A sophisticated phishing campaign by Russian-linked threat group APT29 has been actively targeting European diplomatic entities since January 2025, according to a recent security report. The campaign, believed to be a continuation of previous operations that utilized the WINELOADER backdoor,…
Tag: Cyber Security News
Hackers Exploiting NTLM Spoofing Vulnerability in Wild to Compromise Systems
Cybercriminals have been actively exploiting a critical vulnerability in Windows systems, identified as CVE-2025-24054. This vulnerability leverages NTLM hash disclosure through spoofing techniques. This vulnerability, related to NTLM (New Technology LAN Manager) authentication protocols, has become a significant threat, enabling…
Securing SaaS Applications – Best Practices for CISO Oversight
As organizations increasingly migrate to cloud-based software solutions, Chief Information Security Officers (CISOs) face the complex challenge of securing Software as a Service (SaaS) applications across their enterprise. The rapid adoption of SaaS has created a dynamic security landscape in…
Hacktivist Turns More Sophisticated Targeting Critical Infrastructure to Deploy Ransomware
Hacktivist groups are rapidly evolving beyond their traditional tactics of DDoS attacks and website defacements into far more sophisticated operations targeting critical infrastructure and deploying ransomware. This alarming shift represents a significant escalation in the threat landscape, as ideologically motivated…
Threat Intelligence Feeds Flood Analysts With Data, But Context Still Lacking
In the digital age, organizations face a relentless barrage of cyber threats, ranging from sophisticated nation-state attacks to opportunistic ransomware campaigns. To keep pace, security teams have turned to threat intelligence feeds—automated streams of data that provide real-time information about…
How CISOs Can Create a Culture of Cybersecurity Accountability
In the modern business landscape, cybersecurity is no longer just an IT problem; it has become a core business concern that requires a culture of cybersecurity accountability at every organizational level. As cyber threats grow more sophisticated and frequent, the…
Automating Threat Intelligence: Tools And Techniques For 2025
As cyber threats continue to grow in both scale and sophistication, organizations in 2025 are increasingly relying on automation to transform their threat intelligence (TI) operations. Automated threat intelligence leverages artificial intelligence (AI), machine learning (ML), and orchestration platforms to…
Hackers Revealed the Exploit Method Used to Hack 4chan Messageboard
Following yesterday’s major security breach of the controversial imageboard 4chan, hackers have publicly revealed the sophisticated exploit method used to gain access to the site’s backend systems. The attack, which took the platform offline for several hours, has exposed sensitive…
CVE Foundation Launched To Ensure Long-term Vulnerability Tracking
The newly established CVE Foundation has been formally launched to safeguard the long-term continuity, stability, and independence of the Common Vulnerabilities and Exposures (CVE) Program. This move comes as the CVE Program, a 25-year foundational pillar of cybersecurity, faces unprecedented…
Hackers Abuse Node.js to Deliver Malware – Microsoft Warns
Attackers are increasingly exploiting Node.js, a widely trusted, open-source JavaScript runtime, to deliver sophisticated malware, steal sensitive data, and compromise entire systems. Recent campaigns observed since late 2024 have showcased a shift in attacker tactics. They leverage Node.js both for direct script…