Governance, Risk and ComplianceEU plans €1.3 billion to boost continent’s cybersecurity, AI skillsShaun NicholsMarch 28, 2025Program's aim is Europe's digital transformation via €8.1 billion investment from 2023-2027.
Vulnerability ManagementFirefox patches flaw similar to exploited Chrome zero-dayLaura FrenchMarch 28, 2025The sandbox escape flaw affected Firefox and Chrome browsers on Windows machines.
Phishing‘Morphing Meerkat’ spoofs 114 brands via DNS mail exchange recordsSteve ZurierMarch 28, 2025While using DNX mail exchange to launch a phishing campaign is not new, experts say it’s potentially the first time it was automated at scale.
RansomwareEDR killer links RansomHub with Play, Medusa, BianLian gangsLaura FrenchMarch 27, 2025EDRKillShifter was used by the same affiliate in multiple attacks for different RaaS groups.
AI/MLAI-enabled phishing and fake worker attacks on the riseShaun NicholsMarch 27, 2025Advances in AI are leading to phishing attacks that are more prolific and convincing to end users.
Critical Infrastructure Security46 new bugs in solar power inverters raise concerns over power grid stabilitySteve ZurierMarch 27, 2025While 80% of the flaws found in the inverters were high or critical, some experts advise not to become too distracted by “doomsday” scenarios.
Network SecurityBroadcom fixes authentication bypass flaw in VMware Tools for WindowsShaun NicholsMarch 27, 2025Access control weakness could potentially allow log-ins without proper authentication in VMware Tools for Windows.
DevSecOpsDangerous npm package ‘patches’ legitimate software with malwareLaura FrenchMarch 26, 2025The malware targets the “ethers” package and opens a reverse shell.
Data SecurityLeak of US strike plans to The Atlantic underscores risk of data seepageShaun NicholsMarch 26, 2025Human error is often at the center of data leaks from secured messaging platforms like the recent leak of U.S. strikes on Houthi rebels in Yemen.
IdentityAtlantis AIO tool automates credential stuffing across 140 platformsSteve ZurierMarch 26, 2025New tool can test millions of stolen credentials with minimal effort to run account takeovers.
Cybersecurity pros really need to prioritize attending conferences and building communitySherrod DeGrippoMarch 27, 2025