February 2025

China’s Salt Typhoon Keeps Breaching Telecom Networks

China’s Salt Typhoon Keeps Breaching Telecom Networks 2025-02-17 at 17:12 View original post at vpnMentor A Chinese state-backed hacking group known as Salt Typhoon has continued targeting telecommunications providers worldwide, despite recent US sanctions and cybersecurity warnings. According to a report from cybersecurity firm Recorded Future, the group has successfully breached multiple telecom networks in […]

React to this headline:

Loading spinner

China’s Salt Typhoon Keeps Breaching Telecom Networks Read More »

XCSSET macOS malware returns with first new version since 2022

XCSSET macOS malware returns with first new version since 2022 2025-02-17 at 15:49 By Connor Jones Known for popping zero-days of yesteryear, Microsoft puts Apple devs on high alert Microsoft says there’s a new variant of XCSSET on the prowl for Mac users – the first new iteration of the malware since 2022.… This article

React to this headline:

Loading spinner

XCSSET macOS malware returns with first new version since 2022 Read More »

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094) 2025-02-17 at 15:49 By Zeljka Zorz The suspected Chinese state-sponsored hackers who breached workstations of several US Treasury employees in December 2024 did so by leveraging not one, but two zero-days, according to Rapid7 researchers. It was initially reported that the attackers compromised the

React to this headline:

Loading spinner

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094) Read More »

New FinalDraft Malware Spotted in Espionage Campaign

New FinalDraft Malware Spotted in Espionage Campaign 2025-02-17 at 15:49 By Ionut Arghire A newly identified malware family abuses the Outlook mail service for communication, via the Microsoft Graph API. The post New FinalDraft Malware Spotted in Espionage Campaign appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

New FinalDraft Malware Spotted in Espionage Campaign Read More »

UK court says Chinese operation must sell Scottish chip biz stake without delay

UK court says Chinese operation must sell Scottish chip biz stake without delay 2025-02-17 at 15:02 By Dan Robinson ‘Satisfied’ the risk to national security is ‘a real and significant one’ that should not be ‘prolonged’ The High Court of Justice in the UK has rejected a plea from a China-owned operation for a temporary

React to this headline:

Loading spinner

UK court says Chinese operation must sell Scottish chip biz stake without delay Read More »

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations 2025-02-17 at 15:02 By South Korea has formally suspended new downloads of Chinese artificial intelligence (AI) chatbot DeepSeek in the country until the service makes changes to its mobile apps to comply with data protection regulations. Downloads have been paused as of February 15, 2025, 6:00

React to this headline:

Loading spinner

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations Read More »

Russian State Hackers Target Organizations With Device Code Phishing

Russian State Hackers Target Organizations With Device Code Phishing 2025-02-17 at 14:49 By Ionut Arghire Russian hackers have been targeting government, defense, telecoms, and other organizations in a device code phishing campaign. The post Russian State Hackers Target Organizations With Device Code Phishing appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Russian State Hackers Target Organizations With Device Code Phishing Read More »

Two Estonians plead guilty in $577M cryptocurrency Ponzi scheme

Two Estonians plead guilty in $577M cryptocurrency Ponzi scheme 2025-02-17 at 13:48 By Zeljka Zorz Two Estonian nationals may spend the next 20 years in prison for stealing hundreds of millions of dollars through a massive cryptocurrency Ponzi scheme, the US Department of Justice announced last week. The fraudulent operation “According to court documents, Sergei

React to this headline:

Loading spinner

Two Estonians plead guilty in $577M cryptocurrency Ponzi scheme Read More »

127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police

127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police 2025-02-17 at 13:48 By Eduard Kovacs After governments announced sanctions against the Zservers/XHost bulletproof hosting service, Dutch police took 127 servers offline. The post 127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police Read More »

Downloads of DeepSeek’s AI Apps Paused in South Korea Over Privacy Concerns

Downloads of DeepSeek’s AI Apps Paused in South Korea Over Privacy Concerns 2025-02-17 at 13:33 By Associated Press DeepSeek has temporarily paused downloads of its chatbot apps in South Korea while it works with local authorities to address privacy concerns. The post Downloads of DeepSeek’s AI Apps Paused in South Korea Over Privacy Concerns appeared

React to this headline:

Loading spinner

Downloads of DeepSeek’s AI Apps Paused in South Korea Over Privacy Concerns Read More »

CISO’s Expert Guide To CTEM And Why It Matters

CISO’s Expert Guide To CTEM And Why It Matters 2025-02-17 at 13:20 By Cyber threats evolve—has your defense strategy kept up? A new free guide available here explains why Continuous Threat Exposure Management (CTEM) is the smart approach for proactive cybersecurity. This concise report makes a clear business case for why CTEM’s comprehensive approach is

React to this headline:

Loading spinner

CISO’s Expert Guide To CTEM And Why It Matters Read More »

Xerox Versalink Printer Vulnerabilities Enable Lateral Movement

Xerox Versalink Printer Vulnerabilities Enable Lateral Movement 2025-02-17 at 13:03 By Ionut Arghire Xerox released security updates to resolve pass-back attack vulnerabilities in Versalink multifunction printers. The post Xerox Versalink Printer Vulnerabilities Enable Lateral Movement appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Xerox Versalink Printer Vulnerabilities Enable Lateral Movement Read More »

Bank of England Oracle Cloud bill balloons – but when you print money, who’s counting?

Bank of England Oracle Cloud bill balloons – but when you print money, who’s counting? 2025-02-17 at 12:33 By Lindsay Clark Old Lady of Threadneedle Street to pay millions for ‘amended implementation methodology’ The Bank of England has nearly doubled the money it is dedicating to partner spending for an Oracle cloud transformation, which it

React to this headline:

Loading spinner

Bank of England Oracle Cloud bill balloons – but when you print money, who’s counting? Read More »

⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More

⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More 2025-02-17 at 12:33 By Welcome to this week’s Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake codes and sneaky emails to gain access to sensitive data. We cover everything from device code phishing to cloud exploits,

React to this headline:

Loading spinner

⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More Read More »

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations 2025-02-17 at 12:33 By Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism for command-and-control (C2) communications. Netskope Threat Labs, which detailed the functions of the malware, described it as possibly of Russian origin. “The malware is

React to this headline:

Loading spinner

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations Read More »

6 tips to ace security posture in higher education

6 tips to ace security posture in higher education 2025-02-17 at 12:06 By Education institutions, just like any business or organization, need to pay careful attention to their cybersecurity posture and that of the third parties they work with. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React

React to this headline:

Loading spinner

6 tips to ace security posture in higher education Read More »

TechUK demands that Britain’s chip strategy is crisped up

TechUK demands that Britain’s chip strategy is crisped up 2025-02-17 at 11:49 By Dan Robinson Trade body wants recommendations fast-tracked and fabs designated critical national infrastructure Almost two years after the British government published its National Semiconductor Strategy, calls are growing for bolder action and a faster implementation of its recommendations to deliver on its

React to this headline:

Loading spinner

TechUK demands that Britain’s chip strategy is crisped up Read More »

Scroll to Top