Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025

21/02/2025 0 Comments 0 tags

In today’s rapidly evolving digital landscape, weak identity security isn’t just a flaw—it’s a major risk that can expose your business to breaches and costly downtime. Many organizations are overwhelmed

Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3

21/02/2025 0 Comments 0 tags

The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying a new version that allows prospective customers and cyber crooks to clone any brand’s legitimate website and

Data Leak Exposes TopSec’s Role in China’s Censorship-as-a-Service Operations

21/02/2025 0 Comments 0 tags

An analysis of a data leak from a Chinese cybersecurity company TopSec has revealed that it likely offers censorship-as-a-service solutions to prospective customers, including a state-owned enterprise in the country.

Apple Drops iCloud’s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands

21/02/2025 0 Comments 0 tags

Apple is removing its Advanced Data Protection (ADP) feature for iCloud from the United Kingdom with immediate effect following government demands for backdoor access to encrypted user data. The development

CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks

21/02/2025 0 Comments 0 tags

A high-severity security flaw impacting the Craft content management system (CMS) has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog,

Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

21/02/2025 0 Comments 0 tags

Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware

20/02/2025 0 Comments 0 tags

Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North

Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives

20/02/2025 0 Comments 0 tags

A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. “The legitimate application

Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware

20/02/2025 0 Comments 0 tags

A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of

PCI DSS 4.0 Mandates DMARC By 31st March 2025

20/02/2025 0 Comments 0 tags

The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025, DMARC implementation will be mandatory! This requirement highlights the