Cybersecurity

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit 

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit 

Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware, while also incorporating the ability to bypass the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems using a now-patched vulnerability disclosed earlier this year.
Slovakian cybersecurity company ESET said the samples were uploaded

Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning 

Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting Dassault Systèmes DELMIA Apriso Manufacturing Operations Management (MOM) software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The vulnerability, tracked as CVE-2025-5086, carries a CVSS score of 9.0 out of 10.0. According to

Cloud-Native Security in 2025: Why Runtime Visibility Must Take Center Stage 

Cloud-Native Security in 2025: Why Runtime Visibility Must Take Center Stage 

The security landscape for cloud-native applications is undergoing a profound transformation. Containers, Kubernetes, and serverless technologies are now the default for modern enterprises, accelerating delivery but also expanding the attack surface in ways traditional security models can’t keep up with.
As adoption grows, so does complexity. Security teams are asked to monitor sprawling hybrid

Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories 

Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories 

A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when a maliciously crafted repository is opened using the program.
The issue stems from the fact that an out-of-the-box security setting is disabled by default, opening the door for attackers to run arbitrary code on users’ computers with their privileges.

Bulletproof Host Stark Industries Evades EU Sanctions 

Bulletproof Host Stark Industries Evades EU Sanctions 

In May 2025, the European Union levied financial sanctions on the owners of Stark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of Kremlin-linked cyberattacks and disinformation campaigns. But new data shows those sanctions have done little to stop Stark from simply rebranding and transferring their assets to other corporate entities controlled by its original hosting providers.

Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity 

Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity 

Google on Tuesday announced that its new Google Pixel 10 phones support the Coalition for Content Provenance and Authenticity (C2PA) standard out of the box to verify the origin and history of digital content.
To that end, support for C2PA’s Content Credentials has been added to Pixel Camera and Google Photos apps for Android. The move, Google said, is designed to further digital media

Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence 

Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence 

U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to probe Microsoft and hold it responsible for what he called “gross cybersecurity negligence” that enabled ransomware attacks on U.S. critical infrastructure, including against healthcare networks.
“Without timely action, Microsoft’s culture of negligent cybersecurity, combined with its de facto monopolization of the

SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers 

SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers 

Threat actors affiliated with the Akira ransomware group have continued to target SonicWall devices for initial access.
Cybersecurity firm Rapid7 said it observed a spike in intrusions involving SonicWall appliances over the past month, particularly following reports about renewed Akira ransomware activity since late July 2025.
SonicWall subsequently revealed the SSL VPN activity aimed at its

Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts 

Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts 

Cybersecurity researchers have disclosed two new campaigns that are serving fake browser extensions using malicious ads and fake websites to steal sensitive data.
The malvertising campaign, per Bitdefender, is designed to push fake “Meta Verified” browser extensions named SocialMetrics Pro that claim to unlock the blue check badge for Facebook and Instagram profiles. At least 37 malicious ads

Cracking the Boardroom Code: Helping CISOs Speak the Language of Business 

Cracking the Boardroom Code: Helping CISOs Speak the Language of Business 

CISOs know their field. They understand the threat landscape. They understand how to build a strong and cost-effective security stack. They understand how to staff out their organization. They understand the intricacies of compliance. They understand what it takes to reduce risk. Yet one question comes up again and again in our conversations with these security leaders: how do I make the impact

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X