spot_img

Global

Russian Hackers Target Email and VPN Flaws to Infiltrate Ukraine Aid Operations

Cyber Espionage by Russian APT28: Targeting Western Logistics and Technology Entities In recent developments, the cyber landscape has been significantly impacted by a state-sponsored campaign...

FBI and Europol Take Down Lumma Stealer Malware Network Behind 10 Million Infections

Disruption of Lumma Stealer Malware: A Major Operation in Cybersecurity Overview of the Operation A significant global effort spearheaded by law enforcement agencies and various private...

Serious Versa Concerto Vulnerabilities Allow Attackers to Escape Docker and Compromise Hosts

May 22, 2025Ravie LakshmananVulnerability / Software Security Critical Security Flaws in Versa Concerto Platform Recent investigations by cybersecurity experts have revealed significant security vulnerabilities in the...

PumaBot: New Botnet Aims at Linux IoT Devices to Hijack SSH Credentials and Mine Cryptocurrency

New PumaBot Botnet Targets Embedded Linux IoT Devices Overview of PumaBot A new botnet named PumaBot is specifically targeting embedded Linux-based Internet of Things (IoT) devices,...

Microsoft OneDrive Flaw Allows Apps Full Cloud Access with Single File Upload

Security Flaw Discovered in Microsoft OneDrive File Picker Published on May 28, 2025 by Ravie Lakshmanan Tags: Data Privacy, Vulnerability A Serious Security Vulnerability Recent findings from cybersecurity...

APT41 Targets Google Calendar for Malware Control Operations

APT41’s Innovative Malware Tactics Exposed On May 29, 2025, Google reported a significant cybersecurity breach linked to the Chinese state-sponsored group known as APT41. This...

Critical Linux Vulnerabilities Enable Password Hash Theft in Ubuntu, RHEL, and Fedora

May 31, 2025Ravie LakshmananVulnerability / Linux New Vulnerabilities Uncovered in Linux Systems Two significant information disclosure vulnerabilities have...

U.S. Justice Department Targets and Seizes Four Domains Linked to Cybercrime Crypting Services

Major Takedown of Cybercrime Syndicate: Global Law Enforcement Action On May 27, 2025, a significant operation by multinational law enforcement successfully dismantled an online cybercrime...

Meta Disrupts Fake Persona Influence Operations in Romania, Azerbaijan, and Taiwan

Meta Disrupts Covert Influence Operations Across Multiple Countries On Thursday, Meta unveiled significant findings related to covert influence operations that have been traced back to...

ConnectWise Cyberattack: Nation-State Actor Suspected in Targeted Breach

ConnectWise Investigates Cyber Attack on ScreenConnect Date: May 30, 2025 Author: Ravie Lakshmanan Tags: Vulnerability, Data Breach Overview of the Incident ConnectWise, known for its remote access and support...

Transforming Healthcare: A CISO’s Journey to Modern Care

Breaking Out of the Security Mosh Pit: A Transformation in Healthcare IT In the fast-paced world of healthcare technology, change isn't just a goal—it's a...

China-Linked Hackers Target SAP and SQL Server Vulnerabilities in Asia and Brazil

Rising Cyber Threats: The Impact of Earth Lamia on Businesses Worldwide In recent months, an alarming trend has emerged from the cyber landscape involving a...
spot_img

Recent Articles