Category: EN

Hackers Selling SS7 0-Day Vulnerability on Hacker Froums for $5000

A sophisticated SS7 protocol vulnerability that enables unauthorized SMS interception and real-time phone tracking is now being offered for sale on underground forums, raising serious concerns about mobile network security worldwide.  The exploit, priced at $5,000, provides buyers with comprehensive…

Ransomware Group Claims Attacks on UK Retailers

The DragonForce ransomware group has claimed responsibility for the recent cyberattacks on UK retailers Co-op, Harrods, and M&S. The post Ransomware Group Claims Attacks on UK Retailers appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

US Asks Judge To Break Up Google Ad Tech Business

More regulatory headaches for Sundar Pichai, as US DoJ asks judge to also breakup Google’s ad tech business This article has been indexed from Silicon UK Read the original article: US Asks Judge To Break Up Google Ad Tech Business

New Luna Moth Domains Attacking Users Via Weaponized Helpdesk Domains

Recently identified Luna Moth phishing operations reveal a sophisticated campaign targeting legal and financial institutions through expertly crafted typosquatted domains.  Security researchers from EclecticIQ, supported by additional findings from Silent Push, have uncovered a methodical approach to domain registration that…

NIS2 Compliance Checklist

The post NIS2 Compliance Checklist appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: NIS2 Compliance Checklist

PoC Published for Exploited SonicWall Vulnerabilities

PoC code targeting two exploited SonicWall flaws was published just CISA added them to the KEV catalog. The post PoC Published for Exploited SonicWall Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks

Cybersecurity researchers are raising alarms as hackers increasingly weaponize email input fields to execute cross-site scripting (XSS) and server-side request forgery (SSRF) attacks. These vulnerabilities, often overlooked in web applications, allow attackers to bypass security controls, steal data, and compromise servers. Email input fields…

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims

A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed a surge in malicious activity tied to the Luna Moth hacking group. The actors are now leveraging fake helpdesk-themed domains to impersonate legitimate businesses and steal sensitive data.…

Getting Email Security Right

Let’s face it: your inbox is a warzone. Email security is a constant battle between evolving threats and the defenses designed to stop them. Every day, attackers bombard user inboxes with increasingly sophisticated phishing attempts, malware, and social engineering attacks.…