersecurity jobs available right now: January 21, 2025 - Help Net Security A list of cybersecurity …

: Ciso Guide To Password Security - How to Implement and Automate Key Elements of NIST 800-63B - …

: Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP …

: How much does your electric car know about you? www.pandasecurity.com/en/mediac… Electric …

: 6 Cyber Security Challenges Emerge from World Economic Forum, Check Point Research on 2025 Threats …

: HPE investigates breach as hacker claims to steal source code …

: Ukraine restores state registers after suspected Russian cyberattack …

: DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection …

: Philippines arrests Chinese national suspected of spying on critical infrastructure - The Cyber Post …

: Belsen Group Leaks 15,000+ FortiGate Firewall Configurations The Belsen Group leaked over 15,000 …

: Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers New research …

: Handala Threat Actor Group: Key Insights into Emerging Cybersecurity Risks The Handala Hacker Group, established in December 2023, is a politically motivated cyber threat …

: 2025 cyber threats are battlefield for organizations - The Jerusalem Post The cyber threat landscape …

: New IoT Botnet Launching Large-Scale DDoS Attacks Hijacking IoT Devices A new IoT botnet, leveraging …

: Windows Common Log File System Zero-day Vulnerability (CVE-2024-49138) Exploited A critical zero-day …

: Researchers Identify Principles to Reduce Noise in Network Intrusion Detection Systems in SOC …

: PoC Exploit Released For QNAP Remote Code Execution Vulnerability A critical remote code execution …

: New Android Malware Mimics Chat App to Steal Sensitive Data A new Android malware campaign, …

: Cyber attack cost Synnovis estimated £32.7m in 2024 The cyber attack on Synnovis in June 2024 …

: Why social engineering is still the top cyber security threat – and what to do about it Social …

: Philippines fortifies cyber defense, partnering with Japan, U.S. and others – Indo-Pacific Defense …

: US, Nordic-Baltic allies focus on undersea cable security amid cyber incidents, as NATO begins …

: Tougher enforcement measures on cyber fraud | China | Law.asia China has implemented stricter …

: Microsoft just renamed Office on everyone’s PCs, and the new name isn’t great Microsoft …

: AWS pledges to spend $5B in Mexico, launches new Mexico server region | TechCrunch Amazon Web …

: Harry Potter publisher breached, millions of records lifted • The Register Scholastic, the publisher …

: Most common four-digit PIN numbers that put you at risk of cyberattacks are revealed - News - UNILAD …

: How Star Blizzard Exploits WhatsApp in Spear Phishing Campaign - SOCRadar® Cyber Intelligence Inc. …

: HPE Investigating Breach Claims After Hacker Offers to Sell Data - SecurityWeek HPE is investigating …

: CERT-UA warns against “security audit” requests via AnyDesk - Help Net Security …

: Otelier data breach triggers serious data security concerns - Cybersecurity Insiders Otelier, a data …

: How organizations can secure their AI code | CSO Online Organizations face security risks when using …

: One in ten GenAI prompts puts sensitive data at risk - Help Net Security A study by Harmonic …

: TikTok ban takes hold: data reveals sharp traffic decline and rapid shift to alternatives The United …

: TikTok has officially shut down in the United States - 9to5Mac TikTok has officially shut down in …

: Amazon Is Changing How It Tracks Employee Badge Data, Messages Show - Business Insider Amazon has …

: Small ThreatIntel digest of interesting information published in the last 48 hours Title: ThreatHunter.ai Halts Hundreds of Attacks in the Past 48 Hours Summary: ThreatHunter.ai has …

: One of the largest data leaks ever sees info on 1.5 billion people leaked online Massive Data Breach …

: IoT security explainer series - Atlantic Council Consumer IoT security is a complex issue despite …

: Types of Cyber Attacks & Cyber Threats Explained [2025] This article discusses various types of …

: Check Point Software’s 2025 Security Report Finds Alarming 44% Increase in Cyber-Attacks Amid …

: UN Aviation Agency ICAO Suffers Data Breach Impacting Nearly 12,000 People - CPO Magazine The …

: HHSC Notifies Public Regarding Privacy Breach | Texas Health and Human Services The Texas Health and …

: Delaware’s Multistate Tax, Inc. Files Official Notice of Data Breach

: Internal state data breach exposes info of 61,000 Texans The Texas Health and Human Services …

: Change Healthcare Ransomware Attack: Data Review “Substantially Complete” Change …

: Otelier data breach exposes info, hotel reservations of millions Otelier, a cloud-based hotel …

: Microsoft’s latest on-prem Azure is for apps clouds dislike • The Register Microsoft’s Azure Local …

: Yubico Issues Security Advisory As 2FA Bypass Vulnerability Confirmed Yubico issued a security …

: Google begins requiring JavaScript for Google Search Google has recently mandated that users enable …

: TikTok says it will ‘go dark’ in ban if US government does not intervene TikTok is set …

: RECALL: Thousands of printers sold in Canada pose fire hazard, officials say | INsauga Lexmark …

: IBM to buy Oracle consultancy, and partner with L’Oréal IBM is acquiring Applications Software …

: Warning As PayPal Cyberattacks Continue—What You Need To Know PayPal users are being targeted by …

: B.C. lawsuit accuses Telus of exaggerating AI capabilities | Vancouver Sun Telus International is …

: The Dark Web Economy: A Hidden Marketplace Reshaping Cybersecurity - SOCRadar® Cyber Intelligence …

: US hits back against China’s Salt Typhoon group | CSO Online The US is sanctioning two Chinese …

: Employees Enter Sensitive Data Into GenAI Prompts Too Often Employees are frequently sharing …

: New York Proposes Doing Background Checks on Anyone Buying a 3D Printer New York State Assembly Bill …

: Jailing negligent management boards? EU’s aggressive financial sector regulation goes into force - …

: In Other News: Lawsuits and Settlements, CrowdStrike Phish, MITRE’s D3FEND 1.0 - SecurityWeek …

: TikTok ban: Switching to RedNote? Your privacy is at stake. | Proton TikTok, banned in the US due to …

: Wolf Haldenstein Data Breach Impacts 3.4 Million People - SecurityWeek Law firm Wolf Haldenstein …

: WhatsApp spear phishing campaign uses QR codes to add device | Malwarebytes A cybercriminal group, …

: Opting Out of Gmail’s Gemini AI Summaries Is a Mess. Here’s How to Do It, We Think …

: Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation Three critical …

: The Good, the Bad and the Ugly in Cybersecurity - Week 3 The Department of Justice (DoJ) indicted …

: AT&T hack exposes agents’ call logs leaving FBI scrambling | Cybernews The FBI is scrambling to …

: Clop ransomware gang names dozens of victims hit by Cleo mass-hack, but several firms dispute …

: Russian APT Phishes Kazakh Gov’t for Strategic Intel A suspected Russia-linked threat actor, …

: European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China European …

: Bitwarden unveils native mobile applications for iOS and Android - Help Net Security Bitwarden has …

: State of Network Threat Detection 2024 Report - Cybersecurity Insiders The 2024 State of Network …

: New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass A new …

: US Announces Sanctions Against North Korean Fake IT Worker Network - SecurityWeek The US Treasury …

: DORA arrives: Here’s what you need to know - BH Consulting The Digital Operational Resilience Act …

: Google Releases Open Source Library for Software Composition Analysis - SecurityWeek Google released …

