Category: Cyber Security News

Hackers Selling SS7 0-Day Vulnerability on Hacker Froums for $5000

A sophisticated SS7 protocol vulnerability that enables unauthorized SMS interception and real-time phone tracking is now being offered for sale on underground forums, raising serious concerns about mobile network security worldwide.  The exploit, priced at $5,000, provides buyers with comprehensive…

New Luna Moth Domains Attacking Users Via Weaponized Helpdesk Domains

Recently identified Luna Moth phishing operations reveal a sophisticated campaign targeting legal and financial institutions through expertly crafted typosquatted domains.  Security researchers from EclecticIQ, supported by additional findings from Silent Push, have uncovered a methodical approach to domain registration that…

New SonicBoom Attack Allows Bypass of Authentication for Admin Access

A critical new attack chain, dubbed “SonicBoom,” that enables remote attackers to bypass authentication and seize administrative control over enterprise appliances, including SonicWall Secure Mobile Access (SMA) and Commvault backup solutions.  This sophisticated multi-stage exploit leverages a combination of pre-authentication…

Microsoft to Block Emails With 550 5.7.15 Access denied Error

In a notable development that will affect numerous businesses globally, Microsoft has announced that it will commence the rejection of emails that do not adhere to strict authentication standards, resulting in the error code “550 5.7.15 Access denied.” This enforcement,…

Post-Breach Recovery – A CISO’s Guide to Reputation Management

In an era where data breaches increasingly dominate headlines, Chief Information Security Officers (CISOs) face unprecedented pressure to mitigate technical fallout and salvage organizational trust. The 2024 FTC settlement with Marriott International, a $52 million penalty for systemic security failures,…

How to Configure Email Security With DMARC, SPF, And DKIM

Email is a critical business communication tool, but it is also a primary target for cybercriminals who exploit its openness to launch phishing attacks, impersonate brands, and distribute malware. To counter these threats, organizations must implement robust email authentication protocols…

The CISO’s Guide to Securing AI and Machine Learning Systems

As AI and machine learning reshape business operations, they also introduce new security challenges—making Securing AI Systems for CISOs essential, as traditional frameworks often fall short. For Chief Information Security Officers (CISOs), securing AI/ML systems requires expanding security mindsets beyond…