UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents

29/01/2025 0 Comments 0 tags

The advanced persistent threat (APT) group known as UAC-0063 has been observed leveraging legitimate documents obtained by infiltrating one victim to attack another target with the goal of delivering a

Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution

29/01/2025 0 Comments 0 tags

A critical security flaw has been disclosed in the Cacti open-source network monitoring and fault management framework that could allow an authenticated attacker to achieve remote code execution on susceptible

How Interlock Ransomware Infects Healthcare Organizations

29/01/2025 0 Comments 0 tags

Ransomware attacks have reached an unprecedented scale in the healthcare sector, exposing vulnerabilities that put millions at risk. Recently, UnitedHealth revealed that 190 million Americans had their personal and healthcare

New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploits

29/01/2025 0 Comments 0 tags

A team of security researchers from Georgia Institute of Technology and Ruhr University Bochum has demonstrated two new side-channel attacks targeting Apple silicon that could be exploited to leak sensitive

AI in Cybersecurity: What’s Effective and What’s Not – Insights from 200 Experts

29/01/2025 0 Comments 0 tags

Curious about the buzz around AI in cybersecurity? Wonder if it’s just a shiny new toy in the tech world or a serious game changer? Let’s unpack this together in

PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks

28/01/2025 0 Comments 0 tags

A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland and Germany.

How Long Does It Take Hackers to Crack Modern Hashing Algorithms?

28/01/2025 0 Comments 0 tags

While passwords remain the first line of defense for protecting user accounts against unauthorized access, the methods for creating strong passwords and protecting them are continually evolving. For example, NIST

Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations

28/01/2025 0 Comments 0 tags

Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to tunnel traffic to command-and-control (C2) infrastructure and

AI SOC Analysts: Propelling SecOps into the future

28/01/2025 0 Comments 0 tags

Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up with ever-increasing alert volumes and complexity, modernizing SOC automation strategies with AI has emerged

OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking

28/01/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a now-patched account takeover vulnerability affecting a popular online travel service for hotel and car rentals. “By exploiting this flaw, attackers can gain unauthorized