Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns
14
Nov
2025

Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns

Key Takeaways: 85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date….

Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
14
Nov
2025

Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands

Cisco has released security updates to address two critical vulnerabilities in Unified Contact Center Express (Unified CCX) that could allow…

Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques
14
Nov
2025

Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques

Researchers at Group-IB have uncovered a sophisticated phishing framework that demonstrates how cybercriminals are industrializing credential theft through automation, evasion…

Top 100 Cybersecurity Leaders In The U.S. Announced
14
Nov
2025

Top 100 Cybersecurity Leaders In The U.S. Announced

To recognize the individuals driving the transformation of cybersecurity in the United States, The Cyber Express, in collaboration with Suraksha…

Robert Rea
14
Nov
2025

The retail sector needs a cybersecurity talent incubator

Retail giants have a target on their backs. Hackers are picking them apart at a rate rarely seen in other…

Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover
14
Nov
2025

Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover

A deceptive Chrome extension named Safery: Ethereum Wallet has emerged as a serious threat to cryptocurrency users. Published on the…

Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments
14
Nov
2025

Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments

Cisco Talos has identified an emerging threat from Kraken, a sophisticated cross-platform ransomware group that has emerged from the remnants…

Automated Cyber Espionage Campaign
14
Nov
2025

Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign

State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part…

BSI issues guidelines to counter evasion attacks targeting LLMs
14
Nov
2025

BSI issues guidelines to counter evasion attacks targeting LLMs

Germany’s BSI issues guidelines to counter evasion attacks targeting LLMs Pierluigi Paganini November 14, 2025 Germany’s BSI warns of rising…

Product comparison: Detectify vs. Halo Security
14
Nov
2025

Product comparison: Detectify vs. Halo Security

Halo Security Pros It consolidates EASM, infrastructure scanning, and manual penetration testing services into a single platform, simplifying vendor management….

ASUS
14
Nov
2025

ASUS warns of critical auth bypass flaw in DSL series routers

ASUS has released new firmware to patch a critical authentication bypass security flaw impacting several DSL series router models. Tracked…

Washington Post Oracle E-Suite Hack Impacts 9K+ Employees and Contractors
14
Nov
2025

Washington Post Oracle E-Suite Hack Impacts 9K+ Employees and Contractors

The Washington Post has publicly disclosed a significant data breach involving external hacking of its Oracle E-Suite system, impacting over…