Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Building a healthcare cybersecurity strategy that works In this Help Net Security interview, Wayman Cummings, CISO at Ochsner Health, talks about building a healthcare cybersecurity…
Tag: EN
Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide
Europol on Friday announced the disruption of a sophisticated cybercrime-as-a-service (CaaS) platform that operated a SIM farm and enabled its customers to carry out a broad spectrum of crimes ranging from phishing to investment fraud. The coordinated law enforcement effort,…
Windows 11 24H2/25H2 Update Blocks Mouse and Keyboard in Recovery Mode
Microsoft’s latest security update has rendered USB keyboards and mice inoperable within the Windows Recovery Environment (WinRE). Released on October 14, 2025, as KB5066835 for OS Build 26100.6899, the patch affects Windows 11 versions 24H2 and 25H2, as well as…
Volkswagen Allegedly Hit by Ransomware Attack as 8Base Claims Sensitive Data Theft
Volkswagen Group has issued a statement addressing claims by the ransomware group 8Base, which alleges it has stolen and leaked sensitive data from the automaker. The German carmaker maintains that its core IT infrastructure remains unaffected; however, the company’s vague…
Is Your Secrets Management Scalable?
What Are Non-Human Identities, and Why Do They Matter in Cybersecurity? Have you ever stopped to consider the role of machine identities in your organization’s security framework? The focus often drifts toward human-centric threats. However, the rapidly increasing number of…
Ensuring a Safe Digital Landscape with NHIDR
What is the Role of Non-Human Identities in Securing a Safe Digital Landscape? Where organizations increasingly migrate to cloud environments, the management of Non-Human Identities (NHIs) becomes pivotal in securing a safe digital. But what exactly are NHIs, and how…
How Secure Are Your Non-Human Identities?
Are Non-Human Identities the Weakest Link in Your Cybersecurity Chain? Safeguarding Non-Human Identities (NHIs) is crucial for any organization striving to maintain robust security protocols. These machine identities, composed of encrypted credentials such as passwords, tokens, or keys, serve as…
Spyware maker NSO Group blocked from WhatsApp
A federal judge has granted Meta-owned WhatsApp’s request for a permanent injunction blocking Israeli cyberintelligence company NSO Group from targeting the messaging app’s users. At the same time, the judge dramatically reduced the fine that NSO Group must pay to…
NDSS 2025 – Workshop On The Security Of Space And Satellite Systems (SpaceSec) 25, Keynote Address: NASA’s Core Flight System (cFS) 2.0 And Beyond
Author, Creator & Presenter: Dr. Ashok Prajapati (NASA) Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’ YouTube channel. Permalink The post…
Winos 4.0 hackers expand to Japan and Malaysia with new malware
Winos 4.0 hackers expand from China, Taiwan to Japan, Malaysia using fake Finance Ministry PDFs to spread HoldingHands RAT malware. Threat actors behind Winos 4.0 (ValleyRAT) have expanded their attacks from China and Taiwan to Japan and Malaysia, using PDFs…
American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign
Envoy Air, a wholly owned subsidiary of American Airlines, has confirmed it fell victim to a hacking campaign exploiting vulnerabilities in Oracle’s E-Business Suite (EBS). The breach, first highlighted by the notorious Clop ransomware group, underscores the growing risks facing…
Microsoft Ends Support for Windows 10: Millions of PCs Now at Security Risk
Microsoft has officially stopped supporting Windows 10, marking a major change for millions of users worldwide. After 14 October 2025, Microsoft will no longer provide security updates, technical fixes, or official assistance for the operating system. While computers running…
Authorities Shut Down Cybercrime-as-a-Service, Seize 40,000 SIM Cards
Law enforcement authorities across Europe have dismantled a sophisticated cybercrime-as-a-service operation that enabled criminals to commit widespread fraud and other serious offenses across the continent. The coordinated action, codenamed ‘SIMCARTEL’, resulted in seven arrests, the seizure of over 40,000 active…
From Airport chaos to cyber intrigue: Everest Gang takes credit for Collins Aerospace breach
Everest claims Collins Aerospace hack hitting EU airports, but its leak site vanishes soon after, sparking takedown speculation. Do you remember the Collins Aerospace supply chain attack that disrupted operations at several major European airports, including Heathrow in London, Brussels,…
Stop Reacting, Start Strategizing: A New Era for Cybersecurity and DR
People making cybersecurity and disaster recovery (DR) decisions today often operate as if they’re in a vacuum. Their company has a need – perhaps they have to create a copy… The post Stop Reacting, Start Strategizing: A New Era for…
New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft
Threat actors are leveraging Microsoft Azure Blob Storage to craft highly convincing phishing sites that mimic legitimate Office 365 login portals, putting Microsoft 365 users at severe risk of credential theft. This method exploits trusted Microsoft infrastructure, making the attacks…
Global Ransomware Groups Hit Record High as Smaller Threat Actors Emerge
The number of active ransomware groups has reached an unprecedented high, marking a new phase in the global cyber threat landscape. According to GuidePoint Security’s latest Ransomware & Cyber Threat Report, the total number of active groups surged 57%,…
Astaroth Malware Adopts GitHub Infrastructure to Target Crypto Investors
A new attack is now underway involving the notorious Astaroth banking Trojan, a banking Trojan which is used to steal cryptocurrency credentials, and cybersecurity researchers at McAfee have discovered that this Trojan exploited the GitHub platform for distribution. This…
Crypto Vanishes: North Korea’s $2B Heist, Discord Breach Exposes Millions
North Korean hackers have stolen over $2 billion in cryptocurrency in 2025, while a Discord breach exposed sensitive user data, including government IDs of approximately 70,000 individuals. These incidents highlight the growing sophistication of cyber threats targeting both financial…
John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
The investigation into former national security advisor John Bolton's handling of classified material stemmed in part from an admission Bolton made to the FBI in July 2021 that hackers – believed to be from Iran – had breached his private…