Cybersec Feeds Overview, Feb 17 - Feb 23, 2025 #
This brief consolidates key updates from 80+ sources, including government organizations, cybersecurity vendors, threat intelligence teams, security research labs, and blogs from cybersecurity communities and professionals. It highlights the most significant threats, vulnerabilities, and developments from the past week to keep you informed.
TLDR Summary #
⚠️ Vulnerabilities
- Microsoft Power Pages vulnerability (CVE‑2025‑24989, CVSS 8.2) that allows improper access control – now listed in CISA’s KEV catalog.
- Palo Alto Networks PAN‑OS File Read vulnerability (CVE‑2025‑0111) exploited to gain unauthorized access.
- Craft CMS Code Injection vulnerability (CVE‑2025‑23209) that permits remote code execution through manipulated inputs.
- OpenSSH vulnerabilities (CVE‑2025‑26465 and CVE‑2025‑26466) exposing systems to man‑in‑the‑middle attacks and denial‐of‑service, with additional issues observed in Juniper Networks’ devices.
- Multiple vulnerabilities in the NVIDIA CUDA Toolkit (including CVE‑2024‑53870 to CVE‑2024‑53878) affecting tools used for analyzing CUDA binary (cubin) files.
💥 Incidents
- Bybit cryptocurrency exchange suffered a breach resulting in over $1.4 billion in ETH being stolen from an offline (cold) wallet.
- Health Net Federal Services and its parent Centene Corporation reached an $11+ million settlement over alleged cybersecurity lapses in fulfilling defense contract obligations.
- Warby Parker was fined approximately $1.5 million by the U.S. Department of Health and Human Services after a credential stuffing attack compromised customer health data.
- A data breach at DM Clinical Research exposed over 1.6 million medical survey records containing personal health information.
- Ransomware attacks by the Ghost (Cring) ransomware group have impacted organizations in more than 70 countries.
📈 Emerging threats
- The Ghost ransomware (also known as Cring, Crypt3r, etc.) continues to exploit known, long‑patched vulnerabilities on internet‑facing servers for financial gain.
- ACRStealer malware is emerging by leveraging legitimate Google Docs communications as its command‑and‑control channel to exfiltrate credentials.
- New infostealer variants such as FrigidStealer are targeting macOS (as well as Windows and Android) via fake browser update prompts.
- The Darcula 3.0 phishing kit now automatically generates counterfeit websites for any brand, signaling increased automation in phishing campaigns.
- Jailbreaking techniques against large language models are exposing vulnerabilities in popular generative AI web products.
📋 Regulatory and policy updates
- In response to a reported legal order, Apple has removed its Advanced Data Protection (ADP) feature for new iCloud users in the U.K., raising significant privacy concerns.
- The SEC has rebranded its cryptocurrency unit to focus on combatting cyber‑related misconduct and emerging technology threats.
- Ongoing legal discussions and guidelines under GDPR and CCPA empower individuals to sue companies for data misuse and privacy violations.
- Broader policy debates and evolving regulatory frameworks continue to shape cybersecurity and AI deployment standards.
🛠️ Security Operations
- Rapid7 and Intezer have introduced AI‑powered SIEM features and predictive vulnerability scoring methods to improve incident response and reduce human triage costs.
- Metasploit Framework has been updated with new exploit modules and improved fetch payload support for multiple architectures (including PPC, MIPS, and ARM).
- Tools such as txt2stix have advanced to incorporate AI‑based extraction of indicators of compromise (IoCs) and tactics, techniques and procedures (TTPs) for effective threat analysis.
🥳 Wins
- Cisco’s research into Salt Typhoon exploits has provided clear patch recommendations and improved detection measures, reinforcing effective remediation practices.
- Microsoft successfully patched its Power Pages zero‑day and continues to secure its services
- Advancements in AI‑driven SIEM and SOC technologies have begun to lower operational costs and improve threat detection efficiency across organizations.
Gov Feeds #
The Ghost ransomware group, also known as Cring, is exploiting well-known CVEs to target outdated internet-facing services in organizations across multiple sectors globally, including critical infrastructure and healthcare. CISA and partners have released relevant indicators of compromise and tactics, techniques, and procedures (CISA and Partners Release Advisory on Ghost (Cring) Ransomware, #StopRansomware: Ghost (Cring) Ransomware).
CISA has identified several industrial control systems vulnerabilities affecting products from vendors like ABB, Siemens, and Elseta, including high severity vulnerabilities such as hard-coded credentials and command injection with remote exploitability (ABB ASPECT-Enterprise, NEXUS, and MATRIX Series, Elseta Vinci Protocol Analyzer).
CISA has added multiple new vulnerabilities to its Known Exploited Vulnerabilities Catalog, highlighting ongoing threats from vulnerabilities in Microsoft, Palo Alto Networks, and CMS systems, which are actively exploited in the wild (CISA Adds One Known Exploited Vulnerability to Catalog, CISA Adds Two Known Exploited Vulnerabilities to Catalog).
The cybersecurity landscape for critical digital infrastructure remains under heightened threat from cybercrime and state-sponsored actors. Reports highlight increased activity targeting healthcare and other critical sectors, with ransomware as a significant threat (Building a Collective Defense: Collaborative Threat Intelligence and Information Sharing for Critical Infrastructure, Health-ISAC 2025 Health Sector Cyber Threat Landscape).
A significant backdoor was discovered in Contec CMS8000 vital sign monitors, which presents a risk due to its connection to a Chinese government-funded network, posing privacy and safety concerns for affected devices used globally (The Alarming Backdoor Hiding in 2 Chinese Patient Monitors).
Europol has identified key challenges in combating cybercrime, including issues with data volume, loss, and access, anonymization services, and international cooperation hurdles, indicating areas needing focused efforts in cybersecurity strategy and policy (Common Challenges in Cybercrime).
With anticipated developments in cybersecurity efforts, the FBI plans to integrate emerging technologies such as AI to bolster defenses against cyber threats, particularly focusing on patch management and critical infrastructure protection (The Year Ahead: FBI’s 2025 Cybersecurity Priorities).
The SSSCIP highlights the importance of strengthening critical infrastructure cybersecurity defenses, with particular emphasis on threats posed by Russian state actors employing low-complexity brute force techniques against exposed operational technology devices (CTO at NCSC Summary: week ending February 23rd).
