π British Vishing-as-a-Service Trio Sentenced π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Three men have been sentenced after pleading guilty to running an account hijacking service for fraudsters.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
British Vishing-as-a-Service Trio Sentenced
Three men have been sentenced after pleading guilty to running an account hijacking service for fraudsters
π¦
Critical Vulnerabilities in Node.js Expose Systems to Remote Attacks π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Overview A series of critical security vulnerabilities have been discovered in multiple versions of Node.js, a popular opensource JavaScript runtime used to build scalable network applications. These vulnerabilities, outlined in CERTIn Vulnerability Note CIVN20250011, have been classified as high severity, with the potential to compromise sensitive information, disrupt services, and even execute arbitrary code. Users of Node.js, including developers and organizations relying on this platform, are urged to take immediate action to secure their systems. The vulnerabilities affect several versions of Node.js, including both longterm support LTS and current releases. Affected versions include Node.js v18.x, v20.x, v22.x, and the latest v23.x. The flaws stem from various issues, incl...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Node.js Flaws Expose Systems To Remote Attacks
Critical security vulnerabilities in multiple Node.js versions (v18.x, v20.x, v22.x, v23.x) pose high risks, including data theft, DoS, and system compromise.
π¦
phpMyAdmin 5.2.2 Addresses Critical XSS and Library Vulnerabilities π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Overview phpMyAdmin, a popular webbased tool for managing MySQL and MariaDB databases, has recently released version 5.2.2, addressing multiple vulnerabilities that posed a medium severity risk. This widelyused tool is a basis for database administrators, offering strong features and ease of use. However, the vulnerabilities discovered could potentially expose users to risks such as unauthorized actions, session hijacking, and data theft. The update resolves two crosssite scripting XSS vulnerabilities CVE202524530 and CVE202524529 and a potential issue in the glibciconv library CVE20242961. These vulnerabilities underline the importance of staying up to date with security patches to safeguard sensitive data and ensure secure database management. According to the advisory Re...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
PhpMyAdmin 5.2.2 Fixes Critical XSS & Library Flaws
phpMyAdmin 5.2.2 addresses medium-severity vulnerabilities, including two XSS flaws (CVE-2025-24530, CVE-2025-24529) and a glibc/iconv issue.
π Mega Data Breaches Push US Victim Count to 1.7 Billion π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The number of data breach victims increased 312 annually to exceed 1.7 billion in 2024, according to the ITRC 2024 Annual Data Breach Report.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Mega Data Breaches Push US Victim Count to 1.7 Billion
The number of data breach victims increased 312% annually to exceed 1.7 billion in 2024, according to the ITRC 2024 Annual Data Breach Report
π¦Ώ How to Use 1Password: A Guide for Beginners π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Learn how to use 1Password to securely store and manage your passwords. This stepbystep guide will help you get started.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
How to Use 1Password: A Guide for Beginners
Discover how to use 1Password effectively for secure password management. Read this step-by-step guide and start protecting your accounts today.
π API Supply Chain Attacks Put Millions of Airline Users at Risk π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
An API supplychain attack affecting a popular online travel booking service put millions of airline users at risk.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
API Supply Chain Attacks Put Millions of Airline Users at Risk
An API supply-chain attack affecting a popular online travel booking service put millions of airline users at risk
π 58% of Ransomware Victims Forced to Shut Down Operations π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A Ponemon Institute survey highlighted the growing impact of ransomware attacks on victims revenue and reputation.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
58% of Ransomware Victims Forced to Shut Down Operations
A Ponemon Institute survey highlighted the growing impact of ransomware attacks on victimsβ revenue and reputation
π’ Hackers are using a new AI chatbot to wage cyber attacks: GhostGPT lets users write malicious code, create malware, and curate phishing emails β and it costs just $50 to use π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Researchers at Abnormal Security have warned about the rise of GhostGPT, a new chatbot used by cyber criminals to create malicious code and malware.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Hackers are using a new AI chatbot to wage cyber attacks: GhostGPT lets users write malicious code, create malware, and curateβ¦
Researchers warn GhostGPT could help hackers wage more sophisticated attacks
π΅οΈββοΈ Cryptographic Agility's Legislative Possibilities & Business Benefits π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Quantum computing will bring new security risks. Both professionals and legislators need to use this time to prepare.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Cryptographic Agility's Legislative Possibilities
Quantum computing will bring new security risks. Both professionals and legislators need to use this time to prepare.
π§ 4 trends in software supply chain security π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most wellknown, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised. The post 4 trends in software supply chain security appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
4 trends in software supply chain security
Some of the most infamous cyberattacks of the past decade were caused by a breach in the software supply chain. How can organizations protect themselves?
ποΈ OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have disclosed details of a nowpatched account takeover vulnerability affecting a popular online travel service for hotel and car rentals. "By exploiting this flaw, attackers can gain unauthorized access to any users account within the system, effectively allowing them to impersonate the victim and perform an array of actions on their behalf including.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π2
π¦Ώ How to Protect and Secure Your Data in 10 Ways π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Use this comprehensive list of strategies to help you safeguard your company's data from threats and data breaches.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
How to Protect and Secure Your Data in 10 Ways
Use this comprehensive list of strategies to help you safeguard your company's data from threats and data breaches.
ποΈ PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland and Germany. The attacks have led to the deployment of various payloads, such as Agent Tesla, Snake Keylogger, and a previously undocumented backdoor dubbed TorNet that's delivered by means of PureCrypter. TorNet is so.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π ENGlobal Cyber-Attack Exposes Sensitive Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Energy contractor ENGlobal reported that sensitive personal data was stolen by threat actors, with the incident disrupting operations for six weeks.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
ENGlobal Cyber-Attack Exposes Sensitive Data
Energy contractor ENGlobal reported that sensitive personal data was stolen by threat actors, with the incident disrupting operations for six weeks
π Lynx Ransomware Group Unveiled with Sophisticated Affiliate Program π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
GroupIB researchers have exposed the highly organized affiliate platform and sophisticated operations of the Lynx RansomwareasaService group.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Lynx Ransomware Group Unveiled with Sophisticated Affiliate Program
Group-IB researchers have exposed the highly organized affiliate platform and sophisticated operations of the Lynx Ransomware-as-a-Service group
π΅οΈββοΈ Super Bowl LIX Could Be a Magnet for Cyberattacks π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Concerns include everything from ransomware, malware, and phishing attacks on the game's infrastructure to those targeting event sponsors and fans.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Super Bowl LIX Could Be a Magnet for Cyberattacks
Concerns include everything from ransomware, malware, and phishing attacks on the game's infrastructure to those targeting event sponsors and fans.
π΅οΈββοΈ Phishing Campaign Baits Hook With Malicious Amazon PDFs π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
In their discovery, researchers found 31 PDF files linking to these phishing websites, none of which have been yet submitted to VirusTotal.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Phishing Campaign Baits Hook With Malicious Amazon PDFs
In their discovery, researchers found 31 PDF files linking to these phishing websites, none of which have been yet submitted to VirusTotal.
π΅οΈββοΈ OAuth Flaw Exposed Millions of Airline Users to Account Takeovers π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The nowfixed vulnerability involved a major travel services company that's integrated with dozens of airline websites worldwide.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
OAuth Flaw Exposed Airline Users to Account Takeovers
The now-fixed vulnerability involved a major travel services company that's integrated with dozens of airline websites worldwide.
π΅οΈββοΈ Lynx Ransomware Group 'Industrializes' Cybercrime With Affiliates π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The ransomware group provides everything an affiliate could want to breach and attack victims, including a quality controlled recruitment system to engage even more criminals.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Lynx Ransomware Group Adds Affiliates to 'Industrialize'
The ransomware group provides everything an affiliate could want to breach and attack victims, including a quality-controlled recruitment system to engage even more criminals.
ποΈ UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The advanced persistent threat APT group known as UAC0063 has been observed leveraging legitimate documents obtained by infiltrating one victim to attack another target with the goal of delivering a known malware dubbed HATVIBE. "This research focuses on completing the picture of UAC0063's operations, particularly documenting their expansion beyond their initial focus on Central Asia,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Broadcom has alerted of a highseverity security flaw in VMware Avi Load Balancer that could be weaponized by malicious actors to gain entrenched database access. The vulnerability, tracked as CVE202522217 CVSS score 8.6, has been described as an unauthenticated blind SQL injection. "A malicious user with network access may be able to use specially crafted SQL queries to gain database.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity