Massive Botnet Targets ASUS Routers by Injecting Malicious SSH Keys
29
May
2025

Massive Botnet Targets ASUS Routers by Injecting Malicious SSH Keys

GreyNoise Research has publicly disclosed a sophisticated cyberattack campaign that has compromised over 9,000 ASUS routers worldwide. First detected by…

New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key
29
May
2025

New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key

A sophisticated botnet campaign dubbed “AyySSHush” has compromised over 9,000 ASUS routers worldwide, establishing persistent backdoor access that survives firmware…

APT Hackers Turn Google Calendar Into Command Hub Using TOUGHPROGRESS Malware, Google Alerts
29
May
2025

APT Hackers Turn Google Calendar Into Command Hub Using TOUGHPROGRESS Malware, Google Alerts

Google Threat Intelligence Group (GTIG), a sophisticated malware campaign dubbed “TOUGHPROGRESS” has been uncovered, orchestrated by the notorious PRC-based threat…

Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations
29
May
2025

Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations

May 29, 2025Ravie LakshmananMalware / Cloud Security Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41…

New AyySSHush botnet compromised over 9,000 ASUS routers, adding a persistent SSH backdoor.
29
May
2025

New AyySSHush botnet compromised over 9,000 ASUS routers, adding a persistent SSH backdoor.

New AyySSHush botnet compromised over 9,000 ASUS routers, adding a persistent SSH backdoor. Pierluigi Paganini May 29, 2025 GreyNoise researchers…

Mike Wilkes on Resilience Amid Evolving Threats
29
May
2025

Mike Wilkes on Resilience Amid Evolving Threats

Mike Wilkes has had a career many cybersecurity professionals could only dream of. An adjunct professor, former CISO of Marvel…

OneDrive File Picker Vulnerability Exposes Users' Entire Cloud Storage to Websites
29
May
2025

OneDrive File Picker Vulnerability Exposes Users’ Entire Cloud Storage to Websites

A critical security flaw in Microsoft’s OneDrive File Picker has exposed millions of users to unauthorized data access, allowing third-party…

What CISOs can learn from the frontlines of fintech cybersecurity
29
May
2025

What CISOs can learn from the frontlines of fintech cybersecurity

At Span Cyber Security Arena, I sat down with Ria Shetty, Director, Cyber Security & Resilience for Europe at Mastercard….

WordPress Vulnerability
29
May
2025

Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

May 29, 2025Ravie LakshmananVulnerability / Website Security Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist…

A smarter way to plan: ending development delays for Australians
29
May
2025

A smarter way to plan: ending development delays for Australians

As Australia races to meet ambitious housing targets, a quiet crisis is playing out in council offices across the country….

How CISOs can regain ground in the AI fraud war
29
May
2025

How CISOs can regain ground in the AI fraud war

Fraudsters are winning the AI arms race, first-party fraud is rising, and siloed systems are holding back defenses, according to…

CISOs prioritize AI-driven automation to optimize cybersecurity spending
29
May
2025

CISOs prioritize AI-driven automation to optimize cybersecurity spending

Cybersecurity leaders and consultants identified AI-driven automation and cost optimization as top organizational priorities, according to Wipro. 30% of respondents…