Articles (21)
- CISA Adds One Known Exploited Vulnerability to Catalog by All CISA Advisories on Fri, 21 Feb 25 12:00:00 +0000
- CISA Adds Two Known Exploited Vulnerabilities to Catalog by All CISA Advisories on Thu, 20 Feb 25 12:00:00 +0000
- Medixant RadiAnt DICOM Viewer by All CISA Advisories on Thu, 20 Feb 25 12:00:00 +0000
- ABB ASPECT-Enterprise, NEXUS, and MATRIX Series by All CISA Advisories on Thu, 20 Feb 25 12:00:00 +0000
- CISA Releases Seven Industrial Control Systems Advisories by All CISA Advisories on Thu, 20 Feb 25 12:00:00 +0000
- ABB FLXEON Controllers by All CISA Advisories on Thu, 20 Feb 25 12:00:00 +0000
- Elseta Vinci Protocol Analyzer by All CISA Advisories on Thu, 20 Feb 25 12:00:00 +0000
- Rapid Response Monitoring My Security Account App by All CISA Advisories on Thu, 20 Feb 25 12:00:00 +0000
- Siemens SiPass Integrated by All CISA Advisories on Thu, 20 Feb 25 12:00:00 +0000
- CISA and Partners Release Advisory on Ghost (Cring) Ransomware by All CISA Advisories on Wed, 19 Feb 25 12:00:00 +0000
- #StopRansomware: Ghost (Cring) Ransomware by All CISA Advisories on Wed, 19 Feb 25 12:00:00 +0000
- CISA Adds Two Known Exploited Vulnerabilities to Catalog by All CISA Advisories on Tue, 18 Feb 25 12:00:00 +0000
- CISA Releases Two Industrial Control Systems Advisories by All CISA Advisories on Tue, 18 Feb 25 12:00:00 +0000
- CTO at NCSC Summary: week ending February 23rd by CTO at NCSC - Cyber Defence Analysis on Sat, 22 Feb 2025 08:43:23 GMT
- Building a Collective Defense: Collaborative Threat Intelligence and Information Sharing for Critical Infrastructure by Health-ISAC – Health Information Sharing and Analysis Center on Fri, 21 Feb 2025 23:20:37 +0000
- Healthcare Heartbeat 2024 Q4 by Health-ISAC – Health Information Sharing and Analysis Center on Thu, 20 Feb 2025 15:19:20 +0000
- Health-ISAC Hacking Healthcare 2-19-2025 by Health-ISAC – Health Information Sharing and Analysis Center on Wed, 19 Feb 2025 23:14:22 +0000
- Podcast: Reflecting on the Change Healthcare cyberattack by Health-ISAC – Health Information Sharing and Analysis Center on Wed, 19 Feb 2025 19:30:40 +0000
- Senate Confirms Trump Pick RFK Jr. to Lead HHS by Health-ISAC – Health Information Sharing and Analysis Center on Wed, 19 Feb 2025 12:15:04 +0000
- The Alarming Backdoor Hiding in 2 Chinese Patient Monitors by Health-ISAC – Health Information Sharing and Analysis Center on Tue, 18 Feb 2025 12:27:39 +0000
- Health-ISAC 2025 Health Sector Cyber Threat Landscape by Health-ISAC – Health Information Sharing and Analysis Center on Tue, 18 Feb 2025 10:00:17 +0000
Vendor Feeds #
The ransomware group Ghost continues to exploit known vulnerabilities in outdated software, as detailed in joint advisories from the U.S. CISA and the FBI. Targeting has included exploits for vulnerabilities like CVE-2018-13379 and CVE-2021-34473 among others, impacting organizations across more than 70 countries (Cybersecurity Snapshot: Ghost Ransomware Group Targets Known Vulns).
The cryptocurrency exchange Bybit experienced a substantial cyber heist, resulting in the theft of over $1.4 billion in Ethereum, attributing the incident to a sophisticate attack while transferring funds from cold to warm wallets (Hackers drained $1.4 billion of cryptocurrency from Bybit exchange, CEO confirms, The Bybit Incident: When Research Meets Reality).
Black Basta gang’s internal communications were leaked, revealing internal discord potentially linked to Russian bank attacks. The leak exposed operational details, including Indicators of Compromise (IoCs) and tactics, techniques, and procedures (TTPs) (Black Basta’s Internal Chats Leak: Everything You Need to Know).
Microsoft disclosed a high-severity zero-day vulnerability (CVE-2025-24989) in its Power Pages platform, potentially allowing unauthorized privilege escalations. This has been fixed, and affected customers have been notified (Microsoft Patches Power Pages Zero-Day (CVE-2025-24989) & Recent PAN-OS Flaw (CVE-2025-0111) Joins CISA KEV).
Cisco’s IOS XE vulnerabilities (CVE-2023-20198 and CVE-2023-20273) are actively exploited by the APT group Salt Typhoon, targeting global telecommunications networks with privilege escalation and code execution capabilities (Chinese APT Exploits Cisco IOS XE Vulnerabilities).
Recent cybersecurity findings indicate escalating ransomware campaigns targeting Microsoft Teams environments. Tactics involve exploiting system settings and leveraging social engineering attacks to deploy ransomware (A New Wave of Ransomware Campaigns Targeting Microsoft Teams).
The Cybersecurity and Infrastructure Security Agency (CISA) issued fresh warnings about manipulative vulnerabilities in Juniper Networks and OpenSSH. Flaws include severe vulnerabilities that could allow unauthorized access and session hijacks (Security Flaws in OpenSSH and Juniper Networks Demand Action).
Cyber police arrested Poland’s former justice minister for alleged responsibility in government spyware abuses. This follows a broader investigation into abuses of spyware tech by the previous ruling party (Top Polish anti-corruption official resigns amid spyware probe).
Articles (77)
- Android Malware & Security Issue 3st Week of February, 2025 by ASEC on Thu, 20 Feb 2025 15:00:00 +0000
- Weekly Detection Rule (YARA and Snort) Information – Week 3, February 2025 by ASEC on Tue, 18 Feb 2025 15:00:00 +0000
- Is My Personal Information Safe? How to Immediately Check Information Leaked to Telegram by ASEC on Tue, 18 Feb 2025 15:00:00 +0000
- LummaC2 Malware Distributed Disguised as Total Commander Crack by ASEC on Tue, 18 Feb 2025 15:00:00 +0000
- ACRStealer Infostealer Exploiting Google Docs as C2 by ASEC on Mon, 17 Feb 2025 15:00:00 +0000
- Rhadamanthys Infostealer Being Distributed Through MSC Extension by ASEC on Mon, 17 Feb 2025 15:00:00 +0000
- Ransomware 2025: Attacks Keep Rising as Threat Shows its Resilience by Broadcom Software Blogs on Thu, 20 Feb 2025 11:00:00 +0000
- Evaluating Email Security Services: Methods, Challenges and Best Practices by Broadcom Software Blogs on Wed, 19 Feb 2025 17:27:25 +0000
- Extending Adaptive Protection to On-Premise Environments by Broadcom Software Blogs on Mon, 17 Feb 2025 16:00:00 +0000
- The Bybit Incident: When Research Meets Reality by Check Point Research on Sun, 23 Feb 2025 16:18:27 +0000
- The Cat and Mouse Game: Exploiting Statistical Weaknesses in Human Interaction Anti-Evasions by Check Point Research on Thu, 20 Feb 2025 14:58:21 +0000
- 17th February – Threat Intelligence Report by Check Point Research on Mon, 17 Feb 2025 12:02:40 +0000
- Your Endpoint Is Secure Against AI Supply Chain Attacks by Security @ Cisco Blogs on Thu, 20 Feb 2025 13:00:11 +0000
- Meet the Cybersecurity Defender of 2025 for EMEA by Security @ Cisco Blogs on Mon, 17 Feb 2025 08:30:00 +0000
- Helping civil society monitor cyber attacks with the CyberPeaceTracer and Cloudflare Email Security by The Cloudflare Blog on Mon, 17 Feb 2025 14:00:00 GMT
- txt2stix: A Quick Start Guide to the New Features by dogesec on 2025-02-17T00:00:00+00:00
- Fake job offers target software developers with infostealers by WeLiveSecurity on Thu, 20 Feb 2025 14:11:28 +0000
- No, you’re not fired – but beware of job termination scams by WeLiveSecurity on Tue, 18 Feb 2025 10:00:00 +0000
- Katharine Hayhoe: The most important climate equation | Starmus highlights by WeLiveSecurity on Mon, 17 Feb 2025 10:00:00 +0000
- DeceptiveDevelopment targets freelance developers by WeLiveSecurity on Thu, 20 Feb 2025 10:00:00 +0000
- FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant by Fortinet Threat Research Blog on Tue, 18 Feb 2025 14:00:00 +0000
- 3 Critical Metrics for Evaluating AI SOC Solutions by The SecOps Automation Blog from Intezer on Tue, 18 Feb 2025 12:00:00 +0000
- Angry Likho: Old beasts in a new forest by Securelist on Fri, 21 Feb 2025 10:00:21 +0000
- Managed detection and response in 2024 by Securelist on Thu, 20 Feb 2025 08:00:24 +0000
- Spam and phishing in 2024 by Securelist on Wed, 19 Feb 2025 10:00:31 +0000
- StaryDobry ruins New Year’s Eve, delivering miner instead of presents by Securelist on Tue, 18 Feb 2025 10:00:49 +0000
- The Quiet Data Leak from GenAI by LevelBlue Blogs on 2025-02-20T07:00:00+00:00
- vCISO Program Leadership and Organizational Change Management as a Service: HITRUST CSF Implementation by LevelBlue Blogs on 2025-02-19T07:00:00+00:00
- Enhancing Accessibility and Managing Access Control for a Hybrid Workforce by LevelBlue Blogs on 2025-02-18T07:00:00+00:00
- Healthcare security lapses keep piling up by Malwarebytes on Fri, 21 Feb 2025 16:17:25 GMT
- SecTopRAT bundled in Chrome installer distributed via Google Ads by Malwarebytes on Thu, 20 Feb 2025 20:27:44 GMT
- Google Docs used by infostealer ACRStealer as part of attack by Malwarebytes on Thu, 20 Feb 2025 15:49:44 GMT
- DeepSeek found to be sharing user data with TikTok parent company ByteDance by Malwarebytes on Thu, 20 Feb 2025 14:23:29 GMT
- Malwarebytes introduces native ARM support for Windows devices by Malwarebytes on Wed, 19 Feb 2025 14:00:00 GMT
- Google now allows digital fingerprinting of its users by Malwarebytes on Wed, 19 Feb 2025 13:40:25 GMT
- Macs targeted by infostealers in new era of cyberthreats by Malwarebytes on Wed, 19 Feb 2025 12:51:51 GMT
- Hard drives containing sensitive medical data found in flea market by Malwarebytes on Tue, 18 Feb 2025 20:57:01 GMT
- A week in security (February 10 – February 16) by Malwarebytes on Mon, 17 Feb 2025 08:12:18 GMT
- Microsoft at Legalweek: Help safeguard your AI future with Microsoft Purview by Microsoft Security Blog on Thu, 20 Feb 2025 17:00:00 +0000
- Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms by Microsoft Security Blog on Wed, 19 Feb 2025 17:00:00 +0000
- Join us for the end-to-end Microsoft RSAC 2025 Conference experience by Microsoft Security Blog on Tue, 18 Feb 2025 17:00:00 +0000
- CVE-2025-21325 Windows Secure Kernel Mode Elevation of Privilege Vulnerability by MSRC Security Update Guide on Fri, 21 Feb 2025 08:00:00 Z
- Chromium: CVE-2025-0999 Heap buffer overflow in V8 by MSRC Security Update Guide on Fri, 21 Feb 2025 08:00:38 Z
- Chromium: CVE-2025-1006 Use after free in Network by MSRC Security Update Guide on Fri, 21 Feb 2025 08:00:43 Z
- Chromium: CVE-2025-1426 Heap buffer overflow in GPU by MSRC Security Update Guide on Fri, 21 Feb 2025 08:00:46 Z
- CVE-2025-24989 Microsoft Power Pages Elevation of Privilege Vulnerability by MSRC Security Update Guide on Fri, 21 Feb 2025 08:00:00 Z
- CVE-2025-21401 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability by MSRC Security Update Guide on Fri, 21 Feb 2025 08:00:00 Z
- CVE-2025-21355 Microsoft Bing Remote Code Execution Vulnerability by MSRC Security Update Guide on Wed, 19 Feb 2025 08:00:00 Z
- CVE-2025-24989 Microsoft Power Pages Elevation of Privilege Vulnerability by MSRC Security Update Guide on Wed, 19 Feb 2025 08:00:00 Z
- MITRE ATT&CK Evaluations — Cortex XDR Among Elite in Endpoint Security by Palo Alto Networks Blog on Wed, 19 Feb 2025 19:20:11 +0000
- Curb Healthcare Costs — Can Cybersecurity Platformization Help? by Palo Alto Networks Blog on Tue, 18 Feb 2025 13:00:47 +0000
- Investigating LLM Jailbreaking of Popular Generative AI Web Products by Unit 42 on Fri, 21 Feb 2025 11:00:51 +0000
- Stately Taurus Activity in Southeast Asia Links to Bookworm Malware by Unit 42 on Thu, 20 Feb 2025 11:00:23 +0000
- Multiple Vulnerabilities Discovered in NVIDIA CUDA Toolkit by Unit 42 on Wed, 19 Feb 2025 14:15:32 +0000
- Proofpoint ranked #1 in Four out of Five Use Cases in the 2025 Gartner® Critical Capabilities™ Report for Email Security Platforms by Proofpoint News Feed on 19 Feb 2025 02:03:27
- Metasploit Weekly Wrap-Up 02/21/2025 by Rapid7 Cybersecurity Blog on Fri, 21 Feb 2025 21:27:41 GMT
- Take Command | Rapid7’s 2025 Cybersecurity Summit: First Look at Our Speaker Lineup by Rapid7 Cybersecurity Blog on Wed, 19 Feb 2025 18:00:00 GMT
- Rapid7 Fills Gaps in the CVE Assessment Process with AI-Generated Vulnerability Scoring in Exposure Command by Rapid7 Cybersecurity Blog on Wed, 19 Feb 2025 14:00:00 GMT
- GOP megadonor becomes new Clearview AI co-CEO by The Record from Recorded Future News on Fri, 21 Feb 2025 20:38:53 GMT
- Hackers drained $1.4 billion of cryptocurrency from Bybit exchange, CEO confirms by The Record from Recorded Future News on Fri, 21 Feb 2025 19:49:06 GMT
- Top Polish anti-corruption official resigns amid spyware probe by The Record from Recorded Future News on Fri, 21 Feb 2025 19:13:18 GMT
- Feds fine Warby Parker $1.5 million for failing to protect customer health data by The Record from Recorded Future News on Fri, 21 Feb 2025 17:42:06 GMT
- Apple turns off iCloud encryption feature in UK following reported government legal order by The Record from Recorded Future News on Fri, 21 Feb 2025 15:59:47 GMT
- RST TI Report Digest: 17 Feb 2025 by Stories by RST Cloud on Medium on Mon, 17 Feb 2025 01:54:06 GMT
- Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2025 by SOCRadar® Cyber Intelligence Inc. on Fri, 21 Feb 2025 13:30:00 +0000
- Black Basta’s Internal Chats Leak: Everything You Need to Know by SOCRadar® Cyber Intelligence Inc. on Fri, 21 Feb 2025 12:00:17 +0000
- Microsoft Patches Power Pages Zero-Day (CVE-2025-24989) & Recent PAN-OS Flaw (CVE-2025-0111) Joins CISA KEV by SOCRadar® Cyber Intelligence Inc. on Fri, 21 Feb 2025 10:49:05 +0000
- Chinese APT Exploits Cisco IOS XE Vulnerabilities (CVE-2023-20198 & CVE-2023-20273) in Global Attacks by SOCRadar® Cyber Intelligence Inc. on Thu, 20 Feb 2025 12:44:33 +0000
- Best Secure Browsers for 2025: A Comparison Guide by SOCRadar® Cyber Intelligence Inc. on Thu, 20 Feb 2025 10:15:57 +0000
- Security Flaws in OpenSSH and Juniper Networks Demand Action (CVE-2025-26465, CVE-2025-26466, and CVE-2025-21589) by SOCRadar® Cyber Intelligence Inc. on Wed, 19 Feb 2025 10:44:44 +0000
- Protect Your Social Media Data from AI Training: Opt-Out Options & Privacy Tips by SOCRadar® Cyber Intelligence Inc. on Tue, 18 Feb 2025 13:21:33 +0000
- A New Wave of Ransomware Campaigns Targeting Microsoft Teams by SOCRadar® Cyber Intelligence Inc. on Tue, 18 Feb 2025 11:32:21 +0000
- Alarming Dark Web Leak: B1ack’s Stash Releases 4 Million Stolen Credit Cards for Free by SOCRadar® Cyber Intelligence Inc. on Tue, 18 Feb 2025 08:40:58 +0000
- EagerBee: Advanced Backdoor Attacks on Middle Eastern Governments and ISPs by SOCRadar® Cyber Intelligence Inc. on Mon, 17 Feb 2025 13:33:55 +0000
- Don’t Touch That Object! Finding SACL Tripwires During Red Team Ops by Posts By SpecterOps Team Members - Medium on Thu, 20 Feb 2025 14:33:48 GMT
- Cybersecurity Snapshot: Ghost Ransomware Group Targets Known Vulns, CISA Warns, While Report Finds Many Cyber Pros Want To Switch Jobs by Tenable Blog on Fri, 21 Feb 2025 09:00:00 -0500
- How To Reduce DNS Infrastructure Risk To Secure Your Cloud Attack Surface by Tenable Blog on Wed, 19 Feb 2025 09:00:00 -0500
News Feeds #
Salt Typhoon, a state-backed Chinese threat group, exploited Cisco vulnerabilities to attack U.S. telecom networks, gaining initial access primarily through misuse of legitimate credentials (Salt Typhoon Hackers Exploit Cisco Vulnerability to Gain Access To U.S. Telecom Networks, Salt Typhoon gained initial access to telecoms through Cisco devices).
Russian state-sponsored threat groups are conducting phishing attacks targeting Signal accounts, compromising secure communications of Ukrainian military and government personnel (Russia-aligned threat groups dupe Ukrainian targets via Signal, Russian State-Backed Hackers Intensify Attacks on Signal Messenger Accounts).
Bybit, a major cryptocurrency exchange, suffered a $1.4 billion breach attributed to North Korea’s Lazarus Group, linking the hack to previous Phemex and BingX attacks (Hacker steals record $1.46 billion from Bybit ETH cold wallet, Investigators Link $1.4B Bybit Hack to North Korea’s Lazarus Group).
Health Net Federal Services agreed to an $11M settlement over alleged cybersecurity compliance failures with DoD, highlighting the growing enforcement of cybersecurity protocols for federal contractors (US healthcare org pays $11M settlement over alleged cybersecurity lapses, Health Net, Centene Settle Cybersecurity Fraud Allegations with $11M Payout).
Apple removed its Advanced Data Protection feature from UK services following a government request for a backdoor, raising concerns about future encryption policies (Apple pulls end-to-end encryption feature from UK after demands for law enforcement access, Apple removes advanced data protection tool in face of UK government request).
CISA flagged a new critical vulnerability in Craft CMS being actively exploited in the wild, underlining the ongoing risk from unpatched software (CISA flags Craft CMS code injection flaw as exploited in attacks).
U.S. cybersecurity discourse emphasizes the need for enhanced offensive cyber strategies to counter adversaries, noting a shift to more kinetic impact potential of cyber operations (Former NSA, Cyber Command chief Paul Nakasone says U.S. falling behind its enemies in cyberspace).
The SEC rebranded its Crypto Assets Unit to the “Cyber and Emerging Technologies Unit,” raising concerns about possibly deprioritizing cryptocurrency enforcement (SEC rebrands cryptocurrency unit to focus on emerging technologies).
Darktrace identified critical vulnerabilities in edge devices from Palo Alto Networks and Fortinet, exploited throughout 2024, emphasizing persistent risks in network infrastructure (Edge device vulnerabilities fueled attack sprees in 2024).
Articles (124)
- Beware: PayPal “New Address” feature abused to send phishing emails by BleepingComputer on Sat, 22 Feb 2025 16:01:57 -0500
- Fake CS2 tournament streams used to steal crypto, Steam accounts by BleepingComputer on Sat, 22 Feb 2025 10:17:27 -0500
- Google Chrome disables uBlock Origin for some in Manifest v3 rollout by BleepingComputer on Fri, 21 Feb 2025 16:23:36 -0500
- SpyLend Android malware downloaded 100,000 times from Google Play by BleepingComputer on Fri, 21 Feb 2025 13:45:23 -0500
- Hacker steals record $1.46 billion from Bybit ETH cold wallet by BleepingComputer on Fri, 21 Feb 2025 11:41:59 -0500
- CISA flags Craft CMS code injection flaw as exploited in attacks by BleepingComputer on Fri, 21 Feb 2025 10:57:50 -0500
- Apple pulls iCloud end-to-end encryption feature in the UK by BleepingComputer on Fri, 21 Feb 2025 10:40:22 -0500
- Apiiro unveils free scanner to detect malicious code merges by BleepingComputer on Thu, 20 Feb 2025 16:04:40 -0500
- Black Basta ransomware gang’s internal chat logs leak online by BleepingComputer on Thu, 20 Feb 2025 15:48:32 -0500
- US healthcare org pays $11M settlement over alleged cybersecurity lapses by BleepingComputer on Thu, 20 Feb 2025 13:47:21 -0500
- Chinese hackers use custom malware to spy on US telecom networks by BleepingComputer on Thu, 20 Feb 2025 11:11:59 -0500
- How Birmingham’s $48M Oracle ERP project turned into an epic failure by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 12:13:56 +0000
- AI humanoid robots inch their way toward the workforce by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 10:01:00 +0000
- Better student housing with a unified data platform by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 10:00:00 +0000
- AMA acelera su plan de transformación digital con especial impulso a la sostenibilidad by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 08:27:30 +0000
- Eurofirms acelera los procesos de selección mediante IA generativa by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 07:52:42 +0000
- 칼럼 | 빅데이터에 어려움 겪는 HR 전문가가 던져야 할 질문 3가지 by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 07:50:11 +0000
- 줌의 아성 못 뚫은 아마존··· 7년 만에 화상회의 서비스 ‘차임’ 폐기 by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 07:43:25 +0000
- Bosch impulsa ‘6G Smart’ para mejorar la inspección visual de sus líneas de producción by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 07:28:36 +0000
- CIOs in Dubai discuss the AI-Ready IT team of tomorrow by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 07:02:11 +0000
- 나만의 보급형 스마트폰 길 간다··· 아이폰 16‘e’ 한 글자가 말하는 애플의 전략 by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 06:53:17 +0000
- AI 여정의 걸림돌··· ‘레거시 앱’과 씨름하는 기업들 by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 05:49:11 +0000
- ‘기업이 전력 해결책 마련해야…’ 데이터센터 몰린 아일랜드, 새 권고안 발표 by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 05:27:33 +0000
- 스노우플레이크, ‘코텍스 에이전트’ 출시··· “전문가 없이도 효과적으로 데이터 관리” by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 05:16:53 +0000
- INE Security’s Cybersecurity and IT Training Enhances Career Stability in Tech by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 02:44:48 +0000
- “어제 했던 말 기억하지?”··· 구글 제미나이, 대화 기억 기능으로 맞춤형 서비스 강화 by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 02:38:44 +0000
- 옥스포드 연구진, ‘양자 순간이동’ 이용한 분산형 양자 컴퓨팅 시연 by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 02:14:22 +0000
- 솔트웨어-케이토 네트웍스 맞손··· AWS 마켓플레이스 ISV 사업 본격화 by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 02:00:04 +0000
- 퍼플렉시티, ‘검열-프리’ 딥시크 R1 변종 공개 by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 01:33:13 +0000
- 스토리텔링에서 이력서 작성까지··· 구글, 실험적 AI 구직 서비스 공개 by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Fri, 21 Feb 2025 00:56:55 +0000
- Download our CIO Pulse AI priorities survey by How Birmingham’s $48M Oracle ERP project turned into an epic failure | CIO on Thu, 20 Feb 2025 18:23:11 +0000
- Former NSA, Cyber Command chief Paul Nakasone says U.S. falling behind its enemies in cyberspace by CyberScoop on Sat, 22 Feb 2025 19:34:41 +0000
- Top House E&C Republicans query public for ideas on data privacy law by CyberScoop on Fri, 21 Feb 2025 23:40:36 +0000
