Malicious .NET files conceal RATs in bitmap imagesLaura FrenchMay 9, 2025A recent malspam campaign revealed a payload nested within two .NET assemblies.
Shaping tomorrow’s cyber defenders: Why the Hacking Games gives me hope for Generations Z, A and beyondBill BrennerMay 8, 2025
Threat IntelligenceGoogle warns of Russian hackers ColdRiver wielding new malware toolsShaun NicholsMay 9, 2025The ColdRiver group has been spotted using a previously unknown piece of malware designated as “LostKeys.”
Vulnerability ManagementSAP NetWeaver bug exploited since January, allows RCESteve ZurierMay 9, 2025Remote code execution possible of SAP NetWeaver Visual Composer flaw rated 10.0.
Network SecurityAttacks surge against antiquated routers, FBI warnsShaun NicholsMay 8, 2025Increase in attacks using malware known as “TheMoon" seen, says FBI.
Vulnerability ManagementCisco patches maximum severity vulnerability in IOS XE SoftwareLaura FrenchMay 8, 2025A hard-coded JSON Web Token could allow a remote attacker to upload files with root privileges.
RansomwareDouble-extortion tactics used in PowerSchool ransomware attackSteve ZurierMay 8, 2025Cloud provider paid a ransom. Its school district customers are now being extorted.
IdentityNorth Korean hackers show telltale signs, researchers sayShaun NicholsMay 8, 2025North Korean groups give away their intentions with common blunders and activity patterns.
RansomwareMost cyber insurance claims stem from BEC, fraud, report saysLaura FrenchMay 7, 2025The Coalition 2025 Cyber Claims Report revealed an increase in severity of BEC losses in 2024.
Critical Infrastructure SecurityUS warns oil and gas sectors of ‘unsophisticated’ cyberattacksSteve ZurierMay 7, 2025Advisory points to poor cyber hygiene in these sectors and acceleration of attacks via AI.