5 Critical Questions For Adopting an AI Security Solution

06/10/2025 0 Comments 0 tags

In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security measures to protect sensitive data and ensure regulatory compliance. Among these measures, AI-SPM

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers

06/10/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that has been attributed to search engine optimization (SEO) fraud and theft of high-value credentials, configuration files, and

Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files

06/10/2025 0 Comments 0 tags

A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in cyber attacks targeting the Brazilian military. Tracked as CVE-2025-27915 (CVSS score: 5.4), the

Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks

06/10/2025 0 Comments 0 tags

Oracle has released an emergency update to address a critical security flaw in its E-Business Suite that it said has been exploited in the recent wave of Cl0p data theft

CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief

04/10/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity’s agentic AI browser Comet by embedding malicious prompts within a seemingly innocuous link to siphon sensitive data,

Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day

04/10/2025 0 Comments 0 tags

Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike in scanning activity targeting Palo Alto Networks login portals. The company said it observed a nearly 500%

Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer

03/10/2025 0 Comments 0 tags

A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That’s according to findings from Infoblox, which found the threat

Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads

03/10/2025 0 Comments 0 tags

The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship information stealer has been updated

Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL

03/10/2025 0 Comments 0 tags

Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular messaging app WhatsApp. The campaign, codenamed SORVEPOTEL by Trend Micro, weaponizes the trust

Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security

03/10/2025 0 Comments 0 tags

Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing complexity of credential storage and sharing in modern organizations. The platform