Cyber News & Articles

Cyber News & Articles

From Tabletop to Turnkey: Building Cyber Resilience in Financial Services 

Introduction
Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement.
Crisis management or Tabletop exercises, for a long time relatively rare in the context of cybersecurity, have become required as a series of regulations has introduced this requirement to FSI organizations in

read more
Cyber News & Articles

ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More 

Cybercrime has stopped being a problem of just the internet — it’s becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and even trusted apps or social platforms are turning into attack vectors.
The result is a global system where every digital weakness can be turned into physical harm, economic loss, or political

read more
Cyber News & Articles

Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response 

Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response (MDR) — marking the fourth consecutive year of inclusion. According to Gartner, more than 600 providers globally claim to deliver MDR services, yet only a select few meet the criteria to appear in the Market Guide. While inclusion is not a ranking or comparative

read more
Cyber News & Articles

Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection 

The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware.
According to a new report from Bitdefender, the adversary is said to have enabled the Hyper-V role on selected victim systems to deploy a minimalistic, Alpine Linux-based virtual machine.
“This hidden environment, with its lightweight

read more
Cyber News & Articles

SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach 

SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files.
“The malicious activity – carried out by a state-sponsored threat actor – was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call,” the company said in a

read more
Cyber News & Articles

Cloudflare Scrubs Aisuru Botnet from Top Domains List 

For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare’s public ranking of the most frequently requested websites. Cloudflare responded by redacting Aisuru domain names from their top websites list. The chief executive at Cloudflare says Aisuru’s overlords are using the botnet to boost their malicious domain rankings, while simultaneously attacking the company’s domain name system (DNS) service.

read more
Cyber News & Articles

Smashing Security podcast #442: The hack that messed with time, and rogue ransom where negotiators 

Time itself comes under attack as a state-backed hacking gang spends two years tunnelling toward a nation’s master clock — with chaos potentially only a tick away.

Plus when ransomware negotiators turn to the dark side, what could possibly go wrong?

All this and more is discussed in episode 442 of the “Smashing Security” podcast with cybersecurity veteran Graham Cluley, and special guest Dave Bittner.

read more
Cyber News & Articles

Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly 

Google on Wednesday said it discovered an unknown threat actor using an experimental Visual Basic Script (VB Script) malware dubbed PROMPTFLUX that interacts with its Gemini artificial intelligence (AI) model API to write its own source code for improved obfuscation and evasion.
“PROMPTFLUX is written in VBScript and interacts with Gemini’s API to request specific VBScript obfuscation and

read more
Cyber News & Articles

Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data 

Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI’s ChatGPT artificial intelligence (AI) chatbot that could be exploited by an attacker to steal personal information from users’ memories and chat histories without their knowledge.
The seven vulnerabilities and attack techniques, according to Tenable, were found in OpenAI’s GPT-4o and GPT-5 models. OpenAI has

read more
Cyber News & Articles

Securing the Open Android Ecosystem with Samsung Knox 

Raise your hand if you’ve heard the myth, “Android isn’t secure.”
Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may worry about the security—after all, work data is critical.
However, outdated concerns can hold your business back from unlocking its full potential. The truth is, with work happening everywhere, every device connected to your

read more

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X