Pen Testing for Compliance Only? It’s Time to Change Your Approach

15/05/2025 0 Comments 0 tags

Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance. In February, your development team deployed a routine software update. By April, attackers

Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper

15/05/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as an operating system information utility to stealthily drop a next-stage payload onto compromised systems. “This campaign employs

Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

15/05/2025 0 Comments 0 tags

A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon, and Zimbra via cross-site scripting (XSS) vulnerabilities, including a then-zero-day

5 BCDR Essentials for Effective Ransomware Defense

15/05/2025 0 Comments 0 tags

Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even legitimate IT tools to infiltrate networks and

New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

15/05/2025 0 Comments 0 tags

Google on Wednesday released updates to address four security issues in its Chrome web browser, including one for which it said there exists an exploit in the wild. The high-severity

Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering

14/05/2025 0 Comments 0 tags

A Chinese-language, Telegram-based marketplace called Xinbi Guarantee has facilitated no less than $8.4 billion in transactions since 2022, making it the second major black market to be exposed after HuiOne

BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

14/05/2025 0 Comments 0 tags

At least two different cybercrime groups BianLian and RansomExx are said to have exploited a recently disclosed security flaw in SAP NetWeaver, indicating that multiple threat actors are taking advantage

Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit

14/05/2025 0 Comments 0 tags

Samsung has released software updates to address a critical security flaw in MagicINFO 9 Server that has been actively exploited in the wild. The vulnerability, tracked as CVE-2025-4632 (CVSS score:

CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users

14/05/2025 0 Comments 0 tags

A new global phishing threat called “Meta Mirage” has been uncovered, targeting businesses using Meta’s Business Suite. This campaign specifically aims at hijacking high-value accounts, including those managing advertising and

Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails

14/05/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a new phishing campaign that’s being used to distribute malware called Horabot targeting Windows users in Latin American countries like Mexico, Guatemala, Colombia, Peru, Chile, and