In a major victory against cybercrime, law enforcement agencies across North America and Europe have dismantled the infrastructure behind the Smokeloader malware, a notorious pay-per-install (PPI) botnet service. This decisive action, a continuation of the groundbreaking Operation Endgame from May…
Category: EN
ToddyCat Hackers Exploit ESET Flaw to Launch Stealthy TCESB Attack
ToddyCat hackers exploit ESET flaw (CVE-2024-11859) to deploy stealthy TCESB malware using DLL hijacking and a vulnerable Dell driver. The post ToddyCat Hackers Exploit ESET Flaw to Launch Stealthy TCESB Attack appeared first on eSecurity Planet. This article has been…
The API Security Challenge in AI: Preventing Resource Exhaustion and Unauthorized Access
Agentic AI is transforming business. Organizations are increasingly integrating AI agents into core business systems and processes, using them as intermediaries between users and these internal systems. As a result, these organizations are improving efficiency, automating routine tasks, and driving…
Operation Endgame Continues with Smokeloader Customer Arrests
Police have made more arrests in the ongoing Operation Endgame, cracking down on malware customers This article has been indexed from www.infosecurity-magazine.com Read the original article: Operation Endgame Continues with Smokeloader Customer Arrests
The Cybersecurity Risk No One Talks About: Poor File Management
Cybersecurity discussions often spotlight phishing scams, ransomware attacks and other external threats. But there’s a foundational risk that quietly underpins many of these issues: poor handling of file uploads and delivery. In 2024, malicious file detections rose 14% over the previous year,…
So your friend has been hacked: Could you be next?
When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe. This article has been indexed from WeLiveSecurity Read the original article: So your…
1 billion reasons to protect your identity online
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t. This article has been indexed from…
Repair the bridge before it cracks: Understanding vulnerabilities and weaknesses in modern IT
Security is an ongoing engineering discipline, it’s not just a reaction to a crisis. For example, if you were responsible for a large suspension bridge, you would know that cracks don’t appear overnight. They start as small stress fractures, invisible…
Seal Base Images mitigates container vulnerabilities
Seal Security launched Seal Base Images, a solution designed to future-proof containerized applications. Seal Base Images delivers secure, continuously updated, and vulnerability-free base images, effectively eliminating up to 99% of potential future vulnerabilities. Standard container base images frequently contain unpatched…
AkiraBot Targets 420,000 Sites with OpenAI-Generated Spam, Bypassing CAPTCHA Protections
Cybersecurity researchers have disclosed details of an artificial intelligence (AI) powered platform called AkiraBot that’s used to spam website chats, comment sections, and contact forms to promote dubious search engine optimization (SEO) services such as Akira and ServicewrapGO. “AkiraBot has…
April 10, 2025
U.S. Comptroller suffers ‘major incident’ Oracle confirms “obsolete servers” hacked Police seize Smokeloader malware servers and detain customers Thanks to our episode sponsor, Nudge Security Nudge Security is the only solution for SaaS security and governance that can discover up…
PAN-OS DoS Vulnerability Allows Attackers to Force Repeated Firewall Reboots
A newly disclosed denial-of-service (DoS) vulnerability in Palo Alto Networks’ PAN-OS software enables attackers to force firewalls into repeated reboots using maliciously crafted packets. Tracked as CVE-2025-0128, the flaw impacts SCEP (Simple Certificate Enrollment Protocol) authentication and poses significant risks to…
How Banking Trojan Grandoreiro is Evolving Tactics To Attack Victims in LATAM
A new wave of phishing emails is sweeping across Latin America, and once again, Grandoreiro is behind it. This banking trojan is no newcomer; it’s been active for years, evolving steadily into a more sophisticated and evasive threat. With targeted…
PAN-OS Firewall DoS Vulnerability Let Attacker Reboot Firewall Repeatedly
A significant denial-of-service vulnerability (CVE-2025-0128) is affecting multiple versions of their PAN-OS firewall software. The flaw allows unauthenticated attackers to remotely trigger system reboots using specially crafted packets, potentially forcing devices into maintenance mode through persistent attacks. A significant vulnerability…
Ransomware Groups Attacking Organizations to Exfiltrate Data & Blackmail via Leak Site Posts
In the first quarter of 2025, ransomware attacks have maintained an alarming trajectory, with threat actors adopting sophisticated strategies centered on data exfiltration and blackmail through leak site posts. These attacks continue to follow the pattern of “if it ain’t…
‘RemoteMonologue’ New Red Team Technique Exploits DCOM To Steal NTLM Credentials Remotely
A sophisticated new red team technique dubbed “RemoteMonologue” has emerged, enabling attackers to remotely harvest NTLM credentials without deploying malicious payloads or accessing the Local Security Authority Subsystem Service (LSASS). As traditional methods of credential theft face increasing scrutiny from…
Linux Firewall IPFire 2.29 Launches with Post-Quantum Encryption and System Enhancements
The open-source Linux firewall solution, IPFire, has officially released its latest version, IPFire 2.29 – Core Update 193. This landmark update introduces cutting-edge post-quantum encryption capabilities for IPsec tunnels, along with extensive system upgrades to bolster security, performance, and hardware optimization for…
The Reg translates the letter in which Oracle kinda-sorta tells customers it was pwned
TL;DR: Move along, still nothing to see here – an idea that leaves infosec pros aghast Oracle’s letter to customers about an intrusion into part of its public cloud empire – while insisting Oracle Cloud Infrastructure was untouched – has…
Keysight simplifies security testing for modern chips and embedded devices
Keysight Technologies announces the Next-Generation Embedded Security Testbench, a consolidated and scalable test solution designed to address the increasing complex security testing demands of modern chips and embedded devices. This new solution offers enhanced flexibility, reduces test setup complexities, and…
PAN-OS Command Injection Flaw Lets Hackers Execute Arbitrary Code Remotely
Palo Alto Networks has disclosed a medium-severity vulnerability (CVE-2025-0127) in its PAN-OS software, enabling authenticated administrators on VM-Series firewalls to execute arbitrary commands with root privileges. The flaw, discovered internally, affects specific legacy PAN-OS versions and requires immediate patching for impacted users.…