In the evolving landscape of cyber threats, the Chief Information Security Officer (CISO) plays a critical role in strengthening organizational resilience and advancing Business Continuity Planning to ensure sustained business operations. The modern corporate landscape is marked by rapid digital…
Category: Cyber Security News
Commvault Confirms 0-Day Exploit Allowed Hackers Access to Its Azure Environment
Commvault, a leading provider of data protection solutions, has confirmed that a nation-state threat actor breached its Azure environment in February by exploiting a zero-day vulnerability. The company disclosed that while the incident affected a small number of customers, no…
Phishing Kit Attacks: How Businesses Can Stop Them Early
Phishing kits have changed the game and not in a good way for businesses. Today, attackers don’t need to be tech experts to launch a convincing phishing attack. Ready-made phishing kits hand them everything they need: fake websites, login pages, email…
42,000 Phishing Domains Linked to the LabHost PhaaS Service Disclosed by FBI
The FBI has released a comprehensive list of 42,000 phishing domains connected to the dismantled LabHost phishing-as-a-service (PhaaS) platform. This disclosure aims to provide cybersecurity professionals with valuable intelligence on one of the world’s largest phishing operations that targeted millions…
AWS Defaults Silently Introduce New Attack Paths That Let Hackers Escalate Privilege & Account Compromise
Security researchers have uncovered a serious vulnerability in AWS cloud environments where default configurations can silently create dangerous attack paths. This previously underestimated risk stems not from user-created misconfigurations but from AWS’s own default settings that automatically deploy overly permissive…
The CISO’s Guide to Managing Cyber Risk in Hybrid Workplaces
Hybrid work has become a permanent fixture in the modern enterprise, blending remote and in-office operations to enhance flexibility and productivity. However, this model introduces complex cybersecurity challenges, from unsecured home networks to fragmented visibility across distributed endpoints. For CISOs,…
Critical Viasat Firmware Vulnerability Let Attackers Execute Remote Code
A critical security flaw (CVE-2024-6198) in widely deployed Viasat satellite modems allows unauthenticated attackers to execute arbitrary code on affected devices via a stack buffer overflow in the “SNORE” web interface. The vulnerability, rated 7.7 (High) on the CVSS v4…
China-Nexus Hackers Attacking Organizations Infrastructure & High-Value Customers
A sophisticated China-linked threat actor has been conducting extensive cyber espionage operations targeting critical infrastructure and high-value organizations across multiple sectors. This activity cluster, tracked as PurpleHaze, demonstrates technical overlaps with previously identified Chinese advanced persistent threats and employs a…
AI-Powered Threats – How CISOs Can Stay Ahead of the Curve
Artificial Intelligence (AI) is rapidly transforming the cybersecurity landscape, introducing both unprecedented opportunities and formidable challenges. For Chief Information Security Officers (CISOs), the rise of AI-powered threats means traditional defenses are no longer sufficient. Attackers are leveraging machine learning, automation,…
Why Your CISO Should Report to the CEO, Not the CIO
In an era where cyber threats dominate boardroom discussions, the reporting structure of a Chief Information Security Officer (CISO) has profound implications for organizational resilience. Traditionally, CISOs reported to Chief Information Officers (CIOs), reflecting the perception of cybersecurity as a…
Hackers Exploit MS Equation Editor Vulnerability to Deploy XLoader Malware
A sophisticated phishing campaign exploiting a nearly 8-year-old Microsoft Office vulnerability to distribute the dangerous XLoader information stealer. The attack leverages CVE-2017-11882, a memory corruption vulnerability in Microsoft’s Equation Editor component, demonstrating that cybercriminals continue to successfully weaponize older security…
Securing Boardroom Buy-In for Your Cybersecurity Budget
Cybersecurity has evolved from a technical concern to a strategic business priority. With escalating regulatory requirements, sophisticated threat actors, and the rising financial and reputational costs of breaches, boards of directors are increasingly scrutinizing cybersecurity investments. However, securing budget approval…
Outlaw Cybergang Attacking Linux Environments Worldwide With New Malware
A previously documented threat actor known as Outlaw (or “Dota”) has resurfaced with an enhanced malware toolkit targeting Linux servers globally, according to a recent incident response investigation by Securelist analysts. The group, active since at least 2018, has shifted…
Konni APT Hackers Using Multi-Stage Malware to Attack Organizations
A sophisticated multi-stage malware campaign linked to the North Korean Konni APT group has been detected targeting organizations primarily in South Korea. Security researchers uncovered the operation on April 29, 2025, revealing a complex attack chain designed to establish persistent…
OpenAI Rolled Out Last Week’s GPT-4o Update Causing Flattering Issues
OpenAI has reversed last week’s update to its GPT-4o model after users reported the AI had become excessively agreeable and flattering, a behavior AI researchers term “sycophancy.” The company confirmed that the rollback is complete for free users and is…
Firefox 138 Released With Fix for Multiple High-Severity Vulnerabilities
Mozilla has released Firefox 138, addressing several high-severity security vulnerabilities while introducing long-awaited features, including improved profile management. Security researchers identified multiple critical flaws that could allow attackers to escalate privileges or bypass security mechanisms, prompting this significant security update,…
Samsung MagicINFO Vulnerability Allows Remote Code Execution Without Valid User
A critical security vulnerability has been discovered in Samsung’s MagicINFO digital signage management platform that could allow attackers to execute arbitrary code with system-level privileges without requiring authentication. The vulnerability, tracked as CVE-2024-7399, affects Samsung MagicINFO 9 Server versions prior…
New Germlin Stealer Advertised on Hacker Forums Steals Credit Card Data & Login Credentials
Cybersecurity researchers have identified a new information-stealing malware called Gremlin Stealer that has been active in the wild since March 2025. This sophisticated malware targets sensitive information including browser data, cryptocurrency wallets, and various login credentials. First spotted being advertised…
Key Breakthroughs from RSA Conference 2025 – Day 1
The first day of the RSA Conference 2025 set the stage for a transformative era in cybersecurity, with over 44,000 attendees and 300+ vendors converging in San Francisco to showcase cutting-edge solutions. Against a backdrop of escalating AI-driven threats and…
CISA Warns SAP 0-day Vulnerability Exploited in the Wild
CISA has added a critical SAP NetWeaver vulnerability to its Known Exploited Vulnerabilities (KEV) catalog on April 29, 2025. The zero-day flaw, tracked as CVE-2025-31324, carries a maximum CVSS score of 10.0 and has been actively exploited in the wild…