Cryptocurrency Supply Chain Attack4 Min Read March 24, 2026 Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data. The act…
8 Min Read March 24, 2026 5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents On February 25, 2026, Gartner published its inaugural Market Guide for… Enterprise Security Threat Intelligence
4 Min Read March 24, 2026 TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials Two more GitHub Actions workflows have become the latest to be… DevSecOps Vulnerability
4 Min Read March 24, 2026 The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills Cybersecurity has changed fast. Roles are more specialized, and… Network Security Security Operations
Cloud Security3 Min Read August 28, 2025 Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec Picture this: Your team rolls out some new code, thinking everything’s fine. But hidden in there is a tiny flaw that explodes into a…
Malware Phishing Ransomware Vulnerabilities Windows3 Min Read August 28, 2025 When Best Practices Aren’t Enough: UK Breaches Underscore the Importance of Compromise Assessments Despite extensive guidance from national authorities, several prominent UK organizations have recently suffered significant cyber attacks.…
Business Continuity5 Min Read August 28, 2025 Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them Every day, businesses, teams, and project managers trust platforms like Trello, Asana, etc., to collaborate and manage tasks. But what happens…
Vulnerabilities3 Min Read August 28, 2025 Vulnerabilities in OpenSolution QuickCMS software CVE ID CVE-2025-54540 Publication date 28 August 2025 Vendor OpenSolution Product QuickCMS Vulnerable versions 6.8 Vulnerability type (CWE)…
Cloud Security5 Min Read August 28, 2025 Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials The maintainers of the nx build system have alerted users to a supply chain attack that allowed attackers to publish malicious versions of the…
Apple Network Phishing Vulnerabilities3 Min Read August 28, 2025 Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns The UK, US and partners from across the globe have released a new report on the notorious Chinese APT group Salt Typhoon, claiming it has…
Apple Linux Malware Network Vulnerabilities3 Min Read August 28, 2025 CISA Publish Hunting and Mitigation Guide to Defend Networks from Chinese State-Sponsored Actors The U.S. Cybersecurity and Infrastructure Security Agency (CISA), alongside the NSA, FBI, and a broad coalition of international partners, has…
DDoS Network Ransomware Vulnerabilities2 Min Read August 28, 2025 Cisco Warns of High-Severity DoS Flaw (CVE-2025-20241) in Nexus Switches Ddos August 28, 2025 Cisco Systems has published a security advisory detailing a high-severity denial-of-service (DoS) vulnerability affecting…
Apple Linux Network3 Min Read August 28, 2025 Chinese State Hackers Target Global Critical Infrastructure, NSA Warns A coalition of cybersecurity and intelligence agencies from across the globe, including the United States National Security Agency (NSA), has…
Uncategorized2 Min Read August 28, 2025 Crypto Companies Freeze $47m in Romance Baiting Funds Several cryptocurrency companies have come together to prevent nearly $50m stolen via “romance baiting” (pig butchering) scammers…
Artificial Intelligence Malware3 Min Read August 28, 2025 U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced a fresh round of sanctions against two…
Cloud Security Malware Ransomware Windows4 Min Read August 28, 2025 Ransomware Actor Deletes Data and Backups Post-Exfiltration on Azure A threat actor has destroyed data and backups following exfiltration in a victim’s Microsoft Azure environment in a novel cloud-based…
Artificial Intelligence Ransomware3 Min Read August 28, 2025 Someone Created First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model Cybersecurity company ESET has disclosed that it discovered an artificial intelligence (AI)-powered ransomware variant codenamed PromptLock.…
Cloud Security Ransomware3 Min Read August 28, 2025 Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion…
DDoS ICS/OT Network Vulnerabilities3 Min Read August 28, 2025 CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits CISA released three significant Industrial Control Systems (ICS) advisories on August 26, 2025, alerting organizations to critical…
Apple Linux Vulnerabilities Windows2 Min Read August 28, 2025 NVIDIA NeMo AI Curator Enables Code Execution and Privilege Escalation NVIDIA has issued a critical security bulletin addressing a high-severity vulnerability in its NeMo Curator platform that could allow…
Network Vulnerabilities2 Min Read August 28, 2025 IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript A stored cross-site scripting (XSS) flaw identified in IPFire 2.29’s web-based firewall interface (firewall.cgi). Tracked as…
Malware Ransomware Vulnerabilities Windows4 Min Read August 28, 2025 Emulating the Expedited Warlock Ransomware Introduction Warlock is a ransomware strain operating under the Ransomware-as-a-Service (RaaS) model that emerged in June 2025, following an…
Vulnerabilities2 Min Read August 28, 2025 PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309) A weaponized proof-of-concept exploit has been publicly released targeting CVE-2025-54309, a severe authentication bypass vulnerability…
Network Ransomware Vulnerabilities2 Min Read August 28, 2025 28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild A critical zero-day remote code execution (RCE) vulnerability, tracked as CVE-2025-7775, is affecting over 28,000 Citrix instances worldwide.…
Ransomware7 Min Read August 28, 2025 CMMC 2.0 Final Rule Released – Get Prepared Now! In a significant step to secure the defense industrial base (DIB), the Department of Defense (DoD) has officially released the…
ICS/OT Network Ransomware6 Min Read August 28, 2025 Cross-domain Solutions: The Present and Future of a Growing Industry Cross-domain solutions (CDS) consist of the secure exchange of information between security domains. This type of solution, which emerged as a…
LLM analysis Magecart Ransomware Spotlight Supply Chain Attack3 Min Read August 28, 2025 Innovator Spotlight: CSide August 27, 2025 Securing the Browser’s Blind Spot By Victoria Hargrove, CDM Reporter What CSide Does Most security stacks fortify…
Phishing3 Min Read August 28, 2025 New Phishing Campaign Abuses ConnectWise ScreenConnect to Take Over Devices A novel phishing campaign attempts to trick victims into downloading ConnectWise ScreenConnect remote monitoring and management (RMM)…
Cloud Security Data Breach3 Min Read August 28, 2025 New Data Theft Campaign Targets Salesforce via Salesloft App Salesforce customers have again been targeted in a “widespread data theft campaign,” this time via compromised OAuth tokens…
Uncategorized2 Min Read August 28, 2025 ENISA to Coordinate €36m EU-Wide Incident Response Scheme The EU’s security agency is being given €36m ($42m) to handle incident response for major cyber-attacks targeting the bloc. ENISA…
Malware Vulnerabilities3 Min Read August 28, 2025 Citrix Patches Three NetScaler Zero Days as One Sees Active Exploitation Citrix has released patches for three zero-day vulnerabilities in NetScaler ADC and Gateway, one of which was already being exploited by…
Data Breach Malware Phishing Ransomware2 Min Read August 28, 2025 ShadowSilk Campaign Targets Central Asian Governments A series of cyber-attacks against government organizations in Central Asia and the Asia-Pacific has been linked to a threat cluster known as…
Ransomware3 Min Read August 28, 2025 Nevada “Network Security Incident” Shuts Down State Offices and Services The State of Nevada has been hit by a “network security incident,” which has resulted in the closure of government offices and…
Apple Linux Malware Ransomware Windows3 Min Read August 28, 2025 Researchers Discover First Reported AI-Powered Ransomware In what is reportedly a world-first, ESET researchers have discovered PrompLock, a generative AI-powered ransomware implant currently in…
Uncategorized2 Min Read August 28, 2025 CISA Strengthens Software Procurement Security With New Tool A new Software Acquisition Guide: Supplier Response Web Tool has been released by the US Cybersecurity and Infrastructure Security Agency…
Security2 Min Read August 28, 2025 Google to verify all Android devs to protect users from malware Google is introducing a new defense for Android called ‘Developer Verification’ to block malware installations from…
Healthcare Security2 Min Read August 28, 2025 Healthcare Services Group data breach impacts 624,000 people The Healthcare Services Group (HSGI) is alerting more than 600,000 individuals that their personal information was exposed in a security…
Security2 Min Read August 28, 2025 Why zero trust is never 'done' and is an ever-evolving process Picture this scenario: Six months after celebrating their “zero trust transformation,” a financial services firm gets hit with a…
Security2 Min Read August 28, 2025 Over 28,000 Citrix devices vulnerable to new exploited RCE flaw More than 28,200 Citrix instances are vulnerable to a critical remote code execution vulnerability tracked as CVE-2025-7775 that is already…
Security3 Min Read August 28, 2025 Global Salt Typhoon hacking campaigns linked to Chinese tech firms The U.S. National Security Agency (NSA), the UK’s National Cyber Security Centre (NCSC), and partners from over a dozen countries have…
Security2 Min Read August 28, 2025 IT system supplier cyberattack impacts 200 municipalities in Sweden A cyberattack on Miljödata, an IT systems supplier for roughly 80% of Sweden’s municipal systems, has caused accessibility problems…
Security3 Min Read August 28, 2025 FreePBX servers hacked via zero-day, emergency fix released The Sangoma FreePBX Security Team is warning about an actively exploited FreePBX zero-day vulnerability that impacts systems with the…
Security2 Min Read August 28, 2025 Experimental PromptLock ransomware uses AI to encrypt, steal data Threat researchers discovered the first AI-powered ransomware, called PromptLock, that uses Lua scripts to steal and encrypt data on Windows,…
Security3 Min Read August 28, 2025 Storm-0501 hackers shift to ransomware attacks in the cloud Microsoft warns that a threat actor tracked as Storm-0501 has evolved its operations, shifting away from encrypting devices with ransomware to…
Malware Threat Intelligence3 Min Read August 28, 2025 Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind Eagle between May…
Cloud Security Threat Intelligence3 Min Read August 28, 2025 Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data A widespread data theft campaign has allowed hackers to breach sales automation platform Salesloft to steal OAuth and refresh tokens…