Latest Cybersecurity News and Articles


67% of organizations experience a certificate-related outage monthly

17 March 2025
A recent report by CyberArk revealed that 72% of organizations have experienced at least one certificate-related outage in the past year.

Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year

17 March 2025
An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by threat actors to deliver Mirat botnet malware variants since at least May 2024. The vulnerability in question is CVE-2025-1316 (CVSS v4 score: 9.3), a critical operating system command injection flaw that an attacker could exploit to achieve remote code execution on susceptible devices by means of a

Microsoft 365 Targeted in New Phishing, Account Takeover Attacks

17 March 2025
Threat actors are abusing Microsoft 365 infrastructure in a BEC campaign, and target its users in two brand impersonation campaigns. The post Microsoft 365 Targeted in New Phishing, Account Takeover Attacks appeared first on SecurityWeek.

100 Car Dealerships Hit by Supply Chain Attack

17 March 2025
The websites of over 100 auto dealerships were found serving malicious ClickFix code in a supply chain compromise. The post 100 Car Dealerships Hit by Supply Chain Attack appeared first on SecurityWeek.

Chinese threat actor resided in US electric grid for almost one year

17 March 2025
A case study discusses an intrusion into the United States electric grid associated with Volt Typhoon, a Chinese threat actor.

Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users' Actions

17 March 2025
Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format the layout of web pages, to bypass spam filters and track users' actions. That's according to new findings from Cisco Talos, which said such malicious activities can compromise a victim's security and privacy. "The features available in CSS allow attackers and spammers to track users' actions and

⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More

17 March 2025
From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week’s cybersecurity landscape is a reminder that attackers are always evolving. Advanced threat groups are exploiting outdated hardware, abusing legitimate tools for financial fraud, and finding new ways to bypass security defenses. Meanwhile, supply chain threats are on the rise, with open-source

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services

17 March 2025
Vulnerabilities in Nvidia Riva could allow hackers to abuse speech and translation AI services that are typically expensive.  The post Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services appeared first on SecurityWeek.

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

17 March 2025
The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is found in 66% of cloud storage buckets. This data is vulnerable to ransomware attacks. The SANS Institute recently reported that these attacks can be performed by abusing the cloud provider’s storage security controls and default settings. “In just the past few months, I have witnessed two different methods for

GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories

17 March 2025
Cybersecurity researchers are calling attention to an incident in which the popular GitHub Action tj-actions/changed-files was compromised to leak secrets from repositories using the continuous integration and continuous delivery (CI/CD) workflow. The incident involved the tj-actions/changed-files GitHub Action, which is used in over 23,000 repositories. It's used to track and retrieve all

Industry Moves for the week of March 17, 2025 - SecurityWeek

17 March 2025
Explore industry moves and significant changes in the industry for the week of March 17, 2025. Stay updated with the latest industry trends and shifts.

Popular GitHub Action Targeted in Supply Chain Attack

17 March 2025
The tj-actions/changed-files GitHub Action, which is used in 23,000 repositories, has been targeted in a supply chain attack. The post Popular GitHub Action Targeted in Supply Chain Attack appeared first on SecurityWeek.

Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal

15 March 2025
Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index (PyPI) repository with bogus libraries masquerading as "time" related utilities, but harboring hidden functionality to steal sensitive data such as cloud access tokens. Software supply chain security firm ReversingLabs said it discovered two sets of packages totaling 20 of them. The packages

ClickFix: How to Infect Your PC in Three Easy Steps

14 March 2025
A clever malware deployment scheme first spotted in targeted attacks last year has now gone mainstream. In this scam, dubbed "ClickFix," the visitor to a hacked or malicious website is asked to distinguish themselves from bots by pressing a combination of keyboard keys that causes Microsoft Windows to download password-stealing malware.

3 Ivanti flaws added to CISA’s vulnerabilities catalogue

14 March 2025
CISA has announced five known exploited vulnerabilities now in its catalogue, three of which are Ivanti Endpoint Manager flaws. 

Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges

14 March 2025
A 51-year-old dual Russian and Israeli national who is alleged to be a developer of the LockBit ransomware group has been extradited to the United States, nearly three months after he was formally charged in connection with the e-crime scheme. Rostislav Panev was previously arrested in Israel in August 2024. He is said to have been working as a developer for the ransomware gang from 2019

GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging

14 March 2025
The GSM Association (GSMA) has formally announced support for end-to-end encryption (E2EE) for securing messages sent via the Rich Communications Services (RCS) protocol, bringing much-needed security protections to cross-platform messages shared between Android and iOS platforms. To that end, the new GSMA specifications for RCS include E2EE based on the Messaging Layer Security (MLS) protocol

In Other News: Swiss Breach Disclosure Rules, ESP32 Chip Backdoor Disputed, MassJacker

14 March 2025
Noteworthy stories that might have slipped under the radar: Switzerland requires disclosure of critical infrastructure attacks, ESP32 chips don’t contain a backdoor, MassJacker cryptojacking malware. The post In Other News: Swiss Breach Disclosure Rules, ESP32 Chip Backdoor Disputed, MassJacker appeared first on SecurityWeek.

ClickFix Widely Adopted by Cybercriminals, APT Groups

14 March 2025
The ClickFix technique has been employed by cybercrime and APT groups for information stealer and other malware deployment. The post ClickFix Widely Adopted by Cybercriminals, APT Groups appeared first on SecurityWeek.

LockBit Ransomware Developer Extradited to US

14 March 2025
Russian-Israeli LockBit ransomware developer Rostislav Panev has been extradited from Israel to the United States. The post LockBit Ransomware Developer Extradited to US appeared first on SecurityWeek.