Security News

Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
2025-02-04 13:02

CVE-2025-0411, a Mark-of-the-Web bypass vulnerability in the open-source archiver tool 7-Zip that was fixed in November 2024, has been exploited in zero-day attacks to deliver malware to Ukrainian...

How to Prevent Phishing Attacks with Multi-Factor Authentication
2025-02-04 13:00

Learn how to protect yourself and your sensitive information from phishing attacks by implementing multi-factor authentication.

Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections
2025-02-04 12:28

A recently patched security vulnerability in the 7-Zip archiver tool was exploited in the wild to deliver the SmokeLoader malware. The flaw, CVE-2025-0411 (CVSS score: 7.0), allows remote...

North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS
2025-02-04 12:11

The North Korean threat actors behind the Contagious Interview campaign have been observed delivering a collection of Apple macOS malware strains dubbed FERRET as part of a supposed job interview...

Deepfakes and the 2024 US Election
2025-02-04 12:01

Interesting analysis: We analyzed every instance of AI use in elections collected by the WIRED AI Elections Project (source for our analysis), which tracked known uses of AI for creating political...

Cyberattack on NHS causes hospitals to miss cancer care targets
2025-02-04 11:44

Healthcare chiefs say impact will persist for months NHS execs admit that last year's cyberattack on hospitals in Wirral, northwest England, continues to "significantly" impact waiting times for...

Casio UK site compromised, equipped with web skimmer
2025-02-04 11:19

Japanese electronics maker Casio has had its UK website injected with a web skimmer that collected buyers’ personal and payment card information, Jscrambler has discovered. The company says that...

Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look 'insignificant'
2025-02-04 11:00

When cloud customers don't clean up after themselves, part 97 Abandoned AWS S3 buckets could be reused to hijack the global software supply chain in an attack that would make Russia's "SolarWinds...

Watch Out For These 8 Cloud Security Shifts in 2025
2025-02-04 11:00

As cloud security evolves in 2025 and beyond, organizations must adapt to both new and evolving realities, including the increasing reliance on cloud infrastructure for AI-driven workflows and the...

Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
2025-02-04 10:13

A Canadian man has been indicted in federal court in New York for exploiting vulnerabilities in two decentralized finance (DeFi) protocols to fraudulently obtain about $65 million from the...