Latest Cybersecurity News and Articles


Qualcomm Extends Security Support for Android Devices to 8 Years

26 February 2025
Qualcomm says it’s working with Google to ensure that Android device manufacturers will be able to provide security updates for 8 years. The post Qualcomm Extends Security Support for Android Devices to 8 Years appeared first on SecurityWeek.

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

26 February 2025
Universities and government organizations in North America and Asia have been targeted by a previously undocumented Linux malware called Auto-Color between November and December 2024, according to new findings from Palo Alto Networks Unit 42. "Once installed, Auto-color allows threat actors full remote access to compromised machines, making it very difficult to remove without specialized

3.3 Million People Impacted by DISA Data Breach

26 February 2025
Background and drug screening giant DISA has revealed that a 2024 data breach impacts more than 3.3 million people. The post 3.3 Million People Impacted by DISA Data Breach appeared first on SecurityWeek.

Three Password Cracking Techniques and How to Defend Against Them

26 February 2025
Passwords are rarely appreciated until a security breach occurs; suffice to say, the importance of a strong password becomes clear only when faced with the consequences of a weak one. However, most end users are unaware of just how vulnerable their passwords are to the most common password-cracking methods. The following are the three common techniques for cracking passwords and how to

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

26 February 2025
The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday warned of renewed activity from an organized criminal group it tracks as UAC-0173 that involves infecting computers with a remote access trojan named DCRat (aka DarkCrystal RAT). The Ukrainian cybersecurity authority said it observed the latest attack wave starting in mid-January 2025. The activity is designed to target the

Malicious PyPI Package "automslc" Enables 104K+ Unauthorized Deezer Music Downloads

26 February 2025
Cybersecurity researchers have flagged a malicious Python library on the Python Package Index (PyPI) repository that facilitates unauthorized music downloads from music streaming service Deezer. The package in question is automslc, which has been downloaded over 104,000 times to date. First published in May 2019, it remains available on PyPI as of writing. "Although automslc, which has been

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation

25 February 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed two security flaws impacting Microsoft Partner Center and Synacor Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities in question are as follows - CVE-2024-49035 (CVSS score: 8.7) - An improper access control

Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

25 February 2025
A China-linked botnet powered by 130,000 hacked devices has targeted Microsoft 365 accounts with password spraying attacks. The post Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts appeared first on SecurityWeek.

Offensive AI Startup Dreadnode Secures $14M to Stress-Test AI Systems

25 February 2025
Dreadnode is building “offensive machine learning” tools to safely simulate how AI models might be exploited in the wild. The post Offensive AI Startup Dreadnode Secures $14M to Stress-Test AI Systems appeared first on SecurityWeek.

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile

25 February 2025
Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram. LightSpy is the name given to a modular spyware that's capable of infecting both Windows and Apple systems with an aim to harvest data. It was first documented in

Skybox Security Shuts Down, Lays off Entire Workforce 

25 February 2025
The sudden shutdown follows the sale of Skybox Security’s business and technology assets to rival Israeli cybersecurity firm Tufin.  The post Skybox Security Shuts Down, Lays off Entire Workforce  appeared first on SecurityWeek.

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

25 February 2025
Opposition activists in Belarus as well as Ukrainian military and government organizations are the target of a new campaign that employs malware-laced Microsoft Excel documents as lures to deliver a new variant of PicassoLoader.  The threat cluster has been assessed to be an extension of a long-running campaign mounted by a Belarus-aligned threat actor dubbed Ghostwriter (aka Moonscape,

Open source software vulnerabilities found in 86% of codebases

25 February 2025
86% of codebases had open source software vulnerabilities while 81% had high- or critical-risk vulnerabilities.

Edera Banks $15M for Kubernetes Workload Isolation Tech

25 February 2025
Seattle startup building technology to mitigate lateral movement and block “living off the land” techniques wins interest from investors. The post Edera Banks $15M for Kubernetes Workload Isolation Tech appeared first on SecurityWeek.

Leader of North Korean Hackers Sanctioned by EU

25 February 2025
The EU has announced new sanctions against entities aiding Russia’s war against Ukraine, including an individual who leads North Korean hackers. The post Leader of North Korean Hackers Sanctioned by EU appeared first on SecurityWeek.

John Carse hired as Field CISO at Squarex

25 February 2025
John Carse has been hired as Field Chief Information Security Officer (CISO) at SquareX. Carse has over two decades of cybersecurity experience.

Nine Threat Groups Active in OT Operations in 2024: Dragos

25 February 2025
Dragos has published its 2025 OT/ICS Cybersecurity Report, which provides information on the threats and trends observed in 2024.  The post Nine Threat Groups Active in OT Operations in 2024: Dragos appeared first on SecurityWeek.

CISA Warns of Attacks Exploiting Oracle Agile PLM Vulnerability

25 February 2025
CISA has added CVE-2024-20953, an Oracle Agile PLM vulnerability patched in January 2024, to its KEV catalog.  The post CISA Warns of Attacks Exploiting Oracle Agile PLM Vulnerability appeared first on SecurityWeek.

5 Active Malware Campaigns in Q1 2025

25 February 2025
The first quarter of 2025 has been a battlefield in the world of cybersecurity. Cybercriminals continued launching aggressive new campaigns and refining their attack methods. Below is an overview of five notable malware families, accompanied by analyses conducted in controlled environments. NetSupport RAT Exploiting the ClickFix Technique In early 2025, threat actors began exploiting a technique

2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT

25 February 2025
A large-scale malware campaign has been found leveraging a vulnerable Windows driver associated with Adlice's product suite to sidestep detection efforts and deliver the Gh0st RAT malware. "To further evade detection, the attackers deliberately generated multiple variants (with different hashes) of the 2.0.2 driver by modifying specific PE parts while keeping the signature valid," Check Point