Daily News - Março (16/03 - 22/03) - 12 Semana de 2025Felipe Prado17 de mar.16 min de leituraAtualizado: 23 de mar.Information & Cyber Security, Privacy and Hacking News --- Daily Updates !! Weekly Resume...22/03A Windows phishing campaign made its way to Mac – here’s how to protect your dataAlleged Data Breach of Empik.com Exposes 24.7 Million User RecordsAlleged Leak of 160K U.S. Reshipping Site User RecordsAttack Update As FBI Warns Email And VPN Users—Activate 2FA NowBaidu executive’s daughter leaks personal info, company denies data breachCloudflare now blocks all unencrypted traffic to its API endpointsCosta Rica government's Youtube account suffers cyber attackCosta Rican President's YouTube Regains Control After Cyber AttackExploiting Critical Authenticated Bypass Vulnerabilities to Gain Admin Access on GitLabFBI Warning As iPhone, Android Users ‘Bombarded’ By Chinese AttackLargest U.S. Sperm Bank Suffers Data Breach Exposing Personal InformationMicrosoft Trust Signing service abused to code-sign malwareNew PayPal Scam Uses Real Emails—Here’s How to Avoid ItOracle Denies Breach Amid Hacker’s Claim of Access to 6 Million RecordsTH3 EL1T3 GHOST Targeted the Website of FrumiU.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering ProbeVMware Vulnerabilities Exploited Actively to Bypass Security Controls & Deploy RansomwareZero-day broker Operation Zero offers up to $4 million for Telegram exploits21/035 ransomware threats facing the financial sector – and 5 ways to respond10 Critical Network Pentest Findings IT Teams Overlook11 hottest IT security certs for higher pay today53% of security teams lack continuous and up-to-date visibility62% of businesses risk missing new PCI DSS Phishing compliance deadline by failing to implement DMARCA single RTX 4090 managed to brute force crack an Akira ransomware attack in just 7 daysAI will make ransomware even more dangerousAI-powered phishing attacks rose sharply in the last 6 monthsAlbabat Ransomware Attacking Windows, Linux & macOS by Leveraging GitHubAlbabat Ransomware Evolves to Target Linux and macOSApple Faces Federal Lawsuit Over Delayed Apple Intelligence FeaturesArete's Annual Crimeware Report Analyzes Ransomware and Extortion Data from 2024Attackers Use Fake CAPTCHAs to Deploy Lumma Stealer RATBeware of scammers posing as ANZ representatives targeting law firmsCaido v0.47.0 Released – Burp Suite Alternative Web Pentesting Tool Brings New FeaturesCERT-UA Warns of Escalating Cyberattacks Targeting Ukraine’s Defense Sector with DarkCrystal RATCheckpoint ZoneAlarm Driver Flaw Exposes Users to Credential TheftChild’s play – major US toy manufacturer allegedly hacked by ClopChina-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware FamiliesChinese FishMonger APT Operated by I‑SOON Attacking Government Entities & NGOsCISA Releases Five Industrial Control Systems Advisories Covering Vulnerabilities & ExploitsCisco smart licensing system sees critical security flaws exploitedCisco Smart Licensing Utility flaws actively exploited in the wildCloudflare to Close All HTTP Ports for APIs, Enforces HTTPS ConnectionCybercriminals Exploit CheckPoint Antivirus Driver in Malicious CampaignDeepSeek mania inspires multiple scam campaignsDOGE access to Social Security Administration data blocked by Federal CourtFake Meta support agent will steal your passwordsFake Semrush ads used to steal SEO professionals’ Google accountsFormer Michigan Coach Indicted for Hacking Athlete Databases Across 100+ CollegesGoogle Maps yanks over 10,000 fake business listings - how to spot the scamHackers Are Actively Exploiting Apache Tomcat Servers – Patch Now!Hackers are targeting unpatched ServiceNow instances that exploit 3 separate year-old vulnerabilitiesHackers Exploiting Checkpoint’s Driver in BYOVD Attack to Bypass Windows SecurityHellcat Ransomware Group Hacked Ascom Technical Ticketing SystemHow Security Professionals Can Prepare for the CISO RoleInfosys Agrees to $17.5 Million Settlement Following 2023 Data BreachIt's time to update Chrome ASAP - again! - to fix this critical flawKaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 ServersLinks to the “free” TradingView version hide crypto-stealing malware on