Citrix patches critical zero-day, two other flawsLaura FrenchAugust 27, 2025CVE-2025-7775 is the third Citrix flaw added to the KEV catalog in two days.
Palo Alto’s deal with CyberArk proves identity has become the center of the cybersecurity universeArt PoghosyanAugust 27, 2025
2025 State of IGA report reveals persistent gaps in automation and integrationBill BrennerAugust 21, 2025
The future of government data, AI automation and mission-ready modernizationPaul WagenseilAugust 19, 2025
Vulnerability ManagementTwo Citrix bugs, Git repo flaw added to exploited vulnerabilities listSteve ZurierAugust 26, 2025While not critical, CISA added the Citrix and Git bugs to its list based on evidence of active exploitation.
IdentityScreenConnect super admins targeted in spearphishing campaignLaura FrenchAugust 26, 2025Attackers use the EvilGinx framework to harvest credentials and MFA tokens.
Application securityAI summaries weaponized for malware delivery via ClickFix prompt injectionLaura FrenchAugust 26, 2025Hidden text can fool AI summarizers into presenting ClickFix instructions to users.
IdentityMalicious Go package removed from GitHub, but credential threat persistsSteve ZurierAugust 26, 2025Go module works as advertised as a brute-force tool while secretly exfiltrating credentials.
Security OperationsCephalus ransomware abuses SentinelOne executable for DLL sideloadingLaura FrenchAugust 25, 2025The emerging ransomware group makes initial access through RDP via compromised accounts.
Network SecurityGlobal phishing campaign lures victims to release UpCryptor malwareSteve ZurierAugust 25, 2025UpCrypter malware deploys various RATs, including PureHVNC, DCRat, and Babylon RAT.
Application securityCISA releases draft changes to SBOM minimum requirements for commentLaura FrenchAugust 22, 2025The draft guide makes several major changes and additions to the version published in 2021.
MalwareMalvertising campaign targets 300 companies with Atomic macOS Stealer Steve ZurierAugust 22, 2025Targeted social engineering campaign by Shamos once again shows how human beings are an enterprise’s weakest link.