Tag: securityweek

Russian Firm Offers $4 Million for Telegram Exploits

A Russian exploit acquisition firm says it is willing to pay up to $4 million for full-chain exploits targeting the popular messaging service Telegram. The firm, Operation Zero, is known for selling zero-day exploits exclusively to Russian government and private…

Webinar Tomorrow: Which Security Testing Approach is Right for You?

Understand whether BAS, Automated Penetration Testing, or the combined approach of Adversarial Exposure Validation (AEV) aligns best with your organization’s unique security needs. The post Webinar Tomorrow: Which Security Testing Approach is Right for You? appeared first on SecurityWeek. This…

US Lifts Sanctions Against Crypto Mixer Tornado Cash

The US Department of the Treasury has removed sanctions against the fully decentralized cryptocurrency mixer service Tornado Cash. The post US Lifts Sanctions Against Crypto Mixer Tornado Cash appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Medusa Ransomware Uses Malicious Driver to Disable Security Tools

The Medusa ransomware relies on a malicious Windows driver to disable the security tools running on the infected systems. The post Medusa Ransomware Uses Malicious Driver to Disable Security Tools appeared first on SecurityWeek. This article has been indexed from…

Albabat Ransomware Expands Targets, Abuses GitHub

New versions of the Albabat ransomware target Windows, Linux, and macOS, and retrieve configuration files from GitHub. The post Albabat Ransomware Expands Targets, Abuses GitHub appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Ransomware Group Claims Attack on Virginia Attorney General’s Office

The Cloak ransomware group has claimed responsibility for a February cyberattack on Virginia Attorney General’s Office. The post Ransomware Group Claims Attack on Virginia Attorney General’s Office appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Industry Reactions to Google Buying Wiz: Feedback Friday

Industry professionals comment on Google acquiring cloud security giant Wiz for $32 billion in cash. The post Industry Reactions to Google Buying Wiz: Feedback Friday appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Ransomware Group Claims Attacks on Ascom, Jaguar Land Rover

The Hellcat ransomware group claims to have stolen tens of gigabytes of data from Ascom and Jaguar Land Rover. The post Ransomware Group Claims Attacks on Ascom, Jaguar Land Rover appeared first on SecurityWeek. This article has been indexed from…

Dataminr Raises $85 Million for AI-Powered Information Platform

Real-time event and risk detection firm Dataminr has raised $85 million from NightDragon and HSBC to accelerate AI development. The post Dataminr Raises $85 Million for AI-Powered Information Platform appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

CISA Warns of Exploited Nakivo Vulnerability

CISA has added an absolute path traversal bug in Nakivo Backup and Replication to its Known Exploited Vulnerabilities list. The post CISA Warns of Exploited Nakivo Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Veeam Patches Critical Vulnerability in Backup & Replication

Veeam has released patches for a critical-severity remote code execution vulnerability in Backup & Replication. The post Veeam Patches Critical Vulnerability in Backup & Replication appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

500,000 Impacted by Pennsylvania Teachers Union Data Breach

Pennsylvania State Education Association says the personal information of over 500,000 individuals was stolen in a data breach. The post 500,000 Impacted by Pennsylvania Teachers Union Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Hackers Target Cisco Smart Licensing Utility Vulnerabilities

SANS is seeing attempts to exploit two critical Cisco Smart Licensing Utility vulnerabilities tracked as CVE-2024-20439 and CVE-2024-20440. The post Hackers Target Cisco Smart Licensing Utility Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Paragon Spyware Attacks Exploited WhatsApp Zero-Day

Attacks involving Paragon’s Graphite spyware involved a WhatsApp zero-day that could be exploited without any user interaction. The post Paragon Spyware Attacks Exploited WhatsApp Zero-Day  appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Chinese Hacking Group MirrorFace Targeting Europe

Chinese hacking group MirrorFace has targeted a Central European diplomatic institute with the Anel backdoor and AsyncRAT. The post Chinese Hacking Group MirrorFace Targeting Europe appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Scareware Combined With Phishing in Attacks Targeting macOS Users

A long-running campaign phishing for credentials through scareware recently switched to targeting macOS users. The post Scareware Combined With Phishing in Attacks Targeting macOS Users appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Microsoft Warns of New StilachiRAT Malware

Microsoft has shared details on StilachiRAT, an evasive and persistent piece of malware that facilitates sensitive data theft. The post Microsoft Warns of New StilachiRAT Malware appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

HP Launches Printers with Quantum Resilient Cryptography

Printers can sit in the corner for ten years or more, while quantum decryption is thought by many to be less than 10 years away. The post HP Launches Printers with Quantum Resilient Cryptography  appeared first on SecurityWeek. This article…

AI Is Turbocharging Organized Crime, EU Police Agency Warns

AI and other technologies “are a catalyst for crime, and drive criminal operations’ efficiency by amplifying their speed, reach, and sophistication,” the report said. The post AI Is Turbocharging Organized Crime, EU Police Agency Warns appeared first on SecurityWeek. This…

Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover

A critical vulnerability affecting baseboard management controller (BMC) firmware made by AMI could expose many devices to remote attacks. The post Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover  appeared first on SecurityWeek. This article has been indexed from…

New Cloudflare Service Provides Real-Time Threat Intelligence

Cloudflare launches Cloudforce Threat Events Feed, a service designed to provide security teams with real-time threat intelligence. The post New Cloudflare Service Provides Real-Time Threat Intelligence appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

ChatGPT Vulnerability Exploited Against US Government Organizations

A year-old vulnerability in ChatGPT is being exploited against financial entities and US government organizations. The post ChatGPT Vulnerability Exploited Against US Government Organizations appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: ChatGPT…

NIST Announces HQC as Fifth Standardized Post Quantum Algorithm

First choices for both KEMs and DSAs are already standardized, and organizations should not wait for the backups to be available before migrating to PQC.  The post NIST Announces HQC as Fifth Standardized Post Quantum Algorithm appeared first on SecurityWeek.…

8,000 New WordPress Vulnerabilities Reported in 2024

Nearly 8,000 new vulnerabilities affecting the WordPress ecosystem were reported last year, nearly all in plugins and themes. The post 8,000 New WordPress Vulnerabilities Reported in 2024 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Microsoft 365 Targeted in New Phishing, Account Takeover Attacks

Threat actors are abusing Microsoft 365 infrastructure in a BEC campaign, and target its users in two brand impersonation campaigns. The post Microsoft 365 Targeted in New Phishing, Account Takeover Attacks appeared first on SecurityWeek. This article has been indexed…

100 Car Dealerships Hit by Supply Chain Attack

The websites of over 100 auto dealerships were found serving malicious ClickFix code in a supply chain compromise. The post 100 Car Dealerships Hit by Supply Chain Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services

Vulnerabilities in Nvidia Riva could allow hackers to abuse speech and translation AI services that are typically expensive.  The post Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Popular GitHub Action Targeted in Supply Chain Attack

The tj-actions/changed-files GitHub Action, which is used in 23,000 repositories, has been targeted in a supply chain attack. The post Popular GitHub Action Targeted in Supply Chain Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

ClickFix Widely Adopted by Cybercriminals, APT Groups

The ClickFix technique has been employed by cybercrime and APT groups for information stealer and other malware deployment. The post ClickFix Widely Adopted by Cybercriminals, APT Groups appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

RSA Conference Playbook: Smart Strategies from Seasoned Attendees

Your guide on how to get through the conference with your sanity, energy, and key performance indicators (KPIs) intact. The post RSA Conference Playbook: Smart Strategies from Seasoned Attendees appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Unpatched Edimax Camera Flaw Exploited Since at Least May 2024

A recently disclosed Edimax zero-day vulnerability has been exploited in the wild by Mirai botnets for nearly a year. The post Unpatched Edimax Camera Flaw Exploited Since at Least May 2024 appeared first on SecurityWeek. This article has been indexed…

FreeType Zero-Day Being Exploited in the Wild

Meta’s Facebook security team warns of live exploitation of a zero-day vulnerability in the open-source FreeType library.  The post FreeType Zero-Day Being Exploited in the Wild appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Cisco Patches 10 Vulnerabilities in IOS XR

Cisco has released patches for 10 vulnerabilities in IOS XR, including five denial-of-service (DoS) bugs. The post Cisco Patches 10 Vulnerabilities in IOS XR appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Cisco…

Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign

Threat actors are likely targeting Grafana path traversal bugs for reconnaissance in a SSRF exploitation campaign targeting popular platforms. The post Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign appeared first on SecurityWeek. This article has been indexed from…

Microsoft Warns of Hospitality Sector Attacks Involving ClickFix

A cybercrime group named Storm-1865 has targeted hospitality organizations via fake Booking.com emails and the use of social engineering. The post Microsoft Warns of Hospitality Sector Attacks Involving ClickFix appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

DeepSeek’s Malware-Generation Capabilities Put to Test

Researchers have analyzed the ability of the Chinese gen-AI DeepSeek to create malware such as ransomware and keyloggers. The post DeepSeek’s Malware-Generation Capabilities Put to Test appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Security Validation Firm Pentera Banks $60M Series D

Israeli startup in the automated security validation space secures a $60 million round led by Evolution Equity Partners. The post Security Validation Firm Pentera Banks $60M Series D   appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers

China-nexus cyberespionage group caught planting custom backdoors on end-of-life Juniper Networks Junos OS routers. The post Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Mandiant…

A Guide to Security Investments: The Anatomy of a Cyberattack

Organizations must recognize that security is not about the number of tools deployed, it is about ensuring those tools effectively disrupt the attack chain at every stage. The post A Guide to Security Investments: The Anatomy of a Cyberattack appeared…

Zoom Patches 4 High-Severity Vulnerabilities

Zoom has patched five vulnerabilities in its applications, including four high-severity flaws. The post Zoom Patches 4 High-Severity Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Zoom Patches 4 High-Severity Vulnerabilities

PowerSchool Portal Compromised Months Before Massive Data Breach

Hackers used compromised credentials to access PowerSchool’s PowerSource portal months before the December 2024 data breach. The post PowerSchool Portal Compromised Months Before Massive Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Are Threat Groups Belsen and ZeroSevenGroup Related?

Kela admits that its evidence for a connection between Belsen and ZeroSevenGroup is largely circumstantial, primarily based on styles. The post Are Threat Groups Belsen and ZeroSevenGroup Related? appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw

Apple warns that the WebKIt bug “may have been exploited in an extremely sophisticated attack against specific targeted individuals.” The post Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw appeared first on SecurityWeek. This article has been indexed from…

Patch Tuesday: Critical Code-Execution Bugs in Acrobat and Reader

Adobe documents 35 security flaws in a wide range of products, including code-execution issues in the Acrobat and Reader applications. The post Patch Tuesday: Critical Code-Execution Bugs in Acrobat and Reader appeared first on SecurityWeek. This article has been indexed…

New York Sues Insurance Giant Over Data Breaches

The New York Attorney General sued National General and its parent company Allstate over two data breaches. The post New York Sues Insurance Giant Over Data Breaches appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

SAP Patches High-Severity Vulnerabilities in Commerce, NetWeaver

SAP released 21 new security notes and updated three security notes on March 2025 security patch day. The post SAP Patches High-Severity Vulnerabilities in Commerce, NetWeaver appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Hackers Take Credit for X Cyberattack

Information is coming to light on the cyberattack that caused X outages, but it should be taken with a pinch of salt. The post Hackers Take Credit for X Cyberattack appeared first on SecurityWeek. This article has been indexed from…

Trump Coins Used as Lure in Malware Campaign

Binance is being spoofed in an email campaign using free TRUMP Coins as a lure leading to the installation of the ConnectWise RAT. The post Trump Coins Used as Lure in Malware Campaign appeared first on SecurityWeek. This article has…

Cobalt Strike Abuse Dropped 80% in Two Years

Fortra has shared an update on the effects of actions taken to reduce the abuse of Cobalt Strike by threat actors. The post Cobalt Strike Abuse Dropped 80% in Two Years appeared first on SecurityWeek. This article has been indexed…

Developer Convicted for Hacking Former Employer’s Systems

Davis Lu was convicted of sabotaging his employer’s systems through malicious code, and deleting encrypted data. The post Developer Convicted for Hacking Former Employer’s Systems appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Google Paid Out $12 Million via Bug Bounty Programs in 2024

In 2024, Google paid out nearly $12 million in bug bounties through its revamped vulnerability reward programs. The post Google Paid Out $12 Million via Bug Bounty Programs in 2024 appeared first on SecurityWeek. This article has been indexed from…

Mass Exploitation of Critical PHP Vulnerability Begins

GreyNoise warns of mass exploitation of a critical vulnerability in PHP leading to remote code execution on vulnerable servers. The post Mass Exploitation of Critical PHP Vulnerability Begins appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

560,000 People Impacted Across Four Healthcare Data Breaches

Several healthcare organizations in different US states have disclosed data breaches affecting 100,000-200,000 individuals.  The post 560,000 People Impacted Across Four Healthcare Data Breaches appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: 560,000…

US Seize Garantex in Cryptocurrency Money Laundering Bust

Two men linked to Garantex are accused of facilitating multi-billion dollar money laundering and sanctions violations. The post US Seize Garantex in Cryptocurrency Money Laundering Bust appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

18,000 Organizations Impacted by NTT Com Data Breach

NTT Communications Corporation has disclosed a data breach impacting the information of nearly 18,000 customer organizations. The post 18,000 Organizations Impacted by NTT Com Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Medusa Ransomware Attacks Increase

The number of Medusa ransomware attacks observed in the first two months of 2025 doubled compared to the same period last year. The post Medusa Ransomware Attacks Increase appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets

Multiple Mirai-based botnets are exploiting CVE-2025-1316, an Edimax IP camera vulnerability that allows remote command execution. The post Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Armis Acquires Otorio to Expand OT and CPS Security Suite

The transaction is valued in the range of $120 million and gives Armis an on-premises CPS solution The post Armis Acquires Otorio to Expand OT and CPS Security Suite appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Federal Contractor Cybersecurity Bill Passes House

The House of Representatives has passed a bill aimed at requiring federal contractors to have a Vulnerability Disclosure Policy (VDP). The post Federal Contractor Cybersecurity Bill Passes House appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

BadBox Botnet Powered by 1 Million Android Devices Disrupted

A second iteration of the BadBox botnet that affected over one million Android devices has been partially disrupted. The post BadBox Botnet Powered by 1 Million Android Devices Disrupted appeared first on SecurityWeek. This article has been indexed from SecurityWeek…