Cryptocurrency Supply Chain Attack4 Min Read March 24, 2026 Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data. The act…
8 Min Read March 24, 2026 5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents On February 25, 2026, Gartner published its inaugural Market Guide for… Enterprise Security Threat Intelligence
4 Min Read March 24, 2026 TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials Two more GitHub Actions workflows have become the latest to be… DevSecOps Vulnerability
4 Min Read March 24, 2026 The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills Cybersecurity has changed fast. Roles are more specialized, and… Network Security Security Operations
Microsoft2 Min Read August 29, 2025 Microsoft says recent Windows update didn't kill your SSD Microsoft has found no link between the August 2025 KB5063878 security update and customer reports of failure and data corruption issues…
Malware Threat Intelligence2 Min Read August 29, 2025 Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication Amazon on Friday said it flagged and disrupted what it described as an opportunistic watering hole campaign orchestrated by the Russia-linked…
Cyber Espionage Malware4 Min Read August 29, 2025 Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an…
Phishing Ransomware4 Min Read August 29, 2025 Reduce Fraud Risk with Effective Identity Verification In a world where transactions occur smoothly across borders and platforms, the need for robust fraud and risk management strategies…
Malware3 Min Read August 29, 2025 Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware A threat actor released malicious updates on the npm package repository for components of a tool popular among developers intending to steal…
Malware Ransomware Vulnerabilities Windows3 Min Read August 29, 2025 State-Sponsored Hackers Behind Majority of Vulnerability Exploits The majority (53%) of attributed vulnerability exploits in the first half 2025 were conducted by state-sponsored actors for strategic,…
Artificial Intelligence Enterprise Security4 Min Read August 29, 2025 Can Your Security Stack See ChatGPT? Why Network Visibility Matters Generative AI platforms like ChatGPT, Gemini, Copilot, and Claude are increasingly common in organizations. While these solutions improve…
Enterprise Security Vulnerability2 Min Read August 29, 2025 Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page Click Studios, the developer of enterprise-focused password management solution Passwordstate, said it has released security updates to…
Vulnerability Zero-Day2 Min Read August 29, 2025 FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available The Sangoma FreePBX Security Team has issued an advisory warning about an actively exploited FreePBX zero-day vulnerability that impacts…
Cryptocurrency Cybercrime3 Min Read August 29, 2025 Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain Authorities from the Netherlands and the United States have announced the dismantling of an illicit marketplace called VerifTools that peddled…
Data Breach Ransomware2 Min Read August 29, 2025 TransUnion Data Breach Impacts 4.5 Million US Customers Credit rating giant TransUnion has suffered a data breach, which has impacted the personal information of nearly 4.5 million Americans. The…
Data Breach2 Min Read August 29, 2025 Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations Google has revealed that the recent wave of attacks targeting Salesforce instances via Salesloft Drift is much broader in scope than…
Malware3 Min Read August 29, 2025 TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies Cybersecurity researchers have discovered a cybercrime campaign that’s using malvertising tricks to direct victims to fraudulent sites…
Security2 Min Read August 28, 2025 Google warns Salesloft breach impacted some Workspace accounts Google now reports that the Salesloft Drift breach is larger than initially thought, warning that attackers also used stolen OAuth tokens to…
Android Apple Cloud Security Identity and Access Management Linux Ransomware Spotlight Vulnerability Management Windows5 Min Read August 28, 2025 Innovator Spotlight: ManageEngine Unifying IT Management and Security with ManageEngine In today’s digital landscape, IT can feel like juggling flaming torches, one…
Vulnerabilities2 Min Read August 28, 2025 CISA Adds Citrix and Git Flaws to KEV Catalogue Amid Active Exploitation CISA has added three actively exploited vulnerabilities in Citrix and Git to its KEV Catalogue. Federal agencies must patch the flaws by…
Cryptocurrency Legal2 Min Read August 28, 2025 US targets North Korean IT worker army with new sanctions The U.S. Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned two individuals and two companies associated with…
Google2 Min Read August 28, 2025 Google shares workarounds for auth failures on ChromeOS devices Google is working to resolve authentication issues affecting some ChromeOS devices, which are preventing affected users from signing into…
Malware Ransomware3 Min Read August 28, 2025 Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names Cybersecurity researchers have discovered a loophole in the Visual Studio Code Marketplace that allows threat actors to reuse names of…
Artificial Intelligence Security3 Min Read August 28, 2025 Malware devs abuse Anthropic’s Claude AI to build ransomware Anthropic’s Claude Code large language model has been abused by threat actors who used it in data extortion campaigns and to develop…
Microsoft2 Min Read August 28, 2025 Microsoft Word will save your files to the cloud by default Microsoft says that Word for Windows will soon enable autosave and automatically save all new documents to the cloud by default. The…
Ransomware Vulnerabilities Windows2 Min Read August 28, 2025 BadSuccessor Post-Patch: Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory Microsoft’s recent patch for the BadSuccessor vulnerability (CVE-2025-53779) has successfully closed the direct privilege escalation…
Security2 Min Read August 28, 2025 Passwordstate dev urges users to patch auth bypass vulnerability Click Studios, the company behind the Passwordstate enterprise-grade password manager, has warned customers to patch a high-severity…
Ransomware Vulnerabilities2 Min Read August 28, 2025 Urgent CISA Alert on Citrix NetScaler In August 2025, the Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert regarding multiple critical security…
Legal Security2 Min Read August 28, 2025 Police seize VerifTools fake ID marketplace servers, domains The FBI and the Dutch Police have shut down the VerifTools marketplace for fraudulent identity documents after seizing servers in…
DDoS Network Vulnerabilities2 Min Read August 28, 2025 Cisco Nexus 3000 and 9000 Series Vulnerability Let Attackers Trigger DoS Attack Cisco has issued a High-severity security advisory alerting customers to a critical vulnerability in the Intermediate System-to-Intermediate…
Security2 Min Read August 28, 2025 MATLAB dev says ransomware gang stole data of 10,000 people MathWorks, a leading developer of mathematical simulation and computing software, revealed that a ransomware gang stole the data of over…
Ransomware5 Min Read August 28, 2025 With Ransomware Attacks Surging, Eliminate Silos and Tap Genai to Strengthen Threat Intelligence After a brief lull in ransomware attacks following the LockBit disruption earlier this year, ransomware attacks spiked again in the…
Malware Phishing Ransomware Vulnerabilities Windows2 Min Read August 28, 2025 Fake IT Support Attacks Hit Microsoft Teams A new wave of phishing attacks abusing Microsoft Teams to deliver malware has been uncovered by security researchers. The campaigns, observed…
Security1 Min Read August 28, 2025 Shadow IT Is Expanding Your Attack Surface. Here’s Proof Shadow IT – the systems your security team doesn’t know about – is a persistent challenge. Policies may ban them, but…
Network Phishing Vulnerabilities3 Min Read August 28, 2025 Cisco IMC Virtual Keyboard Video Monitor Let Attacker Direct User to Malicious Website Cisco disclosed a high-severity open redirect vulnerability in the Virtual Keyboard Video Monitor (vKVM) component of its Integrated…
Security2 Min Read August 28, 2025 TransUnion suffers data breach impacting over 4.4 million people Update: Story updated with confirmation that this was another Salesforce data theft attack and the types of data stolen. Consumer credit…
Cyber Espionage Network Security4 Min Read August 28, 2025 Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide The China-linked advanced persistent threat (APT) actor known as Salt Typhoon has continued its attacks targeting networks across the world,…
Network2 Min Read August 28, 2025 Netherlands Confirms China's Salt Typhoon Targeted Small Dutch Telcos Dutch intelligence agencies have revealed that the Chinese hacking group Salt Typhoon targeted organizations in the Netherlands. In a joint…
Malware Phishing Vulnerabilities Windows3 Min Read August 28, 2025 ShadowSilk Leveraging Penetration-Testing Tools, Public Exploits to Attack Organizations ShadowSilk first surfaced in late 2023 as a sophisticated threat cluster targeting government entities across Central Asia and the broader…
Network Ransomware Vulnerabilities3 Min Read August 28, 2025 UK and US Blame Three Chinese Tech Firms for Global Cyberattacks A coalition of international cybersecurity agencies led by the UK’s National Cyber Security Centre (NCSC) has publicly linked three…
DDoS Ransomware Vulnerabilities2 Min Read August 28, 2025 Thousands of Citrix NetScaler boxes still sitting ducks despite patches Thousands of Citrix NetScaler appliances remain exposed to a trio of security flaws that the vendor patched this week, one of which is already…
Ransomware4 Min Read August 28, 2025 You Can’t Protect What You Can’t See A business ecosystem is a borderless entity. Where organizations operate across vast, global networks, achieving a comprehensive view of their…
Malware Ransomware Windows2 Min Read August 28, 2025 Malicious VS Code Extensions Exploit Name Reuse Loophole A new campaign involving malicious Visual Studio Code (VS Code) extensions has exposed a loophole in the VS Code Marketplace that allows…
Apple Linux Vulnerabilities Windows2 Min Read August 28, 2025 Google Big Sleep AI Tool Finds Critical Chrome Vulnerability Google has patched a critical graphics library vulnerability in the Chrome browser, discovered by its AI-powered detection tool, Google Big…
Cloud Security Vulnerabilities2 Min Read August 28, 2025 Cloudflare Launches MCP Server Portals – A Unified Gateway to All MCP Servers Cloudflare today launched MCP Server Portals in open beta, a groundbreaking capability designed to centralize, secure, and observe all Model…
Data Breach Ransomware2 Min Read August 28, 2025 Nevada Confirms Ransomware Attack, State Data Stolen A security incident impacting the state of Nevada has been confirmed to be a ransomware attack. Nevada’s chief information officer (CIO)…