In 2024, businesses paid $813 million to cyber criminals as the result of ransomware. That’s an astronomical sum, highlighting the immense financial burden cybercrime places on organizations. Rhode Island’s cyberattack of December 2024, where state officials paid out a $5…
Category: EN
PoC Released for Critical Erlang/OTP SSH RCE Vulnerability
Security teams across industries are urgently patching systems following the public release of a proof-of-concept (PoC) exploit for a newly disclosed critical remote code execution (RCE) vulnerability in Erlang/OTP’s SSH implementation. The flaw, tracked as CVE-2025-32433 and assigned a maximum CVSS score…
Over 17,000 Fortinet Devices Hacked Using Symbolic Link Exploit
According to cybersecurity nonprofit Shadowserver, a major cyberattack has compromised more than 17,000 Fortinet devices globally, exploiting a sophisticated symbolic link persistence technique. The incident marks a rapid escalation from early reports, which initially identified approximately 14,000 affected devices just…
CISA Issues Alert on Actively Exploited Apple 0-Day Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority warning regarding two critical zero-day vulnerabilities impacting a wide range of Apple devices. The flaws, which impact the latest versions of iOS, iPadOS, macOS, and other Apple products, are…
CISA Warns of Active Exploitation of Windows NTLM Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) alerted organizations to active exploitation of a newly disclosed Microsoft Windows vulnerability tracked as CVE-2025-24054. The flaw affects Windows’ NTLM authentication protocol, creating an opportunity for unauthorized attackers to infiltrate systems via…
Funding Expires for Key Cyber Vulnerability Database
A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware is in danger of breaking down. The federally funded, non-profit research and development organization MITRE warned today that its contract…
Fresh Windows NTLM Vulnerability Exploited in Attacks
A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions. The post Fresh Windows NTLM Vulnerability Exploited in Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Understanding Credential Stuffing: A Growing Cybersecurity Threat
Credential stuffing is a pervasive and increasingly sophisticated cyberattack that exploits the widespread habit of password reuse among users. By […] The post Understanding Credential Stuffing: A Growing Cybersecurity Threat appeared first on Security Boulevard. This article has been indexed…
Midnight Blizzard Targets European Diplomats with Wine Tasting Phishing Lure
Russian state actor Midnight Blizzard is using fake wine tasting events as a lure to spread malware for espionage purposes, according to Check Point This article has been indexed from www.infosecurity-magazine.com Read the original article: Midnight Blizzard Targets European Diplomats…
PKWARE Quantum Readiness Assessment secures data from quantum computing threats
PKWARE announced its quantum readiness assessment and encryption capabilities to help organizations protect sensitive data from quantum computing threats. Quantum computing is no longer theoretical—it is becoming a powerful reality with the potential to disrupt current encryption standards. As quantum machines…
Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT
Cybersecurity researchers are warning of continued risks posed by a distributed denial-of-service (DDoS) malware known as XorDDoS, with 71.3 percent of the attacks between November 2023 and February 2025 targeting the United States. “From 2020 to 2023, the XorDDoS trojan…
Security Gaps Widen: A Perfect Storm for Insider Threats
High-profile cyberattacks involving ransomware, malware, zero-day exploits, and nation-state intrusions dominate headlines. These attacks are bold, disruptive, and external, commanding attention from security teams to detect and stop these threats. Amid the noise, a quieter danger is gaining momentum from…
Entertainment venue management firm Legends International disclosed a data breach
Legends International disclosed a data breach from November 2024 that affected employees and visitors to its managed venues. Legends International is a global leader in sports and entertainment venue management, specializing in delivering comprehensive solutions for stadiums, arenas, and attractions.…
Cyberthreat sharing law renewal, APTs love ClickFix, GoDaddy mutes Zoom
Bipartisan push for renewal of cyberthreat information sharing law ClickFix becoming a favorite amongst state-sponsored hackers GoDaddy puts Zoom on mute for about 90 minutes Thanks to this week’s episode sponsor, Vanta Do you know the status of your compliance…
United Health offers Ransomware Loans
Ransomware attacks have become a significant threat to businesses, often leaving them financially devastated and struggling to stay afloat. Many affected companies find it nearly impossible to recover, eventually teetering on the edge of closure due to the financial burden…
Gaps In Encryption Create Exploitable Vulnerabilities
Data breaches are no occasional crisis – they are a persistent, costly epidemic wreaking global havoc on businesses. While organizations leverage the latest technological advancements in perimeter defense, access management, and cloud and application security, one area that is overlooked…
CISA Warns of Multiple Apple 0-day Vulnerabilities Actively Exploited in Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory regarding multiple Apple 0-day vulnerabilities currently being actively exploited in targeted attacks. These critical security flaws affect a wide range of Apple products, including iOS, iPadOS, macOS, and…
Medusa Ransomware: Inside the 2025 Resurgence of One of the Internet’s Most Aggressive Threats
Medusa: Its operations, the main factor driving its recent resurgence, which has led to warnings issued by global authorities, its targets and why it’s so dangerous. The post Medusa Ransomware: Inside the 2025 Resurgence of One of the Internet’s Most Aggressive Threats …
The UK’s phone theft crisis is a wake-up call for digital security
Phone theft is now commonplace in London. The Met Police recently revealed that it seizes 1,000 stolen phones weekly as it cracks down on organized criminal networks driving the £50 million trade. Nationally, cases have doubled to 83,900 annually. The…
The Secret CISO: Insights and Reflections from Cybersecurity Leaders
In this episode of Cybersecurity Today titled ‘The Secret CISO,’ host Jim Love, along with guests Octavia Howell, Daniel Pinsky, and John Pinard, delves into the personal and professional experiences of Chief Information Security Officers (CISOs). They share their…