by Beck Bailey | Aug 12, 2025 | RSS
A previously undocumented threat actor dubbed Curly COMrades has been observed targeting entities in Georgia and Moldova as part of a cyber espionage campaign designed to facilitate long-term access to target networks. “They repeatedly tried to extract the NTDS...
by Beck Bailey | Aug 12, 2025 | RSS
Most security tools can’t see what happens inside the browser, but that’s where the majority of work, and risk, now lives. Security leaders deciding how to close that gap often face a choice: deploy a dedicated Enterprise Browser or add an enterprise-grade control...
by Beck Bailey | Aug 12, 2025 | RSS
The Dutch National Cyber Security Centre (NCSC-NL) has warned of cyber attacks exploiting a recently disclosed critical security flaw impacting Citrix NetScaler ADC products to breach organizations in the country. The NCSC-NL said it discovered the exploitation of...
by Beck Bailey | Aug 11, 2025 | RSS
Hidden prompts in Google Calendar events can trick Gemini AI into executing malicious commands via indirect prompt injection.
by Beck Bailey | Aug 11, 2025 | RSS
At Black Hat USA 2025, Dirk-jan Mollema showed how low-privilege cloud accounts can be turned into hybrid admins, bypassing API controls undetected.
Recent Comments