The fast transformation and evolution of artificial intelligence (AI) significantly changed the general norm and operational process of industries. This drastically transformed different sectors of industries related to finance, healthcare… The post AI-Powered Cyber Attacks and Data Privacy in The…
Tag: EN
Cisco Smart Licensing Utility Vulnerabilities Under Hacker Exploitation
Recent reports indicate that hackers are actively trying to exploit two critical vulnerabilities in the Cisco Smart Licensing Utility. These vulnerabilities, identified as CVE-2024-20439 and CVE-2024-20440, were disclosed by Cisco in September. The first vulnerability involves a static credential issue,…
Massive “DollyWay” Malware Attack Compromises 20,000+ WordPress Sites Worldwide
A significant malware operation, dubbed “DollyWay,” has been uncovered by GoDaddy Security researchers, revealing a sophisticated campaign that has compromised over 20,000 WordPress sites globally. This operation, which began in 2016, leverages a distributed network of compromised WordPress sites as…
Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches
Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the ransomware landscape: the Babuk2 group is issuing extortion demands based on false claims. Despite announcing numerous attacks, there is no third-party confirmation or evidence from victims…
Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Increases by 130%
Recent cybersecurity data reveals an alarming 130% surge in zero-hour phishing attacks targeting previously unknown browser vulnerabilities. These sophisticated attacks leverage unpatched security flaws in popular browsers to deploy malicious payloads before security teams can implement countermeasures, leaving users and…
Paragon Spyware Exploited WhatsApp Zero-day Vulnerability to Attack High-value Targets
Researchers have uncovered extensive evidence linking Israeli firm Paragon Solutions to a sophisticated spyware operation that exploited a zero-day vulnerability in WhatsApp to target journalists and civil society members. Following the investigation, WhatsApp notified approximately 90 potential victims and confirmed…
Babuk2 Ransomware Issuing Fake Extortion Demands With Data from Old Breaches
The Babuk2 ransomware group has been caught issuing extortion demands based on false claims and recycled data from previous breaches. This revelation comes from recent investigations conducted by the Halcyon RISE Team, shedding light on a concerning trend in the…
Multiple Dell Secure Connect Gateway Flaws Allows System Compromise
Dell Technologies has issued a critical security advisory warning customers about multiple vulnerabilities in its Secure Connect Gateway (SCG) product that could potentially lead to system compromise. The vulnerabilities affect versions prior to 5.28.00.14 and require immediate attention from system…
North Korean IT Workers Exploiting GitHub to Attack Organizations Worldwide
A sophisticated network of suspected North Korean IT workers has been discovered leveraging GitHub to create false identities and secure remote employment opportunities in Japan and the United States. These operatives pose as Vietnamese, Japanese, and Singaporean professionals, primarily targeting…
Veeam Patches Critical Vulnerability in Backup & Replication
Veeam has released patches for a critical-severity remote code execution vulnerability in Backup & Replication. The post Veeam Patches Critical Vulnerability in Backup & Replication appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Agentic AI Enhances Enterprise Automation: Without Adaptive Security, its Autonomy Risks Expanding Attack Surfaces
The rise of agentic AI is accelerating. But as enterprises embrace AI autonomy, a critical question looms – how well is security keeping up? The post Agentic AI Enhances Enterprise Automation: Without Adaptive Security, its Autonomy Risks Expanding Attack Surfaces…
IBM Warns of AIX Vulnerabilities Allowing Arbitrary Command Execution
IBM has recently issued a critical security warning regarding vulnerabilities in its AIX operating system that could allow remote attackers to execute arbitrary commands. The vulnerabilities, identified as CVE-2024-56346 and CVE-2024-56347, were discovered in the IBM AIX nimesis NIM master…
Record-breaking 12,900 km ultra-secure quantum satellite link
Scientists have successfully established the world’s longest intercontinental ultra-secure quantum satellite link, spanning 12,900 km. Using the Chinese quantum microsatellite Jinan-1, launched into low Earth orbit, this milestone marks the first-ever quantum satellite communication link established in the Southern Hemisphere.…
500,000 Impacted by Pennsylvania Teachers Union Data Breach
Pennsylvania State Education Association says the personal information of over 500,000 individuals was stolen in a data breach. The post 500,000 Impacted by Pennsylvania Teachers Union Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Shadows Within Shadows: How AI is Challenging IT
S04 EP 04: Island’s Chief Customer Officer, Bradon Rogers, chats shadow IT and how AI is compounding the issue. The post Shadows Within Shadows: How AI is Challenging IT appeared first on Security Boulevard. This article has been indexed from…
CaaS: The Key to More Affordable Cyber Insurance
Compliance as a Service (CaaS) strengthens a company’s posture and defensibility, making it more attractive to insurers. The post CaaS: The Key to More Affordable Cyber Insurance appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
China, Russia, North Korea Hackers Exploit Windows Security Flaw
Amost a dozen state-sponsored threat groups from Russia, China, and North Korea have been exploiting a security flaw in WIndows in attacks on governments and critical infrastructure that date back to 2017. According to Trend Micro’s VDI unit, Microsoft has…
Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120)
Veeam has released fixes for a critical remote code execution vulnerability (CVE-2025-23120) affecting its enterprise Veeam Backup & Replication solution, and is urging customers to quickly upgrade to a fixed version. There is currently no indication that the vulnerability is…
How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model
Cybersecurity isn’t just another checkbox on your business agenda. It’s a fundamental pillar of survival. As organizations increasingly migrate their operations to the cloud, understanding how to protect your digital assets becomes crucial. The shared responsibility model, exemplified through Microsoft…
Hackers Target Cisco Smart Licensing Utility Vulnerabilities
SANS is seeing attempts to exploit two critical Cisco Smart Licensing Utility vulnerabilities tracked as CVE-2024-20439 and CVE-2024-20440. The post Hackers Target Cisco Smart Licensing Utility Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…