CURATED
Dec 10, 2025
Detectum Security Team
Zero-day vulnerabilities represent one of the most significant threats in cybersecurity. Learn how they work, why they're dangerous, and how organizations can protect themselves against these unknown ...
Read Full Article
Cybersecurity
Security
Dec 10, 2025
info@thehackernews.com (The Hacker News)
Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code.
Standard security tools often...
Read Full Article
Cybersecurity
Security
Dec 10, 2025
info@thehackernews.com (The Hacker News)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and compression utility to its Known Exploited Vulnerabilities (KEV...
Read Full Article
Cybersecurity
Security
Dec 10, 2025
info@thehackernews.com (The Hacker News)
Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that has been actively exploited in the wild.
Of the 56 flaws,...
Read Full Article
Cybersecurity
Security
Dec 10, 2025
info@thehackernews.com (The Hacker News)
Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully exploited, could result in an authentication bypass and code execution.
The Fortinet vul...
Read Full Article
Cybersecurity
Security
Dec 10, 2025
Detectum Team
Ransomware actors have targeted manufacturers, retailers, and the Japanese government, with many organizations requiring months to recover.
Read Full Article
Cybersecurity
Security
Dec 09, 2025
Detectum Team
Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of 2025 tackles one zero-day bug that is already bein...
Read Full Article
Cybersecurity
Security
Dec 09, 2025
Detectum Team
Proof-of-concept exploit code is publicly available for two other flaws in this month's Patch Tuesday. In total, the company issued patches for more than 1,150 flaws this year.
Read Full Article
Cybersecurity
Security
Dec 09, 2025
Detectum Team
Shanya is the latest in an emerging field of packing malware, selling obfuscation functionality in order to help ransomware actors reach their target.
Read Full Article
Cybersecurity
Security
Dec 09, 2025
info@thehackernews.com (The Hacker News)
Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical React2Shell security flaw in React Server Components (RSC) to deliver a previously ...
Read Full Article
Cybersecurity
Security
Dec 09, 2025
Detectum Team
Think "Blade Runner," but the robots can be hacked more easily than your home computer.
Read Full Article
Cybersecurity
Security
Dec 09, 2025
info@thehackernews.com (The Hacker News)
Four distinct threat activity clusters have been observed leveraging a malware loader known as CastleLoader, strengthening the previous assessment that the tool is offered to other threat actors under...
Read Full Article
Cybersecurity
Security
CURATED
Dec 09, 2025
Detectum Security Team
Ransomware attacks continue to evolve. Discover the latest protection strategies, backup solutions, and incident response plans to safeguard your organization against ransomware threats.
Read Full Article
Cybersecurity
Security
Dec 09, 2025
info@thehackernews.com (The Hacker News)
The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker to adopt a combination of more advanced tactics like domain spoofing, DLL side-loading, and fileless P...
Read Full Article
Cybersecurity
Security
Dec 09, 2025
Detectum Team
Google has fixed a critical vulnerability that enabled attackers to add malicious instructions to common documents to exfiltrate sensitive corporate information.
Read Full Article
Cybersecurity
Security
Dec 09, 2025
info@thehackernews.com (The Hacker News)
Zero Trust helps organizations shrink their attack surface and respond to threats faster, but many still struggle to implement it because their security tools donโt share signals reliably. 88% of or...
Read Full Article
Cybersecurity
Security
Dec 09, 2025
info@thehackernews.com (The Hacker News)
Google on Monday announced a set of new security features in Chrome, following the company's addition of agentic artificial intelligence (AI) capabilities to the web browser.
To that end, the tech gia...
Read Full Article
Cybersecurity
Security
Dec 09, 2025
info@thehackernews.com (The Hacker News)
Canadian organizations have emerged as the focus of a targeted cyber campaign orchestrated by a threat activity cluster known as STAC6565.
Cybersecurity company Sophos said it investigated almost 40 i...
Read Full Article
Cybersecurity
Security
Dec 09, 2025
info@thehackernews.com (The Hacker News)
Cybersecurity researchers have discovered two new extensions on Microsoft Visual Studio Code (VS Code) Marketplace that are designed to infect developer machines with stealer malware.
