Cybersecurity

Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers 

Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers 

Two known threat activity clusters codenamed Head Mare and Twelve have likely joined forces to target Russian entities, new findings from Kaspersky reveal.
“Head Mare relied heavily on tools previously associated with Twelve. Additionally, Head Mare attacks utilized command-and-control (C2) servers exclusively linked to Twelve prior to these incidents,” the company said. “This suggests

Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility 

Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility 

Two now-patched security flaws impacting Cisco Smart Licensing Utility are seeing active exploitation attempts, according to SANS Internet Storm Center.
The two critical-rated vulnerabilities in question are listed below – 

CVE-2024-20439 (CVSS score: 9.8) – The presence of an undocumented static user credential for an administrative account that an attacker could exploit to log in to an

YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users 

YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users 

YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russian-speaking users.
“What’s intriguing about this malware is how much it collects,” Kaspersky said in an analysis. “It grabs account information from VPN and gaming clients, and all kinds of network utilities like ngrok, Playit, Cyberduck, FileZilla, and

Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems 

Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems 

Veeam has released security updates to address a critical security flaw impacting its Backup & Replication software that could lead to remote code execution.
The vulnerability, tracked as CVE-2025-23120, carries a CVSS score of 9.9 out of 10.0. It affects 12.3.0.310 and all earlier version 12 builds.
“A vulnerability allowing remote code execution (RCE) by authenticated domain users,” the

How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model 

How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model 

Cybersecurity isn’t just another checkbox on your business agenda. It’s a fundamental pillar of survival. As organizations increasingly migrate their operations to the cloud, understanding how to protect your digital assets becomes crucial. The shared responsibility model, exemplified through Microsoft 365’s approach, offers a framework for comprehending and implementing effective cybersecurity

Six Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest Data 

Six Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest Data 

The governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore are likely customers of spyware developed by Israeli company Paragon Solutions, according to a new report from The Citizen Lab.
Paragon, founded in 2019 by Ehud Barak and Ehud Schneorson, is the maker of a surveillance tool called Graphite that’s capable of harvesting sensitive data from instant messaging applications

Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers 

Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers 

Regulatory compliance is no longer just a concern for large enterprises. Small and mid-sized businesses (SMBs) are increasingly subject to strict data protection and security regulations, such as HIPAA, PCI-DSS, CMMC, GDPR, and the FTC Safeguards Rule. However, many SMBs struggle to maintain compliance due to limited IT resources, evolving regulatory requirements, and complex security challenges

CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation 

CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw impacting NAKIVO Backup & Replication software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
The vulnerability in question is CVE-2024-48248 (CVSS score: 8.6), an absolute path traversal bug that could allow an unauthenticated attacker to

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X