• Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind

    Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind

    AI is changing cybersecurity faster than many defenders realize. Attackers are already using AI to automate reconnaissance, generate sophisticated phishing lures, and exploit vulnerabilities before security teams can react. Meanwhile, defenders are overwhelmed by massive amounts of data and alerts, struggling to process information quickly enough to identify real threats. AI offers a way to

    Read More

  • Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT

    Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT

    A threat actor with ties to Pakistan has been observed targeting various sectors in India with various remote access trojans like Xeno RAT, Spark RAT, and a previously undocumented malware family called CurlBack RAT. The activity, detected by SEQRITE in December 2024, targeted Indian entities under railway, oil and gas, and external affairs ministries, marking…

    Read More

  • Executive Insights: Ashley Wise from Providence Health Plan discusses leadership, mentorship and work-life balance (video)

    Executive Insights: Ashley Wise from Providence Health Plan discusses leadership, mentorship and work-life balance (video)

    Candace Beeke, publisher and president of the Portland Business Journal, recently met with Ashley Wise, vice president of finance at Providence Health Plan, to discuss her leadership journey, challenges and the importance of balancing executive presence with authenticity. Wise shared insights on overcoming the confidence gap, valuing mentorship and setting boundaries for work-life integration. She…

    Read More

  • Seattle gets gift from FIFA as 2025 Club World Cup host

    Seattle gets gift from FIFA as 2025 Club World Cup host

    FIFA is earmarking the money for soccer pitches and other social projects.

    Read More

  • Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

    Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

    Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used to breach the devices was patched. The attackers are believed to have leveraged known and now-patched security flaws, including, but not limited to, CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762. “A threat actor…

    Read More

  • Wells Fargo economists predict Fed rate cuts as labor market weakens

    Wells Fargo economists predict Fed rate cuts as labor market weakens

    “We’re expecting payroll hiring to come close to grinding to a halt this year, which we think would push up the unemployment rate to 4.6% in the fourth quarter,” Wells Fargo Senior Economist Sarah House told the bank’s clients.

    Read More

  • Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors

    Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors

    The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul. The activity, which took place between July and December 2024, singled out organizations in the mass media, telecommunications, construction, government entities, and energy sectors, Kaspersky said in a new report published Thursday. Paper Werewolf, also…

    Read More

  • Initial Access Brokers Shift Tactics, Selling More for Less

    Initial Access Brokers Shift Tactics, Selling More for Less

    What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that access to other cybercriminals. This division of labor allows IABs to concentrate on their core expertise: exploiting vulnerabilities through methods like social engineering and brute-force attacks.  By selling access, they significantly mitigate the

    Read More

  • Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways

    Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways

    Palo Alto Networks has revealed that it’s observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after threat actors warned of a surge in suspicious login scanning activity targeting its appliances. “Our teams are observing evidence of activity consistent with password-related attacks, such as brute-force login attempts, which does not indicate exploitation of a

    Read More

  • OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation

    OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation

    A newly disclosed high-severity security flaw impacting OttoKit (formerly SureTriggers) has come under active exploitation within a few hours of public disclosure. The vulnerability, tracked as CVE-2025-3102 (CVSS score: 8.1), is an authorization bypass bug that could permit an attacker to create administrator accounts under certain conditions and take control of susceptible websites. “The

    Read More