Between Buzz and Reality: The CTEM Conversation We All Need

24/06/2025 0 Comments 0 tags

I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn’t have asked for a better kickoff panel: three cybersecurity

Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network

24/06/2025 0 Comments 0 tags

Misconfigured Docker instances are the target of a campaign that employs the Tor anonymity network to stealthily mine cryptocurrency in susceptible environments. “Attackers are exploiting misconfigured Docker APIs to gain

U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

24/06/2025 0 Comments 0 tags

The U.S. House of Representatives has formally banned congressional staff members from using WhatsApp on government-issued devices, citing security concerns. The development was first reported by Axios. The decision, according

APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

24/06/2025 0 Comments 0 tags

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new cyber attack campaign by the Russia-linked APT28 (aka UAC-0001) threat actors using Signal chat messages to deliver

China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

24/06/2025 0 Comments 0 tags

The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory warning of cyber attacks mounted by the China-linked Salt Typhoon actors to

Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content

23/06/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to a new jailbreaking method called Echo Chamber that could be leveraged to trick popular large language models (LLMs) into generating undesirable responses, irrespective of

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

23/06/2025 0 Comments 0 tags

The United States government has warned of cyber attacks mounted by pro-Iranian groups after it launched airstrikes on Iranian nuclear sites as part of the Iran–Israel war that commenced on

XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks

23/06/2025 0 Comments 0 tags

Cybersecurity researchers have uncovered a Go-based malware called XDigo that has been used in attacks targeting Eastern European governmental entities in March 2025. The attack chains are said to have

How AI-Enabled Workflow Automation Can Help SOCs Reduce Burnout

23/06/2025 0 Comments 0 tags

It sure is a hard time to be a SOC analyst. Every day, they are expected to solve high-consequence problems with half the data and twice the pressure. Analysts are

Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks

23/06/2025 0 Comments 0 tags

Google has revealed the various safety measures that are being incorporated into its generative artificial intelligence (AI) systems to mitigate emerging attack vectors like indirect prompt injections and improve the