Skip to content
Critical Security Alert
- Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials — A flaw in Cisco Unified Communications Manager could allow an attacker to gain root access. Read more
Threat Intelligence
- Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms — A Chinese hacking group exploited zero-day vulnerabilities in Ivanti Cloud Services Appliance (CSA) to target governmental, telecommunications, media, finance, and transport sectors in France. Read more
- Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets — Researchers discovered over 40 malicious Firefox extensions designed to steal cryptocurrency wallet secrets from platforms like Coinbase and MetaMask. Read more
- Attackers Impersonate Top Brands in Callback Phishing — Threat actors are impersonating brands like Microsoft and PayPal in socially engineered scams to trick victims into calling adversary-controlled phone numbers. Read more
- Criminals Sending QR Codes in Phishing, Malware Campaigns — Attackers are increasingly using QR codes to conduct phishing attacks and trick users into downloading malware. Read more
Security Breaches & Incidents
- Big Tech's Mixed Response to U.S. Treasury Sanctions — U.S. government sanctioned a Chinese national for operating a cloud provider linked to virtual currency investment scams, but tech companies still allow them to operate accounts. Read more
- Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams — A mobile ad fraud operation, IconAds, consisting of 352 Android apps, has been disrupted for loading out-of-context ads and hiding app icons. Read more
Security Tools & Best Practices
- New Cyber Blueprint Aims to Guide Organizations on AI Journey — Deloitte's new blueprint aims to bridge the gap between AI adoption and preparedness among leaders and employees. Read more
- IDE Extensions Pose Hidden Risks to Software Supply Chain — Malicious extensions can bypass verification checks in popular integrated development environments, posing risks to the software supply chain. Read more
Emerging Security Technologies
- The Hidden Weaknesses in AI SOC Tools that No One Talks About — Many AI-powered SOC platforms rely on pre-trained AI models that may not be suitable for modern security operations. Read more