“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks [email protected] (The Hacker News)
A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the exploitation of a now-patched remote-code-execution vulnerability in Trimble Cityworks to deliver Cobalt Strike and VShell. “UAT-6382 successfully exploited CVE-2025-0944, conducted reconnaissance, and rapidly deployed a variety of web shells and custom-made malware to maintain long-term access,” Cisco Talos researchersRead More
-
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise [email protected] (The Hacker News)
A privilege escalation flaw has been demonstrated in Windows Server 2025 that makes it possible for attackers to compromise any user in Active Directory (AD). “The attack exploits the delegated Managed Service Account (dMSA) feature that was introduced in Windows Server 2025, works with the default configuration, and is trivial to implement,” Akamai security researcher…
-
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks [email protected] (The Hacker News)
A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM) software has been exploited by a China-nexus threat actor to target a wide range of sectors across Europe, North America, and the Asia-Pacific region. The vulnerabilities, tracked as CVE-2025-4427 (CVSS score: 5.3) and CVE-2025-4428 (CVSS score: 7.2), could be chained to execute…
-
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks [email protected] (The Hacker News)
A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM) software has been exploited by a China-nexus threat actor to target a wide range of sectors across Europe, North America, and the Asia-Pacific region. The vulnerabilities, tracked as CVE-2025-4427 (CVSS score: 5.3) and CVE-2025-4428 (CVSS score: 7.2), could be chained to execute…
-
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program [email protected] (The Hacker News)
It’s not enough to be secure. In today’s legal climate, you need to prove it. Whether you’re protecting a small company or managing compliance across a global enterprise, one thing is clear: cybersecurity can no longer be left to guesswork, vague frameworks, or best-effort intentions. Regulators and courts are now holding organizations accountable for how…
-
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host [email protected] (The Hacker News)
Cybersecurity researchers have uncovered multiple critical security vulnerabilities impacting the Versa Concerto network security and SD-WAN orchestration platform that could be exploited to take control of susceptible instances. It’s worth noting that the identified shortcomings remain unpatched despite responsible disclosure on February 13, 2025, prompting a public release of the issuesRead More
-
Identity Security Has an Automation Problem—And It’s Bigger Than You Think [email protected] (The Hacker News)
For many organizations, identity security appears to be under control. On paper, everything checks out. But new research from Cerby, based on insights from over 500 IT and security leaders, reveals a different reality: too much still depends on people—not systems—to function. In fact, fewer than 4% of security teams have fully automated their core…
-
FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections [email protected] (The Hacker News)
A sprawling operation undertaken by global law enforcement agencies and a consortium of private sector firms has disrupted the online infrastructure associated with a commodity information stealer known as Lumma (aka LummaC or LummaC2), seizing 2,300 domains that acted as the command-and-control (C2) backbone to commandeer infected Windows systems. “Malware like LummaC2 is deployed to…
-
What is FileZilla?
FileZilla is a free, open source file transfer protocol (FTP) application that enables users to transfer files between local devices and remote servers.Read More
-
Risk appetite vs. risk tolerance: How are they different?
Risk appetite and risk tolerance are related, but they don’t mean the same thing. Not knowing the difference can cause big problems for your risk management program.Read More
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova