Treating MCP like an API creates security blind spots
01
Dec
2025

Treating MCP like an API creates security blind spots

In this Help Net Security interview, Michael Yaroshefsky, CEO at MCP Manager, discusses how Model Context Protocol’s (MCP) trust model creates…

Coupang Data Breach Exposes 33.7 Million Customers
01
Dec
2025

Coupang Data Breach Exposes 33.7 Million Customers

South Korean e-commerce giant Coupang has confirmed a massive data breach that exposed personal information belonging to nearly 33.7 million…

APT36 Deploys Python-Based ELF Malware in Targeted Attacks on Indian Government Agencies
01
Dec
2025

APT36 Deploys Python-Based ELF Malware in Targeted Attacks on Indian Government Agencies

Pakistan-linked cyberespionage group APT36 (Transparent Tribe) has escalated its campaign against Indian government institutions with the deployment of sophisticated Python-based…

Offensive cyber power is spreading fast and changing global security
01
Dec
2025

Offensive cyber power is spreading fast and changing global security

Offensive cyber activity has moved far beyond a handful of major powers. More governments now rely on digital operations to…

SIM-binding
01
Dec
2025

DoT Enforces SIM-Binding To Curb Messaging App Cyber Fraud

India’s Department of Telecommunications (DoT) has introduced a shift in the way messaging platforms operate in the country, mandating the…

Cyber Monday scams
01
Dec
2025

What Shoppers Must Watch Out For

fCyber Monday scams in 2025 are increasing at a time when phishing, credential theft, and financial cybercrime are already at…

Deep insight to how your systems are configured and what needs fixing
01
Dec
2025

Deep insight to how your systems are configured and what needs fixing

We cross to Orlando, Florida and speak with Yuriy Tsibere, Product Manager at ThreatLocker. We dive into the ThreatLocker DAC…

Enterprise password audits made practical for busy security teams
01
Dec
2025

Enterprise password audits made practical for busy security teams

Security teams carry a heavy load, and password risk is one of the most overlooked parts of that workload. Every…

Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets
01
Dec
2025

Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets

Dec 01, 2025Ravie LakshmananMalware / Threat Intelligence The threat actor known as Tomiris has been attributed to attacks targeting foreign…

Windows 11 24H2 Update Hides the Password Icon in the Sign-in Options on the Lock Screen
01
Dec
2025

Windows 11 24H2 Update Hides the Password Icon in the Sign-in Options on the Lock Screen

Microsoft has confirmed a bizarre user interface bug affecting Windows 11 version 24H2 devices that renders the password sign-in icon…

The weekend is prime time for ransomware
01
Dec
2025

The weekend is prime time for ransomware

Over half of organizations that experienced a ransomware event in the past year were hit during a weekend or holiday,…

PoC Exploit Released for Critical Outlook 0-Click Remote Code Execution Vulnerability
01
Dec
2025

PoC Exploit Released for Critical Outlook 0-Click Remote Code Execution Vulnerability

A Proof-of-Concept (PoC) exploit code has been released for a critical remote code execution (RCE) vulnerability in Microsoft Outlook, identified…