Category: EN

Chinese Hackers Attacking Critical Infrastructure to Sabotage Networks

In an alarming escalation of cyber threats, Chinese state-sponsored hackers have intensified their operations targeting critical infrastructure across the United States, Europe, and the Asia-Pacific region. Recent intelligence reports reveal that sophisticated threat actors, including Volt Typhoon and Salt Typhoon,…

Major WordPress Plugin Flaw Exploited in Under 4 Hours

Flaw in SureTriggers plugin allows unauthenticated users to create admin accounts on WordPress sites This article has been indexed from www.infosecurity-magazine.com Read the original article: Major WordPress Plugin Flaw Exploited in Under 4 Hours

No, it’s not OK to delete that new inetpub folder

A newly created inetpub folder turns out to be part of a Microsoft update against a vulnerability tracked as CVE-2025-21204 This article has been indexed from Malwarebytes Read the original article: No, it’s not OK to delete that new inetpub…

Malicious NPM packages target PayPal users

Threat actors deploy malicious NPM packages to steal PayPal credentials and hijack cryptocurrency transfers. Fortinet researchers discovered multiple malicious NPM packages that are used to target PayPal users. The packages were uploaded to the repository in early March by a threat actor…

Vulnerability Summary for the Week of April 7, 2025

High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info n/a — n/a   A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating…

Collateral Damage: The Hidden Cost of Cyber Risks

Unanticipated cyber threats can rapidly exhaust cyber security budgets and derail carefully planned strategies. Among these challenges, distributed denial of service (DDoS) attacks stand out as a prime example of how unexpected risks can disrupt even the most secure systems.…

Cloud Security Posture Management – The CISO’s Essential Guide

Cloud Security Posture Management (CSPM) has emerged as an essential component in the modern CISO’s security arsenal. As organizations increasingly adopt cloud-first strategies, the complexity of managing security across dynamic, multi-cloud environments presents unprecedented challenges. CISOs today must balance the…