A critical vulnerability has been identified in NetApp’s SnapCenter Server, affecting versions before 6.0.1P1 and 6.1P1. This flaw allows an authenticated SnapCenter Server user to potentially escalate their privileges to admin on remote systems where SnapCenter plug-ins are installed. The…
Category: EN
North Korean Kimsuky Hackers Deploy New Tactics and Malicious Scripts in Recent Attacks
Security researchers have uncovered a new attack campaign by the North Korean state-sponsored APT group Kimsuky, also known as “Black Banshee.” The group, active since at least 2012, has been observed employing advanced tactics and malicious scripts in their latest…
New IOCONTROL Malware Attacking Critical Infrastructure to Gain Remote Access and Control
A newly identified malware strain dubbed “IOCONTROL” has emerged as a critical threat to operational technology (OT) and Internet of Things (IoT) systems, particularly targeting fuel-management infrastructure in the United States and Israel. First observed in December 2024, this Linux-based…
FBI Issues new alert over phishing SMS scam targeting highway toll customers
The U.S. Federal Bureau of Investigation (FBI) has issued a nationwide warning about a surge in “smishing” attacks, a form of phishing conducted via SMS messages. These scams are designed to deceive […] Thank you for being a Ghacks reader.…
Clevo Devices Vulnerable as Boot Guard Private Key Leaks via Firmware Updates
A recent investigation has revealed that several Clevo-based devices are vulnerable due to a leak of Boot Guard private keys. This vulnerability was first reported on the Win-Raid forum and involves firmware updates containing sensitive Boot Guard Key Manifest (KM)…
Chainguard VMs reduces risk and engineering complexity
Chainguard announced Chainguard VMs, a new product line offering minimal, zero-CVE virtual machine images built entirely from source. Purpose-built for modern, ephemeral workloads in the cloud, Chainguard VMs represent a stark contrast to the legacy, general-purpose VMs that dominate the…
Sumsub launches Reusable Digital Identity product suite
Sumsub is launching its Reusable Digital Identity product suite. It will mitigate repetitive verification and redundant Know Your Customer (KYC) checks that negatively impact user experience and conversion rates for businesses. The new offerings are set to reduce applicant onboarding…
Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms
Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according to findings from Abnormal Security. Atlantis AIO “has emerged as a powerful weapon in the cybercriminal arsenal, enabling attackers to test millions of…
UK Government’s New Fraud Strategy to Focus on Tech-Enabled Threats
The UK government’s new fraud minister will today announce plans for a newly expanded fraud strategy This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Government’s New Fraud Strategy to Focus on Tech-Enabled Threats
BrowserStack Private Devices helps organizations comply with stringent security requirements
BrowserStack launched Private Devices, expanding its enterprise portfolio to address the specialized testing needs of organizations with stringent security requirements. Private Devices offers exclusive access to customized real devices housed in secure data centers, enabling persistent configurations and advanced testing…
Safeguarding Data for the Quantum Era
In today’s ever-evolving cybersecurity landscape, staying ahead of potential threats is a constant challenge. Advanced persistent threats, ransomware, and wipers are just a few risks organizations must guard against. However, quantum computing is one of the most complex and far-reaching…
DrayTek Router Vulnerability Exploited in the Wild – Linked to Reboot Loop Issue
The cybersecurity world has been abuzz with reports of widespread reboots affecting DrayTek routers across the globe. While the exact cause of these reboots remains largely unconfirmed, GreyNoise has brought to light significant in-the-wild exploitation of several known vulnerabilities in…
Google fixed the first actively exploited Chrome zero-day since the start of the year
Google fixed a flaw in the Chrome browser for Windows that was actively exploited in attacks targeting organizations in Russia. Google has released out-of-band fixes to address a high-severity security vulnerability, tracked as CVE-2025-2783, in Chrome browser for Windows. The flaw…
New Windows 0-Day Vulnerability Let Remote Attackers Steal NTLM Credentials – Unofficial Patch
A critical vulnerability affecting all Windows operating systems from Windows 7 and Server 2008 R2 through the latest Windows 11 v24H2 and Server 2025. This zero-day flaw enables attackers to capture users’ NTLM authentication credentials simply by having them view…
CISA Warns of Four Vulnerabilities, and Exploits Surrounding ICS
The Cybersecurity and Infrastructure Security Agency (CISA) released four Industrial Control System (ICS) advisories on March 25, 2025, detailing significant vulnerabilities in products from ABB, Rockwell Automation, and Inaba Denki Sangyo. These vulnerabilities, with CVSS v4 scores ranging from 5.1…
Appsmith Developer Tool Vulnerability Let Attackers Execute Remote Code
Security researchers have uncovered multiple critical vulnerabilities in Appsmith, a popular open-source developer platform for building internal applications. Most concerning is CVE-2024-55963, which allows unauthenticated attackers to execute arbitrary system commands on servers running default installations of Appsmith versions 1.20…
Cyberhaven enhances Linea AI platform to improve data security
Cyberhaven announced a major enhancement to its Linea AI platform with the introduction of advanced content understanding capabilities powered by frontier AI models. This enables Linea AI to intelligently analyze and contextualize all forms of content, including complex visual data,…
Quantum-Proofing Enterprise Security: The Clock is Ticking
Many experts believe that quantum computing will arrive in the next decade. The unparalleled processing capabilities of these computers hold promise for advances in material science, drug discovery, artificial intelligence, environmental science, and much more. While quantum computing opens up…
Authentication bypass CVE-2025-22230 impacts VMware Windows Tools
Broadcom addressed a high-severity authentication bypass vulnerability, tracked as CVE-2025-22230, in VMware Tools for Windows. Broadcom released security updates to address a high-severity authentication bypass vulnerability, tracked as CVE-2025-22230 (CVSS score 9.8), impacting VMware Tools for Windows. VMware Tools for…
EncryptHub exploit, Copilot agents, PETs in government
EncryptHub linked to Microsoft Management Console exploit Security Copilot gets AI agents A call for more PETs in government Huge thanks to our episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to…