Security News

Clone2Leak attacks exploit Git flaws to steal credentials
2025-01-27 16:36

A set of three distinct but related attacks, dubbed 'Clone2Leak,' can leak credentials by exploiting how Git and its credential helpers handle authentication requests. [...]

5,000+ SonicWall firewalls still open to attack (CVE-2024-53704)
2025-01-27 15:05

5,000+ SonicWall firewalls are still vulnerable to attack via a high-severity vulnerability (CVE-2024-53704) that, according to SonicWall, should be considered “at imminent risk of exploitation”....

MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks
2025-01-27 07:16

Threat hunters have detailed an ongoing campaign that leverages a malware loader called MintsLoader to distribute secondary payloads such as the StealC information stealer and a legitimate...

Week in review: 48k Fortinet firewalls open to attack, attackers “vishing” orgs via Microsoft Teams
2025-01-26 09:00

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 48,000+ internet-facing Fortinet firewalls still open to attack Despite last week’s confirmation...

SonicWall warns of SMA1000 RCE flaw exploited in zero-day attacks
2025-01-23 15:45

SonicWall is warning about a pre-authentication deserialization vulnerability in SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), with reports that it has...

Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks
2025-01-23 15:00

Cybersecurity researchers are calling attention to a new malware campaign that leverages fake CAPTCHA verification checks to deliver the infamous Lumma information stealer. "The campaign is...

SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
2025-01-23 08:57

A critical zero-day vulnerability (CVE-2025-23006) affecting SonicWall Secure Mobile Access (SMA) 1000 Series appliances is being exploited by attackers. “We strongly advises users of the SMA1000...

Defense strategies to counter escalating hybrid attacks
2025-01-23 05:30

In this Help Net Security interview, Tomer Shloman, Sr. Security Researcher at Trellix, talks about attack attribution, outlines solutions for recognizing hybrid threats, and offers advice on how...

Supply chain attack hits Chrome extensions, could expose millions
2025-01-22 19:45

Threat actor exploited phishing and OAuth abuse to inject malicious code Cybersecurity outfit Sekoia is warning Chrome users of a supply chain attack targeting browser extension developers that...

IPany VPN breached in supply-chain attack to push custom malware
2025-01-22 15:11

South Korean VPN provider IPany was breached in a supply chain attack by the "PlushDaemon" China-aligned hacking group, who compromised the company's VPN installer to deploy the custom...