ICYMI: 2025-03-20
Latest Headlines
YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users
Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems
How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model
Six Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest Data
Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers
CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation
CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages
Low-Cost Drone Add-Ons From China Let Anyone With a Credit Card Turn Toys Into Weapons of War
Browser Security Under Siege: The Alarming Rise of AI-Powered Phishing
Dataminr Raises $85 Million for AI-Powered Information Platform
Through the Lens of Music: What Cybersecurity Can Learn From Joni Mitchell
Veeam Patches Critical Vulnerability in Backup & Replication
Hackers Target Cisco Smart Licensing Utility Vulnerabilities
Amazon Ends Little-Used Privacy Feature That Let Echo Users Opt Out of Sending Recordings to Company
300 Malicious ‘Vapor’ Apps Hosted on Google Play Had 60 Million Downloads
Rooted (Jailbroken) Mobile Devices 3.5 Times More Vulnerable to Cyber Attacks
Hackers Exploiting Multiple Cisco Smart Licensing Utility Vulnerability
IBM AIX Vulnerability Let Attackers Execute Arbitrary Commands
New Steganographic Malware Exploits JPEG Files to Distribute Infostealers
RansomHub Affiliate Deploying New Custom Backdoor Dubbed ‘Betruger’ For Persistence
Microsoft Attributes Recent Outage of Outlook Web to Code Error in Recent Update
North Korean IT Workers Exploiting GitHub to Attack Organizations Worldwide
Multiple Dell Secure Connect Gateway Flaws Allows System Compromise
Babuk2 Ransomware Issuing Fake Extortion Demands With Data from Old Breaches
Veeam RCE bug lets domain users hack backup servers, patch now
CISA tags NAKIVO backup flaw as actively exploited in attacks
Critical Cisco Smart Licensing Utility flaws now exploited in attacks
RansomHub ransomware uses new Betruger ‘multi-function’ backdoor
UK urges critical orgs to adopt quantum cryptography by 2035
WordPress security plugin WP Ghost vulnerable to remote code execution bug
GitHub Action supply chain attack exposed secrets in 218 repos
Microsoft lifts Windows 11 upgrade block after Asphalt 8 crash fix
Is it time to retire ‘one-off’ pen tests for continuous testing?
– MTZ