Cybersecurity

Bridging the Remediation Gap: Introducing Pentera Resolve 

Bridging the Remediation Gap: Introducing Pentera Resolve 

From Detection to Resolution: Why the Gap Persists
A critical vulnerability is identified in an exposed cloud asset. Within hours, five different tools alert you about it: your vulnerability scanner, XDR, CSPM, SIEM, and CMDB each surface the issue in their own way, with different severity levels, metadata, and context.
What’s missing is a system of action. How do you transition from the

Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys 

Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys 

Cybersecurity researchers have uncovered a new supply chain attack targeting the NuGet package manager with malicious typosquats of Nethereum, a popular Ethereum .NET integration platform, to steal victims’ cryptocurrency wallet keys.
The package, Netherеum.All, has been found to harbor functionality to decode a command-and-control (C2) endpoint and exfiltrate mnemonic phrases, private keys, and

Why You Should Swap Passwords for Passphrases 

Why You Should Swap Passwords for Passphrases 

The advice didn’t change for decades: use complex passwords with uppercase, lowercase, numbers, and symbols. The idea is to make passwords harder for hackers to crack via brute force methods. But more recent guidance shows our focus should be on password length, rather than complexity. Length is the more important security factor, and passphrases are the simplest way to get your users to create

Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware 

Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware 

Government, financial, and industrial organizations located in Asia, Africa, and Latin America are the target of a new campaign dubbed PassiveNeuron, according to findings from Kaspersky.
The cyber espionage activity was first flagged by the Russian cybersecurity vendor in November 2024, when it disclosed a set of attacks aimed at government entities in Latin America and East Asia in June, using

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution 

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution 

Cybersecurity researchers have disclosed details of a high-severity flaw impacting the popular async-tar Rust library and its forks, including tokio-tar, that could result in remote code execution under certain conditions.
The vulnerability, tracked as CVE-2025-62518 (CVSS score: 8.1), has been codenamed TARmageddon by Edera, which discovered the issue in late August 2025. It impacts several

TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution 

TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution 

TP-Link has released security updates to address four security flaws impacting Omada gateway devices, including two critical bugs that could result in arbitrary code execution.
The vulnerabilities in question are listed below –

CVE-2025-6541 (CVSS score: 8.6) – An operating system command injection vulnerability that could be exploited by an attacker who can log in to the web management

Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams 

Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams 

Meta on Tuesday said it’s launching new tools to protect Messenger and WhatsApp users from potential scams.
To that end, the company said it’s introducing new warnings on WhatsApp when users attempt to share their screen with an unknown contact during a video call so as to prevent them from giving away sensitive information like bank details or verification codes.
On Messenger, users can opt to

The AI Fix #73: Google Gemini is a gambling addict, and how to poison an AI 

The AI Fix #73: Google Gemini is a gambling addict, and how to poison an AI 

In episode 73 of The AI Fix, AI now writes more web content than humans and more books by ex-British prime ministers than ex-British prime ministers. Mark eats a dodgy prawn, Google discovers a new pathway to treating cancer, a lawyer gets skewered for using AI over and over again, and a US general declares that he’s outsourced his brain to ChatGPT.

Also in this episode, Graham discovers that LLMs show all the characteristics of pathological gambling, and Mark explains why AI training is like eating a prawn buffet.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign 

PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign 

Cybersecurity researchers have shed light on the inner workings of a botnet malware called PolarEdge.
PolarEdge was first documented by Sekoia in February 2025, attributing it to a campaign targeting routers from Cisco, ASUS, QNAP, and Synology with the goal of corralling them into a network for an as-yet-undetermined purpose.
The TLS-based ELF implant, at its core, is designed to monitor

John Bolton charged over classified emails after Iranian hack of his AOL account 

John Bolton charged over classified emails after Iranian hack of his AOL account 

Former US national security adviser John Bolton is the latest in a line of Donald Trump’s critics to find themselves on the sharp end of charges from the US Department of Justice.

Bolton, who left the White Hose in 2021 and wrote a tell-all memoir describing Trump as unfit for office and “stunningly uninformed,” has been charged with mishandling classified information.

Specifically, prosecutors allege that Bolton improperly retained and transmitted classified information to members of his family, via an AOL account.

Read more in my article on the Hot for Security blog.

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X