[Webinar] Learn How Leading Security Teams Reduce Attack Surface Exposure with DASR

12/11/2025 0 Comments 0 tags

Every day, security teams face the same problem—too many risks, too many alerts, and not enough time. You fix one issue, and three more show up. It feels like you’re

Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack

12/11/2025 0 Comments 0 tags

Microsoft on Tuesday released patches for 63 new security vulnerabilities identified in its software, including one that has come under active exploitation in the wild. Of the 63 flaws, four

Active Directory Under Siege: Why Critical Infrastructure Needs Stronger Security

12/11/2025 0 Comments 0 tags

Active Directory remains the authentication backbone for over 90% of Fortune 1000 companies. AD’s importance has grown as companies adopt hybrid and cloud infrastructure, but so has its complexity. Every application,

Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy

12/11/2025 0 Comments 0 tags

Google on Tuesday unveiled a new privacy-enhancing technology called Private AI Compute to process artificial intelligence (AI) queries in a secure platform in the cloud. The company said it has

WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks

11/11/2025 0 Comments 0 tags

Threat hunters have uncovered similarities between a banking malware called Coyote and a newly disclosed malicious program dubbed Maverick that has been propagated via WhatsApp. According to a report from

GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites

11/11/2025 0 Comments 0 tags

The malware known as GootLoader has resurfaced yet again after a brief spike in activity earlier this March, according to new findings from Huntress. The cybersecurity company said it observed

CISO’s Expert Guide To AI Supply Chain Attacks

11/11/2025 0 Comments 0 tags

AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect their organizations. Download the full CISO’s expert guide

Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories

11/11/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a malicious npm package named “@acitons/artifact” that typosquats the legitimate “@actions/artifact” package with the intent to target GitHub-owned repositories. “We think the intent was to have

Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers

11/11/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that’s sold on Russian-speaking Telegram channels under a Malware-as-a-Service (MaaS) model. According to its

Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

10/11/2025 0 Comments 0 tags

Google’s Mandiant Threat Defense on Monday said it discovered n-day exploitation of a now-patched security flaw in Gladinet’s Triofox file-sharing and remote access platform. The critical vulnerability, tracked as CVE-2025-12480