RTO Scam Wave Continues: A Surge in Browser-Based e-Challan Phishing and Shared Fraud Infrastructure CRIL Uncovers a New Wave of Browser-Based e-Challan Phishing Powered by Shared Fraud Infrastructure. Following our earlier reporting on RTO-themed threats, CRIL observed a renewed phishing… Read More "RTO Scam Wave Continues"
Inside Fidelis EDR: Advanced Endpoint Detection Redefined
Sarika Sharma Sarika, a cybersecurity enthusiast, contributes insightful articles to Fidelis Security, guiding readers through the complexities of digital security with clarity and passion. Beyond her writing, she actively engages in the cybersecurity community, staying informed about emerging trends and… Read More "Inside Fidelis EDR: Advanced Endpoint Detection Redefined"
China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
Jan 08, 2026Ravie LakshmananMalware / Threat Intelligence A China-nexus threat actor known as UAT-7290 has been attributed to espionage-focused intrusions against entities in South Asia and Southeastern Europe. The activity cluster, which has been active since at least 2022, primarily… Read More "China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes"
Cybersecurity at the edge: Securing rugged IoT in mission-critical environments
Edge computing is no longer a futuristic concept; it’s a reality shaping mission-critical operations across defense, utilities and public safety. Rugged IoT devices, engineered to withstand extreme conditions, are the backbone of this transformation. They enable real-time decision-making in environments… Read More "Cybersecurity at the edge: Securing rugged IoT in mission-critical environments"
Phishing attacks exploit misconfigured emails to target Microsoft 365
A surge in phishing attacks which exploit email routing settings and misconfigured domain spoofing protections to spoof domains and make malicious emails appear as if they were sent from within the organization are targeting Microsoft 365 accounts. Microsoft Threat Intelligence… Read More "Phishing attacks exploit misconfigured emails to target Microsoft 365"
Top 8 Network Segmentation Best Practices in 2026
As businesses and organizations scale and grow, their network infrastructure can also grow increasingly large and complex. Using a flat network structure (all devices connected on one server) makes it easier for cybercriminals to roam freely and unimpeded in the… Read More "Top 8 Network Segmentation Best Practices in 2026"
Australia & NZ Initial Access Threat Landscape 2025
Cyble’s 2025 report analyzes Initial Access sales, ransomware operations, and data breaches shaping the cyber threat landscape in Australia and New Zealand. The cyber threat environment in Australia and New Zealand experienced a new escalation throughout 2025, driven by a surge in initial access sales,… Read More "Australia & NZ Initial Access Threat Landscape 2025"
How to Improve Cloud Visibility Across Hybrid Environments?
Multi-cloud inconsistencies Each cloud provider exposes logs, APIs, and telemetry differently. You cannot correlate behavior across environments effectively. Shadow IT & unmanaged SaaS apps Teams adopt tools without routing them through security. Sensitive data leaves monitored environments without visibility. Ephemeral… Read More "How to Improve Cloud Visibility Across Hybrid Environments?"
RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories
Jan 08, 2026Ravie LakshmananCybersecurity / Hacking News The internet never stays quiet. Every week, new hacks, scams, and security problems show up somewhere. This week’s stories show how fast attackers change their tricks, how small mistakes turn into big risks,… Read More "RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories"
NIS2-Umsetzung: Neues BSI-Portal geht an den Start
Unternehmen können sich ab sofort über das neue BSI-Portal als NIS2-Einrichtung registrieren und IT-Sicherheitsvorfälle melden. ImageFlow – shutterstock.com Seit Anfang Dezember gilt die EU-Sicherheitsrichtline NIS2 auch in Deutschland. Rund 29.500 Unternehmen sind dadurch verpflichtet, sich als NIS-2-Einrichtungen zu registrieren und… Read More "NIS2-Umsetzung: Neues BSI-Portal geht an den Start"