Threat IntelligenceWordPress attackers hide malware in overlooked plugins directoryLaura FrenchMarch 31, 2025The mu-plugins directory automatically loads files and is not listed with other plugins.
Breach270,000 Samsung Germany customer service tickets released to public internetSteve ZurierMarch 31, 2025Credentials lied dormant for four years until a threat actor gained access and attacked the Samsung service ticket system.
Governance, Risk and ComplianceEU plans €1.3 billion to boost continent’s cybersecurity, AI skillsShaun NicholsMarch 28, 2025Program's aim is Europe's digital transformation via €8.1 billion investment from 2023-2027.
Vulnerability ManagementFirefox patches flaw similar to exploited Chrome zero-dayLaura FrenchMarch 28, 2025The sandbox escape flaw affected Firefox and Chrome browsers on Windows machines.
Phishing‘Morphing Meerkat’ spoofs 114 brands via DNS mail exchange recordsSteve ZurierMarch 28, 2025While using DNX mail exchange to launch a phishing campaign is not new, experts say it’s potentially the first time it was automated at scale.
RansomwareEDR killer links RansomHub with Play, Medusa, BianLian gangsLaura FrenchMarch 27, 2025EDRKillShifter was used by the same affiliate in multiple attacks for different RaaS groups.
AI/MLAI-enabled phishing and fake worker attacks on the riseShaun NicholsMarch 27, 2025Advances in AI are leading to phishing attacks that are more prolific and convincing to end users.
Critical Infrastructure Security46 new bugs in solar power inverters raise concerns over power grid stabilitySteve ZurierMarch 27, 2025While 80% of the flaws found in the inverters were high or critical, some experts advise not to become too distracted by “doomsday” scenarios.
Network SecurityBroadcom fixes authentication bypass flaw in VMware Tools for WindowsShaun NicholsMarch 27, 2025Access control weakness could potentially allow log-ins without proper authentication in VMware Tools for Windows.
DevSecOpsDangerous npm package ‘patches’ legitimate software with malwareLaura FrenchMarch 26, 2025The malware targets the “ethers” package and opens a reverse shell.
Cybersecurity pros really need to prioritize attending conferences and building communitySherrod DeGrippoMarch 27, 2025