What is the Role of Non-Human Identities in Securing a Safe Digital Landscape? Where organizations increasingly migrate to cloud environments, the management of Non-Human Identities (NHIs) becomes pivotal in securing a safe digital. But what exactly are NHIs, and how…
Category: EN
How Secure Are Your Non-Human Identities?
Are Non-Human Identities the Weakest Link in Your Cybersecurity Chain? Safeguarding Non-Human Identities (NHIs) is crucial for any organization striving to maintain robust security protocols. These machine identities, composed of encrypted credentials such as passwords, tokens, or keys, serve as…
Spyware maker NSO Group blocked from WhatsApp
A federal judge has granted Meta-owned WhatsApp’s request for a permanent injunction blocking Israeli cyberintelligence company NSO Group from targeting the messaging app’s users. At the same time, the judge dramatically reduced the fine that NSO Group must pay to…
NDSS 2025 – Workshop On The Security Of Space And Satellite Systems (SpaceSec) 25, Keynote Address: NASA’s Core Flight System (cFS) 2.0 And Beyond
Author, Creator & Presenter: Dr. Ashok Prajapati (NASA) Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’ YouTube channel. Permalink The post…
Winos 4.0 hackers expand to Japan and Malaysia with new malware
Winos 4.0 hackers expand from China, Taiwan to Japan, Malaysia using fake Finance Ministry PDFs to spread HoldingHands RAT malware. Threat actors behind Winos 4.0 (ValleyRAT) have expanded their attacks from China and Taiwan to Japan and Malaysia, using PDFs…
American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign
Envoy Air, a wholly owned subsidiary of American Airlines, has confirmed it fell victim to a hacking campaign exploiting vulnerabilities in Oracle’s E-Business Suite (EBS). The breach, first highlighted by the notorious Clop ransomware group, underscores the growing risks facing…
Microsoft Ends Support for Windows 10: Millions of PCs Now at Security Risk
Microsoft has officially stopped supporting Windows 10, marking a major change for millions of users worldwide. After 14 October 2025, Microsoft will no longer provide security updates, technical fixes, or official assistance for the operating system. While computers running…
Authorities Shut Down Cybercrime-as-a-Service, Seize 40,000 SIM Cards
Law enforcement authorities across Europe have dismantled a sophisticated cybercrime-as-a-service operation that enabled criminals to commit widespread fraud and other serious offenses across the continent. The coordinated action, codenamed ‘SIMCARTEL’, resulted in seven arrests, the seizure of over 40,000 active…
From Airport chaos to cyber intrigue: Everest Gang takes credit for Collins Aerospace breach
Everest claims Collins Aerospace hack hitting EU airports, but its leak site vanishes soon after, sparking takedown speculation. Do you remember the Collins Aerospace supply chain attack that disrupted operations at several major European airports, including Heathrow in London, Brussels,…
Stop Reacting, Start Strategizing: A New Era for Cybersecurity and DR
People making cybersecurity and disaster recovery (DR) decisions today often operate as if they’re in a vacuum. Their company has a need – perhaps they have to create a copy… The post Stop Reacting, Start Strategizing: A New Era for…
New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft
Threat actors are leveraging Microsoft Azure Blob Storage to craft highly convincing phishing sites that mimic legitimate Office 365 login portals, putting Microsoft 365 users at severe risk of credential theft. This method exploits trusted Microsoft infrastructure, making the attacks…
Global Ransomware Groups Hit Record High as Smaller Threat Actors Emerge
The number of active ransomware groups has reached an unprecedented high, marking a new phase in the global cyber threat landscape. According to GuidePoint Security’s latest Ransomware & Cyber Threat Report, the total number of active groups surged 57%,…
Astaroth Malware Adopts GitHub Infrastructure to Target Crypto Investors
A new attack is now underway involving the notorious Astaroth banking Trojan, a banking Trojan which is used to steal cryptocurrency credentials, and cybersecurity researchers at McAfee have discovered that this Trojan exploited the GitHub platform for distribution. This…
Crypto Vanishes: North Korea’s $2B Heist, Discord Breach Exposes Millions
North Korean hackers have stolen over $2 billion in cryptocurrency in 2025, while a Discord breach exposed sensitive user data, including government IDs of approximately 70,000 individuals. These incidents highlight the growing sophistication of cyber threats targeting both financial…
John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
The investigation into former national security advisor John Bolton's handling of classified material stemmed in part from an admission Bolton made to the FBI in July 2021 that hackers – believed to be from Iran – had breached his private…
Rethinking Cybersecurity in the Age of AI: Risk, Resilience, and Our New Cyber Reality
The AI revolution is entering a critical new phase. It’s not just about the promise of AI anymore, but also about the new vulnerabilities it introduces. As a cybersecurity leader,… The post Rethinking Cybersecurity in the Age of AI: Risk,…
New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a previously undocumented .NET malware dubbed CAPI Backdoor. According to Seqrite Labs, the attack chain involves distributing phishing emails containing…
Critical Zimbra SSRF Flaw Exposes Sensitive Data
Zimbra has released an emergency security patch to address a critical Server-Side Request Forgery (SSRF) vulnerability that could allow attackers to access sensitive data through the platform’s chat proxy configuration. The flaw, classified as high severity, affects Zimbra versions 10.1.5…
Hackers Dox ICE, DHS, DOJ, and FBI Officials
Plus: A secret FBI anti-ransomware task force gets exposed, the mystery of the CIA’s Kryptos sculpture is finally solved, North Koreans busted hiding malware in the Ethereum blockchain, and more. This article has been indexed from Security Latest Read the…
SIMCARTEL operation: Europol takes down SIM-Box ring linked to 3,200 scams
Europol’s SIMCARTEL operation shut down a SIM-box network behind 3,200 frauds and €4.5M losses, using 40,000 SIMs for scams and extortion. Europol’s “SIMCARTEL” operation dismantled an illegal SIM-box network tied to over 3,200 fraud cases and €4.5M in losses. The…