Naveen Goud
21
Feb
2025

Genea Australia data breach and Black Basta Ransomware gang data leak

Genea IVF Australia Data Breach: A Detailed Account Genea Australia, a leading fertility service provider and one of the three…

Mastering the cybersecurity tightrope of protection, detection, and response
21
Feb
2025

Mastering the cybersecurity tightrope of protection, detection, and response

In this Help Net Security interview, Chester Wisniewski, Director and Global Field CISO at Sophos, discusses the shifting ransomware landscape,…

New NailaoLocker Ransomware Attacking European Healthcare
21
Feb
2025

New NailaoLocker Ransomware Attacking European Healthcare

European healthcare organizations are facing a sophisticated cyber threat from a newly identified ransomware strain called NailaoLocker, deployed as part…

How to secure Notes on iOS and macOS
21
Feb
2025

How to secure Notes on iOS and macOS

Apple allows you to lock your notes using your iPhone passcode or a separate password, ensuring your private information stays…

Ivanti Endpoint Manager Vulnerabilities Proof-of-Concept (PoC) Exploit Released
21
Feb
2025

Ivanti Endpoint Manager Vulnerabilities Proof-of-Concept (PoC) Exploit Released

A cluster of four critical vulnerabilities in Ivanti Endpoint Manager (EPM) has entered a dangerous new phase with the public…

Windows Wi-Fi Password Stealer Malware Found Hosted on GitHub
21
Feb
2025

Windows Wi-Fi Password Stealer Malware Found Hosted on GitHub

A GitHub repository titled Windows-WiFi-Password-Stealer has surfaced, raising concerns among cybersecurity professionals.  This repository, hosted by the user, provides a…

New infosec products of the week: February 21, 2025
21
Feb
2025

New infosec products of the week: February 21, 2025

Here’s a look at the most interesting products from the past week, featuring releases from 1Password, Fortinet, Pangea, Privacera, and…

Google Released PoC Exploit for Palo Alto Firewall Command Injection Vulnerability
21
Feb
2025

Google Released PoC Exploit for Palo Alto Firewall Command Injection Vulnerability

Google’s Project Zero and Mandiant cybersecurity teams have jointly published a proof-of-concept (PoC) exploit for a high-severity command injection vulnerability…

New Active Directory Pentesting Tool For KeyCredentialLink Management
21
Feb
2025

New Active Directory Pentesting Tool For KeyCredentialLink Management

RedTeamPentesting has unveiled a new tool, keycred, which offers a robust solution for managing KeyCredentialLinks in Active Directory (AD) environments….

Salt Typhoon used custom malware JumbledPath to spy on U.S. telecom providers
21
Feb
2025

Salt Typhoon used custom malware JumbledPath to spy on U.S. telecom providers

Salt Typhoon used custom malware JumbledPath to spy U.S. telecom providers Pierluigi Paganini February 20, 2025 China-linked cyber espionage group…

How to Sue a Company Under GDPR for Data Misuse and Privacy Violations
21
Feb
2025

How to Sue a Company Under GDPR for Data Misuse and Privacy Violations

Learn how to sue companies under GDPR for data misuse. Understand your rights, file complaints, and claim compensation for privacy…

Hackers Drop NetSupport RAT & StealC Malware on Your Windows Via Fake Browser Updates
21
Feb
2025

Hackers Drop NetSupport RAT & StealC Malware on Your Windows Via Fake Browser Updates

Cybersecurity researchers have uncovered a sophisticated malware campaign orchestrated by the threat actor group SmartApeSG, also known as ZPHP or…