Latest Cybersecurity News and Articles


Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity

10 January 2025
Network segmentation remains a critical security requirement, yet organizations struggle with traditional approaches that demand extensive hardware investments, complex policy management, and disruptive network changes. Healthcare and manufacturing sectors face particular challenges as they integrate diverse endpoints – from legacy medical devices to IoT sensors – onto their production networks.

Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices

10 January 2025
Cybersecurity researchers have detailed a now-patched security flaw impacting Monkey's Audio (APE) decoder on Samsung smartphones that could lead to code execution. The high-severity vulnerability, tracked as CVE-2024-49415 (CVSS score: 8.1), affects Samsung devices running Android versions 12, 13, and 14. "Out-of-bounds write in libsaped.so prior to SMR Dec-2024 Release 1 allows remote

RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns

10 January 2025
Mongolia, Taiwan, Myanmar, Vietnam, and Cambodia have been targeted by the China-nexus RedDelta threat actor to deliver a customized version of the PlugX backdoor between July 2023 and December 2024. "The group used lure documents themed around the 2024 Taiwanese presidential candidate Terry Gou, the Vietnamese National Holiday, flood protection in Mongolia, and meeting invitations, including an

CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig Cryptominer

10 January 2025
Cybersecurity company CrowdStrike is alerting of a phishing campaign that exploits its own branding to distribute a cryptocurrency miner that's disguised as an employee CRM application as part of a supposed recruitment process. "The attack begins with a phishing email impersonating CrowdStrike recruitment, directing recipients to a malicious website," the company said. "Victims are prompted to

The Green Bay Packers online store breached, customer information compromised

10 January 2025
The Green Bay Packers is notifying of a breach against its online store, which may have impacted the personal and/or financial data of customers.

Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers

09 January 2025
Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data. "Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create and

New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption

09 January 2025
Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer. "Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple's XProtect," Check Point Research said in a new analysis shared with The Hacker News. "This development allows it to

“U.S. Cyber Trust Mark” launched by the White House

09 January 2025
The White House announced a “U.S. Cyber Trust Mark,” establishing a label for American consumers to verify if their connected devices are cybersecure.

Product Review: How Reco Discovers Shadow AI in SaaS

09 January 2025
As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has emerged in the world of AI: shadow AI.  Shadow AI refers to the unauthorized use of AI tools and copilots at organizations. For example, a developer using ChatGPT to assist with writing code, a salesperson downloading an AI-powered meeting transcription tool, or a

MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan

09 January 2025
Japan's National Police Agency (NPA) and National Center of Incident Readiness and Strategy for Cybersecurity (NCSC) accused a China-linked threat actor named MirrorFace of orchestrating a persistent attack campaign targeting organizations, businesses, and individuals in the country since 2019. The primary objective of the attack campaign is to steal information related to Japan's national

Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions

09 January 2025
Ransomware isn’t slowing down—it’s getting smarter. Encryption, designed to keep our online lives secure, is now being weaponized by cybercriminals to hide malware, steal data, and avoid detection.The result? A 10.3% surge in encrypted attacks over the past year and some of the most shocking ransom payouts in history, including a $75 million ransom in 2024. Are you prepared to fight back? Join

Recent research reveals “phish-free PayPal phishing” scam

09 January 2025
Research reveals the emergence of a “phish-free PayPal phishing” scam.

Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection

09 January 2025
Threat actors are attempting to take advantage of a recently disclosed security flaw impacting GFI KerioControl firewalls that, if successfully exploited, could allow malicious actors to achieve remote code execution (RCE). The vulnerability in question, CVE-2024-52875, refers to a carriage return line feed (CRLF) injection attack, paving the way for HTTP response splitting, which could then

Active exploitation of vulnerability affecting Ivanti Connect Secure

09 January 2025
Organisations are encouraged to take immediate action to mitigate vulnerabilities affecting Ivanti Connect Secure, Policy Secure and ZTA Gateways (CVE-2025-0282, CVE-2025-0283) and to follow the latest vendor advice.

E.U. Commission Fined for Transferring User Data to Meta in Violation of Privacy Laws

09 January 2025
The European General Court on Wednesday fined the European Commission, the primary executive arm of the European Union responsible for proposing and enforcing laws for member states, for violating the bloc's own data privacy regulations. The development marks the first time the Commission has been held liable for infringing stringent data protection laws in the region. The court determined that

Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure

08 January 2025
Ivanti is warning that a critical security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA Gateways has come under active exploitation in the wild beginning mid-December 2024. The security vulnerability in question is CVE-2025-0282 (CVSS score: 9.0), a stack-based buffer overflow that affects Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2

Active exploitation of vulnerabilities affecting Ivanti Connect Secure, Policy Secure & ZTA Gateways products

08 January 2025
Organisations are encouraged to take immediate action to mitigate vulnerabilities affecting Ivanti Connect Secure, Policy Secure and ZTA Gateways (CVE-2025-0282, CVE-2025-0283) and to follow the latest vendor advice.

Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections

08 January 2025
Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns. Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious. While there are safeguards such as DomainKeys

Researchers Expose NonEuclid RAT Using UAC Bypass and AMSI Evasion Techniques

08 January 2025
Cybersecurity researchers have shed light on a new remote access trojan called NonEuclid that allows bad actors to remotely control compromised Windows systems. "The NonEuclid remote access trojan (RAT), developed in C#, is a highly sophisticated malware offering unauthorised remote access with advanced evasion techniques," Cyfirma said in a technical analysis published last week. "It employs

Top 5 Malware Threats to Prepare Against in 2025

08 January 2025
2024 had its fair share of high-profile cyber attacks, with companies as big as Dell and TicketMaster falling victim to data breaches and other infrastructure compromises. In 2025, this trend will continue. So, to be prepared for any kind of malware attack, every organization needs to know its cyber enemy in advance. Here are 5 common malware families that you can start preparing to counter