VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches

04/03/2025 0 Comments 0 tags

Broadcom has released security updates to address three actively exploited security flaws in VMware ESXi, Workstation, and Fusion products that could lead to code execution and information disclosure. The list

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

04/03/2025 0 Comments 0 tags

Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) module for maintaining persistent control over infected hosts, a sign

How New AI Agents Will Transform Credential Stuffing Attacks

04/03/2025 0 Comments 0 tags

Credential stuffing attacks had a huge impact in 2024, fueled by a vicious circle of infostealer infections and data breaches. But things could be about to get worse still with

Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers

04/03/2025 0 Comments 0 tags

Internet service providers (ISPs) in China and the West Coast of the United States have become the target of a mass exploitation campaign that deploys information stealers and cryptocurrency miners

Suspected Iranian Hackers Used Compromised Indian Firm’s Email to Target U.A.E. Aviation Sector

04/03/2025 0 Comments 0 tags

Threat hunters are calling attention to a new highly-targeted phishing campaign that singled out “fewer than five” entities in the United Arab Emirates (U.A.E.) to deliver a previously undocumented Golang

Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm

04/03/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws impacting software from Cisco, Hitachi Vantara, Microsoft Windows, and Progress WhatsUp Gold to its Known Exploited

Google’s March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities

04/03/2025 0 Comments 0 tags

Google has released its monthly Android Security Bulletin for March 2025 to address a total of 44 vulnerabilities, including two that it said have come under active exploitation in the

Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail

03/03/2025 0 Comments 0 tags

Threat actors are targeting Amazon Web Services (AWS) environments to push out phishing campaigns to unsuspecting targets, according to findings from Palo Alto Networks Unit 42. The cybersecurity company is

U.K. ICO Investigates TikTok, Reddit, and Imgur Over Children’s Data Protection Practices

03/03/2025 0 Comments 0 tags

The U.K.’s Information Commissioner’s Office (ICO) has opened an investigation into online platforms TikTok, Reddit, and Imgur to assess the steps they are taking to protect children between the ages

Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks

03/03/2025 0 Comments 0 tags

Threat actors have been exploiting a security vulnerability in Paragon Partition Manager’s BioNTdrv.sys driver in ransomware attacks to escalate privileges and execute arbitrary code. The zero-day flaw (CVE-2025-0289) is part