Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Cyberattacks and Ind ...

 Firewall Daily

The rise of cyberattacks has changed the dynamics of global industries, with cybercriminals increasingly targeting sectors that hold vast amounts of sensitive data, financial resources, or critical infrastructure. As cybercriminals refine their tactics and use more sophisticated technology, certain industries are   show more ...

becoming more vulnerable to breaches.   Cyberattacks, including ransomware, supply chain vulnerabilities, and hacking campaigns, are among the most common tactics used to compromise organizations across the world. In 2025, industries such as government and public services, healthcare, manufacturing, financial services, and energy will remain prime targets for cybercriminals, who continue to find new ways to exploit these critical sectors.  This article explores the 5 industries that will be most vulnerable to cyberattacks in 2025, with insights into the growing threats and the importance of strengthening cybersecurity measures.  Industries Targeted by Cybercriminals 5. Government and Public Sector: Custodians of National Security Government agencies and public sector organizations have long been a target for cybercriminals and nation-state actors. With access to vast amounts of sensitive data, including national security information, personal citizen data, and strategic infrastructure, these organizations present a treasure trove for cyber attackers. Nation-state actors, hacktivists, and cybercriminals use ransomware, espionage, and other hacking tools to disrupt operations, steal classified data, or cause economic and political instability.  Government agencies face several key cyber threats, including espionage, where cybercriminals steal sensitive information for strategic or financial gain. Distributed Denial of Service (DDoS) attacks are another major concern, with attackers overwhelming systems to disrupt government services and hinder access to vital information. Ransomware attacks also pose a risk, as hackers often target government agencies for cyber extortion, demanding large sums to restore access to critical systems. To mitigate these threats, it is essential for government organizations to implement cybersecurity frameworks that prioritize data protection, foster inter-agency collaboration, and utilize advanced threat detection tools. Additionally, investing in AI-driven threat intelligence systems and forming public-private partnerships can enhance cybersecurity resilience and help prevent future attacks. 4. Healthcare: Where Lives and Data Converge The healthcare industry has witnessed a sharp rise in cyberattacks in recent years, with data breaches and ransomware becoming more prevalent. Cybercriminals target healthcare institutions not only for the value of medical records but also for the potential to disrupt critical care. The growing dependency on interconnected systems in hospitals and clinics, as well as the rapid digitalization of health services, increases vulnerability.  The healthcare industry faces several cyber threats per year, with ransomware attacks being one of the most damaging. Cybercriminals target healthcare organizations by locking down essential systems, rendering critical medical records and equipment unusable. The consequences of such attacks can be life-threatening, as they disrupt the delivery of care and compromise patient safety.  Medical data leaks are another major concern, as patient data becomes increasingly targeted by cybercriminals for identity theft and financial fraud. With the vast amounts of sensitive information in healthcare systems, these data breaches can lead to severe consequences for individuals and organizations alike.  Additionally, insider threats are a growing risk in the healthcare sector. Employees with access to sensitive patient data can inadvertently or maliciously expose that information, whether through negligence or deliberate actions, putting the organization and patients at risk.  To mitigate these threats, healthcare organizations must implement a variety of strategies. Comprehensive data encryption and multi-factor authentication are essential to protecting sensitive information from unauthorized access. Employee cybersecurity training programs are also crucial, ensuring that staff are aware of potential threats and understand how to recognize and respond to them. Regular incident response drills help prepare healthcare organizations for cyberattacks, while collaboration with cybersecurity agencies can provide additional resources and expertise to protect against these growing risks. 3. Manufacturing: The Cornerstone of Global Supply Chains Manufacturers are increasingly vulnerable to cyberattacks as they rely on Industrial Control Systems (ICS) to manage operations. These ICS systems, while crucial to the manufacturing process, are often interconnected with IT systems, making them prime targets for cybercriminals. A successful cyberattack on manufacturing operations can result in production shutdowns, financial losses, and delays in the supply chain, with far-reaching effects.  The manufacturing sector is facing several key cyber threats that pose significant risks to its operations. One of the most damaging threats is ransomware, where attackers lock critical systems, halt production, and demand large ransom payments. The cost of downtime in manufacturing can be astronomical, leading to both financial losses and disruptions in the supply chain.  Supply chain attacks are another serious concern. Cybercriminals exploit vulnerabilities in third-party suppliers or vendors to infiltrate manufacturing systems. These attacks can compromise sensitive data and disrupt the entire production process, making it essential for manufacturers to secure their supply chains effectively.  Intellectual property theft is also a high risk for manufacturers. Design data, proprietary processes, and trade secrets are highly valuable targets for cybercriminals seeking to exfiltrate information. This can lead to the loss of competitive advantage and financial harm if sensitive information falls into the wrong hands.  