Category: News


  • New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records

    Mar 27, 2025Ravie LakshmananEmail Security / Malware Cybersecurity researchers have shed light on a new phishing-as-a-service (PhaaS) platform that leverages the Domain Name System (DNS) mail exchange (MX) records to serve fake login pages that impersonate about 114 brands. DNS intelligence firm Infoblox is tracking the actor behind the PhaaS, the phishing kit, and the…

  • Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks

    The threat actor known as Blind Eagle has been linked to a series of ongoing campaigns targeting Colombian institutions and government entities since November 2024. “The monitored campaigns targeted Colombian judicial institutions and other government or private organizations, with high infection rates,” Check Point said in a new analysis. “More than 1,600 victims were affected…

  • Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Targets Over 6,000 Devices

    Mar 11, 2025Ravie LakshmananNetwork Security / Vulnerability Unpatched TP-Link Archer routers have become the target of a new botnet campaign dubbed Ballista, according to new findings from the Cato CTRL team. “The botnet exploits a remote code execution (RCE) vulnerability in TP-Link Archer routers (CVE-2023-1389) to spread itself automatically over the Internet,” security researchers Ofek…

  • Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks

    Mar 12, 2025Ravie LakshmananEndpoint Security / Vulnerability Apple on Tuesday released a security update to address a zero-day flaw that it said has been exploited in “extremely sophisticated” attacks. The vulnerability has been assigned the CVE identifier CVE-2025-24201 and is rooted in the WebKit web browser engine component. It has been described as an out-of-bounds…

  • Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk

    Mar 13, 2025Ravie LakshmananOpen Source / Vulnerability Meta has warned that a security vulnerability impacting the FreeType open-source font rendering library may have been exploited in the wild. The vulnerability has been assigned the CVE identifier CVE-2025-27363, and carries a CVSS score of 8.1, indicating high severity. Described as an out-of-bounds write flaw, it could…

  • WARNING: Expiring Root Certificate May Disable Firefox Add-Ons, Security Features, and DRM Playback

    Mar 13, 2025Ravie LakshmananBrowser Security / Encryption Browser maker Mozilla is urging users to update their Firefox instances to the latest version to avoid facing issues with using add-ons due to the impending expiration of a root certificate. “On March 14, 2025, a root certificate used to verify signed content and add-ons for various Mozilla…

  • Future-Proofing Business Continuity: BCDR Trends and Challenges for 2025

    As IT environments grow more complex, IT professionals are facing unprecedented pressure to secure business-critical data. With hybrid work the new standard and cloud adoption on the rise, data is increasingly distributed across different environments, providers and locations, expanding the attack surface for emerging cyberthreats. While the need for a strong data protection strategy has…

  • GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks

    Mar 13, 2025Ravie LakshmananAuthentication / Vulnerability Two high-severity security flaws have been disclosed in the open-source ruby-saml library that could allow malicious actors to bypass Security Assertion Markup Language (SAML) authentication protections. SAML is an XML-based markup language and open-standard used for exchanging authentication and authorization data between parties, enabling features like single sign-on (SSO),…

  • URGENT: Microsoft Patches 57 Security Flaws, Including 6 Actively Exploited Zero-Days

    Mar 12, 2025Ravie LakshmananPatch Tuesday / Vulnerability Microsoft on Tuesday released security updates to address 57 security vulnerabilities in its software, including a whopping six zero-days that it said have been actively exploited in the wild. Of the 56 flaws, six are rated Critical, 50 are rated Important, and one is rated Low in severity.…

  • Pentesters: Is AI Coming for Your Role?

    We’ve been hearing the same story for years: AI is coming for your job. In fact, in 2017, McKinsey printed a report, Jobs Lost, Jobs Gained: Workforce Transitions in a Time of Automation, predicting that by 2030, 375 million workers would need to find new jobs or risk being displaced by AI and automation. Queue…