$ page 34/37

Ransomware gang exploits Cisco flaw in zero-day attacks since January

Interlock’s abuse of a critical Cisco Secure FMC zero-day shows why firewall management platforms have become prime ransomware targets.

7 min readMar 20

Uk ICO launches investigation into X over AI-generated non-consensual sexual imagery

The UK ICO’s X probe shows AI-generated sexual abuse is becoming a privacy enforcement issue, not just a moderation problem.

9 min readMar 20

Ice agent doxxing site hit by DDoS traffic routed through Russian servers

A reported DDoS against an ICE doxxing-linked site shows how breach fallout can escalate into harassment, outages, and weakly attributed cyber conflic

9 min readMar 20

More attackers are logging in, not breaking in

Credential theft is rising as infostealers, session hijacking, and AI-assisted phishing let attackers log in quietly instead of exploiting systems.

9 min readMar 20

Cisco firewall vulnerability exploited as zero-day in Interlock ransomware attacks

Amazon says a Cisco FMC flaw was exploited as a zero-day in Interlock ransomware attacks, putting firewall management systems at high risk.

8 min readMar 20

Fake PoCs, misunderstood risks cause Cisco SD-WAN chaos

Fake exploit claims muddied the real risk of Cisco SD-WAN flaws, but exposed management systems still pose serious enterprise danger.

7 min readMar 20

Why Stryker's outage is a disaster recovery wake-up call

Stryker’s outage shows why cyber resilience, not just compliance, now defines business continuity in regulated industries.

7 min readMar 20

EU sanctions companies in china, Iran for cyberattacks

EU cyber sanctions on firms in China and Iran raise urgent supply chain, compliance, and vendor risk issues for businesses operating in Europe.

8 min readMar 20

Russian hackers exploit Zimbra flaw in ukrainian government attacks

APT28 hackers linked to Russia’s GRU are exploiting a Zimbra flaw to target Ukrainian government entities, highlighting urgent patching needs.

7 min readMar 20

Nation-State actor embraces AI malware assembly line

Pakistan-linked APT36 is using AI to mass-produce mediocre malware, shifting cyber risk from sophistication to scale and straining defenses.

7 min readMar 20

54 EDR killers abuse 34 signed vulnerable drivers to blind security tools

Researchers found 54 EDR killers abusing 34 signed vulnerable drivers via BYOVD, exposing a growing kernel-level threat to enterprise defenses.

7 min readMar 20

CISOs struggle to defend AI systems with outdated security tools, new study reveals

New study reveals majority of security leaders lack proper tools and skills to defend AI systems, creating critical vulnerabilities as organizations d

6 min readMar 19