Sophisticated Attack Via Booking Websites Installs LummaStealer Malware
19
Mar
2025

Sophisticated Attack Via Booking Websites Installs LummaStealer Malware

Cybercriminals have launched a new sophisticated attack campaign targeting travelers through fake booking websites. The campaign, discovered in early 2025,…

Hackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web Applications
19
Mar
2025

Hackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web Applications

A recent cybersecurity incident has highlighted the sophisticated methods used by hackers to target web applications, particularly in South Korea….

Cytex AICenturion protects against data exfiltration
19
Mar
2025

Cytex AICenturion protects against data exfiltration

Cytex launched AICenturion, a LLM Firewall with Data Loss Prevention (DLP) capabilities. GenAI’s risks intensify as LLMs prevent enterprises from…

Oracle, Oracle Singapore, Singapore, Oracle Singapore Partnership,
19
Mar
2025

Oracle’s Isolated Cloud To Support Singapore’s Defense

Singapore will now have access to high-performance, air-gapped, and secure cloud computing, data management, and artificial intelligence (AI) services of…

Beware of Fake Coinbase Migration Messages Aimed to Steal Your Wallet Credentials
19
Mar
2025

Beware of Fake Coinbase Migration Messages Aimed to Steal Your Wallet Credentials

A sophisticated phishing campaign is targeting cryptocurrency investors with fraudulent emails claiming a mandatory Coinbase wallet migration requirement. These deceptive…

Severe AMI BMC Vulnerability Enables Remote Authentication Bypass by Attackers
19
Mar
2025

Severe AMI BMC Vulnerability Enables Remote Authentication Bypass by Attackers

A critical vulnerability has been discovered in AMI’s MegaRAC software, which is used in Baseboard Management Controllers (BMCs) across various…

Cloudforce One threat events platform provides a real-time view of threat activity
19
Mar
2025

Cloudforce One threat events platform provides a real-time view of threat activity

Cloudflare launched the Cloudforce One threat events platform to provide real-time intelligence on cyberattacks occurring across the Internet. Based on…

How AI Agents and APIs Can Leak Sensitive Data
19
Mar
2025

How AI Agents and APIs Can Leak Sensitive Data

Most organizations are using AI in some way today, whether they know it or not. Some are merely beginning to…

Critical Synology Vulnerability Let Attackers Remote Execute Arbitrary Code
19
Mar
2025

Critical Synology Vulnerability Let Attackers Remote Execute Arbitrary Code

A severe vulnerability in Synology’s DiskStation Manager (DSM) allows remote attackers to execute arbitrary code with no user interaction.  The…

MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox
19
Mar
2025

MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox

In a significant development, the China-aligned advanced persistent threat (APT) group known as MirrorFace has been observed employing sophisticated tactics…

TXOne Networks Stellar 3.2 helps organizations make informed security choices
19
Mar
2025

TXOne Networks Stellar 3.2 helps organizations make informed security choices

TXOne Networks announced Version 3.2 of its Stellar solution, further enhancing its capabilities from endpoint protection to more comprehensive detection…

Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing
19
Mar
2025

Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing

A critical vulnerability in Windows File Explorer, identified as CVE-2025-24071, enables attackers to steal NTLM hashed passwords without any user…