Amazon: Russian threat actors focus more on targeting cloud misconfigurationsSteve ZurierDecember 16, 2025Threat actors reduce exposure and save money by targeting cloud misconfigurations instead of software zero-days.
The mission continues: Advancing cyber resilience for West Virginia and the nationCory SimpsonDecember 15, 2025
How the ‘Lethal Trifecta’ sets the conditions for stealing data on commandGabe JacksonDecember 12, 2025
ICIT Gala & Benefit 2025: Funding non-partisan research to strengthen critical infrastructureBill BrennerDecember 9, 2025
From admin-led maintenance to policy-as-code: Re-architecting Salesforce governance for securityPaul WagenseilDecember 7, 2025
Salesforce security in a shared-responsibility world: Catching misconfigurations and drift before they become breachesPaul WagenseilDecember 5, 2025
RansomwareRapid7 details SantaStealer malware-as-a-serviceLaura FrenchDecember 16, 2025The forthcoming infostealer advertised on Telegram offers 14 custom modules.
Vulnerability ManagementMore China-linked groups exploit React2Shell CVE-2025-55182 zero-daySteve ZurierDecember 15, 2025Five new China-linked groups join rapid React2Shell exploitation, raising urgency to patch now.
Vulnerability ManagementCISA orders federal agencies to patch GeoServer flawSteve ZurierDecember 12, 2025Experts point out that our adversaries now use GeoServer to collect intelligence data.
AI/MLOpenAI lays out its plan for major advances in AI cybersecurity featuresLaura FrenchDecember 12, 2025The ChatGPT maker says it’s using a combination of training, detection and red teaming to prevent misuse.
DevSecOpsGogs Git service zero-day exploited since Dec. 1Steve ZurierDecember 11, 2025A patch hasn’t been released yet – here are five tips for security pros.
Vulnerability ManagementNorth Korea-linked ‘EtherRAT’ backdoor used in React2Shell attacksLaura FrenchDecember 11, 2025The malware retrieves C2 addresses from Ethereum smart contracts to avoid takedowns.
Critical Infrastructure SecurityUS charges Ukrainian for pro-Russia critical infrastructure attacksSteve ZurierDecember 10, 2025In a rare case, the FBI aims to bring a nation-state-backed cybercriminal to justice.
AI/MLGoogle addresses ‘GeminiJack’ exploit affecting Gemini EnterpriseLaura FrenchDecember 10, 2025An indirect prompt injection could have exfiltrated data from emails, documents or calendars.