PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack
Jun 27, 2025Ravie LakshmananVulnerability / Cyber Espionage A China-linked threat actor known…
Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign
Jun 27, 2025Ravie LakshmananThreat Hunting / Vulnerability Threat hunters have discovered a…
Business Case for Agentic AI SOC Analysts
Security operations centers (SOCs) are under pressure from both sides: threats are…
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access
Jun 26, 2025Ravie LakshmananVulnerability, Network Security Cisco has released updates to address…
Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks
Jun 26, 2025Ravie LakshmananOpen Source / Vulnerability Cybersecurity researchers have disclosed a…
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks
Jun 26, 2025Ravie LakshmananCyber Espionage / Malware An Iranian state-sponsored hacking group…
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
Jun 25, 2025Ravie LakshmananSaaS Security / Vulnerability New research has uncovered continued…
Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure
Jun 25, 2025Ravie LakshmananData Privacy / Vulnerability Cybersecurity researchers have detailed two…
Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options
Jun 25, 2025Ravie LakshmananEndpoint Security / IT Management Microsoft on Tuesday announced…


