My Courses
-

Akira Ransomware is actively exploiting a zero-day vulnerability in SonicWall Firewall devices.
A suspected zero-day vulnerability in SonicWall firewall devices is currently being exploited by the Akira ransomware group. This flaw enables attackers to gain initial access…
-

A new undetectable malware strain is targeting Linux servers to establish lasting SSH access.
A sophisticated Linux backdoor known as Plague has emerged as a significant threat to enterprise security, successfully evading detection by all major antivirus engines while…
-

Summary of Cybersecurity Updates – Vulnerabilities in Chrome and Gemini, malware targeting Linux, and a new Man-in-the-Prompt attack.
Welcome to this week’s edition of Cybersecurity News Recap. This issue presents the latest updates and critical developments across the threat landscape. Readers can stay…
-

Echo Secures $15 Million in Seed Capital to Create Vulnerability-Free Container Images
Echo has successfully raised $15 million in seed funding to develop thousands of container images that are free from any Common Vulnerabilities and Exposures (CVE)….
-

Cyber attackers are exploiting counterfeit OAuth applications in conjunction with the Tycoon Kit to compromise Microsoft 365 accounts.
Cybersecurity researchers have identified a new cluster of activity where threat actors impersonate enterprises through fake Microsoft OAuth applications to facilitate credential harvesting as part…
-

The Cursor AI Code Editor has addressed a vulnerability that permitted attackers to execute commands through prompt injection.
Cybersecurity researchers have identified and disclosed a critical security vulnerability in Cursor, a widely used AI code editor, which could lead to remote code execution…
-

A new backdoor called ‘Plague’ has emerged that compromises critical Linux systems, allowing for covert theft of credentials.
Cybersecurity researchers have identified a previously undocumented Linux backdoor known as Plague, which has successfully evaded detection for over a year. This malicious implant functions…
-

CL-STA-0969 Deploys Hidden Malware in Telecommunications Infrastructures Throughout a 10-Month Intelligence Gathering Operation.
Telecommunications organisations in Southeast Asia have been targeted by a state-sponsored threat actor known as CL-STA-0969, which aims to facilitate remote control over compromised networks….
-

Cyber risk management company Safe has secured $70 million in funding.
Cyber risk management firm Safe has successfully raised $70 million in Series C funding to enhance its innovative approach to cyber risk management through the…
-

According to Microsoft, Russian cyberspies are conducting AitM attacks on foreign embassies located in Moscow.
Russian state-sponsored Advanced Persistent Threat (APT) group Secret Blizzard has been implicated in sophisticated ISP-level Attack-in-the-Middle (AitM) operations targeting foreign embassies in Moscow. According to…

