Vendors' News

Vendor announcements

  

BlackSuit: A Hybrid Approach with Data Exfiltration and Encryption

Cybereason Security Services issue Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and

  

What an SMS blaster is, and how to protect yourself from malicious SMS messages while traveling | Kaspersky official blog

We explain the technology of bulk messaging that bypasses cellular networks, and how to protect yourself from it.Kaspersky official blogRead

  

The Good, the Bad and the Ugly in Cybersecurity – Week 28

Global authorities disrupt nation-state actors, ZuRu malware backdoors macOS, and DoNot Team spies on European targets via LoptikMod RAT.SentinelOneRead More

  

Setting the Standard for Zero Trust Platforms

Palo Alto Networks is a Leader in The Forrester Wave™: Zero Trust Platforms, Q3 2025 with the highest score in

  

Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques

SLOW#TEMPEST malware uses dynamic jumps and obfuscated calls to evade detection. Unit 42 details these techniques and how to defeat

  

​​Forrester names Microsoft a Leader in the 2025 Zero Trust Platforms Wave™ report

Employing a Zero Trust strategy is an effective way to modernize security infrastructure to protect against ever evolving security challenges.

  

How AI Bots Are Rewriting the Rules of Publishing

See how AI bots impact publishers and how Akamai helps you protect, control, and monetize your content as AI reshapes

  

Wordfence Intelligence Weekly WordPress Vulnerability Report (June 30, 2025 to July 6, 2025)

📢 Calling all Vulnerability Researchers and Bug Bounty Hunters! 📢 🌞 Spring into Summer with Wordfence! Now through August 4,

  

Quicksilver v2: evolution of a globally distributed key-value store (Part 1)

This blog post is the first of a series, in which we share our journey in redesigning Quicksilver — Cloudflare’s

  

Code highlighting with Cursor AI for $500,000

Kaspersky GReAT experts uncover malicious extensions for Cursor AI that download the Quasar backdoor and a crypto stealer.SecurelistRead More

  

macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App

ZuRu malware continues to prey on macOS users seeking legitimate business tools, adapting its loader and C2 techniques to backdoor

  

Fix the Click: Preventing the ClickFix Attack Vector

ClickFix campaigns are on the rise. We highlight three that distributed NetSupport RAT, Latrodectus, and Lumma Stealer malware. The post

  

How Secure Are My Sessions?

TLS session security isn’t just about encryption – it’s about where and how that encryption is terminated. This article explores

  

Is a Gemini AI update about to kill privacy on your Android device? | Kaspersky official blog

A Google Gemini update gives the AI app access to your Phone, Messages, WhatsApp, and Utilities data. A step-by-step guide

  

Threat Level – GUARDED

On July 9, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in

Latest

  

Misguided response to the Norwegian Dam and Oldsmar “cyberattacks”

Not all control system cyber incidents are malicious cyberattacks. They can be accidents or errors, too. In their haste to

Misguided response to the Norwegian Dam and Oldsmar “cyberattacks”

Not all control system cyber incidents are malicious cyberattacks. They can be accidents or errors, too. In their haste to

Slackware: 2025-192-02 critical: httpd denial of service fix

New httpd packages are available for Slackware 15.0 and -current to fix security issues.LinuxSecurity – Security AdvisoriesRead More

SUSE Linux 12 SP5: 2025:02297-1 important: python36 symlink fix

* bsc#1233012 * bsc#1243273 * bsc#1244032 * bsc#1244056 * bsc#1244059LinuxSecurity – Security AdvisoriesRead More

Debian: DLA-4239-1 critical: thunderbird security issues resolved

Multiple vulnerabilities have been fixed in the email, calendar and contacts client Thunderbird. CVE-2025-5986LinuxSecurity – Security AdvisoriesRead More

Mageia 9: Critical GoLang Code Execution Vulnerability on 2025-02-05

Various uses of the Go toolchain in untrusted VCS repositories can result in unexpected code execution. When using the Go

  

Microsoft expands Zero Trust workshop to cover network, SecOps, and more

The Microsoft Zero Trust workshop has been expanded to cover all six pillars of Zero Trust security, providing a comprehensive

  

200,000 WordPress Sites Affected by Arbitrary File Deletion Vulnerability in SureForms WordPress Plugin

On June 21st, 2025, we received a submission for an Arbitrary File Deletion vulnerability in SureForms, a WordPress plugin with

  

Identity security at inception: A CISO’s guide to proactive protection

Modern enterprises are facing an identity explosion. Fueled by cloud adoption, DevOps acceleration, and now agentic AI, the number of

  

June 2025 Detection Highlights: 5 New VMRay Threat Identifiers, Config Extractors for 4 malware families, and 30+ fresh YARA Rules

The Labs team at VMRay actively gathers publicly available data to identify any noteworthy malware developments that demand immediate attention.

