Chinese hacking group MirrorFace has targeted a Central European diplomatic institute with the Anel backdoor and AsyncRAT. The post Chinese Hacking Group MirrorFace Targeting Europe appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Category: securityweek
Scareware Combined With Phishing in Attacks Targeting macOS Users
A long-running campaign phishing for credentials through scareware recently switched to targeting macOS users. The post Scareware Combined With Phishing in Attacks Targeting macOS Users appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Microsoft Warns of New StilachiRAT Malware
Microsoft has shared details on StilachiRAT, an evasive and persistent piece of malware that facilitates sensitive data theft. The post Microsoft Warns of New StilachiRAT Malware appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
HP Launches Printers with Quantum Resilient Cryptography
Printers can sit in the corner for ten years or more, while quantum decryption is thought by many to be less than 10 years away. The post HP Launches Printers with Quantum Resilient Cryptography appeared first on SecurityWeek. This article…
AI Is Turbocharging Organized Crime, EU Police Agency Warns
AI and other technologies “are a catalyst for crime, and drive criminal operations’ efficiency by amplifying their speed, reach, and sophistication,” the report said. The post AI Is Turbocharging Organized Crime, EU Police Agency Warns appeared first on SecurityWeek. This…
Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover
A critical vulnerability affecting baseboard management controller (BMC) firmware made by AMI could expose many devices to remote attacks. The post Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover appeared first on SecurityWeek. This article has been indexed from…
11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft
ZDI has uncovered 1,000 malicious .lnk files used by state-sponsored and cybercrime threat actors to execute malicious commands. The post 11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft appeared first on SecurityWeek. This article has been indexed from…
Google to Acquire Cloud Security Giant Wiz for $32 Billion in Cash
Google has confirmed reports that it’s buying cloud security giant Wiz and says it’s prepared to pay $32 billion in cash. The post Google to Acquire Cloud Security Giant Wiz for $32 Billion in Cash appeared first on SecurityWeek. This…
New Cloudflare Service Provides Real-Time Threat Intelligence
Cloudflare launches Cloudforce Threat Events Feed, a service designed to provide security teams with real-time threat intelligence. The post New Cloudflare Service Provides Real-Time Threat Intelligence appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Western Alliance Bank Discloses Data Breach Linked to Cleo Hack
The personal information of 22,000 Western Alliance Bank customers was stolen in a data breach linked to Cl0p’s hacking of the Cleo file transfer tool. The post Western Alliance Bank Discloses Data Breach Linked to Cleo Hack appeared first on…
ChatGPT Vulnerability Exploited Against US Government Organizations
A year-old vulnerability in ChatGPT is being exploited against financial entities and US government organizations. The post ChatGPT Vulnerability Exploited Against US Government Organizations appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: ChatGPT…
Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum
Exploits swirling for remote code execution vulnerability (CVE-2025-24813) in open-source Apache Tomcat web server. The post Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
NIST Announces HQC as Fifth Standardized Post Quantum Algorithm
First choices for both KEMs and DSAs are already standardized, and organizations should not wait for the backups to be available before migrating to PQC. The post NIST Announces HQC as Fifth Standardized Post Quantum Algorithm appeared first on SecurityWeek.…
8,000 New WordPress Vulnerabilities Reported in 2024
Nearly 8,000 new vulnerabilities affecting the WordPress ecosystem were reported last year, nearly all in plugins and themes. The post 8,000 New WordPress Vulnerabilities Reported in 2024 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Microsoft 365 Targeted in New Phishing, Account Takeover Attacks
Threat actors are abusing Microsoft 365 infrastructure in a BEC campaign, and target its users in two brand impersonation campaigns. The post Microsoft 365 Targeted in New Phishing, Account Takeover Attacks appeared first on SecurityWeek. This article has been indexed…
100 Car Dealerships Hit by Supply Chain Attack
The websites of over 100 auto dealerships were found serving malicious ClickFix code in a supply chain compromise. The post 100 Car Dealerships Hit by Supply Chain Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services
Vulnerabilities in Nvidia Riva could allow hackers to abuse speech and translation AI services that are typically expensive. The post Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Industry Moves for the week of March 17, 2025 – SecurityWeek
Explore industry moves and significant changes in the industry for the week of March 17, 2025. Stay updated with the latest industry trends and shifts. This article has been indexed from SecurityWeek Read the original article: Industry Moves for the…
Popular GitHub Action Targeted in Supply Chain Attack
The tj-actions/changed-files GitHub Action, which is used in 23,000 repositories, has been targeted in a supply chain attack. The post Popular GitHub Action Targeted in Supply Chain Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
In Other News: Swiss Breach Disclosure Rules, ESP32 Chip Backdoor Disputed, MassJacker
Noteworthy stories that might have slipped under the radar: Switzerland requires disclosure of critical infrastructure attacks, ESP32 chips don’t contain a backdoor, MassJacker cryptojacking malware. The post In Other News: Swiss Breach Disclosure Rules, ESP32 Chip Backdoor Disputed, MassJacker appeared…