The Evolution of Exposure Management Most security teams have a good sense of what’s critical in their environment. What’s harder to pin down is what’s […]
CastleLoader Malware Hits 400+ Devices via Cloudflare-Themed ClickFix Phishing Attack
CastleLoader, a sophisticated malware loader, has compromised over 400 devices since its debut in early 2025, with cybersecurity firm PRODAFT reporting 469 infections out of […]
Smart Bus System Flaw Allows Hackers to Remotely Track and Control Vehicles
A critical security vulnerability in smart bus systems has been discovered that enables hackers to remotely track vehicle locations and potentially take control of essential […]
‘Win-DDoS’: Researchers unveil botnet technique exploiting Windows domain controllers
At DEF CON 33, security researchers demonstrated a novel distributed denial-of-service technique using weaponized Windows domain controllers (DCs), along with a set of zero-click vulnerabilities […]
Silent Watcher Targets Windows Systems, Steals Data via Discord Webhooks
K7 Labs investigated the Cmimai Stealer, a Visual Basic Script (VBS)-based infostealer that surfaced in June 2025 and uses PowerShell and native Windows scripting to […]
SoupDealer Malware Evades Sandboxes, AVs, and EDR/XDR in Real-World Attacks
The SoupDealer malware has successfully bypassed nearly all public sandboxes and antivirus solutions, with the exception of Threat.Zone, while also evading endpoint detection and response […]
Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs
New Heimdal study reveals how tool sprawl creates blind spots, with over half of providers experiencing daily or weekly burnout Survey of 80 North American […]
Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs
New Heimdal study reveals how tool sprawl creates blind spots, with over half of providers experiencing daily or weekly burnout. Survey of 80 North American […]
Legitimate System Functions Exploited to Steal Secrets in Shared Linux Setups
Security researcher IonuÈ› Cernica revealed how commonplace Linux utilities can be weaponized to siphon sensitive data in multi-tenant environments. His talk, “Silent Leaks: Harvesting Secrets […]
Xerox FreeFlow Flaws Enable SSRF and Remote Code Execution
Xerox Corporation has released critical security updates for its FreeFlow Core software, addressing two significant vulnerabilities that could allow attackers to perform server-side request forgery […]