CSO Online
Dark Reading
Dark Web Informer
Europol
Krebs on Security
NSA
Reuters
Security Affairs
The Hacker News
Wired
ZDNET
Trump Revenge Tour Targets Cyber Leaders, Elections
Tue Apr 15 2025
President Trump last week revoked security clearances for Chris Krebs, the former director of the Cybersecurity and Infrastructure Security Agency (CISA) who was fired by Trump after declaring the 2020 election the most secure in U.S. history. The White House memo, which also suspended clearances for other security professionals at Krebs's employer SentinelOne, comes as CISA is facing huge funding and staffing cuts.
Krebs on Security
New malware ‘ResolverRAT’ targets healthcare, pharmaceutical firms
Mon Apr 14 2025
New malware ‘ResolverRAT’ is targeting healthcare and pharmaceutical firms, using advanced capabilities to steal sensitive data. Morphisec researchers discovered a new malware dubbed ‘ResolverRAT’ that is targeting healthcare and pharmaceutical firms, using advanced capabilities to steal sensitive data. ResolverRAT spreads via phishing emails using localized languages and legal lures. Victims download a malicious file triggering […]
Security Affairs

OT-Security: Warum der Blick auf Open Source lohnt
Tue Apr 15 2025
Auch im OT-Security-Bereich stellen Open-Source-Lösungen eine kostengünstige Alternative zu kommerziellen Tools dar.
CSO Online

Microsoft’s Recall AI Tool Is Making an Unwelcome Return
Mon Apr 14 2025
Microsoft held off on releasing the privacy-unfriendly feature after a swell of pushback last year. Now it’s trying again, with a few improvements that skeptics say still aren't enough.
Wired

ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading
Mon Apr 14 2025
Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in attacks targeting healthcare and pharmaceutical sectors. "The threat actor leverages fear-based lures delivered via phishing emails, designed to pressure recipients into clicking a malicious link," Morphisec Labs researcher Nadav Lorber said in a report shared with The...
The Hacker News
Malicious NPM packages target PayPal users
Mon Apr 14 2025
Threat actors deploy malicious NPM packages to steal PayPal credentials and hijack cryptocurrency transfers. Fortinet researchers discovered multiple malicious NPM packages that are used to target PayPal users. The packages were uploaded to the repository in early March by a threat actor known as tommyboy_h1 and tommyboy_h2, and were used to steal PayPal credentials and hijack cryptocurrency transfers. “Using PayPal-related […]
Security Affairs

Kritik an OpenAI: Experten warnen vor verkürzten Sicherheitstests
Mon Apr 14 2025
OpenAI hat offenbar seine Sicherheitstests verkürzt.
CSO Online

Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft
Mon Apr 14 2025
Cybersecurity researchers are calling attention to a new type of credential phishing scheme that ensures that the stolen information is associated with valid online accounts. The technique has been codenamed precision-validating phishing by Cofense, which it said employs real-time email validation so that only a select set of high-value targets are served the fake login screens. "This tactic not...
The Hacker News

AI hallucinations lead to a new cyber threat: Slopsquatting
Mon Apr 14 2025
Cybersecurity researchers are warning of a new type of supply chain attack, Slopsquatting, induced by a hallucinating generative AI model recommending non-existent dependencies.
CSO Online

⚡ Weekly Recap: Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and More
Mon Apr 14 2025
Attackers aren’t waiting for patches anymore — they are breaking in before defenses are ready. Trusted security tools are being hijacked to deliver malware. Even after a breach is detected and patched, some attackers stay hidden. This week’s events show a hard truth: it’s not enough to react after an attack. You have to assume that any system you trust today could fail tomorrow. In a world...
The Hacker News

Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind
Mon Apr 14 2025
AI is changing cybersecurity faster than many defenders realize. Attackers are already using AI to automate reconnaissance, generate sophisticated phishing lures, and exploit vulnerabilities before security teams can react. Meanwhile, defenders are overwhelmed by massive amounts of data and alerts, struggling to process information quickly enough to identify real threats. AI offers a way to...
The Hacker News

Black Basta: The Fallen Ransomware Gang That Lives On
Mon Apr 14 2025
After a series of setbacks, the notorious Black Basta ransomware gang went underground. Researchers are bracing for its probable return in a new form.
Wired

CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide
Mon Apr 14 2025
Despite their hacktivist front, CyberAv3ngers is a rare state-sponsored hacker group bent on putting industrial infrastructure at risk—and has already caused global disruption.
Wired

Smishing Triad: The Scam Group Stealing the World’s Riches
Mon Apr 14 2025
Millions of scam text messages are sent every month. The Chinese cybercriminals behind many of them are expanding their operations—and quickly innovating.
Wired

Gamaredon: The Turncoat Spies Relentlessly Hacking Ukraine
Mon Apr 14 2025
For the past decade, this group of FSB hackers—including “traitor” Ukrainian intelligence officers—has used a grinding barrage of intrusion campaigns to make life hell for their former countrymen and cybersecurity defenders.
Wired

The Most Dangerous Hackers You’ve Never Heard Of
Mon Apr 14 2025
From crypto kingpins to sophisticated scammers, these are the lesser-known hacking groups that should be on your radar.
Wired

Brass Typhoon: The Chinese Hacking Group Lurking in the Shadows
Mon Apr 14 2025
Though less well-known than groups like Volt Typhoon and Salt Typhoon, Brass Typhoon, or APT 41, is an infamous, longtime espionage actor that foreshadowed recent telecom hacks.
Wired

TraderTraitor: The Kings of the Crypto Heist
Mon Apr 14 2025
Allegedly responsible for the theft of $1.5 billion in cryptocurrency from a single exchange, North Korea’s TraderTraitor is one of the most sophisticated cybercrime groups in the world.
Wired
Tycoon2FA phishing kit rolled out significant updates
Mon Apr 14 2025
The operators of the Phishing-as-a-Service (PhaaS) platform Tycoon2FA have rolled out significant updates to enhance its evasion capabilities. Tycoon2FA, a phishing kit discovered in 2023 by cybersecurity firm Sekoia, was recently updated to improve its evasion capabilities. The phishing kit now uses advanced evasion tactics such as a custom CAPTCHA via HTML5 canvas, invisible Unicode […]
Security Affairs

How not to hire a North Korean IT spy
Mon Apr 14 2025
CISOs looking for new IT hires already struggle with talent market shortages and bridging cybersecurity skills gaps.
CSO Online

Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT
Mon Apr 14 2025
A threat actor with ties to Pakistan has been observed targeting various sectors in India with various remote access trojans like Xeno RAT, Spark RAT, and a previously undocumented malware family called CurlBack RAT. The activity, detected by SEQRITE in December 2024, targeted Indian entities under railway, oil and gas, and external affairs ministries, marking an expansion of the hacking crew's...
The Hacker News

What boards want and don’t want to hear from cybersecurity leaders
Mon Apr 14 2025
Successfully engaging with the board may not make or break a CISO’s career, but it’s becoming an increasingly important skill — particularly as risk-conscious boards seek strategic security insights.
CSO Online
South African telecom provider Cell C disclosed a data breach following a cyberattack
Mon Apr 14 2025
Cell C, one of the biggest telecom providers in South Africa confirms a data breach following a 2024 cyberattack. Cell C is the fourth-largest mobile network operator in South Africa, ,after Vodacom, MTN, and Telkom. The company founded in 2001 offers prepaid and postpaid mobile plans, data bundles and internet services, fiber broadband, roaming and […]
Security Affairs
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 41
Sun Apr 13 2025
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Lazarus Expands Malicious npm Campaign: 11 New Packages Add Malware Loaders and Bitbucket Payloads BadBazaar: iOS and Android Surveillanceware by China’s APT15 Used to Target Tibetans and Uyghurs GOFFEE continues to attack organizations in Russia Atomic […]
Security Affairs
Security Affairs newsletter Round 519 by Pierluigi Paganini – INTERNATIONAL EDITION
Sun Apr 13 2025
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Symbolic Link trick lets attackers bypass FortiGate patches, Fortinet warns Attackers are exploiting recently disclosed OttoKit WordPress plugin flaw […]
Security Affairs
China admitted its role in Volt Typhoon cyberattacks on U.S. infrastructure
Sun Apr 13 2025
China admitted in a secret meeting with U.S. officials that it conducted Volt Typhoon cyberattacks on U.S. infrastructure, WSJ reports. China reportedly admitted in a secret meeting with U.S. officials that it carried out cyberattacks on U.S. infrastructure, linked to the Volt Typhoon campaign. According to the Wall Street Journal, at a December Geneva summit, […]
Security Affairs
Symbolic Link trick lets attackers bypass FortiGate patches, Fortinet warns
Sat Apr 12 2025
Fortinet warns attackers can keep read-only access to FortiGate devices even after the original vulnerability is patched. Fortinet warns that threat actors can retain read-only access to FortiGate devices even after the original vulnerability used for the breach has been patched. The cybersecurity firm revealed that attackers exploited known FortiGate flaws like CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762 to […]
Security Affairs
Attackers are exploiting recently disclosed OttoKit WordPress plugin flaw
Sat Apr 12 2025
Threat actors are exploiting a vulnerability in the OttoKit WordPress plugin, a few hours after public disclosure. Threat actors are exploiting a recently discovered vulnerability, tracked as CVE-2025-3102 (CVSS score of 8.1) in the OttoKit WordPress plugin (formerly SureTriggers), a few hours after public disclosure. An attacker can trigger the vulnerability to create malicious administrator users when the plugin is not […]
Security Affairs

GenAI-Security als Checkliste
Mon Apr 14 2025
Das Open Web Application Security Project (OWASP) gibt Unternehmen eine Checkliste für (mehr) GenAI-Sicherheit an die Hand.
CSO Online
Homeland Security Email Tells a US Citizen to ‘Immediately’ Self-Deport
Sun Apr 13 2025
An email sent by the Department of Homeland Security instructs people in the US on a temporary legal status to leave the country. But who the email actually applies to—and who actually received it—is far from clear.
Wired

China Secretly (and Weirdly) Admits It Hacked US Infrastructure
Sat Apr 12 2025
Plus: The Department of Homeland Security begins surveilling immigrants' social media, President Donald Trump targets former CISA director who refuted his claims of 2020 election fraud, and more.
Wired
Laboratory Services Cooperative data breach impacts 1.6 Million People
Fri Apr 11 2025
Laboratory Services Cooperative discloses a data breach from October 2024 that exposed personal and medical info of 1.6 million individuals. Laboratory Services Cooperative disclosed a data breach that impacted the personal and medical information of 1.6 million people. The Laboratory Services Cooperative (LSC) is a clinical laboratory based in Bremerton, Washington, providing diagnostic testing services […]
Security Affairs
Palo Alto warns of brute-force login attempts on PAN-OS GlobalProtect gateways indicating possible upcoming attacks
Fri Apr 11 2025
Experts warn of brute-force login attempts on PAN-OS GlobalProtect gateways following increased scanning activity on its devices. Palo Alto Networks reports brute-force login attempts on PAN-OS GlobalProtect gateways. The security firm pointed out that no known vulnerability has been exploited, but monitoring and analysis continue. “Our teams are observing evidence of activity consistent with password-related […]
Security Affairs

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit
Fri Apr 11 2025
Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used to breach the devices was patched. The attackers are believed to have leveraged known and now-patched security flaws, including, but not limited to, CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762. "A threat actor used a known...
The Hacker News

Passwörter deutscher Politiker im Darknet aufgetaucht
Fri Apr 11 2025
Forscher haben Zugangsdaten von 241 deutschen Landtagsabgeordneten im Darknet entdeckt.
CSO Online

Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors
Fri Apr 11 2025
The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul. The activity, which took place between July and December 2024, singled out organizations in the mass media, telecommunications, construction, government entities, and energy sectors, Kaspersky said in a new report published Thursday. Paper Werewolf, also known...
The Hacker News

OpenAI slammed for putting speed over safety
Fri Apr 11 2025
OpenAI, the AI research powerhouse with popular projects like the GPT series, Codec, DALL-E, and Whisper, might be rushing through its AI deployment without adequate protections.
CSO Online

Initial Access Brokers Shift Tactics, Selling More for Less
Fri Apr 11 2025
What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that access to other cybercriminals. This division of labor allows IABs to concentrate on their core expertise: exploiting vulnerabilities through methods like social engineering and brute-force attacks. By selling access, they significantly mitigate the...
The Hacker News

Sex-Fantasy Chatbots Are Leaking a Constant Stream of Explicit Messages
Fri Apr 11 2025
Some misconfigured AI chatbots are pushing people’s chats to the open web—revealing sexual prompts and conversations that include descriptions of child sexual abuse.
Wired
Gamaredon targeted the military mission of a Western country based in Ukraine
Fri Apr 11 2025
Gamaredon targeted a foreign military mission in Ukraine with updated GammaSteel malware on Feb 26, 2025, per Symantec. Symantec Threat Hunter researchers reported that the Russia-linked APT group Gamaredon (a.k.a. Shuckworm, Armageddon, Primitive Bear, ACTINIUM, Callisto) targeted a foreign military mission based in Ukraine with an updated version of the GamaSteel infostealer. Shuckworm is known for targeting government, […]
Security Affairs

Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways
Fri Apr 11 2025
Palo Alto Networks has revealed that it's observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after threat hunters warned of a surge in suspicious login scanning activity targeting its appliances. "Our teams are observing evidence of activity consistent with password-related attacks, such as brute-force login attempts, which does not indicate exploitation of a...
The Hacker News

SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps
Fri Apr 11 2025
Cybersecurity researchers have found that threat actors are setting up deceptive websites hosted on newly registered domains to deliver a known Android malware called SpyNote. These bogus websites masquerade as Google Play Store install pages for apps like the Chrome web browser, indicating an attempt to deceive unsuspecting users into installing the malware instead. "The threat actor utilized a...
The Hacker News

You’re always a target, so it pays to review your cybersecurity insurance
Fri Apr 11 2025
Any enterprise that is connected to the internet (so, all of them) is at any given time either the direct target of a cyberattacker or at least perpetually in danger of becoming an inadvertent casualt
CSO Online

OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation
Fri Apr 11 2025
A newly disclosed high-severity security flaw impacting OttoKit (formerly SureTriggers) has come under active exploitation within a few hours of public disclosure. The vulnerability, tracked as CVE-2025-3102 (CVSS score: 8.1), is an authorization bypass bug that could permit an attacker to create administrator accounts under certain conditions and take control of susceptible websites. "The...
The Hacker News

10 Essentials für die KI-Richtlinie in Unternehmen
Fri Apr 11 2025
Unternehmen müssen laut Experten verstehen, was KI im Kontext des Unternehmens bedeutet, egal ob es um die Einhaltung von Vorschriften oder die Rolle Dritter geht.
CSO Online

Russian Shuckworm APT is back with updated GammaSteel malware
Thu Apr 10 2025
A cyberespionage group of Russian origin that has targeted entities from Ukraine, or from countries that are helping Ukraine, has recently launched an attack against the military of a Western nation u
CSO Online
U.S. CISA adds Linux Kernel flaws to its Known Exploited Vulnerabilities catalog
Thu Apr 10 2025
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Linux Kernel flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Linux Kernel flaws, respectively tracked as CVE-2024-53197 and CVE-2024-53150, to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability CVE-2024-53197 (CVSS score of 7.8) resides in the Linux kernel’s ALSA USB-audio driver affecting Extigy […]
Security Affairs
China-based SMS Phishing Triad Pivots to Banks
Thu Apr 10 2025
China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently, the so-called “Smishing Triad” mainly impersonated toll road operators and shipping companies. But experts say these groups are now directly targeting customers of international financial institutions, while dramatically expanding their cybercrime infrastructure and support staff.
Krebs on Security
AkiraBot: AI-Powered spam bot evades CAPTCHA to target 80,000+ websites
Thu Apr 10 2025
AkiraBot, a CAPTCHA-evading Python framework, has spammed over 80,000 websites with AI-generated messages, targeting small and medium-sized businesses. SentinelOne’s SentinelLabs researchers warn that AkiraBot, a spam framework, targets websites’ chats and contact forms to promote low-quality SEO services, AkiraBot has already targeted more than 400,000 websites and successfully spammed at least 80,000 websites since September […]
Security Affairs

Oracle admits breach of ‘obsolete servers,’ denies main cloud platform affected
Thu Apr 10 2025
Oracle has continued to downplay a data breach it suffered earlier this year, insisting in an email sent to customers this week that the hack did not involve its core platform, Oracle Cloud Infrastruc
CSO Online

Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes
Thu Apr 10 2025
Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE-2024-0132 (CVSS score: 9.0) is a Time-of-Check Time-of-Use (TOCTOU) vulnerability that could lead to a container escape attack and allow for...
The Hacker News

