Vendors' News

Vendor announcements

  

From Chrome renderer code exec to kernel with MSG_OOB

Posted by Jann Horn, Google Project ZeroIntroduction In early June, I was reviewing a new Linux kernel feature when I

  

Scammers mass-mailing the Efimer Trojan to steal crypto

The Efimer Trojan spreads through email and hacked WordPress websites, steals cryptocurrency, and substitutes wallets in the clipboard.SecurelistRead More

  

The Efimer Trojan steals cryptocurrency via malicious torrent files and WordPress websites | Kaspersky official blog

The Efimer Trojan steals cryptocurrency via WordPress websites and malicious torrent files. Here’s how to protect yourself from this new

  

FORGE: Cybersecurity’s “AlphaEvolve Moment” for Threat Detection

SentinelOne’s AI-powered FORGE evolves detection rules to stop modern cyber threats with speed, precision, and minimal false positives.SentinelOneRead More

  

Announcing public preview: Phishing triage agent in Microsoft Defender

The Phishing Triage Agent in Microsoft Defender is now available in Public Preview. It tackles one of the most repetitive

  

Wordfence Intelligence Weekly WordPress Vulnerability Report (July 28, 2025 to August 3, 2025)

Last week, there were 107 vulnerabilities disclosed in 91 WordPress Plugins and 8 WordPress Themes that have been added to

  

Webhooks in THOR Cloud: Event-Driven Notifications and System Integration

The post Webhooks in THOR Cloud: Event-Driven Notifications and System Integration appeared first on Nextron Systems.Nextron SystemsRead More

  

UEBA rules in Kaspersky SIEM | Kaspersky official blog

We’ve added a “user and entity behavior analytics” (UEBA) rule package to the Kaspersky Unified Monitoring and Analysis PlatformKaspersky official

  

Building a Cyber-Aware Workforce: Mexico’s Push for Security Training

Last year, Mexico was hit with 324 billion attempted cyberattacks, lending credence to the World Economic Forum’s report that the

  

Threat Level – GUARDED

On August 6, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to a vulnerability

  

New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer

DarkCloud Stealer’s delivery has shifted. We explore three different attack chains that use ConfuserEx obfuscation and a final payload in

  

Match or trap? Online dating scams and other dangers to know

First comes swiping, then comes… scams? Online dating can lead to lasting love, but it can also open the door

  

CVE-2025-32094: HTTP Request Smuggling Via OPTIONS + Obsolete Line Folding

In March 2025, Akamai received a bug bounty report identifying an HTTP Request Smuggling vulnerability that was quickly resolved for

  

Muddled Libra: Why Are We So Obsessed With You?

Muddled Libra gets media attention due to its consistent playbook and unique use of vishing. The group’s English fluency is

  

How To Find SQL Injection Vulnerabilities in WordPress Plugins and Themes

SQL Injection (SQLi), a vulnerability almost as old as database-driven web applications themselves (CWE-89), persists as a classic example of

Latest

  

From Chrome renderer code exec to kernel with MSG_OOB

Posted by Jann Horn, Google Project ZeroIntroduction In early June, I was reviewing a new Linux kernel feature when I

From Chrome renderer code exec to kernel with MSG_OOB

Posted by Jann Horn, Google Project ZeroIntroduction In early June, I was reviewing a new Linux kernel feature when I

UK proxy traffic surges as users consider VPN alternatives amid Online Safety Act

UK proxy traffic surges as users consider VPN alternatives amid Online Safety Act

It’s ‘more than a temporary trend,’ Decodo claims Amid the furor around surging VPN usage in the UK, many users

A faint and fragile opportunity to end the Ukraine war

A faint and fragile opportunity to end the Ukraine war

Subscribe now with a one-month trial for only $1, then enjoy the first year at an exclusive rate of just $99.

Microsoft will kill the Lens PDF scanner app for iOS, Android

Microsoft will kill the Lens PDF scanner app for iOS, Android

Microsoft announced that it will phase out the Microsoft Lens PDF scanner app for Android and iOS devices starting September 15,

The best smartphones without AI features in 2025: Expert tested and recommended

The best smartphones without AI features in 2025: Expert tested and recommended

Tired of AI being stuffed into every nook and cranny of every new device? I’ve put together a list of

  

Sharing practical guidance: Launching Microsoft Secure Future Initiative (SFI) patterns and practices

We’re excited to launch SFI patterns and practices: a new library of actionable guidance designed to help organizations implement security

  

Pushing Boundaries With Claude Code

Claude Code stormed onto the programming scene when Anthropic launched it in February of this year. It moved, what Andrej

  

Portkey Fortifies Its AI Gateway with the Prisma AIRS Platform

In a move designed to bolster the security of rapidly expanding AI ecosystems, we’ve teamed up with Portkey, AI gateway

  

When Good Accounts Go Bad: Exploiting Delegated Managed Service Accounts in Active Directory

BadSuccessor is an attack vector in Windows Server 2025. Under certain conditions it allows privilege elevation via dMSAs. We analyze

  

Driver of destruction: How a legitimate driver is being used to take down AV processes

In an incident response case, Kaspersky experts discovered new malware that terminates AV processes by abusing the legitimate ThrottleStop driver.

  

Time for an IoT Audit?

IoT is everywhere, quietly powering everything from smart thermostats in homes to complex systems in industrial networks. While these devices

  

LunaSpy hides as a spyware antivirus on Android | Kaspersky official blog

We tell you how new spyware gets inside Android, and what to do about it.Kaspersky official blogRead More

  

Project AK47: Uncovering a Link to the SharePoint Vulnerability Attacks

Project AK47, a toolset including ransomware, was used to leverage SharePoint exploit chain ToolShell. This activity overlaps with Storm-2603. The

  

Partnering with OpenAI to bring their new open models onto Cloudflare Workers AI

OpenAI’s newest open-source models are now available on Cloudflare Workers AI on Day 0, with support for Responses API, Code

  

How Georgia Department of Transportation Is Building Cyber Resilience

GDOT boosts network security and resilience with Palo Alto Networks Next-Gen Firewalls. This investment is for public safety and GA

  

Phishing attack on PyPi and AMO developers | Kaspersky official blog

Attackers are sending phishing emails to both users of Python Package Index (PyPi) and creators of Firefox add-ons at addons.mozilla.org.Kaspersky

  

Elevate your protection with expanded Microsoft Defender Experts coverage

Defender Experts now offers 24/7, expert-driven protection for cloud workloads, beginning with hybrid and multicloud servers in Microsoft Defender for

  

AI in Cloud Computing: How AI Is Revolutionizing the Landscape

Discover how AI in cloud computing is transforming industries. Learn about the differences between cloud AI and edge AI ?

  

Reducing double spend latency from 40 ms to < 1 ms on privacy proxy

We significantly sped up our privacy proxy service by fixing a 40ms delay in “double-spend” checks.The Cloudflare BlogRead More

  

ReVault! When your SoC turns against you…

Cisco Talos recommends actions to mitigate attack scenarios involving the compromise of a ControlVault device. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.htmlCisco Newsroom:

  

CVE-2025-54136 –  MCPoison Cursor IDE: Persistent Code Execution via MCP Trust Bypass

By: Andrey Charikov, Roman Zaikin & Oded Vanunu Background Cursor is a developer-focused AI IDE that combines local code editing

  

Ranking the top threats and techniques for the first half of 2025

Identity detections climbed, color birds swooped in, and two new cloud techniques broke into our top 10 in the first

  

A New Chapter for AI and Cybersecurity: SentinelOne Acquires Prompt Security

SentinelOne acquires Prompt Security to deliver real-time AI visibility, control, and protection across enterprises. Learn more in this blog.SentinelOneRead More

  

New Prototype: RIPE Atlas Traceroute Visualisation Tool

The RIPE Atlas team is developing a new tool for traceroute visualisations that should make analysing large traceroute measurements much

  

Detection Engineering: Practicing Detection-as-Code – Validation – Part 3

In this part, we focus on implementing validation checks to improve consistency and ensure a minimum level of quality within

  

WordPress SQLsplorer Challenge: Bigger Scope and Bounties for All Researchers in the Wordfence Bug Bounty Program

From now through September 22, 2025, we’re running our SQLsplorer Challenge, focused on SQL Injection vulnerabilities. During this challenge, we’re

  

Red Canary CFP tracker: August 2025

Red Canary’s monthly roundup of upcoming security conferences and calls for papers (CFP) submission deadlinesRed CanaryRead More

  

Microsoft Entra Suite delivers 131% ROI by unifying identity and network access

According to a new Forrester Total Economic Impact™ study, organizations using the Microsoft Entra Suite achieved a 131% ROI, $14.4

  

Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives

Perplexity is repeatedly modifying their user agent and changing IPs and ASNs to hide their crawling activity, in direct conflict

  

4th August – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 4th August, please download our Threat Intelligence Bulletin. TOP

  

Threat Actor Groups Tracked by Palo Alto Networks Unit 42 (Updated Aug. 1, 2025)

A comprehensive list of threat actor groups tracked by Unit 42, along with information such as summaries and industries typically

  

Plague Backdoor Threat Analysis

The post Plague Backdoor Threat Analysis appeared first on Nextron Systems.Nextron SystemsRead More

  

The Good, the Bad and the Ugly in Cybersecurity – Week 31

FBI seizes ransomware Bitcoin, SentinelLABS exposes Hafnium’s spying tools, Secret Blizzard hijacks Moscow ISPs for embassy surveillance.SentinelOneRead More

  

Vulnerability disclosure on SSL for SaaS v1 (Managed CNAME)

An upcoming vulnerability disclosure in Cloudflare’s SSL for SaaSv1 is detailed, explaining the steps we’ve taken towards deprecation.The Cloudflare BlogRead

  

At Cisco, bold steps towards a quantum network

With its foundational quantum innovations, Cisco spurs a tech revolution that could help solve pressing global and industry problems. More

  

Release Highlights: VMRay Platform 2025.3.0

Introduction Since the release of VMRay Platform 2025.2, we’ve had a busy start to the summer. Back then, we introduced

  

Stop Hardcoding Passwords

A Deep Dive into CyberArk’s Central CredentialProvider (CCP) Introduction Hardcoded credentials are still among the most critical and overlooked security

  

Japan’s Active Cyberdefense Law: A New Era in Cybersecurity Strategy

On May 16 th, 2025, the Japanese Parliament enacted a landmark piece of cybersecurity legislation: the Japan Active Cyberdefense Law.

  

Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing

Key findings  Threat actors are impersonating various enterprises with fake Microsoft OAuth applications to steal credentials.  These campaigns bypass multifactor

  

AI meets ransomware: a new cyber threat

Ransomware has long been one of the most feared cyber threats on the internet, and for good reason. It’s fast,

  

Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations

Key Findings Introduction Check Point Research (CPR) has been closely monitoring the ongoing exploitation of a group of Microsoft SharePoint

  

Modernize your identity defense with Microsoft Identity Threat Detection and Response

Microsoft’s Identity Threat Detection and Response solution integrates identity and security operations to provide proactive, real-time protection against sophisticated identity-based

  

Wordfence Intelligence Weekly WordPress Vulnerability Report (July 21, 2025 to July 27, 2025)

📢 Calling all Vulnerability Researchers and Bug Bounty Hunters! 📢 🌞 Spring into Summer with Wordfence! Now through August 4,

  

Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats

Microsoft Threat Intelligence has uncovered a cyberespionage campaign by the Russian state actor we track as Secret Blizzard that has

  

Here’s what you missed on Office Hours: July 2025

SIEMs, CleanUpLoader, FileFix, and npm packages: Catch up on the last month’s episodes of Red Canary Office Hours.Red CanaryRead More

  

The State of Ransomware – Q2 2025

Key Findings Several prominent RaaS groups, including RansomHub, Babuk-Bjorka, FunkSec, BianLIan, 8Base, Cactus, Hunters International, and Lockbit, stopped publishing new

  

Zoomers at work: how scammers target this demographic | Kaspersky official blog

Scammers and cybercriminals have made polyworking Gen Z their targets. Discover the latest insights from Kaspersky on the cyberthreats targeting

  

Leading the Charge: Frost & Sullivan Recognizes The Next Phase of MDR Powered by Agentic AI

SentinelOne has, once again, been named an MDR leader for AI-driven detection, response, and expert analyst collaboration at global scale.SentinelOneRead

  

Introducing Unit 42’s Attribution Framework

Peel back the layers on Unit 42’s Attribution Framework. We offer a rare inside view into the system used to

  

AURORA – Leveraging ETW for Advanced Threat Detection

The post AURORA – Leveraging ETW for Advanced Threat Detection appeared first on Nextron Systems.Nextron SystemsRead More

  

100,000 WordPress Sites Affected by Arbitrary File Upload Vulnerability in AI Engine WordPress Plugin

