CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems

30/09/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting the Sudo command-line utility for Linux and Unix-like operating systems to its Known Exploited

EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations

29/09/2025 0 Comments 0 tags

Threat actors have been observed using seemingly legitimate artificial intelligence (AI) tools and software to sneakily slip malware for future attacks on organizations worldwide. According to Trend Micro, the campaign

⚡ Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More

29/09/2025 0 Comments 0 tags

Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden software bugs to massive DDoS attacks and new ransomware tricks, this

The State of AI in the SOC 2025 – Insights from Recent Study 

29/09/2025 0 Comments 0 tags

Security leaders are embracing AI for triage, detection engineering, and threat hunting as alert volumes and burnout hit breaking points. A comprehensive survey of 282 security leaders at companies across

First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package

29/09/2025 0 Comments 0 tags

Cybersecurity researchers have discovered what has been described as the first-ever instance of a Model Context Protocol (MCP) server spotted in the wild, raising software supply chain risks. According to

Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security

29/09/2025 0 Comments 0 tags

Microsoft is calling attention to a new phishing campaign primarily aimed at U.S.-based organizations that has likely utilized code generated using large language models (LLMs) to obfuscate payloads and evade

China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks

27/09/2025 0 Comments 0 tags

Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing campaign distributing a new variant of a known malware called PlugX (aka

Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam

26/09/2025 0 Comments 0 tags

A new campaign has been observed impersonating Ukrainian government agencies in phishing attacks to deliver CountLoader, which is then used to drop Amatera Stealer and PureMiner. “The phishing emails contain

New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks

26/09/2025 0 Comments 0 tags

The Russian advanced persistent threat (APT) group known as COLDRIVER has been attributed to a fresh round of ClickFix-style attacks designed to deliver two new “lightweight” malware families tracked as

Crash Tests for Security: Why BAS Is Proof of Defense, Not Assumptions

26/09/2025 0 Comments 0 tags

Car makers don’t trust blueprints. They smash prototypes into walls. Again and again. In controlled conditions. Because design specs don’t prove survival. Crash tests do. They separate theory from reality.