Friday, February 21, 2025
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Combing the world for the cybersecurity stories you need to know.
Cybersecurity News
macOS Malware Surge: Infostealers Drive a 101% Spike in Attacks
February 20, 2025
Malware attacks on macOS systems have surged recently, with malicious activity especially focused on infostealers. Palo Alto Networks’ Unit 42 found that infostealers make up the largest part of macOS malware introduced in 2024. Some…
Read More >
Elon Musk’s DOGE Sparks Controversy at the U.S. Education Department
February 19, 2025
A recent report from The Washington Post has ignited a debate over the role of AI in government oversight. According to the report, Elon Musk’s Department of Government Efficiency (DOGE) has been granted access to…
Read More >
The Hidden Dangers of Publicly Disclosed ASP.NET Machine Keys
February 18, 2025
Microsoft has recently issued a notice warning of code injection attacks by an unknown threat actor taking advantage of publicly disclosed ASP.NET machine keys. These are cryptographic keys for encrypting and validating data in ASP.NET…
Read More >
The Rise of Phishing-as-a-Service Targeting Microsoft 365 Accounts
February 14, 2025
Cybersecurity firm Sekoia recently spotted a new phishing kit using an Adversary-in-the-Middle (AitM) technique to target Microsoft 365 accounts. Discovered in December 2024, the Sneaky 2FA phishing kit is a sophisticated phishing-as-a-service (PhaaS) attack from…
Read More >
Critical rsync Vulnerabilities Exposed: Over 660,000 Systems at Risk
February 12, 2025
On January 14, Google Cloud and other independent security researchers announced the discovery of six vulnerabilities in rsync, a widely used file synchronization tool. The most severe, CVE-2024-12084, is a buffer overflow flaw in the…
Read More >
The Rise of RansomHub and Geopolitical Risks
February 11, 2025
Military strategist Sun Tzu wrote over 2000 years ago that it is critical to understand your adversary. This concept is why anti-ransomware platform provider Halcyon publishes their "Ransomware Malicious Quartile (MQ) Power Rankings." They released…
Read More >
Homebrew Targeted in Malvertising Campaign Distributing AmosStealer Malware
February 10, 2025
The free, open-source software package management system Homebrew is a popular tool for simplifying the process of installing software on macOS and Linux systems. It is entirely run by volunteers and often benefits from user…
Read More >
AI, Ransomware, and the Escalating Cybersecurity Battlefield in 2025
February 07, 2025
Cybersecurity in 2025 is caught in a tug-of-war between innovation and exploitation. The rise of agentic AI—AI that can operate autonomously, make decisions, and interact with systems—has reshaped both cyber defense and cybercrime. Security teams…
Read More >
Cybercriminals Exploit Vulnerabilities in Mobile Phishing Campaign
February 07, 2025
Phishing has been a tried-and-true cyberattack tactic for decades, as it allows threat actors to adapt and expand their methods to take advantage of different technologies and evade many cybersecurity measures. Recent years have seen…
Read More >
Cloud App Impersonations and the Rise of Sophisticated Credential Harvesting
February 04, 2025
There are no safe spaces on the internet. Cybercriminals will exploit any and every opportunity to launch attacks. This has been demonstrated again by researchers at SlashNext, who have uncovered a new credential harvesting campaign.…
Read More >
Critical Flaw Puts Secure Mobile Access Appliances at Risk
February 04, 2025
SonicWall has issued an urgent warning about a newly discovered zero-day vulnerability, CVE-2025-23006, in its Secure Mobile Access (SMA) 1000 Series appliances. This flaw leaves affected devices open to full system compromise, enabling attackers to…
Read More >
Arcus Media: The Rising Ransomware Threat Redefining Modern Cybersecurity Defenses
January 29, 2025
Ransomware continues to evolve as one of today’s most formidable cyber threats. Cybercriminals continue to refine their tactics to inflict the most damage possible and, ultimately, increase the likelihood of a ransom payment. Over the…
Read More >
Dream Jobs or Digital Traps? AppLite Trojan Attacks Mobile Job Seekers
January 28, 2025
Finding a good job is difficult. This is why cybercriminals use job recruitment offers to trick people into downloading malicious Android mobile applications pretending to be job application software. Zimperium’s zLabs uncovered a new variant…
Read More >
FCC Proposes Cybersecurity Mandate to Combat Advanced Threats
January 22, 2025