The VS Code exte...
Read Full Article
Cybersecurity
Security
Dec 08, 2025
Detectum Team
The Apache Software Foundation's earlier fix for a critical Tika flaw missed the full scope of the vulnerability, prompting an updated advisory and CVE.
Read Full Article
Cybersecurity
Security
Dec 08, 2025
Detectum Team
Attacks against CVE-2025-55182, which began almost immediately after public disclosure last week, have increased as more threat actors take advantage of the flaw.
Read Full Article
Cybersecurity
Security
Dec 08, 2025
Detectum Team
The US Treasury's Financial Crimes Enforcement Network shared data showing how dramatically ransomware attacks have changed over time.
Read Full Article
Cybersecurity
Security
Dec 08, 2025
info@thehackernews.com (The Hacker News)
Cybersecurity researchers are calling attention to a new campaign dubbed JS#SMUGGLER that has been observed leveraging compromised websites as a distribution vector for a remote access trojan named Ne...
Read Full Article
Cybersecurity
Security
CURATED
Dec 08, 2025
Detectum Security Team
MFA has become essential in modern cybersecurity. Understand different MFA methods, implementation strategies, and why single-factor authentication is no longer sufficient.
Read Full Article
Cybersecurity
Security
Dec 08, 2025
info@thehackernews.com (The Hacker News)
Itโs been a week of chaos in code and calm in headlines. A bug that broke the internetโs favorite framework, hackers chasing AI tools, fake apps stealing cash, and record-breaking cyberattacks โ...
Read Full Article
Cybersecurity
Security
Dec 08, 2025
info@thehackernews.com (The Hacker News)
The holiday season compresses risk into a short, high-stakes window. Systems run hot, teams run lean, and attackers time automated campaigns to get maximum return. Multiple industry threat reports sho...
Read Full Article
Cybersecurity
Security
Dec 08, 2025
Detectum Team
"Broadside" is targeting a critical flaw in DVR systems to conduct command injection attacks, which can hijack devices to achieve persistence and move laterally.
Read Full Article
Cybersecurity
Security
Dec 08, 2025
info@thehackernews.com (The Hacker News)
Cybersecurity researchers have disclosed details of two new Android malware families dubbed FvncBot and SeedSnatcher, as another upgraded version of ClayRat has been spotted in the wild.
The findings ...
Read Full Article
Cybersecurity
Security
Dec 08, 2025
info@thehackernews.com (The Hacker News)
A critical security flaw in the Sneeit Framework plugin for WordPress is being actively exploited in the wild, per data from Wordfence.
The remote code execution vulnerability in question is CVE-2025-...
Read Full Article
Cybersecurity
Security
Dec 08, 2025
info@thehackernews.com (The Hacker News)
The Iranian hacking group known as MuddyWater has been observed leveraging a new backdoor dubbed UDPGangster that uses the User Datagram Protocol (UDP) for command-and-control (C2) purposes.
The cyber...
Read Full Article
Cybersecurity
Security
CURATED
Dec 07, 2025
Detectum Security Team
Navigate the complexities of cloud security with our comprehensive guide to the shared responsibility model. Learn what cloud providers handle and what remains your responsibility.
Read Full Article
Cybersecurity
Security
Dec 06, 2025
info@thehackernews.com (The Hacker News)
Over 30 security vulnerabilities have been disclosed in various artificial intelligence (AI)-powered Integrated Development Environments (IDEs) that combine prompt injection primitives with legitimate...
Read Full Article
Cybersecurity
Security
Dec 06, 2025
Detectum Team
A sprawling academic cheating network turbocharged by Google Ads that has generated nearly $25 million in revenue has curious connections to a Kremlin-connected oligarch whose Russian university build...
Read Full Article
Cybersecurity
Security
CURATED
Dec 06, 2025
Detectum Security Team
Phishing attacks have become increasingly sophisticated. Explore modern phishing techniques, social engineering tactics, and comprehensive defense strategies to protect your organization.
Read Full Article
Cybersecurity
Security
Dec 06, 2025
info@thehackernews.com (The Hacker News)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server Components (RSC) to its Known Exploited Vulnerabilities (KEV) ...
Read Full Article
Cybersecurity
Security
Dec 05, 2025
Detectum Team
Software teams at Google and other Rust adopters see safer code when using the memory-safe language, as well as fewer rollbacks and less code review.
Read Full Article
Cybersecurity
Security
Dec 05, 2025
Detectum Team
Remember when Apple put that U2 album in everyone's music libraries? India wanted to do that to all of its citizens, but with a cybersecurity app. It wasn't a good idea.
Read Full Article
Cybersecurity
Security
Dec 05, 2025
info@thehackernews.com (The Hacker News)
A new agentic browser attack targeting Perplexity's Comet browser that's capable of turning a seemingly innocuous email into a destructive action that wipes a user's entire Google Drive contents, find...
Read Full Article
Cybersecurity
Security
Dec 05, 2025
info@thehackernews.com (The Hacker News)
A critical security flaw has been disclosed in Apache Tika that could result in an XML external entity (XXE) injection attack.
The vulnerability, tracked as CVE-2025-66516, is rated 10.0 on the CVSS s...
Read Full Article
Cybersecurity
Security
Dec 05, 2025
Detectum Team
Manufacturers are the top target for cyberattacks in 2025 because of their still-plentiful cybersecurity gaps and a lack of expertise.
Read Full Article
Cybersecurity
Security
Dec 05, 2025
Detectum Team
A maximum-severity vulnerability affecting the React JavaScript library has been exploited in the wild, further stressing the need to patch now.
Read Full Article
Cybersecurity
Security
Dec 05, 2025
Detectum Team
As quantum quietly moves beyond lab experiment and into production workflows, here's what enterprise security leaders should be focused on, according to Lineswala.
Read Full Article
Cybersecurity
Security
CURATED
Dec 05, 2025
Detectum Security Team
Proper firewall configuration is critical for network security. Learn about firewall types, rule management, and best practices for securing your network perimeter.
Read Full Article
Cybersecurity
Security
Dec 05, 2025
info@thehackernews.com (The Hacker News)
Two hacking groups with ties to China have been observed weaponizing the newly disclosed security flaw in React Server Components (RSC) within hours of it becoming public knowledge.
The vulnerability ...
Read Full Article
Cybersecurity
Security
Dec 05, 2025
info@thehackernews.com (The Hacker News)
A human rights lawyer from Pakistan's Balochistan province received a suspicious link on WhatsApp from an unknown number, marking the first time a civil society member in the country was targeted by I...
Read Full Article
Cybersecurity
Security
Dec 05, 2025
info@thehackernews.com (The Hacker News)
Most MSPs and MSSPs know how to deliver effective security. The challenge is helping prospects understand why it matters in business terms. Too often, sales conversations stall because prospects are o...
Read Full Article
Cybersecurity
Security
Dec 05, 2025
info@thehackernews.com (The Hacker News)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of a backdoor named BRICKSTORM that has been put to use by state-sponsored threat actors from the People's...
Read Full Article
Cybersecurity
Security
Dec 05, 2025
info@thehackernews.com (The Hacker News)
A command injection vulnerability in Array Networks AG Series secure access gateways has been exploited in the wild since August 2025, according to an alert issued by JPCERT/CC this week.
The vulnerab...
Read Full Article
Cybersecurity
Security
Dec 04, 2025
Detectum Team
Transurban head of cyber defense Muhammad Ali Paracha shares how his team is automating the triaging and scoring of security threats as part of the Black Hat Middle East conference.
Read Full Article
Cybersecurity
Security
Dec 04, 2025
Detectum Team
China-based phishing groups blamed for non-stop scam SMS messages about a supposed wayward package or unpaid toll fee are promoting a new offering, just in time for the holiday shopping season: Phishi...
Read Full Article
Cybersecurity
Security