• Book Dewayne Hart
  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
  • Speaker Bio
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
Facebook-f Linkedin-in Youtube X-twitter Globe
Order books

Month: March 2025

CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection

Posted on March 30, 2025 by admin

[ad_1] Mar 28, 2025Ravie LakshmananEndpoint Security / Threat Intelligence Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that’s designed to download and execute secondary payloads. The malware, according to Zscaler ThreatLabz, shares behavioral similarities with another known malware loader known as SmokeLoader. “The purpose of the malware is to download and…

Read more

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

Posted on March 30, 2025 by admin

[ad_1] Mar 29, 2025Ravie LakshmananCybercrime / Vulnerability In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus operandi in the process. Resecurity said it identified a security vulnerability in the data leak site (DLS) operated…

Read more

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

Posted on March 30, 2025 by admin

[ad_1] Mar 30, 2025Ravie LakshmananVulnerability / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation activity targeting a now-patched security flaw in Ivanti Connect Secure (ICS) appliances. “RESURGE contains capabilities of the SPAWNCHIMERA malware variant, including surviving reboots;…

Read more

New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials

Posted on March 30, 2025 by admin

[ad_1] Mar 29, 2025Ravie LakshmananThreat Intelligence / Mobile Security Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that’s primarily designed to target users in Spain and Turkey. “Crocodilus enters the scene not as a simple clone, but as a fully-fledged threat from the outset, equipped with modern techniques such as remote control,…

Read more

Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA

Posted on March 29, 2025 by admin

[ad_1] Mar 28, 2025Ravie LakshmananOperational Technology / Vulnerability Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt, and SMA, that could be exploited by a bad actor to seize control of devices or execute code remotely, posing severe risks to electrical grids. The vulnerabilities have been collectively…

Read more

How Datto BCDR Delivers Unstoppable Business Continuity

Posted on March 28, 2025 by admin

[ad_1] Long gone are the days when a simple backup in a data center was enough to keep a business secure. While backups store information, they do not guarantee business continuity during a crisis. With IT disasters far too common and downtime burning through budgets, modern IT environments require solutions that go beyond storage and…

Read more

PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps

Posted on March 28, 2025 by admin

[ad_1] Mar 28, 2025Ravie LakshmananSpyware / Malware An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign likely aimed at users in Taiwan under the guise of chat apps. “PJobRAT can steal SMS messages, phone contacts, device and app information, documents, and media files from infected Android devices,”…

Read more

Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts

Posted on March 28, 2025 by admin

[ad_1] Mar 28, 2025Ravie LakshmananCryptocurrency / Developer Security Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked to siphon sensitive information such as environment variables from compromised systems. “Some of these packages have lived on npmjs.com for over 9 years, and provide legitimate functionality to blockchain developers,” Sonatype researcher…

Read more

NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systems

Posted on March 27, 2025 by admin

[ad_1] Mar 27, 2025Ravie LakshmananVulnerability / Enterprise Security A critical security flaw has been disclosed in NetApp SnapCenter that, if successfully exploited, could allow privilege escalation. SnapCenter is an enterprise-focused software that’s used to manage data protection across applications, databases, virtual machines, and file systems, offering the ability to backup, restore, and clone data resources….

Read more

New Report Explains Why CASB Solutions Fail to Address Shadow SaaS and How to Fix It

Posted on March 27, 2025 by admin

[ad_1] Mar 27, 2025The Hacker NewsBrowser Security / Data Protection Whether it’s CRMs, project management tools, payment processors, or lead management tools – your workforce is using SaaS applications by the pound. Organizations often rely on traditional CASB solutions for protecting against malicious access and data exfiltration, but these fall short for protecting against shadow…

Read more

Posts pagination

  • 1
  • 2
  • 3
  • 4
  • …
  • 14
  • Next

Recent Posts

  • Proactive Protection Wins: What Real-World Breaches Teach Leaders
  • CTEM vs ASM vs Vulnerability Management: What Security Leaders Need to Know in 2025
  • Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors
  • Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code
  • Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms

Recent Comments

No comments to show.

Archives

  • February 2026
  • July 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023

Categories

  • Cyber News
  • Uncategorized

Book Dewayne Hart for your next event

  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
Facebook-f Linkedin-in Youtube X-twitter Globe
© 2025 Dewayne Hart | Cybersecurity Leadership & Innovation