Aggregator
Fake CAPTCHA Attacks Emerge as Key Entry Point for LummaStealer Malware Campaigns
LummaStealer, a notorious information-stealing malware, has made a significant comeback following a major law enforcement disruption in 2025. This resurgence is characterized by a shift in distribution tactics, moving away from traditional exploit kits towards aggressive social engineering campaigns. Cybercriminals are now leveraging “ClickFix” techniques, which present users with fake CAPTCHA verification pages. These deceptive […]
The post Fake CAPTCHA Attacks Emerge as Key Entry Point for LummaStealer Malware Campaigns appeared first on Cyber Security News.
春节防“锁”指南:360安全智能体精准狙击,守护企业核心数据
每周勒索威胁摘要
从制度到技术:领军网安企业的数据安全治理实践
金融机构泄露客户敏感数据,被罚超1200万元
叮!请接收 MiSRC 马年限定红包封面~
惠普推出游戏笔记本订阅服务
Time to Exploit Plummets as N-Day Flaws Dominate
Эпоха «золотых антилоп» закончилась. Теперь не айтишники выбирают работу, а работа — их (и очень неохотно)
The FBI Recovered “Deleted” Nest Cam Footage — Here’s Why Every CISO Should Panic
The Nancy Guthrie case reveals data retention issues in cloud technology, as investigators recovered footage from a Google Nest camera that should have been deleted, emphasizing the need for stronger cybersecurity measures for IoT devices
The post The FBI Recovered “Deleted” Nest Cam Footage — Here’s Why Every CISO Should Panic appeared first on Security Boulevard.
Senegalese Data Breaches Expose Lack of Security Maturity
The Significance of Passwordless Authentication and eKYC in Simplifying Cross-Border Banking Onboarding
Explore how passwordless authentication and eKYC simplify cross-border banking onboarding by enhancing security, compliance, and user experience.
The post The Significance of Passwordless Authentication and eKYC in Simplifying Cross-Border Banking Onboarding appeared first on Security Boulevard.
Microsoft Outlook Add-in Stolen 4,000 Microsoft account Credentials and Credit Card Numbers
Security researchers have identified the first documented instance of a malicious Microsoft Outlook add-in being used against users in real-world scenarios. A compromised meeting scheduler named AgreeTo was used to steal over 4,000 Microsoft account credentials, credit card numbers, and answers to banking security questions. AgreeTo began as a legitimate open-source project published to the Microsoft Office […]
The post Microsoft Outlook Add-in Stolen 4,000 Microsoft account Credentials and Credit Card Numbers appeared first on Cyber Security News.
Promptware – Hackers Can Use Google Calendar Invites to Stream Victims’ Cameras via Zoom
A new and dangerous class of cyberattack called “Promptware” has been discovered, capable of turning your personal AI assistant into a sleeper agent that spies on you. Security researchers from Ben-Gurion University, Tel Aviv University, and Harvard have demonstrated a terrifying exploit in which a simple Google Calendar invite can trick Google’s Gemini assistant into […]
The post Promptware – Hackers Can Use Google Calendar Invites to Stream Victims’ Cameras via Zoom appeared first on Cyber Security News.
OpenVPN releases version 2.7.0 with expanded protocol and platform updates
OpenVPN version 2.7.0 is now available. The update advances support for multi-address server configurations and updates client functionality across operating systems. The release includes enhancements in data channel handling and support for evolving kernel and cryptographic components. Server enhancements Version 2.7.0 adds multi-socket support for server instances. This allows servers to manage multiple addresses, ports, and protocols from a single process. The change aims to simplify configurations where services listen on more than one interface … More →
The post OpenVPN releases version 2.7.0 with expanded protocol and platform updates appeared first on Help Net Security.