![]() |
Description: Organizations across industries are experiencing significant escalations in cyberattacks, particularly targeting critical infrastructure providers and cloud-based enterprises. Verizon’s recently released 2025 Data Breach Investigations Report found an 18% YoY increase in confirmed breaches, with the exploitation of vulnerabilities as an initial access step growing by 34%.
As attacks rise
May 14th, 2025 (about 1 month ago)
|
![]() |
Description: A cyber espionage group known as Earth Ammit has been linked to two related but distinct campaigns from 2023 to 2024 targeting various entities in Taiwan and South Korea, including military, satellite, heavy industry, media, technology, software services, and healthcare sectors.
Cybersecurity firm Trend Micro said the first wave, codenamed VENOM, mainly targeted software service providers, while
May 14th, 2025 (about 1 month ago)
|
![]() |
Description: A sweeping new study by Citizen Lab and Princeton University reveals that nearly half of the most popular Android apps on Xiaomi's Mi Store use insecure, proprietary cryptographic protocols instead of industry-standard TLS, exposing users to surveillance and data theft. Xiaomi Mi Store falls short under scrutiny The project, dubbed WireWatch, analyzed 1,699 Android apps …
The post Xiaomi Store Apps Use Weak Home-Rolled Encryption Enabling Surveillance appeared first on CyberInsider.
May 14th, 2025 (about 1 month ago)
|
![]() |
Description: A new DarkCloud Stealer campaign is using AutoIt obfuscation for malware delivery. The attack chain involves phishing emails, RAR files and multistage payloads.
The post DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoIt appeared first on Unit 42.
May 14th, 2025 (about 1 month ago)
|
![]() |
May 14th, 2025 (about 1 month ago)
|
![]() |
Description: A team of white-hat researchers from PCAutomotive demonstrated a chilling remote attack chain against the 2020 Nissan LEAF, converting the popular electric vehicle into a remotely controllable surveillance device with near-total access to its internal systems. Presented at Black Hat Asia 2025, their 118-slide technical walkthrough shows how attackers could track, spy on, and even …
The post Nissan LEAF Remotely Hacked via Bluetooth and DNS Attack appeared first on CyberInsider.
May 14th, 2025 (about 1 month ago)
|
![]() |
🚨 Marked as known exploited on May 14th, 2025 (about 1 month ago).
Description: Microsoft on Tuesday shipped fixes to address a total of 78 security flaws across its software lineup, including a set of five zero-days that have come under active exploitation in the wild.
Of the 78 flaws resolved by the tech giant, 11 are rated Critical, 66 are rated Important, and one is rated Low in severity. Twenty-eight of these vulnerabilities lead to remote code execution, 21 of them
May 14th, 2025 (about 1 month ago)
|
![]() |
Description: CMIC CMO Co Ltd is a company that operates in the Drug Stores & Pharmacies industry. It employs 250to499 people and has 25Mto50M of revenue. The company is headquartered in Shimada, Shizuoka, Japan.
May 14th, 2025 (about 1 month ago)
|
![]() |
May 14th, 2025 (about 1 month ago)
|
![]() |
Description: DeVita & Associates, Inc. ( founded in 1984) provides a full range of mechanical, electrical, and structural engineering services, including specialized structural precast design and detailing. DeVita & Associates corporate office is located in 1150 E Washington St, Greenville, South Carolina, 29601, United States and has 114 employees. The total amount of data leakage is 618.40 GB
May 14th, 2025 (about 1 month ago)
|