Mon.Apr 21, 2025

article thumbnail

Phishing attacks leveraging HTML code inside SVG files

SecureList

With each passing year, phishing attacks feature more and more elaborate techniques designed to trick users and evade security measures. Attackers employ deceptive URL redirection tactics, such as appending malicious website addresses to seemingly safe links, embed links in PDFs, and send HTML attachments that either host the entire phishing site or use JavaScript to launch it.

article thumbnail

New sophisticate malware SuperCard X targets Androids via NFC relay attacks

Security Affairs

SuperCard X – a new MaaS – targets Androids via NFC relay attacks, enabling fraudulent POS and ATM transactions with stolen card data. Cleafy researchers discovered a new malware-as-a-service (MaaS) called SuperCard X targeting Android devices with NFC relay attacks for fraudulent cash-outs. Attackers promote the MaaS through Telegram channels, analysis shows SuperCard X builds had Telegram links removed, likely to hide affiliate ties and hinder attribution, suggesting efforts to eva

Malware 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian Hackers Target European Diplomats with ‘Wine-Tasting’ Phishing Scams

eSecurity Planet

A Russian state-linked hacking group is ramping up its cyberattacks against diplomatic targets across Europe, using a new stealthy malware tool known as GrapeLoader to deliver malicious payloads through cleverly disguised phishing emails. According to Check Point Research, the campaign began in January 2025 and is being carried out by APT29 also known as Cozy Bear or Midnight Blizzard the same group behind the infamous SolarWinds supply chain attack.

Scams 57
article thumbnail

Russia-linked APT29 targets European diplomatic entities with GRAPELOADER malware

Security Affairs

Russia-linked group APT29 targeted diplomatic entities across Europe with a new malware loader codenamed GRAPELOADER. Check Point Research team reported that Russia-linked cyberespionage group APT29 (aka SVR group , Cozy Bear , Nobelium , BlueBravo , Midnight Blizzard , and The Dukes ) is behind a sophisticated phishing campaign targeting European diplomatic entities, using a new WINELOADER variant and a previously unknown malware called GRAPELOADER. “While the improved WINELOADER variant

Malware 105
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Lumma Stealer – Tracking distribution channels

SecureList

Introduction The evolution of Malware-as-a-Service (MaaS) has significantly lowered the barriers to entry for cybercriminals, with information stealers becoming one of the most commercially successful categories in this underground economy. Among these threats, Lumma Stealer has emerged as a particularly sophisticated player since its introduction in 2022 by the threat actor known as Lumma.

Malware 79
article thumbnail

Hackers Exploit Russian Host Proton66 for Global Malware Attacks, Researchers Say

eSecurity Planet

A notorious Russian hosting service provider known as Proton66 is at the center of a series of widespread cyberattacks and malware campaigns targeting organizations and users worldwide, according to fresh findings from cybersecurity experts. Researchers at Trustwave SpiderLabs have linked the provider to a surge in dangerous activities from credential brute-forcing and mass vulnerability scanning to the delivery of ransomware, infostealers, and Android-targeted phishing campaigns.

Malware 70

LifeWorks

More Trending

article thumbnail

Whistleblower: DOGE Siphoned NLRB Case Data

Krebs on Security

A security architect with the National Labor Relations Board (NLRB) alleges that employees from Elon Musk ‘s Department of Government Efficiency (DOGE) transferred gigabytes of sensitive data from agency case files in early March, using short-lived accounts configured to leave few traces of network activity. The NLRB whistleblower said the unusual large data outflows coincided with multiple blocked login attempts from an Internet address in Russia that tried to use valid credentials for a

article thumbnail

Translating Deep Cybersecurity Knowledge into Media Opportunities

SecureWorld News

You've built your cybersecurity business on years of solid technical expertise. Your team has a deep understanding of all the modern threats, solutions, and security architecture that most people wouldn't be able to understand (or even know exists). While it's clear you have a lot of value to bring to the market, you are facing a clear business challenge: how do you turn that specialized knowledge into media coverage that connects with your audience and grows your business?