  

Why Financial Websites Should Treat Web Application Firewalls Like Insurance

Most financial sites don’t think twice about WAFs until a bot army drains their API or a misstep leaks trading

  

Building Trust in the Digital Age

Regulatory frameworks in Europe call for solutions delivering strong cybersecurity, operational resilience and support organization’s control over their data. The

  

Enhancing Microsoft 365 security by eliminating high-privilege access 

​In this blog you will hear directly from Microsoft’s Deputy Chief Information Security Officer (CISO) for Experiences and Devices, Naresh

  

Advancing Protection in Chrome on Android

Posted by David Adrian, Javier Castro & Peter Kotwicz, Chrome Security Team Android recently announced Advanced Protection, which extends Google’s

  

Modernizing Cybersecurity for State and Local Government

State IT must shift to integrated, efficient and smarter cybersecurity investments, leveraging public/private partnerships for innovation. The post Modernizing Cybersecurity

  

Revolutionizing Responsible Disclosure: Introducing the Wordfence Vulnerability Management Portal for WordPress Vendors

The Wordfence team is excited to announce the official launch of the Wordfence Vulnerability Management Portal, the latest addition to

  

Family first: fighting scams together

Avast’s new report spotlights the digital risks facing older generations and how family members can support them with empathy, confidence,

  

Hiring – Senior Cybersecurity Consultant

BH Consulting is a dynamic and fast-paced cybersecurity and data protection consulting firm. We provide a market leading range of

  

PQC for the RPKI

Future capabilities of quantum attackers will present a host of new vulnerabilities for RPKI. A research student from SIDN Labs

  

How TimescaleDB helped us scale analytics and reporting

Cloudflare chose TimescaleDB to power its Digital Experience Monitoring and Zero Trust Analytics products.The Cloudflare BlogRead More

  

Shrinking your digital footprint: a checklist by Kaspersky | Kaspersky official blog

We share tips to help you reduce your daily digital footprint.Kaspersky official blogRead More

  

How Cisco empowered 1 million Brazilians for careers in tech

By sharing critical, job-ready skills, Cisco Networking Academy passes a key milestone in Brazil — while reaching ever higher around

  

Approach to mainframe penetration testing on z/OS. Deep dive into RACF

We have explored the RACF security package in z/OS and developed a utility to interact with its database. Now, we

  

GoldMelody’s Hidden Chords: Initial Access Broker In-Memory IIS Modules Revealed

An IAB campaign exploited leaked ASP.NET Machine Keys. We dissect the attacker’s infrastructure, campaign and offer takeaways for blue teams.

  

Detection Engineering: Practicing Detection-as-Code – Introduction – Part 1

In this first part we are going through the basic terminology and concepts of a Detection-as-Code approach in Detection Engineering.

  

New book NOW available: Cyber GRU. Russian military intelligence in cyberspace

Finally, CYBER GRU: Russian military intelligence in cyberspace, the new book that I announced some days ago, was published last

  

Deploying NetSupport RAT via WordPress & ClickFix

In May 2025, Cybereason Global Security Operations Center (GSOC) detected that threat actors have been hosting malicious WordPress websites to

  

Learn how to build an AI-powered, unified SOC in new Microsoft e-book

Read Coordinated Defense: Building an AI-powered, unified SOC, the new e-book on how organizations can unify security operations to better

  

Announcing Our Partnership with Threatray: Enhancing Detection Capabilities Together

The post Announcing Our Partnership with Threatray: Enhancing Detection Capabilities Together appeared first on Nextron Systems.Nextron SystemsRead More

  

Introducing simple and secure egress policies by hostname in Cloudflare’s SASE platform

Cloudflare’s SASE platform now offers egress policies by hostname, domain, content category, and application in open beta.The Cloudflare BlogRead More

  

How to protect your online store from fraud attacks

We break down the types of attacks targeting e-commerce in 2025, the direct and indirect damage they cause, and how

  

BERT Ransomware Group Targets Asia and Europe on Multiple Platforms

BERT is a newly emerged ransomware group that pairs simple code with effective execution—carrying out attacks across Europe and Asia.

  

6th July – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 6th July, please download our Threat Intelligence Bulletin. TOP

  

Batavia spyware steals data from Russian organizations

Kaspersky experts have discovered a new spyware called Batavia, which steals data from corporate devices.SecurelistRead More

  

Aligning Software Security Practices with the EU CRA Requirements

As the European Cyber Resilience Act (CRA)’s enforcement date approaches (October 2026), cybersecurity requirements on manufacturers, developers, and service providers

  

The Good, the Bad and the Ugly in Cybersecurity – Week 27

Law enforcement disrupts cybercrime networks, US agencies warn of Iranian cyber threats, and DPRK actors target Web3 with Nim-based malware.SentinelOneRead

  

AI Dilemma: Emerging Tech as Cyber Risk Escalates

As AI adoption accelerates, businesses face mounting cyber threats—and urgent choices about secure implementationTrend Micro Research, News and PerspectivesRead More

  

Why Diverse Cloud Environments Require Flexible Security

Can multicloud environments rely on one CSP to secure all their cloud environments? The post Why Diverse Cloud Environments Require

  

Best travel apps: maps, taxis, food, internet | Kaspersky official blog

Discover which apps help you avoid getting lost, find great food, explore new places, and stay connected — even far

  

Scattered Spider Unmasked: How an identity-focused APT is redefining cyber threats

Scattered Spider has emerged as one of the most disruptive advanced persistent threats in recent years, breaching major organizations across

  

Wordfence Intelligence Weekly WordPress Vulnerability Report (June 23, 2025 to June 29, 2025)

📢 Calling all Vulnerability Researchers and Bug Bounty Hunters! 📢 🌞 Spring into Summer with Wordfence! Now through August 4,

  

Apache Under the Lens: Tomcat’s Partial PUT and Camel’s Header Hijack

We analyze CVE-2025-24813 (Tomcat Partial PUT RCE) and CVE-2025-27636/29891 (Camel Header Hijack RCE). The post Apache Under the Lens: Tomcat’s

  

OT Security in Ports: Lessons from the Coast Guard’s Latest Warning

The cranes that move goods in and out of America’s busiest ports (some of the most essential components of our

  

Navigating Heightened Cyber Risks from Iranian Threats

Recent geopolitical tensions have elevated the global cybersecurity risk landscape and the potential for increased cyber operations demands attention. The

  

The quantum-AI collision: What CISOs must do now to stay ahead

Technology is moving at the speed of light, and two forces—quantum computing and AI agents—are poised to shake up cybersecurity.

  

openPenny: Developing an Open-Source Tool for Detecting Non-Spoofed Traffic

In this article, we introduce openPenny, an open-source traffic checker currently under development as part of the RIPE NCC Community

  

PureLogs Forensics

I analyzed some PureLogs malware infections this morning and found some interesting behavior and artifacts that I want to share.

  

Windows Shortcut (LNK) Malware Strategies

Our telemetry shows a surge in Windows shortcut (LNK) malware use. We explain how attackers exploit LNK files for malware

  

Talking network platform and wireless, switching, and routing and industrial IoT with Lawrence Huang, Greg Dorai, and Vikas Butaney

Greg Dorai, Lawrence Huang, and Vikas Butaney chat AI-powered networking, Industrial IoT, and the latest Cisco innovations transforming business operations.More

  

Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers 

Microsoft is transitioning Microsoft Sentinel into the Microsoft Defender portal to create a unified security operations experience. The post Planning

  

600,000 WordPress Sites Affected by Arbitrary File Deletion Vulnerability in Forminator WordPress Plugin

On June 20th, 2025, we received a submission for an Arbitrary File Deletion vulnerability in Forminator, a WordPress plugin with

  

The crawl before the fall… of referrals: understanding AI’s impact on content providers

Cloudflare Radar now shows how often a given AI model sends traffic to a site relative to how often it

  

Introducing pay per crawl: enabling content owners to charge AI crawlers for access

Pay per crawl is a new feature to allow content creators to charge AI crawlers for access to their content. The

  

Control content use for AI training with Cloudflare’s managed robots.txt and blocking for monetized content

