Malware Ransomware Windows2 Min Read August 28, 2025 Malicious VS Code Extensions Exploit Name Reuse Loophole A new campaign involving malicious Visual Studio Code (VS Code) extensions has exposed a loophole in the VS Code Marketplace that allows…
Cloud Security Vulnerabilities2 Min Read August 28, 2025 Cloudflare Launches MCP Server Portals – A Unified Gateway to All MCP Servers Cloudflare today launched MCP Server Portals in open beta, a groundbreaking capability designed to centralize, secure, and observe all Model…
Cloud Security5 Min Read August 28, 2025 Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials The maintainers of the nx build system have alerted users to a supply chain attack that allowed attackers to publish malicious versions of the…
Cloud Security Threat Intelligence3 Min Read August 28, 2025 Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data A widespread data theft campaign has allowed hackers to breach sales automation platform Salesloft to steal OAuth and refresh tokens…
Security2 Min Read August 28, 2025 Why zero trust is never 'done' and is an ever-evolving process Picture this scenario: Six months after celebrating their “zero trust transformation,” a financial services firm gets hit with a…
Uncategorized2 Min Read August 28, 2025 CISA Strengthens Software Procurement Security With New Tool A new Software Acquisition Guide: Supplier Response Web Tool has been released by the US Cybersecurity and Infrastructure Security Agency…
LLM analysis Magecart Ransomware Spotlight Supply Chain Attack3 Min Read August 28, 2025 Innovator Spotlight: CSide August 27, 2025 Securing the Browser’s Blind Spot By Victoria Hargrove, CDM Reporter What CSide Does Most security stacks fortify…
Ransomware7 Min Read August 28, 2025 CMMC 2.0 Final Rule Released – Get Prepared Now! In a significant step to secure the defense industrial base (DIB), the Department of Defense (DoD) has officially released the…
Artificial Intelligence Enterprise Security3 Min Read August 27, 2025 MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical…
Cloud Security DDoS Network Vulnerabilities7 Min Read August 27, 2025 Securing the AI Revolution: Introducing Cloudflare MCP Server Portals 2025-08-26 6 min read Securing the AI Revolution: Introducing Cloudflare MCP Server Portals Large Language Models (LLMs) are rapidly evolving…
Linux Ransomware Vulnerabilities2 Min Read August 27, 2025 CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks CISA has issued a high-severity warning for CVE-2025-48384, a link-following vulnerability in Git that enables arbitrary file writes via…
August 26, 2025 Ten Years of Resilience, Innovation & Community-Driven Defense The world of cybersecurity has been a wild ride over the last decade. As attackers stepped up their game year over year, the security…
Cybersecurity Recap22 Min Read August 25, 2025 Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage,…
Supply Chain Security2 Min Read August 25, 2025 CISA Seeks Biden Era's SBOM Minimum Requirements Guideline Change The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a request for comment on an updated version of a government…
Supply Chain Security Zero-Day5 Min Read August 25, 2025 Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a controlled environment.…
Supply Chain Security4 Min Read August 25, 2025 How Secure Is the Software Supply Chain? Less Secure Than You Might Think. Software is the invisible infrastructure of our world, powering everything from critical systems to everyday devices. But its ubiquity makes…
Hacks Privacy3 Min Read August 25, 2025 Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system. Targeted attacks on Twilio and…
Business Continuity Data Protection6 Min Read August 25, 2025 From Impact to Action: Turning BIA Insights Into Resilient Recovery Modern businesses face a rapidly evolving and expanding threat landscape, but what does this mean for your business? It means a growing number…
Supply Chain Security2 Min Read August 25, 2025 PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks The maintainers of the Python Package Index (PyPI) repository have announced that the package manager now checks for expired domains to…
Malware Supply Chain Attack3 Min Read August 25, 2025 Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks Cybersecurity researchers have discovered a malicious package in the Python Package Index (PyPI) repository that introduces malicious behavior…
Vulnerability Zero-Day4 Min Read August 25, 2025 Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws Microsoft on Tuesday rolled out fixes for a massive set of 111 security flaws across its software portfolio, including one flaw that has been…
Security3 Min Read August 25, 2025 Murky Panda hackers exploit cloud trust to hack downstream customers A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud environments to gain…
Cloud Security Malware Ransomware Windows6 Min Read August 14, 2025 Datadog threat roundup: Top insights for Q2 2025 As a leading provider in observability and cloud security, Datadog has unique insight into threat actor behavior that targets cloud…
Cloud Security Phishing Supply Chain3 Min Read July 28, 2025 Datadog guide to Hacker Summer Camp 2025 Every year in early August, conferences in Las Vegas, Nevada, serve as a gathering of security professionals in a single place. This time of…
Cloud Security Malware Phishing Ransomware11 Min Read April 17, 2025 Datadog threat roundup: Top insights for Q1 2025 As a leading provider in observability and cloud security, Datadog has unique insight into threat actor behavior that targets cloud…