How does a company defend itself from cyberattacks by a foreign adversary? A collection of experts gathered at this year’s RSAC Conference to explain how the US can help. Go to Source Author: Becky Bracken
Category Archives: Uncategorized
The current offline/open source model boom is unstoppable. Its impact depends on how well the risks are managed today. Go to Source Author: Pascal Geenens
A spear-phishing campaign sent Trojanized versions of legitimate word-processing software to members of the World Uyghur Congress as part of China’s continued cyber-espionage activity against the ethnic minority. Go to Source Author: Elizabeth Montalbano, Contributing Writer
Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure and some of its high-value customers. “We first became aware of this threat cluster during a 2024 intrusion conducted against an organization previously providing hardware logistics services for SentinelOne employees,” security Go to Source Author:
Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying threats – all while keeping productivity high. Microsoft 365 Copilot promises to boost productivity by turning natural language prompts into actions. Employees can generate reports, comb through data, or get instant answers just by asking […]
Google has revealed that it observed 75 zero-day vulnerabilities exploited in the wild in 2024, down from 98 in 2023. Of the 75 zero-days, 44% of them targeted enterprise products. As many as 20 flaws were identified in security software and appliances. “Zero-day exploitation of browsers and mobile devices fell drastically, decreasing by about a […]
The number of vulnerabilities exploited by attacks may not be growing these days, but they are increasingly affecting enterprise technologies. Go to Source Author: Nate Nelson, Contributing Writer
In a new campaign detected in March 2025, senior members of the World Uyghur Congress (WUC) living in exile have been targeted by a Windows-based malware that’s capable of conducting surveillance. The spear-phishing campaign involved the use of a trojanized version of a legitimate open-source word processing and spell check tool called UyghurEdit++ developed to […]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws impacting Broadcom Brocade Fabric OS and Commvault Web Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabilities in question are listed below – CVE-2025-1976 (CVSS score: 8.6) – A code injection […]
CVE-2025-31324 is a maximum severity bug that attackers exploited weeks before SAP released a patch for it. Go to Source Author: Jai Vijayan, Contributing Writer
