Ransomware Group Data-Leak Sites Increasing as Six New Groups Emerge
26
Feb
2025

Ransomware Group Data-Leak Sites Increasing as Six New Groups Emerge

The cybersecurity landscape has witnessed a significant uptick in ransomware activity, with six new data-leak sites (DLSs) linked to emerging…

KEV Catalog
26
Feb
2025

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation

Feb 26, 2025Ravie LakshmananEnterprise Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed two security…

Lord Holmes warns of increasingly ‘urgent’ need to regulate AI
26
Feb
2025

Lord Holmes warns of increasingly ‘urgent’ need to regulate AI

The UK government must “urgently” legislate on artificial intelligence (AI) given the clearly negative impacts it is already having on…

State-linked threat groups collaborating with hacktivists, other actors to target infrastructure
26
Feb
2025

State-linked threat groups collaborating with hacktivists, other actors to target infrastructure

Critical infrastructure providers are under threat of more frequent and sophisticated attacks as state-linked threat groups are increasingly collaborating with…

Specops logo with a Active Directory symbol
26
Feb
2025

Five best practices for securing Active Directory service accounts

Windows Active Directory (AD) service accounts are prime cyber-attack targets due to their elevated privileges and automated/continuous access to important…

Researchers Uncover $1.4B in Sensitive Data Tied to ByBit Hack by Lazarus Group
26
Feb
2025

Researchers Uncover $1.4B in Sensitive Data Tied to ByBit Hack by Lazarus Group

In a significant breakthrough, cybersecurity firm Silent Push has uncovered sensitive infrastructure tied to the Lazarus Group, a North Korean…

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites
26
Feb
2025

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites

A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts…

IoT and SaaS will underpin government legislation introduced to protect rivers
26
Feb
2025

IoT and SaaS will underpin government legislation introduced to protect rivers

The use of internet of things (IoT) technology, combined with a software as a service (SaaS) platform, will help water…

DeepSeek’s AI shake-up could boost cybersecurity risks, spending: report
26
Feb
2025

DeepSeek’s AI shake-up could boost cybersecurity risks, spending: report

Dive Brief: Global cybersecurity spending is projected to surge in coming years as artificial intelligence tools like chatbots and agents…

Hackers
26
Feb
2025

Lazarus hacked Bybit via breached Safe{Wallet} developer machine

​Forensic investigators have found that North Korean Lazarus hackers stole $1.5 billion from Bybit after hacking a developer’s device at…

RSync Vulnerabilities Allow Hackers to Take Full Control of Servers – PoC Released
26
Feb
2025

RSync Vulnerabilities Allow Hackers to Take Full Control of Servers – PoC Released

A series of critical security vulnerabilities in the widely-used Rsync file synchronization tool have been uncovered, exposing millions of servers…

26
Feb
2025

Dalfox: Open-source XSS scanner – Help Net Security

DalFox is an open-source tool for automating the detection of XSS vulnerabilities. With powerful testing capabilities and a wide range…