Tag: Cyber Security News

Ransomware Payments Dropped By 35%, As Victims Refusing To Pay

In a significant shift in the ransomware landscape, payments to attackers have decreased by approximately 35% year-over-year. This decline is attributed to increased law enforcement actions, improved international collaboration, and a growing trend among victims to refuse ransom demands. Here…

World’s Longest and Strongest WiFi Passwords From 31m Passwords List

A cybersecurity enthusiast discovered the longest and most complicated passwords ever used by searching through a huge dataset of 31 million likely WPA WiFi passwords.  Typically, a password’s length and complexity directly affect its security. While diverse character sets prevent…

GhidrAssist Brings AI Features to Ghidra in Reverse Engineering

Reverse engineering has long been a challenging yet essential process for cybersecurity professionals, software analysts, and researchers.  With the introduction of GhidrAssist, a cutting-edge plugin for the popular reverse engineering platform Ghidra, the process becomes significantly more streamlined and efficient. …

Linux Kernel 6.14 Released – What’s New With rc2!

Linus Torvalds announced the release of Linux Kernel 6.14-rc2, the second release candidate in the 6.14 series. The release follows the usual weekly schedule and comes as a relatively small update, consistent with the overall size of the 6.14 kernel.…

10 Best UTM (Unified Threat Management) Firewalls – 2025

Unified Threat Management (UTM) firewall is a comprehensive cybersecurity solution that integrates multiple security functions into a single platform or appliance. It is designed to simplify security management, reduce costs, and provide robust protection against a variety of cyber threats. UTM solutions are especially popular among…

Hackers Compromising IIS Servers to Deploy BadIIS Malware

A widespread campaign targeting Microsoft Internet Information Services (IIS) servers to deploy the BadIIS malware, a tool used for search engine optimization (SEO) fraud and malicious content injection.  The campaign, attributed to the Chinese-speaking hacking group DragonRank, has affected over…

Ex-Google Engineer Charged for Stealing AI Secrets to China

In a groundbreaking case highlighting the intersection of technology and national security, a federal grand jury has indicted Linwei Ding, also known as Leon Ding, on four counts of theft of trade secrets.  The charges allege that Ding, a former…

Logsign Vulnerability Remote Attackers to Bypass Authentication

A severe security vulnerability identified as CVE-2025-1044 has been disclosed in the Logsign Unified SecOps Platform, a widely used software for security operations.  This flaw, rated with a CVSS score of 9.8, poses a critical threat, allowing remote attackers to…

Hackers Exploiting DeepSeek & Qwen AI Models To Develop Malware

Hackers have begun leveraging the capabilities of DeepSeek and Qwen AI models to create sophisticated malware. These models, known for their advanced language processing capabilities, have attracted the attention of cybercriminals due to their potential for generating malicious content with…

Splunk Unveils a New AI Based Honeypot “DECEIVE” to Log Attacker Activities

Splunk, a leader in data analytics and cybersecurity solutions, has introduced a groundbreaking proof-of-concept honeypot system named DECEIVE (DECeption with Evaluative Integrated Validation Engine).  This AI-powered tool is designed to simulate high-interaction systems with minimal setup effort, offering organizations an…

Ghidra 11.3 Released – NSA’s Powerful Reverse Engineering Tool

The National Security Agency (NSA) has launched Ghidra 11.3, the latest version of its open-source software reverse engineering (SRE) framework. The National Security Agency (NSA) has developed Ghidra, a cutting-edge Software Reverse Engineering (SRE) framework designed to analyze compiled code…

3 Best Ways to Speed Up Alert Triage for SOC Team – Use Cases

Security analysts know the struggle: endless alerts, repetitive tasks, and not enough hours in the day. The volume of potential threats can be overwhelming, making efficient alert triage crucial for any Security Operations Center (SOC). The great news is that…

Hackers Exploiting ScreenConnect RMM Tool to Establish Persistence

Threat actors have been leveraging the legitimate Remote Monitoring and Management (RMM) tool, ScreenConnect, to establish persistence in their cyberattacks. This trend shows the evolving tactics of hackers who exploit trusted software to gain unauthorized access to systems. ScreenConnect, now…

Beware of Nova Stealer Malware Sold for $50 on Hacking Forums

A recent cybersecurity threat has emerged in the form of the Nova Stealer malware, a fork of the popular SnakeLogger stealer. This malware is being marketed on hacking forums under a Malware-as-a-Service (MaaS) model, making it accessible to a wide…

WhatsApp Zero-Click Paragon Spyware Terminates Contract with Italy

Israeli spyware company Paragon Solutions has terminated its contract with Italy following allegations that its military-grade surveillance software, Graphite, was misused to target journalists and civil society members. The decision comes less than a week after WhatsApp revealed that the…

F5 BIG-IP SNMP Vulnerability Let Attackers Trigger DoS Attack on System

A recently disclosed vulnerability in F5’s BIG-IP system has raised significant security concerns. Identified as CVE-2025-21091, this flaw allows remote, unauthenticated attackers to trigger a Denial-of-Service (DoS) attack by exploiting the Simple Network Management Protocol (SNMP) when SNMP v1 or…

DeepSeek’s Exposes Full System Prompt in New Jailbreak Method

A major security vulnerability in DeepSeek, the breakthrough Chinese AI model, has been uncovered by researchers, exposing the platform’s entire system prompt through a sophisticated jailbreak technique.  This discovery has raised serious concerns about AI security and model training transparency.…

Password Stealing Malware Attacking macOS Users Increasing Rapidly

In recent months, macOS users have faced a significant rise in password-stealing malware attacks. These threats, often distributed through malicious advertising and fake application installers, have become increasingly sophisticated. Three prominent malware types, “Atomic Stealer,” “Poseidon Stealer,” and “Cthulhu Stealer”…

Critical Cisco ISE Vulnerabilities Allow Arbitrary Command Execution Remotely

Cisco has disclosed two critical vulnerabilities in its Identity Services Engine (ISE) software that could allow authenticated, remote attackers to execute arbitrary commands, elevate privileges, and manipulate system configurations on affected devices. These vulnerabilities tracked as CVE-2025-20124 and CVE-2025-20125, have…

Hackers Using AI Agents To Validate Stolen Credit Cards

Hackers have begun leveraging AI agents to validate stolen credit cards, marking a new era in the sophistication of financial fraud. This trend highlights the evolving threat landscape where technology, once seen as a tool for security, is being repurposed…

Threat Actors Exploiting DeepSeek’s Rise To Fuel Cyber Attacks

The AI startup DeepSeek has gained significant attention in recent weeks for its advanced AI models, particularly the R1 reasoning model. However, this rapid rise to fame has also attracted the unwanted attention of cybercriminals, who are exploiting DeepSeek’s popularity…

Multiple IBM Cloud Pak Vulnerabilities Let Attackers Execute Remote Code

IBM has released critical security updates addressing multiple vulnerabilities in its Cloud Pak for Business Automation software.  These vulnerabilities, if exploited, could allow attackers to access sensitive data, disrupt operations, or compromise system integrity. The fixes are part of the…

Critical Netgear Vulnerabilities Let Attackers Execute Remote Code

NETGEAR has issued a critical security advisory addressing a severe unauthenticated remote code execution (RCE) vulnerability affecting several of its popular router models.  This flaw, tracked under internal identifier PSV-2023-0039, poses a significant risk by allowing attackers to execute arbitrary…

Hackers Exploits ADFS to Bypass MFA & Gain Access to Critical Systems

A sophisticated phishing campaign has been discovered targeting organizations reliant on Microsoft’s Active Directory Federation Services (ADFS).  This legacy single sign-on (SSO) solution, designed to streamline authentication across multiple applications, is being exploited by attackers to bypass multi-factor authentication (MFA)…

CISA Releases Guidance to Protect Firewalls, Routers, & Internet-Facing Servers

The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with international cybersecurity authorities, has issued comprehensive guidance aimed at securing network edge devices.  These devices, which include firewalls, routers, VPN gateways, Internet of Things (IoT) devices, internet-facing servers, and operational…

TinyZero – Researchers Replicated DeepSeek’s R1-Zero Model for Just $30

In an impressive demonstration of cost-effective AI research, a group of researchers has successfully replicated DeepSeek’s R1-Zero model for just $30. Dubbed TinyZero, this project focuses on countdown and multiplication tasks, leveraging reinforcement learning (RL) to enable a 3-billion-parameter (3B)…

AMD SEV Vulnerability Allows Malicious CPU Microcode Injection as Admin

AMD has disclosed a high-severity vulnerability (CVE-2024-56161) in its Secure Encrypted Virtualization (SEV) technology, which could allow attackers with administrative privileges to inject malicious CPU microcode.  This flaw compromises the confidentiality and integrity of virtual machines (VMs) protected by SEV-SNP,…

3 SOC Challenges Solved by Threat Intelligence

An organization’s cyber security operation center (SOC) is a unit in charge of cyber threat prevention and mitigation.  Within this framework, several critical tasks imply gathering and analyzing data on threats, incidents and attacks. This process is usually referred to…

Hackers Using HTTP Client Tools To Takeover Microsoft 365 Accounts

Hackers have increasingly been using HTTP client tools to orchestrate sophisticated account takeover attacks on Microsoft 365 environments. A staggering 78% of Microsoft 365 tenants have been targeted at least once by such attacks, highlighting the evolving tactics of threat…

New Attack Technique to Bypassing EDR as Low Privileged Standard User

A new cyberattack technique has emerged, enabling attackers to bypass Endpoint Detection and Response (EDR) systems while operating under a low-privileged standard user account.  Traditionally, EDR evasion requires elevated privileges, such as administrative or system-level access.  However, this innovative approach…

Roundcube XSS Vulnerability Let Attackers Inject Malicious Files

A critical Cross-Site Scripting (XSS) vulnerability, tracked as CVE-2024-57004, has been discovered in Roundcube Webmail version 1.6.9.  This flaw allows remote authenticated users to upload malicious files disguised as email attachments, posing significant risks to individuals and organizations using the…

Canadian National Charged for Stealing $65 Million in Crypto

U.S. prosecutors have charged Andean Medjedovic, a 22-year-old Canadian, with five counts of criminal indictment for allegedly orchestrating a sophisticated cryptocurrency theft.  Medjedovic is accused of exploiting vulnerabilities in the KyberSwap and Indexed Finance DeFi protocols, resulting in significant financial…

Multiple Dell PowerProtect Vulnerabilities Let Attackers Compromise System

Dell Technologies has disclosed multiple critical vulnerabilities affecting its PowerProtect product line, including Data Domain (DD) appliances, PowerProtect Management Center, and other associated systems.  These vulnerabilities, if exploited, could allow attackers to compromise system integrity, escalate privileges, or execute arbitrary…

Casio UK Web Store Hacked to Inject Customer Credit Card Stealing Scripts

A sophisticated web-skimming campaign targeting multiple websites, including the UK online store of electronics giant Casio (casio[.]co.uk). The attack, which exposed sensitive customer data, highlights ongoing vulnerabilities in e-commerce platforms and the evolving tactics of cybercriminals. The breach on casio.co.uk…

Casio UK Store Hacked to Inject Customer Credit Card Stealing Scripts

A sophisticated web-skimming campaign targeting multiple websites, including the UK online store of electronics giant Casio (casio[.]co.uk). The attack, which exposed sensitive customer data, highlights ongoing vulnerabilities in e-commerce platforms and the evolving tactics of cybercriminals. The breach on casio.co.uk…