- Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllersby [email protected] (The Hacker News) on January 9, 2025 at 5:29 pm
Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data. “Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create and
- 5 Benefits Of A Malware Sandbox For Business Securityby Balaji N on January 9, 2025 at 5:27 pm
Imagine an employee receiving an email that looks completely legitimate, maybe it’s a fake invoice or a shipping update. They click on the attachment, and just like that, your network could be infected with ransomware, sensitive customer data stolen, or your entire system brought to a halt. It’s a nightmare scenario, but one that happens The post 5 Benefits Of A Malware Sandbox For Business Security appeared first on Cyber Security News.
- Rapid Cyber Incident Response: Why Speed, Quality, and the Right Tools Matterby Kaaviya Ragupathy on January 9, 2025 at 4:48 pm
As you probably know by now, it doesn’t really matter how big in size your business is, you’re going to be up against the risk of cyberattacks in some form or another. These can range in scope and scale with threats such as ransomware and phishing campaigns right through insider threats and advanced persistent attacks. The post Rapid Cyber Incident Response: Why Speed, Quality, and the Right Tools Matter appeared first on Cyber Security News.
- Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplaceby Kaaviya Ragupathy on January 9, 2025 at 4:32 pm
Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has launched its Criminal IP Malicious Link Detector add-in on the Microsoft Marketplace. This cutting-edge tool provides real-time phishing email detection and URL blocking for Microsoft Outlook, adding an essential layer of email security in the face of increasing cyber threats. Generative AI advancements The post Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace appeared first on Cyber Security News.
- New AI Challenges Will Test CISOs & Their Teams in 2025by Josh Lemos on January 9, 2025 at 3:00 pm
CISOs need to recognize the new threats AI can present — while also embracing AI-powered solutions to stay ahead of those threats.
- Green Bay Packers Store Hacked: Thousands of Customers’ Credit Card Data Stolenby Guru Baran on January 9, 2025 at 2:54 pm
The Green Bay Packers organization has disclosed a data breach affecting thousands of customers who made purchases on their official online store, packersproshop. The incident, attributed to malicious code planted by an unauthorized third party, compromised sensitive customer information, including credit card details. On October 23, 2024, the Packers were alerted to the presence of The post Green Bay Packers Store Hacked: Thousands of Customers’ Credit Card Data Stolen appeared first on Cyber Security News.
- 4000 Backdoors Hijacked By Exploiting Expired Domains & Infrastructreby Guru Baran on January 9, 2025 at 2:35 pm
The researchers exploited a novel attack vector by hijacking abandoned backdoors within other backdoors, which relied on expired or abandoned infrastructure, such as expired domains. By acquiring these domains, the researchers gained access to thousands of compromised systems, including those belonging to governments (Bangladesh, China, Nigeria), universities (Thailand, China, South Korea), and other entities. This The post 4000 Backdoors Hijacked By Exploiting Expired Domains & Infrastructre appeared first on Cyber Security News.
- Hackers Targeting Users Who Lodged Complaints On Government Portal To Steal Credit Card Databy Guru Baran on January 9, 2025 at 2:09 pm
Attackers have evolved a sophisticated social engineering scheme to target Middle Eastern banking consumers by posing as government officials and utilizing remote access software to obtain OTP numbers and credit card information. The fraud primarily targets those who have previously filed commercial complaints with the government services portal, either via its website or mobile app, The post Hackers Targeting Users Who Lodged Complaints On Government Portal To Steal Credit Card Data appeared first on Cyber Security News.
- New NonEuclid RAT Bypassing Antivirus And Encrypts Critical Filesby Guru Baran on January 9, 2025 at 2:01 pm
The NonEuclid Remote Access Trojan (RAT), a highly sophisticated malware, has been detected, allowing unauthorized remote access via advanced evasion techniques and ransomware encryption of crucial files. This RAT was created in C# and is optimized for the.NET Framework 4.8. Its limited security checks make it more challenging for security systems to identify and interrupt The post New NonEuclid RAT Bypassing Antivirus And Encrypts Critical Files appeared first on Cyber Security News.
- New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryptionby [email protected] (The Hacker News) on January 9, 2025 at 1:40 pm
Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer. “Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple’s XProtect,” Check Point Research said in a new analysis shared with The Hacker News. “This development allows it to
- Kerio Control Firewall Vulnerability Allows 1-Click Remote Code Executionby Guru Baran on January 9, 2025 at 1:37 pm
A critical vulnerability in Kerio Control, a popular firewall and Unified Threat Management (UTM) product, has been discovered that could allow attackers to execute remote code with a single click. The flaw, identified as CVE-2024-52875, affects versions 9.2.5 through 9.4.5 of the software, potentially impacting thousands of installations worldwide. Security researcher Egidio Romano uncovered multiple The post Kerio Control Firewall Vulnerability Allows 1-Click Remote Code Execution appeared first on Cyber Security News.
- Product Walkthrough: How Reco Discovers Shadow AI in SaaSby [email protected] (The Hacker News) on January 9, 2025 at 11:55 am
As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has emerged in the world of AI: shadow AI. Shadow AI refers to the unauthorized use of AI tools and copilots at organizations. For example, a developer using ChatGPT to assist with writing code, a salesperson downloading an AI-powered meeting transcription tool, or a
- Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millionsby [email protected] (The Hacker News) on January 9, 2025 at 10:44 am
Ransomware isn’t slowing down—it’s getting smarter. Encryption, designed to keep our online lives secure, is now being weaponized by cybercriminals to hide malware, steal data, and avoid detection.The result? A 10.3% surge in encrypted attacks over the past year and some of the most shocking ransom payouts in history, including a $75 million ransom in 2024. Are you prepared to fight back? Join
- MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japanby [email protected] (The Hacker News) on January 9, 2025 at 10:44 am
Japan’s National Police Agency (NPA) and National Center of Incident Readiness and Strategy for Cybersecurity (NCSC) accused a China-linked threat actor named MirrorFace of orchestrating a persistent attack campaign targeting organizations, businesses, and individuals in the country since 2019. The primary objective of the attack campaign is to steal information related to Japan’s national
- 20 Best Threat Hunting Tools – 2025by Cyber Writes Team on January 9, 2025 at 10:38 am
Threat hunting Tools are essential for undetected cybersecurity threats hiding in the network, databases, and endpoints. The approach requires researching deeply into the environment to locate malicious activity. To prevent these types of attacks, threat hunting is crucial. Attackers or hackers can remain undetected in a network for months, stealthily accumulating login credentials and other The post 20 Best Threat Hunting Tools – 2025 appeared first on Cyber Security News.
- Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injectionby [email protected] (The Hacker News) on January 9, 2025 at 9:35 am
Threat actors are attempting to take advantage of a recently disclosed security flaw impacting GFI KerioControl firewalls that, if successfully exploited, could allow malicious actors to achieve remote code execution (RCE). The vulnerability in question, CVE-2024-52875, refers to a carriage return line feed (CRLF) injection attack, paving the way for HTTP response splitting, which could then
- PoC Exploit Released For Apache Struts Remote Code Execution Vulnerabilityby Guru Baran on January 9, 2025 at 9:22 am
A proof-of-concept (PoC) exploit for the critical Apache Struts vulnerability, CVE-2024-53677, has been publicly released, raising alarm across the cybersecurity community. This vulnerability, which scores a 9.5 on the CVSS scale, allows attackers to execute arbitrary code remotely by exploiting flaws in the framework’s file upload mechanism. The vulnerability affects Apache Struts versions 2.0.0 through The post PoC Exploit Released For Apache Struts Remote Code Execution Vulnerability appeared first on Cyber Security News.
Cybersecurity News
About Author
Chad Barr
Chad Barr is a visionary and executive leader, blending over two decades of expertise with a unique ability to demystify complex technical concepts. As a cybersecurity leader, prolific author, and director at AccessIT Group, Chad has empowered organizations across diverse industries to build resilient security frameworks. His engaging writing, speaking engagements, and thought leadership inspire proactive cybersecurity practices, making him a trusted voice in the ever-evolving digital landscape.
My Books
Cybersecurity News
- Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllersby [email protected] (The Hacker News) on January 9, 2025 at 5:29 pm
Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data. “Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create and
- 5 Benefits Of A Malware Sandbox For Business Securityby Balaji N on January 9, 2025 at 5:27 pm
Imagine an employee receiving an email that looks completely legitimate, maybe it’s a fake invoice or a shipping update. They click on the attachment, and just like that, your network could be infected with ransomware, sensitive customer data stolen, or your entire system brought to a halt. It’s a nightmare scenario, but one that happens The post 5 Benefits Of A Malware Sandbox For Business Security appeared first on Cyber Security News.
- Rapid Cyber Incident Response: Why Speed, Quality, and the Right Tools Matterby Kaaviya Ragupathy on January 9, 2025 at 4:48 pm
As you probably know by now, it doesn’t really matter how big in size your business is, you’re going to be up against the risk of cyberattacks in some form or another. These can range in scope and scale with threats such as ransomware and phishing campaigns right through insider threats and advanced persistent attacks. The post Rapid Cyber Incident Response: Why Speed, Quality, and the Right Tools Matter appeared first on Cyber Security News.
- Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplaceby Kaaviya Ragupathy on January 9, 2025 at 4:32 pm
Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has launched its Criminal IP Malicious Link Detector add-in on the Microsoft Marketplace. This cutting-edge tool provides real-time phishing email detection and URL blocking for Microsoft Outlook, adding an essential layer of email security in the face of increasing cyber threats. Generative AI advancements The post Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace appeared first on Cyber Security News.
- New AI Challenges Will Test CISOs & Their Teams in 2025by Josh Lemos on January 9, 2025 at 3:00 pm
CISOs need to recognize the new threats AI can present — while also embracing AI-powered solutions to stay ahead of those threats.