Hackers Exploited Confluence Server Vulnerability To Deploy LockBit Ransomware
24
Feb
2025

Hackers Exploited Confluence Server Vulnerability To Deploy LockBit Ransomware

A sophisticated ransomware attack leveraging a critical Atlassian Confluence vulnerability (CVE-2023-22527, CVSS 10.0) has been uncovered, culminating in the deployment…

LockBit Ransomware Strikes: Exploiting a Confluence Vulnerability
24
Feb
2025

LockBit Ransomware Strikes: Exploiting a Confluence Vulnerability

In a swift and highly coordinated attack, LockBit ransomware operators exploited a critical remote code execution vulnerability (CVE-2023-22527) in Atlassian…

An action plan for net-zero compatible with budget constraints
24
Feb
2025

An action plan for net-zero compatible with budget constraints

When it comes to IT sustainability, the present economic uncertainty and political swings from diametrically opposite policies regarding climate change…

SpyLend Android malware found on Google Play enabled financial cyber crime and extortion
24
Feb
2025

SpyLend Android malware found on Google Play enabled financial cyber crime and extortion

SpyLend Android malware found on Google Play enabled financial cyber crime and extortion Pierluigi Paganini February 24, 2025 CYFIRMA researchers…

Wireshark 4.4.4 Released With Fix for Vulnerability That Triggers DoS Attack
24
Feb
2025

Wireshark 4.4.4 Released With Fix for Vulnerability That Triggers DoS Attack

The Wireshark Foundation has released version 4.4.4 of its widely used network protocol analyzer, addressing a high-severity vulnerability that could…

GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems
24
Feb
2025

GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems

GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, has emerged as a significant threat within the cybercrime ecosystem. First identified in…

week in security
24
Feb
2025

A week in security (February 17 – February 23)

February 21, 2025 – Healthcare security is failing patients time and again. This week DM Clinical Research and Helath Net…

Parallels Desktop 0-Day Vulnerability Gain Root Privileges
24
Feb
2025

Parallels Desktop 0-Day Vulnerability Gain Root Privileges

A critical 0-day vulnerability in Parallels Desktop virtualization software has been publicly disclosed, enabling local attackers to escalate privileges to…

Fake ChatGPT Premium Phishing Scam Spreads to Steal User Credentials
24
Feb
2025

Fake ChatGPT Premium Phishing Scam Spreads to Steal User Credentials

A sophisticated phishing campaign impersonating OpenAI’s ChatGPT Premium subscription service has surged globally, targeting users with fraudulent payment requests to…

Exim Mail Transfer Vulnerability Let Attackers Inject Malicious SQL Queries
24
Feb
2025

Exim Mail Transfer Vulnerability Let Attackers Inject Malicious SQL Queries

Security researchers have uncovered a critical SQL injection vulnerability (CVE-2025-26794) in Exim, the widely-used mail transfer agent (MTA) that powers…

PoC Exploit Released for F5 BIG-IP Command Injection Vulnerability
24
Feb
2025

PoC Exploit Released for F5 BIG-IP Command Injection Vulnerability

Security researchers have disclosed critical details about CVE-2025-20029, a command injection vulnerability in F5’s BIG-IP Traffic Management Shell (TMSH) command-line interface….

Parallels Desktop 0-Day Exploit Enables Root Privileges – PoC Released
24
Feb
2025

Parallels Desktop 0-Day Exploit Enables Root Privileges – PoC Released

A critical zero-day vulnerability in Parallels Desktop virtualization software has been publicly disclosed after seven months of unresolved reporting, enabling…