(Adobe Stock) Cybersecurity spending boom projected, but security pros are skepticalSteve ZurierDecember 26, 2025KPMG predicts a boom focused on cybersecurity spending, talent acquisition, and strategic partnerships.
Why security pros still have to watch for flaws in network video devices and peripheralsGene Moody December 26, 2025
How federal cyber standards became critical to the business of software vendorsGeorge ManuelianDecember 24, 2025
The La Poste attack in France was a coordinated campaign that targeted critical infrastructureMichael BellDecember 24, 2025
Four business metrics security pros can offer that C-Suite execs understandManoj SrivastavaDecember 23, 2025
Need for speed: How exposure management optimizes mobilization and remediationPaul WagenseilDecember 19, 2025
Beyond the noise: Distinguishing everyday risk from actual exposure with exposure managementPaul WagenseilDecember 17, 2025
ICIT 2025 Gala: CISA director-nominee Sean Plankey receives Pinnacle Award for legacy of national leadershipBill BrennerDecember 16, 2025
Ron Gula to receive Pioneer Award at ICIT 2025 Gala for a legacy of cybersecurity innovationBill BrennerDecember 15, 2025
RansomwareOpen-source tool Nezha used as post-exploitation remote access trojanSteve ZurierDecember 24, 2025Tools such as Nezha evade signature detection, blend with normal activity, and reduce development effort.
Vulnerability ManagementCVSS 9.9 RCE vulnerability in n8n potentially impacts more than 100K serversLaura FrenchDecember 24, 2025The flaw allows an authenticated attacker to run arbitrary code with elevated permissions.
Threat IntelligenceNorth Korean Beavertail malware sparks attacks across financial sectorSteve ZurierDecember 23, 2025Attacks started in a malicious npm package hosted on GitHub or GitLab, according to Darktrace.
MalwareAmeday campaign used GitLab server to retrieve StealC infostealerLaura FrenchDecember 23, 2025Amadey used a modified base64 algorithm to obfuscate strings to target browser credentials and cryptocurrency transactions.
IdentityThreat groups steal identities to access Microsoft 365 accountsSteve ZurierDecember 22, 2025Several threat clusters were identified by Proofpoint, including the financially motivated group TA2723.
Exposure managementWatchGuard: Patch exploited 9.3 flaw in Firebox firmware Steve ZurierDecember 19, 2025Experts warn customers to watch for “ghost” vulnerabilities that remain exploitable even if mobile VPN settings get deleted.
Exposure managementReact2Shell ransomware: Weaxor deployed on vulnerable serverLaura FrenchDecember 19, 2025Attackers deployed Weaxor ransomware less than a minute after initial access.
Exposure managementCVSS 10.0 HPE OneView RCE bug identified – patch now!Steve ZurierDecember 18, 2025Experts say OneView manages the whole data center, so teams should expect an exploit of this RCE very soon.