CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF

23/07/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security flaws impacting SysAid IT support software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.

CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks

23/07/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), on July 22, 2025, added two Microsoft SharePoint flaws, CVE-2025-49704 and CVE-2025-49706, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence

Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups

22/07/2025 0 Comments 0 tags

Microsoft has formally tied the exploitation of security flaws in internet-facing SharePoint Server instances to two Chinese hacking groups called Linen Typhoon and Violet Typhoon as early as July 7,

Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access

22/07/2025 0 Comments 0 tags

Cisco on Monday updated its advisory of a set of recently disclosed security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) to acknowledge active exploitation. “In

Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate

22/07/2025 0 Comments 0 tags

Mexican organizations are still being targeted by threat actors to deliver a modified version of AllaKore RAT and SystemBC as part of a long-running campaign.  The activity has been attributed

How to Advance from SOC Manager to CISO?

22/07/2025 0 Comments 0 tags

Making the move from managing a security operations center (SOC) to being a chief information security officer (CISO) is a significant career leap. Not only do you need a solid

Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access

22/07/2025 0 Comments 0 tags

The recently disclosed critical Microsoft SharePoint vulnerability has been under exploitation as early as July 7, 2025, according to findings from Check Point Research. The cybersecurity company said it observed

Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents

21/07/2025 0 Comments 0 tags

Cybersecurity researchers have unearthed new Android spyware artifacts that are likely affiliated with the Iranian Ministry of Intelligence and Security (MOIS) and have been distributed to targets by masquerading as

China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure

21/07/2025 0 Comments 0 tags

The China-linked cyber espionage group tracked as APT41 has been attributed to a new campaign targeting government IT services in the African region. “The attackers used hardcoded names of internal

Assessing the Role of AI in Zero Trust

21/07/2025 0 Comments 0 tags

By 2025, Zero Trust has evolved from a conceptual framework into an essential pillar of modern security. No longer merely theoretical, it’s now a requirement that organizations must adopt. A