Click here for full interview. In this show, we speak with Tanya Janca, aka SheHacksPurple, a renowned code security trainer with nearly 30 years of experience in application development, engineering, and testing. In the past, she’s worked in counterterrorism for…
FreeType Vulnerability Actively Exploited for Arbitrary Code Execution
A significant vulnerability has been identified in the FreeType library, a widely used open-source font rendering engine. This vulnerability tracked as CVE-2025-27363, is being actively exploited and may lead to arbitrary code execution on affected systems. Overview of the Vulnerability:…
Fake CAPTCHA Malware Exploits Windows Users to Run PowerShell Commands
In early February 2025, Trustwave SpiderLabs uncovered a resurgence of a malicious campaign leveraging fake CAPTCHA verifications to deliver malware. This campaign uses deceptive CAPTCHA prompts to trick users into executing PowerShell commands, initiating a multi-stage attack chain. The end…
Why AI-powered security tools are your secret weapon against tomorrow’s attacks
In the cybersecurity arms race, you have access to the same weapons as the bad guys. Just how well-armed are you now? This article has been indexed from Latest stories for ZDNET in Security Read the original article: Why AI-powered…
Security and beyond
Die Videosicherheitsbranche ist ein Wachstumsmarkt. Das birgt auch Herausforderungen. Wie Axis Communications diesen begegnet und welche Potenziale das Unternehmen ausschöpft. Dieser Artikel wurde indexiert von Newsfeed Lesen Sie den originalen Artikel: Security and beyond
Angreifer verbreiten Trojaner, die als DeepSeek- oder Grok-Clients für Windows verkleidet sind | Offizieller Blog von Kaspersky
Angreifer betreiben Phishing-Websites und imitieren die Startseiten von DeepSeek oder Grok, um sich Zugriff auf fremde Computer zu verschaffen. Dieser Artikel wurde indexiert von Offizieller Blog von Kaspersky Lesen Sie den originalen Artikel: Angreifer verbreiten Trojaner, die als DeepSeek- oder…
New OBSCURE#BAT Exploit Windows Alters System Processes & Registry for Evasion
Cybersecurity researchers at Securonix have identified an advanced malware campaign that employs social engineering tactics and heavily obfuscated code to deploy rootkits capable of cloaking malicious activities on compromised systems. Dubbed OBSCURE#BAT, the campaign targets English-speaking users through various deception…
North Korean Hackers Deploy DocSwap Malware Disguised as Security Tool
In a recent cybersecurity threat discovery, the S2W Threat Research and Intelligence Center Talon has identified and analyzed a new type of malware linked to a North Korean-backed Advanced Persistent Threat (APT) group. The malware, masquerading as a “문서열람 인증…
Medusa Ransomware Hits 300+ Critical Infrastructure Organizations Worldwide
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have issued a joint advisory on the Medusa ransomware, a ransomware-as-a-service (RaaS) variant that has been active since June…
Medusa Ransomware Hacked 300+ Organizations Worldwide from Variety of Critical Infrastructure
A highly sophisticated ransomware variant named Medusa has compromised over 300 organizations worldwide from critical infrastructure sectors. The attacks have targeted a wide array of industries including medical, education, legal, insurance, technology, and manufacturing sectors, demonstrating the threat actor’s broad…
New OBSCURE#BAT Manipulates System Processes & Registry Entries To Evade Detection
A sophisticated malware campaign, tracked as OBSCURE#BAT, has been identified using heavily obfuscated batch scripts to install stealthy rootkits, allowing attackers to maintain persistent access to compromised systems while avoiding detection. This campaign uses social engineering tactics and deceptive file…
Fortinet Addresses Multiple Vulnerabilities in FortiSandbox, FortiOS, & Other Products
Fortinet has released a comprehensive security update addressing numerous vulnerabilities across its product portfolio, with particularly significant issues identified in FortiSandbox, FortiOS, and several other enterprise security solutions. These vulnerabilities range from medium to high severity and could potentially allow…
Medusa ransomware affiliate tried triple extortion scam – up from the usual double demand
Feds warn gang still rampant and now cracked 300+ victims around the world A crook who distributes the Medusa ransomware tried to make a victim cough up three payments instead of the usual two, according to a government advisory on…
WARNING: Expiring Root Certificate May Disable Firefox Add-Ons, Security Features, and DRM Playback
Browser maker Mozilla is urging users to update their Firefox instances to the latest version to avoid facing issues with using add-ons due to the impending expiration of a root certificate. “On March 14, 2025, a root certificate used to…
Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk
Meta has warned that a security vulnerability impacting the FreeType open-source font rendering library may have been exploited in the wild. The vulnerability has been assigned the CVE identifier CVE-2025-27363, and carries a CVSS score of 8.1, indicating high severity.…
Schwerer Ausfall: Dienste von Synology weltweit gestört
Bei Synology gibt es Störungen zweier Systemdienste sowie sämtlicher C2-Dienste. Der Hersteller spricht von einem “schweren Ausfall”. (Synology, Storage) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Schwerer Ausfall: Dienste von Synology weltweit gestört
IT Security News Hourly Summary 2025-03-13 09h : 6 posts
6 posts were published in the last hour 7:32 : Tenda AC7 Vulnerability Lets Hackers Execute Malicious Payloads for Root Access 7:32 : ISAC Executive Order Increases Risk for Small Towns 7:32 : Microsoft patches 57 security flaws, Sola aims…
Tenda AC7 Vulnerability Lets Hackers Execute Malicious Payloads for Root Access
A vulnerability has been discovered in the Tenda AC7 router, firmware version V15.03.06.44, which allows attackers to execute malicious payloads and gain root access. As per a report in Github, the vulnerability, identified through experimental setup and exploitation, revolves around…
ISAC Executive Order Increases Risk for Small Towns
All of the small towns across America will have less time to prepare for and need more time to respond to and recover from threats to and attacks on their election infrastructure. The post ISAC Executive Order Increases Risk for…
Microsoft patches 57 security flaws, Sola aims to build the ‘Stripe for security’, US council wants to counter China threats
Microsoft Patches 57 Security Flaws, Including 6 Actively Exploited Zero-Days US communications regulator to create council to counter China technology threats Signal no longer cooperating with Ukraine on Russian cyberthreats, official says Huge thanks to our sponsor, Vanta Do you…
Estonia-based Blackwall raises €45 million Series B to protect SMBs from malicious online traffic
A huge chunk of online traffic now comes from bots, both good and bad — but AI is boosting the latter. From DDoS attacks to scraping, there’s a renewed barrage of threats that companies have to deal with. According to…
China-Nexus Group Hacked Juniper Networks and Implant Backdoors on Its Routers
In a significant cybersecurity breach discovered in mid-2024, a sophisticated threat actor deployed custom backdoors on Juniper Networks’ Junos OS routers. The intrusion represents an alarming development in the targeting of critical network infrastructure by nation-state actors, with potential implications…
US Charges 12 Chinese Hackers For Hacking National Security Infrastructure
The United States Department of Justice unveiled charges against twelve Chinese nationals on March 5, 2025, accusing them of orchestrating a sophisticated global cyber espionage campaign targeting critical American infrastructure, government agencies, and dissidents. The indictments mark a significant escalation…
Drei Fragen und Antworten: TrapC – speichersicherer Ersatz für C/C++
Programmieren mithilfe von KI-Assistenten benötigt eine C/C++-ähnliche Sprache, die aber speichersicher ist, meint Robin Rowe. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Drei Fragen und Antworten: TrapC – speichersicherer Ersatz für C/C++