Cybersecurity
-
New Rust-Based Malware ChaosBot
Source: The Hacker NewsRead more: New Rust-Based Malware ChaosBotResearchers have revealed a new backdoor called ChaosBot, developed in Rust, enabling threat actors to execute commands on compromised hosts.…
-
CIO100 and CSO30 ASEAN 2025 Team Awards Finalists: Celebrating Technology and Cybersecurity Excellence Across the Southeast Asia region
Source: CIO MagazineRead more: CIO100 and CSO30 ASEAN 2025 Team Awards Finalists: Celebrating Technology and Cybersecurity Excellence Across the Southeast Asia regionThe CIO100 and CSO30 ASEAN Awards announce finalists recognized for technology and cybersecurity innovations. Celebrating six categories, the awards aim…
-
Utilizing AI in the IT Procurement Process from RFP to Contract Review
Source: CIO MagazineRead more: Utilizing AI in the IT Procurement Process from RFP to Contract ReviewCIOs are increasingly relying on AI in IT purchasing decisions, with over 80% using it for information gathering. AI’s application…
-
New Oracle E-Business Suite Security Flaw
Source: The Hacker NewsRead more: New Oracle E-Business Suite Security FlawOracle issued a security alert for a new vulnerability in its E-Business Suite, allowing unauthorized data access. The flaw, tracked…
-
Fake Inflation Refund Texts Target New Yorkers in New Scam
Source: BleepingComputerRead more: Fake Inflation Refund Texts Target New Yorkers in New ScamNew Yorkers are being targeted by a smishing campaign posing as the Department of Taxation and Finance, offering fraudulent ‘Inflation…
-
Wireshark Release 4.4.10 Fixes Vulnerabilities
Source: SANS Internet Storm CenterRead more: Wireshark Release 4.4.10 Fixes VulnerabilitiesThe release of Wireshark version 4.4.10 addresses six bugs and one vulnerability within the MONGO dissector. Users are encouraged to…
-
Experts Warn of Widespread SonicWall Compromises
Source: The Hacker NewsRead more: Experts Warn of Widespread SonicWall CompromisesHuntress warns of a widespread compromise of SonicWall SSL VPN devices allowing access to multiple customer environments. Attackers are rapidly…
-
Threat Actors Abuse Velociraptor DFIR Tool
Source: The Hacker NewsRead more: Threat Actors Abuse Velociraptor DFIR ToolThreat actors are misusing the Velociraptor DFIR tool in ransomware attacks linked to the Storm-2603 group, known for its use…
-
NIST Just Rewrote the Password Rulebook—And Your Adversaries Are Paying Attention
Read more: NIST Just Rewrote the Password Rulebook—And Your Adversaries Are Paying AttentionYour password policy is broken. Not because you didn’t try, but because for decades, we’ve all been following rules that…
-
Scattered Lapsus$ Hunters
Source: Palo Alto Networks Unit 42Read more: Scattered Lapsus$ HuntersOrganizations should be aware of the activities of the Scattered Lapsus$ cybercriminal alliance, which is targeting the retail and hospitality…








