Source: www.cyberdefensemagazine.com – Author: News team Michelle Moore University of San Diego’s September 11, 2025 Remote work is here to stay, with nearly a quarter of the...
Month: September 2025
Boost Operational Resilience: Proactive Security with CORA Best Practices – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team On almost a monthly basis, the US Cybersecurity & Infrastructure Security Agency (CISA) publishes advisories about the latest cybersecurity risks,...
More Than Sales… How Brokers Can Play a Critical Role in Strengthening the USA’s National Cybersecurity – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team As cyber threats continue to rise, enterprises can rely on unexpected allies for support: their insurance brokers. Brokers are not...
Using Artificial Intelligence for Strengthening Email Security – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Today, email-based attacks are increasingly sophisticated, however artificial intelligence (AI) can offer vital defense. With AI use, organizations can counteract...
Chinese APT Actor Compromises Military Firm with Novel Fileless Malware Toolset – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A Chinese APT group has compromised a Philippines-based military firm using a novel, sophisticated fileless malware framework dubbed “EggStreme”, Bitdefender researchers have...
France: Three Regional Healthcare Agencies Targeted by Cyber-Attacks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: French regional healthcare agencies have been targeted by cyber-attacks compromising the personal data of patients across the country. On September 8, the...
Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A 28-year-old Ukrainian has been added to a list of Europe’s most wanted fugitives for alleged participation in LockerGoga ransomware attacks. Volodymyr...
LNER Reveals Supply Chain Attack Compromised Customer Information – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The operator of one of the UK’s busiest rail lines has admitted that an unauthorized third party has accessed customer details via...
SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers – Source:thehackernews.com
Source: thehackernews.com – Author: . Threat actors affiliated with the Akira ransomware group have continued to target SonicWall devices for initial access. Cybersecurity firm Rapid7 said...
Cracking the Boardroom Code: Helping CISOs Speak the Language of Business – Source:thehackernews.com
Source: thehackernews.com – Author: . CISOs know their field. They understand the threat landscape. They understand how to build a strong and cost-effective security stack. They...
Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have disclosed two new campaigns that are serving fake browser extensions using malicious ads and fake websites to steal...
AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have disclosed details of a new campaign that leverages ConnectWise ScreenConnect, a legitimate Remote Monitoring and Management (RMM) software,...
Cisco IOS XR Software Management Interface ACL Bypass Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco IOS XR Software Management Interface ACL Bypass Vulnerability Medium CVE-2025-20159 CWE-284 Download CSAF Email Summary A vulnerability in the management...
Salesloft Drift Supply Chain Attack Affects Hundreds of Businesses – Source:levelblue.com
Source: levelblue.com – Author: hello@alienvault.com. LevelBlue’s Security & Compliance Team is aware of the Salesloft vulnerability affecting Drift chatbot integrations. LevelBlue, and its affiliated entities, do...
September Patch Tuesday handles 81 CVEs – Source: news.sophos.com
Source: news.sophos.com – Author: Angela Gunn .Microsoft on Tuesday announced 81 patches affecting 15 product families. Nine of the addressed issues are considered by Microsoft to...
Highly Popular NPM Packages Poisoned in New Supply Chain Attack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Threat actors injected malicious code into multiple highly popular NPM packages after their maintainers fell for a well-crafted phishing email....
Chinese APT Hits Philippine Military Firm with New EggStreme Fileless Malware – Source:hackread.com
Source: hackread.com – Author: Waqas. Bitdefender uncovers EggStreme, a fileless malware by a China-based APT targeting the Philippine military and APAC organisations. Cybersecurity researchers at Bitdefender...
How npm Security Collapsed Thanks To a 2FA Exploit – Source: securityboulevard.com
Source: securityboulevard.com – Author: Steven J. Vaughan-Nichols Billions (No, that’s not a typo, Billions with a capital B) of files were potentially compromised. If you thought...
When is the Right Time to Hire a CISO? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Matthew Rosenquist Knowing when to hire a CISO is a challenging proposition – one which most organizations will eventually need to...
Imperva API Security: Authentication Risk Report—Key Findings & Fixes – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amrit Talapatra An in-depth analysis of common JSON Web Token (JWT) mistakes, basic auth, long-lived tokens, and quick, high-impact fixes to secure...
Randall Munroe’s XKCD ‘Coastline Similarity’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman via the geologic humor & dry-as-the-taiga wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Coastline...
UNC6395 Hackers Accessed Systems via a GitHub Account, Salesloft Says – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Security investigators from Google said UNC6395 hackers spent several months running through Salesloft and Drift systems before launching a data...
Patch Tuesday Update – September 2025 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Dragos Josanu In total, including third-party CVEs, in this Patch Tuesday edition, Microsoft published 86 CVEs, including 5 republished CVEs. Overall, Microsoft...
How Pixel and Android are bringing a new level of trust to your images with C2PA Content Credentials – Source:security.googleblog.com
Source: security.googleblog.com – Author: Edward Fernandez. Security Blog The latest news and insights from Google on security and safety on the Internet Original Post url: http://security.googleblog.com/2025/09/pixel-android-trusted-images-c2pa-content-credentials.html...
California, two other states to come down hard on GPC violators – Source: www.csoonline.com
Source: www.csoonline.com – Author: Investigative sweep targets businesses that may be failing to honor Global Privacy Control signals. US organizations are being advised to make sure...
Adobe Commerce and Magento users: Patch critical SessionReaper flaw now – Source: www.csoonline.com
Source: www.csoonline.com – Author: A critical vulnerability that could lead to account takeover and remote code execution has been patched in Magento and Adobe Commerce. Security...
Neues Phishing-Framework umgeht Multi-Faktor-Authentifizierung – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 10. Sept. 20254 Minuten Multifactor AuthenticationPhishingSicherheit Forscher decken eine aktuelle Phishing-Kampagne mit dem Salty2FA-Framework auf, das Verifizierungsmethoden aushebelt. Phishing 2.0 nutzt...
Cursor’s autorun lets hackers execute arbitrary code – Source: www.csoonline.com
Source: www.csoonline.com – Author: By default, malicious repositories run automatically when a folder is opened, putting developer machines and sensitive organizational data at risk. Oasis Security...
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
Source: www.csoonline.com – Author: Victims already span 17 countries, with manufacturing and construction hardest hit. Analysts warn that custom evasion tooling and domain‑wide deployment tactics heighten...
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
Source: www.csoonline.com – Author: Opinion Sep 10, 20258 mins Turns out your biggest breach risk might come from a vendor’s acquisition — and an old OAuth...