Category: EN

Malicious Typosquatted PyPI Packages Spreading SilentSync RAT

On August 4, 2025, Zscaler ThreatLabz uncovered two malicious Python packages—sisaws and secmeasure—that deliver SilentSync, a Python-based remote access trojan (RAT), to unsuspecting developers. Both packages leverage typosquatting to impersonate legitimate libraries in the Python Package Index (PyPI), posing a…

Ping Identity debuts AI framework to keep humans in control

Ping Identity announced a new AI framework designed to close the trust gap created by the rise of AI agents, along with AI-powered assistants that boost administrator productivity. This framework makes verifiable trust a foundation of every digital interaction, helping…

Raven Stealer Targets Google Chrome Users to Exfiltrate Sensitive Data

Raven Stealer, a sophisticated information-stealing malware that has been wreaking havoc on users’ sensitive data. This contemporary malware represents a concerning evolution in credential theft technology, combining advanced evasion techniques with streamlined data exfiltration capabilities. Raven Stealer stands out as…

Top 10 Best Next‑Generation Firewall (NGFW) Providers in 2025

Protecting digital infrastructure is critical in 2025, as cyber threats escalate in complexity and diversity. Next‑Generation Firewalls (NGFWs) have become the cornerstone for enterprise security, offering not just robust traffic filtering, but also deep packet inspection, advanced threat intelligence, and…

Why File Sanitization for Retail Matters

The post Why File Sanitization for Retail Matters appeared first on Votiro. The post Why File Sanitization for Retail Matters appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Why File Sanitization…

Google Chrome 0-Day Under Active Attack – Update Immediately

Google has released an urgent security update for Chrome browser users worldwide, addressing four critical vulnerabilities, including one zero-day exploit that is currently being actively exploited in the wild. The company is urging all users to update their browsers immediately…

AI made crypto scams far more dangerous

The first half of 2025 saw one of the worst waves of crypto hacks to date, with more than $3.01 billion stolen. AI was a big part of it, making scams easier to run and letting even low-skill criminals get…

GreyNoise unveils MCP Server to power AI-driven SOC workflows

GreyNoise Intelligence introduced the GreyNoise Model Context Protocol (MCP) Server to enable MCP-compatible LLMs and agents to query GreyNoise APIs directly, providing real-time, actionable threat intelligence for AI agents. “AI Agents represent a major shift in cybersecurity, moving beyond simple…

Shadow AI is breaking corporate security from within

Cybersecurity leaders know the attack surface has been growing for years, but the latest State of Information Security Report 2025 from IO shows how fast new risks are converging. Drawing on responses from more than 3,000 security professionals in the…

FreeOnes – 960,213 breached accounts

In February 2017, the forum for the adult website FreeOnes suffered a data breach that was later redistributed as part of a larger corpus of data. The data included 960k unique email addresses alongside usernames, IP addresses and salted MD5…

Getting Better Results from NHI Security

How Can We Achieve Better NHI Security? Cloud environment security is an integral part of cybersecurity strategies for businesses operating across financial services, healthcare, travel, and more. How can organizations unlock improved results and ensure robust Non-Human Identities (NHIs) security?…

How NHIs Can Help You Relax About Security

Navigating the Landscape of Cybersecurity: Do NHIs Hold the Key? Are you searching for a stress-free solution to safeguard your organization’s data? Understanding the intricacies of Non-Human Identities (NHIs) and Secrets Security Management can offer immense value, providing a promising…