Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders
06
Aug
2025

Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders

A sophisticated Chinese threat actor has been exploiting critical vulnerabilities in Microsoft SharePoint to deploy an advanced malware toolset dubbed…

Adobe AEM Forms 0-Day Vulnerability Allows Attackers to Run Arbitrary Code
06
Aug
2025

Adobe AEM Forms 0-Day Vulnerability Allows Attackers to Run Arbitrary Code

Adobe has released critical security updates for Adobe Experience Manager (AEM) Forms on Java Enterprise Edition following the discovery of…

How Top SOCs Defend Against Emerging Threats with Live Attack Data
06
Aug
2025

How Top SOCs Defend Against Emerging Threats with Live Attack Data

Top-tier Security Operations Centers understand a fundamental truth: prevention beats reaction every time. The most successful cybersecurity tactics don’t wait…

Descope launches Agentic Identity Control Plane for secure AI agent identity
06
Aug
2025

Descope launches Agentic Identity Control Plane for secure AI agent identity

Descope launched Agentic Identity Control Plane, a solution that enables security teams to institute policy-based governance, auditing, and identity management…

AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals
06
Aug
2025

AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals

Aug 06, 2025The Hacker NewsCompliance / Security Operations As the volume and sophistication of cyber threats and risks grow, cybersecurity…

Microsoft's New AI Agent Project to Detect Malware with Reverse Engineering Tools
06
Aug
2025

Microsoft’s New AI Agent Project to Detect Malware with Reverse Engineering Tools

Microsoft has unveiled Project Ire, an autonomous AI agent capable of reverse engineering and classifying malware at an unprecedented scale. …

Nuclear Experts Say Mixing AI and Nuclear Weapons Is Inevitable
06
Aug
2025

Nuclear Experts Say Mixing AI and Nuclear Weapons Is Inevitable

The people who study nuclear war for a living are certain that artificial intelligence will soon power the deadly weapons….

Threat Actors Poison Bing Search Results to Distribute Bumblebee Malware via 'ManageEngine OpManager' Queries
06
Aug
2025

Threat Actors Poison Bing Search Results to Distribute Bumblebee Malware via ‘ManageEngine OpManager’ Queries

Threat actors leveraged SEO poisoning techniques to manipulate Bing search results, directing users querying for “ManageEngine OpManager” to a malicious…

Black Kite launches Adversary Susceptibility Index to expose vendor threat actor risk
06
Aug
2025

Black Kite launches Adversary Susceptibility Index to expose vendor threat actor risk

Black Kite has unveiled the Adversary Susceptibility Index (ASI), a tool designed for TPRM teams to proactively identify which vendors…

Trend Micro fixes critical vulnerabilities in multiple products
06
Aug
2025

Trend Micro warns of Apex One zero-day exploited in attacks

Trend Micro has warned customers to immediately secure their systems against an actively exploited remote code execution vulnerability in its…

Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders
06
Aug
2025

Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders

Unit 42 researchers have identified significant overlaps between Microsoft’s reported ToolShell exploit chain targeting SharePoint vulnerabilities and a tracked activity…

HTA-Delivered C# Malware
06
Aug
2025

CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures

Aug 06, 2025Ravie LakshmananCyber Espionage / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks…