XE Group transitions from credit card skimming to exploiting zero-day vulnerabilities

In a recent shift of tactics, the notorious cybercrime group XE Group has transitioned from credit card skimming to exploiting zero-day vulnerabilities in their...

Hackers infiltrate Microsoft IIS services through Cityworks RCE vulnerability

Hackers have successfully exploited a critical vulnerability in Cityworks deployments, a software used for GIS-centric asset and work order management, resulting in a high-severity remote code execution (RCE) attack. This security flaw, known as CVE-2025-0994 with a CVSS rating of 8.6/10, allows threat actors...

Information about Home Office Apple iCloud access and FBI message scam alert

The UK Home Office, a government body overseeing key functions such as immigration, national...

Top 5 NIS2 Compliance Software and Solution Providers from heimdalsecurity.com

The Network and Information Systems Directive 2 (NIS2) has been officially implemented by the...

XE Group transitions from credit card skimming to exploiting zero-day vulnerabilities

In a recent shift of tactics, the notorious cybercrime group XE Group has transitioned...

Hackers infiltrate Microsoft IIS services through Cityworks RCE vulnerability

Hackers have successfully exploited a critical vulnerability in Cityworks deployments, a software used for...

Challenges of balancing AI personalization and voter privacy in political campaigns

Researcher Mateusz Łabuz, from the IFSH, recently shared insights in a Help Net Security...

XE Group transitions from credit card skimming to exploiting zero-day vulnerabilities

In a recent shift of tactics, the notorious cybercrime group XE Group has transitioned from credit card skimming to exploiting zero-day vulnerabilities in their...

Information about Home Office Apple iCloud access and FBI message scam alert

The UK Home Office, a government body overseeing key functions such as immigration, national...

Top 5 NIS2 Compliance Software and Solution Providers from heimdalsecurity.com

The Network and Information Systems Directive 2 (NIS2) has been officially implemented by the...

Information about Home Office Apple iCloud access and FBI message scam alert

The UK Home Office, a government body overseeing key functions such as immigration, national...
spot_img

Cyber Balkans

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Methods for detecting PaperCut vulnerabilities are circumventable, and Iranian cyber attackers are now involved. A fresh breed of ransomware uses VPNs to penetrate its...

PaperCut vulnerability detection methods have recently been discovered to be easily bypassed, allowing hackers...

Advancements in AI Cybersecurity: Utilizing ChatGPT to Remain Ahead of Cyber Criminals

The field of cybersecurity has rapidly evolved in recent times as the world becomes...

Hackers infiltrate Microsoft IIS services through Cityworks RCE vulnerability

Hackers have successfully exploited a critical vulnerability in Cityworks deployments, a software used for...

Microsoft Issues Warning About ViewState Code Injection

Microsoft's recent warning about ViewState code injection attacks highlights a growing threat to web...

Almost 10% of employee-generated AI prompts contain sensitive data

In the realm of enterprise AI usage, there are three main categories to consider:...

Delilah Schwartz from Cybersixgill Talks About the Evolving Dark Web and New Threats from ChatGPT and Other AI Technologies.

Delilah Schwartz, a cyber threat analyst from Cybersixgill, has recently given an insightful interview...

Risk and Repeat: Are data extortion attacks equivalent to ransomware?

The threat landscape of ransomware has undergone significant changes, leading to a transformation in...

Salt Security collaborates with leading API testing experts in IT security

Salt Security has launched its Salt Technical Ecosystem Partner (STEP) program, aimed at helping...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Major Data Breach: Instagram, TikTok, Yahoo Incident

A Major Data Leak has occurred, affecting several popular social media platforms such as...

Malware

Bad Actors Target DeepSeek in LLMJacking Attacks

Cybercriminals have been quick to adapt their strategies in exploiting large language models (LLMs), with a recent uptick in LLMjacking incidents causing concern. The discovery of LLMjacking by Sysdig TRT back in May 2024 marked the beginning of a trend where attackers have continuously...

Nokoyawa Ransomware Exploits Windows Zero Day Vulnerabilities

A report released by Kaspersky Labs recently shed light on a threat actor that...

