Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks

03/11/2025 0 Comments 0 tags

Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and management (RMM) software for financial gain and ultimately

⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

03/11/2025 0 Comments 0 tags

Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems—some just hours after being found.

The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations

03/11/2025 0 Comments 0 tags

Security Operations Centers (SOC) today are overwhelmed. Analysts handle thousands of alerts every day, spending much time chasing false positives and adjusting detection rules reactively. SOCs often lack the environmental

Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data

03/11/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting sensitive data from compromised devices. According to CYFIRMA, which analyzed three

New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea

03/11/2025 0 Comments 0 tags

The North Korea-linked threat actor known as Kimsuky has distributed a previously undocumented backdoor codenamed HttpTroy as part of a likely spear-phishing attack targeting a single victim in South Korea.

ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

01/11/2025 0 Comments 0 tags

The Australian Signals Directorate (ASD) has issued a bulletin about ongoing cyber attacks targeting unpatched Cisco IOS XE devices in the country with a previously undocumented implant known as BADCANDY.

OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically

31/10/2025 0 Comments 0 tags

OpenAI has announced the launch of an “agentic security researcher” that’s powered by its GPT-5 large language model (LLM) and is programmed to emulate a human expert capable of scanning,

Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

31/10/2025 0 Comments 0 tags

A suspected nation-state threat actor has been linked to the distribution of a new malware called Airstalk as part of a likely supply chain attack. Palo Alto Networks Unit 42

China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats

31/10/2025 0 Comments 0 tags

A China-affiliated threat actor known as UNC6384 has been linked to a fresh set of attacks exploiting an unpatched Windows shortcut vulnerability to target European diplomatic and government entities between

China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems

31/10/2025 0 Comments 0 tags

The exploitation of a recently disclosed critical security flaw in Motex Lanscope Endpoint Manager has been attributed to a cyber espionage group known as Tick. The vulnerability, tracked as CVE-2025-61932