Beware of Fake Coinbase Migration Messages Aimed to Steal Your Wallet Credentials
19
Mar
2025

Beware of Fake Coinbase Migration Messages Aimed to Steal Your Wallet Credentials

A sophisticated phishing campaign is targeting cryptocurrency investors with fraudulent emails claiming a mandatory Coinbase wallet migration requirement. These deceptive…

Severe AMI BMC Vulnerability Enables Remote Authentication Bypass by Attackers
19
Mar
2025

Severe AMI BMC Vulnerability Enables Remote Authentication Bypass by Attackers

A critical vulnerability has been discovered in AMI’s MegaRAC software, which is used in Baseboard Management Controllers (BMCs) across various…

Cloudforce One threat events platform provides a real-time view of threat activity
19
Mar
2025

Cloudforce One threat events platform provides a real-time view of threat activity

Cloudflare launched the Cloudforce One threat events platform to provide real-time intelligence on cyberattacks occurring across the Internet. Based on…

How AI Agents and APIs Can Leak Sensitive Data
19
Mar
2025

How AI Agents and APIs Can Leak Sensitive Data

Most organizations are using AI in some way today, whether they know it or not. Some are merely beginning to…

Critical Synology Vulnerability Let Attackers Remote Execute Arbitrary Code
19
Mar
2025

Critical Synology Vulnerability Let Attackers Remote Execute Arbitrary Code

A severe vulnerability in Synology’s DiskStation Manager (DSM) allows remote attackers to execute arbitrary code with no user interaction.  The…

MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox
19
Mar
2025

MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox

In a significant development, the China-aligned advanced persistent threat (APT) group known as MirrorFace has been observed employing sophisticated tactics…

TXOne Networks Stellar 3.2 helps organizations make informed security choices
19
Mar
2025

TXOne Networks Stellar 3.2 helps organizations make informed security choices

TXOne Networks announced Version 3.2 of its Stellar solution, further enhancing its capabilities from endpoint protection to more comprehensive detection…

Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing
19
Mar
2025

Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing

A critical vulnerability in Windows File Explorer, identified as CVE-2025-24071, enables attackers to steal NTLM hashed passwords without any user…

CISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability
19
Mar
2025

CISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over a critical supply-chain attack affecting a widely used…

Apache Tomcat vulnerability
19
Mar
2025

CERT NZ Shares Advisory For Apache Tomcat Vulnerability

The New Zealand Computer Emergency Response Team (CERT NZ) has issued an urgent security advisory warning of a critical vulnerability,…

Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware
19
Mar
2025

Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware

A sophisticated cyberattack has been uncovered, targeting booking websites to spread the LummaStealer malware. This campaign leverages fake CAPTCHA prompts…

cybernewswire
19
Mar
2025

Knocknoc Raises Seed Funding to Scale Its Just-In-Time Network Access Control Technology

Sydney, Australia, March 19th, 2025, CyberNewsWire Sydney-based cybersecurity software company Knocknoc has raised a seed round from US-based venture capital…