Topic: state-sponsored attacks

  • State-Sponsored Cyber-Attacks: A Top Fear for Businesses

    State-Sponsored Cyber-Attacks: A Top Fear for Businesses

    State-sponsored cyber-attacks are a top fear for cybersecurity professionals, with many citing a lack of preparedness for such threats linked to geopolitical conflict as a primary concern. Over a third of surveyed professionals feel their governments provide insufficient support, and the risk ext...

    Read More »
  • EU Cyberattacks Increasingly Target Critical Infrastructure

    EU Cyberattacks Increasingly Target Critical Infrastructure

    The ENISA Threat Landscape 2025 report reveals a significant increase in cyberattacks targeting operational technology systems, which now account for 18.2% of all documented threats, driven by their growing interconnectedness and deliberate targeting by malicious actors. Pro-Russian hacker groups...

    Read More »
  • Critical Flaw Exposes 10K+ Fortinet Firewalls to 2FA Bypass

    Critical Flaw Exposes 10K+ Fortinet Firewalls to 2FA Bypass

    A critical five-year-old Fortinet firewall flaw (CVE-2020-12812) allows attackers to bypass two-factor authentication by altering a username's case, and over 10,000 vulnerable devices remain exposed online. Despite a patch being available since 2020, attackers are actively exploiting the vulnerab...

    Read More »
  • 2026 Cybersecurity Forecast: Key Trends to Watch

    2026 Cybersecurity Forecast: Key Trends to Watch

    Cybercriminals are increasingly targeting people over software vulnerabilities, using tactics like phishing and deceptive applications to breach networks, as seen in the 2025 Salesforce attack by Shiny Hunters. Artificial intelligence tools are creating more sophisticated threats, such as advance...

    Read More »
  • Google AI Detects Malware That Morphs During Attacks

    Google AI Detects Malware That Morphs During Attacks

    Google has identified a new generation of AI-powered malware that rewrites its own code during attacks, making it more resilient and harder to detect by dynamically altering behavior and evading security systems. Several malware families, such as FRUITSHELL, PROMPTFLUX, and PROMPTLOCK, are active...

    Read More »
  • Phishing Leads EU Cyber Intrusions, ENISA Reports

    Phishing Leads EU Cyber Intrusions, ENISA Reports

    Phishing was the leading initial attack method in the EU, responsible for 60% of intrusions, with outdated mobile and OT systems being prime targets. DDoS attacks comprised 77% of all incidents, largely driven by hacktivism, but only 2% caused service disruptions, with groups like NoName057(16) e...

    Read More »
  • US Agencies Still Vulnerable to Critical Cisco Flaws

    US Agencies Still Vulnerable to Critical Cisco Flaws

    CISA issued an emergency directive for U.S. federal agencies to patch two actively exploited Cisco vulnerabilities (CVE-2025-20333 and CVE-2025-20362), as many devices were incorrectly reported as secure. These vulnerabilities enable remote code execution and privilege escalation, and are linked ...

    Read More »
  • The Economics Fueling Global Ransomware

    The Economics Fueling Global Ransomware

    Ransomware has evolved into a sophisticated criminal business model, projected to cause $10.5 trillion in global economic losses by 2025, driven by professional networks and Ransomware-as-a-Service (RaaS) that lower entry barriers for attackers. Attackers employ double and triple extortion tactic...

    Read More »
  • Chinese Hackers Exploiting VMware Zero-Day Since 2025

    Chinese Hackers Exploiting VMware Zero-Day Since 2025

    A critical privilege escalation vulnerability (CVE-2025-41244) in Broadcom's VMware software has been actively exploited since October 2024, allowing attackers to gain root-level control over affected virtual machines. The exploitation has been attributed to UNC5174, a Chinese state-sponsored thr...

    Read More »
  • Google Patches Critical Chrome Zero-Day Flaw (CVE-2025-10585)

    Google Patches Critical Chrome Zero-Day Flaw (CVE-2025-10585)

    Google has released an urgent security update for Chrome to fix a zero-day vulnerability (CVE-2025-10585) that is being actively exploited, particularly by state-sponsored threat actors. The flaw is a type confusion issue in Chrome's V8 JavaScript engine, marking the second such vulnerability pat...

    Read More »
  • Google Finds Malware Using AI to Evade Detection

    Google Finds Malware Using AI to Evade Detection

    Malicious software is now actively using artificial intelligence to autonomously bypass security measures, with tools like QuietVault and PromptSteal already deployed in the wild to steal credentials and sensitive data. Google's threat intelligence report highlights that adversaries have moved be...

    Read More »
  • Cisco ASA Firewalls Remain Vulnerable to Zero-Day Attacks

    Cisco ASA Firewalls Remain Vulnerable to Zero-Day Attacks

    Approximately 48,000 Cisco ASA devices remain vulnerable to active zero-day attacks, posing ongoing risks globally, with the majority located in the U.S. and other key countries. Attackers have used advanced tactics, including disabling logging and intercepting commands, to exploit vulnerabilitie...

    Read More »
  • 2025's Most Devastating Cyberattacks Exposed

    2025's Most Devastating Cyberattacks Exposed

    The cyber threat landscape has shifted towards sophisticated supply chain attacks, where breaches of third-party vendors like Gainsight and Salesloft led to widespread data exposure at major corporations including Cloudflare, Verizon, and Cisco. The Clop ransomware group exploited a critical vuln...

    Read More »
  • MITRE Reveals 2025's 25 Most Dangerous Software Weaknesses

    MITRE Reveals 2025's 25 Most Dangerous Software Weaknesses

    MITRE and CISA have released the 2025 CWE Top 25, a critical ranking of the most dangerous software weaknesses based on an analysis of over 39,000 vulnerabilities from the past year. Cross-Site Scripting (CWE-79) remains the most prominent weakness, while Missing Authorization and several buffer ...

    Read More »