Aggregator
CVE-2022-38472 | Mozilla Firefox up to 103 XSLT Error clickjacking (Bug 1769155)
CVE-2022-38472 | Mozilla Thunderbird up to 102.1 XSLT Error clickjacking (Bug 1769155)
CVE-2022-43271 | Inhabit Move CRM 4 Build 260 User Profile cross site scripting
ICICI Bank Ransomware Breach: A Stark Reminder of Supply Chain Risk and the Need for Real-Time Cyber Vigilance
The recent ransomware breach tied to ICICI Bank—claimed by the LockBit group—has raised fresh concerns about the fragility of digital ecosystems and third-party risk. While official confirmations remain limited, leaked files and dark web chatter suggest that attackers accessed systems through a vendor relationship and exfiltrated over 3 TB of sensitive data, including customer records
The post ICICI Bank Ransomware Breach: A Stark Reminder of Supply Chain Risk and the Need for Real-Time Cyber Vigilance appeared first on Seceon Inc.
The post ICICI Bank Ransomware Breach: A Stark Reminder of Supply Chain Risk and the Need for Real-Time Cyber Vigilance appeared first on Security Boulevard.
The TraderTraitor Crypto Heist: Nation-State Tactics Meet Financial Cybercrime
The cryptocurrency sector has always been a magnet for cybercriminals, but the TraderTraitor campaign marks a different kind of threat—one backed by state-sponsored actors with long-term goals and surgical precision. Allegedly linked to North Korea’s Lazarus Group, this campaign wasn’t just about breaking into wallets. It was about exploiting trust, manipulating human behavior, and moving
The post The TraderTraitor Crypto Heist: Nation-State Tactics Meet Financial Cybercrime appeared first on Seceon Inc.
The post The TraderTraitor Crypto Heist: Nation-State Tactics Meet Financial Cybercrime appeared first on Security Boulevard.
Apache security advisory (AV25-213)
How and Why Threat Hunting Teams Investigate Linux Malware Attacks
Linux cyber threats are less widespread than Windows ones yet it can make them even more dangerous. Underestimated and under-anticipated, they stab endpoints and networks in the back, bringing operational disruption and financial loss. It’s true that individual desktop users are less targeted by Linux-specific malware, than that tailored for Windows systems. Although they still […]
The post How and Why Threat Hunting Teams Investigate Linux Malware Attacks appeared first on Cyber Security News.
CVE-2024-20768 | Adobe Experience Manager cross site scripting (APSB24-05)
CVE-2024-26126 | Adobe Experience Manager input validation (APSB24-05)
CVE-2024-26127 | Adobe Experience Manager input validation (APSB24-05)
CVE-2024-20745 | Adobe Premiere Pro heap-based overflow (APSB24-12)
CVE-2024-20746 | Adobe Premiere Pro out-of-bounds write (APSB24-15)
CVE-2024-26051 | Adobe Experience Manager cross site scripting (APSB24-05)
The Smishing Triad Surge: Text-Based Threats Are Getting Smarter, Not Simpler
What began as a trickle of spammy messages has evolved into a sophisticated and dangerous phishing campaign. The Smishing Triad, an active cybercriminal group, is behind a surge of SMS-based phishing attacks (smishing) targeting organizations across sectors—from healthcare to logistics to finance. Their focus? Gaining access to internal portals and enterprise email accounts by exploiting
The post The Smishing Triad Surge: Text-Based Threats Are Getting Smarter, Not Simpler appeared first on Seceon Inc.
The post The Smishing Triad Surge: Text-Based Threats Are Getting Smarter, Not Simpler appeared first on Security Boulevard.
The Salt Typhoon Telecom Breach: When Network Access Becomes National Exposure
The recent Salt Typhoon breach targeting telecom infrastructure isn’t just another headline—it’s a warning shot to every service provider that uptime and connectivity aren’t enough. This sophisticated campaign, attributed to Chinese state-sponsored actors, illustrates how telecom networks are now being leveraged not just for disruption but for surveillance, espionage, and long-term data access. What makes
The post The Salt Typhoon Telecom Breach: When Network Access Becomes National Exposure appeared first on Seceon Inc.
The post The Salt Typhoon Telecom Breach: When Network Access Becomes National Exposure appeared first on Security Boulevard.