Artificial Intelligence Security Operations4 Min Read October 21, 2025 Securing AI to Benefit from AI Artificial intelligence (AI) holds tremendous promise for improving cyber defense and making the lives of security practitioners easier. It can help teams…
3 Min Read October 21, 2025 Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers A new malware attributed to the Russia-linked hacking group known as… Cyber Espionage Threat Intelligence
2 Min Read October 21, 2025 Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network A European telecommunications organization is said to have been targeted… Cyber Espionage Network Security
2 Min Read October 20, 2025 Five New Exploited Bugs Land in CISA's Catalog — Oracle and Microsoft Among Targets The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on… Data Security Threat Intelligence
Data Breach Ransomware3 Min Read October 13, 2025 FBI and French Police Shutter BreachForums Domain Again The FBI and French investigators have seized at least one domain for a popular cybercrime forum being used as a leak site in connection with…
Financial Security Malware2 Min Read October 13, 2025 Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs GitHub as a backbone…
Ransomware Windows Security2 Min Read October 13, 2025 New Rust-Based Malware "ChaosBot" Uses Discord Channels to Control Victims' PCs Cybersecurity researchers have disclosed details of a new Rust-based backdoor called ChaosBot that can allow operators to conduct…
Threat Intelligence Vulnerability1 Min Read October 12, 2025 New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login Oracle on Saturday issued a security alert warning of a fresh security flaw impacting its E-Business Suite that it said could allow…
Uncategorized3 Min Read October 12, 2025 Is CMMC 3.0 on the Horizon? How Defense Contractors Can Prepare Now The Department of Defense recently sent defense contractors a clear signal: an update to the recently finalized CMMC 2.0 is likely coming and…
Security2 Min Read October 12, 2025 Fake 'Inflation Refund' texts target New Yorkers in new scam An ongoing smishing campaign is targeting New Yorkers with text messages posing as the Department of Taxation and Finance, claiming to offer…
Data Breach Exploits Supply Chain Vulnerabilities2 Min Read October 12, 2025 Critical Vulnerability CVE-2025-61884 Found in Oracle E-Business Suite Oracle E-Business Suite (EBS) — a cornerstone ERP platform for countless enterprises across the globe — faces a critical security…
Insider Threats Malware Mobile Security4 Min Read October 12, 2025 In Defense of Good Bots: Good Bots Exist, But Only When We Build Them That Way The word “bot” doesn’t have the best reputation right now. You hear it and think of election manipulation, fake social media…
Data Breach Exploits Vulnerabilities1 Min Read October 12, 2025 Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884) Oracle has revealed the existence of yet another remotely exploitable Oracle E-Business Suite vulnerability (CVE-2025-61884). About…
Data Breach Phishing Ransomware Vulnerabilities7 Min Read October 12, 2025 Week in review: Hackers extorting Salesforce, CentreStack 0-day exploited Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How to get better results from…
Legal Security2 Min Read October 11, 2025 Spain dismantles “GXC Team” cybercrime syndicate, arrests leader Spanish Guardia Civil have dismantled the “GXC Team” cybercrime operation and arrested its alleged leader, a 25-year-old…
Cloud Security Network Security2 Min Read October 11, 2025 Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts Cybersecurity company Huntress on Friday warned of "widespread compromise" of SonicWall SSL VPN devices to access multiple customer…
Network Security Vulnerability3 Min Read October 11, 2025 Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks Threat actors are abusing Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in connection with ransomware…
Data Breach Phishing Ransomware Vulnerabilities4 Min Read October 11, 2025 Identity Risk Intelligence – The Missing Piece in Continuous Threat Exposure Management (CTEM) In today’s cybersecurity landscape, identity is no longer just a credentialing concern; it is the battleground. Modern cyber defenses…
DDoS Malware Phishing Vulnerabilities2 Min Read October 11, 2025 Two 7-Zip Flaws Allow Code Execution via Malicious ZIP Files (CVE-2025-11001 & CVE-2025-11002) The Zero Day Initiative (ZDI) has published details of two critical in the popular open-source compression utility 7-Zip, which could allow…
Supply Chain Vulnerabilities2 Min Read October 11, 2025 China Launches Antitrust Probe into Qualcomm Over Autotalks Acquisition Failure to File Declaration China’s State Administration for Market Regulation (SAMR) recently announced the launch of an antitrust investigation into U.S.…
DDoS Network Vulnerabilities Web Security2 Min Read October 11, 2025 Juniper Junos Space October 2025 Vulnerability Fixes On October 9, 2025, Juniper Networks rolled out Junos Space 24.1R4 Patch V1, a broad security update tackling more than 200 vulnerabilities…
Microsoft2 Min Read October 10, 2025 Windows 11 23H2 Home and Pro reach end of support in 30 days Microsoft has reminded customers again today that systems running Home and Pro editions of Windows 11 23H2 will stop receiving security…
Security2 Min Read October 10, 2025 Hackers exploiting zero-day in Gladinet file sharing software Threat actors are exploiting a zero-day vulnerability (CVE-2025-11371) in Gladinet CentreStack and Triofox products, which allows a local…
Security2 Min Read October 10, 2025 Cybersecurity For Dummies, 3rd Edition eBook FREE for a Limited Time In today's hyper-connected world, cyber threats are more sophisticated and frequent than ever - ransomware attacks, data breaches, social…
Malware Ransomware Vulnerabilities Windows3 Min Read October 10, 2025 Ransomware crims that exploited SharePoint 0-days add Velociraptor to their arsenal The ransomware gang caught exploiting Microsoft SharePoint zero-days over the summer has added a new tool to its arsenal: Velociraptor, an…
Google2 Min Read October 10, 2025 Google Chrome to revoke notification access for inactive sites Google is updating the Chrome web browser to automatically revoke notification permissions for websites that haven't been visited recently, to…
Security2 Min Read October 10, 2025 Apple now offers $2 million for zero-click RCE vulnerabilities Apple is announcing a major expansion and redesign of its bug bounty program, doubling maximum payouts, adding new research categories,…
Vulnerabilities Web Security7 Min Read October 10, 2025 Security risks of vibe coding and LLM assistants for developers Although the benefits of AI assistants in the workplace remain debatable, where they’re being adopted most confidently of all is in…
Exploits Malware Network Vulnerabilities3 Min Read October 10, 2025 Auth Bypass Flaw in Service Finder WordPress Plugin Under Active Exploit Website owners using the Service Finder WordPress theme and its bundled Bookings plugin must update their software immediately, as a serious…
Exploits Network Ransomware Vulnerabilities2 Min Read October 10, 2025 Zero-day in file-sharing software leads to RCE, and attacks are ongoing Security research firm Huntress is warning all users of Gladinet's CentreStack and Triofox file-sharing tools to urgently apply an available…
Malware Ransomware Vulnerabilities Windows2 Min Read October 10, 2025 Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances to deploy Akira…
Microsoft2 Min Read October 10, 2025 Copilot on Windows can now connect to email, create Office docs Microsoft has upgraded its AI-powered Copilot digital assistant to generate Office documents and to connect to Outlook and Gmail email…
Data Theft Ransomware2 Min Read October 10, 2025 Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js' Single Executable…
DDoS Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 Pro-Russia hacktivist group dies of cringe after falling into researchers' trap Security researchers say they duped pro-Russia cybercriminals into targeting a fake critical infrastructure organization, which the crew later…
SaaS Security Threat Intelligence1 Min Read October 10, 2025 Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries A threat actor known as Storm-2657 has been observed hijacking employee accounts with the end goal of diverting salary payments to…
DDoS Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive IoT-focused botnets in operation, targeting a wide…
Malware Phishing Ransomware Vulnerabilities5 Min Read October 10, 2025 How Chief Technology Officers Can Stay Ahead of Complex Threat Actor Tactics Cyberattacks are becoming increasingly complex because organizations are more interconnected than ever before while threat actors are better…
Network Security Vulnerability2 Min Read October 10, 2025 From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer…
Phishing2 Min Read October 10, 2025 Google Launches AI Bug Bounty with $30,000 Top Reward Google has launched a new AI Vulnerability Reward Program (VRP), which is offering base rewards of up to $30,000 for bugs identified in the…
Artificial Intelligence Threat Detection4 Min Read October 10, 2025 The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart? The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and velocity, a new…
Cybercrime Malware3 Min Read October 10, 2025 175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to facilitate credential…
Network Vulnerabilities2 Min Read October 10, 2025 Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371) CVE-2025-11371, a unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and Triofox file-sharing and remote access…
Data Breach Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 Google: Clop Accessed “Significant Amount” of Data in Oracle EBS Exploit The Clop ransomware group likely began targeting Oracle E-Business Suite (EBS) instances as early as August 9, successfully exfiltrating a…
Vulnerability Zero-Day1 Min Read October 10, 2025 From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security flaw impacting Gladinet…
Malware Phishing Ransomware Windows4 Min Read October 10, 2025 ‘Payroll Pirate’ Attacks Target U.S. Universities, Diverting Employee Salaries Microsoft Threat Intelligence has revealed a spate of financially motivated cyberattacks against universities across the United States. The…
Legal Security3 Min Read October 10, 2025 FBI takes down BreachForums portal used for Salesforce extortion The FBI has seized last night all domains for the BreachForums hacking forum operated by the ShinyHunters group mostly as a portal for leaking…