“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
3 ways to retool UC platform security architecture models
Post ContentRead More
-
What is a network packet?
Post ContentRead More
-
What is application allowlisting?
Post ContentRead More
-
Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks [email protected] (The Hacker News)
Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login credentials as part of a targeted campaign aimed at major U.S. telecommunications companies. “The threat actor then demonstrated their ability to persist in target environments…
-
CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks [email protected] (The Hacker News)
A high-severity security flaw impacting the Craft content management system (CMS) has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-23209 (CVSS score: 8.1), which impacts Craft CMS versions 4 and 5. It was…
-
Risk & Repeat: Salt Typhoon hasn’t stopped hacking
Post ContentRead More
-
North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware [email protected] (The Hacker News)
Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North Korea, has been codenamed DeceptiveDevelopment, which overlaps with clusters tracked under the names Contagious Interview (aka CL-STA-0240), DEV#POPPER, Famous Chollima,Read More
-
Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware [email protected] (The Hacker News)
A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases. The campaign, codenamed Green Nailao by Orange Cyberdefense CERT, involved the exploitation of a new-patched security flawRead More
-
PCI DSS 4.0 Mandates DMARC By 31st March 2025 [email protected] (The Hacker News)
The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025, DMARC implementation will be mandatory! This requirement highlights the importance of preventative measures against email fraud, domain spoofing, and phishing in the financial space. This is not an optional requirement as non-compliance may result…
-
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives [email protected] (The Hacker News)
A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. “The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation,” the AhnLab SEcurity Intelligence…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova