ICYMI: 2025-02-20
Latest Headlines
North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware
China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now
Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability
Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability
The National Institute of Standards and Technology Braces for Mass Firings
Google Ad-Tech Users Can Target National Security ‘Decision Makers’ and People With Chronic Diseases
Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines
AI Can Supercharge Productivity, But We Still Need a Human-in-the-Loop
Atlassian Patches Critical Vulnerabilities in Confluence, Crowd
PoC Exploit Published for Critical Ivanti EPM Vulnerabilities
US Military Health Provider HNFS Pays $11M in Settlement Over Cybersecurity Failures
Ivanti Endpoint Manager Vulnerabilities Proof-of-Concept (PoC) Exploit Released
Beware of North Korean Job Interview Process Delivers Malware Via Fake Chrome Update
Chinese Hackers Exploiting Check Point Firewall Vulnerability To Deploy Ransomware
Free SOC Webinar – Better SOC with Interactive Malware Sandbox, Practical Use Cases 2025
Rhadamanthys Infostealer Exploiting Microsoft Management Console to Execute Malicious Script
IBM OpenPages Vulnerability Let Attackers Steal Authentication Credentials
Sophisticated Phishing Attacks Targeting Decision-Makers Including CEOs and CTOs
New Zhong Malware Exploit AnyDesk Tool To Attack Fintech & Cryptocurrency
Fedora Linux Kernel Vulnerability Let Attackers Gain Access to Sensitive Data
Black Basta ransomware gang’s internal chat logs leak online
US healthcare org pays $11M settlement over alleged cybersecurity lapses
Chinese hackers use custom malware to spy on US telecom networks
Microsoft fixes Power Pages zero-day bug exploited in attacks
Microsoft testing fix for Windows 11 bug breaking SSH connections
Darcula PhaaS can now auto-generate phishing kits for any brand
– MTZ