CYBERSECURITY

Operation Red Card 2.0 Leads to 651 Arrests in Africa

Operation Red Card 2.0 Leads to 651 Arrests in Africa

African law enforcement agencies are making progress against cybercrime syndicates that are attempting to infiltrate several of the continent's countries.

CISA Verifies Active FileZen CVE-2026-25108 Vulnerability Exploitation

CISA Verifies Active FileZen CVE-2026-25108 Vulnerability Exploitation

Citing evidence of active exploitation, the U.S This article explores filezen vulnerability known. . Cybersecurity and Infrastructure Security Agency.

Lazarus Group Picks a New Poison: Medusa Ransomware

Lazarus Group Picks a New Poison: Medusa Ransomware

A new criminal partner has joined the Larazus Group This article explores medusa ransomware actors. . According to recent research by the Symantec and.

Attackers Can Now Take Control of a Network in Just 29 Minutes

Attackers Can Now Take Control of a Network in Just 29 Minutes

In 2025, it took cybercriminals less time to move laterally across a network after breaking in than it does to watch a typical sitcom This article.

Top Five Cyberdefense Recommendations for 2026

Top Five Cyberdefense Recommendations for 2026

Discover how AI technology will power both cyberdefense and criminal capabilities in 2026, marking a significant turning point in the cybersecurity.

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

A Russian-affiliated threat actor has been seen launching a social engineering attack against a European financial institution in an attempt to obtain.

More Than Dashboards: AI Decisions Must Be Provable

More Than Dashboards: AI Decisions Must Be Provable

Business executives are posing the direct question, "What did artificial intelligence (AI) systems actually do?" Not what it was intended to do This.

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

According to a new report by the Symantec and Carbon Black Threat Hunter Team, the Medusa ransomware was used in an attack against an unidentified entity.

VC Market Soars as Cybersecurity Companies Pursue AI

VC Market Soars as Cybersecurity Companies Pursue AI

Discover how The rush to AI-native security solutions and a massive surge in mergers and acquisitions that reached record levels were the main drivers of.

UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

In contrast to previous attacks directed at Saudi Arabian entities, the threat activity cluster known as UnsolicitedBooker has been observed targeting.

Anthropic claims that 16 million Claude queries were used by Chinese AI companies to replicate the model.

Anthropic claims that 16 million Claude queries were used by Chinese AI companies to replicate the model.

On Monday, Anthropic announced that it had discovered "industrial-scale campaigns" carried out by DeepSeek, Moonshot AI, and MiniMax, three artificial.

Spitting Cash: ATM Jackpotting Attacks Surged in 2025

Spitting Cash: ATM Jackpotting Attacks Surged in 2025

Banks seem to have forgotten about those big metal boxes full of cash that are positioned all over the place, known as ATMs, despite spending years.

Enigma Cipher Device Still Holds Secrets for Cyber Pros

Enigma Cipher Device Still Holds Secrets for Cyber Pros

For over a century, Enigma cipher machines have remained in the imaginations of history buffs and cryptography enthusiasts, and they are still found at.

APT28 Used Webhook-Based Macro Malware to Target European Organizations

APT28 Used Webhook-Based Macro Malware to Target European Organizations

Discover how A new campaign targeting particular entities in Western and Central Europe has been linked to the Russia-affiliated state-sponsored threat.

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

Details of a new cryptojacking campaign that uses pirated software bundles as lures to install a custom XMRig miner program on compromised hosts have been.

How Exposed Endpoints Increase Risk Across LLM Infrastructure

How Exposed Endpoints Increase Risk Across LLM Infrastructure

An increasing number of organizations are implementing more internal services and Application Programming Interfaces (APIs) to support their own Large.

⚡ Weekly Recap: Docker Malware, 30Tbps DDoS, PromptSpy AI, Double-Tap Skimmers, and More

⚡ Weekly Recap: Docker Malware, 30Tbps DDoS, PromptSpy AI, Double-Tap Skimmers, and More

Seldom does security news follow a straight path This article explores wsl straight beacon. . This week, it seems more like a succession of abrupt turns.

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

According to cybersecurity researchers, there is an ongoing "Shai-Hulud-like" supply chain worm campaign that has used a group of at least 19 malicious.

Over 600 FortiGate devices across 55 countries are compromised by an AI-assisted threat actor.

Over 600 FortiGate devices across 55 countries are compromised by an AI-assisted threat actor.

More than 600 FortiGate devices spread across 55 countries have been compromised by a Russian-speaking, profit-driven threat actor using commercial.

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

Discover how With 700,000 American workers in need of reskilling and $5.5 trillion in global AI risk exposure, the Certified CISO v4 and four new AI.

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

Citing evidence of active exploitation, the U.S This article explores vulnerability cve 2025. . Cybersecurity and Infrastructure Security Agency (CISA).

Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

Anthropic, an artificial intelligence (AI) company, has started to implement Claude Code with a new security feature that can find vulnerabilities in a.

Latin America's Cyber Maturity Lags Threat Landscape

Latin America's Cyber Maturity Lags Threat Landscape

Even though Latin American nations have made significant progress toward cybersecurity maturity, the region still faces obstacles due to slow development.

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware

Researchers studying cybersecurity have revealed information about a new ClickFix campaign that uses hacked legitimate websites to spread MIMICRAT (also.

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

The vulnerability, identified as CVE-2026-1731 (CVSS score: 9.9), enables attackers to execute operating system commands in the context of the site user.

Top 5 this week

Page 11 of 22