Aggregator
Fraudsters behind €460 million crypto scam arrested in Spain
Spanish authorities arrested five members of a criminal network responsible for laundering €460 million stolen through global cryptocurrency investment fraud schemes. Source: Europol The operation, led by the Guardia Civil with support from Europol and law enforcement in Estonia, France, and the United States, uncovered that more than 5,000 victims worldwide were defrauded. The action day led to: 5 arrests (3 on the Canary Islands and 2 in Madrid), and 5 searches (3 on the … More →
The post Fraudsters behind €460 million crypto scam arrested in Spain appeared first on Help Net Security.
CVE-2025-32897
CVE-2025-53392
Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects
Weekly Threat Landscape Digest – Week 26
This week’s cyber threat landscape reveals a surge in zero-day exploit activity, advanced phishing schemes, and the active targeting of […]
The post Weekly Threat Landscape Digest – Week 26 appeared first on HawkEye.
服务器 GPU 配备太多的显存会导致 Linux 系统休眠出现问题
Iranian Cyber Threats Persist Despite Ceasefire, US Intelligence Warns
2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability
Over 2,100 vulnerable Citrix NetScaler servers remain exposed to active exploitation, despite patches being available for critical vulnerabilities that allow attackers to bypass authentication mechanisms and steal session tokens. Cybersecurity firm ReliaQuest has issued warnings about active exploitation of two critical vulnerabilities affecting Citrix NetScaler ADC and NetScaler Gateway systems. The vulnerabilities, tracked as CVE-2025-5777 […]
The post 2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability appeared first on Cyber Security News.
Food Retailer Ahold Delhaize Discloses Data Breach Impacting 2.2 Million
Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows
A sophisticated new phishing campaign has emerged, leveraging obsolete Windows file formats and advanced evasion techniques to distribute the notorious Remcos Remote Access Trojan. The attack chain employs DBatLoader as its primary delivery mechanism, utilizing a combination of User Account Control bypass methods, obfuscated scripts, and Living Off the Land Binaries abuse to establish persistent […]
The post Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows appeared first on Cyber Security News.
开打开打!一个能打的都没有!
AI-Themed SEO Poisoning Attacks Spread Info, Crypto Stealers
Alleged Sale of Access to an Unidentified Major Indian Telecom Provider
Fedora 44 不会停止支持 32 位
Telegram против фейков: мессенджер начал помечать ложь без ведома авторов каналов
Sysdig Extends AI Agent Reach Across Portfolio
Sysdig has fully integrated an artificial intelligence (AI) agent across its cloud native application protection platform (CNAPP) to both identify and explain threats, along with remediation suggestions.
The post Sysdig Extends AI Agent Reach Across Portfolio appeared first on Security Boulevard.
Akira
You must login to view this content