Tag: Cyber Security News

Hertz Data Breach – Customer Personal Information Stolen by Hackers

Hertz Corporation has confirmed a significant data breach affecting customers of its Hertz, Dollar, and Thrifty brands, where hackers exploited critical security vulnerabilities to access sensitive customer information.  The company disclosed that unauthorized third parties acquired customer data after exploiting…

Why Every CISO Needs a Crisis Communications Plan in 2025

In an era defined by escalating cyber threats and regulatory scrutiny, the role of the Chief Information Security Officer (CISO) has expanded far beyond technical oversight. By 2025, cyberattacks will not only test an organization’s technical defenses but also its…

Why Security Leaders Are Turning to AI for Threat Detection

In today’s rapidly evolving digital landscape, cybersecurity threats are becoming increasingly sophisticated and harder to detect using traditional methods. Security leaders across industries are recognizing artificial intelligence as a transformative force in strengthening defensive capabilities. This paradigm shift is prompting…

Third-Party Risk Management – How to Build a Strong TPRM Program

In today’s interconnected business environment, organizations increasingly rely on third-party vendors, suppliers, and partners to deliver critical services and functions. While these relationships drive efficiency and innovation, they also introduce significant risks ranging from data breaches and operational disruptions to…

Beware of $5 SMS Phishing Attack Targeting Toll Road Users

A widespread and ongoing SMS phishing (smishing) campaign targeting toll road users across the United States has been identified, posing a significant threat to motorists’ financial security. Since mid-October 2024, cybercriminals have been impersonating legitimate toll road payment services such…

The Rise of Cyber Insurance – What CISOs Need to Consider

As we move through 2025, Chief Information Security Officers (CISOs) face an increasingly complex threat landscape characterized by sophisticated ransomware attacks, evolving regulatory requirements, and expanding attack surfaces. Amid these challenges, cyber insurance has emerged as a critical component of…

How to Integrate Security into Agile Dev Teams

In today’s rapidly evolving digital landscape, integrating security into agile development processes has become a critical imperative rather than a mere afterthought. The traditional approach of addressing security concerns at the end of the development cycle creates vulnerabilities and leads…

New Stealthy ResolverRAT With Advanced in-memory Execution Techniques

A newly identified remote access trojan (RAT) dubbed ResolverRAT has emerged as a significant threat to global enterprises, leveraging advanced in-memory execution and multi-layered evasion techniques to bypass traditional security measures. The attack targeting healthcare and pharmaceutical organizations, this malware…

AI-Powered Phishing Detection – Does It Actually Work?

Phishing attacks remain one of the most pervasive threats in the cybersecurity landscape, targeting individuals and organizations alike. These attacks, which involve tricking victims into revealing sensitive information or installing malicious software, have become increasingly sophisticated over time. The rise…

Chinese Hackers Attacking Critical Infrastructure to Sabotage Networks

In an alarming escalation of cyber threats, Chinese state-sponsored hackers have intensified their operations targeting critical infrastructure across the United States, Europe, and the Asia-Pacific region. Recent intelligence reports reveal that sophisticated threat actors, including Volt Typhoon and Salt Typhoon,…

VMware ESXi 8.0 Update 3e Released for Free, What’s New!

Broadcom has officially reintroduced the free version of VMware ESXi with the release of ESXi 8.0 Update 3e (Build 24674464) on April 10, 2025. This marks a significant policy reversal after Broadcom discontinued the free ESXi offering following its acquisition…

The CISO’s Guide to Managing Ransomware Threats in 2025

Ransomware continues to dominate the threat landscape in 2025, evolving from opportunistic attacks to sophisticated criminal enterprises that operate with business-like efficiency. Recent research confirms ransomware as the top predicted threat this year, with AI-powered variants raising particular concern among…

Threat Actors Hijack Legitimate Crypto Packages to Inject Malicious Code

Cybersecurity researchers have uncovered a sophisticated malware campaign targeting cryptocurrency users through compromised npm packages. The attack specifically targets users of Atomic and Exodus wallets, hijacking transactions by injecting malicious code that redirects funds to attacker-controlled addresses. This latest campaign…

Why CISOs Are Betting Big on AI, Automation & Zero Trust

In today’s fast-paced digital world, Chief Information Security Officers (CISOs) are under immense pressure to protect their organizations from increasingly sophisticated cyber threats. As attack surfaces expand with remote work, cloud adoption, and IoT devices, traditional security models are proving…

STRIDE GPT – AI-powered Tool LLMs To Generate Threat Models

A new tool has emerged that promises to revolutionize the way organizations approach threat modeling. STRIDE GPT, an AI-powered threat modeling tool, leverages the capabilities of large language models (LLMs) to generate comprehensive threat models and attack trees for applications,…

ViperSoftX Malware Attacking Users via Cracked Software

A sophisticated malware campaign utilizing the notorious ViperSoftX malware has been targeting users through cracked software and torrent downloads since early April 2025. This PowerShell-based threat operates through a multi-stage infection process, establishing command and control communications before downloading additional…

100,000 WordPress Sites Vulnerable to Rogue Creation Vulnerability

A critical vulnerability affecting over 100,000 WordPress websites has been discovered in the SureTriggers WordPress plugin, potentially allowing attackers to create unauthorized administrator accounts. The flaw, identified as CVE-2025-3102 with a CVSS score of 8.1 (High), impacts all versions of…

Hackers Exploiting Domain Controller to Deploy Ransomware Using RDP

Microsoft has recently uncovered a sharp rise in ransomware attacks exploiting domain controllers (DCs) through Remote Desktop Protocol (RDP), with the average attack costing organizations $9.36 million in 2024. These sophisticated campaigns aim to cripple enterprises by encrypting critical systems…

Ransomware Attack Prevention Checklist – 2025

Businesses face significant hazards from ransomware attacks, which are capable of causing severe damage in a brief period. Over the past few years, numerous well-known companies, including CNA Financial, JBS Foods, and Colonial Pipeline, have fallen victim to such attacks,…

CISA Releases 10 ICS Advisories Covering Vulnerabilities & Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new advisories addressing vulnerabilities in Industrial Control Systems (ICS).   These advisories aim to inform stakeholders about critical security issues, exploits, and mitigation strategies for ICS technologies widely deployed across essential…

Sensata Technologies Hacked – Ransomware Attack Disrupts Operations

A sophisticated ransomware attack has struck Sensata Technologies, causing significant operational disruptions across the company’s global network.  The industrial technology firm, which develops sensor-rich solutions and electrical protection systems for automotive, aerospace, and industrial applications, confirmed the cybersecurity incident occurred…

Ivanti 0-day RCE Vulnerability Exploitation Details Disclosed

A detailed technical analysis has been published regarding CVE-2025-22457, an unauthenticated remote code execution (RCE) vulnerability impacting several Ivanti products. The vulnerability was recently exploited in the wild by a suspected China-nexus threat actor, affecting Ivanti Connect Secure, Pulse Connect…

Microsoft Issues Urgent Patch to Resolve Office Update Crashes

Microsoft has issued an emergency patch addressing widespread crashes in Office 2016 applications following a problematic update.  The fix, identified as KB5002623 and released on April 10, 2025, resolves critical issues that caused Microsoft Word, Excel, and Outlook to stop…

iOS 18.4 Update Introduces Critical Bug in Dynamic Symbol Resolution

Apple’s latest iOS 18.4 update has introduced a significant bug affecting dynamic symbol resolution on devices supporting Pointer Authentication Code (PAC). This issue, first observed by Fabien Perigaud, a noted reverse-engineering expert, has implications for applications relying on dynamic library…

TP-Link IoT Smart Hub Vulnerability Exposes Wi-Fi Credentials

A critical vulnerability in the TP-Link Tapo H200 V1 IoT Smart Hub that could expose users’ Wi-Fi credentials to attackers.  The flaw, assigned CVE-2025-3442, stems from the device’s firmware storing sensitive information in plain text, making it accessible to attackers…

Russian APT Hackers Using Device Code Phishing Technique to Bypass MFA

A sophisticated cyber campaign orchestrated by the Russian state-backed group Storm-2372 has emerged, exploiting device code phishing tactics to circumvent Multi-Factor Authentication (MFA) security measures. This targeted approach represents a significant escalation in threat actors’ capabilities to defeat advanced security…