News
Upcoming Events
Cybercrime Casefiles: Step inside the intricate world of a cloud threat investigation
2025-10-23 13:00 | 2025-10-23 14:00
Join to see how Unit 42® experts tackled a real cloud cryptomining incident. Learn how a threat actor infiltrated a cloud environment through misconfigured resources and exposed credentials
...Read more
New York Data Protection & Security Summit
2025-11-13 08:30 | 2025-11-13 15:00
Join industry experts and IT leaders for hands-on sessions, expert insights, and discussions on the latest in data protection and privacy.
...Read more
All times are Eastern Time (GMT/UTC -4h)
131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign
The 131 spamware extensions share the same codebase, design patterns, and infrastructure, and have 20,905 users...Read more
AWS outage crashes Amazon, Prime Video, Fortnite, Perplexity and more
AWS outage has taken down millions of websites, including Amazon.com, Prime Video, Perplexity AI, Canva and more....Read more
MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems
China accussed of a "premeditated" cyber attack targeting the National Time Service Center (NTSC)...Read more
Major AWS outage across US-East region breaks half the internet
Amazon reports DNS issues hitting DynamoDB, leaving services from Roblox to McDonald's struggling...Read more
AI Agent Security: Whose Responsibility Is It?
The shared responsibility model of is key to agentic services, but cybersecurity teams and corporate users struggle...Read more
GlassWorm Supply Chain Worm Uses Invisible Unicode and Solana Blockchain for Stealth C2
Koi Security has discovered the world’s 1st self-propagating malware targeting VS Code extensions on OpenVSX Marketpla...Read more
Cyberattackers Target LastPass, Top Password Managers
A rash of phishing campaigns are leveraging the anxiety and trust employees have in password vaults...Read more
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
The end goal of these efforts is to gain unauthorized access to developers' machines, steal sensitive data, and siphon...Read more
Auction house Sotheby's finds its data on the block after cyberattack
Alert says financial account information lifted from systems...Read more
Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform
Scaling the SOC with AI - Why now? The traditional SOC model can't keep up....Read more
Beware the Hidden Costs of Pen Testing
Administrative overhead, scoping complexity, indirect costs...Read more
The password problem we keep pretending to fix
AI will not fix the basics. Weak passwords and outdated verification methods will remain problems no matter how advanced...Read more
Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits
exploiting the Cisco SNMP vulnerability CVE-2025-20352, allowing RCE and rootkit deployment on unprotected devices...Read more
Senator presses Cisco over firewall flaws that burned US agency
warned of "an unacceptable risk" to government systems if Cisco ASA and FTD devices are unpatched...Read more