UK retailers including Harrods, M&S, and the Co-op are under a surge of cyber-attacks that may be linked by a common supplier or shared technological vulnerability This article has been indexed from www.infosecurity-magazine.com Read the original article: Harrods Latest UK…
Category: EN
Seven Malicious Packages Exploit Gmail SMTP to Run Harmful Commands
A major supply chain security incident has rocked the Python open-source community as researchers at Socket’s Threat Research Team uncovered seven interconnected malicious packages published on the Python Package Index (PyPI). These packages Coffin-Codes-Pro, Coffin-Codes-NET2, Coffin-Codes-NET, Coffin-Codes-2022, Coffin2022, Coffin-Grave, and cfc-bsb-were ingeniously…
U.S. CISA adds SonicWall SMA100 and Apache HTTP Server flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SonicWall SMA100 and Apache HTTP Server flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Qualitia Active! Mail, Broadcom Brocade Fabric OS, and Commvault Web Server…
The Top 7 Enterprise VPN Solutions
Enterprise VPN solutions are critical for connecting remote workers to company resources via reliable and secure links to foster communication and productivity. Read about seven viable choices for businesses. This article has been indexed from Security | TechRepublic Read the…
New Attack Techniques Using MCP & How It Will be Used to Build Security Tools
A sophisticated new attack technique known as Malicious Command Protocol (MCP) has emerged in recent weeks, raising significant concerns among cybersecurity professionals worldwide. This novel threat leverages previously unexploited vulnerabilities in command and control infrastructures, allowing attackers to establish persistent…
NVIDIA TensorRT-LLM High-Severity Vulnerability Let Attackers Remote Code
NVIDIA has disclosed and patched a high-severity vulnerability in its TensorRT-LLM framework that could allow attackers with local access to execute malicious code, tamper with data, and potentially compromise AI systems. The vulnerability, tracked as CVE-2025-23254, affects all versions of…
Ukrainian Nefilim Ransomware Affiliate Extradited to US
Ukrainian national Artem Stryzhak was extradited to the US and charged with using Nefilim ransomware in attacks on large businesses. The post Ukrainian Nefilim Ransomware Affiliate Extradited to US appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
CISA Issues New ICS Advisories Addressing Critical Vulnerabilities and Exploits
The Cybersecurity and Infrastructure Security Agency (CISA) has issued two new advisories revealing critical vulnerabilities found in widely used Industrial Control Systems (ICS). Released on May 1, 2025, the advisories spotlight severe security risks affecting KUNBUS GmbH’s Revolution Pi devices…
CISA Warns of SonicWall SMA100 OS Command Injection Vulnerability Exploited in Wild
CISA has added the SonicWall SMA100 OS Command Injection Vulnerability, tracked as CVE-2023-44221, to its Known Exploited Vulnerabilities (KEV) catalog. According to CISA’s May 1, 2025 advisory, this vulnerability is actively being exploited in the wild, posing a substantial risk…
LummaStealer’s FakeCAPTCHA Steals Browser Credentials Via Weaponized Microsoft Word Files
Cybercriminals have refined their attack methodologies with a sophisticated campaign leveraging LummaStealer malware and deceptive CAPTCHA prompts to harvest sensitive data. This social engineering approach combines psychological manipulation with lightweight payload delivery, enabling threat actors to bypass traditional security controls…
Nebulous Mantis Hackers Actively Deploying RomCom RAT to Attack Organizations Worldwide
Cybersecurity experts have uncovered a sophisticated espionage campaign orchestrated by the threat actor group known as Nebulous Mantis, utilizing an advanced remote access trojan called RomCom to target organizations globally. The campaign employs deceptive spear-phishing tactics coupled with multi-stage malware…
Opsera improves GitHub security management
Opsera announced new Advanced Security Dashboard capabilities that, available as an extension of Opsera’s Unified Insights for GitHub Copilot, help enterprises maximize the benefits of GitHub Advanced Security (GHAS). Opsera now connects and provides a comprehensive view of security alongside…
Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support
A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big change that pushes individuals signing up for new accounts to use the phishing-resistant authentication method by default. “Brand new Microsoft accounts will now…
UK’s Co-op cyberattack, LabHost domains released, NSO WhatsApp damages
UK retailer Co-Op suffers cyberattack FBI shares list of 42,000 LabHost phishing domains NSO group looking at hefty damages in WhatsApp case Thanks to today’s episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity…
NVIDIA TensorRT-LLM Vulnerability Let Hackers Run Malicious Code
NVIDIA has issued an urgent security advisory after discovering a significant vulnerability (CVE-2025-23254) in its popular TensorRT-LLM framework, urging all users to update to the latest version (0.18.2) to safeguard their systems against potential attacks. Overview of the Vulnerability The…
Windows Security in 2025: Battling Sophisticated Threats with Advanced Defenses
The Windows security landscape has dramatically evolved in early 2025, marked by increasingly sophisticated attack vectors and Microsoft’s accelerated defensive innovations. February 2025 witnessed a sharp 87% increase in ransomware incidents globally, with 956 reported victims compared to January. As…
AiTM Phishing Kits Bypassing MFA By Intercepting Credentials & Tokens
Adversary-in-the-Middle (AiTM) phishing kits are emerging as sophisticated threats specifically designed to circumvent multi-factor authentication (MFA), once considered an impenetrable defense against account compromises. Tycoon 2FA, first identified in August 2023, represents the latest evolution in this concerning trend, operating…
Harrods Store Hit by Cyber Attack Following Marks & Spencer and Co-op
Harrods, the world-renowned luxury department store in Knightsbridge, has confirmed it was the target of a sophisticated cyberattack, marking it as the third major UK retailer to be hit by cybercrime within a week. The news follows similar incidents reported…
Trellix Unveils New Phishing Simulator to Proactively Identify & Mitigate Phishing Attacks
In a significant advancement for cybersecurity training, Trellix has introduced its new Phishing Simulator, designed to strengthen organizational defenses against one of the most persistent threat vectors in today’s digital landscape. Announced on April 29, 2025, this comprehensive solution enables…
CISA Warns of Apache HTTP Server Escape Vulnerability Exploited in the Wild
The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-38475, a critical vulnerability affecting Apache HTTP Server, to its Known Exploited Vulnerabilities (KEV) catalog. This vulnerability allows attackers to map URLs to unintended filesystem locations, potentially leading to code execution…