North Korea fake IT workers and recruiters
26
Sep
2025

North Korea’s Fake Recruiters Feed Stolen Data to IT Workers

The North Korean threat actor behind the DeceptiveDevelopment campaign is supplying stolen developer information to the country’s horde of fraudulent…

UK NCSC warns that attackers exploited Cisco firewall zero-days to deploy RayInitiator and LINE VIPER malware
26
Sep
2025

UK NCSC warns that attackers exploited Cisco firewall zero-days to deploy RayInitiator and LINE VIPER malware

UK NCSC warns that attackers exploited Cisco firewall zero-days to deploy RayInitiator and LINE VIPER malware Pierluigi Paganini September 26,…

Hackers Compromise Active Directory to Steal NTDS.dit that Leads to Full Domain Compromise
26
Sep
2025

Hackers Compromise Active Directory to Steal NTDS.dit that Leads to Full Domain Compromise

Active Directory (AD) remains the foundation of authentication and authorization in Windows environments. Threat actors targeting the NTDS.dit database can harvest…

Malware Gangs Enlist Covert North Korean IT Workers in Corporate Attacks
26
Sep
2025

Malware Gangs Enlist Covert North Korean IT Workers in Corporate Attacks

Malware operators aligned with North Korea have forged a sophisticated partnership with covert IT workers to target corporate organizations worldwide….

26
Sep
2025

Cisco ASA zero-day vulnerabilities exploited in sophisticated attacks

A widespread campaign aimed at breaching organizations via zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) has been revealed by…

Industrial camera vulnerabilities
26
Sep
2025

No Patches for Vulnerabilities Allowing Cognex Industrial Camera Hacking

Some of the industrial cameras made by Cognex are affected by potentially serious vulnerabilities, but they will not receive a…

CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild
26
Sep
2025

CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild

CISA has issued an Emergency Directive mandating immediate action to mitigate two critical zero-day vulnerabilities, CVE-2025-20333 and CVE-2025-20362, actively exploited against Cisco Adaptive Security…

New Botnet ‘Loader-as-a-Service’ Turns Home Routers and IoT into Mirai Farms
26
Sep
2025

New Botnet ‘Loader-as-a-Service’ Turns Home Routers and IoT into Mirai Farms

CloudSEK has uncovered a sophisticated Loader-as-a-Service botnet campaign spanning the last six months, leveraging exposed command-and-control logs to orchestrate attacks…

Archer Health Data Leak Exposes 23GB of Medical Records
26
Sep
2025

Archer Health Data Leak Exposes 23GB of Medical Records

A large cache of medical and personal information belonging to patients of Archer Health Inc. was left publicly accessible after…

New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module
26
Sep
2025

New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module

Sep 26, 2025Ravie LakshmananMalware / Browser Security Cybersecurity researchers have discovered an updated version of a known Apple macOS malware…

macOS malware
26
Sep
2025

New XCSSET macOS Malware Variant Hijacks Cryptocurrency Transactions

An updated variant of the sophisticated XCSSET macOS malware is monitoring the system clipboard to hijack cryptocurrency transactions, Microsoft warns….

Product comparison: Detectify vs. Nessus
26
Sep
2025

Product comparison: Detectify vs. Nessus

Nessus Pros Authenticated scanning of internal assets (workstations, network devices). Widely accepted for compliance and audit reporting (e.g., PCI DSS)….