State-linked threat groups collaborating with hacktivists, other actors to target infrastructure
26
Feb
2025

State-linked threat groups collaborating with hacktivists, other actors to target infrastructure

Critical infrastructure providers are under threat of more frequent and sophisticated attacks as state-linked threat groups are increasingly collaborating with…

Specops logo with a Active Directory symbol
26
Feb
2025

Five best practices for securing Active Directory service accounts

Windows Active Directory (AD) service accounts are prime cyber-attack targets due to their elevated privileges and automated/continuous access to important…

Researchers Uncover $1.4B in Sensitive Data Tied to ByBit Hack by Lazarus Group
26
Feb
2025

Researchers Uncover $1.4B in Sensitive Data Tied to ByBit Hack by Lazarus Group

In a significant breakthrough, cybersecurity firm Silent Push has uncovered sensitive infrastructure tied to the Lazarus Group, a North Korean…

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites
26
Feb
2025

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites

A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts…

IoT and SaaS will underpin government legislation introduced to protect rivers
26
Feb
2025

IoT and SaaS will underpin government legislation introduced to protect rivers

The use of internet of things (IoT) technology, combined with a software as a service (SaaS) platform, will help water…

DeepSeek’s AI shake-up could boost cybersecurity risks, spending: report
26
Feb
2025

DeepSeek’s AI shake-up could boost cybersecurity risks, spending: report

Dive Brief: Global cybersecurity spending is projected to surge in coming years as artificial intelligence tools like chatbots and agents…

Hackers
26
Feb
2025

Lazarus hacked Bybit via breached Safe{Wallet} developer machine

​Forensic investigators have found that North Korean Lazarus hackers stole $1.5 billion from Bybit after hacking a developer’s device at…

RSync Vulnerabilities Allow Hackers to Take Full Control of Servers – PoC Released
26
Feb
2025

RSync Vulnerabilities Allow Hackers to Take Full Control of Servers – PoC Released

A series of critical security vulnerabilities in the widely-used Rsync file synchronization tool have been uncovered, exposing millions of servers…

Dalfox: Open-source XSS scanner - Help Net Security
26
Feb
2025

Dalfox: Open-source XSS scanner – Help Net Security

DalFox is an open-source tool for automating the detection of XSS vulnerabilities. With powerful testing capabilities and a wide range…

Deezer Music Downloads
26
Feb
2025

Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music Downloads

Feb 26, 2025Ravie LakshmananMalware / Cryptocurrency Cybersecurity researchers have flagged a malicious Python library on the Python Package Index (PyPI)…

VMware vSAN Max: What you need to know
26
Feb
2025

VMware vSAN Max: What you need to know

When VMware launched vSAN Max in late 2023, it promised storage for VSphere with many of the benefits of hyper-converged…

Piracy
26
Feb
2025

PyPi package with 100K installs pirated music from Deezer for years

A malicious PyPi package named ‘automslc’  has been downloaded over 100,000 times from the Python Package Index since 2019, abusing…