Latest Intelligence
Simple Steps for Attack Surface Reduction
Cybersecurity leaders must implement effective settings from the outset to prevent attacks. Key strategies include adopting default policies such as deny-by-default, enforcing multi-factor authentication (MFA), and utilizing application Ringfencing ™ to mitigate risks. Read Original »
Passkey Login Bypassed via WebAuthn Process Manipulation
Researchers from SquareX have demonstrated a method for attackers to impersonate users and bypass passkey security through manipulation of the WebAuthn process. This raises concerns about the effectiveness of current passkey authentication methods. Read Original »
Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses
Google is enforcing a new policy that mandates cryptocurrency exchange and wallet developers to secure government licenses before their apps can be published in 15 specific regions. This move aims to create a safer and more compliant environment for users amidst rising concerns over cryptocurrency scams, highlighted by recent warnings from the FBI regarding significant financial losses. Read Original »
CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog
CISA has added two security vulnerabilities affecting N-able N-central to its Known Exploited Vulnerabilities catalog due to evidence of active exploitation. N-able N-central is a platform used by Managed Service Providers for remote monitoring and management. Read Original »
North Korea Attacks South Koreans With Ransomware
North Korean hackers are employing a variety of malware types, including stealers, backdoors, and ransomware, in their attacks against South Koreans. This approach indicates a broad and aggressive strategy to exploit vulnerabilities. Read Original »
Fortinet Products Are in the Crosshairs Again
Fortinet has disclosed a critical vulnerability in its FortiSIEM product, coinciding with warnings from researchers about an increase in malicious traffic targeting Fortinet's SSL VPNs. This situation highlights ongoing security concerns for the company's products. Read Original »
Whispers of XZ Utils Backdoor Live on in Old Docker Images
The article discusses the decision by developers to retain certain artifacts in old Docker images related to the XZ Utils backdoor, which they deemed unlikely to be exploited. This choice reflects a desire to preserve these artifacts as a historical curiosity despite the potential risks involved. Read Original »
Norwegian Police Say Pro-Russian Hackers Were Likely Behind Suspected Sabotage at a Dam
Norwegian police have indicated that pro-Russian hackers were likely responsible for a cyberattack on a dam, where they accessed a digital system controlling a valve and increased water flow. This incident raises concerns about the security of critical infrastructure against cyber threats. Read Original »
Popular AI Systems Still a Work-in-Progress for Security
The analysis by Forescout highlights that open-source AI models are performing poorly in vulnerability research compared to their commercial and underground counterparts. This indicates that while AI systems are popular, they still have significant gaps in security capabilities. Read Original »
Patch Now: Attackers Target OT Networks via Critical RCE Flaw
Researchers have identified exploitation attempts targeting a critical vulnerability with a CVSS score of 10 in an Erlang-based platform used for operational technology (OT) and critical infrastructure development. This poses a significant risk to systems relying on this platform. Read Original »
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
Researchers have identified a new malvertising campaign that deploys a multi-stage malware framework known as PS1Bot. This malware is modular and capable of various malicious activities, including information theft and keylogging. Read Original »
What the LockBit 4.0 Leak Reveals About RaaS Groups
The LockBit 4.0 leak highlights the critical need for preparedness in cybersecurity defenses. Organizations that fail to prepare face increased uncertainty due to the lack of accountability from attackers. Read Original »
How an AI-Based 'Pen Tester' Became a Top Bug Hunter on HackerOne
The article discusses how an AI-based penetration testing tool achieved a significant milestone by becoming the first non-human member to top the US leaderboard on HackerOne. This highlights the growing role of AI in cybersecurity, particularly in identifying vulnerabilities. Read Original »
Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws
Zoom and Xerox have released critical security updates to address vulnerabilities that could lead to privilege escalation and remote code execution. The flaw in Zoom Clients for Windows, identified as CVE-2025-49457, has a high severity score of 9.6 due to an untrusted search path issue. Read Original »
Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia
Intel, AMD, and Nvidia have released security advisories addressing recently discovered vulnerabilities in their products. This highlights ongoing security concerns within the chipmaking industry. Read Original »