DarkWatchman, Sheriff Malware Hit Russia and Ukraine with Stealth and Nation-Grade Tactics

01/05/2025 0 Comments 0 tags

Russian companies have been targeted as part of a large-scale phishing campaign that’s designed to deliver a known malware called DarkWatchman. Targets of the attacks include entities in the media,

New Research Reveals: 95% of AppSec Fixes Don’t Reduce Risk

01/05/2025 0 Comments 0 tags

For over a decade, application security teams have faced a brutal irony: the more advanced the detection tools became, the less useful their results proved to be. As alerts from

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign

01/05/2025 0 Comments 0 tags

Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its Claude chatbot for an “influence-as-a-service” operation to engage with authentic accounts across Facebook and X. The sophisticated

Why top SOC teams are shifting to Network Detection and Response

01/05/2025 0 Comments 0 tags

Security Operations Center (SOC) teams are facing a fundamentally new challenge — traditional cybersecurity tools are failing to detect advanced adversaries who have become experts at evading endpoint-based defenses and

Commvault Confirms Hackers Exploited CVE-2025-3928 as Zero-Day in Azure Breach

01/05/2025 0 Comments 0 tags

Enterprise data backup platform Commvault has revealed that an unknown nation-state threat actor breached its Microsoft Azure environment by exploiting CVE-2025-3928 but emphasized there is no evidence of unauthorized data

SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models

01/05/2025 0 Comments 0 tags

SonicWall has revealed that two now-patched security flaws impacting its SMA100 Secure Mobile Access (SMA) appliances have been exploited in the wild. The vulnerabilities in question are listed below –

Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

30/04/2025 0 Comments 0 tags

As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has found how techniques that render the Model Context Protocol (MCP) susceptible to prompt

Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks

30/04/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a Russian-speaking cyber espionage group called Nebulous Mantis that has deployed a remote access trojan called RomCom RAT since mid-2022. RomCom “employs advanced evasion

Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool

30/04/2025 0 Comments 0 tags

A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool called Spellbinder that can facilitate adversary-in-the-middle (AitM) attacks. “Spellbinder enables adversary-in-the-middle (AitM) attacks,

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

30/04/2025 0 Comments 0 tags

How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore. Today’s attackers don’t need to “hack” in—they can trick their way in. Deepfakes, impersonation scams,