PEGA Committee Advocates for Restrictions on Commercial Spyware

The European Parliament committee investigating the abuse of commercial spyware tools such as Pegasus...

Thailand Plans to Disconnect Power to Scam Centers

Thailand's Efforts to Combat Global Fraud by Targeting Border Operations in Myanmar In an unprecedented...

Overcoming Self-Doubt That Holds You Back

In today's competitive job market, changing jobs or seeking a promotion can often be...
spot_img

RISK MANAGEMENTS

Top 5 NIS2 Compliance Software and Solution Providers from heimdalsecurity.com

The Network and Information Systems Directive 2 (NIS2) has been officially implemented by the European Union, with governments across the continent working on transposing...

Explaining the Difference between Symmetric and Asymmetric Encryption

Data is one of the most valuable assets for any organization today. The vast...

Challenges of balancing AI personalization and voter privacy in political campaigns

Researcher Mateusz Łabuz, from the IFSH, recently shared insights in a Help Net Security...

How to Kill NTLM on CSO Online

In a recent blog post, cybersecurity expert Narendran Vaideeswaran from Crowdstrike explained the differences between NTLM and Kerberos in the authentication process. NTLM relies on a three-way handshake between the client and server to authenticate a user, while Kerberos uses a two-part process based...

Protect Yourself from Online Scammers Trying to Take Advantage of You – Source:www.mcafee.com

In the lead-up to the big game, cybercriminals are gearing up to take advantage of the excitement surrounding the event. With various scams targeting...

Cyber Architecture

Hackers infiltrate Microsoft IIS services through Cityworks RCE vulnerability

Hackers have successfully exploited a critical vulnerability in Cityworks deployments, a software used for...

Microsoft Issues Warning About ViewState Code Injection

Microsoft's recent warning about ViewState code injection attacks highlights a growing threat to web...

Huawei’s revenue rapidly increasing as China ignores sanctions – Source: go.theregister.com

Huawei's chairperson, Liang Hua, recently made an announcement at a conference in China indicating...

Confidential Taliban documents leaked online following cyber intrusion into computer networks

The Taliban government of Afghanistan is facing a major crisis as hackers have successfully...

Cybercrime in Karnataka: More than 100,000 calls, yet only about 20,000 FIRs filed – Deccan Herald

In Karnataka, cybercrime has become a growing concern with over 1 lakh complaints received by the police, but only around 20,000 FIRs (First Information Reports) being filed. This alarming statistic showcases the challenges law enforcement agencies face in tackling cyber threats effectively. With the rapid...

All articles

XE Group transitions from credit card skimming to exploiting zero-day vulnerabilities

In a recent shift of tactics, the notorious cybercrime group XE Group has transitioned...

Hackers infiltrate Microsoft IIS services through Cityworks RCE vulnerability

Hackers have successfully exploited a critical vulnerability in Cityworks deployments, a software used for...

Information about Home Office Apple iCloud access and FBI message scam alert

The UK Home Office, a government body overseeing key functions such as immigration, national...

Top 5 NIS2 Compliance Software and Solution Providers from heimdalsecurity.com

The Network and Information Systems Directive 2 (NIS2) has been officially implemented by the...

Challenges of balancing AI personalization and voter privacy in political campaigns

Researcher Mateusz Łabuz, from the IFSH, recently shared insights in a Help Net Security...

Microsoft Issues Warning About ViewState Code Injection

Microsoft's recent warning about ViewState code injection attacks highlights a growing threat to web...

Major Security Risks Found in Mozilla Firefox & Thunderbird

The Indian Computer Emergency Response Team (CERT-In) has recently issued a vulnerability note (CIVN-2025-0016)...

Bad Actors Target DeepSeek in LLMJacking Attacks

Cybercriminals have been quick to adapt their strategies in exploiting large language models (LLMs),...

Europol advises financial sector of impending quantum threat

Europol has issued a warning to Europe's financial services sector, urging them to begin...

Almost 10% of employee-generated AI prompts contain sensitive data

In the realm of enterprise AI usage, there are three main categories to consider:...

Title: Thai-Swiss-US Operation Uncovers Hackers Responsible for Over 1,000 Cyber Attacks

A collaborative effort between Thai, Swiss, and US authorities has successfully uncovered a group...