Hackers target SSRF flaws to steal AWS credentials
Thu Apr 10 2025
In a new campaign, threat actors have been trying to access EC2 Instance Metadata, which consists of sensitive virtual server information like IP address, instance ID, and security credentials by expl
CSO Online

Fortinet embeds AI capabilities across Security Fabric platform
Thu Apr 10 2025
Fortinet has expanded support for AI across its core cybersecurity platform to protect enterprise customers from evolving threats and simplify network and security operations.
CSO Online

Malicious npm Package Targets Atomic Wallet, Exodus Users by Swapping Crypto Addresses
Thu Apr 10 2025
Threat actors are continuing to upload malicious packages to the npm registry so as to tamper with already-installed local versions of legitimate libraries and execute malicious code in what's seen as a sneakier attempt to stage a software supply chain attack. The newly discovered package, named pdf-to-office, masquerades as a utility for converting PDF files to Microsoft Word documents. But, in...
The Hacker News

Ransomware-Attacken stoßen in Windows-Lücke
Thu Apr 10 2025
srcset="https://b2b-contenthub.
CSO Online

CISA under review: Trump memo spurs scrutiny and uncertainty
Thu Apr 10 2025
The Trump administration has issued a directive against Christopher Krebs, the founding director and former head of the Cybersecurity and Infrastructure Security Agency (CISA) for weaponizing and abus
CSO Online

Why Codefinger represents a new stage in the evolution of ransomware
Thu Apr 10 2025
If you didn’t pay much attention to news of the recent Codefinger ransomware attack, it’s probably because ransomware has become so prevalent that major incidents no longer feel notable.
CSO Online

PlayPraetor Reloaded: CTM360 Uncovers a Play Masquerading Party
Thu Apr 10 2025
Overview of the PlayPraetor Masquerading Party Variants CTM360 has now identified a much larger extent of the ongoing Play Praetor campaign. What started with 6000+ URLs of a very specific banking attack has now grown to 16,000+ with multiple variants. This research is ongoing, and much more is expected to be discovered in the coming days. As before, all the newly discovered play...
The Hacker News
An APT group exploited ESET flaw to execute malware
Thu Apr 10 2025
At least one APT group has exploited a vulnerability in ESET software to stealthily execute malware, bypassing security measures. Kaspersky researchers reported that an APT group, tracked as ToddyCat, has exploited a vulnerability in ESET software to stealthily execute malware, bypassing security. The vulnerability, tracked as CVE-2024-11859, is a DLL Search Order Hijacking issue that potentially allow […]
Security Affairs

The Identities Behind AI Agents: A Deep Dive Into AI & NHI
Thu Apr 10 2025
AI agents have rapidly evolved from experimental technology to essential business tools. The OWASP framework explicitly recognizes that Non-Human Identities play a key role in agentic AI security. Their analysis highlights how these autonomous software entities can make decisions, chain complex actions together, and operate continuously without human intervention. They're no longer just tools,...
The Hacker News

Gamaredon Uses Infected Removable Drives to Breach Western Military Mission in Ukraine
Thu Apr 10 2025
The Russia-linked threat actor known as Gamaredon (aka Shuckworm) has been attributed to a cyber attack targeting a foreign military mission based in Ukraine with an aim to deliver an updated version of a known malware called GammaSteel. The group targeted the military mission of a Western country, per the Symantec Threat Hunter team, with first signs of the malicious activity detected on...
The Hacker News

Top 16 OffSec, pen-testing, and ethical hacking certifications
Thu Apr 10 2025
Red team careers are in high demand, with companies seeking professionals skilled in penetration testing, offensive security (OffSec), and ethical hacking.
CSO Online
Oracle confirms the hack of two obsolete servers hacked. No Oracle Cloud systems or customer data were affected
Thu Apr 10 2025
Oracle confirmed a hacker stole credentials from two obsolete servers but said no Oracle Cloud systems or customer data were affected. Oracle confirmed a hacker stole and leaked credentials from two obsolete servers, but said no Oracle Cloud systems or customer data were affected. The threat actor accessed usernames from two outdated, non-Oracle Cloud Infrastructure […]
Security Affairs

