CRIL has identified a commodity loader being leveraged by various threat actors in targeted email campaigns. Executive Summary CRIL (Cyble Research and Intelligence Labs) has been tracking a sophisticated commodity loader utilized by multiple high-capability threat actors. The campaign demonstrates… Read More "Unmasking The Loader Used In Targeted Email Campaigns"
WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability
Dec 19, 2025Ravie LakshmananVulnerability / Network Security WatchGuard has released fixes to address a critical security flaw in Fireware OS that it said has been exploited in real-world attacks. Tracked as CVE-2025-14733 (CVSS score: 9.3), the vulnerability has been described… Read More "WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability"
Attackers bring their own passwords to Cisco and Palo Alto VPNs
The targeted portals were geographically distributed, primarily in the United States, Pakistan, and Mexico, with the traffic almost exclusively originating from IP space linked to a single German hosting provider, 3xk GmbH. The login attempts followed a highly uniform pattern,… Read More "Attackers bring their own passwords to Cisco and Palo Alto VPNs"
Why you should never pay to get paid
Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played by gamified job scams. 04 Jul 2025 • , 4 min. read Many of us have been experiencing a cost-of-living… Read More "Why you should never pay to get paid"
US Charges 54 in Massive ATM Jackpotting Conspiracy
A whopping 54 individuals have been indicted for their roles in a conspiracy to deploy malware and commit ATM Jackpotting fraud. A federal grand jury in the District of Nebraska has returned two incidents, one on December 9 which charged 22… Read More "US Charges 54 in Massive ATM Jackpotting Conspiracy"
12 Best Third-Party Risk Management Software Solutions (2025)
From U.S. executive orders to cyber regulations, prominent cybersecurity policies are increasing their inclusion of Third-Party Risk Management standards, and for good reason – every organization, no matter what size, is impacted by third-party risks. If you’re looking for a… Read More "12 Best Third-Party Risk Management Software Solutions (2025)"
Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks
Dec 19, 2025Ravie LakshmananCybercrime / Law Enforcement Authorities in Nigeria have announced the arrest of three “high-profile internet fraud suspects” who are alleged to have been involved in phishing attacks targeting major corporations, including the main developer behind the RaccoonO365… Read More "Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks"
Cisco bestätigt Zero-Day-Exploit für Secure Email
Cisco hat eine Zero-Day-Lücke in seinen Secure-Email-Produkten entdeckt. JarTee – shutterstock.com Cisco Talos hat kürzlich eine Cyberkampagne entdeckt, die auf Ciscos AsyncOS-Software für Secure Email Gateway, Secure Email und Web Manager abzielt. Die Kampagne soll mindestens seit Ende November laufen.… Read More "Cisco bestätigt Zero-Day-Exploit für Secure Email"
How to get into cybersecurity
Cracking the code of a successful cybersecurity career starts here. Hear from ESET’s Robert Lipovsky as he reveals how to break into and thrive in this fast-paced field. 04 Jul 2025 What does it take to break into cybersecurity? Is… Read More "How to get into cybersecurity"
FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime
The FBI has led an operation that seized websites and infrastructure linked to E-Note, a cryptocurrency exchange that allegedly enabled cybercrime. In a statement published on December 17, the US Attorney’s Office for the Eastern District of Michigan said the… Read More "FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime"