Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Tor Browser 13.5.14  ...

 Firewall Daily

The Tor Project announced the release of an emergency update for Tor Browser 13.5.14, specifically targeting users on Windows 7, 8, and 8.1. This update is part of the ongoing legacy channel support for these older operating systems, providing crucial security patches to ensure the safety of Tor Browser users on these   show more ...

platforms.   Windows users on these systems are advised to update immediately to mitigate the security risks associated with the vulnerabilities addressed in this release. Why Tor Browser 13.5.14 Matters  The Tor Browser 13.5.14 update includes vital security fixes, which were backported from Firefox 128.8.1 ESR (Extended Support Release). This update is important because it addresses a critical vulnerability in Firefox that could have severe implications for users. The issue revolves around a flaw identified in Firefox's sandboxing mechanisms, which could potentially allow attackers to escape the browser’s sandbox and execute arbitrary code. This vulnerability is tracked under CVE-2025-2857 and is related to an incorrect handle that could be exploited by a compromised child process, allowing it to gain access to higher privileges. As mentioned in the Mozilla Foundation Security Advisory 2025-19, this vulnerability was actively exploited in the wild, making the update all the more urgent. The flaw was initially identified in the IPC (Inter-Process Communication) code of Firefox, which is crucial for the safe isolation of processes running within the browser. If this vulnerability were exploited, it could lead to dangerous scenarios, including a complete compromise of the affected system.  Who Needs This Update?  This emergency release, Tor Browser 13.5.14, is exclusively for Windows 7, 8, and 8.1 users. If you are using a different version of Windows or a different operating system, it is highly recommended to download the latest stable version of Tor Browser 14.0 or higher. This update is essential for those on older versions of Windows who may not have access to newer security patches through regular updates. Changes in This Release  The Tor Browser 13.5.14 version includes the following key updates:  Backporting of security fixes from Firefox 128.8.1 ESR, which addresses critical vulnerabilities.  Bug fixes in the build system, ensuring better stability and security.  Updates related to user experience and other optimizations for the browser interface.  The security vulnerabilities patched in this release are primarily focused on Windows-based systems, particularly around sandbox escapes, which can lead to severe security breaches if exploited. Other operating systems are not affected by this specific vulnerability. What You Need to Know About Tor Browser 13 and 14 Updates  Tor Browser 13.5.14 is part of the legacy channel, which continues to support older versions of Windows. The release is a necessary measure to extend the lifespan of Tor Browser on these platforms, but users should upgrade to newer versions of Windows if possible. For those running up-to-date operating systems, Tor Browser 14.0 offers the latest features and security improvements. The recent release of Tor Browser 13 marks a critical juncture in the software’s evolution, with regular updates ensuring the browser stays protected of security threats. The Tor Browser update process is straightforward and available for download from the official Tor Project website. Conclusion  The Tor Browser 13.5.14 emergency release is a vital update for users on Windows 7, 8, and 8.1, addressing a critical vulnerability that could have serious security implications. Users are urged to update their browsers immediately to protect themselves from potential exploits.  

image for Investigative Journa ...

 Cyber News

Two investigative journalists from Serbia have become the latest victims of targeted spyware attacks using NSO Group's Pegasus software, Amnesty International revealed in a report on Thursday. The Serbian journalists, who work for the Balkan Investigative Reporting Network (BIRN), were reportedly targeted last   show more ...

