Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns

02/07/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling phone numbers operated by threat actors. “A significant portion of email threats with

That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat

02/07/2025 0 Comments 0 tags

With nearly 80% of cyber threats now mimicking legitimate user behavior, how are top SOCs determining what’s legitimate traffic and what is potentially dangerous? Where do you turn when firewalls

Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale

02/07/2025 0 Comments 0 tags

Unknown threat actors have been observed weaponizing v0, a generative artificial intelligence (AI) tool from Vercel, to design fake sign-in pages that impersonate their legitimate counterparts. “This observation signals a

Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits

01/07/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a critical security vulnerability in artificial intelligence (AI) company Anthropic’s Model Context Protocol (MCP) Inspector project that could result in remote code execution (RCE) and allow

TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns

01/07/2025 0 Comments 0 tags

Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed TransferLoader. Enterprise security firm

New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status

01/07/2025 0 Comments 0 tags

A new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle the extension verification process,

A New Maturity Model for Browser Security: Closing the Last-Mile Risk

01/07/2025 0 Comments 0 tags

Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still leaving one critical layer exposed: the browser. It’s where 85% of modern work now happens.

Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation

01/07/2025 0 Comments 0 tags

Google has released security updates to address a vulnerability in its Chrome browser for which an exploit exists in the wild. The zero-day vulnerability, tracked as CVE-2025-6554 (CVSS score: N/A),

U.S. Arrests Key Facilitator in North Korean IT Worker Scheme, Seizes $7.74 Million

01/07/2025 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Monday announced sweeping actions targeting the North Korean information technology (IT) worker scheme, leading to the arrest of one individual and the seizure

Microsoft Removes Password Management from Authenticator App Starting August 2025

01/07/2025 0 Comments 0 tags

Microsoft has said that it’s ending support for passwords in its Authenticator app starting August 1, 2025. The changes, the company said, are part of its efforts to streamline autofill