Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for CVE Program Cuts Sen ...

 Feed

After threatening to slash support for the CVE program, CISA threw MITRE a lifeline at the last minute — extending its government contract for another 11 months. After that, it looks like it's up to the private sector to find the cash to keep it going.

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting SonicWall Secure Mobile Access (SMA) 100 Series gateways to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The high-severity vulnerability, tracked as CVE-2021-20035 (CVSS score: 7.2), relates to a case of operating system command injection

 Feed

Apple on Wednesday released security updates for iOS, iPadOS, macOS Sequoia, tvOS, and visionOS to address two security flaws that it said have come under active exploitation in the wild. The vulnerabilities in question are listed below - CVE-2025-31200 (CVSS score: 7.5) - A memory corruption vulnerability in the Core Audio framework that could allow code execution when processing an audio

 Feed

Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly popular ClickFix social engineering tactic to deploy malware over a three-month period from late 2024 through the beginning of 2025. The phishing campaigns adopting the strategy have been attributed to clusters tracked as TA427 (aka Kimsuky), TA450 (aka MuddyWater,

 Feed

Talking about AI: Definitions Artificial Intelligence (AI) — AI refers to the simulation of human intelligence in machines, enabling them to perform tasks that typically require human intelligence, such as decision-making and problem-solving. AI is the broadest concept in this field, encompassing various technologies and methodologies, including Machine Learning (ML) and Deep Learning. Machine

 Feed

A critical security vulnerability has been disclosed in the Erlang/Open Telecom Platform (OTP) SSH implementation that could permit an attacker to execute arbitrary code sans any authentication under certain conditions. The vulnerability, tracked as CVE-2025-32433, has been given the maximum CVSS score of 10.0. "The vulnerability allows an attacker with network access to an Erlang/OTP SSH

 Feed

Blockchain is best known for its use in cryptocurrencies like Bitcoin, but it also holds significant applications for online authentication. As businesses in varying sectors increasingly embrace blockchain-based security tools, could the technology one day replace passwords? How blockchain works  Blockchain is a secure way to maintain, encrypt, and exchange digital records of transactions.

 Feed

Microsoft is calling attention to an ongoing malvertising campaign that makes use of Node.js to deliver malicious payloads capable of information theft and data exfiltration. The activity, first detected in October 2024, uses lures related to cryptocurrency trading to trick users into installing a rogue installer from fraudulent websites that masquerade as legitimate software like Binance or

 Feed

The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified organization in Myanmar with previously unreported tooling, highlighting continued effort by the threat actors to increase the sophistication and effectiveness of their malware. This includes updated versions of a known backdoor called TONESHELL, as well as a new lateral movement

 Law & order

A cybersecurity firm is buying access to underground crime forums to gather intelligence. Does that seem daft to you? And over in Nigeria, even if romance scammers would like to update their LinkedIn profiles, just how easy is it to turn a new leaf after a sweet-talking career in cybercrime? All this and more is   show more ...

discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini MITRE’s U.S.-funded CVE program, a core cybersecurity tool for tracking vulnerabilities, faces funding expiry Wednesday, risking disruption to global security. U.S. government funding for MITRE ’s CVE program, a key global cybersecurity resource for   show more ...

cataloging vulnerabilities, is set to expire Wednesday, risking disruption. The 25-year-old program has assigned over […] La entrada CISA’s 11-Month extension ensures continuity of MITRE’s CVE Program – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini Cheap Chinese Android phones ship with trojanized WhatsApp and Telegram clones hiding crypto clippers, active since June 2024. Since June 2024, Doctor Web researchers found cheap Android phones preloaded with fake WhatsApp and Telegram apps designed to   show more ...

steal crypto via clipping. These clippers swap copied wallet addresses with the […] La entrada Chinese Android phones shipped with malware-laced WhatsApp, Telegram apps – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityaffairs.com – Author: Pierluigi Paganini Resecurity warns of rising cyberattacks on the energy sector, some linked to large-scale campaigns targeting national infrastructure for geopolitical aims. Resecurity warns about the increase in targeted cyberattacks against enterprises in the energy   show more ...

sector worldwide. Some of these attacks represent much larger campaigns designed to target country-level infrastructure, acting as […] La entrada Cyber Threats Against Energy Sector Surge as Global Tensions Mount – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini The business services provider Conduent told the SEC a January cyberattack exposed personal data, including names and Social Security numbers. The business services provider Conduent revealed that personal information, including names and Social Security   show more ...

numbers, was stolen in a January cyberattack. In January, Conduent confirmed a cyberattack caused service […] La entrada Government contractor Conduent disclosed a data breach – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: A 30-fold increase in company data being exposed to shadow AI shows that offering users official AI tools doesn’t reduce the data leak and compliance risks of unsanctioned AI use. Generative AI’s many benefits come with the drawback of data security risks, primarily   show more ...

through shadow AI use and the leakage of […] La entrada CISOs no closer to containing shadow AI’s skyrocketing data risks – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: Hard-coded key vulnerability has been exploited since March, says report; analyst says programmers aren’t trained to prevent this kind of issue. CISOs running Gladinet’s CentreStack file server or Triofox file sharing server should update the applications as soon as   show more ...

possible because of a hard-coded key vulnerability which is being exploited now, […] La entrada Update these two servers from Gladinet immediately, CISOs told – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: News Analysis Apr 16, 20254 mins CyberattacksMalwarePhishing The phishing campaign impersonates ambassadors by sending out invitations to wine tastings. Cyberespionage group known as APT29 and linked to Russia’s foreign intelligence service (SVR), has added a new malware   show more ...

loader to its toolset. Used for fingerprinting, persistence and payload delivery, the new loader […] La entrada Russia-linked APT29 targets European diplomats with new malware – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: News Apr 16, 20255 mins GovernmentSecurityThreat and Vulnerability Management The US is “not a reliable partner” in supporting the CVE database, says one analyst; CVE board members establish the CVE Foundation in response. “The funding was cut randomly and without   show more ...

thought because lots of things are being cut,” he said in […] La entrada MITRE funding still in up in the air, say experts – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: News Apr 16, 20255 mins Data and Information SecurityGovernment This and other DOGE actions inside National Labor Relations Board systems constituted a “significant cybersecurity breach”, says affidavit sent to Senate Intelligence Committee members. Someone using a   show more ...

Russian IP address attempted to access the internal systems of the US National Labor Relations […] La entrada Whistleblower alleges Russian IP address attempted access to US agency’s systems via DOGE-created accounts – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: After DHS did not renew its funding contract for reasons unspecified, MITRE’s 25-year-old Common Vulnerabilities and Exposures (CVE) program was slated for an abrupt shutdown on April 16, which would have left security flaw tracking in limbo. CISA stepped in to provide a   show more ...

bridge. Important update April 16, 2025: Since this story […] La entrada CVE program averts swift end after CISA executes 11-month contract extension – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cloud Security

Source: www.networkworld.com – Author: The SASE provider adds generative AI security controls to its Cloud Access Security Broker application to track the use of genAI. Cato Networks recently unveiled new generative AI capabilities in its Cloud Access Security Broker (CASB) that the secure access service edge   show more ...

(SASE) provider says will let enterprise IT organizations detect, […] La entrada Cato Networks augments CASB with genAI security – Source: www.networkworld.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: Der Lübecker IT-Dienstleister Melting Mind wurde vor einem Jahr Ziel einer Ransomware-Attacke. Nun gibt es Hinweise auf ein neues Datenleck. Es gibt Hinweise auf ein neues Datenleck bei Melting Mind. SuPatMaN – shutterstock.com Noch am Dienstag (15. April) berichtete der   show more ...

Norddeutsche Rundfunk NDR, dass Melting Mind bei dem Cyberangriff im vergangenen […] La entrada Erneuter Datenabfluss bei Melting Mind? – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: Keine Straftat ohne Täter – doch was, wenn ein vermeintlicher Mensch nicht existiert? Cyberkriminelle nutzen zunehmend “synthetische” Identitäten. Oft reichen wenige echte Datenfragmente – etwa Name und Geburtsdatum – um eine synthetische Identität zu   show more ...

erschaffen. Studio-M – shutterstock.com Die weltweite Welle der Online-Kriminalität wird nach Einschätzung von Cyberexperten in den kommenden […] La entrada Online-Betrüger setzen auf KI und synthetische Identitäten – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: A vulnerability allowing attackers to leak NTLM authentication hashes with minimal user interaction has been actively exploited just days after Microsoft released a patch. The flaw, tracked as CVE-2025-24054, affects Windows systems and can be triggered using a   show more ...

specially crafted .library-ms file. Once a user interacts with the file – even by […] La entrada NTLM Hash Exploit Targets Poland and Romania Days After Patch – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: A push to extend a key cybersecurity law that enables information sharing between the private sector and government has gained bipartisan momentum in Congress. A new bill introduced on Wednesday seeks to reauthorize the Cybersecurity Information Sharing   show more ...

Act (CISA) for another 10 years, before it expires in September. The legislation, co-sponsored by Senator […] La entrada Senators Urge Cyber-Threat Sharing Law Extension Before Deadline – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Threat actors ramped up credential theft over the past year, using AI-generated phishing emails and infostealer malware to improve their results, according to IBM. Published this morning, the tech giant’s IBM X-Force 2025 Threat Intelligence Index was compiled   show more ...

from the company’s own incident response engagements, as well as dark web and […] La entrada Identity Attacks Now Comprise a Third of Intrusions – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Microsoft has blocked billions of dollars’ worth of fraud and scams over the course of the past year as threat actors increase their use of AI and automation. The tech giant said in a Cyber Signals report yesterday that it thwarted $4bn fraud attempts, rejected   show more ...

49,000 fraudulent partnership enrolments and blocked […] La entrada Microsoft Thwarts $4bn in Fraud Attempts – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: In a dramatic turn of events, the US Cybersecurity and Infrastructure Security Agency (CISA) has stepped in to save the Common Vulnerabilities and Exposures (CVE) Program from potential disruption, announcing an 11-month contract extension just in time. The move   show more ...

has breathed new life into the critical vulnerability tracking initiative, ensuring its […] La entrada CISA Throws Lifeline to CVE Program with Last-Minute Contract Extension – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Compromised network edge devices accounted for initial compromise in 30% of incidents impacting small and medium-sized businesses (SMBs) in 2024. These devices, which include VPN appliances, firewalls and other remote access appliances, collectively made up the   show more ...

largest single source of initial compromise of networks in intrusions tracked by Sophos Managed Detection […] La entrada Network Edge Devices the Biggest Entry Point for Attacks on SMBs – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: The UK’s Information Commissioner’s Office (ICO) has issued Merseyside-based DDP Law Ltd (DPP) a £60,000 fine following a cyber-attack which resulted in highly sensitive and confidential personal information being published on the dark web. In its statement   show more ...

relating to the fine, the ICO warned that “data protection is not optional.” The […] La entrada ICO Issues Merseyside-Based Law Firm £60,000 Fine After Cyber-Attack – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Waqas. Security researchers report CVE-2025-32433, a CVSS 10.0 RCE vulnerability in Erlang/OTP SSH, allowing unauthenticated code execution on exposed systems. A newly disclosed vulnerability in the Erlang/OTP SSH implementation could allow attackers to run code on affected   show more ...

systems without logging in. The flaw, tracked as CVE-2025-32433, was reported by researchers at […] La entrada Researchers Find CVSS 10.0 Severity RCE Vulnerability in Erlang/OTP SSH – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Waqas. Qrator Labs reports it mitigated a massive record 965 Gbps DDoS attack in April 2025, the largest incident reported this year so far. A powerful DDoS attack targeted an online betting service on April 3, 2025, peaking at 965 Gbps and causing about 90 minutes of disruption.   show more ...

According to cybersecurity […] La entrada Qrator Labs Reports Mitigating Year’s Largest DDoS Attack to Date – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. Researchers reveal a large-scale ransomware campaign leveraging over 1,200 stolen AWS access keys to encrypt S3 buckets. Learn how attackers used SSE-C silently and the key takeaways for cloud security. Researchers have uncovered a security incident concerning Amazon   show more ...

Web Services (AWS). According to Cybernews’ report, shared with Hackread.com, ransomware […] La entrada Mass Ransomware Campaign Hits S3 Buckets Using Stolen AWS Keys – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2025-04
Aggregator history
Thursday, April 17
TUE
WED
THU
FRI
SAT
SUN
MON
AprilMayJune