Security community reacts with shock at US government’s decision not to renew MITRE contract for CVE database This article has been indexed from www.infosecurity-magazine.com Read the original article: Chaos Reins as MITRE Set to Cease CVE and CWE Operations
Category: EN
WhatsApp Job Offer Scam Targets Job Seekers in New Phishing Attack
A new form of phishing attack is making waves among job seekers, as cybercriminals exploit WhatsApp and Meta’s trusted branding to lure victims into sophisticated job offer scams. Security experts warn that these attacks are not only increasing in frequency…
10 Best Email Security Solutions in 2025
Email security solutions are critical for protecting organizations from the growing sophistication of cyber threats targeting email communication. As email remains a primary channel for business communication, it is also the most exploited vector for attacks such as phishing, malware…
Government contractor Conduent disclosed a data breach
The business services provider Conduent told the SEC a January cyberattack exposed personal data, including names and Social Security numbers. The business services provider Conduent revealed that personal information, including names and Social Security numbers, was stolen in a January…
Authorities Dismantled 4 Encrypted Cyber Criminals Communication Platforms
Law enforcement agencies across Europe and Türkiye have successfully dismantled four major encrypted communication platforms used extensively by criminal networks. The coordinated takedown, codenamed Operation BULUT (meaning “cloud” in Turkish), has resulted in 232 arrests and the seizure of assets…
Motorious 4chan Forum Hacked and the Internal Data Leaked
The notorious online message board 4chan experienced a significant security breach, with hackers reportedly accessing and leaking sensitive internal data including source code, moderator information, and administrative tools. The site was taken offline for several hours as administrators attempted to…
Why Threat Intelligence is Crucial for Modern Cyber Defense
As cyberattacks become more sophisticated and frequent, organizations face unprecedented risks to their digital assets, reputations, and operational continuity. Cybercrime costs are rising rapidly, underscoring the urgent need for proactive defense mechanisms. Threat intelligence has emerged as a critical tool…
Incident Response Teams Call For Unified Logging Standards In Breach Scenarios
In today’s rapidly evolving cybersecurity landscape, incident response teams are increasingly advocating for unified logging standards to effectively combat security breaches. The absence of standardized logging practices creates significant blind spots, hampering swift detection and response to potential threats. With…
Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users
Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp and Telegram that contain cryptocurrency clipper functionality as part of a campaign since June 2024. While using malware-laced apps to steal financial information…
Malicious Macros Return in Sophisticated Phishing Campaigns
The cybersecurity landscape of 2025 is witnessing a troubling resurgence of malicious macros in phishing campaigns. Despite years of advancements in security measures and Microsoft’s decision to disable macros by default in Office applications, attackers have adapted their methods to…
“Living-off-the-Land Techniques” How Malware Families Evade Detection
Living-off-the-Land (LOTL) attacks have become a cornerstone of modern cyber threats, allowing malware to evade detection by leveraging legitimate system tools and processes. Rather than relying on custom malicious binaries that can be flagged by security solutions, attackers use trusted,…
Chinese UNC5174 Group Expands Arsenal with New Open Source Tool and C2 Infrastructure
The Sysdig Threat Research Team (TRT) has revealed a significant evolution in the offensive capabilities of the Chinese state-sponsored threat actor, UNC5174. In late January 2025, after a year of diminished activity, the group launched a new campaign that introduced…
SOC Alert Fatigue Hits Peak Levels As Teams Battle Notification Overload
Security Operations Centers (SOCs) are facing a mounting crisis: alert fatigue. As cyber threats multiply and security tools proliferate, SOC teams are inundated with thousands of notifications daily. This overwhelming volume of alerts many of which are false positives or…
In a Social Engineering Showdown: AI Takes Red Teams to the Mat
That AI has gotten much more proficient in social engineering is a revelation that’s not surprising, but still sets alarm bells ringing. The post In a Social Engineering Showdown: AI Takes Red Teams to the Mat appeared first on Security…
Cato Networks unveils GenAI security controls for Cato CASB
Cato Networks introduced GenAI security controls for Cato CASB (Cloud Access Security Broker). Cato CASB, a native feature in the Cato SASE Cloud Platform, is now enhanced with new capabilities for GenAI applications including a shadow AI dashboard and policy engine. With…
NEC Identity Cloud Service simplifies identity verification
NEC introduces Identity Cloud Service (ICS), a new identity verification solution to deliver streamlined, secure and cost-effective access management. Based on NEC’s biometric technology, ICS provides verification and search capabilities for corporations and global enterprises, financial services, hospitality, e-commerce, government…
Government CVE funding set to end, 4chan down following an alleged hack, China accuses US of launching advanced cyberattacks
Government CVE funding set to end Tuesday 4chan, the internet’s most infamous forum, is down following an alleged hack China accuses US of launching ‘advanced’ cyberattacks, names alleged NSA agents Thanks to this week’s episode sponsor, Vanta Do you know…
Oracle Issues Patch for 378 Vulnerabilities in Major Security Rollout
Oracle Corporation has released a sweeping Critical Patch Update (CPU) for April 2025, addressing a staggering 378 security vulnerabilities across a wide array of its product families. The rollout underscores Oracle’s continued commitment to proactive cybersecurity and comes amid ongoing…
Hackers Exploit Node.js to Spread Malware and Exfiltrate Data
Threat actors are increasingly targeting Node.js—a staple tool for modern web developers—to launch sophisticated malware campaigns aimed at data theft and system compromise. Microsoft Defender Experts (DEX) have reported a spike in such attacks since October 2024, especially focusing on…
Windows 11 Escalation Vulnerability Let Attackers Gain Admin Access Within 300 Milliseconds
A critical vulnerability in Windows 11 allowed attackers to escalate from a low-privileged user to full system administrator rights in just 300 milliseconds. The vulnerability, tracked as CVE-2025-24076, exploits a weakness in Windows 11’s “Mobile devices” feature through a sophisticated…