Europol Arrests Five SmokeLoader Clients Linked by Seized Database Evidence
Thu Apr 10 2025
Law enforcement authorities have announced that they tracked down the customers of the SmokeLoader malware and detained at least five individuals. "In a coordinated series of actions, customers of the Smokeloader pay-per-install botnet, operated by the actor known as 'Superstar,' faced consequences such as arrests, house searches, arrest warrants or 'knock and talks,'" Europol said in a...
The Hacker News

Trump revokes security clearances for Chris Krebs, SentinelOne in problematic precedent for security vendors
Thu Apr 10 2025
In an ominous development for the cybersecurity industry, US President Donald Trump revoked the security clearance of former Cybersecurity and Infrastructure Security Agency (CISA) Director Chris Kreb
CSO Online

AkiraBot Targets 420,000 Sites with OpenAI-Generated Spam, Bypassing CAPTCHA Protections
Thu Apr 10 2025
Cybersecurity researchers have disclosed details of an artificial intelligence (AI) powered platform called AkiraBot that's used to spam website chats, comment sections, and contact forms to promote dubious search engine optimization (SEO) services such as Akira and ServicewrapGO. "AkiraBot has targeted more than 400,000 websites and successfully spammed at least 80,000 websites since September...
The Hacker News
National Social Security Fund of Morocco Suffers Data Breach
Wed Apr 09 2025
Threat actor ‘Jabaroot’ claims breach of National Social Security Fund of Morocco, aiming to steal large volumes of sensitive citizen data. Resecurity has identified a threat actor targeting government systems in Morocco with the goal of exfiltrating large volumes of sensitive data relating to citizens. The actor using the alias ‘Jabaroot’ released claims about the […]
Security Affairs

Security-KPIs und -KRIs: So messen Sie Cybersicherheit
Thu Apr 10 2025
Cybersicherheit zu messen, ist kein Kinderspiel.
CSO Online

Targeted phishing gets a new hook with real-time email validation
Thu Apr 10 2025
Crooks behind some credential-stealing phishing campaigns are trying to increase their success rate by sophisticated targeting.
CSO Online

Spyware Maker NSO Group Is Paving a Path Back Into Trump’s America
Wed Apr 09 2025
The Israeli spyware maker, still on the US Commerce Department’s “blacklist,” has hired a new lobbying firm with direct ties to the Trump administration, a WIRED investigation has found.
Wired
Critical Fortinet FortiSwitch flaw allows remote attackers to change admin passwords
Wed Apr 09 2025
Fortinet addressed a critical vulnerability in its FortiSwitch devices that can be exploited to change administrator passwords remotely. Fortinet has released security updates to address a critical vulnerability, tracked as CVE-2024-48887 (CVSS score 9.8), in its FortiSwitch devices. A remote attacker can exploit the vulnerability to change administrator passwords. “An unverified password change vulnerability [CWE-620] […]
Security Affairs

Google launches unified enterprise security platform, announces AI security agents
Wed Apr 09 2025
Google has launched a new enterprise security platform called Google Unified Security that combines the company’s visibility, threat detection, and incident response capabilities and makes it availabl
CSO Online

Lovable AI Found Most Vulnerable to VibeScamming — Enabling Anyone to Build Live Scam Pages
Wed Apr 09 2025
Lovable, a generative artificial intelligence (AI) powered platform that allows for creating full-stack web applications using text-based prompts, has been found to be the most susceptible to jailbreak attacks, allowing novice and aspiring cybercrooks to set up lookalike credential harvesting pages. "As a purpose-built tool for creating and deploying web apps, its capabilities line up perfectly...
The Hacker News

WK Kellogg informiert über Datendiebstahl
Wed Apr 09 2025
Der für seine Cornflakes bekannte Lebensmittelkonzern WK Kellogg wurde um Daten beraubt.
CSO Online
The US Treasury’s OCC disclosed an undetected major email breach for over a year
Wed Apr 09 2025
The US Office of the Comptroller of the Currency (OCC) disclosed a major email breach compromising 100 accounts, undetected for over a year. The US Treasury’s Office of the Comptroller of the Currency (OCC) disclosed an undetected major email breach for over a year. The cybersecurity incident involved unauthorized access to emails via a compromised […]
Security Affairs
Whatsapp plugs bug allowing RCE with spoofed filenames
Wed Apr 09 2025
Meta is warning Whatsapp users of an issue affecting its Windows rollouts that could allow attackers to perform remote code execution (RCE) on systems running the vulnerable releases.
CSO Online
U.S. CISA adds Gladinet CentreStack and ZTA Microsoft Windows Common Log File System (CLFS) Driver flaws to its Known Exploited Vulnerabilities catalog
Wed Apr 09 2025
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Gladinet CentreStack and ZTA Microsoft Windows Common Log File System (CLFS) Driver flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Gladinet CentreStack and ZTA Microsoft Windows Common Log File System (CLFS) Driver flaws, respectively tracked as CVE-2025-30406 and CVE-2025-29824, to its […]
Security Affairs

