Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors. The attack campaign, dubbed DEEP#DRIVE by Securonix, has been attributed to a hacking group known as Kimsuky, which is also tracked under the names APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet
Published on: February 13, 2025 | Source:A toolset associated with China-linked espionage intrusions was employed in a ransomware attack, likely by a single individual. The post Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job appeared first on SecurityWeek.
Published on: February 13, 2025 | Source:Ever felt like your team is stuck in a constant battle? Developers rush to add new features, while security folks worry about vulnerabilities. What if you could bring both sides together without sacrificing one for the other? We invite you to our upcoming webinar, "Opening the Fast Lane for Secure Deployments." This isnโt another tech talk full of buzzwordsโit's a down-to-earth session that
Published on: February 13, 2025 | Source:In the span of just weeks, the US government has experienced what may be the most consequential security breach in its historyโnot through a sophisticated cyberattack or an act of foreign espionage, but through official orders by a billionaire with a poorly defined government role. And the implications for national security are profound. First, it was reported that people associated with the newly created Department of...
Published on: February 13, 2025 | Source:An RA World ransomware attack in November 2024 targeting an unnamed Asian software and services company involved the use of a malicious tool exclusively used by China-based cyber espionage groups, raising the possibility that the threat actor may be moonlighting as a ransomware player in an individual capacity. "During the attack in late 2024, the attacker deployed a distinct toolset that had
Published on: February 13, 2025 | Source:Palo Alto Networks has published 10 new security advisories, including one for a high-severity firewall authentication bypass vulnerability. The post Palo Alto Networks Patches Potentially Serious Firewall Vulnerability appeared first on SecurityWeek.
Published on: February 13, 2025 | Source:Threat actors are increasingly exploiting two old vulnerabilities in ThinkPHP and OwnCloud in their attacks. The post Exploitation of Old ThinkPHP, OwnCloud Vulnerabilities Surges appeared first on SecurityWeek.
Published on: February 13, 2025 | Source:AI is everywhere now, transforming how businesses operate and how users engage with apps, devices, and services. A lot of applications now have some Artificial Intelligence inside, whether supporting a chat interface, intelligently analyzing data or matching user preferences. No question AI benefits users, but it also brings new security challenges, especially Identity-related security
Published on: February 13, 2025 | Source:The virtual treasure chests and other casino-like rewards inside your childrenโs games may pose risks you shouldnโt play down
Published on: February 13, 2025 | Source:Palo Alto Networks has addressed a high-severity security flaw in its PAN-OS software that could result in an authentication bypass. The vulnerability, tracked as CVE-2025-0108, carries a CVSS score of 7.8 out of 10.0. The score, however, drops to 5.1 if access to the management interface is restricted to a jump box. "An authentication bypass in the Palo Alto Networks PAN-OS software enables an
Published on: February 13, 2025 | Source:Threat hunters have shed light on a new campaign targeting the foreign ministry of an unnamed South American nation with bespoke malware capable of granting remote access to infected hosts. The activity, detected in November 2024, has been attributed by Elastic Security Labs to a threat cluster it tracks as REF7707. Some of the other targets include a telecommunications entity and a university,
Published on: February 13, 2025 | Source:Japan is on a mission to catch up to the US standard of national cyber preparedness, and its new legislation is a measure intended to stop escalating Chinese cyber-espionage efforts, experts say.
Published on: February 13, 2025 | Source:Sean Cairncross will be one of the primary advisers to the administration on national cybersecurity matters.
Published on: February 12, 2025 | Source:The open technology, which tackles disinformation, has gained steam in the past year, surpassing 500 corporate members and continuing to evolve.
Published on: February 12, 2025 | Source:The Italian government denied it hacked seven cellphones with military-grade surveillance technology from Paragon Solutions. The post Italian Government Denies It spied on Journalists and Migrant Activists Using Paragon Spyware appeared first on SecurityWeek.
Published on: February 12, 2025 | Source:US, UK, and Australian law enforcement have targeted a company called Zservers (and two of its administrators) for providing bulletproof hosting services to the infamous ransomware gang.
Published on: February 12, 2025 | Source:QuSecure is pitching a software-based security architecture that overlays onto current networks to help businesses with PQC migration. The post QuSecure Banks $28M Series A for Post-Quantum Cryptography Tech appeared first on SecurityWeek.
Published on: February 12, 2025 | Source:A subgroup of Seashell Blizzard exploited public vulnerabilities in internet-facing systems, Microsoft researchers said. The post Russian state threat group shifts focus to US, UK targets appeared first on CyberScoop.