: Poor patching regime is opening businesses to serious problems | CSO Online A recent S&P Global …

: Abandoned Online Domains Unlock Services With Google OAuth A security researcher, Dylan Ayrey, …

: Threat Brief: CVE-2025-0282 and CVE-2025-0283 Ivanti Connect Secure, Policy Secure, and ZTA gateway …

: Biden administration will leave it to Trump to implement TikTok ban - ABC News The Biden …

: Closing the Software Understanding Gap www.cisa.gov/sites/def… Today, mission owners and …

: New Star Blizzard spear-phishing campaign targets WhatsApp accounts …

: Double-Tap Campaign: Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central …

: Microsoft patches Windows to eliminate Secure Boot bypass threat arstechnica.com/security/… …

: Governments call for spyware regulations in UN Security Council meeting …

: Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws …

: CISA shares guidance for Microsoft expanded logging capabilities …

: The current state of ransomware: Weaponizing disclosure rules and more …

: N.B. Liquor cyber security woes continue | CBC News N.B. Liquor and Cannabis N.B. are experiencing a …

: Gootloader inside out – Sophos News Gootloader, a malware family, uses a sophisticated social …

: Russian Cyberspies Caught Spear-Phishing with QR Codes, WhatsApp Groups - SecurityWeek Russian …

: Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches The Clop …

: Avery had credit card skimmer stuck on its site for months | Malwarebytes Avery experienced a data …

: One Active Directory Account Can Be Your Best Early Warning - Black Hills Information Security One …

: Incorporating AI agents into SOC workflows | Red Canary AI agents are transforming security …

: Millions of Internet Hosts Vulnerable to Attacks Due to Tunneling Protocol Flaws - SecurityWeek Over …

: The mystery of the $75M ransom payment to Dark Angels | TechTarget Dark Angels, a Russian-speaking …

: Final Biden Cybersecurity EO Uses Federal Purchasing Power President Biden’s final executive order …

: 380,000 Impacted by Data Breach at Cannabis Retailer Stiiizy - SecurityWeek Cannabis retailer …

: Pumakit: A Sophisticated Linux Rootkit Targeting Critical Infrastructure - SOCRadar® Cyber …

: Cyber Insights 2025: Identities - SecurityWeek In 2025, securing identities, both human and machine, …

: FTC orders GoDaddy to fix its infosec practices | CSO Online The FTC has ordered GoDaddy to improve …

: Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions Cybersecurity …

: Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer Threat actors are …

: Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them? - Help Net Security …

: 2024 US Healthcare Data Breaches: 585 Incidents, 180 Million Compromised User Records - SecurityWeek …

: MikroTik botnet relies on DNS misconfiguration to spread malware A 13,000-device MikroTik botnet, …

: New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344) - Help Net Security ESET …

: PlugX malware deleted from thousands of systems by FBI | Malwarebytes The FBI successfully removed …

: Scammers Exploit California Wildfires, Posing as Fire Relief Services Cybercriminals are exploiting …

: Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager Ivanti has …

: SIEM buyer’s guide: Top 15 security information and event management tools — and how to choose | CSO …

: O’Reilly 2025 Tech Trends: AI Skills Surge As Security Takes Center Stage The 2025 O’Reilly …

: North Korea targeting software developers with Malware - Cybersecurity Insiders Lazarus Group, a …

: DOJ, FBI Dismantle Malware Used By China-Backed Hackers In Global Operation The US Department of …

: RansomHub Affiliates Exploit AI-Generated Python Backdoor In Advanced Cyberattacks RansomHub …

: UK Government Seeking To ‘Turbocharge’ Growth Through AI The UK government’s AI Opportunities Action …

: Threat actor leaked config files and VPN passwords for over Fortinet Fortigate devices A threat …

: CISA warns second BeyondTrust vulnerability also exploited in the wild | CSO Online CISA added a …

: GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal …

: Replit CEO on AI breakthroughs: ‘We don’t care about professional coders anymore’ | Semafor Replit, …

: Microsoft Releases January 2025 Security Updates | CISA

: Meta announces 5% cuts targeting low performers. Read the memo Meta will lay off approximately 5% of …

: Snyk Says ‘Malicious’ NPM Packages Part of Research Project - SecurityWeek Snyk, a …

: FBI Deletes More Than 4,000 PlugX Malware Instances The FBI, in collaboration with the French police …

: Beware cybersecurity tech that’s past its prime — 5 areas to check or retire | CSO Online …

: SAP security advisory – January 2025 monthly rollup (AV25-017) - Canadian Centre for Cyber Security

: SAP Patches Critical Vulnerabilities in NetWeaver - SecurityWeek SAP released 14 security notes, …

: Todyl IDs Foreign Threat Actors Using U.S. ISPs Todyl, a cybersecurity company, has identified a …

: Verizon provides update on Salt Typhoon cyberattack, confirms incident containment - Industrial …

: US, Japan, South Korea warn of rising North Korean crypto hacking threats The United States, Japan, …

: Location tracking company Unacast tells Norway its data was hacked, broadcaster says | Reuters …

: NHS Ransomware Hack Caused Patient Harm in UK, Data Shows - Bloomberg A Russian cybercrime group, …

: Apple iPhone USB-C Hacked—What Users Need To Know Security researchers have successfully hacked the …

: Apple Security Researcher Says Latest Crypto MacOS Malware Is Overblown - Decrypt A new strain of …

: ‘Scam City is growing’: how Myanmar’s cyber fraud hubs outfox efforts to shut them down | South …

: Robinhood to Pay $45 Million SEC Settlement Over Data Breach, Other Violations - WSJ Robinhood will …

: A breach of Gravy Analytics' huge trove of location data threatens the privacy of millions | …

: The Evolution of Ransomware: From Simple Encryption to Double Extortion Tactics - SOCRadar® Cyber …

: Insurance company accused of using secret software to illegally collect and sell location data on …

: An Overview of the Nominet Security Breach Tied to Ivanti VPN Vulnerability (CVE-2025-0282) - …

: New Codefinger Ransomware Exploits AWS to Encrypt S3 Buckets A new ransomware campaign, attributed …

: CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks - SecurityWeek CISA warns of …

: One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph …

: Critical Aviatrix Controller Vulnerability Exploited Against Cloud Environments - SecurityWeek A …

: Malicious Kong Ingress Controller Image Found on DockerHub A critical security breach occurred when …

: Illicit HuiOne Telegram Market Surpasses Hydra, Hits $24 Billion in Crypto Transactions HuiOne …

: Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces A new …

: Russian-Linked Hackers Target Kazakhstan in Espionage Campaign with HATVIBE Malware Russian-linked …

: Gen AI strategies put CISOs in a stressful bind | CSO Online CISOs are under pressure from …

: IntelBroker Unmasked: KELA’s In-Depth Analysis of a Cybercrime Leader • KELA Cyber Threat …

: 2025 AI Insights: Threat Detection and Response - Cybersecurity Insiders In 2025, AI will …

: Infostealer Infections Lead to Telefonica Ticketing System Breach - SecurityWeek Infostealer malware …

: Hotel chain ditches Google search for DuckDuckGo — ‘subjected to fraud attempts daily’ | CSO Online …

: New Amazon Ransomware Attack—‘Recovery Impossible’ Without Payment

: xAI’s Grok iOS app has launched, delivering cutting-edge technology right to your pocket. From …

