Thursday, April 17, 2025

Cyber Security News

Critical Erlang/OTP SSH Vulnerability Allow Hackers Execute Arbitrary Code Remotely

0
A major security flaw has been uncovered in the widely used Erlang/OTP SSH implementation, drawing urgent attention from the cybersecurity community worldwide.The vulnerability, tracked...
Chinese Hacker Group Mustang Panda Bypass EDR Detection

Chinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Tools

0
The China-sponsored hacking group, Mustang Panda, has been uncovered by Zscaler ThreatLabz to employ new techniques and tools, including the updated backdoor ToneShell and...

CISA Warns of Potential Credential Exploits Linked to Oracle Cloud Hack

0
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a public warning following reports of possible unauthorized access to a legacy Oracle Cloud environment.While...
Agent Tesla Malware

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts

0
Researchers from Palo Alto Networks have uncovered a series of malicious spam campaigns leveraging the notorious Agent Tesla malware through intricate, multi-stage infection vectors.The...
Intel

Intel Sells 51% Stake in Altera to Silver Lake in $8.75 Billion Deal

0
Intel Corporation has announced the divestiture of a 51% stake in its Altera division to Silver Lake, valuing the programmable logic company at $8.75...

Critical Flaw in PHP’s extract() Function Enables Arbitrary Code Execution

0
A critical vulnerability in PHP’s extract() function has been uncovered, enabling attackers to execute arbitrary code by exploiting memory corruption flaws.The issue affects PHP versions 5.x,...

Hacker Leaks 33,000 Employee Records in Third-Party API Breach

0
A hacker has exposed the personal records of over 33,000 employees after discovering unrestricted endpoints belonging to a major technology service provider.The breach, first...
SIEM as a Service

Recent News

Xworm Payload Execution Path

Unmasking Xworm Payload Execution Path through Jailbreaking a Malicious JScript Loader

0
Security researchers are analyzing a sophisticated malware delivery mechanism that uses a JScript loader to deploy different payloads based on the victim's geographic location....

Cisco Webex Vulnerability Lets Hackers Execute Code Through Malicious Meeting Links

0
Cisco has disclosed a high-severity vulnerability in its widely used Webex App, warning users that attackers could exploit the flaw to execute arbitrary code...

Google Removes 5.5 Billion Malicious Ads, Suspends 700,000+ Offending Advertisers

0
Google has announced the removal of 5.5 billion malicious advertisements and the suspension of over 700,000 offending advertiser accounts in 2024, according to its...
Kaspersky Shares 12 Essential Tips for Messaging App Security and Privacy

Kaspersky Shares 12 Essential Tips for Messaging App Security and Privacy

0
In an era where instant messaging apps like WhatsApp, Telegram, Signal, iMessage, Viber, and WeChat dominate personal and professional communication, digital privacy and security...
Cybersecurity for Startups

Cybersecurity for Startups – What Early-Stage CISOs Must Prioritize

0
Early-stage startups face unique cybersecurity challenges that established enterprises have already addressed through years of investment and experience.For Chief Information Security Officers (CISOs)...
Email Bombing

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

0
Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious endeavors.Email bombing, known also as a "spam bomb," involves...
Enterprise Networks

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

0
Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers, following a trend noted in Forescout Research Vedere Labs' 2025...
Chinese eCrime Group Targets Users in 120+ Countries

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

0
Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across more than 121 countries.This campaign, primarily focused on stealing banking...

MITRE Ends CVE Program Support – Leaked Internal Memo Confirms Departure

0
A leaked internal memo dated April 15, 2025, has sent shockwaves through the cybersecurity community, revealing that MITRE’s contract to operate the Common Vulnerabilities...

Critical Erlang/OTP SSH Vulnerability Allow Hackers Execute Arbitrary Code Remotely

A major security flaw has been uncovered in the widely used Erlang/OTP SSH implementation, drawing urgent attention from the cybersecurity community worldwide.The vulnerability, tracked...

Chinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Tools

The China-sponsored hacking group, Mustang Panda, has been uncovered by Zscaler ThreatLabz to employ new techniques and tools, including the updated backdoor ToneShell and...

How IT Professionals Maintain Efficiency with Brain Biohacking Techniques

In a world where code and coffee have become inseparable companions, IT professionals are constantly seeking new ways to stay at peak productivity. Have...

CISA Warns of Potential Credential Exploits Linked to Oracle Cloud Hack

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a public warning following reports of possible unauthorized access to a legacy Oracle Cloud environment.While...

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts

Researchers from Palo Alto Networks have uncovered a series of malicious spam campaigns leveraging the notorious Agent Tesla malware through intricate, multi-stage infection vectors.The...

Intel Sells 51% Stake in Altera to Silver Lake in $8.75 Billion Deal

Intel Corporation has announced the divestiture of a 51% stake in its Altera division to Silver Lake, valuing the programmable logic company at $8.75...

Critical Flaw in PHP’s extract() Function Enables Arbitrary Code Execution

A critical vulnerability in PHP’s extract() function has been uncovered, enabling attackers to execute arbitrary code by exploiting memory corruption flaws.The issue affects PHP versions 5.x,...

Hacker Leaks 33,000 Employee Records in Third-Party API Breach

A hacker has exposed the personal records of over 33,000 employees after discovering unrestricted endpoints belonging to a major technology service provider.The breach, first...

Google Removes 5.5 Billion Malicious Ads, Suspends 700,000+ Offending Advertisers

Google has announced the removal of 5.5 billion malicious advertisements and the suspension of over 700,000 offending advertiser accounts in 2024, according to its...

Glossary