Email Security Is Stuck in the Antivirus Era: Why It Needs a Modern Approach

28/07/2025 0 Comments 0 tags

Picture this: you’ve hardened every laptop in your fleet with real‑time telemetry, rapid isolation, and automated rollback. But the corporate mailbox—the front door for most attackers—is still guarded by what

Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure

28/07/2025 0 Comments 0 tags

The notorious cybercrime group known as Scattered Spider is targeting VMware ESXi hypervisors in attacks targeting retail, airline, and transportation sectors in North America. “The group’s core tactics have remained

Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide

28/07/2025 0 Comments 0 tags

Cybersecurity researchers have discovered over a dozen security vulnerabilities impacting Tridium’s Niagara Framework that could allow an attacker on the same network to compromise the system under certain circumstances. “These

U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

25/07/2025 0 Comments 0 tags

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned a North Korean front company and three associated individuals for their involvement in the fraudulent remote information

Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files

25/07/2025 0 Comments 0 tags

The threat actor known as Patchwork has been attributed to a new spear-phishing campaign targeting Turkish defense contractors with the goal of gathering strategic intelligence. “The campaign employs a five-stage

Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor

25/07/2025 0 Comments 0 tags

Russian aerospace and defense industries have become the target of a cyber espionage campaign that delivers a backdoor called EAGLET to facilitate data exfiltration. The activity, dubbed Operation CargoTalon, has

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

25/07/2025 0 Comments 0 tags

Threat hunters have disclosed two different malware campaigns that have targeted vulnerabilities and misconfigurations across cloud environments to deliver cryptocurrency miners. The threat activity clusters have been codenamed Soco404 and

Overcoming Risks from Chinese GenAI Tool Usage

25/07/2025 0 Comments 0 tags

A recent analysis of enterprise data suggests that generative AI tools developed in China are being used extensively by employees in the US and UK, often without oversight or approval

Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems

24/07/2025 0 Comments 0 tags

Mitel has released security updates to address a critical security flaw in MiVoice MX-ONE that could allow an attacker to bypass authentication protections. “An authentication bypass vulnerability has been identified

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

24/07/2025 0 Comments 0 tags

Virtualization and networking infrastructure have been targeted by a threat actor codenamed Fire Ant as part of a prolonged cyber espionage campaign. The activity, observed this year, is primarily designed