To mitigate these threats, manufacturers must take proactive measures to secure their Industrial Control Systems (ICS). Network segmentation, endpoint protection, and continuous monitoring of operational networks are essential to protect against cyberattacks. Regular vulnerability assessments help identify weaknesses before they can be exploited. Additionally, employee awareness training is crucial for recognizing and responding to potential threats. Collaboration with cybersecurity experts like Cyble can provide additional resources and insights, helping manufacturers strengthen their defenses and prevent attacks. 2. Financial Services: A Prime Target for Monetary Gain Financial institutions remain one of the most targeted sectors by cybercriminals due to the potential for monetary gain. In addition to conventional cyberattacks like ransomware, financial services are increasingly facing sophisticated phishing attacks, insider threats, and targeted cryptocurrency hacks. As the sector becomes more reliant on digital platforms, the risks posed by cyberattacks also increase.  Financial institutions are increasingly targeted by a variety of cyber threats, with ransomware and data breaches being among the most significant. Cybercriminals often demand multimillion-dollar payments in exchange for restoring access to critical systems or stolen data. These types of cyberattacks leave financial institutions vulnerable to severe operational disruptions and financial losses, as they are often held hostage by attackers.  Another prominent threat facing financial services is cryptocurrency exploits. Digital asset exchanges and wallets are frequent targets of cybercriminals who seek to siphon off digital assets or manipulate transactions for financial gain. This growing vulnerability highlights the need for robust cybersecurity measures within the cryptocurrency sector to protect digital assets and customer funds.  Social engineering and phishing attacks also pose a serious risk to financial institutions. Cybercriminals employ deceptive tactics, such as fake emails and phone calls, to manipulate employees or customers into divulging sensitive information. Once gained, this access can lead to large-scale financial theft, putting both individuals and organizations at significant risk.  To mitigate these threats, financial services companies must adopt a range of proactive cybersecurity strategies. Leveraging AI-driven threat intelligence systems can help detect anomalies and potential fraud, allowing for quicker responses to cyberattacks. Additionally, financial institutions should implement strict access controls to limit unauthorized access, conduct regular security audits to identify vulnerabilities, and continuously monitor for signs of phishing or social engineering attempts. By combining these measures, financial institutions can better protect themselves from hackers and ransomware groups.   1. Energy and Utilities: The Backbone of Critical Infrastructure The energy and utilities sector, which includes electricity, gas, and water services, is critical to national security and the economy. As such, it remains a prime target for cybercriminals seeking to disrupt service or steal sensitive information. Attacks targeting energy infrastructure can have devastating consequences, including widespread blackouts, significant financial damage, and national security threats.  Energy and utilities sectors face significant cybersecurity threats that could have widespread consequences for both operations and public safety. One of the primary concerns is Industrial Control System (ICS) attacks. Cybercriminals often target these control systems, which are integral to the generation and distribution of power. An attack on ICS could lead to massive disruptions in power supply, affecting entire regions and potentially causing long-term outages.  Another key vulnerability within the energy sector is supply chain risks. Attackers exploit weaknesses in third-party vendors or software used by utilities to infiltrate networks. Cybercriminals can use these points of entry to access sensitive infrastructure and cause disruptions in services. Supply chain vulnerabilities have become a critical focus as attackers increasingly target external partners with less stringent cybersecurity measures.  The disruption of services remains a primary goal of many cyberattacks on the energy sector. Attackers aim to disable key infrastructure components, such as power generation facilities, water supply systems, or heating systems, leaving entire communities without essential services. Such disruptions can cause widespread chaos and significant economic damage, highlighting the need for strong, proactive cybersecurity strategies.  To mitigate these threats, energy companies must prioritize the cybersecurity of ICS systems by isolating critical control systems from corporate IT networks. This segmentation can reduce the risk of cross-contamination from attacks targeting business networks. Additionally, an increased focus on third-party risk management (TPRM) is crucial to prevent vulnerabilities arising from external vendors and partners. Regular penetration testing, employee training on cybersecurity best practices, and the use of advanced, cutting-edge cybersecurity tools are all essential strategies to safeguard critical infrastructure and ensure the continuity of services. By addressing these risks, energy companies can improve their resilience against potential cyberattacks.  Why Cyble Plays a Crucial Role?  As industries face mounting cyber threats, organizations like Cyble are crucial in helping businesses detect and respond to cyberattacks. Cyble is a leading provider of cyber threat intelligence, offering advanced tools to monitor the current threat landscape and provide actionable insights to protect businesses from hacks on industry sectors.  Cyble uses AI and machine learning to track cybercriminal activities in real time, alerting businesses about emerging threats and attack trends. By continuously monitoring the dark web, Cyble helps organizations identify stolen data, such as credentials and intellectual property, and respond quickly to prevent data breaches. Cyble's services also extend to supply chain risk management, helping companies mitigate vulnerabilities associated with third-party vendors and service providers.  Cyble's threat intelligence platform is particularly valuable for industries like healthcare, energy, and manufacturing, which rely on interconnected systems and are increasingly targeted by cybercriminals. By integrating Cyble's platform into their cybersecurity strategy, organizations can enhance their ability to detect, respond, and mitigate cyberattacks in real-time. 

