Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners

14/02/2025 0 Comments 0 tags

A widespread phishing campaign has been observed leveraging bogus PDF documents hosted on the Webflow content delivery network (CDN) with an aim to steal credit card information and commit financial

AI and Security – A New Puzzle to Figure Out

13/02/2025 0 Comments 0 tags

AI is everywhere now, transforming how businesses operate and how users engage with apps, devices, and services. A lot of applications now have some Artificial Intelligence inside, whether supporting a

Hackers Exploited PAN-OS Flaw to Deploy Chinese Malware in Ransomware Attack

13/02/2025 0 Comments 0 tags

An RA World ransomware attack in November 2024 targeting an unnamed Asian software and services company involved the use of a malicious tool exclusively used by China-based cyber espionage groups,

FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux

13/02/2025 0 Comments 0 tags

Threat hunters have shed light on a new campaign targeting the foreign ministry of an unnamed South American nation with bespoke malware capable of granting remote access to infected hosts.

Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software

13/02/2025 0 Comments 0 tags

Palo Alto Networks has addressed a high-severity security flaw in its PAN-OS software that could result in an authentication bypass. The vulnerability, tracked as CVE-2025-0108, carries a CVSS score of

Microsoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries

12/02/2025 0 Comments 0 tags

A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm has been attributed to a multi-year initial access operation dubbed BadPilot that stretched across the globe. “This subgroup

How to Steer AI Adoption: A CISO Guide

12/02/2025 0 Comments 0 tags

CISOs are finding themselves more involved in AI teams, often leading the cross-functional effort and AI strategy. But there aren’t many resources to guide them on what their role should

Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability

12/02/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a bypass for a now-patched security vulnerability in the NVIDIA Container Toolkit that could be exploited to break out of a container’s isolation protections and gain

North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack

12/02/2025 0 Comments 0 tags

The North Korea-linked threat actor known as Kimsuky has been observed using a new tactic that involves deceiving targets into running PowerShell as an administrator and then instructing them to

Microsoft’s Patch Tuesday Fixes 63 Flaws, Including Two Under Active Exploitation

12/02/2025 0 Comments 0 tags

Microsoft on Tuesday released fixes for 63 security flaws impacting its software products, including two vulnerabilities that it said has come under active exploitation in the wild. Of the 63