: A comprehensive analysis of global mobility trends and international travel documentation reveals …

: The recent OpenAI web crawler incident affecting Triplegangers highlights a critical emerging threat …

: Texas sues Allstate, alleging it violated data privacy rights of 45 million Americans - The Cyber …

: Cyberattackers Hide Infostealers in YouTube Comments Cyberattackers are using YouTube and Google …

: Attackers are encrypting AWS S3 data without using ransomware - Help Net Security Codefinger, a …

: Telefonica Breach Exposes Jira Tickets, Customer Data Telefonica, a major telecom company, suffered …

: [Control systems] CISA ICS security advisories (AV25–015) - Canadian Centre for Cyber Security

: Dell security advisory (AV25-014) - Canadian Centre for Cyber Security

: The new rules for AI and encrypted messaging, with Mallory Knodel (Lock and Code S06E01) | …

: Ubuntu security advisory (AV25-013) - Canadian Centre for Cyber Security

: IBM security advisory (AV25-012) - Canadian Centre for Cyber Security

: The Shifting Landscape of Open Source Security Open source software (OSS) will face increased …

: Infostealer Masquerades as PoC Code Targeting Recent LDAP Vulnerability - SecurityWeek Threat actors …

: EU law enforcement training agency data breach: Data of 97,000 individuals compromised - Help Net …

: Juniper Networks Fixes High-Severity Vulnerabilities in Junos OS - SecurityWeek Juniper Networks …

: CISA and US and International Partners Publish Guidance on Priority Considerations in Product …

: NB Liquor stores open for cash transactions only after ‘potential cyber threat’

: Telcos removing Huawei equipment left in the lurch after Trudeau kills cyber bill - The Logic …

: Global Cybersecurity Outlook 2025 – Navigating Through Rising Cyber Complexities > Press releases …

: ASML-Backed Dutch University Suspends Classes After Cyber Attack - Bloomberg Eindhoven University of …

: Microsoft rules out layoffs in India amid global job cuts - The Hindu BusinessLine Microsoft has no …

: Phishing texts trick Apple iMessage users into disabling protection Cybercriminals are exploiting a …

: White House Moves to Restrict AI Chip Exports The Biden administration is implementing new export …

: What Is Vulnerability Management? | Tripwire Vulnerability management is a continuous process of …

: The $55 Billion Wake-Up Call: Cybersecurity Challenges Facing UK Businesses | Tripwire UK businesses …

: Dux Human Health Breach, U.S. Credit Card Sale, Boulanger Database Leak, and More - SOCRadar® Cyber …

: A week in security (January 6 - January 12) | Malwarebytes Malwarebytes Labs covered various …

: WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables A new credit card …

: Chainsaw: Open-source tool for hunting through Windows forensic artefacts - Help Net Security …

: NoName057 targets Italy again after Zelensky’s visit to the country Pro-Russia hacktivist …

: Fake PoC Exploit Targets Cybersecurity Researchers with Malware A fake proof-of-concept exploit, …

: Muddling Meerkat Linked to Domain Spoofing in Global Spam Scams Infoblox researchers investigating …

: Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation Microsoft is suing a …

: Telefónica confirms internal ticketing system breach after data leak Telefónica, a Spanish …

: PowerSchool data breach: what to know A data breach impacting several school boards across the …

: PowerSchool’s Breach Fallacy: Paying Criminals for Promises PowerSchool, a K-12 student …

: Report: Chinese Hackers Breached CFIUS - GovInfoSecurity Chinese hackers breached the U.S. Treasury …

: Russia Carves Out Commercial Surveillance Success Russian wiretapping technology, SORM, is being …

: Slovakia’s land registry hit by biggest cyberattack in country’s history, minister says - The Cyber …

: Apps That Are Spying on Your Location - Schneier on Security Thousands of apps, including popular …

: BayMark Health Services sends breach notifications after ransomware attack | Malwarebytes BayMark …

: Juniper Networks security advisory (AV25-011) - Canadian Centre for Cyber Security Juniper Networks …

: The Good, the Bad and the Ugly in Cybersecurity - Week 2 The U.S. government launched the Cyber …

: In Other News: Bank of America Warns of Data Breach, Trucking Cybersecurity, Treasury Hack Linked to …

: Chinese APT Group Is Ransacking Japan’s Secrets A Chinese APT group, MirrorFace, has been …

: Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense …

: Green Bay Packers' Online Pro Shop Sacked by Payment Skimmer www.trendmicro.com/en_us/res… In …

: US Treasury hack linked to Silk Typhoon Chinese state hackers …

: UK Internet Domain Registry Nominet Suffers Cyber Attack www.ispreview.co.uk/index.php… The …

: Major Addiction Treatment Firm BayMark Confirms Ransomware Attack Caused Data Breach - SecurityWeek …

: FunkSec – Alleged Top Ransomware Group Powered by AI - Check Point Research The FunkSec ransomware …

: Major Cyber Attacks in Review: December 2024 - SOCRadar® Cyber Intelligence Inc. December 2024 saw a …

: Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices A Google …

: RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns RedDelta, a …

: CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig Cryptominer CrowdStrike warns of …

: January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance - Help Net Security …

: New Banshee Malware Targeting MacOS Users Remained Undetected For Months A new, sophisticated …

: Huge Changes Predicted For The Data Privacy Landscape The data privacy landscape in 2025 will face …

: SEC rule confusion continues to put CISOs in a bind a year after a major revision | CSO Online …

: The SBI fake banking app shows that SMS authentication has had its day - Help Net Security A scam …

: People Think AI Images of Hollywood Sign Burning Are Real AI-generated images of the Hollywood sign …

: New Mirai botnet targets industrial routers | CSO Online A new variant of the Mirai botnet, …

: Space Bears Ransomware: What You Need To Know | Tripwire Space Bears, a ransomware group aligned …

: GroupGreeting e-card site attacked in “zqxq” campaign | Malwarebytes Malwarebytes uncovered a …

: New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption A …

: Medical Billing Firm Medusind Says Data Breach Impacts 360,000 People - SecurityWeek Medusind, a …

: MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan China-linked threat actor …

: Discovering Splinter: A First Look at a New Post-Exploitation Red Team Tool A new post-exploitation …

: Exploitation of New Ivanti VPN Zero-Day Linked to Chinese Cyberspies - SecurityWeek Google Cloud’s …

: Zero-day vulnerability in Sonicwall SSL VPN is attacked | heise online Sonicwall is releasing …

: 6th January– Threat Intelligence Report - Check Point Research Check Point Research released a …

: 7 Lessons From A Year Of Unprecedented Cyber Attacks The past year saw an unprecedented surge in …

: Law Firm Kotz Sangster Wysocki Files Notice of Data Breach Following February 2024 Cyberattack

: Excelsior Orthopaedics Files Notice of Data Breach Affecting an Estimated 357,000

: School districts impacted by PowerSchool data breach

: Ott Cone & Redpath Provides Notice of Data Breach to 22,171 Individuals

: Medusind, Inc. Data Breach Exposes Personal Information: Murphy Law Firm Investigates Legal Claims …

: Pediatric Home Service Files Official Notice of Data Breach

: Cyber breach response: Best practices to protect privilege in data breach investigations | Managed …

: Major data breach hits NC schools. Plus, what’s next for Chromebooks? | WUNC A major data breach …

