Thursday, March 20, 2025

Cyber Security News

Dragon RaaS

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

0
Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has emerged as a significant player in the "Five Families" crimeware...
Browser Vulnerabilities

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

0
Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of Browser Security Report, revealing a sharp rise in browser-based cyberattacks....
Babuk2 Ransomware

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

0
Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the ransomware landscape: the Babuk2 group is issuing extortion demands based...
WordPress Sites

Massive “DollyWay” Malware Attack Compromises 20,000+ WordPress Sites Worldwide

0
A significant malware operation, dubbed "DollyWay," has been uncovered by GoDaddy Security researchers, revealing a sophisticated campaign that has compromised over 20,000 WordPress sites...

Cisco Smart Licensing Utility Vulnerabilities Under Hacker Exploitation

0
Recent reports indicate that hackers are actively trying to exploit two critical vulnerabilities in the Cisco Smart Licensing Utility.These vulnerabilities, identified as CVE-2024-20439 and...

IBM Warns of AIX Vulnerabilities Allowing Arbitrary Command Execution

0
IBM has recently issued a critical security warning regarding vulnerabilities in its AIX operating system that could allow remote attackers to execute arbitrary commands.The...

Dell Alerts on Critical Secure Connect Gateway Vulnerabilities

0
Dell has issued several critical security alerts regarding vulnerabilities in its Secure Connect Gateway (SCG) products.These vulnerabilities pose significant risks to users, including potential...
SIEM as a Service

Recent News

Bybit Hack

Bybit Hack: Details of Sophisticated Multi-Stage Attack Uncovered

0
The Bybit hack, which occurred on February 21, 2025, has been extensively analyzed by multiple cybersecurity teams, including Sygnia.This attack exposed significant security...

New Microsoft 365 Attack Leverages OAuth Redirection for Credential Theft

0
Threat researchers at Proofpoint are currently tracking two sophisticated and highly targeted cyber-attack campaigns that are utilizing OAuth redirection mechanisms to compromise user credentials.These...

SpyX Data Breach Exposes Personal Information of Nearly 2 Million Users

0
SpyX, a company known for developing spyware, has experienced a data breach that compromised the personal information of nearly 2 million users.As per a...
Python Code

Hackers Use DLL Side-Loading to Deploy Malicious Python Code

0
A recent discovery by Xavier Mertens, a senior handler at the Internet Storm Center, has highlighted a sophisticated attack where hackers utilize DLL side-loading...
RSA Keys

Millions of RSA Keys Exposed, Revealing Serious Exploitable Flaws

0
A recent study has highlighted a significant vulnerability in RSA keys used across the internet, particularly in IoT devices.Researchers collected and analyzed a...
Jailbreak Attacks

MirrorGuard: Adaptive Defense Mechanism Against Jailbreak Attacks for Secure Deployments

0
A novel defense strategy, MirrorGuard, has been proposed to enhance the security of large language models (LLMs) against jailbreak attacks.This approach introduces a...

Google’s Parent Alphabet in Talks to Acquire Cybersecurity Firm Wiz for $30 Billion

0
Alphabet, the parent company of Google, is reportedly in discussions to acquire Wiz, a leading cybersecurity firm, for a staggering $30 billion.This potential acquisition...
AWS SNS

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

0
Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service that facilitates communication between applications and users.While its scalability...
DeepSeek R1 Jailbreaked

DeepSeek R1 Jailbreaked to Create Malware, Including Keyloggers and Ransomware

0
The increasing popularity of generative artificial intelligence (GenAI) tools, such as OpenAI’s ChatGPT and Google’s Gemini, has attracted cybercriminals seeking to exploit these technologies...

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has emerged as a significant player in the "Five Families" crimeware...

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of Browser Security Report, revealing a sharp rise in browser-based cyberattacks....

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the ransomware landscape: the Babuk2 group is issuing extortion demands based...

Massive “DollyWay” Malware Attack Compromises 20,000+ WordPress Sites Worldwide

A significant malware operation, dubbed "DollyWay," has been uncovered by GoDaddy Security researchers, revealing a sophisticated campaign that has compromised over 20,000 WordPress sites...

Cisco Smart Licensing Utility Vulnerabilities Under Hacker Exploitation

Recent reports indicate that hackers are actively trying to exploit two critical vulnerabilities in the Cisco Smart Licensing Utility.These vulnerabilities, identified as CVE-2024-20439 and...

IBM Warns of AIX Vulnerabilities Allowing Arbitrary Command Execution

IBM has recently issued a critical security warning regarding vulnerabilities in its AIX operating system that could allow remote attackers to execute arbitrary commands.The...

Dell Alerts on Critical Secure Connect Gateway Vulnerabilities

Dell has issued several critical security alerts regarding vulnerabilities in its Secure Connect Gateway (SCG) products.These vulnerabilities pose significant risks to users, including potential...

Signal Messenger Exploited in Targeted Attacks on Defense Industry Employees

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of targeted cyberattacks against employees of the defense-industrial complex and members of...

CISA Alerts on Edimax IP Camera OS Command Injection Exploit

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a critical vulnerability found in Edimax IC-7100 IP cameras.The alert centers...

Glossary