Cyber security aggregate rss news

Cyber security aggregator - feeds history

 Feed

Cybersecurity researchers have discovered a malicious Go module that presents itself as a brute-force tool for SSH but actually contains functionality to discreetly exfiltrate credentials to its creator. "On the first successful login, the package sends the target IP address, username, and password to a hard-coded Telegram bot controlled by the threat actor," Socket researcher Kirill Boychenko

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: News team The battle against cybercrime continues to be a significant topic for organizations across all industries, however the threat to the health care industry is possibly the most serious. Financial losses can be devastating for an organization, however when   show more ...

the potential for loss of life is at stake, the whole […] La entrada Healthcare Organizations at Risk: Managing Human Vulnerability in Cybersecurity – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: News team Dealerships handle sensitive information, such as credit applications and personal financial records, daily. A data breach can lead to profound consequences for both the dealership and its customers. Dealerships can face immense reputational damage, and   show more ...

customers can have their bank accounts wiped should data fall into the wrong hands. […] La entrada How Dealerships Can Protect Their Customers’ Financial Data – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 API security

Source: securityboulevard.com – Author: George McGregor To protect against Man-in-the-Middle (MitM) attacks in mobile, you need robust end-to-end security that includes certificate pinning as part of a broader solution which eliminates on-device threats and allows fast and easy pin rotation. See this blog for a   show more ...

short overview of the MitM issue in mobile.  The post […] La entrada Debunking Myths and Best Practices for MitM Protection in Mobile Apps – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Blue Locker

Source: www.exponential-e.com – Author: Graham Cluley Critical infrastructure organisations are once again being warned of the threat posed by malicious cybercriminals, following a ransomware attack against a state-owned energy company in Pakistan. Pakistan Petroleum Limited (PPL), a major producer of oil and   show more ...

gas in the country, was hit by the Blue Locker ransomware that targeted […] La entrada Blue Locker ransomware hits critical infrastructure – is your organisation ready? – Source: www.exponential-e.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini Kidney dialysis firm DaVita confirms ransomware breach exposed personal and health data of nearly 2.7M individuals. Kidney dialysis firm DaVita disclosed a data breach after a ransomware attack, the incident exposed personal and health information of   show more ...

nearly 2.7 million individuals. The number of impacted individuals reported by the Department […] La entrada Kidney dialysis firm DaVita confirms ransomware attack compromised data of 2.7M people – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 APT

Source: securityaffairs.com – Author: Pierluigi Paganini China-linked Silk Typhoon APT group ramp up North America attacks, exploiting n-day and zero-day flaws for system access, CrowdStrike warns. China-linked Silk Typhoon APT group (aka Murky Panda) targets organizations in North America exploiting n-day and   show more ...

zero-day flaws for system access, CrowdStrike warns. This Chinese APT has one of […] La entrada China-linked Silk Typhoon APT targets North America – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AMOS

Source: securityaffairs.com – Author: Pierluigi Paganini Over 300 entities hit by the Atomic macOS Stealer via malvertising campaign between June and August, CrowdStrike warns. From June and August, over 300 entities were hit by a variant of the Atomic macOS Stealer (AMOS) called SHAMOS, reports CrowdStrike.   show more ...

The Atomic macOS Stealer lets operators steal diverse information […] La entrada Over 300 entities hit by a variant of Atomic macOS Stealer in recent campaign – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0day

Source: hackread.com – Author: Waqas. Apple fixes CVE-2025-43300, a flaw letting hackers hijack devices via malicious images. Users urged to update iPhone, iPad, and Mac now. Several cybersecurity researchers recently warned that a critical vulnerability (CVE‑2025‑43300) in Apple’s image‑processing   show more ...

framework was being abused by attackers. Apple has now released updates across iPhone, iPad and Mac […] La entrada Hackers Could Take Over Apple Devices Via Malicious Images – Patch Now! – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 bounties

Source: go.theregister.com – Author: Iain Thomson feature Thirty years ago, Netscape kicked off the first commercial bug bounty program. Since then, companies large and small have bought into the idea, with mixed results. Bug bounties seem simple: a flaw finder spots a vulnerability, responsibly discloses it,   show more ...

and then gets a reward for their labor. But […] La entrada Bug bounties: The good, the bad, and the frankly ridiculous ways to do it – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments ResearcherZero • August 22, 2025 10:14 PM @Name If they can stop criminals before they act then they do not have to worry about the difficulty of conviction. Conviction to deal with all those old case files in storage. – Not much   show more ...

intelligence. During the Crimean War, […] La entrada Friday Squid Blogging: Bobtail Squid – Source: www.schneier.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2025-08
Aggregator history
Sunday, August 24
FRI
SAT
SUN
MON
TUE
WED
THU
AugustSeptember