: PowerSchool discloses breach affecting hosted and self-hosted school k-12 districts – …

: United Nations aviation agency hacked, database plundered The International Civil Aviation …

: Hong Kong: The first draft of the new critical infrastructures cybersecurity law is here - Global …

: SOC Scalability: How AI Supports Growth Without Overloading Analysts Scaling security operations …

: It’s Time Businesses Address The UK’s Cybersecurity Talent Shortage The UK faces a significant …

: SOAR buyer’s guide: 11 security orchestration, automation, and response products — and how to choose …

: VIPRE Security Shares Cybersecurity Trends For 2025 In 2025, AI-powered phishing will become a …

: Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd - Help Net Security …

: Top 5 Malware Threats to Prepare Against in 2025 - The Cyber Post Five common malware families, …

: Top 5 Malware Threats to Prepare Against in 2025 - The Cyber Post Five common malware families, …

: India Readies Overhauled National Data Privacy Rules India has drafted rules to implement its …

: Google Starts Tracking All Your Devices In 6 Weeks—Forget Chrome And Android Google is set to …

: Microsoft Plans Job Cuts and Is Focused on Underperforming Employees - Business Insider Microsoft is …

: High-Paying Security Career: Choosing a Path, Getting There Cybersecurity offers high-paying …

: European Court Fines European Commission for Privacy Violation The European Court of Justice ruled …

: SonicWall warns of an exploitable SonicOS vulnerability SonicWall warns of an authentication bypass …

: Green Bay Packers Fans Sacked by Online Payment Skimmer The Green Bay Packers’ online Pro Shop …

: New Research: Enhancing Botnet Detection with AI using LLMs and Similarity Search | Rapid7 Blog …

: Palo Alto Networks security advisory (AV25-009) - Canadian Centre for Cyber Security

: Ivanti security advisory (AV25-008) - Canadian Centre for Cyber Security

: Russian internet provider confirms its network was ‘destroyed’ following attack claimed by Ukrainian …

: Abandoned Backdoors: How Malicious Infrastructure Lives On Researchers from watchTowr, an attack …

: SonicWall security advisory (AV25-007) - Canadian Centre for Cyber Security

: Japan and Philippines face Cyber Attacks from China - Cybersecurity Insiders Chinese-backed cyber …

: Japan Links Chinese Hacker MirrorFace to Dozens of Cyberattacks Targeting Security and Tech Data - …

: The U.S. Cyber Trust Mark set to launch - Help Net Security The U.S. Cyber Trust Mark program, …

: New PayPal Phishing Scam Exploits MS365 Tools and Genuine-Looking Emails A new PayPal phishing scam …

: End of the Year Report 2024: Uncovering Global Cyber Threats and Trends - SOCRadar® Cyber …

: Walker Co. Schools alerting parents, educators of student information system data breach

: Northeast Rehabilitation Hospital Network Data Breach Alert: Issued by Wolf Haldenstein Adler …

: OpenVPN Connect Vulnerability Let Attackers Access Users’ Private Keys A critical vulnerability, …

: Google warns of legit VPN apps being used to infect devices with malware | TechRadar Malicious …

: Thousands Impacted by Casio Data Breach - SecurityWeek Casio completed its investigation into a …

: Scammers Impersonate Authorities to Swipe OTPs with Remote Access Apps Cybercriminals in the Middle …

: Insider Threat: Tackling the Complex Challenges of the Enemy Within - SecurityWeek The insider …

: Gravy Analytics Breach Puts Millions of Location Records at Risk and Highlights Privacy Threats - …

: Millions of Email Servers Exposed Due to Missing TLS Encryption Millions of email servers worldwide …

: FCC Launches ‘Cyber Trust Mark’ for IoT Devices to Certify Security Compliance The FCC …

: FCC Launches ‘Cyber Trust Mark’ for IoT Devices to Certify Security Compliance The FCC …

: The biggest data breach fines, penalties, and settlements so far | CSO Online Data breaches and …

: Ransomware Targeting Infrastructure Hits Telecom Namibia Telecom Namibia fell victim to a ransomware …

: State-Funded Actors Are Driving the Ransomware Threat Landscape - Cybersecurity Insiders …

: Meta Open-Sources Byte Latent Transformer LLM with Improved Scalability - InfoQ Meta open-sourced …

: Microsoft declares 2025 the year of Windows 11 • The Register Microsoft is pushing for Windows 11 …

: The unlicensed OneDrive fun ends this month • The Register Microsoft will begin enforcing a policy …

: From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch Cyber …

: Cyber attack on Kingston Police | Quinte News Kingston (Ontario) Police experienced a cyber incident …

: Threat actors breached the Argentina’s airport security police (PSA) payroll Threat actors breached …

: Hackers Claim Massive Breach of Location Data Giant, Threaten to Leak Data Hackers claim to have …

: The deepfake threat just got a little more personal | CSO Online Researchers at Google DeepMind and …

: Two ransomware groups claimed they attacked Rutherford County Schools. One leaked sensitive records. …

: Financial Data Leaked In City Bank Hack | City Bank data breach: Client financial statements sold on …

: Dell, HPE, MediaTek Patch Vulnerabilities in Their Products - SecurityWeek MediaTek, HPE, and Dell …

: Critical Infrastructure Ransomware Attack Tracker Reaches 2,000 Incidents - SecurityWeek Temple …

: Comprehensive Guide to IoC Enrichment and SOCRadar’s New IoC Enrichment Module - SOCRadar® …

: US adds Tencent to the list of companies supporting Chinese military The US Department of Defense …

: Gen AI is transforming the cyber threat landscape by democratizing vulnerability hunting | CSO …

: US military allocated about $30 billion to spend on cybersecurity in 2025 | CSO Online The 2025 …

: ICAO Investigates Data Breach as Hacker Claims to Sell Sensitive Data gained from Cyber Attack - …

: Cyberbro: Open-source tool extracts IoCs and checks their reputation - Help Net Security Cyberbro is …

: Moxa Devices Vulnerable To Cyberattacks, Threatening Industrial Networks Critical vulnerabilities in …

: China’s Salt Typhoon Adds to Telecom Cyber Victim List Chinese state-backed hackers, Salt …

: IBM security advisory (AV25-003) - Canadian Centre for Cyber Security

: HPE security advisory (AV25-002) - Canadian Centre for Cyber Security

: Telegram Hands U.S. Authorities Data on Thousands of Users Telegram provided U.S. authorities with …

: Dell security advisory (AV25-001) - Canadian Centre for Cyber Security

: Hackers reportedly compromise Argentina’s airport security payroll system - The Cyber Post …

: Ransomware attacks on Germany Fraunhofer and Japan Nikki Universal - Cybersecurity Insiders The …

: England residents asked to reboot their devices for Cybersecurity reasons - Cybersecurity Insiders …

: Violent Hackers Are Using U-Haul To Dox Targets Hackers are exploiting U-Haul employee accounts to …

: Nessus scanner agents went offline due to a faulty plugin update Tenable disabled Nessus scanner …

: Out With the Old, In With the New: Securely Disposing of Smart Devices | Rapid7 Blog Properly …

: Vulnerability Summary for the Week of December 30, 2024 | CISA The CISA Vulnerability Bulletin …

: Cybersecurity M&A Roundup: 37 Deals Announced in December 2024 - SecurityWeek Thirty-seven …

