Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands

05/06/2025 0 Comments 0 tags

The threat actor known as Bitter has been assessed to be a state-backed hacking group that’s tasked with gathering intelligence that aligns with the interests of the Indian government. That’s

Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation

05/06/2025 0 Comments 0 tags

Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the same question: what is the business

Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware

05/06/2025 0 Comments 0 tags

An Iran-aligned hacking group has been attributed to a new set of cyber attacks targeting Kurdish and Iraqi government officials in early 2024. The activity is tied to a threat

DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global Takedown

05/06/2025 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of cryptocurrency funds and about 145 clearnet and dark web domains associated with an illicit carding marketplace called BidenCash.

Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI

05/06/2025 0 Comments 0 tags

Cisco has released security patches to address a critical security flaw impacting the Identity Services Engine (ISE) that, if successfully exploited, could allow unauthenticated actors to carry out malicious actions

Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App

04/06/2025 0 Comments 0 tags

Google has disclosed details of a financially motivated threat cluster that it said “specialises” in voice phishing (aka vishing) campaigns designed to breach organizations’ Salesforce instances for large-scale data theft

Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads

04/06/2025 0 Comments 0 tags

Threat hunters are calling attention to a new variant of a remote access trojan (RAT) called Chaos RAT that has been used in recent attacks targeting Windows and Linux systems.

Your SaaS Data Isn’t Safe: Why Traditional DLP Solutions Fail in the Browser Era

04/06/2025 0 Comments 0 tags

Traditional data leakage prevention (DLP) tools aren’t keeping pace with the realities of how modern businesses use SaaS applications. Companies today rely heavily on SaaS platforms like Google Workspace, Salesforce,

Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks

04/06/2025 0 Comments 0 tags

Several malicious packages have been uncovered across the npm, Python, and Ruby package repositories that drain funds from cryptocurrency wallets, erase entire codebases after installation, and exfiltrate Telegram API tokens,

HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass

04/06/2025 0 Comments 0 tags

Hewlett Packard Enterprise (HPE) has released security updates to address as many as eight vulnerabilities in its StoreOnce data backup and deduplication solution that could result in an authentication bypass