Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month

13/06/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to a “large-scale campaign” that has been observed compromising legitimate websites with malicious JavaScript injections. According to Palo Alto Networks Unit 42, these malicious injects

Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion

13/06/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday disclosed that ransomware actors are targeting unpatched SimpleHelp Remote Monitoring and Management (RMM) instances to compromise customers of an unnamed

CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk

13/06/2025 0 Comments 0 tags

Introduction: Security at a Tipping Point Security Operations Centers (SOCs) were built for a different era, one defined by perimeter-based thinking, known threats, and manageable alert volumes. But today’s threat

Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

13/06/2025 0 Comments 0 tags

Apple has disclosed that a now-patched security flaw present in its Messages app was actively exploited in the wild to target civil society members in sophisticated cyber attacks. The vulnerability,

WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network

12/06/2025 0 Comments 0 tags

The threat actors behind the VexTrio Viper Traffic Distribution Service (TDS) have been linked to other TDS services like Help TDS and Disposable TDS, indicating that the sophisticated cybercriminal operation

New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes

12/06/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a novel attack technique called TokenBreak that can be used to bypass a large language model’s (LLM) safety and content moderation guardrails with just a single

AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

12/06/2025 0 Comments 0 tags

AI is changing everything — from how we code, to how we sell, to how we secure. But while most conversations focus on what AI can do, this one focuses

Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction

12/06/2025 0 Comments 0 tags

A novel attack technique named EchoLeak has been characterized as a “zero-click” artificial intelligence (AI) vulnerability that allows bad actors to exfiltrate sensitive data from Microsoft 365 Copilot’s context sans

Non-Human Identities: How to Address the Expanding Security Risk

12/06/2025 0 Comments 0 tags

Human identities management and control is pretty well done with its set of dedicated tools, frameworks, and best practices. This is a very different world when it comes to Non-human

ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

12/06/2025 0 Comments 0 tags

ConnectWise has disclosed that it’s planning to rotate the digital code signing certificates used to sign ScreenConnect, ConnectWise Automate, and ConnectWise remote monitoring and management (RMM) executables due to security