: Top 4 incident response certifications to consider in 2025 | TechTarget Four incident response …

: Dark Web Profile: Kairos Extortion Group - SOCRadar® Cyber Intelligence Inc. The Kairos Extortion …

: Tenable Disables Nessus Agents Over Faulty Updates - SecurityWeek Tenable disabled Nessus agent …

: GS Retail announced a data breach affecting 90,000 customers, with personal information including …

: New York City’s new congestion toll kicks in. What drivers need to know - National | Globalnews.ca …

: Microsoft to Spend $80 Billion on AI Data Centers This Year - Barron’s Microsoft announced …

: Hospitals in China overwhelmed by surge in HMPV patients raising concern - The Jerusalem Post China …

: Critical ‘Rising Risk’ Attack Alert—Change Your Router Password Now IBM X-Force warns that 86% of …

: IBM Canada has opened its new headquarters in Markham, focusing on agentic AI, a new innovation in …

: Scientists Built a Proton Battery That Could Dethrone Lithium-Ion Scientists at the University of …

: Longtime Tenable CEO, NetWitness Head Amit Yoran Dies at 54 Amit Yoran, a prominent figure in …

: The U.S. Surgeon General has issued a critical new advisory highlighting alcohol as a leading …

: Japanese Businesses Hit By a Surge In DDoS Attacks A surge in distributed denial-of-service (DDoS) …

: Researchers Uncover Nuclei Vulnerability Enabling Signature Bypass and Code Execution A …

: PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps A new malware called …

: FireScam info-stealing malware supports spyware capabilities Cyfirma warns of FireScam, an Android …

: Thousands of Buggy BeyondTrust Systems Remain Exposed Nearly 9,000 BeyondTrust systems remain …

: No need to hack when it’s leaking: Roomster edition – DataBreaches.Net A data leak on Roomster …

: Richmond University Medical Center data breach impacted 674,033 individuals Richmond University …

: Atos, contractor for French military and intelligence agencies, dismisses ransomware attack claims - …

: Metasploit 2024 Annual Wrap-Up | Rapid7 Blog Metasploit added support for ESC8, an AD CS attack that …

: ShredOS is an entire OS just for destroying data - Boing Boing ShredOS is a Linux distribution …

: Multi-Path TCP: revolutionizing connectivity, one path at a time Multi-Path TCP (MPTCP) is a …

: Dark Web Monitoring Tools and How They Benefit Businesses - SOCRadar® Cyber Intelligence Inc. Dark …

: NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT A malicious NPM package disguised as an …

: New York Hospital Says Ransomware Attack Data Breach Impacts 670,000 - SecurityWeek Richmond …

: Around 3.3M POP3 and IMAP mail servers lack TLS encryption Over 3 million POP3 and IMAP mail servers …

: LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers A proof-of-concept …

: Critical Deadline: Update Old .NET Domains Before January 7, 2025 to Avoid Service Disruption …

: Apple accused of collecting user data from Siri queries - Cybersecurity Insiders Apple is facing a …

: Diving Into Azure Lateral Movement With Pass-the-PRT Pass-the-PRT is a sophisticated attack method …

: Every minute, 4,080 records are compromised in data breaches - Help Net Security The world’s …

: Active Directory Flaw Can Crash Any Microsoft Server A critical Active Directory Domain Controller …

: UN General Assembly Adopts Cybercrime Treaty The UN General Assembly adopted the Convention against …

: Volkswagen massive data leak caused by a failure to secure AWS credentials | CSO Online Volkswagen’s …

: Fake 7-Zip Exploit Code Traced to AI-Generated Misinterpretation A recent claim of a critical …

: Japan’s largest mobile carrier says cyberattack disrupted some services - The Cyber Post NTT …

: DoubleClickjacking allows clickjacking on major websites DoubleClickjacking, a new technique, …

: Volkswagen Breach Exposes Data of 800K EV Customers Volkswagen Group experienced a data breach …

: Dozens of Chrome extensions hacked in threat campaign | TechTarget Dozens of Google Chrome …

: Lumen reports that it has locked out the Salt Typhoon group from its network China-linked APT group …

: SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach | CSO Online …

: Kata Containers: Open-source container runtime, building lightweight VMs - Help Net Security Kata …

: Hacked on Christmas, DEphoto starts notifying customers, only to be attacked again – …

: 1-800-ChatGPT - Calling and Messaging ChatGPT with your phone | OpenAI Help Center 1-800-ChatGPT is …

: Air Fryer espionage raises data security concerns - Cybersecurity Insiders Smart air fryers, praised …

: FortiGuard Labs Links New EC2 Grouper Hackers to AWS Credential Exploits FortiGuard Labs researchers …

: Cybersecurity news headlines trending on Happy New Year 2025 - Cybersecurity Insiders …

: Finland identifies seven suspects among crew of alleged Russian ‘spy’ tanker - The Cyber …

: 6 AI-Related Security Trends to Watch in 2025 AI tools, particularly generative AI and large …

: ClickFix Campaign: Fake Google Meet Alerts Spread Malware Across Windows and macOS - SOCRadar® Cyber …

: Water Makara Campaign: A Sophisticated Spear-Phishing Attack on Brazilian Enterprises - SOCRadar® …

: Dark Web Profile: Gamaredon APT - SOCRadar® Cyber Intelligence Inc. Gamaredon APT, active since …

: Top 12 ways hackers broke into your systems in 2024 | CSO Online In 2024, hackers exploited a mix of …

: Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents In December …

: Chinese Hackers Accessed US Treasury Workstations in ‘Major' Cybersecurity Incident - SecurityWeek …

: Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation …

: U.S. Army Soldier Arrested in AT&T, Verizon Extortions – Krebs on Security A U.S. Army soldier, …

: Hottest cybersecurity open-source tools of the month: December 2024 - Help Net Security This month’s …

: New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits - The Cyber Post The …

: An X user claimed a 7-Zip zero-day vulnerability, but 7-Zip’s creator says is a fake A Twitter …

: Study Finds AI Can Guess Crypto Seed Phrases in 0.02 Seconds A study by NFTEvening and Storible …

: A boy created AI-generated porn with the faces of girls he knew. Why Toronto police said he …

: The Threat of SIM Swapping Attacks on Financial Institutions - SOCRadar® Cyber Intelligence Inc. SIM …

: US Finalizes Rule Throttling Bulk Data Sales to China The U.S. government finalized a rule …

: White House Clears HIPAA Security Rule Update The U.S. Department of Health and Human Services (HHS) …

: 2024 Attack Surface Threat Intelligence Report - Cogility - TacitRed - Cybersecurity Insiders The …

: Blue Yonder says November ransomware attack not connected to Cleo vulnerability - The Cyber Post …

: US adds 9th telecom company to list of known Salt Typhoon targets - The Cyber Post A Chinese …

: North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign North Korean threat …

: Prioritizing patching: A deep dive into frameworks and tools – Part 1: CVSS – Sophos News CVSS is a …

: Volkswagen data breach of Electric cars and D Link router botnet attack - Cybersecurity Insiders …

: Apache security advisory (AV24-731) - Canadian Centre for Cyber Security

: Palo Alto Networks security advisory (AV24-730) - Canadian Centre for Cyber Security

: Top 10 Identity Attacks in 2024: Protecting Credentials in a Digital World - SOCRadar® Cyber …

: The Best, the Worst and the Ugliest in Cybersecurity | 2024 Edition 2024 saw both positive and …

: Defining & Defying Cybersecurity Staff Burnout Cybersecurity burnout, characterized by …

: 2024 in AI: It’s changed the world, but it’s not all good | Malwarebytes In 2024, AI …

: What’s new in Cloudflare: MASQUE now powers 1.1.1.1 & WARP apps, DEX now generally available …

: Quantum Computing Advances in 2024 Put Security In Spotlight Google’s announcement of its Willow …

: Cloud Atlas Deploys VBCloud Malware: Over 80% of Targets Found in Russia Cloud Atlas, a threat actor …

: Dark Web Profile: Storm-842 (Void Manticore) - SOCRadar® Cyber Intelligence Inc. Storm-842, also …

: Palo Alto Releases Patch for PAN-OS DoS Flaw — Update Immediately Palo Alto Networks has released a …

: FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks Cybersecurity …

: Apache MINA CVE-2024-52046: CVSS 10.0 Flaw Enables RCE via Unsafe Serialization Apache MINA has a …

: The future of data and AI: Seven trends shaping 2025 and beyond - Help Net Security Seven trends …

: Law enforcement agencies see AI as a key tool for reducing crime - Help Net Security A U.S. national …

: Reflecting on humanity’s incredible pace of innovation: Just 66 years separated the Wright brothers’ …

: Netflix is suing Broadcom’s VMware over virtual machine patents | TechSpot Netflix is suing …

: A new Mirai botnet variant targets DigiEver DS-2105 Pro DVRs Akamai researchers discovered a new …

: SEC Disclosures Up, But Not Enough Details Provided The new SEC cybersecurity disclosure rules have …

: The Intersection of AI and OSINT: Advanced Threats On The Horizon - SecurityWeek Open Source …

: Defense Giant General Dynamics Says Employees Targeted in Phishing Attack - SecurityWeek General …

: Cl0p Ransomware Group to Name Over 60 Victims of Cleo Attack - SecurityWeek Cl0p ransomware group …

: Researchers Uncover Dark Web Operation Entirely Focused on KYC Bypass iProov uncovered a dark web …

: Dark Web Profile: Trinity Ransomware - SOCRadar® Cyber Intelligence Inc. Trinity ransomware, first …

: DDoS Attacks Surge as Africa Expands Its Digital Footprint Organizations in North African countries …

: 2024 Cloud Security Report Fortinet - Cybersecurity Insiders The 2024 Cloud Security Report reveals …

: How are you securing your communications in the wake of the Volt Typhoon revelations? | CSO Online …

: Cybersecurity Resolutions: Skill Sets to Prioritize in 2025 Cybersecurity professionals should …

: iOS devices more exposed to phishing than Android - Help Net Security The mobile threat landscape is …

: SEO Poisoning: How Scammers Turn Search Engines into Traps SEO poisoning is a cyber threat where …

: Pittsburgh Regional Transit attributes recent service disruptions to ransomware attack - The Cyber …

: Iran’s Christmas Cyber Attack on Israeli Tech Firm Sparks Alarm - Cybersecurity Insiders Iran …

: JAL’s system under cyberattack, domestic and international flights delayed Japan Airlines …

: Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts …

: Clop ransomware is now extorting 66 Cleo data-theft victims …

: Sweden says China denied request for prosecutors to board ship linked to severed cables …

: The 2024 cyberwar playbook: Tricks used by nation-state actors | CSO Online Nation-state actors in …

: Iran’s Charming Kitten Deploys BellaCPP: A New C++ Variant of BellaCiao Malware Charming …

: Top Phishing Tricks Attackers Use to Target Employees & The Recent ‘You’re Fired’ Campaign …

: Critical SQL Injection Vulnerability in Apache Traffic Control Rated 9.9 CVSS — Patch Now A critical …

: Ruijie Networks' Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks Cybersecurity …

: FAA halts all American Airlines flights in the US after airline reports technical issues systemwide …

: Microsoft Teams Rooms introduces digital signage and AI features to revolutionize hybrid workspaces …

: This VPN sells access to people’s home internet networks | Tom’s Guide Big Mama VPN, a …

: How Will Health Data Privacy, Cyber Regs Shape Up in 2025? States are expected to continue enacting …

: Online Extortion Gang Clop Threatens Cleo Hacking Victims The Clop cybercriminal group, responsible …

: Postman Workspaces Leak 30000 API Keys and Sensitive Tokens CloudSEK researchers discovered over …

: Python Malware in Zebo-0.1.0 and Cometlogger-0.1 Found Stealing User Data Fortinet FortiGuard Lab …

: Adobe security advisory (AV24–729) - Canadian Centre for Cyber Security

: Dark Web Profile: Just Evil - SOCRadar® Cyber Intelligence Inc. Just Evil, a pro-Russian cyber …

: Dark Web Profile: CosmicBeetle (NoName) Ransomware - SOCRadar® Cyber Intelligence Inc. CosmicBeetle, …

: Dark Web Profile: APT31 - SOCRadar® Cyber Intelligence Inc. APT31, a Chinese state-sponsored hacking …

: Dark Web Profile: SpaceBears - SOCRadar® Cyber Intelligence Inc. SpaceBears, a new data broker …

: Dark Web Profile: Dark Angels - SOCRadar® Cyber Intelligence Inc. Dark Angels, a sophisticated …

: Dark Web Profile: LockBit 3.0 Ransomware - SOCRadar® Cyber Intelligence Inc. LockBit 3.0, a …

: Dark Web Profile: ShinyHunters - SOCRadar® Cyber Intelligence Inc. ShinyHunters, a cyber threat …

: Dark Web Profile: BlackCat (ALPHV) - SOCRadar® Cyber Intelligence Inc. BlackCat, or ALPHV, is a …

: Dark Web Profile: Hunters International - SOCRadar® Cyber Intelligence Inc. Hunters International, a …

: Dark Web Profile: INC Ransom - SOCRadar® Cyber Intelligence Inc. INC Ransom is a sophisticated …

: Dark Web Profile: Ymir Ransomware - SOCRadar® Cyber Intelligence Inc. Ymir ransomware, originating …

: Dark Web Profile: UserSec - SOCRadar® Cyber Intelligence Inc. UserSec, a pro-Russian hacktivist …

: Dark Web Profile: KillSec - SOCRadar® Cyber Intelligence Inc. KillSec, a threat actor active since …

: Dark Web Profile: RansomHub - SOCRadar® Cyber Intelligence Inc. RansomHub, a new ransomware group, …

: Dark Web Profile: Evil Corp - SOCRadar® Cyber Intelligence Inc. Evil Corp, a pro-Russian hacktivist …

: Dark Web Profile: Bashe (APT73) - SOCRadar® Cyber Intelligence Inc. Bashe, a ransomware group active …

: American Addiction Centers Data Breach Impacts 422,000 People - SecurityWeek American Addiction …

: When the world logs off: Christmas, New Year’s, and the Internet’s holiday rhythm Internet traffic …

: North Korean Hackers Pull Off $308M Bitcoin Heist from Crypto Firm DMM Bitcoin North Korean hackers, …

: Apache Tomcat Vulnerability CVE-2024-56337 Exposes Servers to RCE Attacks Apache Tomcat servers are …

