“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps [email protected] (The Hacker News)
Cybersecurity researchers are calling attention to an ongoing campaign that distributes fake cryptocurrency trading apps to deploy a compiled V8 JavaScript (JSC) malware called JSCEAL that can capture data from credentials and wallets. The activity leverages thousands of malicious advertisements posted on Facebook in an attempt to redirect unsuspecting victims to counterfeit sites that instructRead…
-
FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant [email protected] (The Hacker News)
Cybersecurity experts have released a decryptor for a ransomware strain called FunkSec, allowing victims to recover access to their files for free. “Because the ransomware is now considered dead, we released the decryptor for public download,” Gen Digital researcher Ladislav Zezula said. FunkSec, which emerged towards the end of 2024, has claimed 172 victims, according…
-
Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits [email protected] (The Hacker News)
Cybersecurity researchers have disclosed now-patched critical security flaws in the firmware of Dahua smart cameras that, if left unaddressed, could allow attackers to hijack control of susceptible devices. “The flaws, affecting the device’s ONVIF protocol and file upload handlers, allow unauthenticated attackers to execute arbitrary commands remotely, effectively taking over the device,”Read More
-
How to manage Windows Server in an air-gapped environment
This guide explains the essential security practices, backup methods and configuration techniques admins can use when working in these sensitive environments.Read More
-
Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools [email protected] (The Hacker News)
Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon (aka Hafnium) have been identified as behind over a dozen technology patents, shedding light on the shadowy cyber contracting ecosystem and its offensive capabilities. The patents cover forensics and intrusion tools that enable encrypted endpoint data collection, Apple device forensics, and remote access…
-
Product Walkthrough: A Look Inside Pillar’s AI Security Platform [email protected] (The Hacker News)
In this article, we will provide a brief overview of Pillar Security’s platform to better understand how they are tackling AI security challenges. Pillar Security is building a platform to cover the entire software development and deployment lifecycle with the goal of providing trust in AI systems. Using its holistic approach, the platform introduces new…
-
Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome [email protected] (The Hacker News)
Apple on Tuesday released security updates for its entire software portfolio, including a fix for a vulnerability that Google said was exploited as a zero-day in the Chrome web browser earlier this month. The vulnerability, tracked as CVE-2025-6558 (CVSS score: 8.8), is an incorrect validation of untrusted input in the browser’s ANGLE and GPU components…
-
Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero [email protected] (The Hacker News)
Google has announced that it’s making a security feature called Device Bound Session Credentials (DBSC) in open beta to ensure that users are safeguarded against session cookie theft attacks. DBSC, first introduced as a prototype in April 2024, is designed to bind authentication sessions to a device so as to prevent threat actors from using…
-
The differences between inbound and outbound firewall rules
Firewalls can support both inbound and outbound firewall rules, but there are important differences between the two. Learn more about each and their uses.Read More
-
Is post-quantum cryptography the next Y2K?
Quantum computing threatens public-key encryption, which organizations use to secure communications and data. Migrating to quantum-safe cryptography harkens back to the Y2K threat.Read More
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova