Darktrace Report Highlights the Growing Power of MaaS, Sneaky Evasion Tactics

Cybercrime-as-a-Service (CaaS) is more than just a trend—it’s here to stay. As sophisticated attack tools become widely (and easily) available, even less experienced cybercriminals can now carry out highly disruptive campaigns.   In fact, Malware-as-a-Service (MaaS) now makes up 57% of detected threats—a 17% increase from the first half of last …

How to take your firm from risk to resilience in 8 DORA-compliant steps

There are two types of companies, as the saying goes: those that have been hacked and those that don’t know they’ve been hacked. This is especially true in financial services. According to the IMF’s Global Financial Stability Report, nearly one-fifth of reported cyber incidents in the past two decades have …

Mustang Panda APT Exploits Windows Utilities to Slip Through Security Nets

Researchers from Trend Micro’s Threat Hunting team have uncovered a new technique employed by the advanced persistent threat (APT) group dubbed Mustang Panda or Earth Preta.   The cyberespionage group has been abusing the Microsoft Application Virtualization Injector (MAVInject.exe) to stealthily inject malicious payloads into waitfor.exe when it detects an ESET …

Qualys Identifies Critical Vulnerabilities that Enable DDoS, MITM Attacks 

The Qualys Threat Research Unit (TRU) has uncovered two significant vulnerabilities in OpenSSH, a widely used open-source implementation of the Secure Shell (SSH) protocol.   These flaws, tracked as CVE-2025-26465 and CVE-2025-26466, pose substantial security risks to enterprise infrastructure and encrypted communications.  Details of the Vulnerabilities  CVE-2025-26465: The researhers said the …

South Korea Temporarily Suspends DeepSeek Over Data Privacy Worries

South Korea has formally suspended new downloads of the Chinese AI chatbot DeepSeek, citing concerns over data privacy and compliance with domestic regulations. The suspension took effect on 15  February, according to the Personal Information Protection Commission (PIPC).   While downloads are currently restricted in domestic app marketplaces, the web-based service …

2025 ZeroFox Forecast: Dark Web, Ransomware, Gen AI & Beyond

Various threat actors and organizations are expected to undergo significant changes. Deep and Dark Web (DDW) marketplaces will likely be influenced and governed by law enforcement operations and geopolitical factors, while ransomware, digital extortion, and social engineering will continue to pose serious threats to organizations.   These were some of the …

Microsoft Uncovers Enhanced macOS Malware Targeting Xcode Projects

Microsoft Threat Intelligence has uncovered a new variant of XCSSET, a sophisticated modular macOS malware that targets users by infecting Xcode projects. While the latest variant has only been observed in limited attacks, security researchers warn that its enhanced capabilities make it a significant threat to macOS users and developers. …

Eight Cloud Security Best Practice Fundamentals for Microsoft Azure

As entities of every sector move more apps and workloads to the cloud, security is becoming a top priority. Microsoft Azure, one of the world’s most popular cloud platforms, provides a range of security tools and best practices to help businesses protect their assets stored in their environments.   However, securing …

Massive Data Exposure at Mars Hydro Highlights IoT Security Risks

Jeremiah Fowler, an experienced cybersecurity researcher at vpnMentor and co-founder of Security Discovery, has uncovered a massive data exposure involving nearly 2.7 billion records linked to Mars Hydro, a China-based manufacturer of IoT-enabled grow lights.   The breach, which included sensitive Wi-Fi credentials, IP addresses, and device details, underscores ongoing concerns …