Security News > 2025 > January

AI SOC Analysts: Propelling SecOps into the future
2025-01-28 11:20

Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up with ever-increasing alert volumes and complexity, modernizing SOC automation strategies with AI...

Apple zero-day vulnerability exploited to target iPhone users (CVE-2025-24085)
2025-01-28 11:10

Apple has shipped a fix for a zero-day vulnerability (CVE-2025-24085) that is being leveraged by attackers against iPhone users. About CVE-2025-24085 CVE-2025-24085 is a use after free bug in...

Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations
2025-01-28 11:01

Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to tunnel traffic to command-and-control...

How Long Does It Take Hackers to Crack Modern Hashing Algorithms?
2025-01-28 10:30

While passwords remain the first line of defense for protecting user accounts against unauthorized access, the methods for creating strong passwords and protecting them are continually evolving....

E.U. Sanctions 3 Russian Nationals for Cyber Attacks Targeting Estonia’s Key Ministries
2025-01-28 10:16

The Council of the European Union has sanctioned three individuals for allegedly carrying out "malicious cyber activities" against Estonia. The three Russian nationals – Nikolay Alexandrovich...

Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks
2025-01-28 10:16

DeepSeek, the Chinese AI startup that has captured much of the artificial intelligence (AI) buzz in recent days, said it's restricting registrations on the service, citing malicious attacks. "Due...

Apple plugs security hole in its iThings that's already been exploited in iOS
2025-01-28 08:17

Cupertino kicks off the year with a zero-day Apple has plugged a security hole in the software at the heart of its iPhones, iPads, Vision Pro goggles, Apple TVs and macOS Sequoia Macs, warning...

BloodyAD: Open-source Active Directory privilege escalation framework
2025-01-28 05:00

BloodyAD is an open-source Active Directory privilege escalation framework that uses specialized LDAP calls to interact with domain controllers. It enables various privilege escalation techniques...

74% of CISOs are increasing crisis simulation budgets
2025-01-28 04:30

In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, 23andMe, Transport for London, and Cencora, CISOs are reassessing their organisation’s readiness to...

Cybersecurity jobs available right now: January 28, 2025
2025-01-28 04:00

Application Security Engineer Bumble | United Kingdom | Hybrid – View job details As an Application Security Engineer, you will design and implement security testing tools within CI/CD pipelines...