• Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown

    Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown

    Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the ability to create a SOCKS5 proxy service, while also providing a stealthy backdoor-like functionality to drop additional payloads on Windows systems. The deceptive package, named soopsocks, attracted a total of 2,653 downloads before it was taken…

    Read More

  • Automating Pentest Delivery: 7 Key Workflows for Maximum Impact

    Automating Pentest Delivery: 7 Key Workflows for Maximum Impact

    Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time we automate the delivery of these results. The way results are delivered hasn’t kept up with today’s fast-moving threat landscape. Too often, findings are packaged into static reports, buried in PDFs or spreadsheets, and handed…

    Read More

  • How to Close Threat Detection Gaps: Your SOC’s Action Plan

    How to Close Threat Detection Gaps: Your SOC’s Action Plan

    Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of signals; some urgent, many irrelevant. The job is to find the real threats fast enough to keep cases from piling up, prevent analyst burnout, and maintain client or leadership confidence. The toughest challenges, however, aren’t the alerts that…

    Read More

  • Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

    Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

    Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to target users in the United Arab Emirates (U.A.E.). Slovak cybersecurity company ESET said the malicious apps are distributed via fake websites and social engineering to trick unsuspecting users into downloading them. Once installed, both the…

    Read More

  • Oregon Delegation Demands Trump Keep Federal Troops out Of Portland

    Oregon Delegation Demands Trump Keep Federal Troops out Of Portland

    Demand from Oregon lawmakers follows Trump’s pledge to send troops to city with orders to use full military force

    Read More

  • Oregon Journalism Project: Judge Declines to Dismiss Douglas County Elections Case

    Oregon Journalism Project: Judge Declines to Dismiss Douglas County Elections Case

    Plaintiff Todd Vaughn’s challenge of his May defeat in a race for Umpqua Public Transportation District board remains alive

    Read More

  • New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

    New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

    In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel’s Software Guard eXtensions (SGX) can be bypassed on DDR4 systems to passively decrypt sensitive data. SGX is designed as a hardware feature in Intel server processors that allows applications to be…

    Read More

  • OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

    OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

    A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if successfully exploited, could expose sensitive OpenID Connect (OIDC) application client secrets under certain circumstances. The vulnerability, tracked as CVE-2025-59363, has been assigned a CVSS score of 7.7 out of 10.0. It has been described as…

    Read More

  • How Leading Security Teams Blend AI + Human Workflows (Free Webinar)

    How Leading Security Teams Blend AI + Human Workflows (Free Webinar)

    AI is changing automation—but not always for the better. That’s why we’re hosting a new webinar, “Workflow Clarity: Where AI Fits in Modern Automation,” with Thomas Kinsella, Co-founder & Chief Customer Officer at Tines, to explore how leading teams are cutting through the hype and building workflows that actually deliver.The rise of AI has changed…

    Read More

  • 2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising

    2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising

    Bitdefender’s 2025 Cybersecurity Assessment Report paints a sobering picture of today’s cyber defense landscape: mounting pressure to remain silent after breaches, a gap between leadership and frontline teams, and a growing urgency to shrink the enterprise attack surface. The annual research combines insights from over 1,200 IT and security professionals across six countries, along with…

    Read More