Malware Threat Intelligence5 Min Read February 4, 2026 China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies acr…
3 Min Read February 4, 2026 Orchid Security Introduces Continuous Identity Observability for Enterprise Applications An innovative approach to discovering, analyzing, and governing identity… Identity Security Security Operations
2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw… Open Source Vulnerability
4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile… Cloud Computing Zero Trust
Email Security Ransomware3 Min Read September 26, 2025 Singapore Threatens Meta With Fines Over Facebook Impersonation Scams The Singapore government has given Meta Platforms until September 30 to introduce measures to curb impersonation scams on Facebook. On…
Malware Ransomware Vulnerabilities Windows2 Min Read September 26, 2025 Fortra GoAnywhere Vulnerability Exploited as 0-Day Before Patch A critical, perfect 10.0 CVSS score vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) solution was actively exploited as…
Malware Network Ransomware Vulnerabilities3 Min Read September 26, 2025 Agencies Around the Globe Urge Patching of Cisco ASA Bug Under Active Exploit The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 25-03 in response to an ongoing and severe…
Exploits Zero Trust7 Min Read September 26, 2025 Customer Authentication Challenges That Impact Your Organization’s Security Posture Introduction In today’s cybersecurity landscape, CISOs face the challenge of securing data while managing costs effectively. As cyber…
Data Breach Malware4 Min Read September 26, 2025 New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks The Russian advanced persistent threat (APT) group known as COLDRIVER has been attributed to a fresh round of ClickFix-style attacks designed…
Data Breach ICS/OT Ransomware Supply Chain3 Min Read September 26, 2025 2025 Ransomware Trends: How Australia’s Wealth Makes It a Prime Target Australia’s strong economy and high per-capita wealth have made it a prime target for ransomware groups, with the country facing a…
Network Vulnerabilities1 Min Read September 26, 2025 CISA Emergency Directive 25-03: Identify and Mitigate Potential Compromise of Cisco Devices This page contains a web-friendly version of the Cybersecurity and Infrastructure Security Agency’s Emergency Directive 25-03: Identify…
Enterprise Security Security Validation4 Min Read September 26, 2025 Crash Tests for Security: Why BAS Is Proof of Defense, Not Assumptions Car makers don't trust blueprints. They smash prototypes into walls. Again and again. In controlled conditions. Because design specs don't…
Apple Malware Network Vulnerabilities3 Min Read September 26, 2025 Cisco ASA zero-day vulnerabilities exploited in sophisticated attacks A widespread campaign aimed at breaching organizations via zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) has been…
Malware Network Ransomware Vulnerabilities4 Min Read September 26, 2025 ArcaneDoor Threat Actor Resurfaces in Continued Attacks Against Cisco Firewalls A newly identified cyber-attack campaign has exploited Cisco Adaptive Security Appliance (ASA) devices in a sophisticated operation linked to…
Archer Health Cybersecurity Healthcare Jeremiah Fowler Leaks Misconfiguration Privacy Security2 Min Read September 26, 2025 Archer Health Data Leak Exposes 23GB of Medical Records A large cache of medical and personal information belonging to patients of Archer Health Inc. was left publicly accessible after a database…
Exploits Malware Network Vulnerabilities2 Min Read September 26, 2025 CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild CISA has issued an Emergency Directive mandating immediate action to mitigate two critical zero-day…
Apple Malware Ransomware Vulnerabilities3 Min Read September 26, 2025 Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data In late 2024, a new wave of cyber espionage emerged targeting global telecommunications infrastructure. Operating under the moniker Salt…
Apple Malware Network Vulnerabilities2 Min Read September 26, 2025 UK and US security agencies order urgent fixes as Cisco firewall bugs exploited in wild Cybersecurity agencies on both sides of the Atlantic are sounding the alarm over Cisco firewall vulnerabilities that are being exploited by an…
Exploits Phishing Ransomware3 Min Read September 26, 2025 Interpol Cracks Down on Large-Scale African Scamming Networks A transnational operation involving 14 African countries has taken down a large-scale digital scamming network, leading to 260 arrests and the…
Threat Intelligence Vulnerability2 Min Read September 26, 2025 Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure Cybersecurity company watchTowr Labs has disclosed that it has "credible evidence" of active exploitation of the recently disclosed security…
Supply Chain2 Min Read September 26, 2025 JLR Begins Phased Restart of Operations After Cyber-Attack Jaguar Land Rover (JLR) has begun a phased restart of operations following the devastating cyber-attack which curtailed production activities…
Browser Security Malware2 Min Read September 26, 2025 New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module Cybersecurity researchers have discovered an updated version of a known Apple macOS malware called XCSSET that has been observed in limited…
DDoS Malware Vulnerabilities Windows2 Min Read September 26, 2025 Rack Security Update: High-Severity Flaw Bypasses Parameter Limit, Exposing Apps to DoS Attacks The Rack project, a key Ruby library providing a minimal and modular interface for web application development, has released a update…
Apple Linux Network Vulnerabilities2 Min Read September 26, 2025 Critical Cisco Vulnerability Let Remote Attackers Execute Arbitrary Code on Firewalls and Routers Cisco warns of a Critical remote code execution flaw in web services across multiple Cisco platforms. Tracked as CVE-2025-20363…
Data Breach Malware Ransomware Windows3 Min Read September 26, 2025 New LockBit Ransomware Variant Emerges as Most Dangerous Yet Trend Micro has identified a new LockBit ransomware variant that is “significantly more dangerous” than previous versions and is being…
Network Security Vulnerability4 Min Read September 26, 2025 Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware The U.K. National Cyber Security Centre (NCSC) has revealed that threat actors have exploited the recently disclosed security flaws impacting…
Apple Security2 Min Read September 25, 2025 Microsoft warns of new XCSSET macOS malware variant targeting Xcode devs Microsoft Threat Intelligence reports that a new variant of the XCSSET macOS malware has been detected in limited attacks, incorporating…
Artificial Intelligence Security2 Min Read September 25, 2025 Unofficial Postmark MCP npm silently stole users' emails A npm package copying the official ‘postmark-mcp’ project on GitHub turned bad with the latest update that added a single…
Vulnerability Zero-Day2 Min Read September 25, 2025 Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive Cisco is urging customers to patch two security flaws impacting the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA)…
Security2 Min Read September 25, 2025 Co-op says it lost $107 million after Scattered Spider attack The Co-operative Group in the U.K. released its interim financial results report for the first half of 2025 with a massive loss in operating…
CISO Press Release Report Research4 Min Read September 25, 2025 Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk Austin / TX, United States, September 25th, 2025, CyberNewsWire Living Security, a global leader in Human Risk Management (HRM), today…
Security2 Min Read September 25, 2025 CISA orders agencies to patch Cisco flaws exploited in zero-day attacks CISA has issued a new emergency directive ordering U.S. federal agencies to secure their Cisco firewall devices against two flaws that have…
Malvertising Threat Intelligence3 Min Read September 25, 2025 Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network The threat actor known as Vane Viper has been outed as a purveyor of malicious ad technology (adtech), while relying on a tangled web of shell…
Cofense Copyright Cryptocurrency Cyber Attack Cybersecurity Infostealer Lone None Lone None Stealer Malware Pure Logs Stealer Scam Security Telegram Vietnam2 Min Read September 25, 2025 Vietnamese Hackers Use Fake Copyright Notices to Spread Lone None Stealer A Vietnamese hacking group known as Lone None is running an online scam campaign that has been active since at least November 2024. The…
Security2 Min Read September 25, 2025 Cisco warns of ASA firewall zero-days exploited in attacks Cisco warned customers today to patch two zero-day vulnerabilities that are actively being exploited in attacks and impact the company's…
Security Technology2 Min Read September 25, 2025 Amazon pays $2.5 billion to settle Prime memberships lawsuit Amazon will pay $2.5 billion to settle claims by the U.S. Federal Trade Commission (FTC) that it used dark patterns to trick millions of users…
AI-driven security Continuous Monitoring Critical Infrastructure Featured Offensive Security Ransomware Shinobi Security Supply Chain Varun Uppal Zero Trust3 Min Read September 25, 2025 When Airports Go Dark: What The Weekend’s Cyber-attacks Tell Us About Business Risk Varun Uppal, founder and CEO of Shinobi Security Over the weekend, airports across Europe were thrown into chaos after a cyber-attack on one…
Exploits Ransomware Social Engineering2 Min Read September 25, 2025 Critical Vulnerability in Salesforce AgentForce Exposed A critical vulnerability chain in Salesforce's AI-powered AgentForce platform has been discovered by cybersecurity researchers. The flaw,…
Cryptocurrency Security2 Min Read September 25, 2025 Malicious Rust packages on Crates.io steal crypto wallet keys Two malicious packages with nearly 8,500 downloads in Rust's official crate repository scanned developers' systems to steal cryptocurrency…
Botnets Exploits Malware Vulnerabilities3 Min Read September 25, 2025 Malicious AI Agent Server Reportedly Steals Emails A popular Model Context Protocol (MCP) server used to deploy AI agents has turned malicious in one of its latest updates, according to Koi…
AI Security Vulnerability2 Min Read September 25, 2025 Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection Cybersecurity researchers have disclosed a critical flaw impacting Salesforce Agentforce, a platform for building artificial intelligence (AI)…
AgentForce AI AI agents CRM Cybersecurity ForcedLeak Salesforce Security Vulnerability3 Min Read September 25, 2025 ForcedLeak Flaw in Salesforce Agentforce AI Agent Exposed CRM Data A vulnerability dubbed ForcedLeak was recently discovered in Salesforce Agentforce, an AI-driven system designed to handle complex business…
Uncategorized2 Min Read September 25, 2025 Choosing the Right C3PAO for Your CMMC Level 2 Certification Claire KelleyAXIOTROPSeptember 25, 2025 If you’re aiming for CMMC Level 2 certification, choosing the right C3PAO (Certified Third-Party…
Botnets Malware Phishing Windows2 Min Read September 25, 2025 Phishing Campaign Evolves into PureRAT Deployment, Linked to Vietnamese Threat Actors A recent investigation has revealed a phishing campaign that began with a simple Python-based infostealer but ultimately led to the deployment…
Cryptocurrency Malware5 Min Read September 25, 2025 North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers The North Korea-linked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented…
Phishing Ransomware Windows4 Min Read September 25, 2025 The Threat of Privilege Abuse in Active Directory In early 2024, the BlackCat ransomware attack against Change Healthcare caused massive disruption across the U.S. healthcare sector. It later…