“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access [email protected] (The Hacker News)
Several ransomware actors are using a malware called Skitnet as part of their post-exploitation efforts to steal sensitive data and establish remote control over compromised hosts. “Skitnet has been sold on underground forums like RAMP since April 2024,” Swiss cybersecurity company PRODAFT told The Hacker News. “However, since early 2025, we have observed multiple ransomware…
-
Why CTEM is the Winning Bet for CISOs in 2025 [email protected] (The Hacker News)
Continuous Threat Exposure Management (CTEM) has moved from concept to cornerstone, solidifying its role as a strategic enabler for CISOs. No longer a theoretical framework, CTEM now anchors today’s cybersecurity programs by continuously aligning security efforts with real-world risk. At the heart of CTEM is the integration of Adversarial Exposure Validation (AEV), an advanced, offensiveRead…
-
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards [email protected] (The Hacker News)
Mozilla has released security updates to address two critical security flaws in its Firefox browser that could be potentially exploited to access sensitive data or achieve code execution. The vulnerabilities, both of which were exploited as a zero-day at Pwn2Own Berlin, are listed below – CVE-2025-4918 – An out-of-bounds access vulnerability when resolving Promise objects…
-
⚡ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More [email protected] (The Hacker News)
Cybersecurity leaders aren’t just dealing with attacks—they’re also protecting trust, keeping systems running, and maintaining their organization’s reputation. This week’s developments highlight a bigger issue: as we rely more on digital tools, hidden weaknesses can quietly grow. Just fixing problems isn’t enough anymore—resilience needs to be built into everything from the ground up.Read More
-
AI model theft: Risk and mitigation in the digital era
Enterprises are spending big bucks on developing and training proprietary AI models. But cybercriminals are also eyeing this valuable intellectual property.Read More
-
What is compliance risk?
Compliance risk is an organization’s potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.Read More
-
What is a firewall and why do I need one?
A firewall is a network security device that prevents unauthorized access to a network by inspecting incoming and outgoing traffic using a set of predetermined security rules.Read More
-
What is Universal 2nd Factor (U2F)?
Universal 2nd Factor (U2F) is a physical device that can act as a form of authentication for an account.Read More
-
News brief: Patch critical SAP, Samsung and chat app flaws now
Check out the latest security news from the Informa TechTarget team.Read More
-
New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors [email protected] (The Hacker News)
Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry, as well as technology companies and educational institutions in China. “Over the past few months, it has expanded aggressively, continuously leveraging infected devices to launch external attacks,” NSFOCUS said in a report…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova