45 New Domains Linked to Salt Typhoon, UNC4841 – Dark Reading
The China-backed threat actors have used the previously undiscovered infrastructure to obtain long-term, stealthy access to targeted organizations. – Read More
The China-backed threat actors have used the previously undiscovered infrastructure to obtain long-term, stealthy access to targeted organizations. – Read More
Experts agree there have been subtle improvements, with new laws and applied best practices, but there is still a long way to go. – Read More
Exploitation of CVE-2025-42957 requires “minimal effort” and can result in a complete compromise of the SAP system and host OS, according to researchers. – Read More
The biggest vulnerabilities may lie at the boundaries of where the AI agent connects with the enterprise system. – Read More
TAG-150 is running a multifaceted and relatively successful malware-as-a-service operation, without advertising itself on the Dark Web. – Read More
It’s called “grokking,” and gives spammers a way to skirt X’s ban on links in promoted posts and reach larger audiences than ever before. – Read More
Programs like student-run SOCs can expand our cybersecurity workforce and better secure our public and private entities for when, not if, cyberattacks occur. – Read More
Cyberattackers target local and state agencies, a problem as the Trump administration cuts cybersecurity funds and culls workers at federal security agencies. – Read More
Cyberattackers target local and state agencies, a problem as the Trump administration cuts cybersecurity funds and culls workers at federal security agencies. – Read More
The vulnerability marks the latest example of threat actors weaponizing exposed ASP.NET machine keys for remote injection and deserialization attacks. – Read More
Reports of disruptions at North American plants emerged earlier this week, though the nature of the attack on the tire manufacturer remains unclear. – Read More
New threat actor “GhostRedirector” is using a malicious IIS module to inject links that try to artificially boost search engine ranking for target sites. – Read More
The Nonprofit organization launched the Threat Handling Foundations Certificate amid mounting incident and breach disclosures. – Read More
What’s believed to be a global phishing-as-a-service enterprise using cloaking techniques has been riding on public cloud infrastructure for more than 3 years. – Read More
Czech cyber agency NÚKIB warned of the risks of using products and software that send data back to China. – Read More