Xerox Printer Vulnerability Exposes Authentication Data via LDAP and SMB
17
Feb
2025

Xerox Printer Vulnerability Exposes Authentication Data via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered, exposing enterprise networks to credential theft…

Hackers Exploit Telegram API to Spread New Golang Backdoor
17
Feb
2025

Hackers Exploit Telegram API to Spread New Golang Backdoor

The new Golang backdoor uses Telegram for command and control. Netskope discovers malware that exploits Telegram’s API for malicious purposes….

Hidden Malware in WordPress Websites Allows Attackers to Execute Malicious Code Remotely
17
Feb
2025

Hidden Malware in WordPress Websites Allows Attackers to Execute Malicious Code Remotely

A sophisticated malware campaign has recently been uncovered by security researchers at Sucuri, targeting WordPress websites through hidden malware and…

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection
17
Feb
2025

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection

Ransomware gangs are accelerating their operations, with the average time-to-ransom (TTR), the period between initial system compromise and the deployment…

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)
17
Feb
2025

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)

The suspected Chinese state-sponsored hackers who breached workstations of several US Treasury employees in December 2024 did so by leveraging…

AI models explained: The benefits of open source AI models
17
Feb
2025

AI models explained: The benefits of open source AI models

Open source software has a number of benefits over commercial products, not least the fact that it can be downloaded…

RansomHub Evolves To Attack Windows, ESXi, Linux and FreeBSD Operating Systems
17
Feb
2025

RansomHub Evolves To Attack Windows, ESXi, Linux and FreeBSD Operating Systems

The RansomHub ransomware group has rapidly emerged as one of the most prolific cybercrime syndicates of 2024–2025. As this ransomware…

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers
17
Feb
2025

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable remote code execution (RCE). These attacks…

10 Key SOC Challenges and How AI Addresses Them
17
Feb
2025

10 Key SOC Challenges and How AI Addresses Them

SOC challenges like alert fatigue, skill shortages and slow response impact cybersecurity. AI-driven solutions enhance SOC efficiency, automation and threat…

Machine Learning Can Be A Powerful Force In Cybersecurity
17
Feb
2025

Machine Learning Can Be A Powerful Force In Cybersecurity

Cyberattacks have major ramifications—from significant financial loss and reputational damage to compliance violations and disruption of operations. In 2025, cybercrime is…

Xerox Printers Vulnerability Let Attackers Capture Auth Data From LDAP & SMB
17
Feb
2025

Xerox Printers Vulnerability Let Attackers Capture Auth Data From LDAP & SMB

Multiple vulnerabilities in enterprise-grade Xerox Versalink C7025 multifunction printers (MFPs) enable attackers to intercept authentication credentials from Lightweight Directory Access…

The CISO’s Myopia
17
Feb
2025

The CISO’s Myopia – Cyber Defense Magazine

Fifteen years ago, I wrote an article entitled “The CSO’s Myopia.” At the time, I aimed to highlight a critical…