Latest Cybersecurity News and Articles


Vulnerability Exploitation Possibly Behind Widespread DrayTek Router Reboots

25 March 2025
DrayTek routers around the world are rebooting and the vendor’s statement suggests that it may involve the exploitation of a vulnerability. The post Vulnerability Exploitation Possibly Behind Widespread DrayTek Router Reboots appeared first on SecurityWeek.

VMware Patches Authentication Bypass Flaw in Windows Tools Suite

25 March 2025
The authentication bypass vulnerability, tagged as CVE-2025-22230, carries a CVSS severity score of 7.8/10. The post VMware Patches Authentication Bypass Flaw in Windows Tools Suite appeared first on SecurityWeek.

Microsoft Adds AI Agents to Security Copilot

25 March 2025
Microsoft has expanded the capabilities of Security Copilot with AI agents tackling data security, phishing, and identity management. The post Microsoft Adds AI Agents to Security Copilot appeared first on SecurityWeek.

Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker

25 March 2025
A new investigation has unearthed nearly 200 unique command-and-control (C2) domains associated with a malware called Raspberry Robin. "Raspberry Robin (also known as Roshtyak or Storm-0856) is a complex and evolving threat actor that provides initial access broker (IAB) services to numerous criminal groups, many of which have connections to Russia," Silent Push said in a report shared with The

Charm Security Emerges From Stealth With $8 Million in Funding

25 March 2025
Charm Security has emerged from stealth mode with $8 million in funding for AI-powered scams and social engineering prevention. The post Charm Security Emerges From Stealth With $8 Million in Funding appeared first on SecurityWeek.

Numotion Data Breach Impacts Nearly 500,000 People

25 March 2025
Email-related data breach suffered by wheelchair and other mobility equipment provider Numotion affects almost 500,000 individuals.  The post Numotion Data Breach Impacts Nearly 500,000 People appeared first on SecurityWeek.

Chinese APT Weaver Ant Targeting Telecom Providers in Asia

25 March 2025
Weaver Ant, a cyberespionage-focused APT operating out of China, is targeting telecom providers for persistent access. The post Chinese APT Weaver Ant Targeting Telecom Providers in Asia appeared first on SecurityWeek.

Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years

25 March 2025
A major telecommunications company located in Asia was allegedly breached by Chinese state-sponsored hackers who spent over four years inside its systems, according to a new report from incident response firm Sygnia. The cybersecurity company is tracking the activity under the name Weaver Ant, describing the threat actor as stealthy and highly persistent. The name of the telecom provider was not

Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs

25 March 2025
Threats themselves change very little, but the tactics used are continually revised to maximize the criminals’ return on investment and effort. The post Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs appeared first on SecurityWeek.

Hacker Conversations: Frank Trezza – From Phreaker to Pentester

25 March 2025
Frank Trezza is fairly typical of most hackers. Early pranks sometimes leading to something more serious. The post Hacker Conversations: Frank Trezza – From Phreaker to Pentester appeared first on SecurityWeek.

AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface

25 March 2025
Organizations now use an average of 112 SaaS applications—a number that keeps growing. In a 2024 study, 49% of 644 respondents who frequently used Microsoft 365 believed that they had less than 10 apps connected to the platform, despite the fact that aggregated data indicated over 1,000+ Microsoft 365 SaaS-to-SaaS connections on average per deployment. And that’s just one major SaaS provider.

300 Arrested in Crackdown on Cybercrime Rings in Africa

25 March 2025
Authorities in seven African countries arrested 300 suspects in an international crackdown on cybercriminal networks targeting businesses. The post 300 Arrested in Crackdown on Cybercrime Rings in Africa appeared first on SecurityWeek.

IngressNightmare Flaws Expose Many Kubernetes Clusters to Remote Hacking

25 March 2025
Critical remote code execution vulnerabilities found by Wiz researchers in Ingress NGINX Controller for Kubernetes. The post IngressNightmare Flaws Expose Many Kubernetes Clusters to Remote Hacking appeared first on SecurityWeek.

Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps

25 March 2025
Cybersecurity researchers are calling attention to an Android malware campaign that leverages Microsoft's .NET Multi-platform App UI (.NET MAUI) framework to create bogus banking and social media apps targeting Indian and Chinese-speaking users. "These threats disguise themselves as legitimate apps, targeting users to steal sensitive information," McAfee Labs researcher Dexter Shin said. .NET

INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust

25 March 2025
Law enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation codenamed Red Card that took place between November 2024 and February 2025. The coordinated effort "aims to disrupt and dismantle cross-border criminal networks which cause significant harm to individuals and businesses," INTERPOL said, adding it

Rooted mobile devices are 250 times more vulnerable

25 March 2025
Although there has been a reduction in rooted and jailbroken devices, these devices are still a security concern for users and enterprises.

Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

24 March 2025
A set of five critical security shortcomings have been disclosed in the Ingress NGINX Controller for Kubernetes that could result in unauthenticated remote code execution, putting over 6,500 clusters at immediate risk by exposing the component to the public internet. The vulnerabilities (CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, and CVE-2025-1974 ), assigned a CVSS score of

Microsoft Adds Inline Data Protection to Edge for Business to Block GenAI Data Leaks

24 March 2025
Microsoft on Monday announced a new feature called inline data protection for its enterprise-focused Edge for Business web browser. The native data security control is designed to prevent employees from sharing sensitive company-related data into consumer generative artificial intelligence (GenAI) apps like OpenAI ChatGPT, Google Gemini, and DeepSeek. The list will be expanded over time to

NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD

24 March 2025
The effects of the backlog is already being felt in vulnerability management circles where NVD data promises an enriched source of truth. The post NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD appeared first on SecurityWeek.

Oracle Denies Cloud Breach After Hacker Offers to Sell Data 

24 March 2025
Oracle has denied that Cloud systems have been breached after a hacker claimed to have stolen millions of records. The post Oracle Denies Cloud Breach After Hacker Offers to Sell Data  appeared first on SecurityWeek.