Aggregator
Adidas Data Breach – Customers’ Personal Information Exposed
Adidas Korea has announced a security breach affecting customer data, marking the second major incident in the fashion industry targeting Korean consumers this month. The sportswear giant revealed that unauthorized access was gained through a third-party customer service provider, compromising customers’ personal information who had contacted their service centers. On May 16, Adidas disclosed on […]
The post Adidas Data Breach – Customers’ Personal Information Exposed appeared first on Cyber Security News.
CISA Releases Thirteen Industrial Control Systems Advisories
CISA released thirteen Industrial Control Systems (ICS) advisories on May 20, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-140-01 ABUP IoT Cloud Platform
- ICSA-25-140-02 National Instruments Circuit Design Suite
- ICSA-25-140-03 Danfoss AK-SM 8xxA Series
- ICSA-25-140-04 Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products
- ICSA-25-140-05 Siemens Siveillance Video
- ICSA-25-140-06 Schneider Electric PrismaSeT Active - Wireless Panel Server
- ICSA-25-140-07 Schneider Electric Galaxy VS, Galaxy VL, Galaxy VXL
- ICSA-25-140-08 Schneider Electric Modicon Controllers
- ICSA-25-140-09 AutomationDirect MB-Gateway
- ICSA-25-140-10 Vertiv Liebert RDU101 and UNITY
- ICSA-25-140-11 Assured Telematics Inc (ATI) Fleet Management System with Geotab Integration
- ICSA-25-037-01 Schneider Electric EcoStruxure Power Monitoring Expert (PME) (Update B)
- ICSA-25-023-05 Schneider Electric EcoStruxure Power Build Rapsody (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
NIST Moonlight Data Will Help Satellites Get a More Accurate Look at Earth
Mounting GenAI Cyber Risks Spur Investment in AI Security
Compromised RVTools Installer Spreading Bumblebee Malware
Пока весь мир страдает от нехватки медиков, в Тайване за них уже дежурят роботы
Phishing Attack Prevention – Best Practices for 2025
The phishing attack landscape continues to evolve in 2025, with cybercriminals using more sophisticated techniques to bypass security measures, emphasizing the need for phishing attack prevention. Phishing remains one of the most prevalent and damaging cyber threats facing organizations worldwide. In the fourth quarter of 2024 alone, nearly a million phishing attacks were observed, showing […]
The post Phishing Attack Prevention – Best Practices for 2025 appeared first on Cyber Security News.
Outpost24 simplifies threat analysis with AI-enhanced summaries
Outpost24 announced the addition of AI-enhanced summaries to the Digital Risk Protection (DRP) modules within its External Attack Surface Management (EASM) platform. With Outpost24’s DRP modules, organizations are able to identify, monitor, and protect against threats before they can be exploited. DRP’s threat intelligence provides continuous scans for exposed credentials, brand impersonations, data leaks and more. While this is all valuable information to have, these DRP findings can be challenging and time-consuming for security teams … More →
The post Outpost24 simplifies threat analysis with AI-enhanced summaries appeared first on Help Net Security.
Trojanized KeePass opens doors for ransomware attackers
A suspected initial access broker has been leveraging trojanized versions of the open-source KeePass password manager to set the stage for ransomware attacks, WithSecure researchers have discovered. KeeLoader: Passoword manager that acts as data stealer and malware loader In February 2025, WithSecure’s inicident responders were hired by an European IT service provider to help with response and remediation after a ransomware gang encrypted their VMware ESXi servers’ datastores. While the attack itself was relatively typical, … More →
The post Trojanized KeePass opens doors for ransomware attackers appeared first on Help Net Security.
Обычная команда INFO в Redis — и вся внутренняя сеть стала криптофермой злоумышленников
【安全圈】CISA最近将Chrome漏洞标记为被积极利用
【安全圈】勒索软件团伙越来越多地使用Skitnet剥削后恶意软件
【安全圈】黑客在Pwn2Own柏林大赛中利用28个零日漏洞斩获107万美元奖金
【安全圈】"RedisRaider"加密劫持攻击威胁全球Redis服务器安全
The Crowded Battle: Key Insights from the 2025 State of Pentesting Report
‘Whatever we did was not enough’: How Salt Typhoon slipped through the government’s blind spots
Seven sources tell CyberScoop that a lack of coordination and miscommunication between federal agencies and the telecommunications industry left critical networks exposed to the Chinese hacking group.
The post ‘Whatever we did was not enough’: How Salt Typhoon slipped through the government’s blind spots appeared first on CyberScoop.