- Apple pulls end-to-end encryption feature from UK after demands for law enforcement access by CyberScoop on Fri, 21 Feb 2025 19:10:30 +0000
- No, that’s not the acting head of the Social Security Administration. That’s a former CISA employee. by CyberScoop on Fri, 21 Feb 2025 16:21:47 +0000
- Salt Typhoon gained initial access to telecoms through Cisco devices by CyberScoop on Thu, 20 Feb 2025 22:31:36 +0000
- SEC rebrands cryptocurrency unit to focus on emerging technologies by CyberScoop on Thu, 20 Feb 2025 21:45:11 +0000
- Russia-aligned threat groups dupe Ukrainian targets via Signal by CyberScoop on Wed, 19 Feb 2025 21:20:40 +0000
- Energy CISO: Agencies can’t implement zero trust alone by CyberScoop on Wed, 19 Feb 2025 21:00:53 +0000
- Salt Typhoon telecom breach remarkable for its ‘indiscriminate’ targeting, FBI official says by CyberScoop on Wed, 19 Feb 2025 20:11:47 +0000
- Edge device vulnerabilities fueled attack sprees in 2024 by CyberScoop on Wed, 19 Feb 2025 12:01:00 +0000
- Top 10 Best Ransomware Protection Tools – 2025 by Cyber Security News on Sun, 23 Feb 2025 17:55:01 +0000
- 10 Best Email Security Gateways In 2025 by Cyber Security News on Sun, 23 Feb 2025 17:18:51 +0000
- 50 World’s Best Penetration Testing Companies – 2025 by Cyber Security News on Sun, 23 Feb 2025 17:11:23 +0000
- BlackBastaGPT – A ChatGPT Powered Tool to Uncover Ransomware Group Tactics by Cyber Security News on Sun, 23 Feb 2025 02:12:08 +0000
- Salt Typhoon Hackers Exploit Cisco Vulnerability To Gain Access To U.S. Telecom Networks by Cyber Security News on Sat, 22 Feb 2025 04:59:30 +0000
- Auto-Generated Password Vulnerability In Sitevision Leaks Signing Key by Cyber Security News on Fri, 21 Feb 2025 19:28:33 +0000
- China Claim That NSA Allegedly Hacked Northwestern Polytechnical University by Cyber Security News on Fri, 21 Feb 2025 16:22:20 +0000
- ACRStealer Malware Exploiting Google Docs as C2 To Steal Login Credentials by Cyber Security News on Fri, 21 Feb 2025 15:56:16 +0000
- Darcula 3.0 Tool Automatically Generates Phishing Kit For Any Brand by Cyber Security News on Fri, 21 Feb 2025 15:21:35 +0000
- CL0P Ransomware Attacking Telecommunications & Healthcare Sectors In Large Scale by Cyber Security News on Fri, 21 Feb 2025 13:27:57 +0000
- Black Basta Goes Dark Amid Infighting, Chat Leaks Show by darkreading on Fri, 21 Feb 2025 21:58:33 GMT
- Cisco Confirms Salt Typhoon Exploitation in Telecom Hits by darkreading on Fri, 21 Feb 2025 18:11:02 GMT
- Nations Open ‘Data Embassies’ to Protect Critical Info by darkreading on Fri, 21 Feb 2025 16:49:36 GMT
- 4 Low-Cost Ways to Defend Your Organization Against Deepfakes by darkreading on Fri, 21 Feb 2025 15:00:00 GMT
- Data Suggests It’s Time to Rethink Cloud Permissions by darkreading on Thu, 20 Feb 2025 22:28:09 GMT
- Ghost Ransomware Targets Orgs in 70+ Countries by darkreading on Thu, 20 Feb 2025 19:26:50 GMT
- Google Adds Quantum-Resistant Digital Signatures to Cloud KMS by darkreading on Thu, 20 Feb 2025 17:00:22 GMT
- ZEST Security’s Cloud Risk Exposure Impact Report Reveals 62% of Incidents are Related to Risks Known to the Organization by darkreading on Thu, 20 Feb 2025 16:14:06 GMT
- When Brand Loyalty Trumps Data Security by darkreading on Thu, 20 Feb 2025 15:00:00 GMT
- Signs Your Organization’s Culture Is Hurting Your Cybersecurity by darkreading on Thu, 20 Feb 2025 13:48:27 GMT
- ‘Darcula’ Phishing Kit Can Now Impersonate Any Brand by darkreading on Thu, 20 Feb 2025 11:00:00 GMT
- Australian Critical Infrastructure Faces ‘Acute’ Foreign Threats by darkreading on Thu, 20 Feb 2025 02:00:00 GMT
- Insight Partners, VC Giant, Falls to Social Engineering by darkreading on Wed, 19 Feb 2025 22:59:17 GMT
- Russian Groups Target Signal Messenger in Spy Campaign by darkreading on Wed, 19 Feb 2025 22:21:28 GMT
- Content Credentials Show Promise, but Ecosystem Still Young by darkreading on Wed, 19 Feb 2025 20:06:43 GMT
- Patch Now: CISA Warns of Palo Alto Flaw Exploited in the Wild by darkreading on Wed, 19 Feb 2025 16:39:14 GMT
- What Is the Board’s Role in Cyber-Risk Management in OT Environments? by darkreading on Wed, 19 Feb 2025 15:00:00 GMT
- North Korea’s Kimsuky Taps Trusted Platforms to Attack South Korea by darkreading on Wed, 19 Feb 2025 02:00:00 GMT
- Deepwatch Acquires Dassana to Boost Cyber-Resilience With AI by darkreading on Tue, 18 Feb 2025 23:16:56 GMT
- Xerox Printer Vulnerabilities Enable Credential Capture by darkreading on Tue, 18 Feb 2025 22:28:33 GMT
- China-Linked Threat Group Targets Japanese Orgs’ Servers by darkreading on Tue, 18 Feb 2025 22:17:55 GMT
- Thrive Acquires Secured Network Services by darkreading on Tue, 18 Feb 2025 21:54:22 GMT
- SANS Institute Launches AI Cybersecurity Hackathon by darkreading on Tue, 18 Feb 2025 21:50:51 GMT
- Microsoft: New Variant of macOS Threat XCSSET Spotted in the Wild by darkreading on Tue, 18 Feb 2025 19:02:31 GMT
- Introducing enQase for Quantum-Safe Security by darkreading on Tue, 18 Feb 2025 14:08:52 GMT
- New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Sun, 23 Feb 2025 06:00:16 +0000
- SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Fri, 21 Feb 2025 17:39:27 +0000
- Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Fri, 21 Feb 2025 17:31:57 +0000
- NSA Allegedly Hacked Northwestern Polytechnical University, China Claims by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Fri, 21 Feb 2025 17:27:33 +0000
- ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Fri, 21 Feb 2025 17:21:58 +0000
- Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers” by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Fri, 21 Feb 2025 14:17:29 +0000
- Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Fri, 21 Feb 2025 14:17:19 +0000
- Critical Vulnerability in Fluent Bit Exposes Cloud Services to Potential Cyber Attacks by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Fri, 21 Feb 2025 14:05:22 +0000
- New Darcula 3.0 Tool Generates Phishing Kits to Mimic Global Brands by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Fri, 21 Feb 2025 10:19:03 +0000
- Salt Typhoon Hackers Exploit Cisco Vulnerability to Gain Device Access on US.Telecom Networks by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Fri, 21 Feb 2025 10:12:03 +0000
- ‘The bot asked me four times a day how I was feeling’: is tracking everything actually good for us? by Data and computer security | The Guardian on Sat, 22 Feb 2025 14:00:08 GMT