On July 18th, 2025, we received a submission for an Arbitrary File Upload vulnerability in AI Engine, a WordPress plugin

  

Our favorite talks from fwd:cloudsec 2025

Red Canary’s cloud security enthusiasts left fwd:cloudsec 2025 with some invaluable insights and community connectionsRed CanaryRead More

  

Lessons from research into more effective cybersecurity training

Cybersecurity training has been a recurring theme on this blog recently. Specifically, we’re seeing that traditional approaches aren’t necessarily effective

  

Passkey support in business applications | Kaspersky official blog

Which corporate systems and applications support passkeys, and how to implement them properly?Kaspersky official blogRead More

  

Beyond the Buzz: Is Your Security Platform Delivering AI Value or Just Hype?

Is your AI in security real or just noise? Learn how to cut hype, boost speed, and prove value with

  

Cisco Canada and Peterborough Regional Health Centre Transform Transitional Care

Cisco and PRHC have collaborated on a safe, digitally-enabled space designed to support short-term recovery for patients transitioning from hospital

  

Pharma fraud: how illegal online pharmacies endanger your health and your wallet

Even when a website looks legitimate, buying medicine online can expose you to scams that might seriously impact your finances,

  

2025 Unit 42 Global Incident Response Report: Social Engineering Edition

Social engineering thrives on trust and is now boosted by AI. Unit 42 incident response data explains why it’s surging.

  

Social Engineering on the Rise — New Unit 42 Report

How cybercriminals and nation-state actors are leveraging sophisticated social engineering techniques to attack global organizations at scale. The post Social

  

Cobalt Strike Beacon delivered via GitHub and social media

A campaign targeting Russian entities leveraged social media, Microsoft Learn Challenge, Quora, and GitHub as intermediate C2 servers to deliver

  

The Covert Operator’s Playbook: Infiltration of Global Telecom Networks

Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom

  

Expanding AuthDNS – Impact of Adding a New Node in the Philippines

In June 2025 we activated a new AuthDNS node, hosted at Maharlika IX in Makati City, Manilla Metro, Philippines. In

  

Policy and Disclosure: 2025 Edition

Posted by Tim Willis, Google Project Zero In 2021, we updated our vulnerability disclosure policy to the current “90+30” model.

  

Ransomware will thrive until we change our strategy

Ransomware isn’t just cybercrime anymore, it’s disrupting businesses, eroding public trust, and emerging as a national security threat. Our CEO,

  

Attackers Actively Exploiting Critical Vulnerability in Alone Theme

On May 30th, 2025, we received a submission for an Arbitrary File Upload via Plugin Installation vulnerability in Alone, a

  

What to do if you get a phishing email | Kaspersky official blog

How to detect phishing emails, and what to do with them.Kaspersky official blogRead More

  

Detecting the Most Popular MITRE Persistence Method – Registry Run Keys / Startup Folder

The post Detecting the Most Popular MITRE Persistence Method – Registry Run Keys / Startup Folder appeared first on Nextron

  

Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal

JSCEAL Targets Crypto App Users Key Points Introduction Following our VIEW8 publication, an open source tool for analysis of Compiled JavaScript files

  

A Secure Vision for Our AI-Driven Future

The AI Action Plan validates the enormous potential of AI – it must be developed and deployed securely, laying out

  

Gunra Ransomware Group Unveils Efficient Linux Variant

This blog discusses how Gunra ransomware’s new Linux variant accelerates and customizes encryption, expanding the group’s reach with advanced cross-platform

  

A New Era of Global Privacy Complexity

It’s no longer enough for CIOs to check boxes and tick off compliance milestones. The world has changed — and

  

Refinery raid

Introduction Purpose of the blogpost This blog post provides a step-by-step guide for setting up a virtual oil processing plant

  

Unlocking the Power of Amazon Security Lake for Proactive Security

Security is a central challenge in modern application development and maintenance, requiring not just traditional practices but also a deep

  

Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability

Microsoft Threat Intelligence has discovered a macOS vulnerability, tracked as CVE-2025-31199, that could allow attackers to steal private data of

  

Are passkeys enterprise-ready? | Kaspersky official blog

Regulation and the evolving threat landscape are driving companies to adopt more resilient forms of employee authentication. Are passkeys a

  

Revisiting UNC3886 Tactics to Defend Against Present Risk

We examine the past tactics used by UNC3886 to gain insight on how to best strengthen defenses against the ongoing

  

