Cybersecurity researchers have uncovered a significant evolution in the tactics of the Chinese threat group UNC5174, which has incorporated a new open-source tool and command-and-control (C2) infrastructure into their malicious operations. The group, known for targeting government institutions and critical…
Category: EN
Oracle Security Update – Patch for 378 Vulnerabilities Including Remote Exploits
Oracle released its April 2025 Critical Patch Update (CPU), addressing 378 new security vulnerabilities across its extensive product portfolio. The quarterly security update, announced on Wednesday, contains patches for numerous high-risk flaws, many of which could potentially allow remote exploitation…
Why Phishing Remains the #1 Cyber Threat & How to Stop It
Phishing is the most prevalent and damaging cyber threat facing organizations and individuals worldwide. Despite technological advancements in cybersecurity, phishing attacks have persisted and evolved, exploiting human psychology and digital defense gaps. Phishing’s simplicity, adaptability, and high success rate make…
Cyber Threats Against Energy Sector Surge as Global Tensions Mount
Resecurity warns of rising cyberattacks on the energy sector, some linked to large-scale campaigns targeting national infrastructure for geopolitical aims. Resecurity warns about the increase in targeted cyberattacks against enterprises in the energy sector worldwide. Some of these attacks represent much…
Alert: Security Gaps Allow Bots to Exploit UK Driving Test Booking System
DataDome conducted a security assessment of the UK’s online driving test booking system and identified several vulnerabilities in the system’s protection mechanisms. The post Alert: Security Gaps Allow Bots to Exploit UK Driving Test Booking System appeared first on Security…
Chaos Reigns as MITRE Set to Cease CVE and CWE Operations
Security community reacts with shock at US government’s decision not to renew MITRE contract for CVE database This article has been indexed from www.infosecurity-magazine.com Read the original article: Chaos Reigns as MITRE Set to Cease CVE and CWE Operations
Scalper Bots Fueling DVSA Driving Test Black Market
DataDome warns that DYI bots are snapping up driving test places en masse This article has been indexed from www.infosecurity-magazine.com Read the original article: Scalper Bots Fueling DVSA Driving Test Black Market
Interlock ransomware evolving under the radar
Introduction Interlock is a ransomware intrusion set first observed in September 2024 that conducts Big Game Hunting and double extortion campaigns. Interlock cannot be classified as a “Ransomware-as-a-Service” (RaaS) group, as no advertisements for recruiting affiliates or information about affiliates…
CrazyHunter Campaign Targets Taiwanese Critical Sectors
This blog entry details research on emerging ransomware group CrazyHunter, which has launched a sophisticated campaign aimed at Taiwan’s essential services. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: CrazyHunter Campaign Targets…
CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilities
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing severe vulnerabilities in widely-used Industrial Control Systems (ICS) products. These advisories, published on April 15, 2025, urge immediate action from operators and administrators overseeing critical infrastructure.…
CNSS Instruction: Why It’s Critical for National Security and Your Organization
As cyber threats evolve, so must the strategies and frameworks that protect the data and systems that are at the heart of national defense, intelligence, and security. At a time when cyber threats are becoming more sophisticated, the need to…
APT Rogues’ Gallery: The World’s Most Dangerous Cyber Adversaries
Advanced Persistent Threat (APT) groups are not a new scourge. These sophisticated, state-sponsored cyber adversaries, with deep pockets and highly advanced technical skills, conduct prolonged and targeted attacks to infiltrate networks, exfiltrate sensitive data, and disrupt critical infrastructure. The stakes…
IAM vs PAM: What’s the Difference And Why It Matters
The post IAM vs PAM: What’s the Difference And Why It Matters appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: IAM vs PAM: What’s the Difference And Why It…
Internet Giants Agree to Reduce TLS Certificate Lifespan to 47 Days by 2029
Major companies have agreed to gradually reduce the lifetime of TLS certificates over the next few years. The post Internet Giants Agree to Reduce TLS Certificate Lifespan to 47 Days by 2029 appeared first on SecurityWeek. This article has been…
Chaos Reins as MITRE Set to Cease CVE and CWE Operations
Security community reacts with shock at US government’s decision not to renew MITRE contract for CVE database This article has been indexed from www.infosecurity-magazine.com Read the original article: Chaos Reins as MITRE Set to Cease CVE and CWE Operations
WhatsApp Job Offer Scam Targets Job Seekers in New Phishing Attack
A new form of phishing attack is making waves among job seekers, as cybercriminals exploit WhatsApp and Meta’s trusted branding to lure victims into sophisticated job offer scams. Security experts warn that these attacks are not only increasing in frequency…
10 Best Email Security Solutions in 2025
Email security solutions are critical for protecting organizations from the growing sophistication of cyber threats targeting email communication. As email remains a primary channel for business communication, it is also the most exploited vector for attacks such as phishing, malware…
Government contractor Conduent disclosed a data breach
The business services provider Conduent told the SEC a January cyberattack exposed personal data, including names and Social Security numbers. The business services provider Conduent revealed that personal information, including names and Social Security numbers, was stolen in a January…
Authorities Dismantled 4 Encrypted Cyber Criminals Communication Platforms
Law enforcement agencies across Europe and Türkiye have successfully dismantled four major encrypted communication platforms used extensively by criminal networks. The coordinated takedown, codenamed Operation BULUT (meaning “cloud” in Turkish), has resulted in 232 arrests and the seizure of assets…
Motorious 4chan Forum Hacked and the Internal Data Leaked
The notorious online message board 4chan experienced a significant security breach, with hackers reportedly accessing and leaking sensitive internal data including source code, moderator information, and administrative tools. The site was taken offline for several hours as administrators attempted to…