Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for What happens to your ...

 Threats

What do you do when you need a program but cant buy an official license yet? Correct answer: Use the trial version or Find a free alternative. Wrong answer: Search online for a cracked version. Sketchy alternative sources are known to offer cracked versions of software, along with other goodies. After wading through   show more ...

sites stuffed with ads, you may get the program you want (usually minus the future updates and network functionality), but with a miner, stealer, or whatever else thrown in for good measure. Based on real-world examples, we explain why you should avoid sites that offer instant downloads of in-demand programs. Miner and stealer on SourceForge SourceForge was once the largest site for all things open source, the forerunner of GitHub. But dont think that SourceForge is dead – today it provides software hosting and distribution services. Its software portal hosts multiple projects, uploaded by anyone who wants to. And, as with GitHub, its this cosmopolitanism that is a barrier to high-level security. Lets take just one example: our experts found a project called officepackage on SourceForge. At first glance, it looks harmless: a clear description, no-nonsense name, even a positive review. Officepackage page on SourceForge But what if we told you that the description and files were copied outright from an unrelated project on GitHub? Alarm bells are already ringing. That said, no malware lands on your computer when you click the Download button – the project is apparently clean. Apparently, because the malicious payload was not distributed directly through the officepackage project, but through the web page associated with it. How is this possible? The fact is that every project created on SourceForge gets its own domain name and hosting on sourceforge.io. So a project named officepackage is given a web page at officepackage.sourceforge[.]io. Such pages are easily indexed by search engines and rank high in search results. This is how attackers attract victims. When visiting officepackage.sourceforge[.]io from a search engine brought users to a page offering downloads of almost any version of the Microsoft Office suite. But, as ever, the devil was in the detail: when you hovered over the Download button, the browsers status bar showed a link to https[:]//loading.sourceforge[.]io/download. Spotted the trap? The new link has nothing to do with officepackage; loading is an entirely different project. The Download button on the officepackage page of the SourceForge software portal leads to a completely different project And after clicking, users were redirected not to the page of the loading project, but to another intermediary site with another Download button. And only after clicking this did the user, weary of surfing, finally receive a file – an archive named vinstaller.zip. Inside was another archive, and inside this second archive was a malicious Windows Installer. At the heart of this evil nesting doll were two nasties: instead of Microsoft products, a miner and ClipBanker – malware for substituting crypto wallet addresses in the clipboard – were let loose on the victims device after running the installer. Details of the infection scheme can be found in the full version of the study on our Securelist blog. Malicious TookPS installer disguised as legitimate software Cybercriminals do not limit themselves to SourceForge and GitHub. In another recent case unearthed by our experts, attackers were found distributing the malicious TookPS downloader, already familiar to us from the fake DeepSeek and Grok clients, through fake websites offering free downloads of specialized software. We discovered a whole series of such sites offering users cracked versions of UltraViewer, AutoCAD, SketchUp and other popular professional software, meaning that the attack was not only aimed at home users, but also at professional freelancers and organizations. Other malicious files detected included the names Ableton.exe and QuickenApp.exe, purported versions of the popular music creation and money management applications. Fake pages distributing TookPS By circuitous means, the installer downloaded two backdoors to the victims device: Backdoor.Win32.TeviRat and Backdoor.Win32.Lapmon. See another Securelist post to find out exactly how the malware was delivered to the victims device. The malware gave the attackers full access to the victims computer. How to protect yourself First, do not download pirated software. Under any circumstances. Ever. A cracked program may be temptingly free and instantly available, but the price you pay will be measured not in money, but in data – your data. And no, that doesnt mean family photos and chats with friends. Cybercriminals are after your crypto wallets, payment card details, account passwords – and even your computers resources for cryptocurrency mining. Heres a list of rules we recommend for anyone who uses SourceForge, GitHub and other software portals. If you cant buy the full version of an application, use alternatives or trial versions, not cracked software. You might not get the full functionality, but at least your device is guaranteed to be safe. Only download programs from trusted sources. As SourceForge and GitHub practice shows, even then you should proceed with caution and scan all downloaded files with an antivirus. Protect your cryptocurrency and banking data with reliable tools. Treat virtual wallets with the same reverence as physical ones. Further reading in support of not downloading pirated software: The dangers of pirated games NullMixer: multiple malware in one XMRig miner as a New Years gift Malware lurking in official GitHub and GitLab links

image for Experts Optimistic a ...