image for A Day in the Life of ...

 A Little Sunshine

Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. However, new details about the internal operations of a prolific voice phishing gang show the group routinely abuses legitimate services at Apple and   show more ...

Google to force a variety of outbound communications to their users, including emails, automated phone calls and system-level messages sent to all signed-in devices. Image: Shutterstock, iHaMoo. KrebsOnSecurity recently told the saga of a cryptocurrency investor named Tony who was robbed of more than $4.7 million in an elaborate voice phishing attack. In Tony’s ordeal, the crooks appear to have initially contacted him via Google Assistant, an AI-based service that can engage in two-way conversations. The phishers also abused legitimate Google services to send Tony an email from google.com, and to send a Google account recovery prompt to all of his signed-in devices. Today’s story pivots off of Tony’s heist and new details shared by a scammer to explain how these voice phishing groups are abusing a legitimate Apple telephone support line to generate “account confirmation” message prompts from Apple to their customers. Before we get to the Apple scam in detail, we need to revisit Tony’s case. The phishing domain used to steal roughly $4.7 million in cryptocurrencies from Tony was verify-trezor[.]io. This domain was featured in a writeup from February 2024 by the security firm Lookout, which found it was one of dozens being used by a prolific and audacious voice phishing group it dubbed “Crypto Chameleon.” Crypto Chameleon was brazenly trying to voice phish employees at the U.S. Federal Communications Commission (FCC), as well as those working at the cryptocurrency exchanges Coinbase and Binance. Lookout researchers discovered multiple voice phishing groups were using a new phishing kit that closely mimicked the single sign-on pages for Okta and other authentication providers. As we’ll see in a moment, that phishing kit is operated and rented out by a cybercriminal known as “Perm” a.k.a. “Annie.” Perm is the current administrator of Star Fraud, one of the more consequential cybercrime communities on Telegram and one that has emerged as a foundry of innovation in voice phishing attacks. A review of the many messages that Perm posted to Star Fraud and other Telegram channels showed they worked closely with another cybercriminal who went by the handles “Aristotle” and just “Stotle.” It is not clear what caused the rift, but at some point last year Stotle decided to turn on his erstwhile business partner Perm, sharing extremely detailed videos, tutorials and secrets that shed new light on how these phishing panels operate. Stotle explained that the division of spoils from each robbery is decided in advance by all participants. Some co-conspirators will be paid a set fee for each call, while others are promised a percentage of any overall amount stolen. The person in charge of managing or renting out the phishing panel to others will generally take a percentage of each theft, which in Perm’s case is 10 percent. When the phishing group settles on a target of interest, the scammers will create and join a new Discord channel. This allows each logged on member to share what is currently on their screen, and these screens are tiled in a series of boxes so that everyone can see all other call participant screens at once. Each participant in the call has a specific role, including: -The Caller: The person speaking and trying to social engineer the target. -The Operator: The individual managing the phishing panel, silently moving the victim from page to page. -The Drainer: The person who logs into compromised accounts to drain the victim’s funds. -The Owner: The phishing panel owner, who will frequently listen in on and participate in scam calls. ‘OKAY, SO THIS REALLY IS APPLE’ In one video of a live voice phishing attack shared by Stotle, scammers using Perm’s panel targeted a musician in California. Throughout the video, we can see Perm monitoring the conversation and operating the phishing panel in the upper right corner of the screen.  In the first step of the attack, they peppered the target’s Apple device with notifications from Apple by attempting to reset his password. Then a “Michael Keen” called him, spoofing Apple’s phone number and saying they were with Apple’s account recovery team. The target told Michael that someone was trying to change his password, which Michael calmly explained they would investigate. Michael said he was going to send a prompt to the man’s device, and proceeded to place a call to an automated line that answered as Apple support saying, “I’d like to send a consent notification to your Apple devices. Do I have permission to do that?” In this segment of the video, we can see the operator of the panel is calling the real Apple customer support phone number 800-275-2273, but they are doing so by spoofing the target’s phone number (the victim’s number is redacted in the video above). That’s because calling this support number from a phone number tied to an Apple account and selecting “1” for “yes” will then send an alert from Apple that displays the following message on all associated devices: Calling the Apple support number 800-275-2273 from a phone number tied to an Apple account will cause a prompt similar to this one to appear on all connected Apple devices. KrebsOnSecurity asked two different security firms to test this using the caller ID spoofing service shown in Perm’s video, and sure enough calling that 800 number for Apple by spoofing my phone number as the source caused the Apple Account Confirmation to pop up on all of my signed-in Apple devices. In essence, the voice phishers are using an automated Apple phone support line to send notifications from Apple and to trick people into thinking they’re really talking with Apple. The phishing panel video leaked by Stotle shows this technique fooled the target, who felt completely at ease that he was talking to Apple after receiving the support prompt on his iPhone. “Okay, so this really is Apple,” the man said after receiving the alert from Apple. “Yeah, that’s definitely not me trying to reset my password.” “Not a problem, we can go ahead and take care of this today,” Michael replied. “I’ll go ahead and prompt your device with the steps to close out this ticket. Before I do that, I do highly suggest that you change your password in the settings app of your device.” The target said they weren’t sure exactly how to do that. Michael replied “no problem,” and then described how to change the account password, which the man said he did on his own device. At this point, the musician was still in control of his iCloud account. “Password is changed,” the man said. “I don’t know what that was, but I appreciate the call.” “Yup,” Michael replied, setting up the killer blow. “I’ll go ahead and prompt you with the next step to close out this ticket. Please give me one moment.” The target then received a text message that referenced information about his account, stating that he was in a support call with Michael. Included in the message was a link to a website that mimicked Apple’s iCloud login page — 17505-apple[.]com. Once the target navigated to the phishing page, the video showed Perm’s screen in the upper right corner opening the phishing page from their end. “Oh okay, now I log in with my Apple ID?,” the man asked. “Yup, then just follow the steps it requires, and if you need any help, just let me know,” Michael replied. As the victim typed in their Apple password and one-time passcode at the fake Apple site, Perm’s screen could be seen in the background logging into the victim’s iCloud account. It’s unclear whether the phishers were able to steal any cryptocurrency from the victim in this case, who did not respond to requests for comment. However, shortly after this video was recorded, someone leaked several music recordings stolen from the victim’s iCloud account. At the conclusion of the call, Michael offered to configure the victim’s Apple profile so that any further changes to the account would need to happen in person at a physical Apple store. This appears to be one of several scripted ploys used by these voice phishers to gain and maintain the target’s confidence. A tutorial shared by Stotle titled “Social Engineering Script” includes a number of tips for scam callers that can help establish trust or a rapport with their prey. When the callers are impersonating Coinbase employees, for example, they will offer to sign the user up for the company’s free security email newsletter. “Also, for your security, we are able to subscribe you to Coinbase Bytes, which will basically give you updates to your email about data breaches and updates to your Coinbase account,” the script reads. “So we should have gone ahead and successfully subscribed you, and you should have gotten an email confirmation. Please let me know if that is the case. Alright, perfect.” In reality, all they are doing is entering the target’s email address into Coinbase’s public email newsletter signup page, but it’s a remarkably effective technique because it demonstrates to the would-be victim that the caller has the ability to send emails from Coinbase.com. Asked to comment for this story, Apple said there has been no breach, hack, or technical exploit of iCloud or Apple services, and that the company is continuously adding new protections to address new and emerging threats. For example, it said it has implemented rate limiting for multi-factor authentication requests, which have been abused by voice phishing groups to impersonate Apple. Apple said its representatives will never ask users to provide their password, device passcode, or two-factor authentication code or to enter it into a web page, even if it looks like an official Apple website. If a user receives a message or call that claims to be from Apple, here is what the user should expect. AUTODOXERS According to Stotle, the target lists used by their phishing callers originate mostly from a few crypto-related data breaches, including the 2022 and 2024 breaches involving user account data stolen from cryptocurrency hardware wallet vendor Trezor. Perm’s group and other crypto phishing gangs rely on a mix of homemade code and third-party data broker services to refine their target lists. Known as “autodoxers,” these tools help phishing gangs quickly automate the acquisition and/or verification of personal data on a target prior to each call attempt. One “autodoxer” service advertised on Telegram that promotes a range of voice phishing tools and services. Stotle said their autodoxer used a Telegram bot that leverages hacked accounts at consumer data brokers to gather a wealth of information about their targets, including their full Social Security number, date of birth, current and previous addresses, employer, and the names of family members. The autodoxers are used to verify that each email address on a target list has an active account at Coinbase or another cryptocurrency exchange, ensuring that the attackers don’t waste time calling people who have no cryptocurrency to steal. Some of these autodoxer tools also will check the value of the target’s home address at property search services online, and then sort the target lists so that the wealthiest are at the top. CRYPTO THIEVES IN THE SHARK TANK Stotle’s messages on Discord and Telegram show that a phishing group renting Perm’s panel voice-phished tens of thousands of dollars worth of cryptocurrency from the billionaire Mark Cuban. “I was an idiot,” Cuban told KrebsOnsecurity when asked about the June 2024 attack, which he first disclosed in a short-lived post on Twitter/X. “We were shooting Shark Tank and I was rushing between pitches.” Image: Shutterstock, ssi77. Cuban said he first received a notice from Google that someone had tried to log in to his account. Then he got a call from what appeared to be a Google phone number. Cuban said he ignored several of these emails and calls until he decided they probably wouldn’t stop unless he answered. “So I answered, and wasn’t paying enough attention,” he said. “They asked for the circled number that comes up on