month through spyware delivered via messages on the Viber messaging app. The journalists, identified as Bogdana (not her real name) and Jelena Veljkovic, received unusual messages from an unknown Serbian number linked to Telekom Srbija, the state telecommunications operator. The messages contained hyperlinks to a domain that Amnesty International later identified with high confidence as being associated with Pegasus. Suspecting foul play, the journalists sought help from Amnesty International’s Security Lab, which conducted a forensic analysis of their devices. The lab confirmed that their smartphones were targeted with Pegasus spyware, known for its ability to infect devices without requiring the victim to click on any links. However, in this case, Amnesty determined that the attack was carried out through a one-click infection method, meaning the journalists had to click the malicious link for the spyware to activate. A Pattern of Digital Surveillance in Serbia The attack on the BIRN journalists is not an isolated incident. Amnesty International noted that this is the third time in two years that Pegasus spyware has been used against Serbian civil society members. In November 2023, a similar attack was uncovered, targeting two Serbian activists ahead of the national elections. Amnesty and other digital rights organizations, including Access Now, the SHARE Foundation, and Citizen Lab, documented how zero-click spyware was used to infiltrate the activists' devices without their interaction. Additionally, Amnesty discovered another Pegasus infection in July 2023, targeting a high-profile figure associated with Serbia’s growing protest movement. The recent attack on the journalists further highlights the ongoing use of invasive surveillance tools to monitor and intimidate civil society members in the country. Pegasus: A Global Cyberweapon Pegasus, developed by the Israeli company NSO Group, is one of the most advanced commercial spyware tools in existence. The software allows an attacker to remotely access a target's smartphone, granting full control over calls, messages, and photos, and even enabling the device's microphone and camera. NSO Group claims that its technology is sold only to vetted government entities to combat terrorism and crime. However, numerous investigations have revealed the spyware being used against journalists, activists, and political opponents worldwide. In response to Amnesty International’s findings, NSO Group stated, “All sales of our systems are to vetted government end-users.” However, Amnesty believes the continued use of Pegasus in Serbia suggests that state authorities are behind these attacks. The Serbian Journalists Speak Out The targeted journalists expressed concern over the implications of the spyware attack. Bogdana, who was working on a sensitive report about foreign investments and state-linked corruption at the time of the attack, shared her distress upon discovering that her phone had been compromised. “When I found out that the link on my phone was Pegasus, I was absolutely furious. This was the phone registered to my name, and I felt as if I had an intruder in my own home. This is an unnerving feeling… I was extremely concerned about my sources who could be at risk because they communicated with me,” Bogdana said. Jelena Veljkovic, who received a similar Viber message but deleted it without clicking, also reflected on the incident. “When I found out that I was a target of a Pegasus attack, I was not particularly scared but found it quite unsettling. This was my private telephone, which I also use for work, and a virus like Pegasus, which is not selective at all and can access everything on one’s phone, can have repercussions on my family too,” she said. Both journalists believe the attack was an attempt to silence investigative reporting in Serbia. Increasing Repression and the Use of Spyware in Serbia Serbia has been under increasing scrutiny for its crackdown on journalists, activists, and protestors. A major anti-government rally in Belgrade on March 15 further exposed tensions between civil society and authorities. Protestors have accused the government of deploying illegal surveillance and even using sonic weapons to disperse crowds. In December 2023, Amnesty International also revealed that Serbian authorities had used Cellebrite software to secretly unlock civilians’ phones. This allowed them to install a homegrown spyware tool, further expanding state surveillance capabilities. BIRN, the journalists’ employer, has faced numerous threats, harassment, and legal actions, including Strategic Lawsuits Against Public Participation (SLAPPs) from high-ranking government officials. The organization is currently fighting four such lawsuits, including one from the mayor of Belgrade. Calls for Accountability and Action The targeting of journalists and activists threatens press freedom, human rights, and democracy itself. Until concrete actions are taken to hold those responsible accountable, journalists like Bogdana and Jelena will continue to operate under the looming threat of digital surveillance. “These findings provide further evidence that Serbian authorities are abusing highly invasive spyware products and other digital surveillance technologies to target journalists, activists, and other members of civil society,” Amnesty International stated. As digital surveillance becomes an increasingly common tool for governments worldwide, the need for stronger legal protections and transparency around spyware use remains urgent.

image for CISA Issues Urgent S ...

 Firewall Daily

The Cybersecurity and Infrastructure Security Agency (CISA) has released several important security advisories, which address critical vulnerabilities across a range of platforms, including industrial control systems (ICS).   These advisories are important for users and administrators in mitigating risks associated   show more ...

