Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment
17
Feb
2025

Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment

A sophisticated cyber threat has emerged in recent weeks, targeting unsuspecting users with fake Outlook troubleshooting calls. These calls, designed…

week in security
17
Feb
2025

A week in security (February 10 – February 16)

February 14, 2025 – A cybercriminal stole a reported 12 million data records on Zacks’ customers and clients. February 13,…

A Free Cybersecurity Lab for Security Teams To Analyse Cyber Threats
17
Feb
2025

A Free Cybersecurity Lab for Security Teams To Analyse Cyber Threats

In a significant step forward for cybersecurity professionals, PurpleLab offers an innovative open-source cybersecurity lab for creating and testing detection…

Threat Actors Leveraging Modified Version of SharpHide Tool To Create Hidden Registry
17
Feb
2025

Threat Actors Leveraging Modified Version of SharpHide Tool To Create Hidden Registry

Threat actors have been utilizing a modified version of the SharpHide tool to create hidden registry values, significantly complicating detection…

Naveen Goud
17
Feb
2025

Samsung brings in Quantum safe security to its Knox Security Ecosystem

Samsung has consistently been at the forefront of technological innovation, and its latest advancement comes in the form of enhanced…

Hackers Abusing Microsoft Teams Meeting Invites to Trick Victims for Gaining Access
17
Feb
2025

Hackers Abusing Microsoft Teams Meeting Invites to Trick Victims for Gaining Access

In a sophisticated cyberattack campaign, a threat actor identified as Storm-2372 has been leveraging Microsoft Teams meeting invites to execute…

Naveen Goud
17
Feb
2025

Can Simulated Phishing Attacks Help in Training and Creating Awareness Among Employees?

In today’s digital age, phishing attacks have become one of the most prevalent threats to organizations. Cybercriminals are constantly devising…

How CISOs can balance security and business agility in the cloud
17
Feb
2025

How CISOs can balance security and business agility in the cloud

In this Help Net Security interview, Natalia Belaya, CISO at Cloudera, discusses common misconceptions about cloud security, the balance between…

Orbit: Open-source Nuclei security scanning and automation platform
17
Feb
2025

Orbit: Open-source Nuclei security scanning and automation platform

Orbit is an open-source platform built to streamline large-scale Nuclei scans, enabling teams to manage, analyze, and collaborate on security…

Google Chrome AI-Powered Security Now Available for All Users
17
Feb
2025

Google Chrome AI-Powered Security Now Available for All Users

In a significant update, Google has announced that its AI-powered security feature is now available to every Chrome user globally….

Linux Kernel 6.14 rc3 Released
17
Feb
2025

Linux Kernel 6.14 rc3 Released

Linus Torvalds has released Linux Kernel 6.14-rc3, the latest release candidate for the upcoming Linux 6.14 stable version. Paolo Bonzini,…

Malicious PirateFi game infects Steam users with Vidar malware
17
Feb
2025

PirateFi game on Steam caught installing password-stealing malware

A free-to-play game named PirateFi in the Steam store has been distributing the Vidar infostealing malware to unsuspecting users. The…