Tag: EN

Critical WatchGuard Firebox Vulnerability Exploited in Attacks

Tracked as CVE-2025-9242 (CVSS score of 9.3), the flaw leads to unauthenticated, remote code execution on vulnerable firewalls. The post Critical WatchGuard Firebox Vulnerability Exploited in Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Rhadamanthys infostealer operation disrupted by law enforcement

The rumors were true: Operation Endgame, a joint effort between law enforcement and judicial authorities of several European countries, Australia, Canada, the UK and the US, has disrupted the infrastructure supporting the operation of the Rhadamanthys infostealer. “Between 10 and…

Unleashing the Kraken ransomware group

In August 2025, Cisco Talos observed big-game hunting and double extortion attacks carried out by Kraken, a Russian-speaking group that has emerged from the remnants of the HelloKitty ransomware cartel. This article has been indexed from Cisco Talos Blog Read…

Ex-Twitter Boss Agrawal’s AI Start-Up Raises $100m

Parallel Web Systems, led by former Twitter chief Parag Agrawal, raises $100m to help make web content more accessible for AI scraping This article has been indexed from Silicon UK Read the original article: Ex-Twitter Boss Agrawal’s AI Start-Up Raises…

Operation Endgame 3.0 – 2,046,030 breached accounts

Between 10 and 13 November 2025, the latest phase of Operation Endgame was coordinated from Europol’s headquarters in The Hague. The actions targeted one of the biggest infostealer Rhadamanthys, the Remote Access Trojan VenomRAT, and the botnet Elysium, all of…

Kibana Vulnerabilities Expose Systems to SSRF and XSS Attacks

Elastic has released a security advisory addressing an origin validation error in Kibana that could expose systems to Server-Side Request Forgery (SSRF) attacks. The vulnerability, tracked as CVE-2025-37734, affects multiple versions of the popular data visualization and exploration platform and has prompted…

Beyond Passwords: How Behaviour and Devices Shape Stronger Logins

Discover how behaviour, devices, and adaptive authentication systems create smarter, stronger, and more secure logins for modern enterprises. The post Beyond Passwords: How Behaviour and Devices Shape Stronger Logins appeared first on Security Boulevard. This article has been indexed from…