[ad_1] Feb 10, 2025Ravie LakshmananCybersecurity / Weekly Recap In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucket—each one seems minor until it becomes the entry point for an attack. This week, we’ve seen cybercriminals turn overlooked weaknesses into major…
Category: Cyber News
DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects
[ad_1] Feb 10, 2025Ravie LakshmananMalware / Web Security Threat actors have been observed targeting Internet Information Services (IIS) servers in Asia as part of a search engine optimization (SEO) manipulation campaign designed to install BadIIS malware. “It is likely that the campaign is financially motivated since redirecting users to illegal gambling websites shows that attackers…
Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities
[ad_1] Feb 10, 2025Ravie LakshmananVulnerability / Data Protection Zimbra has released software updates to address critical security flaws in its Collaboration software that, if successfully exploited, could result in information disclosure under certain conditions. The vulnerability, tracked as CVE-2025-25064, carries a CVSS score of 9.8 out of a maximum of 10.0. It has been described…
XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells
[ad_1] Feb 10, 2025Ravie LakshmananVulnerability / Malware Threat actors have been observed exploiting multiple security flaws in various software products, including Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore, to drop reverse shells and web shells, and maintain persistent remote access to compromised systems. The zero-day exploitation of security flaws in VeraCore has been…
Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection
[ad_1] Feb 08, 2025Ravie LakshmananArtificial Intelligence / Supply Chain Security Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an unusual technique of “broken” pickle files to evade detection. “The pickle files extracted from the mentioned PyTorch archives revealed the malicious Python content at the beginning of the file,”…
India’s RBI Introduces Exclusive “bank.in” Domain to Combat Digital Banking Fraud
[ad_1] Feb 07, 2025Ravie LakshmananFinancial Security / Regulatory Compliance India’s central bank, the Reserve Bank of India (RBI), said it’s introducing an exclusive “bank.in” internet domain for banks in the country to combat digital financial fraud. “This initiative aims to reduce cyber security threats and malicious activities like phishing; and, streamline secure financial services, thereby…
DeepSeek App Transmits Sensitive User and Device Data Without Encryption
[ad_1] Feb 07, 2025Ravie LakshmananMobile Security / Artificial Intelligence A new audit of DeepSeek’s mobile app for the Apple iOS operating system has found glaring security issues, the foremost being that it sends sensitive data over the internet sans any encryption, exposing it to interception and manipulation attacks. The assessment comes from NowSecure, which also…
Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks
[ad_1] Feb 07, 2025Ravie LakshmananCloud Security / Web Security Microsoft is warning of an insecure practice wherein software developers are incorporating publicly disclosed ASP.NET machine keys from publicly accessible resources, thereby putting their applications in attackers’ pathway. The tech giant’s threat intelligence team said it observed limited activity in December 2024 that involved an unknown…
CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability
[ad_1] Feb 07, 2025The Hacker NewsVulnerability / Malware The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned that a security flaw impacting Trimble Cityworks GIS-centric asset management software has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0994 (CVSS v4 score: 8.6), a deserialization of untrusted data bug that could…
AI-Powered Social Engineering: Reinvented Threats
[ad_1] The foundations for social engineering attacks – manipulating humans – might not have changed much over the years. It’s the vectors – how these techniques are deployed – that are evolving. And like most industries these days, AI is accelerating its evolution. This article explores how these changes are impacting business, and how cybersecurity…









