Tag: Cyber Security News

20.5 Million DDoS Attacks, With One Exceeding 4.8 Billion Packets

With a record-breaking 20.5 million Distributed Denial of Service (DDoS) attacks prevented in the first quarter alone, a 358% rise over the same period last year, Cloudflare has reported a historic spike in cyberattacks to start 2025. This explosive growth nearly equals…

JokerOTP Platform With 28,000+ Phishing Attacks Dismantled

In a major cybersecurity breakthrough, law enforcement agencies from the UK and Netherlands have dismantled the notorious JokerOTP platform, a sophisticated phishing tool responsible for compromising financial accounts totaling £7.5 million across 13 countries. A 24-year-old man was arrested Tuesday…

Apache Tomcat Vulnerability Let Attackers Bypass Rules & Trigger DoS Condition

The Apache Software Foundation disclosed a significant security vulnerability in Apache Tomcat that could allow attackers to bypass security rules and trigger denial-of-service conditions through manipulated HTTP priority headers.  Identified as CVE-2025-31650, this high-severity vulnerability affects multiple Tomcat versions, posing…

RansomHub Ransomware Deploying Malware to Compromise Corporate Networks

A new Ransomware-as-a-Service (RaaS) group called RansomHub emerged in the cybercriminal ecosystem, specializing in targeting high-profile organizations through sophisticated attack vectors. The group advertises its criminal services on the Russian Anonymous Market Place (RAMP), a notorious Dark Web forum known…

SAP NetWeaver 0-Day Vulnerability Exploited in the Wild to Deploy Webshells

SAP released an emergency out-of-band patch addressing CVE-2025-31324, a critical zero-day vulnerability in SAP NetWeaver Visual Composer with the highest possible CVSS score of 10.0.  This vulnerability stems from a missing authorization check in the Metadata Uploader component, allowing unauthenticated…

Windows 11 25H2 to be Released Possibly With Minor Changes

As Microsoft continues to refine Windows 11, new leaks and technical insights indicate that the upcoming 25H2 update, slated for release in September or October 2025, will likely be a minor iteration.  Unlike the more substantial updates seen in previous…

Monitoring Dark Web Threats – CISO’s Proactive Approach

The dark web has rapidly become a central hub for cybercriminal activity, where stolen data, compromised credentials, and malicious tools are traded with alarming frequency. For Chief Information Security Officers (CISOs), this shadowy underworld poses a persistent and evolving threat…

ESET Integrates Detection & Response Capabilities With Splunk SIEM

ESET, a global leader in cybersecurity solutions, has announced a significant enhancement to its ESET Endpoint Management Platform (ESET PROTECT), unveiling a seamless integration with Splunk, one of the world’s leading security information and event management (SIEM) platforms. This move…

Selecting Cybersecurity Vendors – CISO’s Decision Framework

In an era where cyber threats are growing in sophistication and frequency, Chief Information Security Officers (CISOs) face immense pressure to select cybersecurity vendors that address immediate technical needs and align with broader business objectives. The rapid evolution of threats,…

React Router Vulnerabilities Let Attackers Spoof Contents & Modify Values

Significant security flaws have been discovered in React Router, a widely-used routing library for React applications, potentially allowing attackers to corrupt content, poison caches, and manipulate pre-rendered data.  The vulnerabilities, which impact applications running in Framework mode with server-side rendering…

Assessing Third-Party Vendor Risks – CISO Best Practices

Third-party vendors are indispensable to modern enterprises, offering specialized services, cost efficiencies, and scalability. However, they also introduce significant cybersecurity risks that can compromise sensitive data, disrupt operations, and damage organizational reputation. For Chief Information Security Officers (CISOs), effectively assessing…

Hackers Selling Advanced Stealthy HiddenMiner Malware on Dark Web Forums

A new threat actor is offering an enhanced version of HiddenMiner, a sophisticated cryptomining malware targeting Monero (XMR) cryptocurrency.  This customized tool, being sold on underground forums, combines advanced evasion techniques with an accessible user interface, potentially lowering the barrier…

CISA Warns Planet Technology Network Products Let Attackers Manipulate Devices

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory warning of multiple high-severity vulnerabilities in Planet Technology network products that could allow attackers to gain administrative control over affected devices without authentication.  The advisory details five vulnerabilities…

Securing IoT Devices – CISO’s Strategic Resource Guide

The Internet of Things (IoT) has fundamentally transformed organizations’ operations, unlocking unprecedented efficiencies, insights, and innovation across industries. From healthcare to manufacturing, logistics to smart cities, billions of connected devices now collect, process, and transmit vast amounts of data in…

