Tuesday , February 25 2025
Microsoft

Microsoft’s Alarming Report: 600 Million Cyberattacks perday

Cybersecurity threats have surged to extraordinary heights, as Microsoft’s latest Digital Defense Report reveals that its customers are confronted with over 600 million cyberattacks every day.

The report highlights that cyber operations play a crucial role in geopolitical conflicts, used for espionage, influence, and destruction. The cooperation between nation-states and cybercriminal gangs contributes to this trend, as they exchange tools and techniques. The report highlights that “nation-state affiliated threat actors demonstrated that cyber operations—whether for espionage, destruction, or influence—play a persistent supporting role in broader geopolitical conflicts.”

Renew Dubai visa within minutes with AI-powered Salama

Residents of Dubai can now easily renew their visas with the new AI-powered digital platform launched by the General Directorate...
Read More
Renew Dubai visa within minutes with AI-powered Salama

CVE-2024-20953
CISA Flags Oracle Agile PLM Actively Exploited Security Flaw

CVE-2024-20953 is a vulnerability in Oracle Agile PLM, a product lifecycle management tool. With a CVSS score of 8.8, it...
Read More
CVE-2024-20953  CISA Flags Oracle Agile PLM Actively Exploited Security Flaw

Stablecoin Bank Hacked – Hackers Stolen $49.5M

Days after the biggest crypto hack ever, another platform has experienced a major exploit. Infini Earn, a decentralized stablecoin bank,...
Read More
Stablecoin Bank Hacked – Hackers Stolen $49.5M

CVE-2025-20029
PoC Exploit Released for F5 BIG-IP Command Injection Vuln

Security researchers have released a proof-of-concept exploit for CVE-2025-20029, a serious command injection vulnerability in F5’s BIG-IP application delivery controllers....
Read More
CVE-2025-20029  PoC Exploit Released for F5 BIG-IP Command Injection Vuln

By 1 April 2025
Australia Bans Kaspersky on its govt systems and devices

On February 21, the Australian Department of Home Affairs issued a directive prohibiting the installation of Kaspersky Lab products and...
Read More
By 1 April 2025  Australia Bans Kaspersky on its govt systems and devices

CISA Flags Craft CMS Code Injection Flaw Amid Active Attacks

CISA has added a serious security flaw in the Craft content management system (CMS) to its Known Exploited Vulnerabilities catalog...
Read More
CISA Flags Craft CMS Code Injection Flaw Amid Active Attacks

B1ack’s Stash Releases 1 Million Credit Cards on a Deep Web Forum

On February 19, 2025, the illegal marketplace B1ack's Stash released over 1 million unique stolen credit and debit card details...
Read More
B1ack’s Stash Releases 1 Million Credit Cards on a Deep Web Forum

Cisco Confirms
Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

Cisco Talos reported that  Salt Typhoon, also known as FamousSparrow and GhostEmperor, has been spying on U.S. telecommunication providers using...
Read More
Cisco Confirms  Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

AWS Key Hunter
Test this free automated tool to hunt for exposed AWS secrets

A free tool is now available to scan public GitHub repositories for exposed AWS credentials. Security engineer Anmol Singh Yadav created...
Read More
AWS Key Hunter  Test this free automated tool to hunt for exposed AWS secrets

Check Point Flaw Used to Deploy ShadowPad and Ransomware

An unknown threat cluster has targeted European healthcare organizations, deploying PlugX and ShadowPad. In some cases, these intrusions resulted in...
Read More
Check Point Flaw Used to Deploy ShadowPad and Ransomware

In the past year, Microsoft has noticed that nation-state actors are increasingly teaming up with cybercriminals for financial gain and intelligence gathering. For example, Russian actors have outsourced some cyberespionage tasks to criminal groups, particularly targeting Ukraine. In June 2024, one group used basic malware to compromise at least 50 Ukrainian military devices.

Other nation-state actors, such as those from Iran and North Korea, have also ramped up their activity. Iran is using ransomware as part of its influence tactics, while North Korea has launched a new ransomware variant called FakePenny, aimed at aerospace and defense sectors.

The report highlights worrying trends in how nation-state actors and cybercriminals are using generative AI for phishing, influence operations, and malware development. They are leveraging AI to more effectively target victims. However, there is a positive aspect: AI also helps cybersecurity professionals respond more quickly to threats.

The report emphasizes the necessity for better cooperation between public and private sectors to combat rising attacks. Microsoft suggests a two-pronged strategy: improving cybersecurity to prevent intrusions and enforcing consequences for harmful actions. This combination of defense and deterrence is crucial for changing the current trend.

“With more than 600 million attacks per day targeting Microsoft customers alone, there must be countervailing pressure to reduce the overall number of attacks online“.

Over 90 Zero-Days, 40+ N-Days Exploited In The Wild

Check Also

1 million

B1ack’s Stash Releases 1 Million Credit Cards on a Deep Web Forum

On February 19, 2025, the illegal marketplace B1ack’s Stash released over 1 million unique stolen …

Leave a Reply

Your email address will not be published. Required fields are marked *