Tuesday, May 13, 2025

Cyber Security News

Lumma Stealer

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

0
Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware has evolved with sophisticated PowerShell tools and advanced evasion tactics,...
Noodlophile Malware

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms

0
Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as a lure. Dubbed Noodlophile Stealer, this previously undocumented infostealer targets unsuspecting...
Kimsuky Hacker

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns

0
The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black Banshee,” has been active since at least 2012, targeting nations...
Weaponized LNK Files

APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations

0
The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear phishing campaign targeting activists focused on North Korean issues. Named "Operation:...
IPFire 2.29 - Core Update 194

Open Source Linux Firewall IPFire 2.29 – Core Update 194 Released: What’s New!

0
IPFire, the powerful open-source firewall, has unveiled its latest release, IPFire 2.29 – Core Update 194, packed with security enhancements, performance improvements, and new...
Smokescreens

Threat Actors Leverage DDoS Attacks as Smokescreens for Data Theft

0
Distributed Denial of Service (DDoS) attacks, once seen as crude tools for disruption wielded by script kiddies and hacktivists, have undergone a sophisticated transformation...
Proxy Botnet Network

20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week

0
A 20-year-old criminal proxy network has been disrupted through a joint operation involving Lumen’s Black Lotus Labs, the U.S. Department of Justice, the Federal Bureau...
SIEM as a Service

Recent News

IBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads

0
 IBM has issued a security bulletin addressing two newly discovered, high-severity vulnerabilities in its Cognos Analytics platform. These flaws, tracked as CVE-2024-40695 (Malicious File Upload) and CVE-2024-51466 (Expression Language...
0-Day Vulnerability

Play Ransomware Deployed in the Wild Exploiting Windows 0-Day Vulnerability

0
Patched Windows zero-day vulnerability (CVE-2025-29824) in the Common Log File System (CLFS) driver was exploited in attacks linked to the Play ransomware operation prior...
Critical Azure and Power Apps

Critical Azure and Power Apps Vulnerabilities Allow Attackers to Exploit RCE

0
Microsoft has patched four critical security vulnerabilities affecting its Azure cloud services and Power Apps platform that could allow attackers to escalate privileges, perform...

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

0
The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new modules, including a highly anticipated exploit targeting Erlang/OTP SSH servers...

Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps

0
Microsoft has announced the upcoming release of a groundbreaking "Prevent Screen Capture" feature for Teams, designed to block unauthorized screenshots and recordings during virtual...
IT Help Desks

Cyberattackers Targeting IT Help Desks for Initial Breach

0
Cybercriminals are increasingly impersonating IT support personnel and trusted authorities to manipulate victims into granting access to critical systems, according to recent analyses by...
Poisoning SEO

Hackers Target IT Admins by Poisoning SEO to Push Malware to Top Search Results

0
Cybercriminals are increasingly targeting IT administrators through sophisticated Search Engine Optimization (SEO) poisoning techniques. By leveraging SEO tactics typically used for legitimate online marketing, attackers...

Nmap 7.96 Released with Enhanced Scanning Capabilities and Updated Libraries

0
The popular network mapping and security auditing tool Nmap has released version 7.96, featuring a host of significant improvements. This latest version introduces parallel forward...
Bug Bounty Platforms

AI-Driven Fake Vulnerability Reports Flooding Bug Bounty Platforms

0
AI-generated bogus vulnerability reports, or "AI slop," are flooding bug bounty platforms, which is a worrying trend in the cybersecurity space. These fraudulent submissions, crafted...

How to Legally Deal With Hit-and-Run Car Accidents

Tucson (AZ) is known for its desert landscapes, vibrant culture, and wide-open roads. But even in this picturesque setting, hit-and-run accidents can and do...

Protecting Your Future After a Personal Injury—Trusted Legal Support

Los Angeles, California, is a city of dreams and determination, where traffic surges are as familiar as the Pacific breeze. When a life-changing accident...

How Property Damage Attorneys Handle Insurance Claims

Dealing with property damage can be overwhelming, especially when navigating the insurance claims process. In 2023, Texas recorded over 450,000 crashes involving property damage...

Understanding the Role of Trucking Company Policies

Trucking companies' core mission is transporting goods across long distances, and this industry forms the backbone of local and national economies. In 2023, Salt...

Personal Injury Lawyers Ready to Fight for Your Rights

Metairie, Louisiana, thrives with a unique blend of suburban charm and easy access to New Orleans’s cultural heartbeat. From morning strolls through Old Metairie’s...

Trusted Lawyers for Wrongful Death Claims and Legal Support

The death of a loved one is not a pleasant or easy process either. The sorrow is compounded by the fact that most of...

Get Fast Truck Accident Loans to Cover Your Case Needs

Truck accidents in New Jersey have seen a notable decline in recent years. In 2018, the state reported over 6,000 truck accidents, but by...

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware has evolved with sophisticated PowerShell tools and advanced evasion tactics,...

Experienced Criminal Defense Lawyers Ready to Protect You

Miami has experienced a notable decline in violent crime in recent years. In 2023, the city recorded 31 homicides, a significant drop from 49...

Glossary