Top US Election Security Watchdog Forced to Stop Election Security Work
15
Feb
2025

Top US Election Security Watchdog Forced to Stop Election Security Work

The Cybersecurity and Infrastructure Security Agency has frozen all of its election security work and is reviewing everything it has…

U.S. CISA adds SimpleHelp flaw to its Known Exploited Vulnerabilities catalog
15
Feb
2025

U.S. CISA adds SimpleHelp flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds SimpleHelp flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February 14, 2025 U.S. Cybersecurity and Infrastructure Security…

RansomHub: The New King of Ransomware? Targeted 600 Firms in 2024
15
Feb
2025

The New King of Ransomware? Targeted 600 Firms in 2024

RansomHub emerges as a major ransomware threat in 2024, targeting 600 organizations after ALPHV and LockBit disruptions. Group-IB reveals its…

Hackers exploit authentication bypass in Palo Alto Networks PAN-OS
15
Feb
2025

Hackers exploit authentication bypass in Palo Alto Networks PAN-OS

Hackers are launching attacks against Palo Alto Networks PAN-OS firewalls by exploiting a recently fixed vulnerability (CVE-2025-0108) that allows bypassing authentication….

Why EPSS is a Game-Changer for Cybersecurity Risk Management
14
Feb
2025

Why EPSS is a Game-Changer for Cybersecurity Risk Management

Having served on the MITRE.org CVE (OVAL) advisory board, I have spent years analyzing vulnerabilities and how they impact global…

The AWS Exploit That Lets Hackers Take Over Your Cloud – Without You Knowing!
14
Feb
2025

The AWS Exploit That Lets Hackers Take Over Your Cloud – Without You Knowing!

Cloud security remains an evolving challenge as new attack vectors emerge, often leveraging misconfigurations rather than outright software vulnerabilities. In…

New "whoAMI" Attack Exploits AWS AMI Name Confusion for Remote Code Execution
14
Feb
2025

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

Feb 14, 2025Ravie LakshmananVulnerability / DevOps Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that…

China-linked APT Salt Typhoon breached telecoms by exploiting Cisco router flaws
14
Feb
2025

China-linked APT Salt Typhoon breached telecoms by exploiting Cisco router flaws

China-linked APT Salt Typhoon breached telecoms by exploiting Cisco router flaws Pierluigi Paganini February 14, 2025 China-linked APT Salt Typhoon…

N. Korean Hackers Suspected in DEEP#DRIVE Attacks Against S. Korea
14
Feb
2025

N. Korean Hackers Suspected in DEEP#DRIVE Attacks Against S. Korea

A phishing attack dubbed DEEP#DRIVE is targeting South Korean entities, with thousands already affected. North Korean hackers from the Kimsuky…

SonicWall
14
Feb
2025

SonicWall firewall bug leveraged in attacks after PoC exploit release

Attackers are now targeting an authentication bypass vulnerability affecting SonicWall firewalls shortly after the release of proof-of-concept (PoC) exploit code….

Zacks logo
14
Feb
2025

12 Million Zacks accounts leaked by cybercriminal

A cybercriminal claimed to have stolen 15 million data records from the customers and clients of the company Zacks—a number…

JavaScript Implant
14
Feb
2025

Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks

Feb 14, 2025Ravie LakshmananBrowser Security / Cryptocurrency The North Korean threat actor known as the Lazarus Group has been linked…