the screen. Like a moron, I gave it to them, and they were in.” Unfortunately for Cuban, somewhere in his inbox were the secret “seed phrases” protecting two of his cryptocurrency accounts, and armed with those credentials the crooks were able to drain his funds. All told, the thieves managed to steal roughly $43,000 worth of cryptocurrencies from Cuban’s wallets — a relatively small heist for this crew. “They must have done some keyword searches,” once inside his Gmail account, Cuban said. “I had sent myself an email I had forgotten about that had my seed words for 2 accounts that weren’t very active any longer. I had moved almost everything but some smaller balances to Coinbase.” LIFE IS A GAME: MONEY IS HOW WE KEEP SCORE Cybercriminals involved in voice phishing communities on Telegram are universally obsessed with their crypto holdings, mainly because in this community one’s demonstrable wealth is primarily what confers social status. It is not uncommon to see members sizing one another up using a verbal shorthand of “figs,” as in figures of crypto wealth. For example, a low-level caller with no experience will sometimes be mockingly referred to as a 3fig or 3f, as in a person with less than $1,000 to their name. Salaries for callers are often also referenced this way, e.g. “Weekly salary: 5f.” This meme shared by Stotle uses humor to depict and all-too-common pathway for voice phishing callers, who are often minors recruited from gaming networks like Minecraft and Roblox. The image that Lookout used in its blog post for Crypto Chameleon can be seen in the lower right hooded figure. Voice phishing groups frequently require new members to provide “proof of funds” — screenshots of their crypto holdings, ostensibly to demonstrate they are not penniless — before they’re allowed to join. This proof of funds (POF) demand is typical among thieves selling high-dollar items, because it tends to cut down on the time-wasting inquiries from criminals who can’t afford what’s for sale anyway. But it has become so common in cybercrime communities that there are now several services designed to create fake POF images and videos, allowing customers to brag about large crypto holdings without actually possessing said wealth. Several of the phishing panel videos shared by Stotle feature audio that suggests co-conspirators were practicing responses to certain call scenarios, while other members of the phishing group critiqued them or tried disrupt their social engineering by being verbally abusive. These groups will organize and operate for a few weeks, but tend to disintegrate when one member of the conspiracy decides to steal some or all of the loot, referred to in these communities as “snaking” others out of their agreed-upon sums. Almost invariably, the phishing groups will splinter apart over the drama caused by one of these snaking events, and individual members eventually will then re-form a new phishing group. Allison Nixon is the chief research officer for Unit 221B, a cybersecurity firm in New York that has worked on a number of investigations involving these voice phishing groups. Nixon said the constant snaking within the voice phishing circles points to a psychological self-selection phenomenon that is in desperate need of academic study. “In short, a person whose moral compass lets them rob old people will also be a bad business partner,” Nixon said. “This is another fundamental flaw in this ecosystem and why most groups end in betrayal. This structural problem is great for journalists and the police too. Lots of snitching.” POINTS FOR BRAZENNESS Asked about the size of Perm’s phishing enterprise, Stotle said there were at least 46 distinct phishing groups paying to use Perm’s panel. He said each group was assigned their own subdomain on Perm’s main “command and control server,” which naturally uses the domain name commandandcontrolserver[.]com. A review of that domain’s history via DomainTools.com shows there are at least 57 separate subdomains scattered across commandandcontrolserver[.]com and two other related control domains — thebackendserver[.]com and lookoutsucks[.]com. That latter domain was created and deployed shortly after Lookout published its blog post on Crypto Chameleon. The dozens of phishing domains that phone home to these control servers are all kept offline when they are not actively being used in phishing attacks. A social engineering training guide shared by Stotle explains this practice minimizes the chances that a phishing domain will get “redpaged,” a reference to the default red warning pages served by Google Chrome or Firefox whenever someone tries to visit a site that’s been flagged for phishing or distributing malware. What’s more, while the phishing sites are live their operators typically place a CAPTCHA challenge in front of the main page to prevent security services from scanning and flagging the sites as malicious. It may seem odd that so many cybercriminal groups operate so openly on instant collaboration networks like Telegram and Discord. After all, this blog is replete with stories about cybercriminals getting caught thanks to personal details they inadvertently leaked or disclosed themselves. Nixon said the relative openness of these cybercrime communities makes them inherently risky, but it also allows for the rapid formation and recruitment of new potential co-conspirators. Moreover, today’s English-speaking cybercriminals tend to be more afraid of gettimg home invaded or mugged by fellow cyber thieves than they are of being arrested by authorities. “The biggest structural threat to the online criminal ecosystem is not the police or researchers, it is fellow criminals,” Nixon said. “To protect them from themselves, every criminal forum and marketplace has a reputation system, even though they know it’s a major liability when the police come. That is why I am not worried as we see criminals migrate to various ‘encrypted’ platforms that promise to ignore the police. To protect themselves better against the law, they have to ditch their protections against fellow criminals and that’s not going to happen.”

