There Are Plenty of Phish in The Sea: Here’s How to Avoid Them
05
Aug
2025

There Are Plenty of Phish in The Sea: Here’s How to Avoid Them

When was the last time you revisited your organization’s email security practices? Is your current software up to the task…

Cisco Discloses Data Breach Exposed User Profiles from Cisco.com
05
Aug
2025

Cisco Discloses Data Breach Exposed User Profiles from Cisco.com

Cisco Systems has disclosed a data breach that compromised basic profile information of users registered on Cisco.com following a successful…

North Korean Hackers Weaponizing NPM Packages to Steal Cryptocurrency and Sensitive Data
05
Aug
2025

North Korean Hackers Weaponizing NPM Packages to Steal Cryptocurrency and Sensitive Data

A sophisticated North Korean cryptocurrency theft campaign has resurfaced with renewed vigor, weaponizing twelve malicious NPM packages to target developers…

APT36 Targets Indian Government: Credential Theft Campaign Uncovered
05
Aug
2025

APT36 Targets Indian Government: Credential Theft Campaign Uncovered

A sophisticated phishing campaign attributed with medium confidence to the Pakistan-linked APT36 group, also known as Transparent Tribe or Mythic…

Cisco
05
Aug
2025

Cisco discloses data breach impacting Cisco.com user accounts

Cisco has disclosed that cybercriminals stole the basic profile information of users registered on Cisco.com following a voice phishing (vishing)…

Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender
05
Aug
2025

Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender

North Korean state-sponsored cyber-espionage group Kimsuky has unveiled a sophisticated new campaign targeting South Korean entities through malicious Windows shortcut…

North Korean Hackers Exploit NPM Packages to Steal cryptocurrency and Sensitive Data
05
Aug
2025

North Korean Hackers Exploit NPM Packages to Steal cryptocurrency and Sensitive Data

Veracode Threat Research has uncovered a sophisticated North Korean cryptocurrency theft operation that continues to evolve, building on campaigns previously…

Discord CDN Link Abused to Deliver RAT Disguised as OneDrive File
05
Aug
2025

Discord CDN Link Abused to Deliver RAT Disguised as OneDrive File

In a new threat discovered by cybersecurity firm Sublime Security, which was observed on the Microsoft 365 email platform, hackers…

The Costly Confusion Behind Security Risks
05
Aug
2025

The Costly Confusion Behind Security Risks

In SaaS security conversations, “misconfiguration” and “vulnerability” are often used interchangeably. But they’re not the same thing. And misunderstanding that…

The Cost of Data Blindness
05
Aug
2025

The Cost of Data Blindness

Exposed Without a Breach: The Cost of Data Blindness Pierluigi Paganini August 05, 2025 These are in plain sight without…

SonicWall
05
Aug
2025

SonicWall urges admins to disable SSLVPN amid rising attacks

SonicWall has warned customers to disable SSLVPN services due to ransomware gangs potentially exploiting an unknown security vulnerability in SonicWall…

Hackers Can Steal IIS Machine Keys by Exploit SharePoint Deserialization Vulnerability
05
Aug
2025

Hackers Can Steal IIS Machine Keys by Exploit SharePoint Deserialization Vulnerability

A sophisticated attack method where hackers are exploiting a deserialization vulnerability in SharePoint to steal Internet Information Services (IIS) Machine…