RedditMalicious ads target Semrush users to steal Google account credentialsMassive Keenetic data leak uncovered: 1M households could be exposedMedusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen CertificatesMEDUSA Ransomware Using Malicious ABYSSWORKER Driver to Disable EDRMicrosoft: Exchange Online bug mistakenly quarantines user emailsNAKIVO Backup & Replication vulnerability exploited by attackers (CVE-2024-48248)New Attacks Exploit Year-Old ServiceNow Flaws – Israel Hit HardestNorth Korea unveils new military unit targeting AI attacksOngoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing UtilityPhishing campaign shifts focus to Macs after browsers enhance security on WindowsPopular AI tools tricked to create malware for Chrome browserQilin ransomware attack shut Cleveland Municipal Court for over three weeksRansomHub affiliate uses custom backdoor BetrugerRooting Android invites hackers: up to 3,000 times more vulnerableScammers cash in on tax seasonSpain's ruling coalition split over defence spending as EU leaders push for increasesSteam pulls game demo infecting Windows with info-stealing malwareTelecom giant Orange refutes hacker group's claim of 4.5TB data theftThe hidden risk in SaaS: Why companies need a digital identity exit strategyThe UK releases timeline for migration to post-quantum cryptographyThese phishing attacks are now targeting Mac browsers - how to protect yourselfThis top WordPress plugin could be hiding a worrying security flaw, so be on your guardThreat Actors Leveraging Reddit Posts To Actively Spread AMOS and Lumma StealersUAT-5918 Hackers Exploiting Exposed Web and Application Servers N-Day VulnerabilitiesUAT-5918 Targets Taiwan's Critical Infrastructure Using Web Shells and Open-Source ToolsUK Sets Timeline for Quantum-Resistant Encryption TransitionUS government warns agencies to make sure their backups are safe from NAKIVO security issueUS removes sanctions against Tornado Cash crypto mixerVanHelsing Ransomware Attacking Windows Systems With New Evasion Technique & File ExtensionVeeam urges users to patch security issues which could allow backup hacksWhere Is Computer Vision Essential Today? Insights from Alltegrio's CEO20/035 pitfalls that can delay cyber incident response and recovery70% of leaked secrets remain active two years laterApache Tomcat RCE vulnerability: ‘Patch, but there’s no need to panic’Babuk Ransomware Group Claims Attack on Telecommunication Firm OrangeBabuk2 Ransomware Issuing Fake Extortion Demands With Data from Old BreachesBetter update now – a critical security flaw found in Apache TomcatBeware Tax Payers! Scammers Taking Advantage of Tax Season as Filing Deadline Draws NearBritain has 10 years to prepare for encryption-breaking quantum cyberattacksCalifornia sperm bank says cyber attack compromised patients' dataCERT-UA warns of cyber espionage against the Ukrainian defense industry using Dark Crystal RATChatGPT just made you a criminal – with zero evidenceChina's Baidu denies data breach after executive's daughter leaks personal infoChinese military-linked companies dominate US digital supply chainChinese “Salt Typhoon” Hackers Exploit Exchange Vulnerabilities to Target OrganizationsCERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal MessagesCISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active ExploitationCISA Alerts on Edimax IP Camera OS Command Injection ExploitCISA Warns of Edimax IP Camera OS Command Injection Vulnerability Exploited in AttacksCISA Warns of NAKIVO Backup Flaw Exploited in Attacks with PoC ReleasedCISA Warns of SAP NetWeaver Directory Traversal Vulnerability Exploited in AttacksCritical Cisco Smart Licensing Utility flaws now exploited in attacksCritical Veeam Backup & Replication Vulnerability Allows Remote Execution of Malicious CodeCybercrime karma: Babuk 2 ransomware steals from fellow crooks, makes fraudulent claimsCybersecurity in shipping and logistics: Small budgets, big riskCybersecurity job market faces disruptions: Hiring declines in key roles amid automation and outsourcingDark Crystal trojan targets Ukrainians via Signal messagesDragon RaaS Leading ‘Five Families’ Crimeware With New Initial Access & Exploitation MethodsFishMonger