 Feed

Secure by Design is an important step to reduce the number of vulnerabilities present originally, but is it progressing fast enough? Security experts Chris Wysopal and Jason Healey say things are improving for the better.

 Feed

Google has shipped patches for 62 vulnerabilities, two of which it said have been exploited in the wild. The two high-severity vulnerabilities are listed below - CVE-2024-53150 (CVSS score: 7.8) - An out-of-bounds flaw in the USB sub-component of Kernel that could result in information disclosure CVE-2024-53197 (CVSS score: 7.8) - A privilege escalation flaw in the USB sub-component of Kernel

 Feed

A recently disclosed critical security flaw impacting CrushFTP has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog after reports emerged of active exploitation in the wild. The vulnerability is a case of authentication bypass that could permit an unauthenticated attacker to take over susceptible instances. It has

 Feed

Security Operations Centers (SOCs) today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly, cumbersome, and increases analyst fatigue, burnout, and attrition. While artificial intelligence has emerged as a go-to solution, the term “AI” often blurs crucial distinctions. Not all AI is built equal, especially in the SOC. Many

 Feed

The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed a new set of cyber attacks targeting Ukrainian institutions with information-stealing malware. The activity is aimed at military formations, law enforcement agencies, and local self-government bodies, particularly those located near Ukraine's eastern border, the agency said. The attacks involve distributing phishing emails

 Feed

Fortinet has released security updates to address a critical security flaw impacting FortiSwitch that could permit an attacker to make unauthorized password changes. The vulnerability, tracked as CVE-2024-48887, carries a CVSS score of 9.3 out of a maximum of 10.0. "An unverified password change vulnerability [CWE-620] in FortiSwitch GUI may allow a remote unauthenticated attacker to modify

 Feed

Cybersecurity researchers have disclosed details of a now-patched security flaw in the Amazon EC2 Simple Systems Manager (SSM) Agent that, if successfully exploited, could permit an attacker to achieve privilege escalation and code execution. The vulnerability could permit an attacker to create directories in unintended locations on the filesystem, execute arbitrary scripts with root privileges,

 Feed

Threat actors have been observed distributing malicious payloads such as cryptocurrency miner and clipper malware via SourceForge, a popular software hosting service, under the guise of cracked versions of legitimate applications like Microsoft Office. "One such project, officepackage, on the main website sourceforge.net, appears harmless enough, containing Microsoft Office add-ins copied from a

 Cyber Security News

Source: go.theregister.com – Author: Jessica Lyons That massive GitHub supply chain attack that spilled secrets from countless projects? It traces back to a stolen token from a SpotBugs workflow – exposed way back in November, months earlier than previously suspected. After “piecing together the   show more ...

stages” of the tj-actions/changed-files compromise, Palo Alto Networks’ Unit 42 threat […] La entrada That massive GitHub supply chain attack? It all started with a stolen SpotBugs token – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Alleged

Source: go.theregister.com – Author: Connor Jones Noah Michael Urban, 20, of alleged Scattered Spider infamy, has pleaded guilty to various charges and potentially faces decades in prison. Urban was one of five spiders scattered across the US and UK indicted in November 2024 for their alleged roles in various   show more ...

cyberattacks, most of which used the […] La entrada Alleged Scattered Spider SIM-swapper must pay back $13.2M to 59 victims – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Chrome

Source: go.theregister.com – Author: Thomas Claburn A 23-year-old side-channel attack for spying on people’s web browsing histories will get shut down in the forthcoming Chrome 136, released last Thursday to the Chrome beta channel. At least that’s the hope. The privacy attack, referred to as   show more ...

browser history sniffing, involves reading the color values of web […] La entrada Chrome to patch decades-old flaw that let sites peek at your history – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Connor Jones Details of Apple’s appeal against the UK’s so-called “backdoor order” will now play out in public after the Home Office failed in its bid to keep them secret on national security grounds. The confirmation comes after the Investigatory   show more ...

Powers Tribunal held a closed-door hearing on March 14, which was […] La entrada UK’s attempt to keep details of Apple ‘backdoor’ case secret… denied – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Daniel Andrew, Head of Security Services, Intruder Partner Content : AWS provides a number of security services, such as GuardDuty, Inspector, Config, and Security Hub, designed to protect your cloud environment. However, relying solely on these can leave critical security   show more ...

gaps. Here’s a clear breakdown of AWS security services and their […] La entrada What native cloud security tools won’t catch – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Asian

Source: go.theregister.com – Author: Simon Sharwood Asia In Brief Asian nations and tech companies are trying to come to terms with the USA’s new universal import tariffs and additional “reciprocal tariffs”. Taiwanese contract manufacturing giant Foxconn, a supplier to Apple, Dell, Amazon and HP, has   show more ...

warned shareholders that “the impact of evolving and economic conditions […] La entrada Asian tech players react to US tariffs with delays, doubts, deal-making – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Waqas. The United States has successfully extradited a group of fugitives from nine countries to face charges ranging from murder and child abuse to running dark web cybercrime marketplaces and drug trafficking rings. The extradited fugitives came from the following countries:   show more ...

Israel Spain Mexico Kosovo Canada Thailand Colombia Germany Honduras The extradited […] La entrada Brothers Behind Rydox Dark Web Market Extradited to US – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: CyberNewswire. Austin, TX, USA, April 7th, 2025, CyberNewsWire Deep visibility into malware-siphoned data can help close gaps in traditional defenses before they evolve into major cyber threats like ransomware and account takeover SpyCloud, the leading identity threat protection   show more ...

company, today released new analysis of its recaptured darknet data repository that shows […] La entrada SpyCloud Research Shows that Endpoint Detection and Antivirus Solutions Miss Two-Thirds (66%) of Malware Infections – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. A sophisticated new artificial intelligence (AI) platform tailored for offensive cyber operations, named Xanthorox AI, has been identified by cybersecurity firm SlashNext. First appearing in late Q1 2025, Xanthorox AI is reportedly circulating within cybercrime   show more ...

communities on darknet forums and encrypted channels. According to SlashNext’s investigation, shared with Hackread.com […] La entrada Xanthorox AI Surfaces on Dark Web as Full Spectrum Hacking Assistant – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Google has shipped patches for 62 vulnerabilities, two of which it said have been exploited in the wild. The two high-severity vulnerabilities are listed below – CVE-2024-53150 (CVSS score: 7.8) – An out-of-bounds flaw in the USB sub-component of Kernel that   show more ...

could result in information disclosure CVE-2024-53197 (CVSS score: 7.8) […] La entrada Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.schneier.com – Author: Bruce Schneier In “Secrets and Lies” (2000), I wrote: It is poor civic hygiene to install technologies that could someday facilitate a police state. It’s something a bunch of us were saying at the time, in reference to the vast NSA’s surveillance capabilities. I have   show more ...

been thinking of that quote a […] La entrada DIRNSA Fired – Source: www.schneier.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.lastwatchdog.com – Author: cybernewswire Austin, TX, USA, April 7, 2025, CyberNewswire — SpyCloud, the leading identity threat protection company, today released new analysis of its recaptured darknet data repository that shows threat actors are increasingly bypassing endpoint protection   show more ...

solutions: 66% of malware infections occur on devices with endpoint security solutions installed. SpyCloud offers integrations […] La entrada News alert: SpyCloud study shows gaps in EDR, antivirus — 66% of malware infections missed – Source: www.lastwatchdog.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.lastwatchdog.com – Author: bacohido New York, NY, Apr. 3, 2025 — YRIKKA has released the first publicly available API for agentic red teaming of Visual AI assets. This release comes at the heels of YRIKKA successfully raising its pre-seed funding round of $1.5M led by Focal and Garuda Ventures.   show more ...

