2025

Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks

Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks 2025-02-14 at 14:05 By Ionut Arghire China-linked APT Salt Typhoon has been exploiting known vulnerabilities in Cisco devices in attacks on telecom providers in the US and abroad. The post Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks appeared first on SecurityWeek. This […]

React to this headline:

Loading spinner

Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks Read More »

New Windows Zero-Day Exploited by Chinese APT: Security Firm

New Windows Zero-Day Exploited by Chinese APT: Security Firm 2025-02-14 at 13:52 By Eduard Kovacs ClearSky Cyber Security says it has seen a new Windows zero-day being exploited by a Chinese APT named Mustang Panda.  The post New Windows Zero-Day Exploited by Chinese APT: Security Firm appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

New Windows Zero-Day Exploited by Chinese APT: Security Firm Read More »

SGNL Raises $30 Million for Identity Management Solution

SGNL Raises $30 Million for Identity Management Solution 2025-02-14 at 13:24 By Ionut Arghire Identity management provider SGNL has raised $30 million in a Series A funding round led by Brightmind Partners. The post SGNL Raises $30 Million for Identity Management Solution appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

SGNL Raises $30 Million for Identity Management Solution Read More »

Hackers Exploit Palo Alto Firewall Vulnerability Day After Disclosure

Hackers Exploit Palo Alto Firewall Vulnerability Day After Disclosure 2025-02-14 at 13:24 By Eduard Kovacs Attempts to exploit CVE-2024-0108, an authentication bypass vulnerability in Palo Alto firewalls, started one day after disclosure.  The post Hackers Exploit Palo Alto Firewall Vulnerability Day After Disclosure appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Hackers Exploit Palo Alto Firewall Vulnerability Day After Disclosure Read More »

AI-Powered Social Engineering: Ancillary Tools and Techniques

AI-Powered Social Engineering: Ancillary Tools and Techniques 2025-02-14 at 13:24 By Social engineering is advancing fast, at the speed of generative AI. This is offering bad actors multiple new tools and techniques for researching, scoping, and exploiting organizations. In a recent communication, the FBI pointed out: ‘As technology continues to evolve, so do cybercriminals’ tactics.’

React to this headline:

Loading spinner

AI-Powered Social Engineering: Ancillary Tools and Techniques Read More »

Microsoft: Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts

Microsoft: Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts 2025-02-14 at 13:24 By Microsoft is calling attention to an emerging threat cluster it calls Storm-2372 that has been attributed to a new set of cyber attacks aimed at a variety of sectors since August 2024. The attacks have targeted government, non-governmental organizations (NGOs), information

React to this headline:

Loading spinner

Microsoft: Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts Read More »

RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally

RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally 2025-02-14 at 13:24 By The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme have been observed leveraging now-patched security flaws in Microsoft Active Directory and the Netlogon protocol to escalate privileges and gain unauthorized access to a victim network’s domain controller as part of their

React to this headline:

Loading spinner

RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally Read More »

FBI, CISA Urge Memory-Safe Practices for Software Development 

FBI, CISA Urge Memory-Safe Practices for Software Development  2025-02-14 at 12:20 By Paul Shread In a strongly worded advisory, the FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have urged software developers to cease unsafe development practices that lead to “unforgivable” buffer overflow vulnerabilities.  “Despite the existence of well-documented, effective mitigations for buffer

React to this headline:

Loading spinner

FBI, CISA Urge Memory-Safe Practices for Software Development  Read More »

Watchdog ponders why Apple doesn’t apply its strict app tracking rules to itself

Watchdog ponders why Apple doesn’t apply its strict app tracking rules to itself 2025-02-14 at 11:30 By Jude Karabus Germany’s Federal Cartel Office voices concerns iPhone maker may be breaking competition law Apple is feeling the heat over its acclaimed iPhone privacy policy after a German regulator’s review of iOS tracking consent alleged that the

React to this headline:

Loading spinner

Watchdog ponders why Apple doesn’t apply its strict app tracking rules to itself Read More »