 Cybercrime

The company released an advisory and a corresponding blog about two bugs — CVE-2025-0282 and CVE-2025-0283 — and warned that some customers have already seen CVE-2025-0282 exploited in their environments.

 Feed

A Mirai botnet variant has been found exploiting a newly disclosed security flaw impacting Four-Faith industrial routers since early November 2024 with the goal of conducting distributed denial-of-service (DDoS) attacks. The botnet maintains approximately 15,000 daily active IP addresses, with the infections primarily scattered across China, Iran, Russia, Turkey, and the United States.

 Feed

The U.S. government on Tuesday announced the launch of the U.S. Cyber Trust Mark, a new cybersecurity safety label for Internet-of-Things (IoT) consumer devices. "IoT products can be susceptible to a range of security vulnerabilities," the U.S. Federal Communications Commission (FCC) said. "Under this program, qualifying consumer smart products that meet robust cybersecurity standards will bear

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three flaws impacting Mitel MiCollab and Oracle WebLogic Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2024-41713 (CVSS score: 9.1) - A path traversal vulnerability in Mitel MiCollab that could allow an attacker

 Feed

Cybersecurity researchers have shed light on a new remote access trojan called NonEuclid that allows bad actors to remotely control compromised Windows systems. "The NonEuclid remote access trojan (RAT), developed in C#, is a highly sophisticated malware offering unauthorised remote access with advanced evasion techniques," Cyfirma said in a technical analysis published last week. "It employs

