NsaMag
Menu
  • Home
  • IT Securty News
  • IT Securty Articles
  • Security Magazines
  • About
  • Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

    What’s new: Chinese cyber espionage groups, including Murky Panda, Genesis Panda, and Glacial Panda, have...
  • CISA Issues Draft Software Bill of Materials Guide for Public Comment

    What’s new: CISA has released a draft guide for the Minimum Elements for a Software...
  • Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

    What’s new: A new Linux malware delivery method has been identified, utilizing phishing emails that...
  • GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets

    What’s new: Cybersecurity researchers have identified multiple campaigns exploiting known vulnerabilities, particularly CVE-2024-36401, a critical...
  • Fake Mac fixes trick users into installing new Shamos infostealer

    What’s new: A new infostealer malware named 'Shamos' is targeting Mac devices through ClickFix attacks,...

U.S. Judiciary confirms breach of court electronic records service

August 8, 2025 nsamag Off IT Securty Articles,

What’s new: The U.S. Federal Judiciary has confirmed a cyberattack on its electronic case management...

AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims

August 8, 2025 nsamag Off IT Securty Articles,

What’s new: A new phishing campaign in Brazil is utilizing AI-powered website building tools to...

New EDR killer tool used by eight different ransomware groups

August 7, 2025 nsamag Off IT Securty Articles,

What’s new: A new EDR killer tool, an evolution of 'EDRKillShifter,' has been identified in...

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others

August 7, 2025 nsamag Off IT Securty Articles,

What’s new: The SocGholish malware, also known as FakeUpdates, is being distributed through Traffic Distribution...

Bouygues Telecom confirms data breach impacting 6.4 million customers

August 7, 2025 nsamag Off IT Securty Articles,

What’s new: Bouygues Telecom has confirmed a data breach affecting 6.4 million customers, with personal...

Wave of 150 crypto-draining extensions hits Firefox add-on store

August 7, 2025 nsamag Off IT Securty Articles,

What’s new: A malicious campaign named 'GreedyBear' has infiltrated the Mozilla Firefox add-on store, distributing...

SonicWall finds no SSLVPN zero-day, links ransomware attacks to 2024 flaw

August 7, 2025 nsamag Off IT Securty Articles,

What’s new: SonicWall has confirmed that recent Akira ransomware attacks exploiting Gen 7 firewalls with...

Webinar: How to Stop Python Supply Chain Attacks—and the Expert Tools You Need

August 7, 2025 nsamag Off IT Securty Articles,

What’s new: A webinar has been announced focusing on Python supply chain security, highlighting the...

Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams

August 6, 2025 nsamag Off IT Securty Articles,

What’s new: A report by Infoblox reveals that the malicious ad tech group VexTrio has...

Akira ransomware abuses CPU tuning tool to disable Microsoft Defender

August 6, 2025 nsamag Off IT Securty Articles,

What’s new: Akira ransomware is exploiting the Intel CPU tuning driver 'rwdrv.sys' to disable Microsoft...

Posts pagination

Previous 1 … 6 7 8 9 Next

Popular Programs

Nsauditor Network Security Auditor
Network Security Auditing for possible vulnerabilities.Over 45 net tools.
Nsauditor is an advanced network security scanner for auditing and monitoring network computers for possible vulnerabilities. The software checks network computers using all potential methods that a hacker might use to attack it.
Buy Now | Download | More

Product Key Explorer
Product Key Explorer recovers product keys from local or network computers
Product Key Explorer is a powerful product key find and product key recovery software for over +10000 software. It recovers product keys from local or network computers.
Buy Now | Download | More

LPR Lost Password Recovery
Recover website, email, social media passwords from most popular web browsers
LPR Lost Password Recovery reveals website, email, social media passwords from Google Chrome, Microsoft Edge and Opera browsers, allows to backup to HTML, CSV, TXT file or copy to clipboard. All features are provided with a user friendly interface.
Buy Now | Download | More

Categories

  • Computer Security
  • Internet Security
  • IT Securty Articles
  • IT Securty News
  • Network Securty

Recent Posts

  • Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage
  • CISA Issues Draft Software Bill of Materials Guide for Public Comment
  • Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
  • GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets
  • Fake Mac fixes trick users into installing new Shamos infostealer

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 89 other subscribers

Copyright © 2025 | TechMag designed by Themes4WP