CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk

Introduction: Security at a Tipping Point Security Operations Centers (SOCs)…

Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday…

Acer Control Center Flaw Lets Attackers Run Malicious Code as Elevated User

A critical security flaw (CVE-2025-5491) in Acer ControlCenter allows remote…

Amazon Cloud Cam Flaw Allows Attackers to Intercept and Modify Network Traffic

A critical vulnerability (CVE-2025-6031) has been identified in Amazon Cloud…

Microsoft Defender Spoofing Flaw Enables Privilege Escalation and AD Access

A newly disclosed spoofing vulnerability (CVE-2025-26685) in Microsoft Defender for…

New Clearfake Variant Leverages Fake reCAPTCHA To Trick Users Deliver Malicious PowerShell Code

ClearFake, a malicious JavaScript framework first identified in July 2023,…

Threat Actors Use ‘Spam Bombing’ Technique to Hide Malicious Motives

Darktrace researchers detailed "spam bombing," a technique in which threat…

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics

Russian cyber threat actors have been attributed to a state-sponsored…

Morphing Meerkat PhaaS Using DNS Reconnaissance To Generate Phishing Pages Based on Target

Morphing Meerkat, a sophisticated Phishing-as-a-Service (PhaaS) platform first identified in…

Critical pgAdmin Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability discovered in pgAdmin 4, the most…

Agentic AI in the SOC – Dawn of Autonomous Alert Triage

Security Operations Centers (SOCs) today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly, cumbersome, and increases analyst fatigue, […]