Malware Threat Intelligence3 Min Read September 10, 2025 CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called CHILLYHELL and a Go-based…
Uncategorized4 Min Read September 10, 2025 The Time-Saving Guide for Service Providers: Automating vCISO and Compliance Services Introduction Managed service providers (MSPs) and managed security service providers (MSSPs) are under increasing pressure to deliver strong…
Microsoft6 Min Read September 9, 2025 Windows 11 KB5065426 & KB5065431 cumulative updates released September 9, 2025 01:37 PM Microsoft has released Windows 11 KB5065426 and KB5065431 cumulative updates for versions 24H2…
Apple Cloud Security DDoS Linux Network Vulnerabilities Windows7 Min Read September 9, 2025 Microsoft September 2025 Patch Tuesday – 81 Vulnerabilities Fixed Including 22 RCE Microsoft has released its September 2025 Patch Tuesday updates, addressing a total of 81 security vulnerabilities across its product suite.…
Business Continuity5 Min Read September 9, 2025 How Leading CISOs are Getting Budget Approval It’s budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you’re a CISO or security leader,…
Security Operations4 Min Read September 5, 2025 Automation Is Redefining Pentest Delivery Pentesting remains one of the most effective ways to identify real-world security weaknesses before adversaries do. But as the threat…
Cryptocurrency Malware3 Min Read September 5, 2025 VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages Cybersecurity researchers have flagged a new malware campaign that has leveraged Scalable Vector Graphics (SVG) files as part of phishing…
Microsoft7 Min Read August 29, 2025 Windows 11 KB5064081 update clears up CPU usage metrics in Task Manager Microsoft has released the KB5064081 preview cumulative update for Windows 11 24H2, which includes thirty-six new features or…
Security2 Min Read August 28, 2025 Experimental PromptLock ransomware uses AI to encrypt, steal data Threat researchers discovered the first AI-powered ransomware, called PromptLock, that uses Lua scripts to steal and encrypt data on Windows,…
Security2 Min Read August 28, 2025 Why zero trust is never 'done' and is an ever-evolving process Picture this scenario: Six months after celebrating their “zero trust transformation,” a financial services firm gets hit with a…
Apple Linux Malware Ransomware Windows3 Min Read August 28, 2025 Researchers Discover First Reported AI-Powered Ransomware In what is reportedly a world-first, ESET researchers have discovered PrompLock, a generative AI-powered ransomware implant currently in…
Malware Ransomware Vulnerabilities Windows4 Min Read August 28, 2025 Emulating the Expedited Warlock Ransomware Introduction Warlock is a ransomware strain operating under the Ransomware-as-a-Service (RaaS) model that emerged in June 2025, following an…
Security1 Min Read August 27, 2025 Beyond GDPR security training: Turning regulation into opportunity By Eirik Salmi, System Analyst at Passwork Even though 88% of businesses spend over €1 million on GDPR compliance and 40% invest up to…
Cloud Security DDoS Network Vulnerabilities7 Min Read August 27, 2025 Securing the AI Revolution: Introducing Cloudflare MCP Server Portals 2025-08-26 6 min read Securing the AI Revolution: Introducing Cloudflare MCP Server Portals Large Language Models (LLMs) are rapidly evolving…
August 26, 2025 Ten Years of Resilience, Innovation & Community-Driven Defense The world of cybersecurity has been a wild ride over the last decade. As attackers stepped up their game year over year, the security…
Apple DDoS Ransomware2 Min Read August 25, 2025 Apple Sues Ex-Engineer, Alleging He Stole Apple Watch Secrets for Rival Oppo Ddos August 24, 2025 Apple has recently accused a former member of its Apple Watch development team of misappropriating trade secrets related…
Supply Chain Security Zero-Day5 Min Read August 25, 2025 Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a controlled environment.…
Malware Zero Trust4 Min Read August 25, 2025 Why Enterprises Need Preemptive Cybersecurity to Combat Modern Phishing Phishing isn’t what it used to be. It’s no longer fake emails with bad grammar and sketchy links. With AI, modern phishing attacks…
Exploits Web Security7 Min Read August 21, 2025 MCP vulnerability case study: SQL injection in the Postgres MCP server Key points and observations We found a SQL injection vulnerability in Anthropic’s reference Postgres MCP server that allowed us to…