- Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploitby info@thehackernews.com (The Hacker News) (The Hacker News) on April 11, 2025 at 5:55 pm
Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used to breach the devices was patched. The attackers are believed to have leveraged known and now-patched security flaws, including, but not limited to, CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762. "A threat actor used a known
- Financial Fraud, With a Third-Party Twist, Dominates Cyber Claimsby Robert Lemos, Contributing Writer (darkreading) on April 11, 2025 at 5:15 pm
The most damaging attacks continue to be ransomware, but financial fraud claims are more numerous — and both are driven by increasing third-party breaches.
- Using Third-Party ID Providers Without Losing Zero Trustby Stephanie Domas (darkreading) on April 11, 2025 at 2:00 pm
With $4.4 billion in worldwide data breach fines in 2024, the cost of not knowing who's walking into your systems is devastating.
- Organizations Lack Incident Response Plans, But Answers Are on the Wayby Arielle Waldman (darkreading) on April 11, 2025 at 1:45 pm
Developing strong incident response plans remains an area that requires significant improvement. Here are some shortcomings and how to address them.
- Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectorsby info@thehackernews.com (The Hacker News) (The Hacker News) on April 11, 2025 at 1:09 pm
The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul. The activity, which took place between July and December 2024, singled out organizations in the mass media, telecommunications, construction, government entities, and energy sectors, Kaspersky said in a new report published Thursday. Paper Werewolf, also known
- 10 Bugs Found in Perplexity AI's Chatbot Android Appby Nate Nelson, Contributing Writer (darkreading) on April 11, 2025 at 1:00 pm
Researchers characterize the company's artificial intelligence chatbot as less secure than ChatGPT and even DeepSeek.
- Hackers accessed 150,000 emails from a government agencyby algerj@bnpmedia.com (Jordyn Alger) (Cybersecurity News) on April 11, 2025 at 12:00 pm
The United States Treasury Department’s Office of the Comptroller of the Currency (OCC) has recently discovered an email system breach.
- Initial Access Brokers Shift Tactics, Selling More for Lessby info@thehackernews.com (The Hacker News) (The Hacker News) on April 11, 2025 at 10:30 am
What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that access to other cybercriminals. This division of labor allows IABs to concentrate on their core expertise: exploiting vulnerabilities through methods like social engineering and brute-force attacks. By selling access, they significantly mitigate the
- Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gatewaysby info@thehackernews.com (The Hacker News) (The Hacker News) on April 11, 2025 at 8:53 am
Palo Alto Networks has revealed that it's observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after threat hunters warned of a surge in suspicious login scanning activity targeting its appliances. "Our teams are observing evidence of activity consistent with password-related attacks, such as brute-force login attempts, which does not indicate exploitation of a
- SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Appsby info@thehackernews.com (The Hacker News) (The Hacker News) on April 11, 2025 at 8:13 am
Cybersecurity researchers have found that threat actors are setting up deceptive websites hosted on newly registered domains to deliver a known Android malware called SpyNote. These bogus websites masquerade as Google Play Store install pages for apps like the Chrome web browser, indicating an attempt to deceive unsuspecting users into installing the malware instead. "The threat actor utilized a
- OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitationby info@thehackernews.com (The Hacker News) (The Hacker News) on April 11, 2025 at 4:58 am
A newly disclosed high-severity security flaw impacting OttoKit (formerly SureTriggers) has come under active exploitation within a few hours of public disclosure. The vulnerability, tracked as CVE-2025-3102 (CVSS score: 8.1), is an authorization bypass bug that could permit an attacker to create administrator accounts under certain conditions and take control of susceptible websites. "The
- Zero-Day in CentreStack File-Sharing Platform Under Attackby Rob Wright (darkreading) on April 10, 2025 at 9:15 pm
Gladinet's platform is widely used among managed service providers, and a critical deserialization flaw could put MSP customers in jeopardy.
- AuthZEN Aims to Harmonize Fractured Authorization Controlsby Robert Lemos, Contributing Writer (darkreading) on April 10, 2025 at 8:41 pm
Managing permissions and authorizations across dozens or hundreds of cloud services and platforms poses significant headaches for companies. An open specification aims to change that.
- Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Boardby (darkreading) on April 10, 2025 at 7:45 pm
- Digital Asset Management Platform Liminal Raises $4.7M Funding Led by Elevation Capitalby (darkreading) on April 10, 2025 at 7:40 pm