Secure AI at Scale and Speed — Learn the Framework in this Free Webinar

23/10/2025 0 Comments 0 tags

AI is everywhere—and your company wants in. Faster products, smarter systems, fewer bottlenecks. But if you’re in security, that excitement often comes with a sinking feeling. Because while everyone else

Why Organizations Are Abandoning Static Secrets for Managed Identities

23/10/2025 0 Comments 0 tags

As machine identities explode across cloud environments, enterprises report dramatic productivity gains from eliminating static credentials. And only legacy systems remain the weak link. For decades, organizations have relied on

“Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

23/10/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments associated with organizations in the retail and consumer services sectors for

Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms

23/10/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Motex Lanscope Endpoint Manager to its Known Exploited Vulnerabilities (KEV) catalog, stating it has

Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw

23/10/2025 0 Comments 0 tags

E-commerce security company Sansec has warned that threat actors have begun to exploit a recently disclosed security vulnerability in Adobe Commerce and Magento Open Source platforms, with more than 250

Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files

22/10/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a coordinated spear-phishing campaign dubbed PhantomCaptcha targeting organizations associated with Ukraine’s war relief efforts to deliver a remote access trojan that uses a WebSocket

Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

22/10/2025 0 Comments 0 tags

The Iranian nation-state group known as MuddyWater has been attributed to a new campaign that has leveraged a compromised email account to distribute a backdoor called Phoenix to various organizations

Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys

22/10/2025 0 Comments 0 tags

Cybersecurity researchers have uncovered a new supply chain attack targeting the NuGet package manager with malicious typosquats of Nethereum, a popular Ethereum .NET integration platform, to steal victims’ cryptocurrency wallet

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch

22/10/2025 0 Comments 0 tags

Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft SharePoint to breach a telecommunications company in the Middle East after it was publicly disclosed and patched

Why You Should Swap Passwords for Passphrases

22/10/2025 0 Comments 0 tags

The advice didn’t change for decades: use complex passwords with uppercase, lowercase, numbers, and symbols. The idea is to make passwords harder for hackers to crack via brute force methods.