U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

23/05/2025 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with DanaBot (aka DanaTools) and unsealed charges against 16 individuals for their alleged involvement

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

22/05/2025 0 Comments 0 tags

A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the exploitation of a now-patched remote-code-execution vulnerability in Trimble Cityworks to deliver Cobalt Strike and VShell. “UAT-6382 successfully exploited

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

22/05/2025 0 Comments 0 tags

Cybersecurity researchers have uncovered multiple critical security vulnerabilities impacting the Versa Concerto network security and SD-WAN orchestration platform that could be exploited to take control of susceptible instances. It’s worth

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

22/05/2025 0 Comments 0 tags

It’s not enough to be secure. In today’s legal climate, you need to prove it. Whether you’re protecting a small company or managing compliance across a global enterprise, one thing

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

22/05/2025 0 Comments 0 tags

A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM) software has been exploited by a China-nexus threat actor to target a wide range of sectors across

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

22/05/2025 0 Comments 0 tags

A privilege escalation flaw has been demonstrated in Windows Server 2025 that makes it possible for attackers to compromise any user in Active Directory (AD). “The attack exploits the delegated

Identity Security Has an Automation Problem—And It’s Bigger Than You Think

22/05/2025 0 Comments 0 tags

For many organizations, identity security appears to be under control. On paper, everything checks out. But new research from Cerby, based on insights from over 500 IT and security leaders,

FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections

22/05/2025 0 Comments 0 tags

A sprawling operation undertaken by global law enforcement agencies and a consortium of private sector firms has disrupted the online infrastructure associated with a commodity information stealer known as Lumma

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics

21/05/2025 0 Comments 0 tags

Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 2022. The activity has been assessed to be orchestrated by APT28

PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms

21/05/2025 0 Comments 0 tags

Russian organizations have become the target of a phishing campaign that distributes malware called PureRAT, according to new findings from Kaspersky. “The campaign aimed at Russian business began back in