: 2025 is going to be a bumpy year for IoT - Help Net Security 2025 promises to be a tumultuous year …

: Non-Human Identities Gain Momentum, Requires Both Management, Security The rapid growth of …

: Why Hackers Love Weekend and Holiday Attacks - GovInfoSecurity Healthcare organizations are …

: Turmoil Besets Phishing-as-a-Service Toolkit Rockstar 2FA The phishing-as-a-service toolkit Rockstar …

: A Vulnerability in Apache Struts2 Could Allow for Remote Code Execution OVERVIEW: A vulnerability …

: RIBridges data breach: What RI residents should do to protect selves A data breach in Rhode Island’s …

: Brightline data breach class action settlement Brightline Inc. agreed to a class action settlement …

: McDonalds delivery customers put at risk by possible data breach | TechRadar A cybersecurity …

: Duke Energy Hit by Major Data Breach, 370,000 Customers' Sensitive Data Exposed in Security Incident …

: Alta Resources Corporation Provides Notice of Data Breach Affecting Over 37k People | Console and …

: November 2024 Healthcare Data Breach Report November 2024 saw a 15.3% increase in healthcare data …

: Records of Nearly 1,000,000 Americans Exposed As Massive Data Breach Reveals Names, Phone Numbers, …

: US Cracks Down On China For Cyber Attacks The US imposed sanctions on a Chinese cybersecurity firm …

: McAfee Predicts 2025 Cyber Threats as AI Drives Advanced Scams McAfee’s 2025 predictions highlight …

: Malaysian eatery operator arrested for selling SIM cards to Chinese cyber fraudsters - The Tribune A …

: Advent of Cyber 2024 DAY 22 — Tryhackme walkthrough | by TRedEye | Dec, 2024 | Medium Kubernetes …

: Navigating the Cyber Threat Landscape: Lessons Learned & What’s Ahead The cybersecurity …

: Organizations Need To Get Real About Threat Of Cyber Attacks Cyber attacks pose a significant risk …

: North Korean Hackers Tied to $1.3B in Stolen Crypto in 2024 North Korean hackers have stolen a …

: Beware Of Shadow AI – Shadow IT’s Less Well-Known Brother - SecurityWeek Shadow AI, the …

: IBM security advisory (AV24-727) - Canadian Centre for Cyber Security

: Ubuntu security advisory (AV24-726) - Canadian Centre for Cyber Security

: Middle East Cyberwar Rages On, With No End in Sight Cyberattacks between Israel and Hamas, fueled by …

: Global elections in 2024: Internet traffic and cyber threat trends The 2024 elections saw a rise in …

: Government to Name ‘Key Witness’ Who Provided FBI With Backdoored Encrypted Chat App Anom The …

: AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case Cybersecurity …

: Vulnerability Summary for the Week of December 16, 2024 | CISA The CISA Vulnerability Bulletin …

: 5.6 Million Impacted by Ransomware Attack on Healthcare Giant Ascension - SecurityWeek Ascension …

: Supply Chain Attack Hits Rspack, Vant npm Packages with Monero Miner Popular npm packages Rspack and …

: Cloud Atlas using a new backdoor, VBCloud, to steal data | Securelist Cloud Atlas, a cyber threat …

: 4 Security Controls Keeping Up with the Evolution of IT Environments | Modern IT environments, …

: Phishing Report Findings Call For A Fundamental Shift In Organizational Approaches To Defense …

: Top 7 zero-day exploitation trends of 2024 | CSO Online Zero-day vulnerabilities in network security …

: Lazarus APT targeted employees at an unnamed nuclear-related organization The North Korea-linked …

: Top 5 Ransomware Attacks and Data Breaches of 2024 - Cybersecurity Insiders The year 2024 saw a …

: Maximizing the impact of cybercrime intelligence on business resilience - Help Net Security …

: How companies can fight ransomware impersonations - Help Net Security Companies must protect data …

: MacPorts: Remote Code Execution · Advisory · google/security-research · GitHub A vulnerability in …

: Beware Feb. 3, 2025—Diabolic Ransomware Gang Issues New Attack Warning The LockBit ransomware group, …

: 10 ways I use AI to simplify my daily life Artificial Intelligence (AI) is increasingly integrated …

: Leading AI chatbots show dementia-like cognitive decline in tests, raising questions about their …

: 12 days of OpenAI: The Ars Technica recap - Ars Technica OpenAI concluded its “12 days of OpenAI” …

: Week in review: MUT-1244 targets both security workers and threat actors, Kali Linux 2024.4 released …

: The UK’s Cybersecurity Landscape: Key Trends and Challenges for 2025 - Cybersecurity Insiders The …

: BadBox rapidly grows, 190,000 Android devices infected - Security Affairs Bitsight researchers …

: Albania to close TikTok for a year | AP News Albania will ban TikTok for a year due to concerns …

: Google CEO Sundar Pichai says company slashed manager roles by 10% Google CEO Sundar Pichai has …

: Largest data breach of health information affects estimated third of U.S. population Change …

: Ascension: Health data of 5.6 million stolen in ransomware attack Ascension, a major U.S. healthcare …

: Ledger Users Targeted in New Data Breach Phishing Campaign – Security Bitcoin News A new phishing …

: The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year | Electronic …

: Chinese national cyber centre says U.S. hacks stole trade secrets from tech firms | Reuters China’s …

: Hackney Council: Cyber-attack cost ‘hundreds of thousands’ Hackney Council is spending …

: OpenAI announces new o3 models | TechCrunch OpenAI unveiled o3, a new family of reasoning models, …

: The Feds Have Some Advice for ‘Highly Targeted’ Individuals: Don’t Use a VPN | …

: Metasploit Weekly Wrap-Up 12/20/2024 | Rapid7 Blog This week’s Metasploit update includes four new …

: Sophos security advisory (AV24-725) - Canadian Centre for Cyber Security Sophos published a security …

: LockBit Ransomware Developer Arrested in Israel Rostislav Panev, a dual Russian-Israeli national, …

: Ukraine’s state registers hit with one of Russia’s largest cyberattacks, officials say - The Cyber …

: Builder.ai Database Misconfiguration Exposes 1.29 TB of Unsecured Records A publicly accessible …

: How Generative AI Is Powering A New Era Of Cybersecurity Google is set to allow advertisers to track …

: Critical Flaws Expose 25,000 SonicWall Devices to Hackers Over 25,000 SonicWall SSLVPN devices are …

: US eyes ban on TP-Link routers amid cybersecurity concerns | CSO Online The US government is …

: The Year of Takedowns: Significant Law Enforcement Operations of 2024 - SOCRadar® Cyber Intelligence …

: Exploring vulnerable Windows drivers Threat actors exploit vulnerable Windows drivers through the …

: Silent Heists: The Danger of Insider Threats | Tripwire Insider threats, both careless and …

: Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits Fortinet has …

: Lazarus targets nuclear-related organization with new malware | Securelist Lazarus group targets …

: Are threat feeds masking your biggest security blind spot? - Help Net Security Threat feeds, while …

: Banking, Utilities API Attacks Surge in India Cyberattacks targeting India-based organizations, …

: In potential reversal, European authorities say AI can indeed use personal data — without consent — …

: APT29 group used red team tools in rogue RDP attacks Russia-linked APT29 group used rogue RDP …

: Apache security advisory (AV24-722) - Canadian Centre for Cyber Security Apache published a security …