Reducing Cyber Insurance Costs – CISO Proactive Measures

The cybersecurity insurance landscape is evolving rapidly, with premiums increasing as threats become more sophisticated and breaches more costly. Navigating this changing environment presents both challenges and opportunities for CISOs and security leaders. Recent industry data indicates that organizations implementing…

Navigating Cybersecurity Frameworks – CISO Resource Guide

The role of the Chief Information Security Officer (CISO) has never been more critical. As organizations face a rapidly evolving threat landscape, CISOs must defend against cyberattacks and ensure compliance with a growing patchwork of regulations and standards. Cybersecurity frameworks…

DragonForce and Anubis Ransomware Operators Unveils New Affiliate Models

Despite significant disruptions by international law enforcement operations targeting major ransomware schemes, cybercriminal groups continue demonstrating remarkable adaptability in 2025. Two noteworthy ransomware operations, DragonForce and Anubis, have introduced innovative affiliate models designed to expand their reach and increase profitability…

How To Build A Data Center Security Strategy For 2025 And Beyond

As the world becomes increasingly reliant on digital infrastructure, data centers have evolved into the backbone of business operations, cloud services, and critical government functions. With projections showing global data center capacity rising sharply over the next decade, the security…

Top 5 Cybersecurity Risks CISOs Must Tackle in 2025

As we navigate 2025, Chief Information Security Officers (CISOs) must prepare for the Top 5 Cybersecurity Risks emerging from a rapidly evolving threat landscape driven by technological advancements, geopolitical tensions, and increasingly sophisticated attacker tactics.” The role of CISOs has…

Critical ScreenConnect Vulnerability Let Attackers Inject Malicious Code

ConnectWise has released an urgent security patch for its ScreenConnect remote access software to address a serious vulnerability that could allow attackers to execute malicious code on affected systems. The vulnerability, identified as CVE-2025-3935 and tracked under CWE-287 (Improper Authentication),…

Threat Actors Registered 26k+ Domains Mimic Brands to Trick Users

In a significant escalation of digital deception tactics, threat actors have registered over 26,000 domains in March 2025 alone, designed to impersonate legitimate brands and government services. These malicious domains serve as landing pages for sophisticated smishing (SMS phishing) campaigns,…

North Korean Hackers Using GenAI to Get Remote Jobs Around the Globe

In a sophisticated operation that blends social engineering with cutting-edge technology, North Korean operatives have been leveraging generative artificial intelligence tools to secure remote technical positions in companies worldwide. These individuals create compelling digital personas, complete with fabricated credentials and…

6 Best Security Awareness Training Platforms For MSPs in 2025

Managed service providers (MSPs) are increasingly popular cyberattack targets. These entities often have numerous endpoints and distributed networks that create many opportunities for adversaries seeking weaknesses to exploit. Security awareness training is just one aspect of defense efforts, but it…

Hackers Exploiting MS-SQL Servers & Deploy Ammyy Admin for Remote Access

A sophisticated cyberattack campaign targeting vulnerable Microsoft SQL servers has been discovered, aiming to deploy remote access tools and privilege escalation malware. Security researchers have identified that threat actors are specifically exploiting poorly secured MS-SQL instances to install Ammyy Admin,…

Chrome Use-After-Free Vulnerabilities Exploited in the Wild

Google Chrome has faced a series of high-profile security incidents involving Use-After-Free (UAF) vulnerabilities, several of which have been actively exploited in the wild.  These flaws, rooted in improper memory management, have become a persistent threat vector for attackers seeking…

Microsoft’s Symlink Patch Created New Windows DoS Vulnerability

A recent Microsoft security update, intended to patch a critical privilege escalation vulnerability, has inadvertently introduced a new and significant flaw.  The fix now enables non-administrative users to effectively block all future Windows security updates, creating a denial-of-service condition.  This…

Spring Security Vulnerability Let Attackers Determine Which Usernames are Valid

A serious vulnerability related to information exposure (CVE-2025-22234) impacts several versions of the spring-security-crypto package. The flaw enables attackers to determine valid usernames through timing attacks, undermining a key security feature designed to prevent user enumeration.  The vulnerability affects Spring…

Threat Actors Attacking Organization in Thailand to Deploy Ransomware

Thailand has emerged as a significant target for sophisticated ransomware attacks, with a dramatic 240% increase in cyber campaigns recorded in 2024 compared to the previous year. This surge reflects heightened geopolitical tensions and strategic interest in Thailand’s expanding digital…

U.S. Secret Service Details on How to Spot a Credit Card Skimmer

The U.S. Secret Service Washington Field Office (WFO) has issued an advisory on identifying credit card skimming devices, calling this form of financial theft a “low-risk, high-reward crime that is on the rise across the country.”  Following the recent Operation…

Lazarus APT Attacking Organizations by Exploiting One-Day vulnerabilities

Cybersecurity experts have identified a sophisticated campaign by the North Korean state-sponsored Lazarus APT group targeting critical infrastructure and financial organizations worldwide. The threat actor has shifted tactics to exploit recently patched vulnerabilities—known as one-day vulnerabilities—before organizations can implement necessary…

Threat Actors Taking Advantage of Unsecured Kubernetes Clusters for Cryptocurrency Mining

In a troubling development for cybersecurity professionals, threat actors are increasingly targeting unsecured Kubernetes clusters to deploy cryptocurrency mining operations, leveraging the computational resources of victim organizations without their knowledge. These attacks exploit vulnerabilities in containerized environments, particularly focusing on…

CISA Confirms Continued Support for CVE Program, No Funding Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has reaffirmed its strong commitment to the Common Vulnerabilities and Exposures (CVE) Program, following recent public reports that inaccurately suggested the program was in jeopardy due to funding shortages. CISA clarified that…

New Stego Campaign Leverages MS Office Vulnerability to Deliver AsyncRAT

Cybersecurity researchers have discovered a sophisticated malware campaign that employs steganography techniques to hide malicious code within seemingly innocent image files. This attack chain leverages an older Microsoft Office vulnerability (CVE-2017-0199) to ultimately deliver AsyncRAT, a remote access trojan capable…

ToyMaker Hackers Compromised Multitude Hosts Using SSH & File Transfer Tools

In 2023, cybersecurity experts uncovered an extensive compromise in critical infrastructure enterprises by a sophisticated threat actor group. This initial access broker, dubbed “ToyMaker,” systematically exploited vulnerable internet-facing systems before deploying custom backdoors to extract credentials from victim organizations. Their…

Citrix NetScaler Console Vulnerability Enables Admin Access – PoC Released

A critical vulnerability in Citrix NetScaler Console allows complete unauthenticated administrative access despite being initially classified as merely a “sensitive information disclosure” issue.  The proof-of-concept exploit code has been released, enabling attackers to create administrator accounts by exploiting an internal…

NVIDIA NeMo Framework Vulnerability Let Attackers Execute Remote Code

There are three high-severity vulnerabilities in the NVIDIA NeMo Framework that could allow attackers to execute remote code, potentially compromising AI systems and leading to data tampering.  The security flaws, identified as CVE-2025-23249, CVE-2025-23250, and CVE-2025-23251, each received a CVSS…

Commvault RCE Vulnerability Let Attackers Breach Vault – PoC Released

A critical pre-authenticated Remote Code Execution (RCE) vulnerability affecting Commvault’s backup and data protection platform.  The vulnerability, tracked as CVE-2025-34028, could allow attackers to compromise enterprise backup systems without requiring authentication, potentially putting organizations’ most critical data at risk. The…

Blue Shield Leaked Health Info of 4.7M patients with Google Ads

Blue Shield of California has disclosed a significant data breach affecting 4.7 million members, representing the majority of its nearly 6 million customers.  The health insurance provider revealed that protected health information (PHI) was inadvertently shared with Google’s advertising platforms…

SonicWall SSLVPN Vulnerability Let Remote Attackers Crash Firewall Appliances

SonicWall has disclosed a critical security vulnerability in its SSLVPN service that allows unauthenticated remote attackers to crash affected firewall appliances, potentially causing significant disruptions to enterprise networks.  The vulnerability, tracked as CVE-2025-32818, received a high severity CVSS score of…

Microsoft to Offer Rewards Up to $30,000 for AI Vulnerabilities

Microsoft has launched an expanded bug bounty program offering rewards of up to $30,000 for researchers who identify critical vulnerabilities in AI systems within its Dynamics 365 and Power Platform products.  The initiative, announced by Microsoft Security Response, aims to…

Building a Cyber-Aware Culture – CISO’s Step-by-Step Plan

A cyber-aware culture is the backbone of any resilient organization in today’s digital world. As cyber threats become more advanced and frequent, safeguarding sensitive data and systems can no longer rest solely with IT departments. Chief Information Security Officers (CISOs)…