Cloudflare is making it easier for publishers and content creators of all sizes to prevent their content from being scraped

  

Message Signatures are now part of our Verified Bots Program, simplifying bot authentication

Bots can start authenticating to Cloudflare using public key cryptography, preventing them from being spoofed and allowing origins to have

  

From Googlebot to GPTBot: who’s crawling your site in 2025

From May 2024 to May 2025, crawler traffic rose 18%, with GPTBot growing 305% and Googlebot 96%.The Cloudflare BlogRead More

  

CapLoader 2.0.1 Released

This update resolves several minor bugs, but also brings better protocol identification and a new IP lookup alert to CapLoader.

  

Content Independence Day: no AI crawl without compensation!

It’s Content Independence Day: Cloudflare, along with a majority of the world’s leading publishers and AI companies, is changing the

  

The top-five funny school, social media, and IoT hacks | Kaspersky official blog

Five of the funniest cyberattacks ever: from school pranks and brand-account hijacks to hacked robot vacuums and talking crosswalk buttons.Kaspersky

  

Commitment to Powering Europe?s Digital Sovereignty and Competitiveness

Akamai remains committed to supporting our customers? European digital sovereignty with our suite of robust, secure, and high-performing solutions.BlogRead More

  

Operationalize Day-2 Services for API Security and Microsegmentation

Learn how to turn post-deployment services into a revenue opportunity and provide ongoing value for your customers with industry-leading tools

  

5 Critical Security Risks Facing COBOL Mainframes

COBOL remains deeply embedded in the infrastructure of global enterprises, powering critical systems in banking, insurance, government, and beyond. While

  

10 Things I Hate About Attribution: RomCom vs. TransferLoader

Threat Research would like to acknowledge and thank the Paranoids, Spur, and Pim Trouerbach for their collaboration to identify, track,

  

Empowering Europe’s digital future: Cisco’s commitment to customer choice, control, and data sovereignty

Cisco is providing solutions that align with our European customers’ values and requirements, and we’re dedicated to offering the security,

  

How to Build an Effective Security Awareness Program

This is a step-by-step guide to build a strong security awareness and training program that empowers your employees and protects

  

Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

Since 2024, Microsoft Threat Intelligence has observed remote IT workers deployed by North Korea leveraging AI to improve the scale

  

How much an ICS incident costs | Kaspersky official blog

How integrated industrial cybersecurity solutions protect OT networks and reduce the cost of critical incidents.Kaspersky official blogRead More

  

Cybersecurity Summit Insights: How Digital Sovereignty Strengthens Incident Response

The post Cybersecurity Summit Insights: How Digital Sovereignty Strengthens Incident Response appeared first on Nextron Systems.Nextron SystemsRead More

  

Maria Farrell – Break Ground. Plant Seeds. Rewild the Internet!

The Internet has long been fertile ground for innovative technologies to grow and openly compete. But having emerged out of

  

Security Roundup June 2025

Curated advice, guidance, learning and trends in cybersecurity and privacy, as chosen by our consultants. Data is their business, and

  

Introducing UniqueSignal by VMRay

CTI Teams have long relied on sandboxing to analyze threats and extract IOCs. But —treating individual IOCs ( aka clues

  

29th June – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 29th June, please download our Threat Intelligence Bulletin. TOP

  

Essential Features to Look for in a VM Solution

Why Choosing the Right VM Tool Matters Your vulnerability management solution is the fuel that powers the rest of your

  

Introducing the Cybereason TTP Briefing: Frontline Threat Intelligence Insights

Gain insight into the latest attack trends, techniques, and procedures our Incident Response experts are actively facing with the brand

  

Why Trend Micro Continues to be Named a CNAPP Leader

Trend Micro is recognized for our Cloud CNAPP capabilities and product strategy—affirming our vision to deliver a cloud security solution

  

Unveiling RIFT: Enhancing Rust malware analysis through pattern matching

Threat actors are adopting Rust for malware development. RIFT, an open-source tool, helps reverse engineers analyze Rust malware, solving challenges

  

Celebrate Micro-Small, and Medium-sized Enterprises Day with Cloudflare

To celebrate United Nations Micro, Small, and Medium Sized Enterprises Day, Cloudflare is sharing success stories of small businesses building

  

Passkey FAQ for power users | Kaspersky official blog

How to use passkeys to sign in from someone else’s device, transfer them between devices, and secure your passkey-protected account