In response to a recent rise in foreign and state-sponsored attacks threatening critical communications infrastructure, FCC Chairwoman Jessica Rosenworcel has proposed a new mandate to protect communications systems. Technological advances and geopolitical conflict contribute to…
Read More >
The Expanding Reach of Chinese Cyber Espionage in U.S. Telecommunications
January 21, 2025
A recent wave of cyberespionage has exposed the vulnerabilities of U.S. telecommunications networks. Dubbed "Salt Typhoon" by Microsoft, this campaign, attributed to Chinese hackers, infiltrated at least eight major telecommunications companies, including AT&T and Verizon.…
Read More >
Critical Flaws in Veeam Service Provider Console Demand Urgent Action
January 17, 2025
Veeam, a provider of data replication and protection software, released critical security patches to fix severe vulnerabilities affecting its Service Provider Console (VSPC). One of the vulnerabilities is rated as critical (9.9/10 on the CVSS…
Read More >
Inside the Four-Month Espionage Campaign by Suspected Chinese Threat Actors
January 16, 2025
In mid-2024, a large U.S. organization with sizeable operations in China was targeted by a persistent attack thought to originate from Chinese actors. The reported intrusion lasted four months, from April to August, with the…
Read More >
Cloak Ransomware: The Rising Threat with Advanced Disruption Techniques
January 15, 2025
The Cloak ransomware group emerged in late 2022 and has quickly become a major cybersecurity threat. By targeting small- to medium-sized businesses (SMBs) across Europe and Asia, Cloak has made a significant impact with its…
Read More >
Subscribe for the Latest News
"
*
" indicates required fields
First Name
*
Last Name
*
Company Name
*
Job Title
*
Email
*
Country
*
Country *
United States
Afghanistan
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius and Saba
Bosnia and Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cabo Verde
Cambodia
Cameroon
Canada
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos Islands
Colombia
Comoros
Congo
Congo, Democratic Republic of the
Cook Islands
Costa Rica
Croatia
Cuba
Curaçao
Cyprus
Czechia
Côte d'Ivoire
Denmark
Djibouti
Dominica
Dominican Republic
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard Island and McDonald Islands
Holy See
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iran
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Japan
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Democratic People's Republic of
Korea, Republic of
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libya
Liechtenstein
Lithuania
Luxembourg
Macao
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia
Moldova
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Norway
Oman
Pakistan
Palau
Palestine, State of
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Romania
Russian Federation
Rwanda
Réunion
Saint Barthélemy
Saint Helena, Ascension and Tristan da Cunha
Saint Kitts and Nevis
Saint Lucia
Saint Martin
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Singapore
Sint Maarten
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Spain
Sri Lanka
Sudan
Suriname
Svalbard and Jan Mayen
Sweden
Switzerland
Syria Arab Republic
Taiwan
Tajikistan
Tanzania, the United Republic of
Thailand
Timor-Leste
Togo
Tokelau
Tonga
Trinidad and Tobago
Tunisia
Turkmenistan
Turks and Caicos Islands
Tuvalu
Türkiye
US Minor Outlying Islands
Uganda
Ukraine
United Arab Emirates
United Kingdom
Uruguay
Uzbekistan
Vanuatu
Venezuela
Viet Nam
Virgin Islands, British
Virgin Islands, U.S.
Wallis and Futuna
Western Sahara
Yemen
Zambia
Zimbabwe
Åland Islands
Employee Count
*
Employee Count *
< 100 employees
100 to 249 employees
250 to 499 employees
500 to 999 employees
1,000 to 2,499 employees
2,500 to 4,999 employees
5,000 to 9,999 employees
10,000 to 24,999 employees
25,000+ employees
Industry
*
Industry *
Advertising & Marketing
Agriculture
Airlines & Aerospace (including Defense)
Automotive
Business Support & Logistics
Construction, Machinery and Homes
Education
Entertainment & Leisure
Finance & Financial Services
Food & Beverages
Government
Health Care & Pharmaceuticals
Insurance
Manufacturing
Nonprofit
Real Estate
Retail & Consumer Durables
Telecommunications, Technology, Internet & Electronics
Utilities, Energy, and Extraction
Other
Consent
*
I have read and agree to the Security Buzz
Privacy Policy
and understand that I may receive communications from Security Buzz and its partners by submitting this form.
*
Comments
This field is for validation purposes and should be left unchanged.
Webinars
NO POSTS