APT Group Linked to I-SOON in Espionage CampaignsGitHub Action supply chain attack exposed secrets in 218 reposHackers Exploiting Multiple Cisco Smart Licensing Utility VulnerabilityHellCat hackers go on a worldwide Jira hacking spreeHome Affairs to bolster security with secure service edgeHow healthcare CISOs can balance security and accessibility without compromising careHow Threat Hunters Enrich Indicators With ContextHow to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility ModelIBM AIX Vulnerability Let Attackers Execute Arbitrary CommandsIs it time to retire 'one-off' pen tests for continuous testing?Israeli Spyware Graphite Targeted WhatsApp with 0-Click ExploitKali Linux 2025.1a drops with theme refresh, Kali NetHunter updatesKali Linux 2025.1a Released: New Tools and Desktop Environment UpgradesKaseya unveils AI tools to boost MSP efficiency & securityLinux Kernel Vulnerability Allows Attackers to Escalate Privileges via Out-of-Bounds WriteMicrosoft Attributes Recent Outage of Outlook Web to Code Error in Recent UpdateMicrosoft lifts Windows 11 upgrade block after Asphalt 8 crash fixMultiple Dell Secure Connect Gateway Flaws Allows System CompromiseNCSC Sets 2035 Deadline for Post-Quantum Cryptography MigrationNew custom malware Betruger backdoor used to carry out ransomware attacksNew Steganographic Malware Exploits JPEG Files to Distribute InfostealersNorth Korean IT Workers Exploiting GitHub to Attack Organizations WorldwideOver Half a Million Hit by Pennsylvania Schools Union BreachParagon Spyware Exploited WhatsApp Zero-day Vulnerability to Attack High-value TargetsPennsylvania State Education Association breach impacted over 500,000 educatorsProminent spyware firm SpyX breached, exposing Apple usersRansomHub Affiliate Deploying New Custom Backdoor Dubbed ‘Betruger’ For PersistenceRansomHub affiliate leverages multi-function Betruger backdoorRansomHub ransomware uses new Betruger ‘multi-function’ backdoorRooted Androids 3,000x More Likely to Be Breached, Even iPhones Not SafeRooted Devices 250 Times More Vulnerable to CompromiseRooted (Jailbroken) Mobile Devices 3.5 Times More Vulnerable to Cyber AttacksSignal Messenger Exploited in Targeted Attacks on Defense Industry EmployeesSignal Messenger Leveraged for Targeted Attacks on Employees of Defense IndustrySix Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest DataSpyX Data Breach Exposes Personal Information of Nearly 2 Million UsersThe National Anti-Scam Centre has warned more than 100 potential Australian crypto-scam victimsTop 10 secrets iOS apps leak without you knowingTrump Administration’s FTC Shake-Up Could Weaken Privacy OversightUK CNI Security Leaders Express Confidence in Cybersecurity, Despite 95% Breach RateUK Police Arrest 422 in Major Fraud CrackdownUK urges critical orgs to adopt quantum cryptography by 2035U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalogUser reveals safety feature for going on a run: “At least your loved ones can have peace”Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX SystemsVeeam patches critical 9.9 flaw in backup and replication productZero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Increases by 130%We can – and must – do better recovering from ransomware attacksWhatsApp fixed zero-day flaw used to deploy Paragon Graphite spywareWhy Continuous Compliance Monitoring Is Essential For IT Managed Service ProvidersWordPress security plugin WP Ghost vulnerable to remote code execution bugYouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users19/035 Identity Threat Detection & Response Must-Haves for Super SaaS Security41% of Success Logins Across Websites Involves Compromised Passwords752,000 Browser Phishing Attacks Mark 140% Increase YoYA worrying Apple Password App vulnerability reportedlyleft users exposed for monthsAdvanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer MalwareAI Crypto Bot AIXBT Loses $106,200 in ETH Through Dashboard BreachAlleged Data Breach of Mexican Citizen Information Exposed 1.8M RecordsAn unpatched Windows zero-day flaw has been exploited by 11 nation-state attackersANY.RUN's New Android OS Support Let SOC/DFIR Team Perform Android APK Malware AnalysisAPTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373)Arcane Stealer Via YouTube Videos Steal Data From Network Utilities Including VPN & FileZillaAttackers Embedding Malicious Word file into a PDF to Evade DetectionsBeware of Fake Coinbase Migration Messages Aimed to Steal Your Wallet CredentialsBeware of Fake GitHub “Security Alerts” Let Hackers Hijack Your Account Login CredentialsBillions of credentials were stolen from businesses around the world in 2024Brian Cox to Discuss Quantum Computing's Impact at Infosecurity Europe 2025California Cryobank, the largest US sperm bank, disclosed a data breachCard collectors' secrets spilled in massive Collectibles.com leakCERT NZ Warns of Critical Apache Tomcat Vulnerability (CVE-2025-24813) Under Active ExploitationCISA Warns of Active Exploitation in GitHub Action Supply Chain CompromiseCISA Warns of Exploited GitHub Action CVE-2025-30066 – Users Urged to PatchCISA Warns of Fortinet FortiOS Authentication Bypass Vulnerability Exploited in WildCISA Warns of Supply-Chain Attack Targeting Widely-Used GitHub Action VulnerabilityClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-StealersClick Profit blocked by the FTC over alleged e-commerce scamsCloudflare Launches Cloudforce One Threat Platform to Analyze IoCs, IP, Hashes & DomainsCompanhia de Serviços de Água, Esgoto e Resíduos de Guaratinguetá (SAEG) informa: conta do Instagram segue bloqueada devido a invasão hackerCritical AMI BMC Vulnerability Allows Attackers To Bypass Authentication RemotelyCritical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control SystemsCritical Synology Vulnerability Let Attackers Remote Execute Arbitrary CodeCybercriminals upgrade Tycoon 2FA phishing kit as Phaas attacks surgeDCCOM and SAFC4DC: A Strategic Move to Secure Singapore’s Digital BackboneDependency-Check: Open-source Software Composition Analysis (SCA) toolDOGE’s cost-cutting database dives offer cybersecurity pros vital lessons in cloud securityDutch intelligence agencies are secretly collecting more informationEuropol Warns of “Shadow Alliance” Between States and CriminalsFake DeepSeek installers are infecting your device with dangerous malwareFBI alerta empresas para ataque hacker que sequestra dados sensíveisFortinet Vulnerability Exploited in Ransomware Attack, CISA WarnsFraudulent Android apps displaying intrusive ads downloaded 60 million times on Google PlayGartner Warns Agentic AI Will Accelerate Account TakeoversGitHub Action bug allows supply chain attack; added to CISA listGoogle’s $32B Wiz deal ends the era of ‘security theater’Hackers Abuse Cobalt Strike, SQLMap & Other Tools to Target Organizations’ Web ApplicationsHackers exploram falha no PHP para espalhar Quasar RAT e XMRigHacker Weaponizing Hard Disk Image Files To Deliver VenomRATHackers Abuse Cobalt Strike, SQLMap & Other Tools to Target Organizations’ Web ApplicationsHackers Allegedly Selling Firewall Access to Canon Inc on Hacking ForumsHackers are now going after crypto AI bots as wellHackers claim Orange attack, threaten to leak 1TB of dataHackers claim they’ve breached Orange and have “very detailed” informationHackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig MinersHackers hide malware in link files, but Microsoft refuses to fix the flawHackers Leveraging Azure App Proxy Pre-authentication to Access Orgs Private Network ResourcesHackers Leveraging RMM Tools To Maintain Persistence To Infiltrate And Move Through NetworksHow ‘Agentic AI’ will drive the future of malwareHow CISOs are approaching staffing diversity with DEI initiatives under pressureLeaked Black Basta Chats Suggest Russian Officials Aided Leader's Escape from ArmeniaLinux Foundation's trust scorecards aim to battle rising open-source security threatsKnocknoc Raises Seed Funding to Scale Its Just-In-Time Network Access Control TechnologyMajor US teacher's union breach exposed 500k members' to hackersMalware campaign 'DollyWay' breached 20,000 WordPress sitesMicrosoft to End Support for Windows 10, No More Security Updates!Microsoft Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing – PoC ReleasedMirrorFace Hackers Customized AsyncRAT Execution Chain to Run Within Windows SandboxMillions of Android TV boxes