Active Directory Under Siege: Why Critical Infrastructure Needs Stronger Security

12/11/2025 0 Comments 0 tags

Active Directory remains the authentication backbone for over 90% of Fortune 1000 companies. AD’s importance has grown as companies adopt hybrid and cloud infrastructure, but so has its complexity. Every application,

Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy

12/11/2025 0 Comments 0 tags

Google on Tuesday unveiled a new privacy-enhancing technology called Private AI Compute to process artificial intelligence (AI) queries in a secure platform in the cloud. The company said it has

WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks

11/11/2025 0 Comments 0 tags

Threat hunters have uncovered similarities between a banking malware called Coyote and a newly disclosed malicious program dubbed Maverick that has been propagated via WhatsApp. According to a report from

GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites

11/11/2025 0 Comments 0 tags

The malware known as GootLoader has resurfaced yet again after a brief spike in activity earlier this March, according to new findings from Huntress. The cybersecurity company said it observed

Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers

11/11/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that’s sold on Russian-speaking Telegram channels under a Malware-as-a-Service (MaaS) model. According to its

Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories

11/11/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a malicious npm package named “@acitons/artifact” that typosquats the legitimate “@actions/artifact” package with the intent to target GitHub-owned repositories. “We think the intent was to have

CISO’s Expert Guide To AI Supply Chain Attacks

11/11/2025 0 Comments 0 tags

AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect their organizations. Download the full CISO’s expert guide

Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon

10/11/2025 0 Comments 0 tags

The North Korea-affiliated threat actor known as Konni (aka Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia) has been attributed to a new set of attacks targeting both Android and

Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

10/11/2025 0 Comments 0 tags

Google’s Mandiant Threat Defense on Monday said it discovered n-day exploitation of a now-patched security flaw in Gladinet’s Triofox file-sharing and remote access platform. The critical vulnerability, tracked as CVE-2025-12480

New Browser Security Report Reveals Emerging Threats for Enterprises

10/11/2025 0 Comments 0 tags

According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge in a single place, the user’s browser. Yet traditional controls