Hackers claim to breach Russian state agency managing property, land records
Summary: A hacker group named Silent Crow has claimed responsibility for breaching the Russian government agency Rosreestr, leaking sensitive personal data of Russian citizens. The incident raises concerns about the security of government databases amidst ongoing cyber conflicts involving Russian and Ukrainian entities.

Threat Actor: Silent Crow | Silent Crow Victim: Rosreestr | Rosreestr

Key Point :

Silent Crow publicly released a portion of a database containing personal information of Russian citizens.…
Read More
Some Winston-Salem city services knocked offline by cyberattack
Summary: A cyberattack on Winston-Salem, North Carolina, has disabled online utility bill payments, prompting city officials to take certain systems offline while they investigate the incident. Despite the disruption, officials assure residents that there will be no service interruptions or late fees during this period.

Threat Actor: Unknown | unknown Victim: Winston-Salem, NC | Winston-Salem, NC

Key Point :

City officials confirmed the cyberattack on December 30, following issues discovered one day after Christmas.…
Read More
Product Review: How Reco Discovers Shadow AI in SaaS
Summary: The rise of shadow AI poses significant security risks as employees use unauthorized AI tools without IT oversight, potentially exposing sensitive company data. Reco offers a solution to detect and manage these shadow AI applications within organizations.

Threat Actor: Shadow AI Users | shadow AI users Victim: Organizations | organizations

Key Point :

Shadow AI refers to unauthorized use of AI tools within organizations, increasing data security risks.…
Read More
Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions
Summary: Ransomware attacks are increasingly sophisticated, with a notable rise in encrypted attacks and significant ransom demands. Join an informative session to learn strategies for combating these evolving threats.

Threat Actor: Cybercriminals | cybercriminals Victim: Organizations | organizations

Key Point :

10.3% increase in encrypted attacks over the past year.…
Read More

The curated list of free cybersecurity courses includes essential topics such as ‘Introduction to Cybersecurity,’ which lays the groundwork for understanding digital security threats. For those looking to deepen their knowledge, ‘Cybersecurity Essentials’ and ‘Networking Essentials’ provide critical insights into protective measures and network configurations. Advanced courses like ‘Ethical Hacking Essentials’ and ‘Digital Forensics Essentials’ equip learners with practical skills to combat cyber threats and investigate incidents.…

Read More
CVE-2025-0282: Ivanti Connect Secure Zero-Day Vulnerability Exploited In The Wild
Ivanti has disclosed two critical vulnerabilities in its Connect Secure, Policy Secure, and Neurons for ZTA gateway devices, including one actively exploited zero-day vulnerability. The vulnerabilities, CVE-2025-0282 and CVE-2025-0283, pose serious risks, with the former allowing remote code execution and the latter enabling privilege escalation. Users are urged to apply patches immediately.…
Read More
Trend Micro and Intel Innovate to Weed Out Covert Threats
Summary: Trend Micro and Intel have announced a collaboration aimed at enhancing cybersecurity for enterprise customers by integrating advanced threat detection technologies to combat fileless malware and ransomware. This partnership will be showcased at CES 2025, emphasizing proactive security measures against sophisticated cyber threats.

Threat Actor: Malicious Actors | malicious actors Victim: Enterprises | enterprises

Key Point :

Collaboration combines Trend Micro’s AI-powered security with Intel’s Threat Detection Technology for enhanced protection.…
Read More
Trend Micro and Intel Innovate to Weed Out Covert Threats
Summary: CrowdStrike has achieved FedRAMP authorization for three key modules of its Falcon cybersecurity platform, enabling government entities to enhance their security posture in compliance with federal regulations. This authorization allows for improved threat detection and response capabilities across various environments, addressing the sophisticated cyber threats faced by U.S.…
Read More
Ivanti warns hackers are exploiting new vulnerability
Summary: Ivanti has reported that multiple customers are affected by a new vulnerability, CVE-2025-0282, which is currently being exploited by hackers. The vulnerabilities impact several Ivanti products widely used by government agencies and a patch is available for some of the affected systems.

Threat Actor: Unknown | unknown Victim: Ivanti customers | Ivanti customers

Key Point :

Two vulnerabilities, CVE-2025-0282 and CVE-2025-0283, have been identified in Ivanti’s products.…
Read More
Data of more than 8,500 customers breached on Green Bay Packers shopping website
Summary: The Green Bay Packers reported a data breach involving their online store, where hackers inserted malicious code to steal customer payment information. An investigation revealed that 8,514 customers were impacted, with sensitive data potentially compromised during specific dates in September and October 2024.

Threat Actor: Unknown | unknown Victim: Green Bay Packers | Green Bay Packers

Key Point :

Malicious code allowed unauthorized access to customer payment information during checkout.…
Read More
Lawmakers expected to revive attempts for a Cyber Force study
Summary: House lawmakers are advocating for an independent assessment on the establishment of a Cyber Force as a potential new military branch dedicated to digital warfare. Rep. Morgan Luttrell emphasizes the need for this evaluation despite previous legislative setbacks.

Threat Actor: U.S. Military | U.S. Military Victim: National Defense | National Defense

Key Point :

Rep.…
Read More
Education software firm’s hack exposes personal data for students, teachers nationwide
Summary: An education software company, PowerSchool, which manages data for over 60 million K-12 students and teachers, reported a cybersecurity breach involving unauthorized access to its customer portal. The company has taken measures to secure the data and engaged cybersecurity experts to address the incident.

Threat Actor: Unknown | unknown Victim: PowerSchool | PowerSchool

Key Point :

PowerSchool experienced unauthorized access to its customer portal, PowerSource, on December 28.…
Read More
Court orders European Commission to pay its first-ever GDPR fine
Summary: The European General Court has fined the European Commission for breaching EU data privacy rules by transferring a German citizen’s personal data to the U.S. without adequate protections. This ruling marks a significant precedent in enforcing the General Data Privacy Regulation (GDPR).

Threat Actor: European Commission | European Commission Victim: German citizen | German citizen

Key Point :

The court fined the European Commission €400 for violating GDPR.…
Read More
Russian internet provider confirms its network was ‘destroyed’ following attack claimed by Ukrainian hackers
Summary: Russian internet provider Nodex experienced a significant cyberattack, believed to have originated from Ukraine, which severely disrupted its network infrastructure. The hacker group Ukrainian Cyber Alliance claimed responsibility, stating they exfiltrated data and left the company’s systems compromised.

Threat Actor: Ukrainian Cyber Alliance | Ukrainian Cyber Alliance Victim: Nodex | Nodex

Key Point :

Nodex’s network was reportedly “destroyed” in a planned cyberattack.…
Read More
UN aviation agency ICAO confirms its recruitment database was hacked
Summary: The International Civil Aviation Organization (ICAO) has confirmed a cyberattack on its recruitment systems, compromising over 40,000 records containing personal information. The incident is linked to a threat actor known as Natohub, who has previously claimed access to sensitive data from other organizations.

Threat Actor: Natohub | Natohub Victim: International Civil Aviation Organization | International Civil Aviation Organization

Key Point :

ICAO confirmed the breach involved approximately 42,000 recruitment application data records from April 2016 to July 2024.…
Read More

Summary: The video discusses how Backstage addresses organizational challenges by providing a streamlined catalog for managing and locating resources. It emphasizes the importance of software templates for creating new resources and maintaining document accessibility while preventing loss through effective indexing.

Keypoints:

Backstage offers a catalog that consolidates all resources in a repository.…
Read More