⚡ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More

19/05/2025 0 Comments 0 tags

Cybersecurity leaders aren’t just dealing with attacks—they’re also protecting trust, keeping systems running, and maintaining their organization’s reputation. This week’s developments highlight a bigger issue: as we rely more on

Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards

19/05/2025 0 Comments 0 tags

Mozilla has released security updates to address two critical security flaws in its Firefox browser that could be potentially exploited to access sensitive data or achieve code execution. The vulnerabilities,

Why CTEM is the Winning Bet for CISOs in 2025

19/05/2025 0 Comments 0 tags

Continuous Threat Exposure Management (CTEM) has moved from concept to cornerstone, solidifying its role as a strategic enabler for CISOs. No longer a theoretical framework, CTEM now anchors today’s cybersecurity

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors

16/05/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry, as well as technology companies and educational

Top 10 Best Practices for Effective Data Protection

16/05/2025 0 Comments 0 tags

Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly and data privacy regulations tightening, organizations must stay vigilant and

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

16/05/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT. “Threat actors delivered

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

16/05/2025 0 Comments 0 tags

Researchers at ETH Zürich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data from memory, showing that the

[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

16/05/2025 0 Comments 0 tags

Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

15/05/2025 0 Comments 0 tags

Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if it proceeds with its plans

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails

15/05/2025 0 Comments 0 tags

Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data for a small subset of its customers. “Criminals targeted our customer support agents