Cybersecurity

Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor 

Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor 

Russian aerospace and defense industries have become the target of a cyber espionage campaign that delivers a backdoor called EAGLET to facilitate data exfiltration.
The activity, dubbed Operation CargoTalon, has been assigned to a threat cluster tracked as UNG0901 (short for Unknown Group 901).
“The campaign is aimed at targeting employees of Voronezh Aircraft Production Association (VASO), one

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks 

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks 

Threat hunters have disclosed two different malware campaigns that have targeted vulnerabilities and misconfigurations across cloud environments to deliver cryptocurrency miners.
The threat activity clusters have been codenamed Soco404 and Koske by cloud security firms Wiz and Aqua, respectively.
Soco404 “targets both Linux and Windows systems, deploying platform-specific malware,” Wiz

Overcoming Risks from Chinese GenAI Tool Usage 

Overcoming Risks from Chinese GenAI Tool Usage 

A recent analysis of enterprise data suggests that generative AI tools developed in China are being used extensively by employees in the US and UK, often without oversight or approval from security teams. The study, conducted by Harmonic Security, also identifies hundreds of instances in which sensitive data was uploaded to platforms hosted in China, raising concerns over compliance, data

Phishers Target Aviation Execs to Scam Customers 

Phishers Target Aviation Execs to Scam Customers 

KrebsOnSecurity recently heard from a reader whose boss’s email account got phished and was used to trick one of the company’s customers into sending a large payment to scammers. An investigation into the attacker’s infrastructure points to a long-running Nigerian cybercrime group that is actively targeting established companies in the transportation and aviation industries.

Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems 

Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems 

Mitel has released security updates to address a critical security flaw in MiVoice MX-ONE that could allow an attacker to bypass authentication protections.
“An authentication bypass vulnerability has been identified in the Provisioning Manager component of Mitel MiVoice MX-ONE, which, if successfully exploited, could allow an unauthenticated attacker to conduct an authentication bypass attack

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments 

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments 

Virtualization and networking infrastructure have been targeted by a threat actor codenamed Fire Ant as part of a prolonged cyber espionage campaign.
The activity, observed this year, is primarily designed Now to infiltrate organizations’ VMware ESXi and vCenter environments as well as network appliances, Sygnia said in a new report published today.
“The threat actor leveraged combinations of

CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing 

CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing 

Cybersecurity researchers have shed light on a new versatile malware loader called CastleLoader that has been put to use in campaigns distributing various information stealers and remote access trojans (RATs).
The activity employs Cloudflare-themed ClickFix phishing attacks and fake GitHub repositories opened under the names of legitimate applications, Swiss cybersecurity company PRODAFT said in

Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices 

Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices 

Sophos and SonicWall have alerted users of critical security flaws in Sophos Firewall and Secure Mobile Access (SMA) 100 Series appliances that could be exploited to achieve remote code execution. 
The two vulnerabilities impacting Sophos Firewall are listed below –

CVE-2025-6704 (CVSS score: 9.8) – An arbitrary file writing vulnerability in the Secure PDF eXchange (SPX) feature can lead

Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them 

Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them 

Is Managing Customer Logins and Data Giving You Headaches? You’re Not Alone!
Today, we all expect super-fast, secure, and personalized online experiences. But let’s be honest, we’re also more careful about how our data is used. If something feels off, trust can vanish in an instant. Add to that the lightning-fast changes AI is bringing to everything from how we log in to spotting online fraud,

Pentests once a year? Nope. It’s time to build an offensive SOC 

Pentests once a year? Nope. It’s time to build an offensive SOC 

You wouldn’t run your blue team once a year, so why accept this substandard schedule for your offensive side?
Your cybersecurity teams are under intense pressure to be proactive and to find your network’s weaknesses before adversaries do. But in many organizations, offensive security is still treated as a one-time event: an annual pentest, a quarterly red team engagement, maybe an audit sprint

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X