Astaroth Phishing Kit Bypasses 2FA to Hijack Gmail and Microsoft Accounts
13
Feb
2025

Astaroth Phishing Kit Bypasses 2FA to Hijack Gmail and Microsoft Accounts

New Astaroth Phishing Kit bypasses 2FA (two-factor authentication) to steal Gmail, Yahoo and Microsoft login credentials using a reverse proxy,…

Palo Alto Networks Cortex Cloud applies AI-driven insights to reduce risk and prevent threats
13
Feb
2025

Palo Alto Networks Cortex Cloud applies AI-driven insights to reduce risk and prevent threats

Palo Alto Networks introduced Cortex Cloud, the next version of Prisma Cloud, that natively brings together new releases of its…

South Korea Cyberattacks
13
Feb
2025

North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks

Feb 13, 2025Ravie LakshmananUnited States A nation-state threat actor with ties to North Korea has been linked to an ongoing…

Training Employees To Defend Against Ransomware
13
Feb
2025

Training Employees To Defend Against Ransomware

13 Feb Training Employees To Defend Against Ransomware Posted at 08:50h in Blogs by Taylor Fox This week in cybersecurity…

Sandworm APT's initial access subgroup hits organizations accross the globe
13
Feb
2025

Sandworm APT’s initial access subgroup hits organizations accross the globe

A subgroup of Russia’s Sandworm APT has been working to achieve initial and persistent access to the IT networks of…

AI and Security
13
Feb
2025

AI and Security – A New Puzzle to Figure Out

AI is everywhere now, transforming how businesses operate and how users engage with apps, devices, and services. A lot of…

Russia-linked APT Seashell Blizzard is behind the long-running global access operation BadPilot campaign
13
Feb
2025

Russia-linked APT Seashell Blizzard is behind the long-running global access operation BadPilot campaign

Russia-linked APT Seashell Blizzard is behind the long running global access operation BadPilot campaign Pierluigi Paganini February 13, 2025 A…

Deciphering End User Data Access Patterns is Key to a Strong SaaS Security Posture
13
Feb
2025

Deciphering End User Data Access Patterns is Key to a Strong SaaS Security Posture

It’s all about patterns. Long before cybersecurity was on anyone’s radar, defensive intelligence – like catching an enemy spy in…

FortiOS Vulnerability Allows Super-Admin Privilege Escalation – Patch Now!
13
Feb
2025

FortiOS Vulnerability Allows Super-Admin Privilege Escalation

Super-admin access vulnerability discovered in FortiOS Security Fabric. Exploitation could lead to widespread network breaches. Update now. Fortinet has released a…

Watch this Learn to Sync Dev and Sec Teams
13
Feb
2025

Watch this Learn to Sync Dev and Sec Teams

Feb 13, 2025The Hacker NewsApplication Security / DevOps Ever felt like your team is stuck in a constant battle? Developers…

Baltic skills programme to help reduce European skills gap via Africa
13
Feb
2025

Baltic skills programme to help reduce European skills gap via Africa

IT professionals in Africa are being connected to tech businesses in the Baltic region as part of a European Commission-funded…

How To Avoid Fraud And Stay Safe
13
Feb
2025

How To Avoid Fraud And Stay Safe

FedEx, the world’s largest express transportation company, is issuing an urgent public warning regarding a wave of FedEx scams that…