Akira
You must login to view this content
You must login to view this content
You must login to view this content
A sophisticated malware campaign leveraging search engine optimization (SEO) poisoning on Microsoft Bing has emerged, delivering the notorious Bumblebee malware to unsuspecting users. The campaign, identified in May 2025, specifically targets users searching for specialized software tools, demonstrating a concerning evolution in malware distribution tactics that exploits trusted search engine results. Bumblebee, a downloader malware […]
The post Threat Actors Deliver Bumblebee Malware Poisoning Bing SEO appeared first on Cyber Security News.
Adidas Korea has announced a security breach affecting customer data, marking the second major incident in the fashion industry targeting Korean consumers this month. The sportswear giant revealed that unauthorized access was gained through a third-party customer service provider, compromising customers’ personal information who had contacted their service centers. On May 16, Adidas disclosed on […]
The post Adidas Data Breach – Customers’ Personal Information Exposed appeared first on Cyber Security News.
CISA released thirteen Industrial Control Systems (ICS) advisories on May 20, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
The phishing attack landscape continues to evolve in 2025, with cybercriminals using more sophisticated techniques to bypass security measures, emphasizing the need for phishing attack prevention. Phishing remains one of the most prevalent and damaging cyber threats facing organizations worldwide. In the fourth quarter of 2024 alone, nearly a million phishing attacks were observed, showing […]
The post Phishing Attack Prevention – Best Practices for 2025 appeared first on Cyber Security News.
Outpost24 announced the addition of AI-enhanced summaries to the Digital Risk Protection (DRP) modules within its External Attack Surface Management (EASM) platform. With Outpost24’s DRP modules, organizations are able to identify, monitor, and protect against threats before they can be exploited. DRP’s threat intelligence provides continuous scans for exposed credentials, brand impersonations, data leaks and more. While this is all valuable information to have, these DRP findings can be challenging and time-consuming for security teams … More →
The post Outpost24 simplifies threat analysis with AI-enhanced summaries appeared first on Help Net Security.
A suspected initial access broker has been leveraging trojanized versions of the open-source KeePass password manager to set the stage for ransomware attacks, WithSecure researchers have discovered. KeeLoader: Passoword manager that acts as data stealer and malware loader In February 2025, WithSecure’s inicident responders were hired by an European IT service provider to help with response and remediation after a ransomware gang encrypted their VMware ESXi servers’ datastores. While the attack itself was relatively typical, … More →
The post Trojanized KeePass opens doors for ransomware attackers appeared first on Help Net Security.