Cybersecurity

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale 

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale 

You’ve probably already moved some of your business to the cloud—or you’re planning to. That’s a smart move. It helps you work faster, serve your customers better, and stay ahead.
But as your cloud setup grows, it gets harder to control who can access what.
Even one small mistake—like the wrong person getting access—can lead to big problems. We’re talking data leaks, legal trouble, and serious

Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities 

Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities 

Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF, identity governance and administration (IGA), access management (AM), privileged access management (PAM), and identity threat detection and response (ITDR) are all integrated into a single, cohesive control plane.
Building on Gartner’s definition of “identity

Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages 

Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages 

Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking service called Adspect to differentiate between real victims and security researchers to ultimately redirect them to sketchy crypto-themed sites.
The malicious npm packages, published by a threat actor named “dino_reborn” between September and November 2025, are

A miracle: A company says sorry after a cyber attack – and donates the ransom to cybersecurity research 

A miracle: A company says sorry after a cyber attack – and donates the ransom to cybersecurity research 

One of the sad truths about this world of seemingly endless hacks and data breaches is that companies just won’t apologise.

Even when customers, partners, and employees are left wondering when their data will be published by malicious hackers on the dark web, breached organisations will seemingly do everything they can to avoid saying what seems to be the hardest word of all: sorry.

Read more in my article on the Hot for Security blog.

Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet 

Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet 

Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-of-service (DDoS) attack targeting a single endpoint in Australia that measured 5.72 terabits per second (Tbps) and nearly 3.64 billion packets per second (pps).
The tech giant said it was the largest DDoS attack ever observed in the cloud, and that it originated from a TurboMirai-class Internet of

Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability 

Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability 

Google on Monday released security updates for its Chrome browser to address two security flaws, including one that has come under active exploitation in the wild.
The vulnerability in question is CVE-2025-13223 (CVSS score: 8.8), a type confusion vulnerability in the V8 JavaScript and WebAssembly engine that could be exploited to achieve arbitrary code execution or program crashes.
“Type

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT 

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT 

Cybersecurity researchers have discovered malware campaigns using the now-prevalent ClickFix social engineering tactic to deploy Amatera Stealer and NetSupport RAT.
The activity, observed this month, is being tracked by eSentire under the moniker EVALUSION.
First spotted in June 2025, Amatera is assessed to be an evolution of ACR (short for “AcridRain”) Stealer, which was available under the

⚡ Weekly Recap: Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More 

⚡ Weekly Recap: Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More 

This week showed just how fast things can go wrong when no one’s watching. Some attacks were silent and sneaky. Others used tools we trust every day — like AI, VPNs, or app stores — to cause damage without setting off alarms.
It’s not just about hacking anymore. Criminals are building systems to make money, spy, or spread malware like it’s a business. And in some cases, they’re using the same

5 Reasons Why Attackers Are Phishing Over LinkedIn 

5 Reasons Why Attackers Are Phishing Over LinkedIn 

Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social media, search engines, and messaging apps.
LinkedIn in particular has become a hotbed for phishing attacks, and for good reason. Attackers are running sophisticated spear-phishing attacks against company executives, with recent campaigns seen targeting

Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT 

Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT 

The threat actor known as Dragon Breath has been observed making use of a multi-stage loader codenamed RONINGLOADER to deliver a modified variant of a remote access trojan called Gh0st RAT.
The campaign, which is primarily aimed at Chinese-speaking users, employs trojanized NSIS installers masquerading as legitimate like Google Chrome and Microsoft Teams, according to Elastic Security Labs.
“The

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X