“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
What is email spoofing?
Post ContentRead More
-
CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List [email protected] (The Hacker News)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The flaws are listed below – CVE-2025-0108 (CVSS score: 7.8) – An authentication bypass vulnerability in the Palo Alto…
-
New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now [email protected] (The Hacker News)
Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite that, if successfully exploited, could result in an active machine-in-the-middle (MitM) and a denial-of-service (DoS) attack, respectively, under certain conditions. The vulnerabilities, detailed by the Qualys Threat Research Unit (TRU), are listed below – CVE-2025-26465 – The OpenSSH clientRead More
-
Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks [email protected] (The Hacker News)
The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to evade detection and maintain control over infected systems. This involves the use of a legitimate Microsoft Windows utility called Microsoft Application Virtualization Injector (MAVInject.exe) to inject the threat actor’s malicious payload into an external process, waitfor.exe,Read More
-
New FrigidStealer Malware Targets macOS Users via Fake Browser Updates [email protected] (The Hacker News)
Cybersecurity researchers are alerting to a new campaign that leverages web injects to deliver a new Apple macOS malware known as FrigidStealer. The activity has been attributed to a previously undocumented threat actor known as TA2727, with the information stealers for other platforms such as Windows (Lumma Stealer or DeerStealer) and Android (Marcher). TA2727 is…
-
What is defense in depth?
Post ContentRead More
-
Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication [email protected] (The Hacker News)
Juniper Networks has released security updates to address a critical security flaw impacting Session Smart Router, Session Smart Conductor, and WAN Assurance Router products that could be exploited to hijack control of susceptible devices. Tracked as CVE-2025-21589, the vulnerability carries a CVSS v3.1 score of 9.8 and a CVS v4 score of 9.3. “An Authentication…
-
Palo Alto Networks PAN-OS vulnerability exploited in the wild
Post ContentRead More
-
Debunking the AI Hype: Inside Real Hacker Tactics [email protected] (The Hacker News)
Is AI really reshaping the cyber threat landscape, or is the constant drumbeat of hype drowning out actual, more tangible, real-world dangers? According to Picus Labs’ Red Report 2025 which analyzed over one million malware samples, there’s been no significant surge, so far, in AI-driven attacks. Yes, adversaries are definitely continuing to innovate, and while…
-
Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign [email protected] (The Hacker News)
The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024. The activity, detailed by Japanese cybersecurity company LAC, overlaps with a threat cluster tracked by Trend Micro as Earth Freybug, which has been assessed to…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova