ICYMI: 2025-02-05
Latest Headlines
Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign
Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts
Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks
New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack
Navigating the Future: Key IT Vulnerability Management Trends
AsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacks
CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25
The Collapse of USAID Is Already Fueling Human Trafficking and Slavery at Scammer Compounds
Despite Catastrophic Hacks, Ransomware Payments Dropped Dramatically Last Year
Researchers Link DeepSeek’s Blockbuster Chatbot to Chinese Telecom Banned From Doing Business in US
How Agentic AI will be Weaponized for Social Engineering Attacks
Hacker Conversations: David Kennedy – an Atypical Typical Hacker
Cybersecurity M&A Roundup: 45 Deals Announced in January 2025
Abandoned Amazon S3 Buckets Enabled Attacks Against Governments, Big Firms
242,000 Times Downloaded Malicious Apps from Android and iOS Stealing Crypto Recovery Keys
BADBOX Botnet Infected Over 190,000 Android Devices Including LED TVs
CISA Adds Actively Exploited Linux Kernel Vulnerability to Known Exploited Vuln Catalog
Threat Actors Exploiting DeepSeek’s Rise To Fuel Cyber Attacks
Chinese Hackers Attacking Linux Devices With New SSH Backdoor
Multiple IBM Cloud Pak Vulnerabilities Let Attackers Execute Remote Code
Michael Trites Joins Aembit as Senior Vice President of Global Sales
Apple’s macOS Kernel Vulnerability Let Attackers Escalate Privileges – PoC Released
Microsoft script updates bootable media for BlackLotus bootkit fixes
Robocallers posing as FCC fraud prevention team call FCC staff
Ransomware payments fell by 35% in 2024, totalling $813,550,000
CISA orders agencies to patch Linux kernel bug exploited in attacks
Hackers spoof Microsoft ADFS login pages to steal credentials
AMD fixes bug that lets hackers load malicious microcode patches
CISA tags Microsoft .NET and Apache OFBiz bugs as exploited in attacks
Spain arrests suspected hacker of US and Spanish military agencies
How attackers abuse S3 Bucket Namesquatting — And How to Stop Them
– MTZ