Cybersecurity

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments 

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments 

Virtualization and networking infrastructure have been targeted by a threat actor codenamed Fire Ant as part of a prolonged cyber espionage campaign.
The activity, observed this year, is primarily designed Now to infiltrate organizations’ VMware ESXi and vCenter environments as well as network appliances, Sygnia said in a new report published today.
“The threat actor leveraged combinations of

CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing 

CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing 

Cybersecurity researchers have shed light on a new versatile malware loader called CastleLoader that has been put to use in campaigns distributing various information stealers and remote access trojans (RATs).
The activity employs Cloudflare-themed ClickFix phishing attacks and fake GitHub repositories opened under the names of legitimate applications, Swiss cybersecurity company PRODAFT said in

Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices 

Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices 

Sophos and SonicWall have alerted users of critical security flaws in Sophos Firewall and Secure Mobile Access (SMA) 100 Series appliances that could be exploited to achieve remote code execution. 
The two vulnerabilities impacting Sophos Firewall are listed below –

CVE-2025-6704 (CVSS score: 9.8) – An arbitrary file writing vulnerability in the Secure PDF eXchange (SPX) feature can lead

Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them 

Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them 

Is Managing Customer Logins and Data Giving You Headaches? You’re Not Alone!
Today, we all expect super-fast, secure, and personalized online experiences. But let’s be honest, we’re also more careful about how our data is used. If something feels off, trust can vanish in an instant. Add to that the lightning-fast changes AI is bringing to everything from how we log in to spotting online fraud,

Pentests once a year? Nope. It’s time to build an offensive SOC 

Pentests once a year? Nope. It’s time to build an offensive SOC 

You wouldn’t run your blue team once a year, so why accept this substandard schedule for your offensive side?
Your cybersecurity teams are under intense pressure to be proactive and to find your network’s weaknesses before adversaries do. But in many organizations, offensive security is still treated as a one-time event: an annual pentest, a quarterly red team engagement, maybe an audit sprint

China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan Community 

China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan Community 

The Tibetan community has been targeted by a China-nexus cyber espionage group as part of two campaigns conducted last month ahead of the Dalai Lama’s 90th birthday on July 6, 2025.
The multi-stage attacks have been codenamed Operation GhostChat and Operation PhantomPrayers by Zscaler ThreatLabz.
“The attackers compromised a legitimate website, redirecting users via a malicious link and

Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems 

Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems 

Microsoft has revealed that one of the threat actors behind the active exploitation of SharePoint flaws is deploying Warlock ransomware on targeted systems.
The tech giant, in an update shared Wednesday, said the findings are based on an “expanded analysis and threat intelligence from our continued monitoring of exploitation activity by Storm-2603.”
The threat actor attributed to the financially

Europol Arrests XSS Forum Admin in Kyiv After 12-Year Run Operating Cybercrime Marketplace 

Europol Arrests XSS Forum Admin in Kyiv After 12-Year Run Operating Cybercrime Marketplace 

Europol on Monday announced the arrest of the suspected administrator of XSS.is (formerly DaMaGeLaB), a notorious Russian-speaking cybercrime platform.
The arrest, which took place in Kyiv, Ukraine, on July 222, 2025, was led by the French Police and Paris Prosecutor, in collaboration with Ukrainian authorities and Europol. The action is the result of an investigation that was launched by the

Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access 

Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access 

Cybersecurity researchers have uncovered a new stealthy backdoor concealed within the “mu-plugins” directory in WordPress sites to grant threat actors persistent access and allow them to perform arbitrary actions.
Must-use plugins (aka mu-plugins) are special plugins that are automatically activated on all WordPress sites in the installation. They are located in the “wp-content/mu-plugins”

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X