FrigidStealer Malware Hits macOS Users via Fake Safari Browser Updates
15
May
2025

FrigidStealer Malware Hits macOS Users via Fake Safari Browser Updates

FrigidStealer malware targets macOS users via fake browser updates, stealing passwords, crypto wallets, and notes using DNS-based data theft methods….

Back To Basics For Every Employee
15
May
2025

Back To Basics For Every Employee

More CISOs than ever—80 percent—see human risk, in particular negligent employees, as the most serious vulnerability. Cybercrime is big business. Cybersecurity…

Malicious npm Package
15
May
2025

Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper

May 15, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as…

TransferLoader Malware Enables Attackers to Execute Arbitrary Commands on Infected Systems
15
May
2025

TransferLoader Malware Enables Attackers to Execute Arbitrary Commands on Infected Systems

A formidable new malware loader, dubbed TransferLoader, has emerged as a significant cybersecurity threat, as detailed in a recent report…

Securing the Code: Building a Culture of Credential Protection in Dev Teams
15
May
2025

Building a Culture of Credential Protection in Dev Teams

Credential protection is key to preventing breaches. Secure APIs, rotate secrets and train devs to handle credentials safely and efficiently….

Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
15
May
2025

Samsung patches MagicINFO 9 Server vulnerability exploited by attackers

Companies running Samsung MagicINFO, a platform for managing content on Samsung commercial digital displays, should upgrade to the latest available…

Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers
15
May
2025

Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon,…

Matt Kapko
15
May
2025

Who needs VC funding? How cybercriminals spread their ill-gotten gains to everyday business ventures

Cybercriminals aren’t so different from the rest of us — they live in the real world, and their spending and investment…

Why Cloud Phone Systems are The Future of Business Communication
15
May
2025

Why Cloud Phone Systems are The Future of Business Communication

Over the years, many different technologies have transitioned to Cloud-based solutions, including ERP systems and email management platforms. Phone systems…

PentestPad streamlines security testing workflows
15
May
2025

PentestPad streamlines security testing workflows

PentestPad announced a major rollout of new features to its platform, built to transform how modern security teams deliver penetration…

Pen Testing for Compliance Only? It's Time to Change Your Approach
15
May
2025

Pen Testing for Compliance Only? It’s Time to Change Your Approach

May 15, 2025The Hacker NewsCompliance / Penetration Testing Imagine this: Your organization completed its annual penetration test in January, earning…

Post Office scandal inquiry to publish first findings this summer
15
May
2025

Post Office scandal inquiry to publish first findings this summer

The Post Office scandal public inquiry will publish the first part of its final report this summer, with its findings…