Thursday, April 17, 2025

Cyber Security News

Critical Erlang/OTP SSH Vulnerability Allow Hackers Execute Arbitrary Code Remotely

0
A major security flaw has been uncovered in the widely used Erlang/OTP SSH implementation, drawing urgent attention from the cybersecurity community worldwide.The vulnerability, tracked...
Chinese Hacker Group Mustang Panda Bypass EDR Detection

Chinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Tools

0
The China-sponsored hacking group, Mustang Panda, has been uncovered by Zscaler ThreatLabz to employ new techniques and tools, including the updated backdoor ToneShell and...

CISA Warns of Potential Credential Exploits Linked to Oracle Cloud Hack

0
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a public warning following reports of possible unauthorized access to a legacy Oracle Cloud environment.While...
Agent Tesla Malware

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts

0
Researchers from Palo Alto Networks have uncovered a series of malicious spam campaigns leveraging the notorious Agent Tesla malware through intricate, multi-stage infection vectors.The...
Intel

Intel Sells 51% Stake in Altera to Silver Lake in $8.75 Billion Deal

0
Intel Corporation has announced the divestiture of a 51% stake in its Altera division to Silver Lake, valuing the programmable logic company at $8.75...

Critical Flaw in PHP’s extract() Function Enables Arbitrary Code Execution

0
A critical vulnerability in PHP’s extract() function has been uncovered, enabling attackers to execute arbitrary code by exploiting memory corruption flaws.The issue affects PHP versions 5.x,...

Hacker Leaks 33,000 Employee Records in Third-Party API Breach

0
A hacker has exposed the personal records of over 33,000 employees after discovering unrestricted endpoints belonging to a major technology service provider.The breach, first...
SIEM as a Service

Recent News

Sapphire Werewolf

Sapphire Werewolf Upgrades Arsenal With Amethyst Stealer Targeting Energy Firms

0
Sapphire Werewolf has introduced a potent new weapon into its cyber arsenal, unveiling the latest iteration of the Amethyst stealer in a calculated phishing...

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

0
A significant security vulnerability has been identified in IBM Aspera Faspex 5, a popular file exchange solution.The flaw, designated as CVE-2025-3423, allows attackers to...

SonicWall Patches Multiple Vulnerabilities in NetExtender Windows Client

0
SonicWall has issued a critical alert concerning multiple vulnerabilities discovered in its NetExtender Windows client.These vulnerabilities, identified via several Common Vulnerabilities and Exposures (CVEs),...
Crypto Packages

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

0
Threat actors are using open-source software (OSS) repositories to install malicious code into trusted applications, particularly targeting cryptocurrency software.The ReversingLabs (RL) research team has...

Hands-On Labs: The Key to Accelerating CMMC 2.0 Compliance

0
INE Security Highlights How Practical, immersive training environments help defense contractors meet DoD cybersecurity requirementsDefense contractors are facing increased pressure to meet the Department...

VMware ESXi 8.0 Update 3e Is Now Free — Here’s What’s New

0
VMware has announced that ESXi 8.0 Update 3e, the latest version of its industry-leading hypervisor, is now available for download at no cost.Released on April 10,...

Google Removes 5.5 Billion Malicious Ads, Suspends 700,000+ Offending Advertisers

0
Google has announced the removal of 5.5 billion malicious advertisements and the suspension of over 700,000 offending advertiser accounts in 2024, according to its...

Ivanti 0-Day RCE Flaw Exploitation Details Revealed

0
A critical unauthenticated Remote Code Execution (RCE) vulnerability, CVE-2025-22457, has been disclosed by Ivanti, sparking concerns across the cybersecurity industry.The flaw, which affects several Ivanti products, allows...
Dangling DNS Attack

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

0
Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing significant threats to organizations' security frameworks.This attack vector has...

Critical Erlang/OTP SSH Vulnerability Allow Hackers Execute Arbitrary Code Remotely

A major security flaw has been uncovered in the widely used Erlang/OTP SSH implementation, drawing urgent attention from the cybersecurity community worldwide.The vulnerability, tracked...

Chinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Tools

The China-sponsored hacking group, Mustang Panda, has been uncovered by Zscaler ThreatLabz to employ new techniques and tools, including the updated backdoor ToneShell and...

How IT Professionals Maintain Efficiency with Brain Biohacking Techniques

In a world where code and coffee have become inseparable companions, IT professionals are constantly seeking new ways to stay at peak productivity. Have...

CISA Warns of Potential Credential Exploits Linked to Oracle Cloud Hack

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a public warning following reports of possible unauthorized access to a legacy Oracle Cloud environment.While...

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts

Researchers from Palo Alto Networks have uncovered a series of malicious spam campaigns leveraging the notorious Agent Tesla malware through intricate, multi-stage infection vectors.The...

Intel Sells 51% Stake in Altera to Silver Lake in $8.75 Billion Deal

Intel Corporation has announced the divestiture of a 51% stake in its Altera division to Silver Lake, valuing the programmable logic company at $8.75...

Critical Flaw in PHP’s extract() Function Enables Arbitrary Code Execution

A critical vulnerability in PHP’s extract() function has been uncovered, enabling attackers to execute arbitrary code by exploiting memory corruption flaws.The issue affects PHP versions 5.x,...

Hacker Leaks 33,000 Employee Records in Third-Party API Breach

A hacker has exposed the personal records of over 33,000 employees after discovering unrestricted endpoints belonging to a major technology service provider.The breach, first...

Google Removes 5.5 Billion Malicious Ads, Suspends 700,000+ Offending Advertisers

Google has announced the removal of 5.5 billion malicious advertisements and the suspension of over 700,000 offending advertiser accounts in 2024, according to its...

Glossary