Wednesday, May 14, 2025

Cybersecurity

Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers

î ‚May 01, 2025î „Ravie LakshmananMalware / Web Skimming Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a...

Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support

î ‚May 02, 2025î „Ravie LakshmananPassword Security / Windows A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big change...

MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks

î ‚May 02, 2025î „Ravie LakshmananMalware / Threat Intelligence The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called GhostWeaver. "MintsLoader...

How to Automate CVE and Vulnerability Advisory Response with Tines

î ‚May 02, 2025î „The Hacker NewsVulnerability Management / Security Operations Run by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built...

TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China

May 02, 2025Ravie LakshmananData Privacy / Social Media Ireland's Data Protection Commission (DPC) on Friday fined popular video-sharing platform TikTok €530 million ($601 million) for...

U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems

The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-year-old Yemeni national for allegedly deploying the Black Kingdom ransomware against global...

Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware

î ‚May 03, 2025î „Ravie LakshmananMalware / Operational Technology An Iranian state-sponsored threat group has been attributed to a long-term cyber intrusion aimed at a critical national...

Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack

î ‚May 03, 2025î „Ravie LakshmananSupply Chain Attack / Malware Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that...