CTEM vs ASM vs Vulnerability Management: What Security Leaders Need to Know in 2025

17/07/2025 0 Comments 0 tags

The modern-day threat landscape requires enterprise security teams to think and act beyond traditional cybersecurity measures that are purely passive and reactive, and in most cases, ineffective against emerging threats

Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine

17/07/2025 0 Comments 0 tags

An international operation coordinated by Europol has disrupted the infrastructure of a pro-Russian hacktivist group known as NoName057(16) that has been linked to a string of distributed denial-of-service (DDoS) attacks

Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors

17/07/2025 0 Comments 0 tags

The Taiwanese semiconductor industry has become the target of spear-phishing campaigns undertaken by three Chinese state-sponsored threat actors. “Targets of these campaigns ranged from organizations involved in the manufacturing, design,

Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code

17/07/2025 0 Comments 0 tags

Cisco has disclosed a new maximum-severity security vulnerability impacting Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) that could permit an attacker to execute arbitrary code on

Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms

16/07/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a new variant of a known malware loader called Matanbuchus that packs in significant features to enhance its stealth and evade detection. Matanbuchus is the name

UNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit

16/07/2025 0 Comments 0 tags

A threat activity cluster has been observed targeting fully-patched end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances as part of a campaign designed to drop a backdoor called OVERSTEP.

AI Agents Act Like Employees With Root Access—Here’s How to Regain Control

16/07/2025 0 Comments 0 tags

The AI gold rush is on. But without identity-first security, every deployment becomes an open door. Most organizations secure native AI like a web app, but it behaves more like

Critical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access

16/07/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed what they say is a “critical design flaw” in delegated Managed Service Accounts (dMSAs) introduced in Windows Server 2025. “The flaw can result in high-impact attacks,

New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code

16/07/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a new, sophisticated variant of a known Android malware referred to as Konfety that leverages the evil twin technique to enable ad fraud. The sneaky approach

Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild

16/07/2025 0 Comments 0 tags

Google on Tuesday rolled out fixes for six security issues in its Chrome web browser, including one that it said has been exploited in the wild. The high-severity vulnerability in