DDoS Malware Nation-state Ransomware4 Min Read September 24, 2025 Geopolitical Cyber Threats in 2024: Navigating Emerging Risks with OSINT (Open-Source Intelligence) Geopolitical tensions worldwide can have a foreseeable impact on an organisation’s physical operations, but they can also heighten the…
Email Security Nation-state Vulnerabilities2 Min Read September 24, 2025 Libraesva ESG zero-day vulnerability exploited by attackers (CVE-2025-59689) Suspected state-sponsored attackers have exploited a zero-day vulnerability (CVE-2025-59689) in the Libraesva Email Security Gateway (ESG),…
Nation-state2 Min Read September 24, 2025 Cell Tower Hacking Gear Seized Ahead of UN General Assembly The US Secret Service has found and dismantled a network of electronic devices that could be used to shut down the cellular network in New…
Malware Nation-state Network Ransomware2 Min Read September 24, 2025 Cisco Uncovers New PlugX Backdoor Linked to Chinese APTs Researchers at Cisco Talos have uncovered a long-running espionage campaign active since 2022, targeting the telecommunications and…
Email Security Nation-state Vulnerabilities2 Min Read September 23, 2025 Libraesva ESG Vulnerability Let Attackers Inject Malicious Commands A critical security flaw in Libraesva ESG email security gateways has been identified and patched, allowing threat actors to execute arbitrary…
Exploits Nation-state Ransomware Vulnerabilities3 Min Read September 20, 2025 Why “Time to Patch” Is the Cybersecurity KPI That Matters Most The way your organization manages its risk tolerance and regulatory factors are key performance indicators (KPIs) for assessing your…
Exploits Nation-state Ransomware Vulnerabilities4 Min Read September 19, 2025 How the U.S. Can Strengthen Its Cyber Defenses Against Nation-State Threats The American power grid is not just the backbone of modern life. It’s a high-value target in our new era of geopolitical conflict. As…
Apple Linux Nation-state Vulnerabilities2 Min Read September 17, 2025 CVE-2025-43300: Apple’s Critical Zero-Day ImageIO Vulnerability IntroductionSecurity researchers and Apple users alike are on high alert following the discovery and active exploitation of…