Cybersecurity
-
NIST Just Rewrote the Password Rulebook—And Your Adversaries Are Paying Attention
Read more: NIST Just Rewrote the Password Rulebook—And Your Adversaries Are Paying AttentionYour password policy is broken. Not because you didn’t try, but because for decades, we’ve all been following rules that…
-
Scattered Lapsus$ Hunters
Source: Palo Alto Networks Unit 42Read more: Scattered Lapsus$ HuntersOrganizations should be aware of the activities of the Scattered Lapsus$ cybercriminal alliance, which is targeting the retail and hospitality…
-
1Password Addresses Critical AI Browser Agent Security Gap
Source: Dark ReadingRead more: 1Password Addresses Critical AI Browser Agent Security Gap1Password aims to address security vulnerabilities associated with AI browser agents used in enterprises. The rise of these agents brings…
-
Hackers Exploiting Zero-Day in Gladinet File Sharing Software
Source: BleepingComputerRead more: Hackers Exploiting Zero-Day in Gladinet File Sharing SoftwareThreat actors are actively exploiting a zero-day vulnerability identified as CVE-2025-11371 in Gladinet CentreStack and Triofox products. This vulnerability allows…
-
Russian Spyware ClayRat Spreading Quickly
Source: CyberScoopRead more: Russian Spyware ClayRat Spreading QuicklyZimperium researchers have reported the rapid spread of ClayRat, an Android spyware, across Russia, camouflaged as popular apps. It poses…
-
Dems introduce bill to halt mass voter roll purges
Source: CyberScoopRead more: Dems introduce bill to halt mass voter roll purgesDemocrats have proposed legislation to prevent states from mass purging voters under questionable circumstances. The Voter Purge Protection Act raises…
-
Apple Expands Bug Bounty Program
Source: BleepingComputerRead more: Apple Expands Bug Bounty ProgramApple has announced significant changes to its bug bounty program, doubling maximum payouts and adding new research categories. The program…
-
Ransomware in Manufacturing
Source: Dark ReadingRead more: Ransomware in ManufacturingRansomware gangs increasingly target the manufacturing sector, prompting companies to enhance their security measures. Key among these measures is the…
-
Massive DDoS Attacks from Aisuru Botnet
Source: Krebs on SecurityRead more: Massive DDoS Attacks from Aisuru BotnetThe Aisuru botnet, drawing power from compromised IoT devices in the U.S., has executed record-breaking DDoS attacks, surpassing 29 Tbps.…
-
ShinyHunters Feds Shut Down Salesforce Extortion Site
Source: Dark ReadingRead more: ShinyHunters Feds Shut Down Salesforce Extortion SiteThe ShinyHunters group continues to issue extortion threats against Salesforce victims even after law enforcement has shuttered their site. Imminent…









