China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Families

21/03/2025 0 Comments 0 tags

The China-linked advanced persistent threat (APT) group. known as Aquatic Panda has been linked to a “global espionage campaign” that took place in 2022 targeting seven organizations. These entities include

10 Critical Network Pentest Findings IT Teams Overlook

21/03/2025 0 Comments 0 tags

After conducting over 10,000 automated internal network penetration tests last year, vPenTest has uncovered a troubling reality that many businesses still have critical security gaps that attackers can easily exploit.

Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates

21/03/2025 0 Comments 0 tags

The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a bring your own vulnerable driver (BYOVD) attack designed

Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility

21/03/2025 0 Comments 0 tags

Two now-patched security flaws impacting Cisco Smart Licensing Utility are seeing active exploitation attempts, according to SANS Internet Storm Center. The two critical-rated vulnerabilities in question are listed below – 

YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users

20/03/2025 0 Comments 0 tags

YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russian-speaking users. “What’s intriguing about this malware is how much it

CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation

20/03/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw impacting NAKIVO Backup & Replication software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of

Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers

20/03/2025 0 Comments 0 tags

Regulatory compliance is no longer just a concern for large enterprises. Small and mid-sized businesses (SMBs) are increasingly subject to strict data protection and security regulations, such as HIPAA, PCI-DSS,

Six Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest Data

20/03/2025 0 Comments 0 tags

The governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore are likely customers of spyware developed by Israeli company Paragon Solutions, according to a new report from The Citizen Lab.

How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model

20/03/2025 0 Comments 0 tags

Cybersecurity isn’t just another checkbox on your business agenda. It’s a fundamental pillar of survival. As organizations increasingly migrate their operations to the cloud, understanding how to protect your digital

Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems

20/03/2025 0 Comments 0 tags

Veeam has released security updates to address a critical security flaw impacting its Backup & Replication software that could lead to remote code execution. The vulnerability, tracked as CVE-2025-23120, carries