Port 22

Trump 2.0 Brings Cuts to Cyber, Consumer Protections
February 23, 2025

One month into his second term, President Trump’s actions to shrink the government through mass layoffs, firings and withholding funds allocated by Congress have thrown federal cybersecurity and consumer protection programs into disarray. At the same time, agencies are battling an ongoing effort by the world’s richest man to wrest control over their networks and data.

Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack
February 22, 2025

Cryptocurrency exchange Bybit on Friday revealed that a “sophisticated” attack led to the theft of over $1.46 billion worth of cryptocurrency from one of its Ethereum cold (offline) wallets, making it the largest ever single crypto heist in history. “The incident occurred when our ETH multisig cold wallet executed a transfer to our warm wallet. Unfortunately, this transaction was manipulated

OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns
February 22, 2025

OpenAI on Friday revealed that it banned a set of accounts that used its ChatGPT tool to develop a suspected artificial intelligence (AI)-powered surveillance tool. The social media listening tool is said to likely originate from China and is powered by one of Meta’s Llama models, with the accounts in question using the AI company’s models to generate detailed descriptions and analyze documents

Apple Drops iCloud's Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands
February 21, 2025

Apple is removing its Advanced Data Protection (ADP) feature for iCloud from the United Kingdom with immediate effect following government demands for backdoor access to encrypted user data. The development was first reported by Bloomberg. ADP for iCloud is an optional setting that ensures that users’ trusted devices retain sole access to the encryption keys used to unlock data stored in its

Data Leak Exposes TopSec's Role in Chinas Censorship-as-a-Service Operations
February 21, 2025

An analysis of a data leak from a Chinese cybersecurity company TopSec has revealed that it likely offers censorship-as-a-service solutions to prospective customers, including a state-owned enterprise in the country. Founded in 1995, TopSec ostensibly offers services such as Endpoint Detection and Response (EDR) and vulnerability scanning. But it’s also providing “boutique” solutions in order

Cybercriminals Can Now Clone Any Brands Site in Minutes Using Darcula PhaaS v3
February 21, 2025

The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying a new version that allows prospective customers and cyber crooks to clone any brand’s legitimate website and create a phishing version, further bringing down the technical expertise required to pull off phishing attacks at scale. The latest iteration of the phishing suite “represents a significant

Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025
February 21, 2025

In todays rapidly evolving digital landscape, weak identity security isnt just a flawits a major risk that can expose your business to breaches and costly downtime. Many organizations are overwhelmed by an excess of user identities and aging systems, making them vulnerable to attacks. Without a strategic plan, these security gaps can quickly turn into expensive liabilities. Join us for "

AI-Powered Deception is a Menace to Our Societies
February 21, 2025

Wherever there’s been conflict in the world, propaganda has never been far away. Travel back in time to 515 BC and read the Behistun Inscription, an autobiography by Persian King Darius that discusses his rise to power. More recently, see how different newspapers report on wars, where it’s said, ‘The first casualty is the truth.’  While these forms of communication

Truth in Transition: Disinformation in Post-Assad Syria
February 21, 2025

In an opinion piece in the Tahrir Institute for Middle East Policy, Noura Aljizawi, senior researcher at The Citizen Lab, sheds light on the growing threat of disinformation in Syria, even after the fall of Bashar al-Assad’s regime. While the end of Assad’s authoritarian rule was celebrated as a victory, Aljizawi warns that disinformation—once the… Read more »

Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks
February 21, 2025

Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login credentials as part of a targeted campaign aimed at major U.S. telecommunications companies. “The threat actor then demonstrated their ability to persist in target environments across equipment from multiple

CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks
February 21, 2025

A high-severity security flaw impacting the Craft content management system (CMS) has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-23209 (CVSS score: 8.1), which impacts Craft CMS versions 4 and 5. It was addressed by the

Angry Likho: Old beasts in a new forest
February 21, 2025

Kaspersky experts analyze the Angry Likho APT group’s attacks, which use obfuscated AutoIt scripts and the Lumma stealer for data theft.

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware
February 20, 2025

Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North Korea, has been codenamed DeceptiveDevelopment, which overlaps with clusters tracked under the names Contagious Interview (aka CL-STA-0240), DEV#POPPER, Famous Chollima,

Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware
February 20, 2025

A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases. The campaign, codenamed Green Nailao by Orange Cyberdefense CERT, involved the exploitation of a new-patched security flaw

PCI DSS 4.0 Mandates DMARC By 31st March 2025
February 20, 2025

The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025, DMARC implementation will be mandatory! This requirement highlights the importance of preventative measures against email fraud, domain spoofing, and phishing in the financial space. This is not an optional requirement as non-compliance may result in monetary

Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
February 20, 2025

A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. “The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation,” the AhnLab SEcurity Intelligence Center (ASEC)

Microsoft's End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now
February 20, 2025

For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether deployed on-premises or in hybrid environments, companies of all sizes rely on Exchange for seamless internal and external communication, often integrating it deeply with their workflows, compliance policies and security frameworks

Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability
February 20, 2025

Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent that could lead to privilege escalation under certain conditions. The vulnerability, tracked as CVE-2024-12284, has been given a CVSS v4 score of 8.8 out of a maximum of 10.0 It has been described as a case of improper privilege management that could

Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability
February 20, 2025

Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages, including one that has come under active exploitation in the wild. The vulnerabilities are listed below -

CVE-2025-21355 (CVSS score: 8.6) - Microsoft Bing Remote Code Execution Vulnerability CVE-2025-24989 (CVSS score: 8.2) - Microsoft Power Pages Elevation of Privilege Vulnerability

"

Managed detection and response in 2024
February 20, 2025

The Kaspersky Managed Detection and Response report includes trends and statistics based on incidents identified and mitigated by Kaspersky’s SOC team in 2024.

Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR Codes
February 19, 2025

Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts. “The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app’s legitimate ’linked devices’ feature that enables Signal to be used on multiple

New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection
February 19, 2025

A new variant of the Snake Keylogger malware is being used to actively target Windows users located in China, Turkey, Indonesia, Taiwan, and Spain. Fortinet FortiGuard Labs said the new version of the malware has been behind over 280 million blocked infection attempts worldwide since the start of the year. “Typically delivered through phishing emails containing malicious attachments or links,

The Ultimate MSP Guide to Structuring and Selling vCISO Services
February 19, 2025

The growing demand for cybersecurity and compliance services presents a great opportunity for Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) to offer virtual Chief Information Security Officer (vCISO) servicesdelivering high-level cybersecurity leadership without the cost of a full-time hire. However, transitioning to vCISO services is not without its challenges

Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack
February 19, 2025

Users who are on the lookout for popular games were lured into downloading trojanized installers that led to the deployment of a cryptocurrency miner on compromised Windows hosts. The large-scale activity has been codenamed StaryDobry by Russian cybersecurity company Kaspersky, which first detected it on December 31, 2024. It lasted for a month. Targets of the campaign include individuals and

Spam and phishing in 2024
February 19, 2025

We analyze 2024’s key spam and phishing statistics and trends: the hunt for crypto wallets, Hamster Kombat, online promotions via neural networks, fake vacation schedules, and more.

CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List
February 19, 2025

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The flaws are listed below -

CVE-2025-0108 (CVSS score: 7.8) - An authentication bypass vulnerability in the Palo Alto Networks PAN-OS

How Phished Data Turns into Apple & Google Wallets
February 18, 2025

Carding – the underground business of stealing, selling and swiping stolen payment card data – has long been the dominion of Russia-based hackers. Happily, the broad deployment of more secure chip-based payment cards in the United States has weakened the carding market. But a flurry of innovation from cybercrime groups in China is breathing new life into the carding industry, by turning phished card data into mobile wallets that can be used online and at main street stores.

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks Patch Now
February 18, 2025

Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite that, if successfully exploited, could result in an active machine-in-the-middle (MitM) and a denial-of-service (DoS) attack, respectively, under certain conditions. The vulnerabilities, detailed by the Qualys Threat Research Unit (TRU), are listed below -

CVE-2025-26465 - The OpenSSH client

Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks
February 18, 2025

The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to evade detection and maintain control over infected systems. This involves the use of a legitimate Microsoft Windows utility called Microsoft Application Virtualization Injector (MAVInject.exe) to inject the threat actor’s malicious payload into an external process, waitfor.exe,

Q&A with Ron Deibert and Carine Kanimba in Digital Front Lines
February 18, 2025

In a Q&A for the Digital Front Lines report by Foreign Policy Analytics, The Citizen Lab director Ron Deibert and human rights activist Carine Kanimba talk about the psychological impact of being targeted by mercenary spyware and the growing threat of surveillance technologies being misused by both state and non-state actors. They discuss how spyware… Read more »

New FrigidStealer Malware Targets macOS Users via Fake Browser Updates
February 18, 2025

Cybersecurity researchers are alerting to a new campaign that leverages web injects to deliver a new Apple macOS malware known as FrigidStealer. The activity has been attributed to a previously undocumented threat actor known as TA2727, with the information stealers for other platforms such as Windows (Lumma Stealer or DeerStealer) and Android (Marcher). TA2727 is a “threat actor that uses fake

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication
February 18, 2025

Juniper Networks has released security updates to address a critical security flaw impacting Session Smart Router, Session Smart Conductor, and WAN Assurance Router products that could be exploited to hijack control of susceptible devices. Tracked as CVE-2025-21589, the vulnerability carries a CVSS v3.1 score of 9.8 and a CVS v4 score of 9.3. “An Authentication Bypass Using an Alternate Path or

Debunking the AI Hype: Inside Real Hacker Tactics
February 18, 2025

Is AI really reshaping the cyber threat landscape, or is the constant drumbeat of hype drowning out actual, more tangible, real-world dangers? According to Picus Labs Red Report 2025 which analyzed over one million malware samples, there’s been no significant surge, so far, in AI-driven attacks. Yes, adversaries are definitely continuing to innovate, and while AI will certainly start playing a

Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign
February 18, 2025

The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024. The activity, detailed by Japanese cybersecurity company LAC, overlaps with a threat cluster tracked by Trend Micro as Earth Freybug, which has been assessed to be a subset within the APT41

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials
February 18, 2025

Security vulnerabilities have been disclosed in Xerox VersaLink C7025 Multifunction printers (MFPs) that could allow attackers to capture authentication credentials via pass-back attacks via Lightweight Directory Access Protocol (LDAP) and SMB/FTP services. “This pass-back style attack leverages a vulnerability that allows a malicious actor to alter the MFP’s configuration and cause the MFP

Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers
February 18, 2025

Cybersecurity researchers have flagged a credit card stealing malware campaign that has been observed targeting e-commerce sites running Magento by disguising the malicious content within image tags in HTML code in order to stay under the radar. MageCart is the name given to a malware that’s capable of stealing sensitive payment information from online shopping sites. The attacks are known to

Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics
February 17, 2025

Microsoft said it has discovered a new variant of a known Apple macOS malware called XCSSET as part of limited attacks in the wild. “Its first known variant since 2022, this latest XCSSET malware features enhanced obfuscation methods, updated persistence mechanisms, and new infection strategies,” the Microsoft Threat Intelligence team said in a post shared on X. “These enhanced features add to

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations
February 17, 2025

South Korea has formally suspended new downloads of Chinese artificial intelligence (AI) chatbot DeepSeek in the country until the service makes changes to its mobile apps to comply with data protection regulations. Downloads have been paused as of February 15, 2025, 6:00 p.m. local time, the Personal Information Protection Commission (PIPC) said in a statement. The web service remains

CISO's Expert Guide To CTEM And Why It Matters
February 17, 2025

Cyber threats evolvehas your defense strategy kept up? A new free guide available here explains why Continuous Threat Exposure Management (CTEM) is the smart approach for proactive cybersecurity. This concise report makes a clear business case for why CTEMs comprehensive approach is the best overall strategy for shoring up a businesss cyber defenses in the face of evolving attacks. It also

THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More
February 17, 2025

Welcome to this weeks Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake codes and sneaky emails to gain access to sensitive data. We cover everything from device code phishing to cloud exploits, breaking down the technical details into simple, easy-to-follow insights. Threat of the Week Russian Threat Actors Leverage Device Code Phishing to Hack

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations
February 17, 2025

Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism for command-and-control (C2) communications. Netskope Threat Labs, which detailed the functions of the malware, described it as possibly of Russian origin. “The malware is compiled in Golang and once executed it acts like a backdoor,” security researcher Leandro Fres said in an analysis

The Official DOGE Website Launch Was a Security Mess
February 15, 2025

Plus: Researchers find RedNote lacks basic security measures, surveillance ramps up around the US-Mexico border, and the UK ordering Apple to create an encryption backdoor comes under fire.

Page 1 of 242 Older Posts →