The actor behind the “Contagious Interview” campaign is continuing to refine its tactics and social engineering scams to wrest credentials from macOS users. ​The original […]
Developers left large cache of credentials exposed on code generation websites
A large trove of sensitive credentials, authentication keys, configuration data, tokens, and API keys has been potentially exposed by developers using two popular code formatting […]
Cobalt Strike 4.12 Adds New Injection, UAC Bypasses & C2 Features
Fortra has officially released Cobalt Strike 4.12, introducing a comprehensive suite of new features designed to enhance red team operations and offensive security research. The update […]
Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys
New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical infrastructure, are pasting passwords and credentials into online tools like […]
Salt Security Launches Salt MCP Finder Technology
Salt Security has announced Salt MCP Finder technology, a dedicated discovery engine for Model Context Protocol (MCP) servers, the fast-proliferating infrastructure powering agentic AI. MCP […]
Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams
Horsham, United Kingdom, November 25th, 2025, CyberNewsWire Detego Global, the company behind the award-winning Unified Digital Forensics Platform, is proud to announce the launch of […]
Advanced Security Isn’t Stopping Ancient Phishing Tactics
New research reveals that sophisticated phishing attacks consistently bypass traditional enterprise security measures. ​The original article found on darkreading Read More
As Gen Z Enters Cybersecurity, Jury Is Out on AI’s Impact
Despite possibly supplanting some young analysts, one Gen Z cybersecurity specialist sees AI helping teach those willing to learn and removing drudge work. ​The original […]
With Friends Like These: China Spies on Russian IT Orgs
State-linked hackers stayed under the radar by using a variety of commercial cloud services for command-and-control communications. ​The original article found on darkreading Read More
JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
Cybersecurity researchers are calling attention to a new campaign that’s leveraging a combination of ClickFix lures and fake adult websites to deceive users into running […]