Ransomware gang exploits Cisco flaw in zero-day attacks since January
Interlock’s abuse of a critical Cisco Secure FMC zero-day shows why firewall management platforms have become prime ransomware targets.
Uk ICO launches investigation into X over AI-generated non-consensual sexual imagery
The UK ICO’s X probe shows AI-generated sexual abuse is becoming a privacy enforcement issue, not just a moderation problem.
Ice agent doxxing site hit by DDoS traffic routed through Russian servers
A reported DDoS against an ICE doxxing-linked site shows how breach fallout can escalate into harassment, outages, and weakly attributed cyber conflic
More attackers are logging in, not breaking in
Credential theft is rising as infostealers, session hijacking, and AI-assisted phishing let attackers log in quietly instead of exploiting systems.
Cisco firewall vulnerability exploited as zero-day in Interlock ransomware attacks
Amazon says a Cisco FMC flaw was exploited as a zero-day in Interlock ransomware attacks, putting firewall management systems at high risk.
Fake PoCs, misunderstood risks cause Cisco SD-WAN chaos
Fake exploit claims muddied the real risk of Cisco SD-WAN flaws, but exposed management systems still pose serious enterprise danger.
Why Stryker's outage is a disaster recovery wake-up call
Stryker’s outage shows why cyber resilience, not just compliance, now defines business continuity in regulated industries.
EU sanctions companies in china, Iran for cyberattacks
EU cyber sanctions on firms in China and Iran raise urgent supply chain, compliance, and vendor risk issues for businesses operating in Europe.
Russian hackers exploit Zimbra flaw in ukrainian government attacks
APT28 hackers linked to Russia’s GRU are exploiting a Zimbra flaw to target Ukrainian government entities, highlighting urgent patching needs.
Nation-State actor embraces AI malware assembly line
Pakistan-linked APT36 is using AI to mass-produce mediocre malware, shifting cyber risk from sophistication to scale and straining defenses.
54 EDR killers abuse 34 signed vulnerable drivers to blind security tools
Researchers found 54 EDR killers abusing 34 signed vulnerable drivers via BYOVD, exposing a growing kernel-level threat to enterprise defenses.
CISOs struggle to defend AI systems with outdated security tools, new study reveals
New study reveals majority of security leaders lack proper tools and skills to defend AI systems, creating critical vulnerabilities as organizations d











