Cybersecurity

PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign 

PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign 

Cybersecurity researchers have shed light on the inner workings of a botnet malware called PolarEdge.
PolarEdge was first documented by Sekoia in February 2025, attributing it to a campaign targeting routers from Cisco, ASUS, QNAP, and Synology with the goal of corralling them into a network for an as-yet-undetermined purpose.
The TLS-based ELF implant, at its core, is designed to monitor

John Bolton charged over classified emails after Iranian hack of his AOL account 

John Bolton charged over classified emails after Iranian hack of his AOL account 

Former US national security adviser John Bolton is the latest in a line of Donald Trump’s critics to find themselves on the sharp end of charges from the US Department of Justice.

Bolton, who left the White Hose in 2021 and wrote a tell-all memoir describing Trump as unfit for office and “stunningly uninformed,” has been charged with mishandling classified information.

Specifically, prosecutors allege that Bolton improperly retained and transmitted classified information to members of his family, via an AOL account.

Read more in my article on the Hot for Security blog.

Securing AI to Benefit from AI 

Securing AI to Benefit from AI 

Artificial intelligence (AI) holds tremendous promise for improving cyber defense and making the lives of security practitioners easier. It can help teams cut through alert fatigue, spot patterns faster, and bring a level of scale that human analysts alone can’t match. But realizing that potential depends on securing the systems that make it possible.
Every organization experimenting with AI in

Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers 

Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers 

A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025, suggesting an increased “operations tempo” from the threat actor.
The findings come from Google Threat Intelligence Group (GTIG), which said the state-sponsored hacking crew has rapidly refined and retooled its malware arsenal merely five days following

Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network 

Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network 

A European telecommunications organization is said to have been targeted by a threat actor that aligns with a China-nexus cyber espionage group known as Salt Typhoon.
The organization, per Darktrace, was targeted in the first week of July 2025, with the attackers exploiting a Citrix NetScaler Gateway appliance to obtain initial access.
Salt Typhoon, also known as Earth Estries, FamousSparrow,

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets 

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities (KEV) Catalog, officially confirming a recently disclosed vulnerability impacting Oracle E-Business Suite (EBS) has been weaponized in real-world attacks.
The security defect in question is CVE-2025-61884 (CVSS score: 7.5), which has been described as a

⚡ Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More 

⚡ Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More 

It’s easy to think your defenses are solid — until you realize attackers have been inside them the whole time. The latest incidents show that long-term, silent breaches are becoming the norm. The best defense now isn’t just patching fast, but watching smarter and staying alert for what you don’t expect.
Here’s a quick look at this week’s top threats, new tactics, and security stories shaping

Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches 

Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches 

ClickFix, FileFix, fake CAPTCHA — whatever you call it, attacks where users interact with malicious scripts in their web browser are a fast-growing source of security breaches. 
ClickFix attacks prompt the user to solve some kind of problem or challenge in the browser — most commonly a CAPTCHA, but also things like fixing an error on a webpage. 
The name is a little misleading, though

131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign 

131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign 

Cybersecurity researchers have uncovered a coordinated campaign that leveraged 131 rebranded clones of a WhatsApp Web automation extension for Google Chrome to spam Brazilian users at scale.
The 131 spamware extensions share the same codebase, design patterns, and infrastructure, according to supply chain security company Socket. The browser add-ons collectively have about 20,905 active users.

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X