Operation Endgame follow-up leads to five detentions and interrogations as well as server takedowns
Wed Apr 09 2025
Europol

New TCESB Malware Found in Active Attacks Exploiting ESET Security Scanner
Wed Apr 09 2025
A Chinese-affiliated threat actor known for its cyber-attacks in Asia has been observed exploiting a security flaw in security software from ESET to deliver a previously undocumented malware codenamed TCESB. "Previously unseen in ToddyCat attacks, [TCESB] is designed to stealthily execute payloads in circumvention of protection and monitoring tools installed on the device," Kaspersky said in an...
The Hacker News

Explosive Growth of Non-Human Identities Creating Massive Security Blind Spots
Wed Apr 09 2025
GitGuardian's State of Secrets Sprawl report for 2025 reveals the alarming scale of secrets exposure in modern software environments. Driving this is the rapid growth of non-human identities (NHIs), which have been outnumbering human users for years. We need to get ahead of it and prepare security measures and governance for these machine identities as they continue to be deployed, creating an...
The Hacker News

PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware
Wed Apr 09 2025
Microsoft has revealed that a now-patched security flaw impacting the Windows Common Log File System (CLFS) was exploited as a zero-day in ransomware attacks aimed at a small number of targets. "The targets include organizations in the information technology (IT) and real estate sectors of the United States, the financial sector in Venezuela, a Spanish software company, and the retail sector in...
The Hacker News

CISA Warns of CentreStack's Hard-Coded MachineKey Vulnerability Enabling RCE Attacks
Wed Apr 09 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting Gladinet CentreStack to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability, tracked as CVE-2025-30406 (CVSS score: 9.0), concerns a case of a hard-coded cryptographic key that could be abused to achieve remote...
The Hacker News

Microsoft Patches 125 Flaws Including Actively Exploited Windows CLFS Vulnerability
Wed Apr 09 2025
Microsoft has released security fixes to address a massive set of 125 flaws affecting its software products, including one vulnerability that it said has been actively exploited in the wild. Of the 125 vulnerabilities, 11 are rated Critical, 112 are rated Important, and two are rated Low in severity. Forty-nine of these vulnerabilities are classified as privilege escalation, 34 as remote code...
The Hacker News

Is HR running your employee security training? Here’s why that’s not always the best idea
Wed Apr 09 2025
In today’s fast-changing threat landscape, relying solely on human resources to deliver employee security training can leave an enterprise vulnerable.
CSO Online

Lessons learned about cyber resilience from a visit to Ukraine
Wed Apr 09 2025
During a visit to the recent Kyiv International Cyber Resilience Forum 2025 in Ukraine, I encountered a recurring theme across a plethora of speakers: always be flexible and keep your options open and
CSO Online

9 unverzichtbare Open Source Security Tools
Wed Apr 09 2025
Diese Open-Source-Tools adressieren spezifische Security-Probleme – mit minimalem Footprint.
CSO Online
Patch Tuesday, April 2025 Edition
Wed Apr 09 2025
Microsoft today released updates to plug at least 121 security holes in its Windows operating systems and software, including one vulnerability that is already being exploited in the wild. Eleven of those flaws earned Microsoft's most-dire "critical" rating, meaning malware or malcontents could exploit them with little to no interaction from Windows users.
Krebs on Security

Adobe Patches 11 Critical ColdFusion Flaws Amid 30 Total Vulnerabilities Discovered
Wed Apr 09 2025
Adobe has released security updates to fix a fresh set of security flaws, including multiple critical-severity bugs in ColdFusion versions 2025, 2023 and 2021 that could result in arbitrary file read and code execution. Of the 30 flaws in the product, 11 are rated Critical in severity - CVE-2025-24446 (CVSS score: 9.1) - An improper input validation vulnerability that could result in an...
The Hacker News

