The New York Blood Center (NYBC), a major provider of blood products and transfusion services in the U.S., suffered a ransomware attack on Sunday, leading to operational disruptions and the cancellation of some donor appointments. The cyberattack comes at…
Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
XE Group, a cybercriminal outfit that has been active for over a decade, has been quietly exploiting zero-day vulnerabilities (CVE-2025-25181, CVE-2024-57968) in VeraCore software, a popular solution for warehouse management and order fulfillment. According to Intezer and Solis Security researchers,…
IT Security News Hourly Summary 2025-02-05 18h : 26 posts
26 posts were published in the last hour 16:34 : Deep will Unterwassersiedlungen in allen Ozeanen aufbauen 16:33 : Amazon To Face Legal Action Over Warehouse Closures 16:33 : Banking Malware Uses Live Numbers to Hijack OTPs, Targeting 50,000 Victims…
Deep will Unterwassersiedlungen in allen Ozeanen aufbauen
Das britische Unternehmen Deep entwickelt Wohnungen, in denen Menschen dauerhaft auf dem Meeresgrund leben können. Ein Testmodul soll in Kürze abtauchen. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Deep will Unterwassersiedlungen in allen Ozeanen aufbauen
Amazon To Face Legal Action Over Warehouse Closures
Union says it will ask court to compel Amazon to re-open seven closed warehouses in Quebec that triggered 1,700 job losses This article has been indexed from Silicon UK Read the original article: Amazon To Face Legal Action Over Warehouse…
Banking Malware Uses Live Numbers to Hijack OTPs, Targeting 50,000 Victims
A banking malware campaign using live phone numbers to redirect SMS messages has been identified by the zLabs research team, uncovering 1,000+ malicious apps and 2.5GB of exposed data. This article has been indexed from Hackread – Latest Cybersecurity, Tech,…
Cybercriminals Leveraging AI to Verify Stolen Credit Card Data
Cybercriminals are increasingly leveraging artificial intelligence (AI) agents to validate stolen credit card data, posing a significant threat to financial institutions and consumers. These AI-powered systems, originally designed for legitimate automation tasks, are being repurposed to execute card testing attacks…
Malicious Android & iOS Apps Downloaded Over 242,000 Times, Stealing Crypto Recovery Keys
A sophisticated malware campaign, dubbed SparkCat, has infiltrated Google Play and Apple’s App Store, marking the first known instance of an optical character recognition (OCR)-based cryptocurrency stealer on iOS. According to cybersecurity firm Kaspersky, the malware has been downloaded over…
BADBOX Botnet Surges: Over 190,000 Android Devices Infected, Including LED TVs
The BADBOX botnet, a sophisticated malware operation targeting Android-based devices, has now infected over 192,000 systems globally. Originally confined to low-cost and off-brand devices, the malware has expanded its reach to include well-known brands such as Yandex 4K QLED TVs…
Netgear fixes critical bugs as Five Eyes warn about break-ins at the edge
International security squads all focus on stopping baddies busting in through routers, IoT kit etc Netgear is advising customers to upgrade their firmware after it patched two critical vulnerabilities affecting multiple routers.… This article has been indexed from The Register…
In the Search for Talent, Candidates with Certifications Stand Out
Learn how industry-recognized certifications equip individuals with the specialized knowledge and practical expertise necessary to jump-start or advance a career in the industry. This article has been indexed from Fortinet Industry Trends Blog Read the original article: In the…
Small business owners, secure your web shop
Web shops are an attractive target. How can SMBs keep theirs safe? This article has been indexed from Malwarebytes Read the original article: Small business owners, secure your web shop
How Agentic AI will be Weaponized for Social Engineering Attacks
With each passing year, social engineering attacks are becoming bigger and bolder thanks to rapid advancements in artificial intelligence. The post How Agentic AI will be Weaponized for Social Engineering Attacks appeared first on SecurityWeek. This article has been indexed…
Sophisticated Phishing Campaign Targets Ukraine’s Largest Bank
A new phishing attack by UAC-0006 has been discovered targeting PrivatBank with malicious files in password-protected archives to evade detection This article has been indexed from www.infosecurity-magazine.com Read the original article: Sophisticated Phishing Campaign Targets Ukraine’s Largest Bank
Microsoft 365: Dieser Vorteil wird Kunden jetzt gestrichen
In Deutschland hatte Microsoft das Windows-Defender-VPN erst im Oktober 2024 verfügbar gemacht, jetzt läuft das Feature schon wieder aus. Zu den Gründen macht Microsoft nur vage Angaben. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den…
Schluss mit Kleingedrucktem: Adobe Acrobat bekommt KI-Übersetzer für Vertragstexte
Zwischen 60 und 70 Prozent der Verbraucher:innen und Kleinunternehmer:innen lesen das Kleingedruckte in Verträgen selten bis nie. Das zeigt eine aktuelle Adobe-Studie. Um genau das zu ändern, hat Adobe eine neue Funktion für Acrobat entwickelt. Dieser Artikel wurde indexiert von…
Apple überrascht mit neuer Einladungs-App – wir haben sie ausprobiert
Apple hat überraschend eine neue App vorgestellt, mit der ihr auf einfache Art und Weise Einladungen für Partys und andere Events erstellen könnt. Einladen könnt ihr damit auch Leute außerhalb des Apple-Kosmos – einen Haken gibt es aber dennoch. Dieser…
Google Maps: Keine Lust mehr auf den blauen Pfeil? Diese Alternativen bekommt ihr bald
Aktuell bietet Google Maps nur wenige Optionen, um den herkömmlichen blauen Navigationspfeil mit einem Auto-Icon auszutauschen. Künftig wird das Feature aber attraktiver, da Google euch weitere Auswahlmöglichkeiten bieten will. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen…
Good news as ransomware pay fell by 35 percent in 2024
In recent years, you’ve probably encountered numerous news stories about victims of ransomware attacks and the payments made to obtain decryption keys. However, there’s some positive news: ransomware payments decreased by 35% in 2024, as many victims chose not to…
Threat Actors Exploiting Free Email Services to Target Government and Educational Institutions
Threat actors are increasingly leveraging free email services to infiltrate government and educational institutions, exploiting these platforms’ accessibility and widespread use. Increasing Sophistication in Cyber Threats Recent investigations reveal that advanced persistent threat (APT) groups, such as GreenSpot, have employed…
Zero-Day Vulnerabilities in Microsoft Sysinternals Tools Enable DLL Injection Attacks on Windows
A significant zero-day vulnerability has been uncovered in Microsoft Sysinternals tools, posing a severe risk to Windows systems. These widely-used utilities, essential for IT administrators and developers, are now susceptible to DLL injection attacks due to flaws in their dynamic…
Hackers Using AI Agents to Validate Stolen Credit Cards
Cybercriminals are increasingly leveraging artificial intelligence (AI) agents to validate stolen credit card data, posing a significant threat to financial institutions and consumers. These AI-powered systems, originally designed for legitimate automation tasks, are being repurposed to execute card testing attacks…
AI Regulation in the U.S.: Navigating Post-EO 14110
As the Trump administration revokes Executive Order 14110, the U.S. shifts toward a market-driven AI strategy, departing from the Biden administration’s regulatory framework. While proponents see this as a catalyst for innovation and economic growth, critics warn of increased risks,…
The best AirTag wallets of 2025: Expert tested
Never lose your wallet again with Apple AirTag tracking accessories from expert-tested brands like Nomad, ESR, Ridge, and more. This article has been indexed from Latest stories for ZDNET in Security Read the original article: The best AirTag wallets of…