Grip Security unveils SSPM solution to strengthen SaaS security posture

Grip Security unveils SSPM solution to strengthen SaaS security posture 2025-02-14 at 10:46 By Industry News Grip Security has unveiled its SaaS Security Posture Management (SSPM) solution, which proactively identifies misconfigurations, enforces best practices and strengthens SaaS security posture against emerging risks. Unlike traditional SSPM products, Grip SSPM is built on a foundation of visibility

React to this headline:

Loading spinner

Grip Security unveils SSPM solution to strengthen SaaS security posture Read More »

HPE says blocking Juniper buy is a sure Huawei to ensure China and Cisco thrive

HPE says blocking Juniper buy is a sure Huawei to ensure China and Cisco thrive 2025-02-14 at 09:02 By Simon Sharwood Analyst argues stopping the deal benefits Switchzilla by preventing rise of strong challenger for AI networks HPE has fired back at the US Department of Justice’s objection to its takeover of Juniper Networks, with

React to this headline:

Loading spinner

HPE says blocking Juniper buy is a sure Huawei to ensure China and Cisco thrive Read More »

Chinese AI marches on as Baidu makes its chatbot free, Alibaba scores Apple deal

Chinese AI marches on as Baidu makes its chatbot free, Alibaba scores Apple deal 2025-02-14 at 07:30 By Simon Sharwood New ‘Deep Search’ thinking and planning bot to go up against peoples’ champion DeepSeek Chinese AI continued to march onto the world stage this week, with Alibaba and Baidu both taking major strides.… This article

React to this headline:

Loading spinner

Chinese AI marches on as Baidu makes its chatbot free, Alibaba scores Apple deal Read More »

PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks

PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks 2025-02-14 at 07:22 By Threat actors who were behind the exploitation of a zero-day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products in December 2024 likely also exploited a previously unknown SQL injection flaw in PostgreSQL, according to findings from Rapid7. The

React to this headline:

Loading spinner

PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks Read More »

Pig butchering scams are exploding

Pig butchering scams are exploding 2025-02-14 at 07:03 By Help Net Security 2024 is set to be a record year for scammers who received at least US$9.9 billion in crypto revenues from their illicit activities, according to Chainalysis. This figure is projected to rise to an all-time high of $12.4 billion as ongoing analysis uncovers

React to this headline:

Loading spinner

Pig butchering scams are exploding Read More »

Shadow AI: The silent threat to enterprise data security

Shadow AI: The silent threat to enterprise data security 2025-02-14 at 07:03 By Just as IT departments have started to get a handle on shadow IT by setting policies for oversight and permissions on the use of applications, a new challenge has emerged — shadow AI. This article is an excerpt from Subscribe to Security

React to this headline:

Loading spinner

Shadow AI: The silent threat to enterprise data security Read More »

Inconsistent security strategies fuel third-party threats

Inconsistent security strategies fuel third-party threats 2025-02-14 at 06:36 By Help Net Security 47% of organizations have experienced a data breach or cyberattack over the past 12 months that involved a third-party accessing their network, according to Imprivata and the Ponemon Institute. Third-party security incidents persist Notably, 64% of respondents say these types of third-party

React to this headline:

Loading spinner

Inconsistent security strategies fuel third-party threats Read More »

Lawyers face judge’s wrath after AI cites made-up cases in fiery hoverboard lawsuit

Lawyers face judge’s wrath after AI cites made-up cases in fiery hoverboard lawsuit 2025-02-14 at 06:16 By Thomas Claburn Talk about court red-handed Demonstrating yet again that uncritically trusting the output of generative AI is dangerous, attorneys involved in a product liability lawsuit have apologized to the presiding judge for submitting documents that cite non-existent

React to this headline:

Loading spinner

Lawyers face judge’s wrath after AI cites made-up cases in fiery hoverboard lawsuit Read More »

New infosec products of the week: February 14, 2025

New infosec products of the week: February 14, 2025 2025-02-14 at 06:03 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from Armor, EchoMark, Netwrix, Palo Alto Networks, and Socure. Palo Alto Networks Cortex Cloud applies AI-driven insights to reduce risk and prevent threats Palo Alto

React to this headline:

Loading spinner

New infosec products of the week: February 14, 2025 Read More »

Scroll to Top