: Threat actors are attempting to exploit Apache Struts vulnerability CVE-2024-53677 Threat actors are …

: Regional Care Data Breach Impacts 225,000 People - SecurityWeek Nebraska-based healthcare insurance …

: European companies hit with effective DocuSign-themed phishing emails - Help Net Security A threat …

: APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP The Russia-linked APT29 …

: Dark Web Market: BidenCash - SOCRadar® Cyber Intelligence Inc. BidenCash, a dark web marketplace, …

: BeyondTrust Issues Urgent Patch for Critical Vulnerability in PRA and RS Products BeyondTrust …

: The Mask APT is back after 10 years of silence Kaspersky researchers linked a new wave of cyber …

: Effective Phishing Campaign Targeting European Companies and Institutions A phishing campaign …

: Data Sovereignty In A Cloud-Driven World Is Not A Given Data sovereignty in a cloud-driven world is …

: Nearly 400,000 WordPress credentials stolen | Security Magazine MUT-1244 stole over 390,000 …

: Lesson from latest SEC fine for not completely disclosing data breach details: ‘Be truthful’ | CSO …

: Thai Police Systems Under Fire From ‘Yokai’ Backdoor Hackers are targeting Thai law …

: Texas Tech Fumbles Medical Data in Massive Breach Texas Tech University’s Health Sciences Centers …

: Hackers Leak Partial Cisco Data from 4.5TB of Exposed Records Hackers leaked 2.9GB of Cisco data on …

: CISA Directs Federal Agencies to Secure Cloud Environments CISA issued a directive requiring federal …

: Namibia’s state telecom provider says hackers leaked data after it refused to pay ransom - The Cyber …

: 5 million payment card details stolen in painful reminder to monitor Christmas spending | …

: Azure Data Factory Bugs Expose Cloud Infrastructure Three vulnerabilities in Azure Data Factory’s …

: FBI warns of HiatusRAT scanning campaigns against Chinese-branded web cameras and DVRs The FBI warns …

: Foxit security advisory (AV24-720) - Canadian Centre for Cyber Security Foxit published security …

: Canada’s Top Cybersecurity Threats: How Attackers Target Critical Industries - SOCRadar® Cyber …

: DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7 The Department of …

: Hackers Use Fake PoCs on GitHub to Steal WordPress Credentials, AWS Keys A year-long cyber campaign, …

: Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks A new phishing …

: Uncovering GStreamer secrets - The GitHub Blog Antonio Morales discovered 29 vulnerabilities in …

: Texas Tech University Data Breach Impacts 1.4 Million People - SecurityWeek Texas Tech University …

: Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware The Bitter APT group, …

: Unveiling India’s Cyber Threat Landscape: Data, Trends, and Resilience - SOCRadar® Cyber …

: The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal The Mask APT, a …

: The Domino Effect of Cyber Incidents: Understanding the Ripple Impact of Cybersecurity Breaches - …

: CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign CISA and the FBI have …

: 27 DDoS-for-hire operations shut down by law enforcement | Security Magazine Law enforcement …

: European Union Sanctions Russian Malicious Cyber Actors The European Union sanctioned Russian …

: Winnti-Like Glutton Backdoor Targets Cybercriminals A new PHP-based backdoor, “Glutton,” is …

: Dirty DAG: New Vulnerabilities in Azure Data Factory’s Apache Airflow Integration Unit 42 …

: Cicada3301 Ransomware Claims Attack on French Peugeot Dealership Cicada3301, a ransomware group …

: Fourteen North Korean Nationals Indicted for Carrying Out Multi-Year Fraudulent Information …

: Black Hat Europe 2024: Key takeaways for cybersecurity pros | CSO Online Black Hat Europe 2024 …

: CVE-2024-53677 - Vulnerability impacting Apache Struts 2 - Canadian Centre for Cyber Security A …

: Ubuntu security advisory (AV24-718) - Canadian Centre for Cyber Security Ubuntu published security …

: EU issues first-ever sanctions over ‘Russian hybrid threats’ - The Cyber Post The European Council …

: IBM security advisory (AV24-717) - Canadian Centre for Cyber Security IBM published security …

: Android Zero-Day Exploited in Spyware Campaigns, Amnesty International Points to Cellebrite - …

: Vulnerability Summary for the Week of December 9, 2024 | CISA The CISA Vulnerability Bulletin …

: Microsoft Teams Vishing Spreads DarkGate RAT A new attack vector for the DarkGate remote access …

: A defender’s guide to identity attacks | Red Canary Identity attacks target authentication and …

: Citrix Warns of Password Spraying Attacks Targeting NetScaler Appliances - SecurityWeek Citrix warns …

: Dell security advisory (AV24-715) - Canadian Centre for Cyber Security Dell published security …

: DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages A malvertising …

: HPE security advisory (AV24-714) - Canadian Centre for Cyber Security HPE published security …

: 2024 Threat Landscape Statistics: Ransomware Activity, Vulnerability Exploits, and Attack Trends | …

: Major Auto Parts Firm LKQ Hit by Cyberattack - SecurityWeek LKQ Corporation, a major US auto parts …

: SRP Federal Credit Union Ransomware Attack Impacts 240,000 - SecurityWeek SRP Federal Credit Union …

: Rydox cybercrime marketplace seixed by law enforcement, suspected admins arrested Rydox, a …

: CVE Assigned to Cleo Vulnerability as Cl0p Ransomware Group Takes Credit for Exploitation - …

: Evasive Node.js loader masquerading as game hack - Help Net Security Malware peddlers are using …

: 900,000 People Impacted by ConnectOnCall Data Breach - SecurityWeek ConnectOnCall, a digital on-call …

: Security ProbLLMs in xAI’s Grok: A Deep Dive · Embrace The Red Grok, xAI’s chatbot, is …

: Amazon refuses Microsoft 365 deployment because of lax cybersecurity | CSO Online Amazon has halted …

: Rhode Island suffers major cyberattack, exposing personal data of thousands | CSO Online Rhode …

: CISA Requests Public Comment for Draft National Cyber Incident Response Plan Update | CISA CISA …

: New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide A new investment …

: Cybersecurity In 2025 – A New Era Of Complexity The cybersecurity landscape in 2025 will be shaped …

: Dark market overview and predictions for 2025 | Securelist In 2024, predictions about the growth of …

: Security experts respond to Krispy Kreme cyber attack | Security Magazine Krispy Kreme experienced a …

: The Top 10 State of Security Blog Posts From 2024 | Tripwire This year’s top cybersecurity blog …

: New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP Cybersecurity …

: Multiple flaws in Volkswagen Group’s infotainment unit allow for vehicle compromise …

: LW ROUNDTABLE: Lessons learned from the headline-grabbing cybersecurity incidents of 2024 - The Last …

: Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes The Security …

: Cellebrite Unlocked This Journalist’s Phone. Cops Then Infected it With Malware Authorities in …

: Security leaders top 10 takeaways for 2024 | CSO Online CISOs reflect on the security landscape in …

: ESET: RansomHub most active ransomware group in H2 2024 | TechTarget ESET’s Threat Report H2 2024 …

: Malicious ad distributes SocGholish malware to Kaiser Permanente employees | Malwarebytes A …

: Securing Against Shopping Scams: Cybersecurity Risks to Avoid During the Holidays - Cybersecurity …

: PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms  Elastic Security Lab …