- Apple removes advanced data protection tool in face of UK government request by Data and computer security | The Guardian on Fri, 21 Feb 2025 17:36:08 GMT
- Investigators Link $1.4B Bybit Hack to North Korea’s Lazarus Group by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Sun, 23 Feb 2025 20:13:39 +0000
- Bybit Hack: $1.4B Stolen from World’s 2nd Largest Crypto Exchange by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Fri, 21 Feb 2025 21:26:38 +0000
- Leaked Files Tie Chinese Cybersecurity Firm to Government Censorship by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Fri, 21 Feb 2025 20:14:20 +0000
- How to Sue a Company Under GDPR for Data Misuse and Privacy Violations by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Thu, 20 Feb 2025 23:27:10 +0000
- New FrigidStealer Malware Infects macOS via Fake Browser Updates by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Thu, 20 Feb 2025 18:17:08 +0000
- Clinical Research Firm Exposes 1.6 Million US Medical Survey Records by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Thu, 20 Feb 2025 15:30:01 +0000
- FBI and CISA Warn of Ghost Ransomware: A Threat to Firms Worldwide by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Thu, 20 Feb 2025 12:04:56 +0000
- Hackers Tricking Users Into Linking Devices to Steal Signal Messages by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Wed, 19 Feb 2025 17:37:12 +0000
- INE Security’s Cybersecurity and IT Training Enhances Career Stability in Tech by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Wed, 19 Feb 2025 15:01:55 +0000
- How Blockchain Games Ensure Transparency and Fairness by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Wed, 19 Feb 2025 13:10:51 +0000
- Ghost in the Shell: Null-AMSI Bypasses Security to Deploy AsyncRAT by The Cyber Express on Fri, 21 Feb 2025 09:15:33 +0000
- Improper Certificate Validation in RadiAnt DICOM Viewer Puts Healthcare Systems at Risk by The Cyber Express on Fri, 21 Feb 2025 06:21:09 +0000
- Cybersecurity in The Internet Age: Safeguarding Your Assets and Data by The Cyber Express on Thu, 20 Feb 2025 11:32:04 +0000
- Raymond Limited Confirms Cyberattack, Ensures Business Continuity by The Cyber Express on Thu, 20 Feb 2025 10:21:44 +0000
- CVE-2024-12284: NetScaler Users Urged to Update Against Critical Flaw by The Cyber Express on Thu, 20 Feb 2025 10:09:22 +0000
- Russian State-Backed Hackers Intensify Attacks on Signal Messenger Accounts by The Cyber Express on Thu, 20 Feb 2025 07:56:04 +0000
- Ghost Ransomware Group Exploiting Unpatched Software, FBI and CISA Warn by The Cyber Express on Thu, 20 Feb 2025 06:50:49 +0000
- Health Net, Centene Settle Cybersecurity Fraud Allegations with $11M Payout by The Cyber Express on Wed, 19 Feb 2025 10:06:17 +0000
- $577 Million Cryptocurrency Fraud: Two Estonians Admit Role in Global Ponzi Scheme by The Cyber Express on Mon, 17 Feb 2025 10:51:03 +0000
- Android 16 Takes Action Against Scammers with In-Call Security Features by The Cyber Express on Mon, 17 Feb 2025 09:37:06 +0000
- Windscribe VPN review: A flexible and free VPN by Latest stories for ZDNET in Security on Sun, 23 Feb 2025 20:00:21 GMT
- American Airlines now lets you track your luggage with AirTags - here’s how by Latest stories for ZDNET in Security on Fri, 21 Feb 2025 16:10:44 GMT
- Is your phone truly waterproof? Here’s what the IP rating tells you by Latest stories for ZDNET in Security on Fri, 21 Feb 2025 14:39:03 GMT
- 9 ways to delete yourself from the internet (and hide your identity online) by Latest stories for ZDNET in Security on Thu, 20 Feb 2025 18:30:00 GMT
- Can’t quit Windows 10? You can pay Microsoft for updates after October, or try these alternatives by Latest stories for ZDNET in Security on Thu, 20 Feb 2025 15:31:00 GMT
- Aqara’s first outdoor camera is this smart home enthusiast’s dream device - here’s why by Latest stories for ZDNET in Security on Thu, 20 Feb 2025 08:00:18 GMT
- The best password managers for businesses in 2025: Expert tested by Latest stories for ZDNET in Security on Thu, 20 Feb 2025 01:14:53 GMT
- The head of US AI safety has stepped down. What now? by Latest stories for ZDNET in Security on Wed, 19 Feb 2025 19:52:00 GMT
- US AI Safety Institute will be ‘gutted,’ Axios reports by Latest stories for ZDNET in Security on Wed, 19 Feb 2025 19:04:00 GMT
- Yikes: Jailbroken Grok 3 can be made to say and reveal just about anything by Latest stories for ZDNET in Security on Wed, 19 Feb 2025 17:32:00 GMT
- I tried Norton Private Browser to see how it compares to Tor - here’s what I found by Latest stories for ZDNET in Security on Wed, 19 Feb 2025 17:06:31 GMT
- The best secure browsers for privacy in 2025: Expert tested by Latest stories for ZDNET in Security on Wed, 19 Feb 2025 16:52:00 GMT
- How to turn on Private DNS Mode on Android - and why it matters for privacy by Latest stories for ZDNET in Security on Tue, 18 Feb 2025 19:22:00 GMT
- Why rebooting your phone daily is your best defense against zero-click attacks by Latest stories for ZDNET in Security on Tue, 18 Feb 2025 17:53:00 GMT
- These nations are banning DeepSeek AI - here’s why by Latest stories for ZDNET in Security on Tue, 18 Feb 2025 17:39:30 GMT
- Get the best best Wyze Cam alternative I’ve tested for only $20 through Presidents’ Day by Latest stories for ZDNET in Security on Mon, 17 Feb 2025 02:55:09 GMT
Personal Feeds #
- Recent executive orders reshaping U.S. AI policy have increased the attack surface and shifted the responsibility for AI security to corporate leaders, urging them to establish their own AI security standards (AI Security: CISOs, Seize the Future!).
- The cyber espionage group Salt Typhoon, linked to China, uses custom malware named JumbledPath to target and spy on U.S. telecommunication providers (Salt Typhoon used custom malware JumbledPath to spy U.S. telecom providers).
- A new ransomware called NailaoLocker has targeted European healthcare organizations, exploiting Check Point VPN appliance vulnerabilities, relying on tools like ShadowPad and PlugX (NailaoLocker ransomware targets EU healthcare-related entities).
- The U.S. CISA has added several vulnerabilities, including Microsoft Power Pages, Palo Alto Networks PAN-OS, and Craft CMS flaws, to its Known Exploited Vulnerabilities catalog, highlighting ongoing exploit trends (U.S. CISA adds Microsoft Power Pages flaw to its Known Exploited Vulnerabilities catalog, U.S. CISA adds Craft CMS and Palo Alto Networks PAN-OS flaws to its Known Exploited Vulnerabilities catalog).
- A sophisticated attack led to the theft of $1.5 billion in cryptocurrency from Bybit, marking it as the largest crypto heist to date (Lazarus APT stole $1.5B from Bybit, it is the largest cryptocurrency heist ever).
- Advances in AI technology pose new economic and security challenges for security operations, particularly in SIEM environments as data volumes grow (The New Economics of an AI-Powered SIEM).
- Device code phishing techniques exploiting vulnerabilities in OAuth standards to give attackers access to accounts are gaining popularity (Got a Microsoft Teams invite? Storm-2372 gang exploit device codes in global phishing attacks, Device Code Phishing).
- Innovations in turning phished data into mobile wallets highlight ongoing developments in cybercrime, driven by groups in China (How Phished Data Turns into Apple & Google Wallets).
Articles (25)
- 2025-02-18: SmartApeSG script for fake browser update leads to NetSupport RAT and StealC by Malware-Traffic-Analysis.net - Blog Entries on Wed, 19 Feb 2025 16:23 +0000
- AI Security: CISOs, Seize the Future! by CISO Tradecraft® Newsletter on Thu, 20 Feb 2025 14:31:44 GMT
- Cybersecurity Needs to Stay Nonpartisan in the Age of DOGE by Lohrmann on Cybersecurity on Sun, 23 Feb 2025 10:34:00 GMT
- The New Economics of an AI-Powered SIEM by Detection at Scale on Tue, 18 Feb 2025 14:07:52 GMT
- Smashing Security podcast #405: A crypto con exchange, and soaring ticket scams by Graham Cluley on Thu, 20 Feb 2025 00:00:28 +0000
- The AI Fix #38: AI proves time travel is impossible (but still can’t draw fingers) by Graham Cluley on Tue, 18 Feb 2025 15:07:44 +0000
- Got a Microsoft Teams invite? Storm-2372 gang exploit device codes in global phishing attacks by Graham Cluley on Tue, 18 Feb 2025 12:10:41 +0000
- How Phished Data Turns into Apple & Google Wallets by Krebs on Security on Tue, 18 Feb 2025 18:37:26 +0000
- U.S. CISA adds Microsoft Power Pages flaw to its Known Exploited Vulnerabilities catalog by Security Affairs on Sun, 23 Feb 2025 15:07:46 +0000
- SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 34 by Security Affairs on Sun, 23 Feb 2025 12:59:59 +0000
- Security Affairs newsletter Round 512 by Pierluigi Paganini – INTERNATIONAL EDITION by Security Affairs on Sun, 23 Feb 2025 12:38:51 +0000
- Lazarus APT stole $1.5B from Bybit, it is the largest cryptocurrency heist ever by Security Affairs on Sun, 23 Feb 2025 00:19:03 +0000
- Apple removes iCloud encryption in UK following backdoor demand by Security Affairs on Sat, 22 Feb 2025 11:50:56 +0000
- B1ack’s Stash released 1 Million credit cards by Security Affairs on Fri, 21 Feb 2025 14:41:14 +0000
- U.S. CISA adds Craft CMS and Palo Alto Networks PAN-OS flaws to its Known Exploited Vulnerabilities catalog by Security Affairs on Fri, 21 Feb 2025 10:40:00 +0000
- Atlassian fixed critical flaws in Confluence and Crowd by Security Affairs on Fri, 21 Feb 2025 08:02:50 +0000
- Salt Typhoon used custom malware JumbledPath to spy U.S. telecom providers by Security Affairs on Thu, 20 Feb 2025 23:17:10 +0000
- NailaoLocker ransomware targets EU healthcare-related entities by Security Affairs on Thu, 20 Feb 2025 15:47:59 +0000
- Friday Squid Blogging: New Squid Fossil by Schneier on Security on Fri, 21 Feb 2025 22:02:56 +0000
- Implementing Cryptography in AI Systems by Schneier on Security on Fri, 21 Feb 2025 15:33:49 +0000
- An LLM Trained to Create Backdoors in Code by Schneier on Security on Thu, 20 Feb 2025 12:01:26 +0000
- Device Code Phishing by Schneier on Security on Wed, 19 Feb 2025 15:07:50 +0000
- Story About Medical Device Security by Schneier on Security on Tue, 18 Feb 2025 12:06:07 +0000
- Atlas of Surveillance by Schneier on Security on Mon, 17 Feb 2025 16:35:59 +0000
- ⚡ TCP #75: State of Detection Engineering; NSO Money; and Product News by The Cybersecurity Pulse (TCP) on Wed, 19 Feb 2025 15:58:46 GMT
Community Feeds #
Ghost ransomware uses vulnerabilities in widely-used software such as Fortinet FortiOS, Adobe ColdFusion, and Microsoft Exchange. It’s important to monitor for unauthorized use of PowerShell and segment networks to restrict lateral movement (US authorities warn Ghost ransomware leverages older CVEs).
PayPal’s “New Address” feature is exploited to send phishing emails, highlighting the need for awareness around potential abuse of legitimate service features (Beware: PayPal “New Address” feature abused to send phishing emails).
Over 100 security flaws identified in LTE and 5G network implementations pose significant security concerns, necessitating scrutiny of these technologies’ deployment (RANsacked: Over 100 Security Flaws Found in LTE/5G Network Implementations).
XWorm malware showcases obfuscation challenges by combining executable data with PowerShell-code pieces, underscoring the need for improved detection capabilities (XWorm Cocktail: A Mix of PE data with PowerShell Code).
Apple has ended iCloud encryption in the UK, responding to government data demands, raising privacy and data protection concerns (Apple Ends iCloud Encryption in UK Amid Government Data Demands, Three questions about Apple, encryption, and the U.K.).
Data embassies opening globally as a strategy to protect critical information reflect a growing trend in safeguarding national data sovereignty (Nations Open ‘Data Embassies’ to Protect Critical Info).
Recent cybersecurity incidents, including those affecting Anne Arundel County and a major U.S. news publisher, highlight the ongoing threat of ransomware attacks against public and private sectors (Anne Arundel County Hit by Ransomware Attack Amid Maryland Cyber Threats, Major U.S. News Publisher Faces Major Cyberattack Disrupting Operations).
Xaiomi phones are advised by Iran for potential delegates, raising questions about the security implications of using specific hardware in certain geopolitical contexts (Iran and Xaiomi).
A new tool for debloating container files shows a reduction of up to 97% in vulnerabilities by removing unused elements, pointing to advancements in maintaining lightweight and secure container environments (Containers are bloated and that bloat is a security risk. We built a tool to remove it!).
