Head of NSA and US Cyber Command reportedly fired
04
Apr
2025

Head of NSA and US Cyber Command reportedly fired

Dive Brief: Multiple news outlets reported Thursday night that the Trump administration fired Gen. Timothy D. Haugh, director of the…

Hacker
04
Apr
2025

Australian pension funds hit by wave of credential stuffing attacks

Over the weekend, a massive wave of credential stuffing attacks hit multiple large Australian super funds, compromising thousands of members’…

Critical Apache Parquet Vulnerability Allows Remote Code Execution
04
Apr
2025

Critical Apache Parquet Vulnerability Allows Remote Code Execution

A severe vulnerability has been identified in the Apache Parquet Java library, specifically within its parquet-avro module. This flaw, tracked as CVE-2025-30065, exposes…

Jane Devry
04
Apr
2025

The Rise of SSE and SASE: What’s Changed from 2024 to 2025?

Introduction The evolution of Security Service Edge (SSE) adoption from 2024 to 2025 reflects significant shifts in enterprise security strategies,…

The Future: Personal Assistants (Companions)
04
Apr
2025

The Future: Personal Assistants (Companions)

As technology continues to be come more compact and more powerful, I think one of the biggest consumer/business breakthroughs is…

Malicious PDFs Responsible for 22% of All Email-Based Cyber Threats
04
Apr
2025

Malicious PDFs Responsible for 22% of All Email-Based Cyber Threats

Malicious PDF files have emerged as a dominant threat vector in email-based cyberattacks, accounting for 22% of all malicious email…

Naveen Goud
04
Apr
2025

Hunters International Ransomware moves to data exfiltration and data extortion

Ransomware gangs are notorious for first stealing data from servers before encrypting it, holding it hostage until a ransom is…

Verizon logo
04
Apr
2025

Flaw in Verizon call record requests put millions of Americans at risk

Security researcher Evan Connelly discovered an enormous flaw affecting one of the largest telecommunications companies in the world that could…

6 Steps To Becoming An Information Security Guru
04
Apr
2025

6 Steps To Becoming An Information Security Guru

A recent poster in an information security forum asked what it takes to succeed in the information security field. Having…

Hackers Exploit Fast Flux to Evade Detection and Obscure Malicious Servers
04
Apr
2025

Hackers Exploit Fast Flux to Evade Detection and Obscure Malicious Servers

Cybersecurity agencies worldwide have issued a joint advisory warning against the growing threat posed by “fast flux,” a sophisticated technique…

Jane Devry
04
Apr
2025

The Hidden Crisis in Non-Human Identity: Why Your Security Strategy Needs an Overhaul

While organizations have spent years fortifying human identity security, a critical vulnerability has been growing in our digital infrastructure. For…

OPSEC Failure Exposes Coquettte's Malware Campaigns on Bulletproof Hosting Servers
04
Apr
2025

OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting Servers

Apr 04, 2025Ravie LakshmananThreat Intelligence / Malware A novice cybercrime actor has been observed leveraging the services of a Russian…