19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email
28
Apr
2025

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat (APT) attack campaigns, predominantly targeting regions…

BreachForums Displays Message About Shutdown, Cites MyBB 0day Flaw
28
Apr
2025

BreachForums Displays Message About Shutdown, Cites MyBB 0day Flaw

BreachForums posts a PGP-signed message explaining the sudden April 2025 shutdown. Admins cite MyBB 0day vulnerability impacting the site, plan…

Uyghur, Spy Campaign, China,
28
Apr
2025

Trojanized Text Editor Software Used In Uyghur Spy Campaign

A trusted tool has turned traitor. A new Citizen Lab investigation reveals that UyghurEditPP, a legitimate open-source Uyghur-language text editor,…

Microsoft Recall SQLite database
28
Apr
2025

Security Improves As Issues Remain

Nearly a year after its troubled initial rollout, Microsoft Recall is back. Microsoft announced in an April 25 blog post…

28
Apr
2025

Hive Five 221 – Underdoing the Competition

I’m still running daily, but I’ve swapped some days for walking with a weighted vest. The main limitation I’m currently…

Data breach
28
Apr
2025

VeriSource now says February data breach impacts 4 million people

Employee benefits administration firm VeriSource Services is warning that a data breach exposed the personal information of four million people. …

RansomHub Ransomware Deploys Malware to Breach Corporate Networks
28
Apr
2025

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging SocGholish malware, also known as FakeUpdates,…

SentinelOne
28
Apr
2025

Cybersecurity vendors are themselves under attack by hackers, SentinelOne says

Cybersecurity companies don’t just defend their customers against cyberattacks — they also have to defend themselves, and a SentinelOne report…

SAP
28
Apr
2025

Over 1,200 SAP NetWeaver servers vulnerable to actively exploited flaw

Over 1,200 internet-exposed SAP NetWeaver instances are vulnerable to an actively exploited maximum severity unauthenticated file upload vulnerability that allows…

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts
28
Apr
2025

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted at 194.48.154.79:80, believed to be operated…

Japanese researchers advance combinatorial problem solving
28
Apr
2025

Japanese researchers advance combinatorial problem solving

Researchers from the Department of Electrical Engineering at Tokyo University of Science in Japan have developed what “a novel approach”…

JPMorgan Chase CISO warns software industry on supply chain security
28
Apr
2025

JPMorgan Chase CISO warns software industry on supply chain security

The senior information security executive at JPMorgan Chase is urging the software industry to prioritize secure development practices over speed…