Cybersecurity

Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts 

Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts 

Cybersecurity researchers have detailed a new cluster of activity where threat actors are impersonating enterprises with fake Microsoft OAuth applications to facilitate credential harvesting as part of account takeover attacks.
“The fake Microsoft 365 applications impersonate various companies, including RingCentral, SharePoint, Adobe, and Docusign,” Proofpoint said in a Thursday report.
The

AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown 

AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown 

Cybersecurity researchers have flagged a malicious npm package that was generated using artificial intelligence (AI) and concealed a cryptocurrency wallet drainer.
The package, @kodane/patch-manager, claims to offer “advanced license validation and registry optimization utilities for high-performance Node.js applications.” It was uploaded to npm by a user named “Kodane” on July 28, 2025. The

You Are What You Eat: Why Your AI Security Tools Are Only as Strong as the Data You Feed Them 

You Are What You Eat: Why Your AI Security Tools Are Only as Strong as the Data You Feed Them 

Just as triathletes know that peak performance requires more than expensive gear, cybersecurity teams are discovering that AI success depends less on the tools they deploy and more on the data that powers them
The junk food problem in cybersecurity
Imagine a triathlete who spares no expense on equipment—carbon fiber bikes, hydrodynamic wetsuits, precision GPS watches—but fuels their

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks 

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks 

The threat actor linked to the exploitation of the recently disclosed security flaws in Microsoft SharePoint Server is using a bespoke command-and-control (C2) framework called AK47 C2 (also spelled ak47c2) in its operations.
The framework includes at least two different types of clients, HTTP-based and Domain Name System (DNS)-based, which have been dubbed AK47HTTP and AK47DNS, respectively, by

Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies 

Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies 

The Russian nation-state threat actor known as Secret Blizzard has been observed orchestrating a new cyber espionage campaign targeting foreign embassies located in Moscow by means of an adversary-in-the-middle (AitM) attack at the Internet Service Provider (ISP) level and delivering a custom malware dubbed ApolloShadow.
“ApolloShadow has the capability to install a trusted root certificate to

Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials 

Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials 

Cybersecurity researchers have disclosed details of a new phishing campaign that conceals malicious payloads by abusing link wrapping services from Proofpoint and Intermedia to bypass defenses.
“Link wrapping is designed by vendors like Proofpoint to protect users by routing all clicked URLs through a scanning service, allowing them to block known malicious destinations at the moment of click,”

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto 

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto 

The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations by approaching their employees via LinkedIn and Telegram.
“Under the guise of freelance opportunities for software development work, UNC4899 leveraged social engineering techniques to successfully convince the targeted employees to execute malicious Docker containers in their

AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals 

AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals 

Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately secured by a platform capable of not just keeping pace, but staying ahead of an ever-evolving threat landscape.

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud 

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud 

The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM) infrastructure using a 4G-equipped Raspberry Pi as part of a covert attack.
The cyber-physical attack involved the adversary leveraging their physical access to install the Raspberry Pi device and have it connected directly to the same network switch as the ATM, effectively placing

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs 

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs 

Security Operations Centers (SOCs) are stretched to their limits. Log volumes are surging, threat landscapes are growing more complex, and security teams are chronically understaffed. Analysts face a daily battle with alert noise, fragmented tools, and incomplete data visibility. At the same time, more vendors are phasing out their on-premises SIEM solutions, encouraging migration to SaaS

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X