28th July – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 28th July, please download our Threat Intelligence Bulletin. TOP

  

Why IXPs Matter: Critical Infrastructure Beyond the Hype

Internet Exchange Points (IXPs) are often overlooked in discussions about critical infrastructure. Yet their role in routing stability, local resilience,

  

The impact of Microsoft’s SharePoint breach

Our CEO, Brian Honan, appeared on RTÉ Radio One’s Morning Ireland show, to discuses the Microsoft SharePoint vulnerability and how

  

Muddled Libra: From Social Engineering to Enterprise-Scale Disruption

Unit 42’s latest research reveals how Muddled Libra (AKA Scattered Spider) has transformed into teams that pose risks to organizations

  

The Ηоmоgraph Illusion: Not Everything Is As It Seems

A subtle yet dangerous email attack vector: homograph attacks. Threat actors are using visually similar, non-Latin characters to bypass security

  

Beyond Perimeter Defense: Implementing Zero Trust in Federal Agencies

Learn how to address cybersecurity in this new perimeter-less world and get six steps to achieving Least Permissive Trust for

  

Why Microsoft’s New Sentinel Data Lake Actually Matters

From a Cybersecurity Architect Who’s Seen the Struggles Firsthand Over the years, we’ve migrated more than a few SIEM environments

  

ToolShell Aftermath: What Defenders Should Do After Patching CVE-2025-53770

The post ToolShell Aftermath: What Defenders Should Do After Patching CVE-2025-53770 appeared first on Nextron Systems.Nextron SystemsRead More

  

10,000 WordPress Sites Affected by Critical Vulnerabilities in HT Contact Form WordPress Plugin

On June 24th, 2025, we received a submission for an Arbitrary File Upload and an Arbitrary File Deletion vulnerability in

  

Illusion of control: Why securing AI agents challenges traditional cybersecurity models

Enterprise security teams commonly focus on controlling AI agent conversations through prompt filters and testing edge cases to prevent unauthorized

  

The Good, the Bad and the Ugly in Cybersecurity – Week 30

Authorities release a free ransomware decryptor, Lumma infostealer regroups post-takedown, and ToolShell zero-day spurs urgent patching.SentinelOneRead More

  

ToolShell: a story of five vulnerabilities in Microsoft SharePoint

Explaining the ToolShell vulnerabilities in SharePoint: how the POST request exploit works, why initial patches can be easily bypassed, and

  

The White House AI Action Plan: a new chapter in U.S. AI policy

The White House AI Action Plan is a pivotal policy document outlining the current administration’s priorities and deliverables in AI

  

Security by Design — UX and AI in Modern Cybersecurity

Nelson Lee reveals how thoughtful design and emerging AI technologies are reshaping cybersecurity operations from the ground up. The post

  

Proactive Email Security: The Power of AI

Lead with AI-powered email security to stay ahead of attackers and personalize user interaction at every touchpoint, bridging technology and

  

Intelligence Insights: July 2025

CleanUpLoader compromises, Poseidon Stealer debuts, and LummaC2 lives again in this month’s edition of Intelligence InsightsRed CanaryRead More

  

How to protect yourself from Google Forms scams | Kaspersky official blog

We’re sharing a recent example of a scam using Google Forms and a way to completely avoid it.Kaspersky official blogRead

  

Wordfence Intelligence Weekly WordPress Vulnerability Report (July 14, 2025 to July 20, 2025)

📢 Calling all Vulnerability Researchers and Bug Bounty Hunters! 📢 🌞 Spring into Summer with Wordfence! Now through August 4,

  

Serverless Statusphere: a walk through building serverless ATProto applications on Cloudflare’s Developer Platform

Build and deploy real-time, decentralized Authenticated Transfer Protocol (ATProto) apps on Cloudflare Workers.The Cloudflare BlogRead More

  

Feature Highlight: DLL Hollowing

Overview As announced in a recent blog post, VMRay Platform has received a major upgrade to the dynamic analysis engine in our

  

The Bullseye on Banks: Why Financial Services Remain a Prime Target for Cyberattacks

The frontlines of cybersecurity have long included the financial services sector, but today’s battlefield is increasingly asymmetric. Threat actors aren’t

  

Responding to ToolShell: A Microsoft SharePoint zero-day vulnerability

What is the ToolShell exploit? A newly discovered exploit, “ToolShell,” is fueling a wave of targeted attacks against on-premises Microsoft