Cyber News & Articles

Cyber News & Articles

RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally 

The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme have been observed leveraging now-patched security flaws in Microsoft Active Directory and the Netlogon protocol to escalate privileges and gain unauthorized access to a victim network’s domain controller as part of their post-compromise strategy.
“RansomHub has targeted over 600 organizations globally, spanning sectors

read more
Cyber News & Articles

PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks 

Threat actors who were behind the exploitation of a zero-day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products in December 2024 likely also exploited a previously unknown SQL injection flaw in PostgreSQL, according to findings from Rapid7.
The vulnerability, tracked as CVE-2025-1094 (CVSS score: 8.1), affects the PostgreSQL interactive tool psql.
“An

read more
Cyber News & Articles

Nearly a Year Later, Mozilla is Still Promoting OneRep 

In mid-March 2024, KrebsOnSecurity revealed that the founder of the personal data removal service Onerep also founded dozens of people-search companies. Shortly after that investigation was published, Mozilla said it would stop bundling Onerep with the Firefox browser and wind down its partnership. But nearly a year later, Mozilla is still promoting it to Firefox users.

read more
Cyber News & Articles

Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners 

A widespread phishing campaign has been observed leveraging bogus PDF documents hosted on the Webflow content delivery network (CDN) with an aim to steal credit card information and commit financial fraud.
“The attacker targets victims searching for documents on search engines, resulting in access to malicious PDF that contains a CAPTCHA image embedded with a phishing link, leading them to

read more
Cyber News & Articles

North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks 

A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors.
The attack campaign, dubbed DEEP#DRIVE by Securonix, has been attributed to a hacking group known as Kimsuky, which is also tracked under the names APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet

read more
Cyber News & Articles

Fast Deployments, Secure Code: Watch this Learn to Sync Dev and Sec Teams 

Ever felt like your team is stuck in a constant battle? Developers rush to add new features, while security folks worry about vulnerabilities. What if you could bring both sides together without sacrificing one for the other?
We invite you to our upcoming webinar, “Opening the Fast Lane for Secure Deployments.” This isn’t another tech talk full of buzzwords—it’s a down-to-earth session that

read more
Cyber News & Articles

RA World Ransomware Attack in South Asia Links to Chinese Espionage Toolset 

An RA World ransomware attack in November 2024 targeting an unnamed Asian software and services company involved the use of a malicious tool exclusively used by China-based cyber espionage groups, raising the possibility that the threat actor may be moonlighting as a ransomware player in an individual capacity.
“During the attack in late 2024, the attacker deployed a distinct toolset that had

read more
Cyber News & Articles

AI and Security – A New Puzzle to Figure Out 

AI is everywhere now, transforming how businesses operate and how users engage with apps, devices, and services. A lot of applications now have some Artificial Intelligence inside, whether supporting a chat interface, intelligently analyzing data or matching user preferences. No question AI benefits users, but it also brings new security challenges, especially Identity-related security

read more
Cyber News & Articles

Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software 

Palo Alto Networks has addressed a high-severity security flaw in its PAN-OS software that could result in an authentication bypass.
The vulnerability, tracked as CVE-2025-0108, carries a CVSS score of 7.8 out of 10.0. The score, however, drops to 5.1 if access to the management interface is restricted to a jump box.
“An authentication bypass in the Palo Alto Networks PAN-OS software enables an

read more
Cyber News & Articles

FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux 

Threat hunters have shed light on a new campaign targeting the foreign ministry of an unnamed South American nation with bespoke malware capable of granting remote access to infected hosts.
The activity, detected in November 2024, has been attributed by Elastic Security Labs to a threat cluster it tracks as REF7707. Some of the other targets include a telecommunications entity and a university,

read more

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X