Category: EN

16-31 December 2024 Cyber Attacks Timeline

In the second timeline of December 2024, I collected 94 events with a threat landscape dominated by malware with… This article has been indexed from HACKMAGEDDON Read the original article: 16-31 December 2024 Cyber Attacks Timeline

How To Integrate MITRE ATT&CK Into Your SOC For Better Threat Visibility

The evolving cybersecurity landscape demands advanced strategies to counter sophisticated threats that outpace traditional security measures. The MITRE ATT&CK framework emerges as a critical tool for Security Operations Centers (SOCs), offering a structured, knowledge-driven approach to understanding adversary behavior. By…

Ahold Delhaize Confirms Data Stolen in Ransomware Attack

Ahold Delhaize has confirmed that data was stolen from its systems in November 2024 after a ransomware group claimed the attack. The post Ahold Delhaize Confirms Data Stolen in Ransomware Attack appeared first on SecurityWeek. This article has been indexed…

Over 6 Million Chrome Extensions Found Executing Remote Commands

Security researchers have uncovered a network of over 35 Google Chrome extensions—collectively installed on more than 6 million browsers—secretly executing remote commands and potentially spying on users for years. The alarming discovery began during a routine security review at an…

Bubble.io 0-Day Flaw Lets Attackers Run Arbitrary Queries on Elasticsearch

A vulnerability in Bubble.io, a leading no-code development platform, has exposed thousands of applications to data breaches. The flaw allows attackers to bypass security controls and execute arbitrary queries on Elasticsearch databases, potentially compromising sensitive user information. Security researchers reverse-engineered…

Breaking the Cycle: Prioritizing Recovery Over Ransom Payments

In 2024, businesses paid $813 million to cyber criminals as the result of ransomware. That’s an astronomical sum, highlighting the immense financial burden cybercrime places on organizations. Rhode Island’s cyberattack of December 2024, where state officials paid out a $5…

PoC Released for Critical Erlang/OTP SSH RCE Vulnerability

Security teams across industries are urgently patching systems following the public release of a proof-of-concept (PoC) exploit for a newly disclosed critical remote code execution (RCE) vulnerability in Erlang/OTP’s SSH implementation. The flaw, tracked as CVE-2025-32433 and assigned a maximum CVSS score…

Over 17,000 Fortinet Devices Hacked Using Symbolic Link Exploit

According to cybersecurity nonprofit Shadowserver, a major cyberattack has compromised more than 17,000 Fortinet devices globally, exploiting a sophisticated symbolic link persistence technique. The incident marks a rapid escalation from early reports, which initially identified approximately 14,000 affected devices just…

CISA Warns of Active Exploitation of Windows NTLM Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) alerted organizations to active exploitation of a newly disclosed Microsoft Windows vulnerability tracked as CVE-2025-24054. The flaw affects Windows’ NTLM authentication protocol, creating an opportunity for unauthorized attackers to infiltrate systems via…

Funding Expires for Key Cyber Vulnerability Database

A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware is in danger of breaking down. The federally funded, non-profit research and development organization MITRE warned today that its contract…

Fresh Windows NTLM Vulnerability Exploited in Attacks

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions. The post Fresh Windows NTLM Vulnerability Exploited in Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…