disconnected from hackers, but the risk remainsMoving beyond checkbox security for true resilienceNew AI Jailbreak Technique Bypasses Security Measures to Write Malware for Google ChromeNot even fairy tales are safe - researchers weaponise bedtime stories to jailbreak AI chatbots and create malwarePHP RCE Vulnerability Actively Exploited in Wild to Attack Windows-based SystemsProtecting your iCloud data after Apple’s Advanced Data Protection removal in the UKReport: The State of Secrets Sprawl 2025Rules File Backdoor: AI Code Editors exploited for silent supply chain attacksSite da Força Aérea Brasileira está fora do ar; hacker assume ataqueSneaky 2FA Joins Tycoon 2FA and EvilProxy in 2025 Phishing SurgeSophisticated Attack Via Booking Websites Installs LummaStealer MalwareThat breach cost HOW MUCH? How CISOs can talk effectively about a cyber incident’s tollThese 10 weak passwords can leave you vulnerable to remote desktop attacksThese malicious Android apps were installed over 60 million times - here's how to stay safeThreat Actor Claims to Have 2M Stolen Credit Card RecordsThreat Actor Sells Alleged South African and Angolan Government EmailsThreat Actors Exploiting Chrome DLL Side-Loading Vulnerability to Execute MalwareThreat Actors Exploiting DLL Side-Loading Vulnerability in Google Chrome to Execute Malicious PayloadsThreat Actors Exploiting Legacy Drivers to Bypass TLS Certificate ValidationThreat Actors Stolen Over 3.2 Billion Login Credentials & Infected 23 Million Devices WorldwideTop California sperm bank suffers embarrassing leakU.S. CISA adds Fortinet FortiOS/FortiProxy and GitHub Action flaws to its Known Exploited Vulnerabilities catalogUS Sperm Donor Giant California Cryobank Hacked – Customers Personal Data ExposedVPN Vulnerabilities Emerges As The Key Tool for Threat Actors to Attack OrganizationsWatch This Webinar to Learn How to Eliminate Identity-Based Attacks—Before They HappenWhatsApp patched zero-click flaw exploited in Paragon spyware attacksWhy it's time for phishing prevention to move beyond emailWindows Shortcut Flaw Exploited by 11 State-Sponsored Groups18/031 in 3 security leaders say AI will make ransomware a greater threatAscom affected by cyber attackBADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy AbuseBitdefender reveals grim milestone in ransomware historyBlackBasta Ransomware Ties to Russian Authorities UncoveredBlockchain gaming platform WEMIX hacked to steal $6.1 millionBucks Council reports data breach on planning siteChina identifies Taiwanese hackers allegedly behind cyberattacks and espionageChina-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage OperationCISOs Lack Visibility Into Flaws, Fear Ransomware the MostData Breach Allegedly Hits PTS News Website, Millions of Records Claimed StolenDeepSeek created Chrome infostealer without hesitation, company remains silentExtortion Reboot: Ransomware Crew Threatens Leak to SnowdenFake DeepSeek AI Installers, Websites, and Apps Spreading MalwareFBI: Free file converter sites and tools deliver malwareFlashpoint report highlights rising cyberthreats, with infostealers and ransomware leading the wayFortinet firewall bugs are being targeted by LockBit ransomware hackersGoogle to acquire Wiz for $32 billionHackers know half of passwords entered online, Cloudflare findsHackers target AI and crypto as software supply chain risks growHow a researcher with no malware-coding skills tricked AI into creating Chrome infostealersHow AI agents help hackers steal your confidential data - and what to do about itHow AI and automation are reshaping security leadershipHow financial institutions can minimize their attack surfaceHow to guard against a vicious Medusa ransomware attack - before it's too lateInside A Cyberattack: How Hackers Steal DataLarge-Scale Malicious App Campaign Bypassing Android SecurityLloyds Bank accidentally leaks customer data, dozens affectedMedusa ransomware: CISA issues email security warningMedusa Ransomware Surge: 60 Victims in 3 Months—Are You Next?Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto WalletsNew Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive AdsNew Critical AMI BMC Vulnerability Enables Remote Server Takeover and BrickingNew Report Highlights Common Passwords in RDP AttacksNew 'Rules File Backdoor' Attack Lets Hackers Inject Malicious Code via AI Code EditorsNew trojan can spy, steal crypto and mask itself to avoid detectionOrange purportedly compromised by Babuk ransomware gangOver 16.8 Billion Records Exposed as Data Breaches Increase 6%Over 320K Medicare applications exposed, revealing patients’ health data“Pay me or I tell Snowden:” are cybercriminals getting more desperate?PF investiga hacker que deu golpe bancário em diversos países“Phishing attacks and data breaches biggest threats for consumers”Plump Spider, o grupo hacker que ataca brasileiros com golpes sofisticadosRansomHub using FakeUpdates scheme to attack government sectorSecurity Researcher Proves GenAI Tools Can Develop Google Chrome InfostealersSperm donation giant California Cryobank warns of a data breachStealthy StilachiRAT steals data, may enable lateral movementTake These Steps Now to Protect Your Data From Medusa RansomwareThe rise of DAST 2.0 in 2025Third of UK Supply Chain Relies on “Chinese Military” CompaniesThreat Actor Claims Access to UAE Power Company’s NetworkThreat Actor Claims to Possess 10GB of Stolen Login CredentialsUnpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017U.S. Agencies Warn on Medusa RansomwareWestern Alliance Bank notifies 21,899 customers of data breachYou have 4 days to update Firefox before everything breaks17/03£1M Lost as UK Social Media and Email Account Hacks Skyrocket5 clever ways to use Chromecast on your TV (including one for smart home enthusiasts)7 misconceptions about the CISO role23,000 GitHub Repositories Targeted In Supply Chain AttackAdobe Acrobat Reader Vulnerabilities Let Attackers Execute Arbitrary CodeAI development pipeline attacks expand CISOs’ software supply chain riskAI Operator Agents Assisting Hackers To Write Malicious CodeAkira ransomware decryption method uses GPUs to brute force keysAll your Alexa recordings will go to the cloud soon, as Amazon sunsets Echo privacyAlleged Sale of 1-Day Remote Code Execution (RCE) Exploit Targeting Microsoft WindowsAndroid Malware Mimic As DeepSeek To Steal Users Login Credentials“Anti-shift worker elitist device:” Oura Ring disappoints users after messing up activity trackingApache Tomcat flaw actively exploited; could allow ‘devastating’ RCEApache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public DisclosureApple Adds RCS End-to-End Encryption for Sending Text Messages Using iPhoneAttackers use CSS to create evasive phishing messagesBeware of Free File Word To PDF Converter That Delivers MalwareBlackLock Ransomware Hacked 40+ Organization Within Two MonthsBrydens Lawyers investigating cyber incident that compromised client dataCERT-In Flags Critical Security Flaws in Google Chrome—Users Urged to UpdateChatGPT Down as Users Report “Gateway Time-out” ErrorChinese Volt Typhoon Hackers Exploiting Cisco & NetGear Routers To Compromise OrganizationsCloudflare Introduces E2E Post-Quantum Cryptography ProtectionsCritical RCE flaw in Apache Tomcat actively exploited in attacksCustom vs. Off-the-shelf Educational SoftwareCustomers of “China‘s Amazon” had their passwords stolen, hackers sayCybercriminals Exploit CSS to Evade Spam Filters and Track Email Users' ActionsCyberJund Defaced the Website of Prof. Yoav TalmiDiplomat Targeted the Website of IbercajaEspressif Systems Vulnerabilities Let Attackers Execute Arbitrary CodeEuropean Cyber Report 2025: 137% more DDoS attacks than last year – what companies need to knowFBI warns Gmail, Outlook, and VPN users as Medusa ransomware attacks escalateFog ransomware group claims a major data theft from radiology firm UDMI's systemsGitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 RepositoriesGitHub project maintainers targeted with fake security alertHacker quebra criptografia do ransomware Akira usando GPUs GeForce RTX 4090Hackers claim major Chinese online shopping platform TaobaoHackers claim they’ve breached Orange and have “very detailed” informationHackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a WeekHackers exploit fake audio issues to spread malware in virtual meetingsHackers Exploiting CSS to Evade Spam Filters & Track User ActionsHackers Exploiting TP-Link Vulnerability to Gain Root AccessHere’s how to win the ransomware battle Infosys reaches $17.5 million settlement over cybersecurity lawsuitsIntelMQ: Open-source tool for collecting and processing security feedsJaguar Land Rover Breached by HELLCAT Ransomware Group using Jira CredentialsKentico Xperience CMS Authentication Bypass Vulnerability Allow Attackers Execute Arbitrary Code RemotelyMalicious Code Hits ‘tj-actions/changed-files’ in 23,000 GitHub ReposManage Engine Analytics Vulnerability Allows User Account TakeoverMassJacker Clipper Malware Attacking Users Installing Pirated SoftwareMicrosoft 365 environments exploited in business email attacksMicrosoft: New RAT malware used for crypto theft, reconnaissanceMillions Of RSA Key Exposes Serious Flaws That Can Be ExploitedNational Highways CSO Talks Novel Solutions to Cybersecurity in the Public SectorNew C++ Based IIS Malware With Numerous Functionalities Mimics cmd.exe To Stay UndetectedNew Steganographic Malware Attack via JPG File Delivers Multiple Password Stealing MalwaresOKX suspends DEX aggregator after Lazarus hackers try to launder fundsOver 120,000 patients impacted in Florida hospital data breachPay, fight, or stall? The dilemma of ransomware negotiationsPresidente do México denuncia invasão hacker em celular e e-mailProactive Cybersecurity – Staying Ahead of Threats with a Preventive ApproachResearcher Criticizes Microsoft Over Video Requirement for Bug ReportsResearcher releases free GPU-Based decryptor for Linux Akira ransomwareResearchers Confirm BlackLock as Eldorado RebrandResearchers Hacked Into Commercial Trucks & Buses To Unlock RemotelyScammers Pose as Cl0p Ransomware to Send Fake Extortion LettersSecurity Database Aims to Empower Non-ProfitsSite do aeroporto de Guarulhos sai do ar após ataque hackerSocGholish Leveraging Compromised Websites To Deploy RansomHub RansomwareSperm bank California Cryobank confirms data breachStilachiRAT Exploits Chrome for Crypto Wallets and CredentialsSupply chain attack on popular GitHub Action exposes CI/CD secretsTech firms must start protecting UK users from illegal contentTelegram CEO Returns to Dubai Amid French Investigation ContinuesTemu's sister company allegedly hit by ransomware, 700M users at riskTFE hotels group suffers severe operational disruption following a cyber attackTj-actions Supply Chain Attack Exposes 23,000 OrganizationsTomcat Vulnerability Exploited in the Wild to Take Over Apache Tomcat ServersTwoNet Targeted the Website of HM SanchinarroUK's Online Safety Act: Ofcom Can Now Issue SanctionsUnpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last YearUS Legislators Demand Transparency in Apple's UK Backdoor Court FightZoom Team Chat Decrypted to Uncover User ActivitiesWazuh Open Source SIEM Vulnerability Allows Malicious Code Execution RemotelyWhy SharpRhino Malware is Leaving Victims Thunderstruck16/03A hacker threatens to sell the bank data of millions of free subscribersA ransomware attack hit the Micronesian state of Yap, causing the health system network to go downAI and the Dark Art of Social EngineeringAkira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours — new counterattack breaks encryptionFake "Security Alert" issues on GitHub use OAuth app to hijack accountsFBI Warning—Gmail, Outlook And VPN Users Need To Act NowFollow these 5 steps to protect your NAS against ransomware and keep your data safeHacker invade site da Associação Mariliense de Transporte Urbano (AMTU), e coloca propagando de jogo de cassino onlineHow hackers take over WhatsApp accounts and ways to stop themIsraeli-Russian hacker extradited to US over global ransomware attacksLazarus, grupo hacker da Coreia do Norte, acumula mais Bitcoin que Butão e El SalvadorLockBit Developer Rostislav Panev Extradited from Israel to the USMalicious Adobe, DocuSign OAuth apps target Microsoft 365 accountsMedusa Ransomware cyberattacks grow as FBI issues warning. How to stay protectedSeven members of voice phishing group arrested after fleeing to South KoreaSlowMist Uncovers Sneaky LinkedIn Phishing Scam Draining Crypto WalletsSemana AnteriorDaily News - Fevereiro (09/03 - 15/03) - 11 Semana de 2025
Commentaires