CNCERT Accuses U.S. Intelligence of Cyberattacks on Chinese Military-Industrial Targets
04
Aug
2025

CNCERT Accuses U.S. Intelligence of Cyberattacks on Chinese Military-Industrial Targets

China’s National Computer Network Emergency Response Technical Team/Coordination Center (CNCERT) has publicly accused U.S. intelligence agencies of orchestrating sophisticated cyberattacks…

SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware
04
Aug
2025

SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware

A likely zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) VPNs and firewall appliances is being actively exploited in the…

Legacy Solutions Have Become a Cyber Defense Problem
04
Aug
2025

Legacy Solutions Have Become a Cyber Defense Problem

The cyber defense community is at a crossroads that is magnified by cyber criminals’ adoption of AI and ransomware-as-a-service. With…

Modular Malware Suite Sold by Threat Actors Through Public Storefront Domains
04
Aug
2025

Modular Malware Suite Sold by Threat Actors Through Public Storefront Domains

A threat actor operating under the moniker Cyber Products has established a public-facing storefront at cyberproducts[.]io to distribute their modular…

Hackers Abuse Microsoft 365 Direct Send to Deliver Internal Phishing Emails
04
Aug
2025

Hackers Abuse Microsoft 365 Direct Send to Deliver Internal Phishing Emails

A new Proofpoint report reveals how attackers are using Microsoft 365’s Direct Send and unsecured SMTP relays to send internal-looking…

‘Highly evasive’ Vietnamese-speaking hackers stealing data from thousands of victims in 62+ nations
04
Aug
2025

‘Highly evasive’ Vietnamese-speaking hackers stealing data from thousands of victims in 62+ nations

Vietnamese-speaking hackers are carrying out a “highly evasive, multi-stage operation” to steal information from thousands of victims in more than…

Proton Authenticator
04
Aug
2025

Proton fixes Authenticator bug leaking TOTP secrets in logs

Proton fixed a bug in its new Authenticator app for iOS that logged users’ sensitive TOTP secrets in plaintext, potentially exposing…

Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
04
Aug
2025

Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help

Two high-severity vulnerabilities in Anthropic’s Claude Code could allow attackers to escape restrictions and execute unauthorized commands. Most remarkably, Claude…

Mind the Middle
04
Aug
2025

Mind the Middle – Cyber Defense Magazine

In an era where digital threats can cripple a business overnight, where threat actors can use AI to customize and…

Surge in Threat Actor Exploitation Attempts Serves as Early Warning of Emerging Cyber Vulnerabilities
04
Aug
2025

Surge in Threat Actor Exploitation Attempts Serves as Early Warning of Emerging Cyber Vulnerabilities

Researchers have discovered a continuous relationship between increases in threat actor activity and the eventual disclosure of new Common Vulnerabilities…

Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage
04
Aug
2025

Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage

The sudden emergence of the Royal ransomware in early 2023 marked a significant escalation in cyber threats targeting service providers…

Multifaceted Cyber-Attacks Require a Unified Defense Approach
04
Aug
2025

Multifaceted Cyber-Attacks Require a Unified Defense Approach

Gone are the days of attacks hitting a single product or vulnerability. Today, we’re seeing the increasing use of multi-vector…