Tag CrowdStrike

Chinese Hackers Deploy GHOSTSPIDER Malware to Target Telecoms in Over 12 Countries

Recent analysis has revealed that the China-linked hacking group, known as Earth Estries, is employing a previously unidentified backdoor named GHOSTSPIDER in its cyber operations directed at telecommunications firms in Southeast Asia. This development highlights an evolving threat landscape, where traditional boundaries of cybersecurity are increasingly tested. Trend Micro, which…

Read MoreChinese Hackers Deploy GHOSTSPIDER Malware to Target Telecoms in Over 12 Countries

Microsoft Addresses 72 Vulnerabilities, Including a Patch for Actively Exploited CLFS Issue

Microsoft Wraps Up 2024 Patch Tuesday with Critical Security Fixes Microsoft concluded its Patch Tuesday updates for December 2024, addressing a total of 72 security vulnerabilities across its software ecosystem, including a specific flaw reported as actively exploited in the wild. Of these vulnerabilities, 17 have been classified as Critical,…

Read MoreMicrosoft Addresses 72 Vulnerabilities, Including a Patch for Actively Exploited CLFS Issue

Chinese APT Hackers Exploit Log4Shell to Attack Academic Institution

A sophisticated cyber intrusion attributed to a China-based threat group, identified as Aquatic Panda, has been detected leveraging severe vulnerabilities in the Apache Log4j logging system. This attack vector enabled the adversaries to execute various post-exploitation activities, including reconnaissance operations and credential harvesting from their targets. The cybersecurity firm CrowdStrike…

Read MoreChinese APT Hackers Exploit Log4Shell to Attack Academic Institution

Why the F5 Hack Posed an ‘Imminent Threat’ to Thousands of Networks

Numerous digital infrastructures—primarily managed by the US government and major Fortune 500 companies—are currently under an “imminent threat” of breaches from nation-state hacking groups, following an alarming breach of a leading software provider, as warned by federal authorities on Wednesday. F5 Networks, a Seattle-based provider of networking solutions, publicly acknowledged…

Read MoreWhy the F5 Hack Posed an ‘Imminent Threat’ to Thousands of Networks

Thousands of Customers at Risk Following Nation-State Attack on F5’s Network

F5 Networks Faces Security Concerns Amid Reports of Compromise In a troubling development for cybersecurity, F5 Networks has reported that its BIG-IP appliances, crucial for load balancing and data encryption at the network edge, may have been compromised. These devices are positioned strategically within networks, enabling them to facilitate traffic…

Read MoreThousands of Customers at Risk Following Nation-State Attack on F5’s Network

AI Security Gains Traction as Vendors Ramp Up M&A Investments

Rising Threats in AI Security: Major Acquisitions Signal Industry Response Recent months have witnessed a significant surge in artificial intelligence security acquisitions as leading vendors vie to solidify their foothold in safeguarding AI-driven systems, applications, and workflows. This escalation in activity reflects the industry’s heightened awareness of AI’s vulnerabilities and…

Read MoreAI Security Gains Traction as Vendors Ramp Up M&A Investments

Weekly Cybersecurity Newsletter: Discord Updates, Red Hat Data Breach, 7-Zip Vulnerabilities, and SonicWall Firewall Hack

In the latest edition of the Cybersecurity Newsletter, we explore significant vulnerabilities and threats currently impacting the digital environment. This week’s focus highlights several critical incidents that occurred leading up to October 12, 2025, including a Discord platform breach, a substantial data leak at Red Hat, and concerning vulnerabilities associated…

Read MoreWeekly Cybersecurity Newsletter: Discord Updates, Red Hat Data Breach, 7-Zip Vulnerabilities, and SonicWall Firewall Hack

Cloudflare Breach: Nation-State Hackers Compromise Source Code and Internal Documents

Cloudflare Exposes Nation-State Cyberattack Targeting Its Infrastructure Cloudflare has disclosed that it was the target of a sophisticated cyberattack, likely orchestrated by a nation-state actor, who exploited stolen credentials to gain unauthorized access to its Atlassian server. The breach allowed the attacker to access certain documentation and a limited amount…

Read MoreCloudflare Breach: Nation-State Hackers Compromise Source Code and Internal Documents

Who’s Overseeing the Machines? The Unowned Identity Crisis

Identity & Access Management, Security Operations Machine Identities Surpass Human Ones, Yet Accountability Remains Inadequate Rashmi Ramesh (rashmiramesh_) • September 29, 2025 Image: Shutterstock The rapidly growing segment of users within enterprises often goes unnoticed in human resources systems. This group primarily operates through service accounts, API keys, bots, and…

Read MoreWho’s Overseeing the Machines? The Unowned Identity Crisis