North Korean IT workers have been infiltrating international companies by securing remote positions under false identities. This tactic not only violates international sanctions but also poses significant cybersecurity risks, including data theft and the installation of backdoors on compromised systems.…
Category: EN
New GRC and cyber risk strategies emphasize risk adaptability
MetricStream has unveiled its annual forecast of key trends shaping the future of GRC and Cyber GRC. These 2025 predictions offer a roadmap for building resilience strategies, addressing emerging risks, and seizing new opportunities. AI comes of age: risks, rewards,…
FBI Alerts Users of Surge in Gmail AI Phishing Attacks
Phishing scams have been around for many years, but they are now more sophisticated than ever due to the introduction of artificial intelligence (AI). As reported in the Hoxhunt Phishing Trends Report, AI-based phishing attacks have increased dramatically since…
Virtual Credit Cards: How They Work, Benefits, and Security Features
Virtual credit cards are digital versions of traditional credit cards, designed to enhance security in online transactions. Instead of using a physical card number, they generate a unique number for each purchase, reducing the risk of data breaches and…
2FA Under Attack as Astaroth Phishing Kit Spreads
Astaroth is the latest phishing tool discovered by cybercriminals. It has advanced capabilities that allow it to circumvent security measures such as two-factor authentication (2FA) when used against it. In January 2025, Astaroth made its public debut across multiple…
Securing the Modern Workplace: Balancing Safety, Trust, and Productivity
The modern workplace is a hub of activity — employees balancing hybrid schedules, visitors coming and going, and critical operations running on interconnected systems. With this dynamic environment comes a growing challenge: how do businesses ensure both physical safety and…
Project management with Scrum (with Podcast)
They can’t mix, can they? Seems like a contradiction to talk about classical project management and the best agile software development methodology ? But let me ask you this: ever feel like traditional project management is great for mapping out…
Maximizing Security Through Hardware
Organizations are continually balancing seamless user experiences and implementing robust defenses against evolving threats. Passwords, as the first line of defense, remain a primary vulnerability, often exploited due to poor… The post Maximizing Security Through Hardware appeared first on Cyber…
Sean Cairncross is Trump Nominee for National Cyber Director
Former RNC official Sean Cairncross has been nominated for the post of National Cyber Director to streamline the US cybersecurity strategy. The post Sean Cairncross is Trump Nominee for National Cyber Director appeared first on SecurityWeek. This article has been…
Ransomware Roundup – Lynx
Get insights into the Lynx ransomware, which is considered the successor to the INC ransomware. This double-extortion ransomware has threatened more than 90 organizations worldwide, including those in the healthcare and energy sectors. Learn more. This article has been…
Critical PostgreSQL bug tied to zero-day attack on US Treasury
High-complexity bug unearthed by infoseccers, as Rapid7 probes exploit further A high-severity SQL injection bug in the PostgreSQL interactive tool was exploited alongside the zero-day used to break into the US Treasury in December, researchers say.… This article has been…
Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat
Check out best practices for preventing buffer overflow attacks. Plus, Europol offers best practices for banks to adopt quantum-resistant cryptography. Meanwhile, an informal Tenable poll looks at cloud security challenges. And get the latest on ransomware trends and on cybercrime…
Threat actors are using legitimate Microsoft feature to compromise M365 accounts
Suspected Russian threat actors have been taking advantage of Microsoft Device Code Authentication to trick targets into granting them access to their Microsoft 365 (M365) accounts. “While Device Code Authentication attacks are not new, they appear to have been rarely…
Russian Hackers Target Microsoft 365 Accounts with Device Code Phishing
Volexity highlighted how Russian nation-state actors are stealing Microsoft device authentication codes to compromise accounts This article has been indexed from www.infosecurity-magazine.com Read the original article: Russian Hackers Target Microsoft 365 Accounts with Device Code Phishing
Netwrix Privilege Secure Enhances Remote Access Security by Eliminating VPN Dependencies
Netwrix, a leading provider of cybersecurity solutions focused on data and identity threat protection, has introduced a new component to its Netwrix Privilege Secure platform. This enhancement streamlines secure remote access for distributed teams and external vendors, reinforcing identity-based access…
Apache Fineract SQL Injection Vulnerability Let Inject Malicious Data
A critical SQL injection vulnerability has been identified in Apache Fineract, an open-source core banking software widely used for financial services. This flaw, tracked as CVE-2024-32838, affects versions 1.4 through 1.9 and has been classified as important, with a CVSS…
NVIDIA Container Toolkit Vulnerability Let Attackers Execute Code
NVIDIA has released a security update to address a critical vulnerability in its NVIDIA Container Toolkit and NVIDIA GPU Operator, which could allow attackers to execute arbitrary code, escalate privileges, and gain access to the host file system. This vulnerability…
CISA Releases 20 ICS Advisories Detailing Vulnerabilities & Exploits
The Cybersecurity and Infrastructure Security Agency (CISA) has released twenty new Industrial Control Systems (ICS) advisories, aimed at addressing critical vulnerabilities in industrial systems. The advisories cover a wide range of ICS products from prominent vendors such as Siemens, ORing,…
Beware of Malicious Browser Updates That Installs SocGholish Malware
Cyber threats have evolved significantly in recent years, with malicious actors employing sophisticated tactics to compromise user systems. One such threat is the SocGholish malware, which has been actively distributed through fake browser updates since 2017. This malware campaign exploits…
Rising Tides: Lesley Carhart on Bridging Enterprise Security and OT—and Improving the Human Condition
In the latest edition of “Rising Tides” we talk with Lesley Carhart, Technical Director of Incident Response at Dragos. The post Rising Tides: Lesley Carhart on Bridging Enterprise Security and OT—and Improving the Human Condition appeared first on SecurityWeek. This…