89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals

27/02/2025 0 Comments 0 tags

Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their business plans, or both. To drive informed decision-making and effective planning, the availability of hard

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

27/02/2025 0 Comments 0 tags

The threat actor known as Space Pirates has been linked to a malicious campaign targeting Russian information technology (IT) organizations with a previously undocumented malware called LuckyStrike Agent. The activity

Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers

27/02/2025 0 Comments 0 tags

The U.S. Federal Bureau of Investigation (FBI) formally linked the record-breaking $1.5 billion Bybit hack to North Korean threat actors, as the company’s CEO Ben Zhou declared a “war against

PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices

27/02/2025 0 Comments 0 tags

A new malware campaign has been observed targeting edge devices from Cisco, ASUS, QNAP, and Synology to rope them into a botnet named PolarEdge since at least the end of

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites

26/02/2025 0 Comments 0 tags

A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts across hundreds of websites with the goal of manipulating search

Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music Downloads

26/02/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a malicious Python library on the Python Package Index (PyPI) repository that facilitates unauthorized music downloads from music streaming service Deezer. The package in question is

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

26/02/2025 0 Comments 0 tags

The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday warned of renewed activity from an organized criminal group it tracks as UAC-0173 that involves infecting computers with a remote

Three Password Cracking Techniques and How to Defend Against Them

26/02/2025 0 Comments 0 tags

Passwords are rarely appreciated until a security breach occurs; suffice to say, the importance of a strong password becomes clear only when faced with the consequences of a weak one.

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

26/02/2025 0 Comments 0 tags

Universities and government organizations in North America and Asia have been targeted by a previously undocumented Linux malware called Auto-Color between November and December 2024, according to new findings from

SOC 3.0 – The Evolution of the SOC and How AI is Empowering Human Talent

26/02/2025 0 Comments 0 tags

Organizations today face relentless cyber attacks, with high-profile breaches hitting the headlines almost daily. Reflecting on a long journey in the security field, it’s clear this isn’t just a human