Articles (56)
- by NetBlocks on Fri, 21 Feb 2025 00:45:08 +0000
- by NetBlocks on Wed, 19 Feb 2025 21:59:02 +0000
- by NetBlocks on Tue, 18 Feb 2025 22:53:43 +0000
- by NetBlocks on Mon, 17 Feb 2025 06:11:53 +0000
- Mentorship Monday - Post All Career, Education and Job questions here! by cybersecurity on 2025-02-17T00:00:32+00:00
- US authorities warn Ghost ransomware leverages older CVEs by cybersecurity on 2025-02-23T18:06:53+00:00
- Anne Arundel County Hit by Ransomware Attack Amid Maryland Cyber Threats by cybersecurity on 2025-02-23T13:18:51+00:00
- Major U.S. News Publisher Faces Major Cyberattack Disrupting Operations by cybersecurity on 2025-02-23T21:05:38+00:00
- Best note-taking and organization app? by cybersecurity on 2025-02-23T13:42:24+00:00
- Beware: PayPal “New Address” feature abused to send phishing emails by cybersecurity on 2025-02-23T14:18:19+00:00
- Implications of Post-Federal Society on Cybersecurity by cybersecurity on 2025-02-23T17:02:20+00:00
- Those of you who have a cybersecurity consulting firm in the EU what are some of the lessons learned? by cybersecurity on 2025-02-23T19:12:12+00:00
- Iran and Xaiomi by cybersecurity on 2025-02-23T10:24:01+00:00
- 🔍 I Built a Web Crawler for Pentesting – Link Dumper! 🚀 by cybersecurity on 2025-02-23T03:32:09+00:00
- Apple Ends iCloud Encryption in UK Amid Government Data Demands by cybersecurity on 2025-02-23T04:23:05+00:00
- AI Governance Tools and Resources? by cybersecurity on 2025-02-23T12:31:21+00:00
- The Art of Self-Healing Malware: A Deep Dive into Code That Fixes Itsef by cybersecurity on 2025-02-23T05:10:19+00:00
- Containers are bloated and that bloat is a security risk. We built a tool to remove it! by cybersecurity on 2025-02-23T00:30:41+00:00
- Bypassing CDR by cybersecurity on 2025-02-23T11:09:03+00:00
- Nations Open ‘Data Embassies’ to Protect Critical Info by cybersecurity on 2025-02-22T18:12:39+00:00
- GRC tools? by cybersecurity on 2025-02-22T21:07:53+00:00
- Security engineering interviews @ Google by cybersecurity on 2025-02-23T04:33:33+00:00
- CrowdStrike in VirusTotal by cybersecurity on 2025-02-23T19:31:41+00:00
- How to get End to End encryption for iCloud in the UK? by cybersecurity on 2025-02-22T13:05:21+00:00
- Cyber insurance for businesses by cybersecurity on 2025-02-23T00:18:43+00:00
- S 245 - Insure Cybersecurity Act of 2025 by cybersecurity on 2025-02-23T00:36:20+00:00
- Vuln Management solutions by start ups? by cybersecurity on 2025-02-22T20:50:52+00:00
- Question For ISSMs by cybersecurity on 2025-02-23T02:24:51+00:00
- Has SnoopGod Linux Been Discontinued? by cybersecurity on 2025-02-23T10:01:56+00:00
- Quantum Computing vs. Cybersecurity by cybersecurity on 2025-02-22T06:42:54+00:00
- Three questions about Apple, encryption, and the U.K. by Technical Information Security Content & Discussion on 2025-02-23T20:01:24+00:00
- What’s new in LKRG? Interview about the project by Technical Information Security Content & Discussion on 2025-02-23T21:32:55+00:00
- 60-pages guide on how to use Bettercap on Android by Technical Information Security Content & Discussion on 2025-02-21T09:39:30+00:00
- RANsacked: Over 100 Security Flaws Found in LTE/5G Network Implementations by Technical Information Security Content & Discussion on 2025-02-20T07:44:01+00:00
- New Java Runtime Reverse Engineering Tool (Injected DLL, Runtime Bytecode & Heap Analysis) by Technical Information Security Content & Discussion on 2025-02-20T03:33:15+00:00
- Achieving RCE in famous Japanese chat tool with an obsolete Electron feature by Technical Information Security Content & Discussion on 2025-02-19T15:10:49+00:00
- How to prove false statements? (Part 3) by Technical Information Security Content & Discussion on 2025-02-19T23:31:37+00:00
- Reinventing PowerShell in C/C++ by Technical Information Security Content & Discussion on 2025-02-19T09:30:03+00:00
- Introducing keycred: A cross-platform tool for handling Active Directory Shadow Credentials/msDS-KeyCredentialLink by Technical Information Security Content & Discussion on 2025-02-19T15:32:04+00:00
- Ivanti Endpoint Manager Credential Coercion Vulnerabilities Deep-Dive by Technical Information Security Content & Discussion on 2025-02-19T12:43:03+00:00
- Everyday Ghidra: How Platform Choice Influences Ghidra’s Binary Analysis by Technical Information Security Content & Discussion on 2025-02-18T15:58:43+00:00
- Microsoft Edge Developer VM Remote Code Execution by Technical Information Security Content & Discussion on 2025-02-18T14:28:24+00:00
- Passkey Raider: Burp Suite Extension for Pentesting Passkey (Pentest & Bug Bounty) by Technical Information Security Content & Discussion on 2025-02-18T12:14:55+00:00
- Arechclient2 (sectopRAT) Analysis – A Highly Obfuscated .NET RAT with Malicious Chrome Extension by Technical Information Security Content & Discussion on 2025-02-18T11:12:57+00:00
- Announcing the Incident response program pack 1.5 by Technical Information Security Content & Discussion on 2025-02-17T02:45:30+00:00
- Infocon: green by SANS Internet Storm Center, InfoCON: green on Sun, 23 Feb 2025 20:45:04 +0000
- Wireshark 4.4.4 Released, (Sun, Feb 23rd) by SANS Internet Storm Center, InfoCON: green on Sun, 23 Feb 2025 10:38:27 GMT
- ISC Stormcast For Friday, February 21st, 2025 https://isc.sans.edu/podcastdetail/9334, (Fri, Feb 21st) by SANS Internet Storm Center, InfoCON: green on Fri, 21 Feb 2025 00:50:46 GMT
- Tool update: sigs.py - added check mode, (Fri, Feb 21st) by SANS Internet Storm Center, InfoCON: green on Fri, 21 Feb 2025 00:00:36 GMT
- Using ES|QL in Kibana to Queries DShield Honeypot Logs, (Thu, Feb 20th) by SANS Internet Storm Center, InfoCON: green on Thu, 20 Feb 2025 02:06:46 GMT
- ISC Stormcast For Thursday, February 20th, 2025 https://isc.sans.edu/podcastdetail/9332, (Thu, Feb 20th) by SANS Internet Storm Center, InfoCON: green on Thu, 20 Feb 2025 01:38:40 GMT
- XWorm Cocktail: A Mix of PE data with PowerShell Code, (Wed, Feb 19th) by SANS Internet Storm Center, InfoCON: green on Wed, 19 Feb 2025 07:39:49 GMT
- ISC Stormcast For Wednesday, February 19th, 2025 https://isc.sans.edu/podcastdetail/9330, (Wed, Feb 19th) by SANS Internet Storm Center, InfoCON: green on Wed, 19 Feb 2025 00:31:59 GMT
- https://SecTemplates.com - simplified, free open-source templates to enable engineering and smaller security teams to bootstrap security capabilities for their organizations, (Tue, Feb 18th) by SANS Internet Storm Center, InfoCON: green on Tue, 18 Feb 2025 17:39:26 GMT
- ISC Stormcast For Tuesday, February 18th, 2025 https://isc.sans.edu/podcastdetail/9328, (Tue, Feb 18th) by SANS Internet Storm Center, InfoCON: green on Tue, 18 Feb 2025 02:00:02 GMT
- ModelScan - Protection Against Model Serialization Attacks, (Mon, Feb 17th) by SANS Internet Storm Center, InfoCON: green on Tue, 18 Feb 2025 00:37:10 GMT
Disclaimer #
The summaries in this brief are generated autonomously by the OpenAI LLM model based on the provided system and user prompts. While every effort is made to consolidate accurate and relevant insights, the model may occasionally misinterpret, misrepresent, or hallucinate information. Readers are strongly advised to verify all key points by consulting the original sources linked in the brief for complete context and accuracy.
This document is created with BlackStork and is based on the template available on GitHub.
Reach out if you have questions or suggestions.