Media 90
article thumbnail

CMMC Compliance Checklist for 2025: Key Steps and Common Pitfalls to Avoid

Centraleyes

The Cybersecurity Maturity Model Certification is a unified standard for cybersecurity across the defense supply chain. Developed in response to rising cyber threats, the CMMC framework is intended to protect Controlled Unclassified Information (CUI). What sets CMMC 2.0 apart from so many other frameworks is its structured, maturity-driven approach and its requirement for third-party certification.

article thumbnail

Legitimate Windows Tool Abused: mavinject.exe Used for Stealthy DLL Injection by Threat Actors

Penetration Testing

AhnLab Security Emergency Response Center (ASEC) has reported on the abuse of a legitimate Microsoft utility, mavinject.exe, by The post Legitimate Windows Tool Abused: mavinject.exe Used for Stealthy DLL Injection by Threat Actors appeared first on Daily CyberSecurity.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Upwind Adds Ability to Detect API Threats to Cloud Security Platform

Security Boulevard

Upwind has added an ability to detect threats to application programming interfaces (APIs) in real time to its cloud application detection and response (CADR) platform, based on machine learning algorithms. The post Upwind Adds Ability to Detect API Threats to Cloud Security Platform appeared first on Security Boulevard.

article thumbnail

A week in security (April 12 – April 18)

Malwarebytes

Last week on Malwarebytes Labs: Text scams grow to steal hundreds of millions of dollars Apple patches security vulnerabilities in iOS and iPadOS. Update now! Hi, robot: Half of all internet traffic now automated “I sent you an email from your email account,” sextortion scam claims “Follow me” to this fake crypto exchange to claim $500 Hertz data breach caused by CL0P ransomware attack on vendor Meta slurps up EU user data for AI training No, its not OK to delete that new

Scams 81
article thumbnail

Don’t Lock Up Peanut Butter in Fort Knox: The Smart Approach to Data Classification 

Security Boulevard

Exploring the implementation of a data classification model in order to enable a data-driven approach to managing risk and cost. The post Don’t Lock Up Peanut Butter in Fort Knox: The Smart Approach to Data Classification appeared first on Security Boulevard.

Risk 70
article thumbnail

FOG Ransomware Campaign Targets Multiple Sectors with Phishing and Payload Obfuscation

Penetration Testing

Trend Micro has identified a recent campaign involving FOG ransomware, demonstrating the adaptability of cybercriminals in their attempts The post FOG Ransomware Campaign Targets Multiple Sectors with Phishing and Payload Obfuscation appeared first on Daily CyberSecurity.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

BSidesLV24 – Common Ground – Introduction to Software Defined Radio For Offensive and Defensive Operations

Security Boulevard

Our sincere appreciation to BSidesLV , and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conferences events located at the Tuscany Suites & Casino ; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Common Ground – Introduction to Software Defined Radio For Offensive and Defensive Operations appeared first on Security Boulevard.

article thumbnail

How to Protect Yourself From Phone Searches at the US Border

WIRED Threat Level

Customs and Border Protection has broad authority to search travelers devices when they cross into the United States. Heres what you can do to protect your digital life while at the US border.

145
145
article thumbnail

Turn to Exposure Management to Prioritize Risks Based on Business Impact

Security Boulevard

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable CSO Robert Huber shares practical advice on using an exposure management program to focus on risks that have business impact. You can read the entire Exposure Management Academy series here.

Risk 52
article thumbnail

CVE-2025-33028: WinZip Flaw Exposes Users to Silent Code Execution via MotW Bypass, No Patch

Penetration Testing

A security flaw has been unearthed in WinZip, the popular file compression utility, placing millions of users at The post CVE-2025-33028: WinZip Flaw Exposes Users to Silent Code Execution via MotW Bypass, No Patch appeared first on Daily CyberSecurity.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Implementing Exposure Management in Legacy Enterprise Environments

Security Boulevard

The successful implementation of CTEM for Exposure Management in Legacy Enterprise Environments in legacy systems is crucial, as these systems are the hidden backbone of many large enterprises, comprising more. The post Implementing Exposure Management in Legacy Enterprise Environments appeared first on Strobes Security. The post Implementing Exposure Management in Legacy Enterprise Environments appeared first on Security Boulevard.

