TAG-150 is running a multifaceted and relatively successful malware-as-a-service operation, without advertising itself on the Dark Web. ​The original article found on darkreading Read More
Category: Cyber Security News
Anyone Using Agentic AI Needs to Understand Toxic Flows
The biggest vulnerabilities may lie at the boundaries of where the AI agent connects with the enterprise system. ​The original article found on darkreading Read […]
Scammers Are Using Grok to Spread Malicious Links on X
It’s called “grokking,” and gives spammers a way to skirt X’s ban on links in promoted posts and reach larger audiences than ever before. ​The […]
Microsoft Tapped China Engineers for SharePoint Support
A new investigation has revealed that Microsoft relied on China-based engineers to provide technical support and bug fixes for SharePoint, the same collaboration software that […]
Over 143,000 Malware Files Target Android and iOS Users in Q2 2025
In the second quarter of 2025, users of Android and iOS devices faced relentless cyberthreats, with Kaspersky Security Network reporting nearly 143,000 malicious installation packages […]
CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation
Federal Civilian Executive Branch (FCEB) agencies are being advised to update their Sitecore instances by September 25, 2025, following the discovery of a security flaw […]
TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations
The threat actor behind the malware-as-a-service (MaaS) framework and loader called CastleLoader has also developed a remote access trojan known as CastleRAT. “Available in both […]
Hacker nutzen gravierende Schwachstelle bei SAP S/4HANA aus
Ein Exploit für die Schwachstelle wurde bereits in freier Wildbahn beobachtet. Nitpicker / Shutterstock Vergangenen Monat hat SAP einen Patch für S/4HANA herausgebracht, der die […]
You should be aware of these latest social engineering trends
Instead of relying on advanced tools or complex scripts, experienced attackers penetrate systems and steal data using the most effective weapon of all: social engineering. […]
Embracing the Next Generation of Cybersecurity Talent
Programs like student-run SOCs can expand our cybersecurity workforce and better secure our public and private entities for when, not if, cyberattacks occur. ​The original […]