• SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances

    SonicWall has rolled out fixes to address a security flaw in Secure Mobile Access (SMA) 100 series appliances that it said has been actively exploited in the wild. The vulnerability, tracked as CVE-2025-40602 (CVSS score: 6.6), concerns a case of local privilege escalation that arises as a result of insufficient authorization in the appliance management…

    Read More

  • APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign

    The Russian state-sponsored threat actor known as APT28 has been attributed to what has been described as a “sustained” credential-harvesting campaign targeting users of UKR[.]net, a webmail and news service popular in Ukraine. The activity, observed by Recorded Future’s Insikt Group between June 2024 and April 2025, builds upon prior findings from the cybersecurity company…

    Read More

  • Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time

    Modern security teams often feel like they’re driving through fog with failing headlights. Threats accelerate, alerts multiply, and SOCs struggle to understand which dangers matter right now for their business. Breaking out of reactive defense is no longer optional. It’s the difference between preventing incidents and cleaning up after them. Below is the path from…

    Read More

  • GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads

    A new campaign named GhostPoster has leveraged logo files associated with 17 Mozilla Firefox browser add-ons to embed malicious JavaScript code designed to hijack affiliate links, inject tracking code, and commit click and ad fraud. The extensions have been collectively downloaded over 50,000 times, according to Koi Security, which discovered the campaign. The add-ons are…

    Read More

  • Public shares ICE concerns following Home Depot arrest

    THE DALLES — Concerned community members showed up in droves to The Dalles City Council meeting on Dec. 8, nearly overflowing the council chamber. Many attendees, either representing or supporting the city’s robust Latino community, expressed heartache and anxiety over…

    Read More

  • Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

    An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management (IAM) credentials to enable cryptocurrency mining. The activity, first detected by Amazon’s GuardDuty managed threat detection service and its automated security monitoring systems on November 2, 2025, employs never-before-seen persistence techniques to hamper

    Read More

  • Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

    Cybersecurity researchers have discovered a new malicious NuGet package that typosquats and impersonates the popular .NET tracing library and its author to sneak in a cryptocurrency wallet stealer. The malicious package, named “Tracer.Fody.NLog,” remained on the repository for nearly six years. It was published by a user named “csnemess” on February 26, 2020. It masquerades…

    Read More

  • Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

    Amazon’s threat intelligence team has disclosed details of a “years-long” Russian state-sponsored campaign that targeted Western critical infrastructure between 2021 and 2025. Targets of the campaign included energy sector organizations across Western nations, critical infrastructure providers in North America and Europe, and entities with cloud-hosted network infrastructure. The activity has

    Read More

  • Why Data Security and Privacy Need to Start in Code

    AI-assisted coding and AI app generation platforms have created an unprecedented surge in software development. Companies are now facing rapid growth in both the number of applications and the pace of change within those applications. Security and privacy teams are under significant pressure as the surface area they must cover is expanding quickly while their…

    Read More

  • React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

    The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor, according to findings from Palo Alto Networks Unit 42 and NTT Security. “KSwapDoor is a professionally engineered remote access tool designed with stealth in mind,” Justin Moore, senior manager of threat intel research at Palo…

    Read More