Cybersecurity

FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux 

FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux 

Threat hunters have shed light on a new campaign targeting the foreign ministry of an unnamed South American nation with bespoke malware capable of granting remote access to infected hosts.
The activity, detected in November 2024, has been attributed by Elastic Security Labs to a threat cluster it tracks as REF7707. Some of the other targets include a telecommunications entity and a university,

Microsoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries 

Microsoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries 

A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm has been attributed to a multi-year initial access operation dubbed BadPilot that stretched across the globe.
“This subgroup has conducted globally diverse compromises of Internet-facing infrastructure to enable Seashell Blizzard to persist on high-value targets and support tailored network operations,” the

Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability 

Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability 

Cybersecurity researchers have discovered a bypass for a now-patched security vulnerability in the NVIDIA Container Toolkit that could be exploited to break out of a container’s isolation protections and gain complete access to the underlying host.
The new vulnerability is being tracked as CVE-2025-23359 (CVSS score: 8.3). It affects the following versions –

NVIDIA Container Toolkit (All

How to Steer AI Adoption: A CISO Guide 

How to Steer AI Adoption: A CISO Guide 

CISOs are finding themselves more involved in AI teams, often leading the cross-functional effort and AI strategy. But there aren’t many resources to guide them on what their role should look like or what they should bring to these meetings. 
We’ve pulled together a framework for security leaders to help push AI teams and committees further in their AI adoption—providing them with the

8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation 

8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation 

Source: The Nation
A coordinated law enforcement operation has taken down the dark web data leak and negotiation sites associated with the 8Base ransomware gang.
Visitors to the data leak site are now greeted with a seizure banner that says: “This hidden site and the criminal content have been seized by the Bavarian State Criminal Police Office on behalf of the Office of the Public Prosecutor

Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update 

Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update 

Apple on Monday released out-of-band security updates to address a security flaw in iOS and iPadOS that it said has been exploited in the wild.
Assigned the CVE identifier CVE-2025-24200, the vulnerability has been described as an authorization issue that could make it possible for a malicious actor to disable USB Restricted Mode on a locked device as part of a cyber physical attack.
This

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores 

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores 

Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit card skimmer malware targeting Magento-based e-commerce websites.
Website security company Sucuri said the code, while appearing to be a typical GTM and Google Analytics script used for website analytics and advertising purposes, contains an obfuscated backdoor capable of providing attackers with persistent

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February] 

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February] 

In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucket—each one seems minor until it becomes the entry point for an attack.
This week, we’ve seen cybercriminals turn overlooked weaknesses into major security threats, proving once again that no system is too small to be targeted. The question

Don’t Overlook These 6 Critical Okta Security Configurations 

Don’t Overlook These 6 Critical Okta Security Configurations 

Given Okta’s role as a critical part of identity infrastructure, strengthening Okta security is essential. This article covers six key Okta security settings that provide a strong starting point, along with recommendations for implementing continuous monitoring of your Okta security posture.
With over 18,000 customers, Okta serves as the cornerstone of identity governance and security for

DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects 

DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects 

Threat actors have been observed targeting Internet Information Services (IIS) servers in Asia as part of a search engine optimization (SEO) manipulation campaign designed to install BadIIS malware.
“It is likely that the campaign is financially motivated since redirecting users to illegal gambling websites shows that attackers deploy BadIIS for profit,” Trend Micro researchers Ted Lee and

CALL US TODAY TO SPEAK TO A SECURITY EXPERT: 720.221.6804

X