“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients [email protected] (The Hacker News)
Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure and some of its high-value customers. “We first became aware of this threat cluster during a 2024 intrusion conducted against an organization previously providing hardware logistics services for SentinelOne employees,” securityRead More
-
Product Walkthrough: Securing Microsoft Copilot with Reco [email protected] (The Hacker News)
Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying threats – all while keeping productivity high. Microsoft 365 Copilot promises to boost productivity by turning natural language prompts into actions. Employees can generate reports, comb through data, or get instant answers just by asking…
-
Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products [email protected] (The Hacker News)
Google has revealed that it observed 75 zero-day vulnerabilities exploited in the wild in 2024, down from 98 in 2023. Of the 75 zero-days, 44% of them targeted enterprise products. As many as 20 flaws were identified in security software and appliances. “Zero-day exploitation of browsers and mobile devices fell drastically, decreasing by about a…
-
RSAC Conference 2025
Follow SearchSecurity’s RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world’s biggest infosec event.Read More
-
What is an automation architect?
An automation architect is a senior IT professional responsible for the strategic design, development and governance of automation initiatives across an organization.Read More
-
Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool [email protected] (The Hacker News)
In a new campaign detected in March 2025, senior members of the World Uyghur Congress (WUC) living in exile have been targeted by a Windows-based malware that’s capable of conducting surveillance. The spear-phishing campaign involved the use of a trojanized version of a legitimate open-source word processing and spell check tool called UyghurEdit++ developed to…
-
CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database [email protected] (The Hacker News)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws impacting Broadcom Brocade Fabric OS and Commvault Web Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabilities in question are listed below – CVE-2025-1976 (CVSS score: 8.6) – A code injection…
-
How payment tokenization works and why it’s important
Payment tokenization benefits merchants and customers alike. It not only helps protect financial transaction data, but also improves UX.Read More
-
⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More [email protected] (The Hacker News)
What happens when cybercriminals no longer need deep skills to breach your defenses? Today’s attackers are armed with powerful tools that do the heavy lifting — from AI-powered phishing kits to large botnets ready to strike. And they’re not just after big corporations. Anyone can be a target when fake identities, hijacked infrastructure, and insider…
-
⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More [email protected] (The Hacker News)
What happens when cybercriminals no longer need deep skills to breach your defenses? Today’s attackers are armed with powerful tools that do the heavy lifting — from AI-powered phishing kits to large botnets ready to strike. And they’re not just after big corporations. Anyone can be a target when fake identities, hijacked infrastructure, and insider…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova