The latest from Black Hat USA 2025

<p>Black Hat USA 2025 is returning for its 28th year, covering the latest in infosec for technical experts, thought leaders, innovative vendors and cybersecurity pros.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div>…

What is the Mitre ATT&CK framework?

<p>The Mitre ATT&amp;CK framework is a free, globally accessible <a href=”https://www.techtarget.com/whatis/definition/knowledge-base”>knowledge base</a> that describes the latest behaviors and tactics of cyberadversaries to help organizations strengthen their <a href=”https://www.techtarget.com/searchsecurity/definition/cybersecurity”>cybersecurity</a> strategies. The acronym <i>ATT&amp;CK</i> stands for Adversarial Tactics, Techniques and Common Knowledge.…

What is COMSEC (communications security)?

<p>Communications security (COMSEC) is the prevention of unauthorized access to <a href=”https://www.techtarget.com/searchnetworking/definition/telecommunications-telecom”>telecommunications</a> traffic or to any written information that is transmitted or transferred. There are several COMSEC disciplines, including the following:</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div>…

Packet Power EMX and EG

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Packet Power Equipment: EMX, EG Vulnerability: Missing Authentication for Critical Function 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to gain full…

Delta Electronics DIAView

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Delta Electronics Equipment: DIAView Vulnerability: Improper Limitation of a Pathname to a Restricted Directory 2. RISK EVALUATION Successful exploitation of this vulnerability may allow a remote…

Johnson Controls FX80 and FX90

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.4 ATTENTION: Exploitable remotely/low attack complexity Vendor: Johnson Controls Inc. Equipment: FX80 and FX90 Vulnerability: Dependency on Vulnerable Third-Party Component 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to…

February 2025 Cyber Attacks Statistics

After the cyber attacks timelines, it’s time to publish the statistics for February 2025 where I collected and analyzed 231 events. In February 2025, Cyber Crime continued to lead the Motivations chart with 64% down from 75%, of February. Operations…

CISA Warns of ‘ToolShell’ Exploits Chain Attacks SharePoint Servers – Discloses IOCs and detection signatures

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released an urgent analysis in early July 2025, detailing a sophisticated exploit chain targeting on-premises Microsoft SharePoint servers. Dubbed “ToolShell,” the campaign leverages two fresh vulnerabilities—CVE-2025-49706, a network spoofing flaw, and CVE-2025-49704,…

Risk Has Moved Beyond Your Inbox

For years, email was the main security battleground. Phishing, scams, and account takeovers were problems companies knew how to fight—at least in theory. Secure email gateways, AI-driven detection, relentless user… The post Risk Has Moved Beyond Your Inbox appeared first…