SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws

10/09/2025 0 Comments 0 tags

SAP on Tuesday released security updates to address multiple security flaws, including three critical vulnerabilities in SAP Netweaver that could result in code execution and the upload arbitrary files. The

Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts

10/09/2025 0 Comments 0 tags

Adobe has warned of a critical security flaw in its Commerce and Magento Open Source platforms that, if successfully exploited, could allow attackers to take control of customer accounts. The

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks

09/09/2025 0 Comments 0 tags

Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft’s Direct Send feature to form a “highly efficient attack pipeline” in recent phishing campaigns, according to new

RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities

09/09/2025 0 Comments 0 tags

A new Android malware called RatOn evolved from a basic tool capable of conducting Near Field Communication (NFC) attacks to a sophisticated remote access trojan with Automated Transfer System (ATS)

[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them

09/09/2025 0 Comments 0 tags

⚠️ One click is all it takes. An engineer spins up an “experimental” AI Agent to test a workflow. A business unit connects to automate reporting. A cloud platform quietly

TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs

09/09/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks targeting exposed Docker APIs. Akamai, which discovered the latest activity last

From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks

09/09/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote access trojan called MostereRAT. The phishing attack incorporates a number of advanced evasion techniques to

How Leading CISOs are Getting Budget Approval

09/09/2025 0 Comments 0 tags

It’s budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you’re a CISO or security leader, you’ve likely found yourself explaining why your program matters, why a

20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack

09/09/2025 0 Comments 0 tags

Multiple npm packages have been compromised as part of a software supply chain attack after a maintainer’s account was compromised in a phishing attack. The attack targeted Josh Junon (aka

45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage

09/09/2025 0 Comments 0 tags

Threat hunters have discovered a set of previously unreported domains, some going back to May 2020, that are associated with China-linked threat actors Salt Typhoon and UNC4841. “The domains date