“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks [email protected] (The Hacker News)
A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM) software has been exploited by a China-nexus threat actor to target a wide range of sectors across Europe, North America, and the Asia-Pacific region. The vulnerabilities, tracked as CVE-2025-4427 (CVSS score: 5.3) and CVE-2025-4428 (CVSS score: 7.2), could be chained to execute…
-
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks [email protected] (The Hacker News)
A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM) software has been exploited by a China-nexus threat actor to target a wide range of sectors across Europe, North America, and the Asia-Pacific region. The vulnerabilities, tracked as CVE-2025-4427 (CVSS score: 5.3) and CVE-2025-4428 (CVSS score: 7.2), could be chained to execute…
-
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program [email protected] (The Hacker News)
It’s not enough to be secure. In today’s legal climate, you need to prove it. Whether you’re protecting a small company or managing compliance across a global enterprise, one thing is clear: cybersecurity can no longer be left to guesswork, vague frameworks, or best-effort intentions. Regulators and courts are now holding organizations accountable for how…
-
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host [email protected] (The Hacker News)
Cybersecurity researchers have uncovered multiple critical security vulnerabilities impacting the Versa Concerto network security and SD-WAN orchestration platform that could be exploited to take control of susceptible instances. It’s worth noting that the identified shortcomings remain unpatched despite responsible disclosure on February 13, 2025, prompting a public release of the issuesRead More
-
Identity Security Has an Automation Problem—And It’s Bigger Than You Think [email protected] (The Hacker News)
For many organizations, identity security appears to be under control. On paper, everything checks out. But new research from Cerby, based on insights from over 500 IT and security leaders, reveals a different reality: too much still depends on people—not systems—to function. In fact, fewer than 4% of security teams have fully automated their core…
-
FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections [email protected] (The Hacker News)
A sprawling operation undertaken by global law enforcement agencies and a consortium of private sector firms has disrupted the online infrastructure associated with a commodity information stealer known as Lumma (aka LummaC or LummaC2), seizing 2,300 domains that acted as the command-and-control (C2) backbone to commandeer infected Windows systems. “Malware like LummaC2 is deployed to…
-
What is FileZilla?
FileZilla is a free, open source file transfer protocol (FTP) application that enables users to transfer files between local devices and remote servers.Read More
-
Risk appetite vs. risk tolerance: How are they different?
Risk appetite and risk tolerance are related, but they don’t mean the same thing. Not knowing the difference can cause big problems for your risk management program.Read More
-
Red Hat, HashiCorp reveal Ansible, Terraform and Vault plans
Red Hat Ansible and HashiCorp reps filled in the blanks about how infrastructure automation tools will more deeply integrate, news welcomed by financial services customers.Read More
-
Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics [email protected] (The Hacker News)
Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 2022. The activity has been assessed to be orchestrated by APT28 (aka BlueDelta, Fancy Bear, or Forest Blizzard), which is linked to the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center, Military…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova