Mon.Apr 21, 2025

article thumbnail

New sophisticate malware SuperCard X targets Androids via NFC relay attacks

Security Affairs

SuperCard X – a new MaaS – targets Androids via NFC relay attacks, enabling fraudulent POS and ATM transactions with stolen card data. Cleafy researchers discovered a new malware-as-a-service (MaaS) called SuperCard X targeting Android devices with NFC relay attacks for fraudulent cash-outs. Attackers promote the MaaS through Telegram channels, analysis shows SuperCard X builds had Telegram links removed, likely to hide affiliate ties and hinder attribution, suggesting efforts to eva

Malware 105
article thumbnail

Phishing attacks leveraging HTML code inside SVG files

SecureList

With each passing year, phishing attacks feature more and more elaborate techniques designed to trick users and evade security measures. Attackers employ deceptive URL redirection tactics, such as appending malicious website addresses to seemingly safe links, embed links in PDFs, and send HTML attachments that either host the entire phishing site or use JavaScript to launch it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked APT29 targets European diplomatic entities with GRAPELOADER malware

Security Affairs

Russia-linked group APT29 targeted diplomatic entities across Europe with a new malware loader codenamed GRAPELOADER. Check Point Research team reported that Russia-linked cyberespionage group APT29 (aka SVR group , Cozy Bear , Nobelium , BlueBravo , Midnight Blizzard , and The Dukes ) is behind a sophisticated phishing campaign targeting European diplomatic entities, using a new WINELOADER variant and a previously unknown malware called GRAPELOADER. “While the improved WINELOADER variant

Malware 104
article thumbnail

Lumma Stealer – Tracking distribution channels

SecureList

Introduction The evolution of Malware-as-a-Service (MaaS) has significantly lowered the barriers to entry for cybercriminals, with information stealers becoming one of the most commercially successful categories in this underground economy. Among these threats, Lumma Stealer has emerged as a particularly sophisticated player since its introduction in 2022 by the threat actor known as Lumma.

Malware 88
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Legitimate Windows Tool Abused: mavinject.exe Used for Stealthy DLL Injection by Threat Actors

Penetration Testing

AhnLab Security Emergency Response Center (ASEC) has reported on the abuse of a legitimate Microsoft utility, mavinject.exe, by The post Legitimate Windows Tool Abused: mavinject.exe Used for Stealthy DLL Injection by Threat Actors appeared first on Daily CyberSecurity.

article thumbnail

A week in security (April 12 – April 18)

Malwarebytes

Last week on Malwarebytes Labs: Text scams grow to steal hundreds of millions of dollars Apple patches security vulnerabilities in iOS and iPadOS. Update now! Hi, robot: Half of all internet traffic now automated “I sent you an email from your email account,” sextortion scam claims “Follow me” to this fake crypto exchange to claim $500 Hertz data breach caused by CL0P ransomware attack on vendor Meta slurps up EU user data for AI training No, its not OK to delete that new

Scams 92

LifeWorks

More Trending

article thumbnail

Kimsuky APT exploited BlueKeep RDP flaw in attacks against South Korea and Japan

Security Affairs

Researchers spotted a new North Korea-linked group Kimsuky ‘s campaign, exploiting a patched Microsoft Remote Desktop Services flaw to gain initial access. While investigating a security breach, the AhnLab SEcurity intelligence Center (ASEC) researchers discovered a North Korea-linked group Kimsuky ‘s campaign, tracked as Larva-24005. Attackers exploited an RDP vulnerability to gain initial access to the target systems. “In some systems, initial access was gained through exploi

article thumbnail

Hackers Exploit Russian Host Proton66 for Global Malware Attacks, Researchers Say

eSecurity Planet

A notorious Russian hosting service provider known as Proton66 is at the center of a series of widespread cyberattacks and malware campaigns targeting organizations and users worldwide, according to fresh findings from cybersecurity experts. Researchers at Trustwave SpiderLabs have linked the provider to a surge in dangerous activities from credential brute-forcing and mass vulnerability scanning to the delivery of ransomware, infostealers, and Android-targeted phishing campaigns.

Malware 71
article thumbnail

Upwind Adds Ability to Detect API Threats to Cloud Security Platform

Security Boulevard

Upwind has added an ability to detect threats to application programming interfaces (APIs) in real time to its cloud application detection and response (CADR) platform, based on machine learning algorithms. The post Upwind Adds Ability to Detect API Threats to Cloud Security Platform appeared first on Security Boulevard.

article thumbnail

Russian Hackers Target European Diplomats with ‘Wine-Tasting’ Phishing Scams

eSecurity Planet

A Russian state-linked hacking group is ramping up its cyberattacks against diplomatic targets across Europe, using a new stealthy malware tool known as GrapeLoader to deliver malicious payloads through cleverly disguised phishing emails. According to Check Point Research, the campaign began in January 2025 and is being carried out by APT29 also known as Cozy Bear or Midnight Blizzard the same group behind the infamous SolarWinds supply chain attack.

Scams 58
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Don’t Lock Up Peanut Butter in Fort Knox: The Smart Approach to Data Classification 

Security Boulevard

Exploring the implementation of a data classification model in order to enable a data-driven approach to managing risk and cost. The post Don’t Lock Up Peanut Butter in Fort Knox: The Smart Approach to Data Classification appeared first on Security Boulevard.

Risk 71
article thumbnail

FOG Ransomware Campaign Targets Multiple Sectors with Phishing and Payload Obfuscation

Penetration Testing

Trend Micro has identified a recent campaign involving FOG ransomware, demonstrating the adaptability of cybercriminals in their attempts The post FOG Ransomware Campaign Targets Multiple Sectors with Phishing and Payload Obfuscation appeared first on Daily CyberSecurity.

article thumbnail

How to Protect Yourself From Phone Searches at the US Border

WIRED Threat Level

Customs and Border Protection has broad authority to search travelers devices when they cross into the United States. Heres what you can do to protect your digital life while at the US border.

143
143
article thumbnail

CMMC Compliance Checklist for 2025: Key Steps and Common Pitfalls to Avoid

Centraleyes

The Cybersecurity Maturity Model Certification is a unified standard for cybersecurity across the defense supply chain. Developed in response to rising cyber threats, the CMMC framework is intended to protect Controlled Unclassified Information (CUI). What sets CMMC 2.0 apart from so many other frameworks is its structured, maturity-driven approach and its requirement for third-party certification.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Security Tools: First, They’re Good, Then They’re Bad

Security Boulevard

Security tools can also be vulnerable and so cybersecurity teams must put a premium on ensuring tools are used as intended for defense. The post Security Tools: First, Theyre Good, Then Theyre Bad appeared first on Security Boulevard.

article thumbnail

SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks

The Hacker News

A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate near-field communication (NFC) relay attacks, enabling cybercriminals to conduct fraudulent cashouts. The active campaign is targeting customers of banking institutions and card issuers in Italy with an aim to compromise payment card data, fraud prevention firm Cleafy said in an analysis.

Malware 125
article thumbnail

CVE-2025-33028: WinZip Flaw Exposes Users to Silent Code Execution via MotW Bypass, No Patch

Penetration Testing

A security flaw has been unearthed in WinZip, the popular file compression utility, placing millions of users at The post CVE-2025-33028: WinZip Flaw Exposes Users to Silent Code Execution via MotW Bypass, No Patch appeared first on Daily CyberSecurity.

article thumbnail

BSidesLV24 – Common Ground – Introduction to Software Defined Radio For Offensive and Defensive Operations

Security Boulevard

Our sincere appreciation to BSidesLV , and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conferences events located at the Tuscany Suites & Casino ; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Common Ground – Introduction to Software Defined Radio For Offensive and Defensive Operations appeared first on Security Boulevard.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware

The Hacker News

The China-linked cyber espionage group tracked as Lotus Panda has been attributed to a campaign that compromised multiple organizations in an unnamed Southeast Asian country between August 2024 and February 2025.

article thumbnail

Critical CVE-2025-1976 Vulnerability in Brocade Fabric OS Actively Exploited

Penetration Testing

A critical security vulnerability has been identified in Brocade Fabric OS, posing a significant risk to affected systems. The post Critical CVE-2025-1976 Vulnerability in Brocade Fabric OS Actively Exploited appeared first on Daily CyberSecurity.

Risk 118
article thumbnail

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

The Hacker News

Cybersecurity researchers have disclosed a surge in "mass scanning, credential brute-forcing, and exploitation attempts" originating from IP addresses associated with a Russian bulletproof hosting service provider named Proton66. The activity, detected since January 8, 2025, targeted organizations worldwide, according to a two-part analysis published by Trustwave SpiderLabs last week.

Malware 123
article thumbnail

Turn to Exposure Management to Prioritize Risks Based on Business Impact

Security Boulevard

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable CSO Robert Huber shares practical advice on using an exposure management program to focus on risks that have business impact. You can read the entire Exposure Management Academy series here.

Risk 52
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan

The Hacker News

Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored threat actor known as Kimsuky that exploits a now-patched vulnerability impacting Microsoft Remote Desktop Services to gain initial access. The activity has been named Larva-24005 by the AhnLab Security Intelligence Center (ASEC).

article thumbnail

Implementing Exposure Management in Legacy Enterprise Environments

Security Boulevard

The successful implementation of CTEM for Exposure Management in Legacy Enterprise Environments in legacy systems is crucial, as these systems are the hidden backbone of many large enterprises, comprising more. The post Implementing Exposure Management in Legacy Enterprise Environments appeared first on Strobes Security. The post Implementing Exposure Management in Legacy Enterprise Environments appeared first on Security Boulevard.

52
article thumbnail

CVE-2025-21204: SYSTEM-Level Privilege Escalation in Windows Update Stack Exposed, PoC Released

Penetration Testing

Security researcher Elli Shlomo published the technical details and a proof-of-concept exploit code for CVE-2025-21204, a severe local The post CVE-2025-21204: SYSTEM-Level Privilege Escalation in Windows Update Stack Exposed, PoC Released appeared first on Daily CyberSecurity.

article thumbnail

This video of humanoid robots running a half marathon is amazing, hilarious, and a little creepy

Zero Day

Despite lost limbs, overheating, and a crash or two, a few of the 20 robots competing in China over the weekend did quite well. See for yourself.

110
110
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Assured Security with Secrets Scanning

Security Boulevard

Is Secrets Scanning the Key to Assured Security? The alarming rise in data breaches and cyber threats globally raises an essential question is secrets scanning the definitive answer to assured security? I grapple with this question every day. This article offers some valuable insights into why secrets scanning stands as a stalwart for assured [] The post Assured Security with Secrets Scanning appeared first on Entro.

article thumbnail

Will AI replace software engineers? It depends on who you ask

Zero Day

Should software professionals be worried about their career prospects with the rise of AI agents? Industry observers' reactions to the potential impact of OpenAI's latest innovation range from guarded pessimism to pragmatism.

Software 106
article thumbnail

Secure Your Financial Data with Advanced PAM

Security Boulevard

Why do Financial Services Require Advanced Privileged Access Management (PAM)? Do financial institutions need an advanced PAM solution? With the ever-increasing attacks on financial data security, the answer is undeniably yes. Dedicated security measures, such as Non-Human Identities (NHIs) and Secrets Security Management, are crucial for safeguarding sensitive data, reducing risks, and ensuring compliance.

article thumbnail

5 Reasons Device Management Isn't Device Trust​

The Hacker News

The problem is simple: all breaches start with initial access, and initial access comes down to two primary attack vectors credentials and devices. This is not news; every report you can find on the threat landscape depicts the same picture. The solution is more complex. For this article, well focus on the device threat vector.

Risk 106
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!