MITRE avoids CVE program shutdown with last-minute contract extension. Questions remain about long-term funding and the future of… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: CVE Program…
Category: EN
Windows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack Systems
A critical vulnerability in Microsoft Windows, identified as CVE-2025-24054, has been actively exploited in the wild since March 19, 2025, targets organizations worldwide. The flaw, which enables NTLM hash disclosure through spoofing, allows attackers to harvest sensitive user credentials with…
What is Pretty Good Privacy and how does it work?
Pretty Good Privacy, or PGP, was a popular program used to encrypt and decrypt email over the internet, as well as authenticate messages with digital signatures and encrypted stored files. This article has been indexed from Search Security Resources and…
Nomination Deadline Extended: Technical Advisory Committees
The nomination period for the Technical Advisory Committees (TACs) has been extended. The new deadline is Sunday, April 27, 2025. Take advantage of the extended timeline to submit thoughtful nominations — and play an active role in shaping the future…
Nvidia And Partners To Build $500 Billion Of AI Infrastructure In US
Nvidia to partner with TSMC, Foxconn, Wistron, Amkor and SPIL to build $500 billion (£377 billion) worth of AI infrastructure in US This article has been indexed from Silicon UK Read the original article: Nvidia And Partners To Build $500…
Hackers Attacking Investors Via Fraud Networks to Steal Financial Data
A sophisticated cybercriminal campaign targeting Indian investors through fraudulent stock and cryptocurrency schemes has escalated, with hackers leveraging social engineering, fake mobile applications, and compromised government websites to steal financial data. These attacks exploit the rapid growth of digital investment…
The Psychology of Social Engineering – What Security Leaders Should Know
Social engineering remains one of the most persistent threats to organizational security because it targets human psychology rather than technological vulnerabilities. Unlike conventional cyber threats that exploit technical weaknesses, social engineering manipulates the fundamental psychological traits that make us human.…
Securing Digital Identities – Best Practices for CISOs
In the digital age, the security of digital identities has become a defining challenge for organizations worldwide. As businesses embrace cloud computing, remote work, and interconnected ecosystems, digital identities representing users, devices, and applications have become prime targets for cybercriminals.…
Why Modern CISOs Must Be Business Translators, Not Just Technologists
The Chief Information Security Officer (CISO) role has fundamentally transformed today’s digital-first world. Once viewed primarily as technical guardians of the organizational perimeter, CISOs are now expected to be strategic partners who drive business value. As cyber threats become more…
3 Malware Tactics Used To Evade Detection By Corporate Security: See Examples
Some threats don’t kick down the door; they slip in, stay quiet, and wait. These days, attackers are playing the long game, using evasion techniques to hide in plain sight, delay detection, and make it harder for security teams to…
China’s Rare Earth Export Restrictions Poses Threat To US Defence
American think tank warns about possible threat to US defence, after China imposes rare earth export restrictions This article has been indexed from Silicon UK Read the original article: China’s Rare Earth Export Restrictions Poses Threat To US Defence
Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware
CloudSEK’s Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been demonstrated to target individuals and organizations globally. This attack, previously hinted at by the FBI’s Denver field office, involves the distribution of potent malware, known as…
Server-Side Phishing Attacks Target Employee and Member Portals to Steal Login Credentials
Attackers have been deploying server-side phishing schemes to compromise employee and member login portals across various enterprises. This strategic shift to server-side operations is designed to evade detection and complicate analysis. Evolving Phishing Techniques Recent investigations have highlighted a marked…
Congress Moves Closer to Risky Internet Takedown Law | EFFector 37.4
Sorry, EFF doesn’t hand out candy like the Easter Bunny, but we are here to keep you updated on the latest digital rights news with our EFFector newsletter! This edition of EFFector explains how you can help us push back…
What’s happening with MITRE and the CVE program uncertainty
Yesterday’s headlines have sent ripples through the cybersecurity and software supply chain communities: MITRE announced that U.S. government funding for the CVE (Common Vulnerabilities and Exposures) database was set to expire today. Overnight, the CVE Foundation emerged with a plan…
Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler
Cybersecurity researchers have detailed four different vulnerabilities in a core component of the Windows task scheduling service that could be exploited by local attackers to achieve privilege escalation and erase logs to cover up evidence of malicious activities. The issues…
6,000 WordPress Sites Affected by Arbitrary File Move Vulnerability in Drag and Drop Multiple File Upload for WooCommerce WordPress Plugin
On March 28th, 2025, we received a submission for an Arbitrary File Move vulnerability in Drag and Drop Multiple File Upload for WooCommerce, a WordPress plugin with more than 6,000 active installations. This vulnerability makes it possible for unauthenticated threat…
CISA Extends Support a Last Minute to CVE Program, Averting Global Cybersecurity Crisis
CISA announced an eleventh-hour contract extension with MITRE Corporation to maintain the Common Vulnerabilities and Exposures (CVE) program, narrowly avoiding a lapse in federal funding that threatened to destabilize vulnerability management worldwide. The move came just hours before the program’s…
Researchers Expose Medusa Ransomware Group’s Onion Site
Researchers have successfully infiltrated the digital fortress of one of the most prolific ransomware groups, Medusa Locker. Known for targeting critical sectors like healthcare, education, and manufacturing, the group has been responsible for numerous cyberattacks since its detection in 2019.…
Interlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser Updates
The Interlock ransomware intrusion set has escalated its operations across North America and Europe with sophisticated techniques. Not falling under the typical Ransomware-as-a-Service (RaaS) category, Interlock operates independently, focusing primarily on Big Game Hunting and double extortion campaigns. This group’s…