- Home
- Cybercrime and Ransomware
- Emerging Tech
- Threat Intelligence
- Expert Insights
- Careers and Learning
- Compliance
Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Month: October 2025
The event titled “Cloud resiliency with Azure Essentials and shared responsibility” focuses on teaching organizations…
Fast Facts A China-affiliated threat group, UNC6384, exploited a Windows shortcut vulnerability (CVE-2025-9491) to target…
China’s ‘Typhoon’ Cyber Attacks Hit U.S. Critical Infrastructure in Largest Disruption Yet
Fast Facts The McCrary Institute report warns that PRC-linked ‘Typhoon’ cyber campaigns target U.S. critical…
Quick Takeaways A Chinese threat group, UNC6384 (linked to Mustang Panda), is exploiting an unpatched…
Top Highlights A China-linked hacking group, UNC6384 (Mustang Panda), is exploiting a high-severity Windows zero-day…
Quick Takeaways Cybercriminals are weaponizing AdaptixC2, a legitimate open-source framework, for global ransomware attacks, compromising…
Summary Points CISA and NSA Guidance: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and…
Fast Facts Overlooking Non-Human Identities (NHIs) in cloud infrastructure creates significant security vulnerabilities, including unauthorized…
Essential Insights Rise of Surveillance: The Pegasus spyware, discovered nearly a decade ago, has catalyzed…
Top Highlights CISA added a high-severity vulnerability (CVE-2025-41244) affecting Broadcom VMware Tools and VMware Aria…