 Feed

2024 had its fair share of high-profile cyber attacks, with companies as big as Dell and TicketMaster falling victim to data breaches and other infrastructure compromises. In 2025, this trend will continue. So, to be prepared for any kind of malware attack, every organization needs to know its cyber enemy in advance. Here are 5 common malware families that you can start preparing to counter

 Feed

Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns. Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious. While there are safeguards such as DomainKeys

 Cyber Security News

Source: securityaffairs.com – Author: Pierluigi Paganini Threat actors breached Argentina’s airport security police (PSA) payroll, stealing data and deducting 2,000-5,000 pesos from salaries. Threat actors have breached Argentina’s airport security police (PSA) and compromised the personal and financial   show more ...

data of its officers and civilian personnel. Threat actors deducted from 2,000 to 5,000 pesos under false […] La entrada Threat actors breached the Argentina’s airport security police (PSA) payroll – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini Moxa warns of two flaws in its routers and security appliances that enable privilege escalation and remote command execution. Moxa addressed privilege escalation and OS command injection vulnerabilities in cellular routers, secure routers, and network   show more ...

security appliances. Below are the descriptions for both vulnerabilities: CVE-2024-9138 (CVSS 4.0 score: 8.6): […] La entrada Moxa router flaws pose serious risks to industrial environmets – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini US adds Chinese multinational technology and entertainment conglomerate Tencent to the list of companies supporting the Chinese military. The US Department of Defense has added Chinese multinational technology and entertainment conglomerate Tencent to its   show more ...

“Chinese military company” list under the Section 1260 requirement. The US government does not explain […] La entrada US adds Tencent to the list of companies supporting Chinese military – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Source: securityaffairs.com – Author: Pierluigi Paganini Experts spotted new variants of the Eagerbee backdoor being used in attacks on government organizations and ISPs in the Middle East. Kaspersky researchers reported that new variants of the Eagerbee backdoor being used in attacks against Internet Service   show more ...

Providers (ISPs) and government entities in the Middle East. The Kaspersky’s […] La entrada Eagerbee backdoor targets govt entities and ISPs in the Middle East – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSO and CISO

Source: www.csoonline.com – Author: Securing a cybersecurity investment isn’t just about crunching numbers — it’s about fostering cross-functional relationships. For CISOs, engaging key stakeholders will help build support to secure critical funding. When it comes to securing cybersecurity investments   show more ...

there are many things at play. The key often lies in the CISO’s ability to build […] La entrada How CISOs can forge the best relationships for cybersecurity investment – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: Während der Placebo-Effekt positive Erwartungshaltungen beschreibt, steht der Nocebo-Effekt für negative Erwartungen. Beides spielt bei den Security-Vorgaben eines Unternehmens bei den Mitarbeitenden eine große Rolle. Foto: kmls – shutterstock.com Der Placebo-Effekt   show more ...

basiert auf der Erwartungshaltung und der psychologischen Interpretation eines Menschen. Er spiegelt die Macht des Geistes wider, körperliche und mentale […] La entrada Placebo- versus Nocebo-Effekt: Die Psychologie hinter der Security Awareness – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: Researchers at Google DeepMind and Stanford University have created highly effective AI replicas of more than 1,000 people based on simple interviews. A two-hour conversation with an AI model is enough to create a fairly accurate image of a real person’s personality,   show more ...

according to researchers from Google and Stanford University. As […] La entrada The deepfake threat just got a little more personal – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity landscape is evolving as attackers harness the power of artificial intelligence (AI) to   show more ...

develop advanced and evasive threats. The rise of AI-generated malware and AI-enhanced cyberattacks […] La entrada CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: The PhishWP WordPress plugin is well-equipped to turn legitimate shopping sites into phishing pages that capture sensitive payment and browser details. In a smart campaign, Russian cybercriminals are turning trusted online stores into phishing pages that capture sensitive   show more ...

details through convincing payment interfaces. According to a research by the cybersecurity firm […] La entrada Russian hackers turn trusted online stores into phishing pages – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 advanced persistent threats

Source: www.csoonline.com – Author: News 07 Januar 20254 Minuten Advanced Persistent ThreatsCyberangriffeHacker-Gruppen Schwachstellen in einer Remote-Support-Software haben es APT-Angreifern aus China erlaubt, in die Systeme des US-Finanzministeriums einzudringen und dort Daten zu stehlen. Die IT-Security im   show more ...

US-Finanzministerium dürfte angesichts des chinesischen Hackerangriffs wenig erholsame Weihnachtsferien gehabt haben. Mark Gomez / Shutterstock Zum  Jahreswechsel musste das […] La entrada Chinesische Hacker attackieren US-Finanzministerium – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Get to know the inspiring events and wide-reaching impact of the SWE Toronto Affiliate. Source Views: 0 La entrada Global Affiliate Spotlight: SWE Toronto se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Read the highlights from SWE’s Mexico’s third installment of their virtual event series, featuring keynotes, panel discussions, and networking. Source Views: 0 La entrada SWE’s Third Virtual Event in Mexico: Fostering Women’s Collaboration se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: psilva The numbers are staggering—2024 has seen over 200,000 layoffs across 1,200 companies, with 82% coming from the tech industry. Welcome to the Top Tech Talent Reemployment Project! I’m Peter, and this initiative is all about supporting those affected by layoffs   show more ...

and helping them find fulfilling roles. In our first episode, […] La entrada Reemployment Project: Meet Alex Ryan – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. In August 2016, a small group of HackerOne staff brought to life the first ever live hacking event in HackerOne’s history at DEF CON 24 in Las Vegas, Nevada. We learned so many things over those three days and nights. Amongst our successes there was a laundry   show more ...

list of failures […] La entrada H1-702 2018 makes history with over $500K in bounties paid! – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: Justin Boyer. So you want to move to the cloud. It’s okay. You’re not alone. 96 percent of decision makers in one survey have cloud initiatives underway. Enterprise IT teams will soon reach the tipping point, spending over 50 percent on cloud apps and services instead of   show more ...

on-premises deployments for the […] La entrada 7 Common Security Pitfalls to Avoid When Migrating to the Cloud – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: johnk. Another year, another Hacker-Powered Security Report! We pulled out 100 of the report’s top facts—and then added 18 more, since it’s 2018. See below for a better understanding of how hacker-powered security is disrupting (in a good way) how organizations approach   show more ...

security. More security teams are adding VDPs, more are […] La entrada 118 Fascinating Facts from HackerOne’s Hacker-Powered Security Report 2018 – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Source: www.hackerone.com – Author: Martijn Russchen. Starting today, all existing and new hackers get a personalized email alias tied to their account, in the form of username[at]wearehackerone[dot]com. Any emails sent to this will be forwarded to their email address that is registered with HackerOne. This has   show more ...

been a popular feature request amongst programs on HackerOne […] La entrada Improve Credential Sharing with Hacker Email Aliases – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: The US has launched a Cyber Trust Mark for Internet of Things (IoT) devices, enabling consumers to easily assess the cybersecurity standards of such products when making purchasing decisions. Consumer smart device manufacturers that qualify for the Cyber Trust   show more ...

Mark will soon able to display a trademarked, distinct shield logo on […] La entrada US Launches Cyber Trust Mark for IoT Devices – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: A new phishing technique exploiting PayPal’s money request feature has been identified, using a legitimate PayPal money request that may appear genuine to recipients. According to a new advisory by Fortinet, the scammer registered a free Microsoft 365 test   show more ...

domain and created a distribution list containing the targeted email addresses. A […] La entrada Scammers Exploit Microsoft 365 to Target PayPal Users – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Casio

Source: www.infosecurity-magazine.com – Author: Electronics manufacturing giant Casio admitted that security failings resulted in the personal data of employees, customers and business partners have been leaked online following a ransomware attack. The Japanese company said its investigation into the October   show more ...

2024 incident found that internal business information, including invoices and contacts with partners, meeting materials […] La entrada Casio Admits Security Failings as Attackers Leak Employee and Customer Data – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Security researchers have uncovered a new Mirai-based botnet that uses zero-day exploits for industrial routers and smart home devices to spread. The offensively named “gayfemboy” botnet was first discovered by Chinese research outfit Qi’anxin XLab back   show more ...

in February 2024. Yet while its early iterations were unremarkable versions of Mirai, its developers […] La entrada New Mirai Botnet Exploits Zero-Days in Routers and Smart Devices – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2025-01
Aggregator history
Wednesday, January 08
WED
THU
FRI
SAT
SUN
MON
TUE
JanuaryFebruaryMarch