A sophisticated malware campaign is targeting Windows users through deceptive CAPTCHA verification prompts that trick victims into executing malicious PowerShell scripts. This resurgence of fake CAPTCHA attacks, identified in early February 2025, represents a growing threat as attackers continue to…
Hackers Using JSPSpy Tool To Manage Malicious Webshell Infrastructure
Cybersecurity researchers have identified a cluster of servers hosting JSPSpy, a Java-based webshell first observed in 2013, now being deployed alongside a rebranded file management tool. The webshell features a graphical interface enabling remote access and file management capabilities, making…
GitLab Warns of Multiple Vulnerabilities Let Attackers Login as Valid User
GitLab has released critical security patches for multiple vulnerabilities that could potentially allow attackers to authenticate as legitimate users or even execute remote code under specific circumstances. The company has urged all self-managed GitLab installations to immediately upgrade to versions…
Google Chrome und Microsoft Edge: Mehrere Schwachstellen
Es bestehen mehrere Schwachstellen in Google Chrome und Microsoft Edge. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dienste zum Absturz zu bringen, bösartigen Code auszuführen, Daten zu verändern, vertrauliche Informationen zu stehlen und Sicherheitsvorkehrungen zu umgehen. Damit die Schwachstellen erfolgreich…
Sicherheitslücken: Gitlab-Entwickler raten zu zügigem Update
Es sind wichtige Sicherheitsupdates für die Softwareentwicklungsplattform Gitlab erschienen. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Sicherheitslücken: Gitlab-Entwickler raten zu zügigem Update
[UPDATE] [kritisch] Webkit/Apple : Schwachstelle ermöglicht Umgehung von Sicherheitsmechanismen
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Webkit und in Apple iOS, Apple iPadOS, Apple macOS und Apple Safari ausnutzen, um Sicherheitsmechanismen zu umgehen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie…
[UPDATE] [hoch] Microsoft Windows/Windows Server: Mehrere Schwachstellen
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows 10, Microsoft Windows Server 2016, Microsoft Windows Server 2019, Microsoft Windows, Microsoft Windows Server 2022 und Microsoft Windows…
[UPDATE] [kritisch] Google Chrome und Microsoft Edge: Mehrere Schwachstellen
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Chrome und Microsoft Edge ausnutzen, um einen Denial-of-Service-Zustand auszulösen, beliebigen Code auszuführen, Daten zu manipulieren, vertrauliche Informationen preiszugeben und Sicherheitsmaßnahmen zu umgehen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst…
Entertaining While Training: Lessons on C and C++ Secure Coding Practices with Tanya Janca
Click here for full interview. In this show, we speak with Tanya Janca, aka SheHacksPurple, a renowned code security trainer with nearly 30 years of experience in application development, engineering, and testing. In the past, she’s worked in counterterrorism for…
FreeType Vulnerability Actively Exploited for Arbitrary Code Execution
A significant vulnerability has been identified in the FreeType library, a widely used open-source font rendering engine. This vulnerability tracked as CVE-2025-27363, is being actively exploited and may lead to arbitrary code execution on affected systems. Overview of the Vulnerability:…
Fake CAPTCHA Malware Exploits Windows Users to Run PowerShell Commands
In early February 2025, Trustwave SpiderLabs uncovered a resurgence of a malicious campaign leveraging fake CAPTCHA verifications to deliver malware. This campaign uses deceptive CAPTCHA prompts to trick users into executing PowerShell commands, initiating a multi-stage attack chain. The end…
Why AI-powered security tools are your secret weapon against tomorrow’s attacks
In the cybersecurity arms race, you have access to the same weapons as the bad guys. Just how well-armed are you now? This article has been indexed from Latest stories for ZDNET in Security Read the original article: Why AI-powered…
Security and beyond
Die Videosicherheitsbranche ist ein Wachstumsmarkt. Das birgt auch Herausforderungen. Wie Axis Communications diesen begegnet und welche Potenziale das Unternehmen ausschöpft. Dieser Artikel wurde indexiert von Newsfeed Lesen Sie den originalen Artikel: Security and beyond
Angreifer verbreiten Trojaner, die als DeepSeek- oder Grok-Clients für Windows verkleidet sind | Offizieller Blog von Kaspersky
Angreifer betreiben Phishing-Websites und imitieren die Startseiten von DeepSeek oder Grok, um sich Zugriff auf fremde Computer zu verschaffen. Dieser Artikel wurde indexiert von Offizieller Blog von Kaspersky Lesen Sie den originalen Artikel: Angreifer verbreiten Trojaner, die als DeepSeek- oder…
New OBSCURE#BAT Exploit Windows Alters System Processes & Registry for Evasion
Cybersecurity researchers at Securonix have identified an advanced malware campaign that employs social engineering tactics and heavily obfuscated code to deploy rootkits capable of cloaking malicious activities on compromised systems. Dubbed OBSCURE#BAT, the campaign targets English-speaking users through various deception…
North Korean Hackers Deploy DocSwap Malware Disguised as Security Tool
In a recent cybersecurity threat discovery, the S2W Threat Research and Intelligence Center Talon has identified and analyzed a new type of malware linked to a North Korean-backed Advanced Persistent Threat (APT) group. The malware, masquerading as a “문서열람 인증…
Medusa Ransomware Hits 300+ Critical Infrastructure Organizations Worldwide
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have issued a joint advisory on the Medusa ransomware, a ransomware-as-a-service (RaaS) variant that has been active since June…
Medusa Ransomware Hacked 300+ Organizations Worldwide from Variety of Critical Infrastructure
A highly sophisticated ransomware variant named Medusa has compromised over 300 organizations worldwide from critical infrastructure sectors. The attacks have targeted a wide array of industries including medical, education, legal, insurance, technology, and manufacturing sectors, demonstrating the threat actor’s broad…
New OBSCURE#BAT Manipulates System Processes & Registry Entries To Evade Detection
A sophisticated malware campaign, tracked as OBSCURE#BAT, has been identified using heavily obfuscated batch scripts to install stealthy rootkits, allowing attackers to maintain persistent access to compromised systems while avoiding detection. This campaign uses social engineering tactics and deceptive file…
Fortinet Addresses Multiple Vulnerabilities in FortiSandbox, FortiOS, & Other Products
Fortinet has released a comprehensive security update addressing numerous vulnerabilities across its product portfolio, with particularly significant issues identified in FortiSandbox, FortiOS, and several other enterprise security solutions. These vulnerabilities range from medium to high severity and could potentially allow…
Medusa ransomware affiliate tried triple extortion scam – up from the usual double demand
Feds warn gang still rampant and now cracked 300+ victims around the world A crook who distributes the Medusa ransomware tried to make a victim cough up three payments instead of the usual two, according to a government advisory on…
WARNING: Expiring Root Certificate May Disable Firefox Add-Ons, Security Features, and DRM Playback
Browser maker Mozilla is urging users to update their Firefox instances to the latest version to avoid facing issues with using add-ons due to the impending expiration of a root certificate. “On March 14, 2025, a root certificate used to…
Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk
Meta has warned that a security vulnerability impacting the FreeType open-source font rendering library may have been exploited in the wild. The vulnerability has been assigned the CVE identifier CVE-2025-27363, and carries a CVSS score of 8.1, indicating high severity.…
Schwerer Ausfall: Dienste von Synology weltweit gestört
Bei Synology gibt es Störungen zweier Systemdienste sowie sämtlicher C2-Dienste. Der Hersteller spricht von einem “schweren Ausfall”. (Synology, Storage) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Schwerer Ausfall: Dienste von Synology weltweit gestört