  

The Good, the Bad and the Ugly in Cybersecurity – Week 26

DoJ charges IntelBroker cyberattacker, APT28 abuses Signal to target Ukraine, and Salt Typhoon exploits unpatched telecoms in Canada.SentinelOneRead More

  

How agentic AI could transform enterprise workflows: Insights from MIT GenAI Lab

The line between human and machine is blurring—and it’s not a question of whether machines can do more, but how

  

Here’s what you missed on Office Hours: June 2025

Mocha Manakin, malvertising, and social engineering trends: Catch up on the last month’s episodes of Red Canary Office Hours.Red CanaryRead

  

Snake Keylogger in Geopolitical Affairs: Abuse of Trusted Java Utilities in Cybercrime Operations

The S2 Group’s intelligence team has identified through adversary tracking a new phishing campaign by Snake Keylogger, a Russian origin

  

Russian Internet users are unable to access the open Internet

Since June 9, 2025, Internet users located in Russia and connecting to the open Internet have been throttled by Russian

  

Global Reach — The New Scale of Chinese Cyberthreats

David Moulton and Wendi Whitmore of Palo Alto Networks, put today’s threat landscape in stark historical perspective as they discuss

  

A New Era for Networking and the Future of Work

Our vision for AgenticOps is to proactively help you manage and troubleshoot your networks, transforming the way you work by

  

Building security that lasts: Microsoft’s journey towards durability at scale ​​ 

In late 2023, Microsoft launched its most ambitious security transformation to date, the Microsoft Secure Future Initiative (SFI).  An initiative

  

How to survive digitalization | Kaspersky official blog

The main threats to business as per the INTERPOL Africa Cyberthreat Assessment Report 2025Kaspersky official blogRead More

  

Contain identity threats automatically with Red Canary and Microsoft Entra ID

Red Canary’s expanded integration with Microsoft Entra ID facilitates rapid response to identity threats with help from expert AI agentsRed

  

Orange Me2eets: We made an end-to-end encrypted video calling app and it was easy

Orange Meets, our open-source video calling web application, now supports end-to-end encryption using the MLS protocol with continuous group key

  

Wordfence Intelligence Weekly WordPress Vulnerability Report (June 16, 2025 to June 22, 2025)

📢 Calling all Vulnerability Researchers and Bug Bounty Hunters! 📢 🌞 Spring into Summer with Wordfence! Now through August 4,

  

Outdated Routers: The Hidden Threat to Network Security, FBI Warns

When was the last time you updated your router? If you’re not sure, you’re not alone, and this uncertainty could

  

GuardXP: From Data Privacy to Improved Cybersecurity

GuardXP is a collaborative project between UPC and CSUC supported by the RIPE NCC Community Projects Fund 2024. It aims

  

Cisco India’s Journey to Opportunity — positive impact at scale

In 2015, Cisco pledged to bring tech-driven transformation to 50 million lives in India. Earlier this year, the goal was

  

Building agents with OpenAI and Cloudflare’s Agents SDK

We’re building AI agents where logic and reasoning are handled by OpenAI’s Agents SDK, and execution happens across Cloudflare’s global

  

Kaspersky’s FAQ on using and managing passkeys | Kaspersky official blog

Learn how to create, use, store, sync, and secure passkeys across different platforms in 2025.Kaspersky official blogRead More

  

Microsoft Named a Leader in the 2025 IDC CNAPP MarketScape: Key Takeaways for Security Buyers 

The cloud-native application protection platform (CNAPP) market continues to evolve rapidly as organizations look to secure increasingly complex cloud environments.

  

Threat Brief: Escalation of Cyber Risk Related to Iran

Unit 42 details recent Iranian cyberattack activity, sharing direct observations. Tactical and strategic recommendations are provided for defenders. The post

  

Chart Your SASE Transformation with Prisma SD-WAN

Successful SASE transformations often require balancing both network-led and security-led transformation priorities for a fully integrated solution. The post Chart

  

Why AI scam protection is more important than ever

In a world where technology keeps us connected, informed, and entertained, it also creates new opportunities for scammers to sneak

  

Machine identity mayhem: The volume, variety, velocity challenge

Machine identities—like the API keys, certificates, and access tokens that secure machine-to-machine connections—are swarming businesses. Yet, many teams still reach