OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking
“By exploiting this flaw, attackers can gain unauthorized access to any user’s account within the system, effectively allowing them to impersonate the victim and perform an array of actions on their behalf – including
Hackers Drain Over $85 Million From Crypto Exchange Phemex
Hackers stole more than $85 million in crypto assets from hot wallets at cryptocurrency exchange Phemex.
The post Hackers Drain Over $85 Million From Crypto Exchange Phemex appeared first on SecurityWeek.
NinjaOne to Acquire Dropsuite for $252 Million
Endpoint management and security firm NinjaOne to acquire cloud data backup, archiving, and recovery solutions provider Dropsuite for $252 million.
The post NinjaOne to Acquire Dropsuite for $252 Million appeared first on SecurityWeek.
European Union Sanctions Russian Nationals for Hacking Estonia
The European Union has added three Russian nationals to its sanctions list for their involvement in cyberattacks against Estonia.
The post European Union Sanctions Russian Nationals for Hacking Estonia appeared first on SecurityWeek.
DeepSeek Blames Disruption on Cyberattack as Vulnerabilities Emerge
China’s DeepSeek blamed sign-up disruptions on a cyberattack as researchers started finding vulnerabilities in the R1 AI model.
The post DeepSeek Blames Disruption on Cyberattack as Vulnerabilities Emerge appeared first on SecurityWeek.
ENGlobal Says Personal Information Accessed in Ransomware Attack
ENGlobal has informed the SEC that personal information was compromised in a November 2024 ransomware attack.
The post ENGlobal Says Personal Information Accessed in Ransomware Attack appeared first on SecurityWeek.
SonicWall Confirms Exploitation of New SMA Zero-Day
SonicWall has confirmed that an SMA 1000 zero-day tracked as CVE-2025-23006 has been exploited in the wild.
The post SonicWall Confirms Exploitation of New SMA Zero-Day appeared first on SecurityWeek.
AI SOC Analysts: Propelling SecOps into the future
Security
Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations
“ESXi appliances, which are unmonitored, are increasingly exploited as a persistence mechanism and gateway to access corporate networks widely,” Sygnia
