Cloud Security Threats | Cyber Espionage | Vulnerability Exploitation Chinese hacker groups Murky, Genesis, and Glacial Panda targeting cloud computing and telecommunications
Exploitation Risks | Patch Management | Security Vulnerabilities Microsoft has addressed the “BadSuccessor” Kerberos vulnerability identified as CVE-2025-53779.
Microsoft Software Updates | Privilege Escalation | Security Vulnerabilities Microsoft addresses 111 new vulnerabilities including Kerberos zero-day flaw
Authentication Vulnerabilities | Lateral Movement Techniques | Tenant Compromise Methods Recent techniques for lateral movement within Active Directory have emerged that circumvent authentication measures and enable data exfiltration.
Cybersecurity Threats | Malware Distribution | Social Engineering Attacks Search results on Bing have been manipulated to distribute Bumblebee malware when users search for ‘ManageEngine OpManager’.
Cybersecurity Threats | Incident Response Challenges | Ransomware Tactics A ransomware assault targeting a phone repair and insurance firm resulted in damages totaling millions.
Cybersecurity Threats | Ransomware Attacks | Vulnerability Exploitation SonicWall VPNs are being actively targeted due to a zero-day vulnerability that allows attackers to circumvent multi-factor authentication (MFA) and install ransomware.