The words "Group Greeting," which are the logo for the e-card business of the same name.
09
Jan
2025

GroupGreeting e-card site attacked in “zqxq” campaign 

This article was researched and written by Stefan Dasic, manager, research and response for ThreatDown, powered by Malwarebytes Malwarebytes recently…

New Banshee Stealer Variant Bypasses Antivirus with Apple's XProtect-Inspired Encryption
09
Jan
2025

New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption

Jan 09, 2025Ravie Lakshmanan Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer….

Hackers Targeting Users Who Lodged Complaints On Government Portal To Steal Credit Card Data
09
Jan
2025

Hackers Targeting Users Complained On Government Portal To Steal Credit Card Data

Attackers have evolved a sophisticated social engineering scheme to target Middle Eastern banking consumers by posing as government officials and…

Cybersecurity in 2025 — Challenges, Risks, and What Leaders Must Do
09
Jan
2025

Cybersecurity in 2025 — Challenges, Risks, and What Leaders Must Do

Every year brings new challenges — more threats, new techniques, more astute perpetrators, according to Rob Gurzeev, co-founder and CEO…

Kerio Control Firewall Vulnerability Allows 1-Click Remote Code Execution
09
Jan
2025

Kerio Control Firewall Vulnerability Allows 1-Click Remote Code Execution

A critical vulnerability in Kerio Control, a popular firewall and Unified Threat Management (UTM) product, has been discovered that could…

New PayPal Phishing Abusing Microsoft365 Domains for Sophisticated Attacks
09
Jan
2025

New PayPal Phishing Abusing Microsoft365 Domains for Sophisticated Attacks

A new and sophisticated phishing scam has been uncovered, leveraging Microsoft 365 domains to trick users into compromising their PayPal…

Thousands of Live Hacker Backdoors Found in Expired Domains
09
Jan
2025

Thousands of Live Hacker Backdoors Found in Expired Domains

SUMMARY Cybersecurity firm watchTowr discovered over 4,000 active hacker backdoors relying on expired domain names. These backdoors are pre-existing entry…

Discovers Shadow AI in SaaS
09
Jan
2025

How Reco Discovers Shadow AI in SaaS

As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has…

U.S. CISA adds Ivanti Connect Secure, Policy Secure, and ZTA Gateways flaw to its Known Exploited Vulnerabilities catalog
09
Jan
2025

U.S. CISA adds Ivanti Connect Secure, Policy Secure, and ZTA Gateways flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Ivanti Connect Secure, Policy Secure, and ZTA Gateways flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini…

Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
09
Jan
2025

Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)

The zero-day attacks leveraging the Ivanti Connect Secure (ICS) vulnerability (CVE-2025-0282) made public on Wednesday were first spotted in mid-December…

Encrypted Attacks
09
Jan
2025

Learn How to Stop Encrypted Attacks Before They Cost You Millions

Jan 09, 2025The Hacker NewsData Protection / Encryption Ransomware isn’t slowing down—it’s getting smarter. Encryption, designed to keep our online…

Cybersecurity Conferences
09
Jan
2025

Top 10 Cybersecurity Conferences You Can’t Miss

What makes a cybersecurity professional stand out in today’s rapidly evolving digital landscape? Is it their technical prowess, their ability…