Thursday, April 17, 2025

Cyber Security News

Harvest Ransomware Attack: Stolen Data Now Publicly Disclosed

0
French fintech leader Harvest SAS has become the latest high-profile victim of a sophisticated ransomware attack, culminating this week in the public release of a trove...

Critical Erlang/OTP SSH Vulnerability Allow Hackers Execute Arbitrary Code Remotely

0
A major security flaw has been uncovered in the widely used Erlang/OTP SSH implementation, drawing urgent attention from the cybersecurity community worldwide.The vulnerability, tracked...
Chinese Hacker Group Mustang Panda Bypass EDR Detection

Chinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Tools

0
The China-sponsored hacking group, Mustang Panda, has been uncovered by Zscaler ThreatLabz to employ new techniques and tools, including the updated backdoor ToneShell and...

CISA Warns of Potential Credential Exploits Linked to Oracle Cloud Hack

0
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a public warning following reports of possible unauthorized access to a legacy Oracle Cloud environment.While...
Agent Tesla Malware

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts

0
Researchers from Palo Alto Networks have uncovered a series of malicious spam campaigns leveraging the notorious Agent Tesla malware through intricate, multi-stage infection vectors.The...
Intel

Intel Sells 51% Stake in Altera to Silver Lake in $8.75 Billion Deal

0
Intel Corporation has announced the divestiture of a 51% stake in its Altera division to Silver Lake, valuing the programmable logic company at $8.75...

Critical Flaw in PHP’s extract() Function Enables Arbitrary Code Execution

0
A critical vulnerability in PHP’s extract() function has been uncovered, enabling attackers to execute arbitrary code by exploiting memory corruption flaws.The issue affects PHP versions 5.x,...
SIEM as a Service

Recent News

Harvest Ransomware Attack: Stolen Data Now Publicly Disclosed

0
French fintech leader Harvest SAS has become the latest high-profile victim of a sophisticated ransomware attack, culminating this week in the public release of a trove...

Windows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account Control

0
New vulnerabilities in Windows Task Scheduler's schtasks.exe let attackers bypass UAC, alter metadata, modify event logs, and evade detection.These actions map to MITRE...

Cable: Powerful Post-Exploitation Toolkit for Active Directory Attacks

0
Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit Active Directory (AD) vulnerabilities.With 298 GitHub stars and 33 forks...
The Future of GRC

The Future of GRC – Integrating ESG, Cyber, and Regulatory Risk

0
The landscape of Governance, Risk, and Compliance (GRC) is undergoing a profound transformation as organizations face mounting pressures from regulatory bodies, evolving cyber threats,...

Sensata Technologies Breached: Ransomware Attack Key Systems

0
Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is currently grappling with the fallout of a ransomware attack that...
RansomHub

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

0
The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of industries across the globe.In March 2025, this group alone...

SquareX to Reveal Critical Data Splicing Attack at BSides SF, Exposing Major DLP Vulnerability

0
SquareX researchers Jeswin Mathai and Audrey Adeline will be disclosing a new class of data exfiltration techniques at BSides San Francisco 2025. Titled “Data Splicing Attacks: Breaking Enterprise DLP from...

Microsoft Boosts Exchange and SharePoint Security with Updated Antimalware Scan

0
Microsoft has fortified its Exchange Server and SharePoint Server security by integrating advanced Antimalware Scan Interface (AMSI) capabilities.This measure, aimed at countering sophisticated attack...

Hertz Data Breach Exposes Customer Personal Information to Hackers

0
The Hertz Corporation has confirmed that sensitive personal information belonging to customers of its Hertz, Dollar, and Thrifty brands was compromised after hackers targeted...

Harvest Ransomware Attack: Stolen Data Now Publicly Disclosed

French fintech leader Harvest SAS has become the latest high-profile victim of a sophisticated ransomware attack, culminating this week in the public release of a trove...

Critical Erlang/OTP SSH Vulnerability Allow Hackers Execute Arbitrary Code Remotely

A major security flaw has been uncovered in the widely used Erlang/OTP SSH implementation, drawing urgent attention from the cybersecurity community worldwide.The vulnerability, tracked...

Chinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Tools

The China-sponsored hacking group, Mustang Panda, has been uncovered by Zscaler ThreatLabz to employ new techniques and tools, including the updated backdoor ToneShell and...

How IT Professionals Maintain Efficiency with Brain Biohacking Techniques

In a world where code and coffee have become inseparable companions, IT professionals are constantly seeking new ways to stay at peak productivity. Have...

CISA Warns of Potential Credential Exploits Linked to Oracle Cloud Hack

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a public warning following reports of possible unauthorized access to a legacy Oracle Cloud environment.While...

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts

Researchers from Palo Alto Networks have uncovered a series of malicious spam campaigns leveraging the notorious Agent Tesla malware through intricate, multi-stage infection vectors.The...

Intel Sells 51% Stake in Altera to Silver Lake in $8.75 Billion Deal

Intel Corporation has announced the divestiture of a 51% stake in its Altera division to Silver Lake, valuing the programmable logic company at $8.75...

Critical Flaw in PHP’s extract() Function Enables Arbitrary Code Execution

A critical vulnerability in PHP’s extract() function has been uncovered, enabling attackers to execute arbitrary code by exploiting memory corruption flaws.The issue affects PHP versions 5.x,...

Hacker Leaks 33,000 Employee Records in Third-Party API Breach

A hacker has exposed the personal records of over 33,000 employees after discovering unrestricted endpoints belonging to a major technology service provider.The breach, first...

Glossary