Lean Teams, Higher Stakes: Why CISOs Must Rethink Incident Remediation

23/09/2025 0 Comments 0 tags

Big companies are getting smaller, and their CEOs want everyone to know it. Wells Fargo has cut its workforce by 23% over five years, Bank of America has shed 88,000

ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service

23/09/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new botnet that customers can rent access to conduct distributed denial-of-service (DDoS) attacks against targets of interest. The ShadowV2 botnet, according to Darktrace,

GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security

23/09/2025 0 Comments 0 tags

GitHub on Monday announced that it will be changing its authentication and publishing options “in the near future” in response to a recent wave of supply chain attacks targeting the

BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells

23/09/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to a search engine optimization (SEO) poisoning campaign likely undertaken by a Chinese-speaking threat actor using a malware called BadIIS in attacks targeting East and

ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks

22/09/2025 0 Comments 0 tags

Organizations in Belarus, Kazakhstan, and Russia have emerged as the target of a phishing campaign undertaken by a previously undocumented hacking group called ComicForm since at least April 2025. The

⚡ Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More

22/09/2025 0 Comments 0 tags

The security landscape now moves at a pace no patch cycle can match. Attackers aren’t waiting for quarterly updates or monthly fixes—they adapt within hours, blending fresh techniques with old,

How to Gain Control of AI Agents and Non-Human Identities

22/09/2025 0 Comments 0 tags

We hear this a lot: “We’ve got hundreds of service accounts and AI agents running in the background. We didn’t create most of them. We don’t know who owns them.

Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants

22/09/2025 0 Comments 0 tags

A critical token validation failure in Microsoft Entra ID (previously Azure Active Directory) could have allowed attackers to impersonate any user, including Global Administrators, across any tenant. The vulnerability, tracked

DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams

21/09/2025 0 Comments 0 tags

Threat actors with ties to the Democratic People’s Republic of Korea (aka DPRK or North Korea) have been observed leveraging ClickFix-style lures to deliver a known malware called BeaverTail and

LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer

20/09/2025 0 Comments 0 tags

LastPass is warning of an ongoing, widespread information stealer campaign targeting Apple macOS users through fake GitHub repositories that distribute malware-laced programs masquerading as legitimate tools. “In the case of