Author: wordpress

Surge in Skitnet Usage Highlights Evolving Ransomware Tactics

  Today’s cyber threat landscape is rapidly evolving, making it increasingly difficult for adversaries to tell the difference between traditional malware families, as adversaries combine their capabilities to maximise their impact. Skitnet, an advanced multistage post-exploitation toolkit, is one of…

XenServer Windows VM Tools Flaw Enables Attackers to Run Arbitrary Code

Citrix has issued a high-severity security bulletin addressing multiple vulnerabilities—CVE-2025-27462, CVE-2025-27463, and CVE-2025-27464—affecting XenServer VM Tools for Windows. These vulnerabilities allow attackers with the ability to execute arbitrary unprivileged code within a guest Windows VM to escalate privileges and compromise…

Comparing Windows Hello vs. Windows Hello for Business

Windows Hello allows desktop admins to manage local Windows authentication with new tools, but the difference between the free and business versions is critical for IT to know. This article has been indexed from Search Security Resources and Information from…

New PumaBot targets Linux IoT surveillance devices

PumaBot targets Linux IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and mine crypto. Darktrace researchers discovered a new botnet called PumaBot targets Linux-based IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and mine…

93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web

Security researchers have uncovered a significant cybercrime operation involving 93.7 billion stolen browser cookies circulating on dark web marketplaces, representing a 74% increase from the previous year’s findings.  The comprehensive analysis, conducted by NordStellar threat exposure management platform, reveals that…

Incident Response Planning – Preparing for Data Breaches

As the digital threat landscape intensifies and new technologies reshape business operations, cybersecurity budgeting in 2025 will be significantly transformed. Organizations worldwide are increasing their security spending and rethinking how to allocate resources most effectively to defend against evolving risks…

Fake Bitdefender Site Spreads Trio of Malware Tools

A spoofed Bitdefender site has been used in a malicious campaign distributing VenomRAT and other malware, according to DomainTools This article has been indexed from www.infosecurity-magazine.com Read the original article: Fake Bitdefender Site Spreads Trio of Malware Tools

#55 – Tatort digitaler Raum: Hilfe bei Gewalt im Netz

Alles, was uns analog bewegt, spiegelt sich online wider. Auch Dinge wie Betrug, Hass und Gewalt. Die Fälle von Desinformation und digitaler Gewalt nehmen zu. Digitale Gewalt ist die missbräuchliche Nutzung von Technik, um Menschen – meist aus dem eigenen…