Category: EN

NIST proposes new metric to gauge exploited vulnerabilities

NIST has introduced a new way to estimate which software vulnerabilities have likely been exploited, and it’s calling on the cybersecurity community to help improve and validate the method. The new metric, “Likely Exploited Vulnerabilities” (LEV), aims to close a…

Ransomware Hackers Target SAP Servers Through Critical Flaw

  A newly discovered security hole in SAP’s NetWeaver platform is now being misused by cybercriminals, including ransomware gangs. This flaw allows attackers to run harmful commands on vulnerable systems from a distance—without even needing to log in. SAP issued…

India’s Cyber Scams Create International Turmoil

  It has been reported that the number of high-value cyber fraud cases in India has increased dramatically in the financial year 2024, which has increased more than fourfold and has resulted in losses totalling more than $20 million, according…

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 46

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang RVTools Bumblebee Malware Attack – How a Trusted IT Tool Became a…

Operation ENDGAME disrupted global ransomware infrastructure

Operation ENDGAME dismantled key ransomware infrastructure, taking down 300 servers, 650 domains, and seizing €21.2M in crypto. From May 19 to 22, 2025, Operation ENDGAME, coordinated by Europol and Eurojust, disrupted global ransomware infrastructure. Law enforcement took down down 300…

Feel Empowered by Mastering NHI Compliance

What Makes NHI Compliance Essential in Today’s Cybersecurity Landscape? Non-Human Identities (NHIs), the machine identities in cybersecurity are created by combining a secret (an encrypted password, token, or key) and the permissions granted by a destination server. This unique amalgamation…

Your Assurance in Securing NHIs Properly

Are You Harnessing the Full Potential of Secure NHIs? Organizations require robust security measures to safeguard their digital assets. An often overlooked yet critical element of these measures is the management of Non-Human Identities (NHIs) and their associated secrets. A…