A 62-year-old retired bank manager from Pune became the victim of a massive cyber fraud, losing ₹2.22 crore over several months. Scammers posing as government officials tricked the individual into purchasing multiple insurance policies by promising high returns. How…
Tag: EN
Why Securing Online Accounts is Critical in Today’s Cybersecurity Landscape
< p style=”text-align: justify;”>In an era where cybercriminals are increasingly targeting passwords through phishing attacks, data breaches, and other malicious tactics, securing online accounts has never been more important. Relying solely on single-factor authentication, such as a password, is…
International Operation Dismantles Cracked and Nulled Cybercrime Hubs
A global law enforcement operation has taken down infrastructure used by Cracked.io and Nulled.io, which provide cybercriminal tools and services This article has been indexed from www.infosecurity-magazine.com Read the original article: International Operation Dismantles Cracked and Nulled Cybercrime Hubs
Cisco Webex Chat Vulnerabilities Expose Organization Chat Histories to Attackers
A major cybersecurity vulnerability in Cisco Webex Chat (previously known as IMI Chat) has raised alarming concerns after it was revealed that unauthenticated attackers could access the chat histories of organizations using the platform. First identified in July 2024, the…
Authorities Take Down Cracked & Nulled Hacking Forums Used by 10 Million Users
In a law enforcement operation dubbed “Operation Talent,” an international coalition of law enforcement agencies led by Germany’s Bundeskriminalamt (BKA) and Europol has dismantled two of the world’s largest cybercrime forums: Cracked.io and Nulled.to. These platforms, which collectively hosted over…
D-Link Routers Vulnerability Let Attackers Gain Full Router Control Remotely
A critical unauthenticated Remote Code Execution (RCE) vulnerability has been affecting DSL-3788 routers, allowing attackers to acquire complete control over the router remotely. The flaw has been detected in firmware versions v1.01R1B036_EU_EN and below. This vulnerability was reported by Max…
Microsoft to Boost M365 Bounty Program With New Products & Rewards Up to $27,000
A significant extension of Microsoft’s Microsoft 365 (M365) Bounty Program has been announced. The program now includes new Viva products under its scope for identifying vulnerabilities, with rewards reaching up to $27,000 for critical submissions. This update underscores Microsoft’s commitment…
Another banner year for ransomware gangs despite takedowns by the cops
And it doesn’t take a crystal ball to predict the future If the nonstop flood of ransomware attacks doesn’t already make every day feel like Groundhog Day, then a look back at 2024 – and predictions for 2025 – definitely…
DeepSeek Security Failure: Cyber Security Today, Friday, January 31, 2025
Cybersecurity Today: DeepSeek AI’s Data Breach, New API Threats, & Operation Talent In this episode of ‘Cybersecurity Today,’ host Jim Love delves into the recent security lapse by DeepSeek AI, highlighting the exposure of sensitive data through an open ClickHouse…
Is data minimization the new data ethics in subscription management?
Data could be your biggest asset but it could also be your weakest link. The more you collect, the more there is to be guarded, the more to be held accountable for, the more to sift through to find something…
VMware Aria Operations Vulnerabilities Allow Attackers to Perform Admin-Level Actions
VMware has released a critical security advisory, VMSA-2025-0003, addressing multiple vulnerabilities in VMware Aria Operations for Logs, VMware Aria Operations, and VMware Cloud Foundation. These vulnerabilities—tracked as CVE-2025-22218, CVE-2025-22219, CVE-2025-22220, CVE-2025-22221, and CVE-2025-22222—can be exploited to perform admin-level actions, putting affected systems at serious risk. Rated…
Blood Center cyberattack, DeepSeek data leak, CISA’s future unclear
New York Blood Center suffers ransomware attack DeepSeek’s exposed database leaks sensitive data CISA’s future unclear under new administration Huge thanks to our sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the…
Jailbreaking DeepSeek: Researchers Reveal Three New Methods to Override LLM Safety
Researchers at Palo Alto Networks’ Unit 42 have revealed a troubling surge in large language model (LLM) security risks, citing three newly identified jailbreak techniques “Bad Likert Judge,” “Crescendo,” and “Deceptive Delight” capable of bypassing safety protocols in DeepSeek’s open-source…
Malware Discovered in Healthcare Patient Monitors, Traced to Chinese IP Address
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory regarding multiple vulnerabilities identified in Contec Health’s CMS8000 Patient Monitor. These flaws pose significant security risks, potentially allowing remote attacks, privacy breaches, and unauthorized data access. The vulnerabilities,…
VMware Aria Operations Vulnerabilities Let Attackers Perform Admin Operations
Broadcom has addressed multiple vulnerabilities in its VMware Aria Operations for Logs and VMware Aria Operations products. These vulnerabilities, identified as CVE-2025-22218, CVE-2025-22219, CVE-2025-22220, CVE-2025-22221, and CVE-2025-22222, pose significant risks, including unauthorized access to sensitive data and privilege escalation. The…
Windows Vulnerability in COM Objects Trigger RCE To Control The Systems Remotely
James Forshaw of Google Project Zero has shed light on a significant security vulnerability in Windows related to accessing trapped COM objects through the IDispatch interface. This research highlights an intriguing bug class that exploits cross-process communication features in object-oriented…
5 cybersecurity practices for custom software development
Whether you are going to build a custom CRM system, custom ERP tool, or any other bespoke solution, you need to ensure that this software is properly secured. Otherwise, it can be exposed to a wide range of cyber threats,…
Broadcom Patches VMware Aria Flaws – Exploits May Lead to Credential Theft
Broadcom has released security updates to patch five security flaws impacting VMware Aria Operations and Aria Operations for Logs, warning customers that attackers could exploit them to gain elevated access or obtain sensitive information. The list of identified flaws, which…
New Jailbreak Techniques Expose DeepSeek LLM Vulnerabilities, Enabling Malicious Exploits
Recent revelations have exposed critical vulnerabilities in DeepSeek’s large language models (LLMs), particularly DeepSeek-R1, through advanced jailbreaking techniques. These exploits, including “Bad Likert Judge,” “Crescendo,” and “Deceptive Delight,” have demonstrated the ease with which malicious actors can bypass safety measures…
CyberArk Identity Bridge manages user access and authentication for Linux environments
CyberArk announced Identity Bridge, an endpoint identity security capability that will support identity and privilege sprawl reduction on Linux machines. Identity Bridge will enable organizations to authenticate to Linux systems using centralized accounts, minimizing dependence on outdated authentication methods. This…