Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems

06/08/2025 0 Comments 0 tags

Trend Micro has released mitigations to address critical security flaws in on-premise versions of Apex One Management Console that it said have been exploited in the wild. The vulnerabilities (CVE-2025-54948

CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures

06/08/2025 0 Comments 0 tags

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks carried out by a threat actor called UAC-0099 targeting government agencies, the defense forces, and enterprises of

CISA Adds 3 D-Link Router Flaws to KEV Catalog After Active Exploitation Reports

06/08/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three old security flaws impacting D-Link routers to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active

AI Is Transforming Cybersecurity Adversarial Testing – Pentera Founder’s Vision

06/08/2025 0 Comments 0 tags

When Technology Resets the Playing Field In 2015 I founded a cybersecurity testing software company with the belief that automated penetration testing was not only possible, but necessary. At the

ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections

05/08/2025 0 Comments 0 tags

A combination of propagation methods, narrative sophistication, and evasion techniques enabled the social engineering tactic known as ClickFix to take off the way it did over the past year, according

Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild

05/08/2025 0 Comments 0 tags

Google has released security updates to address multiple security flaws in Android, including fixes for two Qualcomm bugs that were flagged as actively exploited in the wild. The vulnerabilities include

Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval

05/08/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a high-severity security flaw in the artificial intelligence (AI)-powered code editor Cursor that could result in remote code execution. The vulnerability, tracked as CVE-2025-54136 (CVSS score:

Misconfigurations Are Not Vulnerabilities: The Costly Confusion Behind Security Risks

05/08/2025 0 Comments 0 tags

In SaaS security conversations, “misconfiguration” and “vulnerability” are often used interchangeably. But they’re not the same thing. And misunderstanding that distinction can quietly create real exposure. This confusion isn’t just

How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents

05/08/2025 0 Comments 0 tags

Why do SOC teams still drown in alerts even after spending big on security tools? False positives pile up, stealthy threats slip through, and critical incidents get buried in the

15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign

05/08/2025 0 Comments 0 tags

Cybersecurity researchers have lifted the veil on a widespread malicious campaign that’s targeting TikTok Shop users globally with an aim to steal credentials and distribute trojanized apps. “Threat actors are