with exploitable vulnerabilities. CISA’s proactive approach ensures organizations are well-informed on the latest threats and the necessary defenses to protect against them.  Schneider Electric EcoStruxure Power Monitoring Expert (PME) Advisory  One of the important advisories released by CISA on March 27, 2025, is ICSA-25-037-01, which concerns a vulnerability in Schneider Electric’s EcoStruxure Power Monitoring Expert (PME), specifically Update A. Schneider Electric’s PME is widely used for monitoring and managing power systems across various industries. This vulnerability could have serious consequences if exploited, potentially allowing remote code execution, a risk that could jeopardize sensitive infrastructure systems.  The flaw, identified as a deserialization of untrusted data (CWE-502), exists due to unsafe deserialization when data is posted to the PME’s web server. This vulnerability, tracked as CVE-2024-9005, has a CVSS v3 base score of 7.1 and a CVSS v4 score of 7.3. A successful attack could give malicious actors the ability to remotely execute code, undermining the integrity of the system and compromising security.  Schneider Electric has responded with mitigations for affected users. Users of PME 2022 and prior can obtain a hotfix from Schneider Electric’s Customer Care Center. Additionally, users are urged to upgrade to the latest PME versions and follow industry-standard cybersecurity best practices, including network isolation and ensuring systems are protected behind firewalls.  CISA Adds New Vulnerability to the Known Exploited Vulnerabilities Catalog  In addition to the advisories, CISA also updated its Known Exploited Vulnerabilities Catalog with new vulnerabilities that have been actively exploited in the wild. This catalog is a critical resource for agencies and enterprises, helping them prioritize patches for vulnerabilities that are already being targeted by malicious actors. The latest entry in this catalog is CVE-2025-2783, a high-severity vulnerability affecting Google Chrome. This flaw, discovered in the Mojo component, allows attackers to bypass Chrome’s sandboxing mechanisms on Windows versions prior to 134.0.6998.177. The vulnerability is a result of incorrect handle management in Mojo, and it could allow an attacker to escape the sandbox and execute arbitrary code on the system. Chrome users are advised to update their browsers to version 134.0.6998.177 or later to mitigate the risk. Deserialization Vulnerabilities in Sitecore CMS and Experience Platform CISA also added two deserialization vulnerabilities, CVE-2019-9874 and CVE-2019-9875, to its Known Exploited Vulnerabilities Catalog. These vulnerabilities, found in the Sitecore CMS and Sitecore Experience Platform (XP), could allow attackers to execute arbitrary code through unsafely deserialized data. CVE-2019-9874 affects Sitecore CMS versions 7.0 to 7.2 and Sitecore XP versions 7.5 to 8.2, while CVE-2019-9875 impacts versions up to Sitecore 9.1. Both flaws are in the anti-CSRF module of Sitecore, and attackers can exploit them by sending a specially crafted serialized .NET object in an HTTP POST parameter. These vulnerabilities are critical because they can allow unauthenticated attackers (in the case of CVE-2019-9874) or authenticated attackers (in CVE-2019-9875) to execute arbitrary code, compromising the security of affected systems. The Importance of Mitigating Known Exploited Vulnerabilities  CISA's updates to the Known Exploited Vulnerabilities Catalog emphasize the critical need for organizations to address vulnerabilities that are actively being targeted by cybercriminals. By keeping systems updated with the latest security patches and mitigating known risks, organizations can reduce the likelihood of successful attacks.   For instance, the CVE-2025-2783 vulnerability in Google Chrome could lead to attackers bypassing security features designed to protect users, while the vulnerabilities in Sitecore CMS and XP could allow attackers to compromise web applications and gain unauthorized access to sensitive data. Both of these are prime examples of how seemingly minor vulnerabilities can be exploited to devastating effect. Conclusion  Users of Schneider Electric’s EcoStruxure Power Monitoring Expert (PME), Google Chrome, and Sitecore CMS/XP are strongly encouraged to implement the recommended patches and mitigations. By doing so, they can reduce the likelihood of falling victim to cyberattacks that exploit these critical vulnerabilities. The growing number of vulnerabilities added to the CISA Known Exploited Vulnerabilities Catalog—including CVE-2025-2783, CVE-2019-9874, and CVE-2019-9875—serves as a reminder of the ongoing threat posed by cybercriminals targeting known flaws in widely used software and hardware. As always, CISA urges all entities to stay informed and act promptly to protect their systems. 

image for Firefox Patch Releas ...

 Cyber News

Mozilla has issued an urgent update for Firefox on Windows to patch a critical security vulnerability. This Firefox vulnerability move follows the recent discovery of a similar exploit in Google Chrome, emphasizing the growing concerns over browser security. The update, which applies to Firefox 136.0.4 and Firefox   show more ...

Extended Support Release (ESR) versions 128.8.1 and 115.21.1, is designed to fix a sandbox escape vulnerability. The flaw could allow a compromised child process to manipulate the parent process into returning an overly powerful handle, potentially leading to unauthorized system access. CVE-2025-2857: Sandbox Escape Vulnerability CVE Identifier: CVE-2025-2857 Impact: Critical Affected Products: Firefox, Firefox ESR Fixed Versions: Firefox 136.0.4 Firefox ESR 115.21.1 Firefox ESR 128.8.1 Reported by: Andrew McCreight Mozilla’s security team discovered the issue after analyzing recent developments in the Google Chrome exploit (CVE-2025-2783), which also involved sandbox escape techniques. Researchers identified a similar weakness in Firefox's Inter-Process Communication (IPC) code, where an attacker could manipulate the process interaction to bypass security controls. Understanding the Firefox Vulnerability Sandboxing is a key security feature in modern web browsers designed to isolate running processes and prevent malicious code from escaping into the broader system. However, a flaw in Firefox’s IPC implementation allowed for an incorrect handle return, making it possible for a compromised child process to escape its intended restrictions. While Mozilla has not provided specific details about real-world exploits, it has confirmed that the original Chrome vulnerability was actively exploited in the wild. This increases the urgency for Firefox users on Windows to update their browsers immediately. Other operating systems, including macOS and Linux, remain unaffected. The Chrome Zero-Day Connection The Firefox vulnerability follows closely on the heels of the Chrome sandbox escape exploit (CVE-2025-2783), which was reported earlier this month. This exploit demonstrated how attackers could leverage IPC weaknesses to elevate privileges and execute arbitrary code beyond the browser’s intended restrictions. In response to the Chrome discovery, Mozilla developers conducted an internal review of Firefox’s security mechanisms and identified a parallel issue. Given the similarities, security researchers believe that the two vulnerabilities could be part of a broader attack strategy targeting browser sandboxes. Mozilla has acted promptly to mitigate the risk by releasing security patches for both the mainline and ESR versions of Firefox. The updates are available for Windows users and are expected to be delivered automatically. However, users are encouraged to manually check and apply the update as soon as possible. How to Update Firefox To ensure protection against the sandbox escape vulnerability, users should: Open Firefox and click on the menu button (three horizontal lines in the top-right corner). Navigate to “Help” > “About Firefox”. Firefox will automatically check for updates and install the latest version if an internet connection is available. Restart the browser to apply the update. For enterprise environments using Firefox ESR, administrators should deploy updates immediately to mitigate security risks. The Importance of Staying Updated The rapid response from Mozilla reflects the ever-changing landscape of cybersecurity threats. With browser vulnerabilities being a prime target for cybercriminals, users must remain vigilant and ensure their software is always up to date. Best Practices for Browser Security: Enable Automatic Updates: Keeping browsers updated ensures protection against newly discovered vulnerabilities. Use Security Extensions: Privacy-focused add-ons and security tools can provide additional layers of protection. Avoid Suspicious Links & Downloads: Malicious websites and attachments remain a major threat vector. Monitor Security Advisories: Staying informed about the latest cybersecurity threats helps users respond swiftly. As attackers continue to find new ways to exploit software vulnerabilities, proactive security measures are essential. Mozilla’s latest patch is a critical step in safeguarding users, and all Windows Firefox users are strongly advised to update immediately.

image for Protecting Android,  ...

 Threats

AirTags are a popular tracking device used by anyone from forgetful key owners to those with malicious intent, such as jealous spouses and car thieves. Using AirTags for spying is simple: a tag is discreetly placed on the target to allow their movements to be conveniently monitored using Apple Find My. Weve even added   show more ...

protection from AirTag-based tracking to our products for Android. But a recent study by security researchers has surprisingly found that remote tracking doesnt even depend on buying an AirTag or ever being physically near the target. If you manage to sneak special malware onto someones Windows, Android, or Linux device (like a computer or phone), it could use the devices Bluetooth to send out a signal that nearby Apple devices would think is coming from an AirTag. Essentially, for Apple devices, the infected phone or computer effectively becomes an oversized AirTag – trackable via the Find My network, which boasts over a billion Apple phones and tablets. Anatomy of the attack The attack exploits two features of the Find My technology. Firstly, this network uses end-to-end encryption – so participants dont know whose signals theyre relaying. To exchange information, an AirTag and its owners phone rely on a pair of cryptographic keys. When a lost AirTag broadcasts its callsigns via Bluetooth, Find My network detectors (that is, any Apple device with Bluetooth and internet access, regardless of who owns it) simply transmit AirTags geolocation data to Apple servers. The data is encrypted with the lost AirTags public key. Then, any device can ask for the encrypted location data from the server. And because its encrypted, Apple doesnt know who the signal belongs to, or which device asked for it. The crucial point here is that one can only decrypt the data and find out both whose AirTag it is and its exact location by having the corresponding private key. Therefore, this data is only useful to the owner of the smartphone paired with this AirTag. Another feature of Find My is that detectors dont verify whether the location signal indeed originated with an Apple device. Any devices that support Bluetooth Low Energy (BLE) can broadcast it. To exploit these features, the researchers came up with the following method: They install malware on a computer, phone, or some other device running Android, Windows, or Linux, and check the Bluetooth adapter address. The attackers server receives the information and uses powerful video cards to generate a pair of encryption keys specific to the devices Bluetooth address and compatible with Apples Find My The public key is sent back to the infected device, and the malware then starts transmitting a Bluetooth message that mimics AirTag signals and includes this key. Any nearby Apple device connected to the internet receives the Bluetooth message and relays it to the Find My The attackers server uses the private key to request the location of the infected device from Find My and decrypt the data. How well does the tracking work? The more Apple devices nearby and the slower the victims movement, the better the accuracy and speed of the location tracking. In typical urban environments like homes or offices, the location is typically pinpointed within six to seven minutes and with an accuracy of around three meters. Even in extreme situations, such as being on an airplane, tracking can still occur because internet access is now widely available on flights. The researchers obtained 17 geolocation points throughout a 90-minute flight, allowing them to reconstruct the aircrafts flight path quite accurately. Naturally, the success of the attack hinges on whether the victim can be infected with malware, and the details are slightly different depending on the platform. On Linux devices, the attack only requires infecting the victims gadget due to the specific Bluetooth implementation. By contrast, Android and Windows employ Bluetooth address randomization, meaning the attacker needs to infect two nearby Bluetooth devices: one as the tracking target (the one that mimics an AirTag), and another to obtain its adapter address. The malicious application needs Bluetooth access, but this isnt hard to get. Many common app categories – like media players, file sharing tools, and even payment apps – often have legitimate reasons to request it. Its likely that a convincing and functional bait application will be created for this type of attack, or even that an existing application will be trojanized. The attack requires neither administrative permissions nor root access. Importantly, were not just talking about phones and computers: the attack is effective across a range of devices – including smart TVs, virtual-reality glasses, and other household appliances – as Android and Linux are common operating systems in many of them. Another key part of the attack involves calculating cryptographic keys on the server. Due to the complexity of this operation – which requires leasing hardware with modern video cards – the cost of generating a key for a single  victim is estimated at around $2.2. For this reason, we find mass-tracking scenarios that target, say, visitors inside a shopping center, to be unlikely. However, targeted attacks at this price point are accessible to virtually anyone, including scammers or nosy co-workers and spouses. Apples response The company patched the Find My network vulnerability in December 2024 in iOS 18.2, visionOS 2.2, iPadOS 17.7.3 (for older devices) and 18.2 (for newer ones), watchOS 11.2, tvOS 18.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2, and macOS Sequoia 15.2. Unfortunately, as is often the case with Apple, the details of the updates have not been disclosed. The researchers emphasize that this tracking method will remain technically feasible until all Apple users update to at least the above versions, though fewer devices will be able to report a tracked devices location. And its not impossible that the Apple patch could be defeated by another engineering trick. How to protect yourself from the attack Turn off Bluetooth when youre not using it if your device has the option. When installing apps, stick to trusted sources only. Verify that the app has been around for a long time, and has many downloads and a high rating in its latest version. Only grant Bluetooth and location access to apps if youre certain you need those features. Regularly update your device: both the OS and main apps. Make sure you have comprehensive malware protection enabled on all your devices. We recommend Kaspersky Premium. Besides this rather unusual and as-yet-unseen-in-the-wild tracking method, there are numerous other ways your location and activities can be tracked. What methods are being used to spy on you? Read these for the details: How smartphones build a dossier on you Webcam stalking: fact or fiction? How to protect yourself from Bluetooth stalking and more How millions of Kia cars could be tracked Run for your data: privacy settings in jogging apps I know how you drove last summer … and other posts.

image for GSA Plans FedRAMP Re ...

 Feed

The General Services Administration is planning to use automation to speed up the process to determine which cloud services federal agencies are allowed to buy.

 Feed

Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked to siphon sensitive information such as environment variables from compromised systems. "Some of these packages have lived on npmjs.com for over 9 years, and provide legitimate functionality to blockchain developers," Sonatype researcher Ax Sharma said. "However, [...] the latest

 Feed

Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely days after Google patched a similar flaw in Chrome that came under active exploitation as a zero-day. The security vulnerability, CVE-2025-2857, has been described as a case of an incorrect handle that could lead to a sandbox escape. "Following the recent Chrome sandbox escape (

 Feed

Long gone are the days when a simple backup in a data center was enough to keep a business secure. While backups store information, they do not guarantee business continuity during a crisis. With IT disasters far too common and downtime burning through budgets, modern IT environments require solutions that go beyond storage and enable instant recovery to minimize downtime and data loss. This is

 Feed

An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign likely aimed at users in Taiwan under the guise of chat apps. "PJobRAT can steal SMS messages, phone contacts, device and app information, documents, and media files from infected Android devices," Sophos security researcher Pankaj Kohli said in a Thursday analysis. PJobRAT, first

 Feed

Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt, and SMA, that could be exploited by a bad actor to seize control of devices or execute code remotely, posing severe risks to electrical grids.  The vulnerabilities have been collectively codenamed SUN:DOWN by Forescout Vedere Labs. "The new vulnerabilities can be

 Feed

Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that's designed to download and execute secondary payloads. The malware, according to Zscaler ThreatLabz, shares behavioral similarities with another known malware loader known as SmokeLoader.  "The purpose of the malware is to download and execute second-stage payloads while evading

 .NET

Source: www.techrepublic.com – Author: Allison Francis Published March 27, 2025 Microsoft’s .NET MAUI lets developers build cross-platform apps in C#, but its use of binary blob files poses new risks by bypassing Android’s DEX-based security checks. This Motorola Moto G Power 5G shows the midnight blue   show more ...

color option. Image: Amazon New Android malware is using […] La entrada Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Artificial Intelligence

Source: www.techrepublic.com – Author: Megan Crouse Security engineer was the most common title in cybersecurity job listings in 2024, according to security and IT workforce management platform provider CyberSN. Its report “U.S. Cybersecurity Job Posting Data” was created by pulling together job postings   show more ...

from 30 major job boards and Fortune 500 companies’ job boards between […] La entrada Which Top Cybersecurity Role of 2024 Was Featured in 64,000+ Job Postings? – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Waqas. Disney’s latest Snow White movie, with a 1.6/10 IMDb rating, isn’t just the biggest flop the company has ever released. It’s such an embarrassment that the movie isn’t even available on Disney’s own streaming platform, Disney+. According to cybersecurity   show more ...

researchers at Veriti, scammers are exploiting the situation by offering pirated […] La entrada Fake Snow White Movie Torrent Infects Devices with Malware – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. OpenAI is prioritizing security with a major bug bounty program increase and new AI security research grants. Find out how they’re collaborating with researchers and experts to protect their AI platforms from emerging threats OpenAI is enhancing its security   show more ...

infrastructure, focusing on a forward-looking approach towards AI, by expanding […] La entrada OpenAI Bug Bounty Program Increases Top Reward to $100,000 – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. Discover the novel QWCrypt ransomware used by RedCurl in targeted hypervisor attacks. This article details their tactics, including DLL sideloading and LOTL abuse, and explores the group’s evolving cybercriminal activities. Bitdefender Labs has revealed a shift in   show more ...

the operational tactics of the long-standing cyber threat group known as RedCurl. […] La entrada RedCurl Uses New QWCrypt Ransomware in Hypervisor Attacks – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: CyberNewswire. Cary, North Carolina, March 27th, 2025, CyberNewsWire INE, a global leader in networking and cybersecurity training and certifications, is proud to announce it is the recipient of twelve badges in G2’s Spring 2025 Report, including Grid Leader for Cybersecurity   show more ...

Professional Development, Online Course Providers, and Technical Skills Development, which highlight […] La entrada G2 Names INE 2025 Cybersecurity Training Leader – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. A recent discovery by cybersecurity researcher Jeremiah Fowler has shed light on a sensitive data exposure involving the Australian fintech company Vroom by YouX, formerly known as Drive IQ. Fowler, reporting to Website Planet, discovered a publicly accessible Amazon   show more ...

S3 bucket containing a staggering 27,000 records. This database, lacking […] La entrada Aussie Fintech Vroom Exposes Thousands of Records After AWS Misconfiguration – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.schneier.com – Author: Bruce Schneier Clive Robinson • March 27, 2025 1:17 PM @ ALL, Hmm… “… comprehensive taxonomy of adversarial machine learning attacks…” Those first two words always fill me with a sort of dread, due to in the past having to learn the Linnaean “Systema Sexuale”   show more ...

taxonomy… As a rule of thumb […] La entrada A Taxonomy of Adversarial Machine Learning Attacks and Mitigations – Source: www.schneier.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Learn about this innovative mentoring program by SWE Nairobi that highlighted soft skills, technical skills, and career paths in engineering to prepare collegians for the future. Source Views: 0 La entrada SWE Nairobi Mentorship Program Reaches Over 100 Collegiates se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Learn how to use the Society of Women Engineers (SWE) brand and messaging correctly in this overview from the SWE Integrated Marketing Advisory Board (IMAB). Source Views: 0 La entrada Quick Tips to Use the SWE Brand se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Each month throughout the year, we’ll be spotlighting a SWE Affinity Group. We are excited to highlight SWE’s Indigenous Peoples Affinity Group! Source Views: 0 La entrada Indigenous Peoples AG Spotlight: Global Indigenous Peoples se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Wondering if your logo is compliant with SWE’s brand guidelines? Interested in engaging more effectively on social media? Learn about this resource that helps the SWE community with brand awareness and marketing! Source Views: 0 La entrada Meet SWE’s Integrated Marketing Advisory Board (IMAB) se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

The award-winning SWE Magazine earned recognition in podcasting, writing, design, full issues, and more categories during the FY23 publication cycle. Source Views: 0 La entrada SWE Magazine Receives Top Honors in APEX, FOLIO Competitions se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Dr. Joyce Yen believes that everyone in STEM should have the opportunity to be who they want to be. Source Views: 0 La entrada Championing Diversity and Equity in STEM se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Get to know the first professional SWE Global Affiliate in China and their latest accomplishments. Source Views: 0 La entrada Global Affiliate Spotlight: SWE Wuxi in China se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked to siphon sensitive information such as environment variables from compromised systems. “Some of these packages have lived on npmjs.com for over 9   show more ...

years, and provide legitimate functionality to blockchain developers,” Sonatype researcher Ax Sharma said. […] La entrada Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely days after Google patched a similar flaw in Chrome that came under active exploitation as a zero-day. The security vulnerability, CVE-2025-2857, has been   show more ...

described as a case of an incorrect handle that could […] La entrada Mozilla Patches Critical Firefox Bug Similar to Chrome’s Recent Zero-Day Vulnerability – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. Silent Push uncovers an alleged Russian intelligence phishing campaign impersonating the CIA, targeting Ukraine supporters, anti-war activists and informants. Cybersecurity researchers at Silent Push have discovered a complex and extensive phishing operation,   show more ...

allegedly launched by Russian Intelligence Services or a similarly motivated entity, targeting individuals who support Ukraine and […] La entrada Russian Phishing Uses Fake CIA Sites to Target Anti-war, Ukraine Supporters – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: News team Selecting the right Laptop For Cybersecurity is one of the most critical decisions for cybersecurity professionals. Whether you are a CISO, penetration tester, ethical hacker, or IT security analyst, the hardware and software you rely on should be   show more ...

capable of running advanced security tools while ensuring your data remains protected from […] La entrada Best Laptop for Cybersecurity: Top Picks for Ethical Hackers & Security Professionals – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.securityweek.com – Author: Ionut Arghire Splunk on Wednesday announced patches for dozens of vulnerabilities across its products, including two high-severity flaws in Splunk Enterprise and Secure Gateway App. The enterprise monitoring solution received patches for a remote code execution (RCE) bug   show more ...

that could be exploited by low-privileged users by uploading a file to the […] La entrada Splunk Patches Dozens of Vulnerabilities – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.securityweek.com – Author: Ionut Arghire A Russian-speaking threat actor tracked as RedCurl has been observed deploying ransomware in a recent campaign, cybersecurity firm Bitdefender reports. Also tracked as Earth Kapre or Red Wolf, RedCurl has been active since at least 2018, focused on corporate   show more ...

espionage and mainly targeting organizations in the US, with additional […] La entrada Russian Espionage Group Using Ransomware in Attacks – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Advanced

Source: www.securityweek.com – Author: Eduard Kovacs British software and IT services provider Advanced Computer Software Group has been fined £3 million ($3.8 million) by the UK Information Commissioner’s Office (ICO) over a 2022 data breach resulting from a ransomware attack. Advanced, which is operating   show more ...

as OneAdvanced, was targeted in 2022 by the notorious LockBit ransomware […] La entrada UK Software Firm Fined £3 Million Over Ransomware-Caused Data Breach  – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.securityweek.com – Author: Marc Solomon Companies with structured mentoring programs are estimated to have a retention rate of 72% for mentees, compared to 49% for employees without mentorship. Likewise, one report has shown that 93% of men and 83% of women recommend their organization as a great   show more ...

place to work when allyship is actively […] La entrada The Importance of Allyship for Women in Cyber – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AI

Source: www.securityweek.com – Author: Ionut Arghire Cybersecurity startup GetReal Security on Wednesday announced raising $17.5 million in Series A funding, less than a year after emerging from stealth mode. The investment round was led by Forgepoint Capital, with additional support from Ballistic Ventures,   show more ...

Capital One Ventures, Cisco Investments, Evolution Equity, K2 Access Fund, and In-Q-Tel […] La entrada GetReal Security Raises $17.5 Million to Tackle Gen-AI Threats – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Compliance

Source: www.securityweek.com – Author: Eduard Kovacs Cambridge, Massachusetts-based defense contractor MORSE Corp has agreed to pay $4.6 million to settle allegations regarding its failure to comply with the government’s cybersecurity requirements. A law firm representing a whistleblower said its client   show more ...

raised concerns over MORSE Corp’s cybersecurity failures in January 2023. MORSE specializes in aerospace engineering […] La entrada Defense Contractor MORSE to Pay $4.6M to Settle Cybersecurity Failure Allegations – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.securityweek.com – Author: Ionut Arghire Tools designed to disable endpoint detection and response (EDR) solutions are making their way to the arsenal of more and more ransomware gangs, ESET concluded during an investigation into a link between several well-known groups. Following the demise of the   show more ...

LockBit and BlackCat ransomware groups in 2024, new threat […] La entrada Ransomware Groups Increasingly Adopting EDR Killer Tools – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 cryptocurrency

Source: www.securityweek.com – Author: Ionut Arghire California law firm Greenberg Glusker says it secured a $33 million arbitration award against T-Mobile over the wireless carrier’s mishaps related to a SIM swap attack. A SIM swap (or SIM swapping) attack occurs when threat actors contact the victim’s   show more ...

wireless carrier and convince its employees to transfer the […] La entrada T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Blog

Source: socprime.com – Author: Veronika Telychko Defenders have observed CoffeeLoader, a new stealthy malware that evades security protection using advanced evasion techniques and takes advantage of Red Team methods to boost its effectiveness. Distributed via SmokeLoader, CoffeeLoader implements secondary   show more ...

payloads while evading detection, making its stealthy attacks challenging to detect and defend against. Detect CoffeeLoader […] La entrada CoffeeLoader Detection: A New Sophisticated Malware Family Spread via SmokeLoader – Source: socprime.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cardiff's

Source: go.theregister.com – Author: Connor Jones Cardiff City Council’s director of children’s services says data was leaked or stolen from the organization, although she did not clarify how or what was pilfered. Deborah Driffield confirmed a “data breach” while giving an update to the   show more ...

Welsh council’s Governance and Audit Committee, which assembled on Tuesday. “We […] La entrada Cardiff’s children’s chief confirms data leak 2 months after cyber risk was ‘escalated’ – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 After

Source: go.theregister.com – Author: Iain Thomson Google pushed out an emergency patch for Chrome on Windows this week to stop attackers exploiting a sandbox-breaking zero-day vulnerability, seemingly used by snoops to target certain folks in Russia. Now Mozilla’s doing damage control, too, after spotting   show more ...

a similar flaw – albeit unexploited, as far as we’re aware […] La entrada After Chrome patches zero-day used to target Russians, Firefox splats similar bug – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Iain Thomson A cyber-crime ring calling itself Arkana has made a cringe music video to boast of an alleged theft of subscriber account data from Colorado-based cableco WideOpenWest (literally, WOW!) The video features gloomy music plus narration and text in Russian that   show more ...

claims – which screenshots of what looks like compromised […] La entrada Cyber-crew claims it cracked American cableco, releases terrible music video to prove it – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 China

Source: go.theregister.com – Author: Jessica Lyons The China-aligned FamousSparrow crew has resurfaced after a long period of presumed inactivity, compromising a US financial-sector trade group and a Mexican research institute. The gang also likely targeted a governmental institution in Honduras, along with   show more ...

other yet-to-be-identified victims. Plus, according to ESET researchers who spotted the activity, the […] La entrada China’s FamousSparrow flies back into action, breaches US org after years off the radar – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Power grids across the world are at risk of damaging cyber-attacks following the discovery of extensive vulnerabilities in leading solar power system manufacturers. Researchers from Forescout’s Vedere Labs warned that these vulnerabilities present realistic   show more ...

power grid attacks that could cause emergencies and blackouts. Renewable energy sources, such as solar, are a […] La entrada Solar Power System Vulnerabilities Could Result in Blackouts – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Written by The top 1% of the riskiest medical devices are used by a large majority of healthcare organizations, according to Claroty. In its State of CPS Security: Healthcare Exposures 2025 report, published on March 26, Claroty found that vulnerable smart medical   show more ...

devices – also known as Internet-of-Medical-Things (IoMT) devices – […] La entrada Nine in Ten Healthcare Organizations Use the Most Vulnerable IoT Devices – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: The Trump administration’s cuts to the Cybersecurity and Infrastructure Security Agency (CISA) will undermine US election integrity, according to expert speakers during a webinar briefing run by advocacy organization Keep Our Republic. It was reported in March   show more ...

2024 that around 300 personnel within the agency have had their contracts terminated alongside […] La entrada Trump CISA Cuts Threaten US Election Integrity, Experts Warn – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Written by A sophisticated Phishing-as-a-Service (PhaaS) platform has been identified spoofing over 100 brands to steal credentials, new research from Infoblox Threat Intel has found. The threat actor behind these campaigns has been dubbed ‘Morphing Meerkat’.   show more ...

As part of its tactics, techniques and procedures (TTP), it employs DNS email exchange (MX) […] La entrada Morphing Meerkat PhaaS Platform Spoofs 100+ Brands – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.lastwatchdog.com – Author: cybernewswire Cary, NC, Mar. 27, 2025, CyberNewswire — INE, a global leader in networking and cybersecurity training and certifications, is proud to announce it is the recipient of twelve badges in G2’s Spring 2025 Report, including Grid Leader for Cybersecurity   show more ...

Professional Development, Online Course Providers, and Technical Skills Development, which highlight […] La entrada News alert: INE receives a dozen G2 badges highlighting its cybersecurity training leadership – Source: www.lastwatchdog.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2025-03
SAT
SUN
MON
TUE
WED
THU
FRI
MarchAprilMay