Published on: February 12, 2025 | Source:A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm has been attributed to a multi-year initial access operation dubbed BadPilot that stretched across the globe. "This subgroup has conducted globally diverse compromises of Internet-facing infrastructure to enable Seashell Blizzard to persist on high-value targets and support tailored network operations," the
Published on: February 12, 2025 | Source:A subgroup of the Russia-linked Seashell Blizzard is tasked with broad initial access operations to sustain long-term persistence. The post Russian Seashell Blizzard Hackers Have Access to Critical Infrastructure: Microsoft appeared first on SecurityWeek.
Published on: February 12, 2025 | Source:Sandworm (aka Seashell Blizzard) has an initial access wing called "BadPilot" that uses standard intrusion tactics to spread Russia's tendrils around the world.
Published on: February 12, 2025 | Source:When it comes to keeping patient information safe, people empowerment is just as necessary as deploying new technologies.
Published on: February 12, 2025 | Source:Cybersecurity researchers have discovered a bypass for a now-patched security vulnerability in the NVIDIA Container Toolkit that could be exploited to break out of a container's isolation protections and gain complete access to the underlying host. The new vulnerability is being tracked as CVE-2025-23359 (CVSS score: 8.3). It affects the following versions - NVIDIA Container Toolkit (All
Published on: February 12, 2025 | Source:Security and compliance automation firm Drata has acquired trust center platform SafeBase in a quarter billion dollar deal. The post Drata to Acquire SafeBase in $250 Million Deal appeared first on SecurityWeek.
Published on: February 12, 2025 | Source:Ivanti and Fortinet on Tuesday released patches for multiple critical- and high-severity vulnerabilities in their products. The post Ivanti, Fortinet Patch Remote Code Execution Vulnerabilities appeared first on SecurityWeek.
Published on: February 12, 2025 | Source:A new GAO report assesses that the Coast Guard needs to improve Maritime Transportation System (MTS) cybersecurity. The post GAO Tells Coast Guard to Improve Cybersecurity of Maritime Transportation System appeared first on SecurityWeek.
Published on: February 12, 2025 | Source:Hereโs a supply-chain attack just waiting to happen. A group of researchers searched for, and then registered, abandoned Amazon S3 buckets for about $400. These buckets contained software libraries that are still used. Presumably the projects donโt realize that they have been abandoned, and still ping them for patches, updates, and etc. The TL;DR is that this time, we ended up discovering ~150 Amazon S3 buckets that...
Published on: February 12, 2025 | Source:A fresh post on the Kraken ransomware groupโs leak website refers to data stolen in a 2022 cyberattack, Cisco says. The post Cisco Says Ransomware Groupโs Leak Related to Old Hack appeared first on SecurityWeek.
Published on: February 12, 2025 | Source:CISOs are finding themselves more involved in AI teams, often leading the cross-functional effort and AI strategy. But there arenโt many resources to guide them on what their role should look like or what they should bring to these meetings. Weโve pulled together a framework for security leaders to help push AI teams and committees further in their AI adoptionโproviding them with the
Published on: February 12, 2025 | Source:The North Korea-linked threat actor known as Kimsuky has been observed using a new tactic that involves deceiving targets into running PowerShell as an administrator and then instructing them to paste and run malicious code provided by them. "To execute this tactic, the threat actor masquerades as a South Korean government official and over time builds rapport with a target before sending a
Published on: February 12, 2025 | Source:Ever wondered what it's like to hack for a living โ legally? Learn about the art and thrill of ethical hacking and how white-hat hackers help organizations tighten up their security.
Published on: February 12, 2025 | Source:Industrial giants Schneider Electric and Siemens have released February 2025 Patch Tuesday ICS security advisories. The post ICS Patch Tuesday: Vulnerabilities Addressed by Schneider Electric, Siemens appeared first on SecurityWeek.
Published on: February 12, 2025 | Source:Microsoft on Tuesday released fixes for 63 security flaws impacting its software products, including two vulnerabilities that it said has come under active exploitation in the wild. Of the 63 vulnerabilities, three are rated Critical, 57 are rated Important, one is rated Moderate, and two are rated Low in severity. This is aside from the 23 flaws Microsoft addressed in its Chromium-based Edge
Published on: February 12, 2025 | Source:Ivanti has released security updates to address multiple security flaws impacting Connect Secure (ICS), Policy Secure (IPS), and Cloud Services Application (CSA) that could be exploited to achieve arbitrary code execution. The list of vulnerabilities is below - CVE-2024-38657 (CVSS score: 9.1) - External control of a file name in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy
Published on: February 12, 2025 | Source:More than half of attacks on Indian businesses come from outside the country, while 45% of those targeting consumers come from Cambodia, Myanmar, and Laos.
Published on: February 12, 2025 | Source: