Critical DrayTek Router Vulnerabilities Expose Devices to RCE Attacks
07
Mar
2025

Critical DrayTek Router Vulnerabilities Expose Devices to RCE Attacks

A recent security analysis of Draytek Vigor routers has uncovered severe vulnerabilities that could allow attackers to hijack devices, execute…

Microsoft Dismantles Malvertising Scam Using GitHub, Discord, Dropbox
07
Mar
2025

Microsoft Dismantles Malvertising Scam Using GitHub, Discord, Dropbox

Microsoft Threat Intelligence exposes a malvertising campaign exploiting GitHub, Discord, and Dropbox. Discover the multi-stage attack chain, the use of…

Webcam
07
Mar
2025

Ransomware gang encrypted network from a webcam to bypass EDR

The Akira ransomware gang was spotted using an unsecured webcam to launch encryption attacks on a victim’s network, effectively circumventing Endpoint…

Critical Vulnerabilities in DrayTek Routers Exposes Devices to RCE Attack
07
Mar
2025

Critical Vulnerabilities in DrayTek Routers Exposes Devices to RCE Attack

A series of critical vulnerabilities in DrayTek Vigor routers widely deployed in small office/home office (SOHO) environments have been uncovered,…

Multiple Jenkins Vulnerabilities Allow Attackers to Expose Secrets
07
Mar
2025

Multiple Jenkins Vulnerabilities Allow Attackers to Expose Secrets

Jenkins, the widely-used open-source automation server, issued a high-priority security advisory on March 5, 2025, disclosing four medium-severity vulnerabilities affecting…

Jane Devry
07
Mar
2025

Avoiding the Single Point of Failure

In July of 2024, cybersecurity software company CrowdStrike pushed an update to millions of computers around the world. The update,…

Qilin ransomware
07
Mar
2025

North Korean hackers join Qilin ransomware gang

Microsoft says a North Korean hacking group tracked as Moonstone Sleet has deployed Qilin ransomware payloads in a limited number…

Operation Sea Elephant Attacking Organizations to Steal Research Details
07
Mar
2025

Operation Sea Elephant Attacking Organizations to Steal Research Details

A sophisticated cyber espionage campaign dubbed “Operation Sea Elephant” has been discovered targeting scientific research organizations, with a particular focus…

Phantom Goblin Uses Social Engineering Tactics to Deploy Stealer Malware
07
Mar
2025

Phantom Goblin Uses Social Engineering Tactics to Deploy Stealer Malware

A sophisticated malware operation, dubbed “Phantom Goblin,” has been identified by cybersecurity researchers, highlighting the increasing use of social engineering…

Learn How ASPM Transforms Application Security from Reactive to Proactive
07
Mar
2025

Learn How ASPM Transforms Application Security from Reactive to Proactive

Mar 07, 2025The Hacker NewsSoftware Security / AppSec Are you tired of dealing with outdated security tools that never seem…

Microsoft 365 Announces E5 Security for Business Premium Customers as Add-on
07
Mar
2025

Microsoft 365 Announces E5 Security for Business Premium Customers as Add-on

Microsoft has announced the immediate availability of Microsoft 365 E5 Security as a cost-effective add-on for Business Premium subscribers, marking…

Researchers Jailbreak 17 Popular LLM Models to Reveal Sensitive Data
07
Mar
2025

Researchers Jailbreak 17 Popular LLM Models to Reveal Sensitive Data

In a recent study published by Palo Alto Networks’ Threat Research Center, researchers successfully jailbroke 17 popular generative AI (GenAI)…