The company was founded by […] La entrada News alert: YRIKKA’s ‘Red Teaming’ API advances AI safety, reliability in high-stakes applications – Source: www.lastwatchdog.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Access Management

Source: heimdalsecurity.com – Author: Livia Gyongyoși Admin by Request is a Privileged Access Management (PAM) solution designed to help organizations manage local admin rights. Users appreciate its ease of use and cloud-based approach. Yet according to user reviews their version for MacOS needs to improve. We   show more ...

had to move to only using admin sessions due […] La entrada Best 8 Admin by Request Alternatives and Competitors – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: heimdalsecurity.com – Author: Gabriella Antal Advanced threats can bypass basic detection methods. Open-source EDR tools (Endpoint Detection and Response) can protect your digital ecosystem against next-generation threats that antivirus-based systems can’t detect. Here’s a comprehensive list of   show more ...

the most popular open-source EDR tools available online. What is Endpoint Detection and Response? EDR is a strategic approach […] La entrada Ten Open-Source EDR Tools to Enhance Your Cyber-Resilience Factor – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: heimdalsecurity.com – Author: Gabriella Antal This post is authored by Heimdal’s Cybersecurity Architect and Technical Product Marketing Manager Andrei Hinodache. You may know him as the face of our popular series of webinars. If you want to watch the full webinar this EDR strategy guide is based   show more ...

on, check out the recording here. If you want to […] La entrada The Complete Guide: How to Create an Endpoint Detection and Response (EDR) Strategy – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: heimdalsecurity.com – Author: Gabriella Antal Choosing between XDR and EDR is piece of cake, once you understand the scope, differences and capabilities of each solution. Endpoint Detection and Response (EDR) tools only cover endpoint monitoring and responding to threats for devices. On the other   show more ...

hand, Extended Detection and Response (XDR) solutions provide network, cloud, and email […] La entrada XDR vs. EDR – A Comparison – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: heimdalsecurity.com – Author: Gabriella Antal When it comes to cybersecurity incidents, your company’s endpoints are some of the most important IT assets you want to protect. Explore with me the critical differences in EPP vs. EDR and learn how they play a vital role in strengthening your company’s   show more ...

cybersecurity. Key Takeaways: Understand the differences […] La entrada EPP vs. EDR [How to Choose the Best Endpoint Protection Platform] – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: heimdalsecurity.com – Author: Gabriella Antal When it comes to threat detection, it’s important to get the right tools for the job. Unfortunately, that can be easier said than done. Whether it’s a SIEM, EDR, XDR, MDR, or any of a whole other range of confusing and overlapping terms – there are   show more ...

a lot of products on […] La entrada EDR vs. SIEM: Key Differences, Features, Functionality Gaps, and More – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Owais Sultan. Online gaming has become an integral part of modern entertainment, with millions of players connecting from all over the world to immerse themselves in virtual worlds, participate in competitive matches, or simply relax with friends. However, while gaming offers   show more ...

exciting experiences, it also exposes players to a range of […] La entrada Online Gaming Risks and How to Avoid Them – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Waqas. Cybersecurity researchers from CYFIRMA have revealed a new version of Neptune RAT, a remote administration tool targeting Windows devices. Marketed on platforms like GitHub, Telegram, and YouTube with claims of being the “Most Advanced RAT,” the malware is attracting   show more ...

both newcomers to cybercrime and seasoned hackers looking for a ready-made […] La entrada Neptune RAT Variant Spreads via YouTube to Steal Windows Passwords – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: An unknown threat actor is deploying a large-scale, sophisticated cryptojacking campaign through a series of malicious extensions in Visual Studio Code, Microsoft’s lightweight source-code editor, according to a group of security researchers. In a new report   show more ...

shared exclusively with Infosecurity, researchers from newly founded cybersecurity startup ExtensionTotal observed that at least […] La entrada Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: A rise in smishing campaigns impersonating toll service providers has been traced to a China-based cybercriminal group known as the Smishing Triad. The group is using deceptive instant messages to defraud users in the US and UK, with signs the activity may spread   show more ...

globally. According to a new advisory by Resecurity, the […] La entrada Smishing Triad Fuels Surge in Toll Payment Scams in US, UK – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: A self-contained AI system engineered for offensive cyber operations, Xanthorox AI, has surfaced on darknet forums and encrypted channels. Introduced in late Q1 2025, it marks a shift in the threat landscape with its autonomous, modular structure designed to   show more ...

support large-scale, highly adaptive cyber-attacks. Built entirely on private servers, Xanthorox avoids […] La entrada Darknet’s Xanthorox AI Offers Customizable Tools for Hackers – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Jessica Lyons A bug in WhatsApp for Windows can be exploited to execute malicious code by anyone crafty enough to persuade a user to open a rigged attachment – and, to be fair, it doesn’t take much craft to pull that off. The spoofing flaw, tracked as   show more ...

CVE-2025-30401, affects all versions […] La entrada Don’t open that JPEG in WhatsApp for Windows. It might be an .EXE – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Jessica Lyons Despite several arrests last year, Scattered Spider’s social engineering attacks are continuing into 2025 as the cybercrime collective targets high-profile organizations and adds another phishing kit to its arsenal along with a new version of Spectre RAT   show more ...

malware. Plus, in welcome news to anyone who isn’t a Rick Astley […] La entrada Scattered Spider stops the Rickrolls, starts the RAT race – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 braces

Source: go.theregister.com – Author: Jessica Lyons Analysis Slashing staff at the US govt’s Cybersecurity and Infrastructure Security Agency, aka CISA, and scrapping vital programs, isn’t exactly boosting national security, say infosec and national security officials watching America’s digital   show more ...

defenses unravel in real time. As CISA braces for the ax to potentially fall on nearly 40 […] La entrada As CISA braces for more cuts, threat intel sharing takes a hit – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Iain Thomson Oracle has briefed some customers about a successful intrusion into its public cloud, as well as the theft of their data, after previously denying it had been compromised. Claims of a cyberattack on Oracle’s cloud service emerged in late March when a miscreant   show more ...

using the handle “rose87168” boasted of […] La entrada Oracle says its cloud was in fact compromised – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 ClipBanker

Source: securelist.com – Author: AMR Recently, we noticed a rather unique scheme for distributing malware that exploits SourceForge, a popular website providing software hosting, comparison, and distribution services. The site hosts numerous software projects, and anyone can upload theirs. One such project,   show more ...

officepackage, on the main website sourceforge.net, appears harmless enough, containing Microsoft Office add-ins […] La entrada Attackers distributing a miner and the ClipBanker Trojan via SourceForge – Source: securelist.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Android

Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed   show more ...

triggered the security solution. There are several actions […] La entrada 2 Android Zero-Day Bugs Under Active Exploit – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed   show more ...

triggered the security solution. There are several actions that could […] La entrada Dangerous, Windows-Hijacking Neptune RAT Scurries Into Telegram, YouTube – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Fernando José Karl Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the security   show more ...

solution. There are several actions that could trigger […] La entrada How Democratized Development Creates a Security Nightmare – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2025-04
Aggregator history
Tuesday, April 08
TUE
WED
THU
FRI
SAT
SUN
MON
AprilMayJune