Category: EN

CVE Foundation Launched To Ensure Long-term Vulnerability Tracking

The newly established CVE Foundation has been formally launched to safeguard the long-term continuity, stability, and independence of the Common Vulnerabilities and Exposures (CVE) Program. This move comes as the CVE Program, a 25-year foundational pillar of cybersecurity, faces unprecedented…

Hackers Abuse Node.js to Deliver Malware – Microsoft Warns

Attackers are increasingly exploiting Node.js, a widely trusted, open-source JavaScript runtime, to deliver sophisticated malware, steal sensitive data, and compromise entire systems.  Recent campaigns observed since late 2024 have showcased a shift in attacker tactics. They leverage Node.js both for direct script…

Oracle Patches 180 Vulnerabilities With April 2025 CPU

Oracle’s April 2025 Critical Patch Update contains 378 security patches that resolve approximately 180 unique CVEs. The post Oracle Patches 180 Vulnerabilities With April 2025 CPU appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats

Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a sophisticated initial-stage downloader, launched by the notorious Russian-linked hacking group APT29, known alternatively as Midnight Blizzard or Cozy Bear. This campaign, identified since January 2025, primarily…

Why Phishing Remains the #1 Cyber Threat & How to Stop It

Phishing is the most prevalent and damaging cyber threat facing organizations and individuals worldwide. Despite technological advancements in cybersecurity, phishing attacks have persisted and evolved, exploiting human psychology and digital defense gaps. Phishing’s simplicity, adaptability, and high success rate make…

Cyber Threats Against Energy Sector Surge as Global Tensions Mount

Resecurity warns of rising cyberattacks on the energy sector, some linked to large-scale campaigns targeting national infrastructure for geopolitical aims. Resecurity warns about the increase in targeted cyberattacks against enterprises in the energy sector worldwide. Some of these attacks represent much…

Chaos Reigns as MITRE Set to Cease CVE and CWE Operations

Security community reacts with shock at US government’s decision not to renew MITRE contract for CVE database This article has been indexed from www.infosecurity-magazine.com Read the original article: Chaos Reigns as MITRE Set to Cease CVE and CWE Operations

Interlock ransomware evolving under the radar

Introduction Interlock is a ransomware intrusion set first observed in September 2024 that conducts Big Game Hunting and double extortion campaigns. Interlock cannot be classified as a “Ransomware-as-a-Service” (RaaS) group, as no advertisements for recruiting affiliates or information about affiliates…

CrazyHunter Campaign Targets Taiwanese Critical Sectors

This blog entry details research on emerging ransomware group CrazyHunter, which has launched a sophisticated campaign aimed at Taiwan’s essential services. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: CrazyHunter Campaign Targets…

CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing severe vulnerabilities in widely-used Industrial Control Systems (ICS) products. These advisories, published on April 15, 2025, urge immediate action from operators and administrators overseeing critical infrastructure.…

APT Rogues’ Gallery: The World’s Most Dangerous Cyber Adversaries

Advanced Persistent Threat (APT) groups are not a new scourge. These sophisticated, state-sponsored cyber adversaries, with deep pockets and highly advanced technical skills, conduct prolonged and targeted attacks to infiltrate networks, exfiltrate sensitive data, and disrupt critical infrastructure. The stakes…