Category: CyberSecurityNews

3 Best Ways to Speed Up Alert Triage for SOC Team: Use Cases
07
Feb
2025

3 Best Ways to Speed Up Alert Triage for SOC Team: Use Cases

Security analysts know the struggle: endless alerts, repetitive tasks, and not enough hours in the day. The volume of potential…

7-Zip Vulnerability Actively Exploited in The Wild in Attacks
07
Feb
2025

7-Zip Vulnerability Actively Exploited in The Wild in Attacks

A critical vulnerability in the popular file archiving tool 7-Zip (CVE-2025-0411) has been actively exploited in the wild, primarily targeting…

CISA Added Microsoft Outlook Vulnerability That is Actively Exploited in Attacks
07
Feb
2025

CISA Added Microsoft Outlook Vulnerability That is Actively Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning to federal agencies regarding active exploitation of…

Ghidra 11.3 Released - NSA's Powerful Reverse Engineering Tool
07
Feb
2025

Ghidra 11.3 Released – NSA’s Powerful Reverse Engineering Tool

The National Security Agency (NSA) has launched Ghidra 11.3, the latest version of its open-source software reverse engineering (SRE) framework….

Critical Cisco ISE Vulnerabilities Allow Arbitrary Command Execution Remotely
06
Feb
2025

Critical Cisco ISE Vulnerabilities Allow Arbitrary Command Execution Remotely

Cisco has disclosed two critical vulnerabilities in its Identity Services Engine (ISE) software that could allow authenticated, remote attackers to…

Sophos Acquires Secureworks for $859 Million
06
Feb
2025

Sophos Acquires Secureworks for $859 Million

Sophos, a global leader in cybersecurity solutions, has finalized its acquisition of SecureWorks, a prominent managed security services provider, in…

242,000 Times Downloaded Malicious Apps from Android and iOS Stealing Crypto Recovery Keys
06
Feb
2025

242,000 Times Downloaded Malicious Apps from Android and iOS Stealing Crypto Recovery Keys

In a shocking revelation, researchers have uncovered a widespread malware campaign targeting both Android and iOS users. Dubbed “SparkCat,” this…

BADBOX Botnet Infected Over 190,000 Android Devices Including LED TVs
06
Feb
2025

BADBOX Botnet Infected Over 190,000 Android Devices Including LED TVs

A newly discovered botnet named BADBOX has been found to have infected over 190,000 Android devices, including high-end models like…

Apple's macOS Kernel Vulnerability Let Attackers Escalate Privileges
05
Feb
2025

Apple’s macOS Kernel Vulnerability Let Attackers Escalate Privileges

A critical vulnerability in Apple’s macOS kernel (XNU), tracked as CVE-2025-24118, has been disclosed, potentially allowing attackers to escalate privileges,…

Michael Trites Joins Aembit as Senior Vice President of Global Sales
05
Feb
2025

Michael Trites Joins Aembit as Senior Vice President of Global Sales

Aembit, the non-human identity and access management (IAM) company, today announced that Michael Trites has joined the company as senior…

Hackers Using AI Agents To Validate Stolen Credit Cards
05
Feb
2025

Hackers Using AI Agents To Validate Stolen Credit Cards

Hackers have begun leveraging AI agents to validate stolen credit cards, marking a new era in the sophistication of financial…

CISA Adds Actively Exploited Linux Kernel Vulnerability to Known Exploited Vuln Catalog
05
Feb
2025

CISA Adds Actively Exploited Linux Kernel Vulnerability to Known Exploited Vuln Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Linux kernel vulnerability, CVE-2024-53104, to its Known Exploited Vulnerabilities…