Latest Cybersecurity News and Articles
07 February 2025
Microsoft is warning of an insecure practice wherein software developers are incorporating publicly disclosed ASP.NET machine keys from publicly accessible resources, thereby putting their applications in attackers' pathway.
The tech giant's threat intelligence team said it observed limited activity in December 2024 that involved an unknown threat actor using a publicly available, static ASP.NET
07 February 2025
India's central bank, the Reserve Bank of India (RBI), said it's introducing an exclusive "bank.in" internet domain for banks in the country to combat digital financial fraud.
"This initiative aims to reduce cyber security threats and malicious activities like phishing; and, streamline secure financial services, thereby enhancing trust in digital banking and payment services," the RBI said in a
07 February 2025
Trimble Cityworks is affected by a zero-day vulnerability that has been exploited in attacks involving the delivery of malware.
The post Trimble Cityworks Customers Warned of Zero-Day Exploitation appeared first on SecurityWeek.
07 February 2025
Threat actors have been observed exploiting recently disclosed security flaws in SimpleHelp's Remote Monitoring and Management (RMM) software as a precursor for what appears to be a ransomware attack.
The intrusion leveraged the now-patched vulnerabilities to gain initial access and maintain persistent remote access to an unspecified target network, cybersecurity company Field Effect said in a
06 February 2025
New mobile apps from the Chinese artificial intelligence (AI) company DeepSeek have remained among the top three "free" downloads for Apple and Google devices since their debut on Jan. 25, 2025. But experts caution that many of DeepSeek's design choices -- such as using hard-coded encryption keys, and sending unencrypted user and device data to Chinese companies -- introduce a number of glaring security and privacy risks.
06 February 2025
A bipartisan duo in the the U.S. House is proposing legislation to ban the Chinese artificial intelligence app DeepSeek from federal devices.
The post House Lawmakers Push to Ban AI App DeepSeek From US Government Devices appeared first on SecurityWeek.
06 February 2025
Zimperium warns that threat actors have stolen the information of tens of thousands of Android users in India using over 1,000 malicious applications.
The post 1,000 Apps Used in Malicious Campaign Targeting Android Users in India appeared first on SecurityWeek.
06 February 2025
Video-based abuse is being leveraged in a new Bitcoin scam.
06 February 2025
Bogus websites advertising Google Chrome have been used to distribute malicious installers for a remote access trojan called ValleyRAT.
The malware, first detected in 2023, is attributed to a threat actor tracked as Silver Fox, with prior attack campaigns primarily targeting Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China.
"This actor has increasingly targeted key roles
06 February 2025
Ransomware attacks netted cybercrime groups a total of $813.5 million in 2024, a decline from $1.25 billion in 2023.
The total amount extorted during the first half of 2024 stood at $459.8 million, blockchain intelligence firm Chainalysis said, adding payment activity slumped after July 2024 by about 3.94%.
"The number of ransomware events increased into H2, but on-chain payments declined,
06 February 2025
A new report reveals an increase in credential-stealing malware.
06 February 2025
Astra Security and Invary have received new funding to fuel development of their vulnerability scanning and runtime security solutions.
The post Astra, Invary Raise Millions for AI-Powered Pentesting, Runtime Security appeared first on SecurityWeek.
06 February 2025
Spanish authorities have arrested an individual who allegedly hacked several high-profile organizations, including NATO and the US army.
The post Hacker Who Targeted NATO, US Army Arrested in Spain appeared first on SecurityWeek.
06 February 2025
Five Eyes cybersecurity agencies have released guidance on securing edge devices against increasing threats.
The post Five Eyes Agencies Release Guidance on Securing Edge Devices appeared first on SecurityWeek.
06 February 2025
The blame of security incidents may be shared—but the burden of response always falls on the security team. Here’s how to prepare for the inevitable.
The post Security Teams Pay the Price: The Unfair Reality of Cyber Incidents appeared first on SecurityWeek.
06 February 2025
A new malware campaign dubbed SparkCat has leveraged a suit of bogus apps on both Apple's and Google's respective app stores to steal victims' mnemonic phrases associated with cryptocurrency wallets.
The attacks leverage an optical character recognition (OCR) model to exfiltrate select images containing wallet recovery phrases from photo libraries to a command-and-control (C2) server,
06 February 2025
Critical vulnerabilities in Cisco Identity Services Engine could lead to elevation of privileges and system configuration modifications.
The post Cisco Patches Critical Vulnerabilities in Enterprise Management Product appeared first on SecurityWeek.
06 February 2025
Privileged Access Management (PAM) has emerged as a cornerstone of modern cybersecurity strategies, shifting from a technical necessity to a critical pillar in leadership agendas. With the PAM market projected to reach $42.96 billion by 2037 (according to Research Nester), organizations invest heavily in PAM solutions.
Why is PAM climbing the ranks of leadership priorities? While Gartner
06 February 2025
The North Korea-linked nation-state hacking group known as Kimsuky has been observed conducting spear-phishing attacks to deliver an information stealer malware named forceCopy, according to new findings from the AhnLab Security Intelligence Center (ASEC).
The attacks commence with phishing emails containing a Windows shortcut (LNK) file that's disguised as a Microsoft Office or PDF document.
06 February 2025
Researchers see dozens of fake DeepSeek websites used for credential phishing, cryptocurrency theft, and scams.
The post Fake DeepSeek Sites Used for Credential Phishing, Crypto Theft, Scams appeared first on SecurityWeek.