52
article thumbnail

Critical CVE-2025-1976 Vulnerability in Brocade Fabric OS Actively Exploited

Penetration Testing

A critical security vulnerability has been identified in Brocade Fabric OS, posing a significant risk to affected systems. The post Critical CVE-2025-1976 Vulnerability in Brocade Fabric OS Actively Exploited appeared first on Daily CyberSecurity.

Risk 116
article thumbnail

Assured Security with Secrets Scanning

Security Boulevard

Is Secrets Scanning the Key to Assured Security? The alarming rise in data breaches and cyber threats globally raises an essential question is secrets scanning the definitive answer to assured security? I grapple with this question every day. This article offers some valuable insights into why secrets scanning stands as a stalwart for assured [] The post Assured Security with Secrets Scanning appeared first on Entro.

article thumbnail

SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks

The Hacker News

A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate near-field communication (NFC) relay attacks, enabling cybercriminals to conduct fraudulent cashouts. The active campaign is targeting customers of banking institutions and card issuers in Italy with an aim to compromise payment card data, fraud prevention firm Cleafy said in an analysis.

Malware 113
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Secure Your Financial Data with Advanced PAM

Security Boulevard

Why do Financial Services Require Advanced Privileged Access Management (PAM)? Do financial institutions need an advanced PAM solution? With the ever-increasing attacks on financial data security, the answer is undeniably yes. Dedicated security measures, such as Non-Human Identities (NHIs) and Secrets Security Management, are crucial for safeguarding sensitive data, reducing risks, and ensuring compliance.

article thumbnail

CVE-2025-21204: SYSTEM-Level Privilege Escalation in Windows Update Stack Exposed, PoC Released

Penetration Testing

Security researcher Elli Shlomo published the technical details and a proof-of-concept exploit code for CVE-2025-21204, a severe local The post CVE-2025-21204: SYSTEM-Level Privilege Escalation in Windows Update Stack Exposed, PoC Released appeared first on Daily CyberSecurity.

article thumbnail

Cloud Monitor Gives Burlington School District a Big Cybersecurity and Safety Boost

Security Boulevard

Early Cloud Monitor adopter uses real-time insights to stop VPN abuse, detect threats, and protect learning As the Technology Director for Burlington School District RE-6J in rural eastern Colorado, Russell Lindenschmidt is responsible for overseeing all things tech-related for the districts three schools. With approximately 700 students and an IT team of one, managing cybersecurity.

article thumbnail

This video of humanoid robots running a half marathon is amazing, hilarious, and a little creepy

Zero Day

Despite lost limbs, overheating, and a crash or two, a few of the 20 robots competing in China over the weekend did quite well. See for yourself.

108
108
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Product Innovation Begins with a Mindset

Security Boulevard

At ISHIR, we believe that the foundation of every transformative digital product is not just a brilliant idea, but a mindset an innovation mindset. Read More The post Product Innovation Begins with a Mindset appeared first on ISHIR | Software Development India. The post Product Innovation Begins with a Mindset appeared first on Security Boulevard.

article thumbnail

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

The Hacker News

Cybersecurity researchers have disclosed a surge in "mass scanning, credential brute-forcing, and exploitation attempts" originating from IP addresses associated with a Russian bulletproof hosting service provider named Proton66. The activity, detected since January 8, 2025, targeted organizations worldwide, according to a two-part analysis published by Trustwave SpiderLabs last week.

Malware 107
article thumbnail

BSidesLV24 – Common Ground – Raiders of the Lost Artifacts: Racing for Hidden Treasures in Public GitHub Repositories

Security Boulevard

Author/Presenter: Yaron Avital Our sincere appreciation to BSidesLV , and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conferences events located at the Tuscany Suites & Casino ; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Common Ground – Raiders of the Lost Artifacts: Racing for Hidden Treasures in Public GitHub Repositories appeared first on Security Boulevard.

article thumbnail

Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware

The Hacker News

The China-linked cyber espionage group tracked as Lotus Panda has been attributed to a campaign that compromised multiple organizations in an unnamed Southeast Asian country between August 2024 and February 2025.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!