Microsoft addressed a critical race condition vulnerability affecting its Windows Cloud Files Minifilter driver in October 2025. The flaw, assigned CVE-2025-55680, was originally discovered in […]
12 Malicious Extensions in VSCode Marketplace Steal Source Code and Exfiltrate Login Credentials
The VSCode extension marketplace has become a critical vulnerability in the software supply chain. Security researchers at HelixGuard Team recently discovered 12 malicious extensions operating […]
Report: Profits from ransomware attacks declining
A new study from cybersecurity firm Coveware shows that the ransomware economy is changing. Despite the increase in attacks, average ransom amounts and the percentage of organizations […]
Tips for CISOs switching between industries
From the outside, when someone reaches CISO level, the move to the next role should be easy. After all, they’ve already made it to the […]
PolarEdge Botnet Hits 25K IoT Devices in Major Cyber Campaign
Cybersecurity researchers at XLab have uncovered a sophisticated infrastructure-as-a-service botnet operation called PolarEdge, which has compromised over 25,000 Internet of Things devices and established 140 […]
WordPress Plugin Vulnerability Lets Attackers Read Any Server File
A critical security flaw has been discovered in the Anti-Malware Security and Brute-Force Firewall WordPress plugin, putting more than 100,000 websites at risk. The vulnerability, […]
CISA Alerts on Active Exploitation of WSUS Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about active exploitation of a critical vulnerability affecting Windows Server Update Service (WSUS). […]
PhantomRaven Attack Discovered in 126 Malicious npm Packages, Exceeding 86,000 Downloads
The global developer community has been rocked by the emergence of PhantomRaven, a far-reaching campaign involving 126 malicious npm packages with more than 86,000 downloads. […]
Data Leak Outs Students of Iran’s MOIS Training Academy
A school for the Iranian state hackers of tomorrow has itself, ironically, been hacked. The original article found on darkreading Read More
Old threats, new consequences: 90% of cyber claims stem from email and remote access
Even as attackers are growing ever more sophisticated in their methods, it seems there’s no point in messing with the tried-and-true. According to cyber insurance […]