Latest Intelligence
New Case Study: Global Retailer Overshares CSRF Tokens with Facebook
A global retailer inadvertently exposed sensitive CSRF tokens to Facebook due to misconfigurations in their security settings. This incident highlights the importance of proper security token management to prevent data leaks and unauthorized tracking.
China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions
Cybersecurity researchers have identified a new China-linked threat actor, Earth Alux, which has been conducting multi-stage cyber intrusions targeting critical sectors across the Asia-Pacific and Latin American regions since mid-2023. The significance of this threat lies in its potential impact on various industries including government and technology.
Check Point Responds to Hacking Claims
Check Point has acknowledged a hacking incident involving sensitive data theft but asserts that the impact was limited. This response highlights ongoing concerns regarding cybersecurity and data protection in the industry.
Apple Patches Recent Zero-Days in Older iPhones
Apple has addressed two recent zero-day vulnerabilities in older iPhone models through a significant security update. This action underscores the importance of keeping devices updated to protect against potential exploits.
France’s Antitrust Watchdog Fines Apple for Problems With App Tracking Transparency
France's antitrust watchdog has imposed a fine of 150 million euros on Apple due to issues related to its App Tracking Transparency feature, which is intended to protect user privacy. This ruling highlights the ongoing scrutiny of tech giants regarding their privacy practices and the enforcement of antitrust regulations in Europe.
Apple Fined €150 Million by French Regulator Over Discriminatory ATT Consent Practices
Apple has been fined €150 million by France's competition authority for discriminatory practices related to its App Tracking Transparency framework, which is seen as an abuse of its dominant position in the mobile app distribution market. This ruling highlights ongoing scrutiny over tech giants' privacy policies and their impact on competition.
Oracle Cloud Users Urged to Take Action
Oracle has denied any breach of its cloud infrastructure services, yet security experts are advising customers to verify their security status and mitigate potential risks. This situation highlights the importance of proactive security measures in cloud environments.
CoffeeLoader Malware Is Stacked With Viscous Evasion Tricks
CoffeeLoader malware has introduced advanced evasion techniques designed to bypass modern security measures, including digital forensics tools and endpoint detection and response (EDR) systems. This evolution in malware poses significant challenges for cybersecurity professionals in mitigating threats.
Top 10 Most Used RDP Passwords Are Not Complex Enough
Research from Specops Software highlights that attackers are successfully breaching Remote Desktop Protocol (RDP) systems using weak and basic passwords. This issue underscores the importance of implementing strong password policies to enhance security against unauthorized access.
DoJ Seizes Over $8M from Sprawling Pig Butchering Scheme
The Department of Justice (DoJ) has seized over $8 million linked to a large-scale pig butchering scheme, a type of cryptocurrency scam. This operation highlights the ongoing challenges in tracing illicit funds within the cryptocurrency ecosystem.
CISA Warns of Resurge Malware Connected to Ivanti Vuln
CISA has issued a warning regarding the exploitation of a vulnerability in Ivanti Connect Secure, first disclosed by Ivanti in January. This vulnerability is being actively targeted by threat actors, highlighting the urgency for organizations to address the security flaw.
Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp
Russian hackers, identified as the Water Gamayun group, are exploiting a zero-day vulnerability (CVE-2025-26633) in Microsoft Windows to deploy two new backdoors, SilentPrism and DarkWisp. This highlights the ongoing threat posed by advanced persistent threats leveraging newly discovered vulnerabilities.
Trend Micro Open Sources AI Tool Cybertron
Trend Micro has open-sourced its AI tool named Cybertron, designed to enhance threat detection and incident response for organizations. This move signifies a commitment to improving cybersecurity practices through advanced technology.
Threat Actors Deploy WordPress Malware in ‘mu-plugins’ Directory
Sucuri has identified various malware families being deployed in the WordPress mu-plugins directory, a tactic used by threat actors to bypass standard security measures. This highlights an ongoing issue with WordPress security that requires urgent attention from site administrators.
Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program
The article discusses the importance of developing a robust offensive security program, emphasizing that achieving this may require significant changes in organizational culture and increased costs. Such a program is crucial for effectively addressing evolving cybersecurity threats.