• North Korea Expands Fraudulent IT Worker Operations

    • Focus on Europe with global reach
    • Identified by Google’s Threat Intelligence Group
  • AkiraBot Targets 420,000 Sites with OpenAI-Generated Spam

    • Spams website chats, comment sections, and contact forms
    • Bypasses CAPTCHA protections
  • Lovable AI Found Vulnerable to VibeScamming

    • Vulnerable AI platform for creating web applications
    • Susceptible to jailbreaking
  • New TCESB Malware Exploits ESET Security Scanner

    • Chinese-affiliated threat actor exploiting security flaw in ESET
    • Delivers previously undocumented malware
  • PipeMagic Trojan Exploits Windows Zero-Day Vulnerability

    • Windows CLFS security flaw exploited in ransomware attacks
    • Targeted a small number of victims
  • CISA Warns of CentreStack’s Hard-Coded MachineKey Vulnerability

    • CISA adds security flaw impacting CentreStack to known exploited vulnerabilities
    • Allows for Remote Code Execution (RCE) attacks
  • Explosive Growth of Non-Human Identities Creating Security Blind Spots

    • GitGuardian report reveals secrets exposure due to NHIs
    • Highlights security risks in modern software environments
  • Critical FortiSwitch Flaw Allows Remote Admin Password Changes

    • Security patches released for FortiSwitch devices
    • Vulnerability exploited for remote admin password changes
  • Microsoft Investigates Global Exchange Admin Center Outage

    • Ongoing outage blocking admin access to EAC
    • Microsoft actively investigating the issue
  • US Comptroller Cyber ‘Incident’ Compromises Org’s Emails

    • Major cyber incident involving US Comptroller
    • Investigation ongoing by Treasury Department
  • China-Linked Hackers Harassing Ethnic Groups with Spyware

    • Targeting Uyghurs, Taiwanese, Tibetans with spyware
    • Spreading malicious apps on online forums
  • Spyware Maker NSO Group Lobbying Trump Administration

    • NSO Group hires lobbying firm with ties to Trump administration
    • Despite being on US Commerce Department’s blacklist
  • Tariffs May Prompt Increase in Global Cyberattacks

    • Concerns over reduced cybersecurity spending due to tariffs
    • Potential increase in global cyberattacks
  • Using Post-Quantum Planning to Improve Security Hygiene

    • Transition to post-quantum cryptography for improved security
    • Planning for present and future security needs