2025

HexaLocker V2: Skuld Stealer Paving the Way prior to Encryption

HexaLocker V2: Skuld Stealer Paving the Way prior to Encryption 2025-01-09 at 15:18 By rohansinhacyblecom Key Takeaways Executive Summary On August 9th, the HexaLocker ransomware group announced a new Windows-based ransomware on their Telegram channel. The post highlighted that the ransomware was developed in the Go programming language and claimed that their team included members […]

React to this headline:

Loading spinner

HexaLocker V2: Skuld Stealer Paving the Way prior to Encryption Read More »

Code Intelligence Spark automates software testing

Code Intelligence Spark automates software testing 2025-01-09 at 15:18 By Industry News Code Intelligence announced Spark, an AI test agent that autonomously identifies bugs in unknown code without human interaction. It’s the first AI Agent to find a real-world vulnerability by automatically generating and running a test for a widely used open-source software. Spark is

React to this headline:

Loading spinner

Code Intelligence Spark automates software testing Read More »

Lithuania’s New Cyber Command is a Strategic Step Towards National and NATO Cybersecurity Resilience

Lithuania’s New Cyber Command is a Strategic Step Towards National and NATO Cybersecurity Resilience 2025-01-09 at 15:06 By Ashish Khaitan Overview  On January 1, Lithuania marked a pivotal moment in its national defense strategy with the official launch of the Lithuanian Cyber Command (LTCYBERCOM). Spearheaded by the Ministry of National Defence, this new military unit

React to this headline:

Loading spinner

Lithuania’s New Cyber Command is a Strategic Step Towards National and NATO Cybersecurity Resilience Read More »

“U.S. Cyber Trust Mark” launched by the White House

“U.S. Cyber Trust Mark” launched by the White House 2025-01-09 at 15:05 By The White House announced a “U.S. Cyber Trust Mark,” establishing a label for American consumers to verify if their connected devices are cybersecure. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

“U.S. Cyber Trust Mark” launched by the White House Read More »

Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)

Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282) 2025-01-09 at 14:23 By Zeljka Zorz The zero-day attacks leveraging the Ivanti Connect Secure (ICS) vulnerability (CVE-2025-0282) made public on Wednesday were first spotted in mid-December 2024, Mandiant researchers have shared. It’s still impossible to say whether they were mounted by a single threat actor, but the

React to this headline:

Loading spinner

Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282) Read More »

Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions

Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions 2025-01-09 at 13:50 By Ransomware isn’t slowing down—it’s getting smarter. Encryption, designed to keep our online lives secure, is now being weaponized by cybercriminals to hide malware, steal data, and avoid detection.The result? A 10.3% surge in encrypted attacks over the past year

React to this headline:

Loading spinner

Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions Read More »

MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan

MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan 2025-01-09 at 13:50 By Japan’s National Police Agency (NPA) and National Center of Incident Readiness and Strategy for Cybersecurity (NCSC) accused a China-linked threat actor named MirrorFace of orchestrating a persistent attack campaign targeting organizations, businesses, and individuals in the country since 2019. The primary

React to this headline:

Loading spinner

MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan Read More »

What happens when someone subpoenas Cloudflare to unmask a blogger? This…

What happens when someone subpoenas Cloudflare to unmask a blogger? This… 2025-01-09 at 13:18 By Thomas Claburn Ex-politician in UK claims he’s been defamed – and goes to court in US for answers A former deputy mayor in the UK has subpoenaed Cloudflare in the US to discover the identity of an anonymous British political

React to this headline:

Loading spinner

What happens when someone subpoenas Cloudflare to unmask a blogger? This… Read More »

£3.8B later, old tech supplier flames still burning for HMRC

£3.8B later, old tech supplier flames still burning for HMRC 2025-01-09 at 12:43 By Lindsay Clark Deal supposed to end in 2017 continues to haunt HMRC procurement In the last five years, the UK’s tax collector has spent £3.8 billion with tech suppliers – including £591 million without any outside competition – on top of

React to this headline:

Loading spinner

£3.8B later, old tech supplier flames still burning for HMRC Read More »

Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection

Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection 2025-01-09 at 12:43 By Threat actors are attempting to take advantage of a recently disclosed security flaw impacting GFI KerioControl firewalls that, if successfully exploited, could allow malicious actors to achieve remote code execution (RCE). The vulnerability in question, CVE-2024-52875, refers to

React to this headline:

Loading spinner

Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection Read More »

UK government pledges law against sexually explicit deepfakes

UK government pledges law against sexually explicit deepfakes 2025-01-09 at 11:37 By Lindsay Clark Not just making them, but sharing them too The UK government has promised to make the creation and sharing of sexually explicit deepfake images a criminal offence.… This article is an excerpt from The Register View Original Source React to this

React to this headline:

Loading spinner

UK government pledges law against sexually explicit deepfakes Read More »

Wireshark 4.4.3 released: Updated protocol support, bug fixes

Wireshark 4.4.3 released: Updated protocol support, bug fixes 2025-01-09 at 11:07 By Help Net Security Wireshark, the popular network protocol analyzer, has reached version 4.4.3. Wireshark offers deep inspection across hundreds of protocols, live and offline analysis, and display filters. With multi-platform support, VoIP analysis, and capture file compatibility, it’s perfect for professionals seeking intuitive

React to this headline:

Loading spinner

Wireshark 4.4.3 released: Updated protocol support, bug fixes Read More »

The ultimate Pi 5 arrives carrying 16GB … and a price to match

The ultimate Pi 5 arrives carrying 16GB … and a price to match 2025-01-09 at 10:07 By Richard Speed How much RAM does an enthusiast really need? The Raspberry Pi has come a long way from its early days, as demonstrated by the single-board computer maker’s latest iteration of the Pi 5 in 16GB guise.…

React to this headline:

Loading spinner

The ultimate Pi 5 arrives carrying 16GB … and a price to match Read More »

BreachLock Unified Platform provides visibility into the organization’s attack surface

BreachLock Unified Platform provides visibility into the organization’s attack surface 2025-01-09 at 10:06 By Industry News Eliminating the inefficiencies, silos, unnecessary complexity, and coverage gaps that security practitioners have faced with fragmented security tools, the newly unveiled BreachLock Unified Platform integrates findings from Penetration Testing as a Service (PTaaS), Attack Surface Management (ASM), and continuous

React to this headline:

Loading spinner

BreachLock Unified Platform provides visibility into the organization’s attack surface Read More »

The ongoing evolution of the CIS Critical Security Controls

The ongoing evolution of the CIS Critical Security Controls 2025-01-09 at 09:46 By Help Net Security For decades, the CIS Critical Security Controls (CIS Controls) have simplified enterprises’ efforts to strengthen their cybersecurity posture by prescribing prioritized security measures for defending against common cyber threats. In this article, we’ll review the story of the CIS

React to this headline:

Loading spinner

The ongoing evolution of the CIS Critical Security Controls Read More »

Synology ActiveProtect boosts enterprise data protection

Synology ActiveProtect boosts enterprise data protection 2025-01-09 at 09:30 By Industry News Synology releases ActiveProtect, a new line of data protection appliances designed to provide enterprises a unified backup solution with simplicity, security and scalability. ActiveProtect integrates backup software, servers, and backup repositories into a seamless, unified platform. This streamlined solution enables businesses to secure

React to this headline:

Loading spinner

Synology ActiveProtect boosts enterprise data protection Read More »

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit 2025-01-09 at 09:17 By Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit Read More »

Scroll to Top