US bank regulator’s email system breached
Wed Apr 09 2025
A cyber intrusion at the US Office of the Comptroller of the Currency (OCC) is “massively serious” and comes at a time when “the good work done to improve cybersecurity in the US is under extraordinar
CSO Online

April Patch Tuesday news: Windows zero day being exploited, ‘big vulnerability’ in 2 SAP apps
Tue Apr 08 2025
A threat actor is exploiting a zero-day elevation of privileges vulnerability in the Windows Common Log File System to deploy ransomware, one of a number of critical holes Microsoft plugged today as p
CSO Online

Fortinet Urges FortiSwitch Upgrades to Patch Critical Admin Password Change Flaw
Tue Apr 08 2025
Fortinet has released security updates to address a critical security flaw impacting FortiSwitch that could permit an attacker to make unauthorized password changes. The vulnerability, tracked as CVE-2024-48887, carries a CVSS score of 9.3 out of a maximum of 10.0. "An unverified password change vulnerability [CWE-620] in FortiSwitch GUI may allow a remote unauthenticated attacker to modify...
The Hacker News

Amazon EC2 SSM Agent Flaw Patched After Privilege Escalation via Path Traversal
Tue Apr 08 2025
Cybersecurity researchers have disclosed details of a now-patched security flaw in the Amazon EC2 Simple Systems Manager (SSM) Agent that, if successfully exploited, could permit an attacker to achieve privilege escalation and code execution. The vulnerability could permit an attacker to create directories in unintended locations on the filesystem, execute arbitrary scripts with root privileges,...
The Hacker News

Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software Listings
Tue Apr 08 2025
Threat actors have been observed distributing malicious payloads such as cryptocurrency miner and clipper malware via SourceForge, a popular software hosting service, under the guise of cracked versions of legitimate applications like Microsoft Office. "One such project, officepackage, on the main website sourceforge.net, appears harmless enough, containing Microsoft Office add-ins copied from a...
The Hacker News
WhatsApp fixed a spoofing flaw that could enable Remote Code Execution
Tue Apr 08 2025
WhatsApp addressed a flaw, tracked as CVE-2025-30401, that could allow attackers to trick users and enable remote code execution. WhatsApp released a security update to address a vulnerability, tracked as CVE-2025-30401, that could let attackers trick users and enable remote code execution. The spoofing flaw impacts WhatsApp for Windows before version 2.2450.6. An attacker could […]
Security Affairs

Ransomware-Attacke auf Europcar
Tue Apr 08 2025
Europcar hat einen Cyberangriff mit Datendiebstahl erlitten.
CSO Online

Chinese ToddyCat abuses ESET antivirus bug for malicious activities
Tue Apr 08 2025
China-backed APT group ToddyCat has been found exploiting a medium-severity vulnerability in ESET antivirus software to sneak malicious code onto vulnerable systems.
CSO Online

Agentic AI in the SOC - Dawn of Autonomous Alert Triage
Tue Apr 08 2025
Security Operations Centers (SOCs) today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly, cumbersome, and increases analyst fatigue, burnout, and attrition. While artificial intelligence has emerged as a go-to solution, the term “AI” often blurs crucial distinctions. Not all AI is built equal, especially in the SOC. Many...
The Hacker News
Everest ransomware group’s Tor leak site offline after a defacement
Tue Apr 08 2025
The Tor leak site of the Everest ransomware group went offline after being hacked and defaced over the weekend. The Everest ransomware gang’s darknet site went offline after being hacked and defaced, with victim listings replaced by the following message. “Don’t do crime CRIME IS BAD xoxo from Prague” read the message published on the […]
Security Affairs

UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine
Tue Apr 08 2025
The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed a new set of cyber attacks targeting Ukrainian institutions with information-stealing malware. The activity is aimed at military formations, law enforcement agencies, and local self-government bodies, particularly those located near Ukraine's eastern border, the agency said. The attacks involve distributing phishing emails...
The Hacker News

CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation
Tue Apr 08 2025
A recently disclosed critical security flaw impacting CrushFTP has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog after reports emerged of active exploitation in the wild. The vulnerability is a case of authentication bypass that could permit an unauthenticated attacker to take over susceptible instances. It has...
The Hacker News