Trellix advances NDR to close the OT-IT threat detection-to-response gap
17
Dec
2025

Trellix advances NDR to close the OT-IT threat detection-to-response gap

Trellix announced Trellix NDR innovations, strengthening OT-IT security with integrated visibility across complex environments, enhanced detection capabilities, and automated investigation…

Spyware and RATs used to target WhatsApp and Signal Users
17
Dec
2025

U.S. CISA adds a flaw in multiple Fortinet products to its Known Exploited Vulnerabilities catalog

U.S. CISA adds a flaw in multiple Fortinet products to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 17, 2025…

New Moonwalk++ PoC Demonstrates How Malware Can Forge Windows Call Stacks to Evade Detection
17
Dec
2025

New Moonwalk++ PoC Demonstrates How Malware Can Forge Windows Call Stacks to Evade Detection

Security researchers have unveiled a dangerous new technique that allows malware to completely hide its tracks by faking Windows call…

How DPDP Rules Help Detect Deceptive Synthetic Identities
17
Dec
2025

How DPDP Rules Help Detect Deceptive Synthetic Identities

Nikhil Jhanji, Principal Product Manager, Privy by IDfy. The DPDP rules have finally given enterprises a clear structure for how…

report-ad-banner
17
Dec
2025

UK Report Links South Korean Telecom Breach

A recent report by British technology research firm Rethink Technology Research has raised serious concerns over a cyberattack on KT, South Korea’s…

Gov backs its own AI adoption with $225m
17
Dec
2025

Gov backs its own AI adoption with $225m

The federal government will invest $225 million into AI for its own use over the next four years, largely via…

ClickFix Spoof of “Word Online” Used to Spread DarkGate Malware
17
Dec
2025

ClickFix Spoof of “Word Online” Used to Spread DarkGate Malware

A sophisticated social engineering campaign leveraging a fake “Word Online” extension error message has been discovered distributing the notorious DarkGate…

Banks built rules for yesterday's crime and RegTech is trying to fix that
17
Dec
2025

Banks built rules for yesterday’s crime and RegTech is trying to fix that

Criminals are moving money across borders faster, and financial institutions are feeling the squeeze. Compliance teams feel this strain every…

report-ad-banner
17
Dec
2025

PDVSA Cyberattack Hits Administrative Systems

Venezuela’s state-run oil company, Petróleos de Venezuela (PDVSA), has confirmed that a cyberattack on PDVSA’s administrative systems caused widespread disruptions,…

New GhostPoster Attack Leverages PNG Icon to Infect 50,000 Firefox Users
17
Dec
2025

New GhostPoster Attack Leverages PNG Icon to Infect 50,000 Firefox Users

A sophisticated new malware campaign dubbed “GhostPoster” has been uncovered, leveraging a clever steganography technique to compromise approximately 50,000 Firefox…

Parked Domains Emerge as a Primary Channel for Malware and Phishing
17
Dec
2025

Parked Domains Emerge as a Primary Channel for Malware and Phishing

The landscape of domain parking has transformed dramatically over the past decade, shifting from a relatively benign monetization strategy to…

Why vulnerability reports stall inside shared hosting companies
17
Dec
2025

Why vulnerability reports stall inside shared hosting companies

Security teams keep sending vulnerability notifications, and the same pattern keeps repeating. Many alerts land, few lead to fixes. A…