“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa [email protected] (The Hacker News)
Cybersecurity researchers are calling attention to a series of cyber attacks targeting financial organizations across Africa since at least July 2023 using a mix of open-source and publicly available tools to maintain access. Palo Alto Networks Unit 42 is tracking the activity under the moniker CL-CRI-1014, where “CL” refers to “cluster” and “CRI” stands for…
-
CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet [email protected] (The Hacker News)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added three security flaws, each impacting AMI MegaRAC, D-Link DIR-859 router, and Fortinet FortiOS, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2024-54085 (CVSS score: 10.0) – An authentication bypass by spoofingRead…
-
WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews [email protected] (The Hacker News)
Popular messaging platform WhatsApp has added a new artificial intelligence (AI)-powered feature that leverages its in-house solution Meta AI to summarize unread messages in chats. The feature, called Message Summaries, is currently rolling out in the English language to users in the United States, with plans to bring it to other regions and languages later…
-
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery [email protected] (The Hacker News)
New research has uncovered continued risk from a known security weakness in Microsoft’s Entra ID, potentially enabling malicious actors to achieve account takeovers in susceptible software-as-a-service (SaaS) applications. Identity security company Semperis, in an analysis of 104 SaaS applications, found nine of them to be vulnerable to Entra ID cross-tenant nOAuth abuse. First disclosed byRead…
-
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC [email protected] (The Hacker News)
Citrix has released security updates to address a critical flaw affecting NetScaler ADC that it said has been exploited in the wild. The vulnerability, tracked as CVE-2025-6543, carries a CVSS score of 9.2 out of a maximum of 10.0. It has been described as a case of memory overflow that could result in unintended control…
-
Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure [email protected] (The Hacker News)
Cybersecurity researchers have detailed two now-patched security flaws in SAP Graphical User Interface (GUI) for Windows and Java that, if successfully exploited, could have enabled attackers to access sensitive information under certain conditions. The vulnerabilities, tracked as CVE-2025-0055 and CVE-2025-0056 (CVSS scores: 6.0), were patched by SAP as part of its monthly updates for JanuaryRead…
-
Authorization sprawl: Attacking modern access models
Attackers exploit authorization sprawl by using legitimate credentials and SSO tokens to move between systems, bypassing security controls and deploying ransomware undetected.Read More
-
Ransomware threat actors today and how to thwart them
Top experts convened on BrightTALK’s ‘CISO Insights’ to discuss ‘Ransomware 3.0’ — the current threat and what organizations, large and small, must do to thwart these bad actors.Read More
-
6 edge monitoring best practices in the cloud
When it comes to application monitoring, edge workloads are outliers — literally and metaphorically. Learn what sets them apart and how to implement monitoring best practices.Read More
-
Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games [email protected] (The Hacker News)
Thousands of personal records allegedly linked to athletes and visitors of the Saudi Games have been published online by a pro-Iranian hacktivist group called Cyber Fattah. Cybersecurity company Resecurity said the breach was announced on Telegram on June 22, 2025, in the form of SQL database dumps, characterizing it as an information operation “carried out…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova