Trending

ENISA’s Updated Cybersecurity Methodology Aligns with NIS2 and EU Cybersecurity Act

ENISA’s Cybersecurity Exercise Methodology helps organizations align with NIS2 and the EU Cybersecurity Act while improving readiness and resilience.

The Week in Vulnerabilities: WordPress, BeyondTrust, and Critical ICS Bugs

Critical WordPress, BeyondTrust, Honeywell CCTV, and PUSR router vulnerabilities surfaced on underground forums, while CISA issued 8 ICS advisories impacting critical manufacturing sectors.

SURXRAT: From ArsinkRAT roots to LLM Module Downloads Signaling Capability Expansion

Cyble uncovers SURXRAT’s evolution across versions, built on ArsinkRAT code, and now downloading large LLM modules signaling an expansion of its operational capabilities.

The Week in Vulnerabilities: SolarWinds, Ivanti, and Critical ICS Exposure

Critical SolarWinds, Ivanti EPMM, Microsoft Office, and Siemens ICS vulnerabilities are being discussed on underground forums, while 15 CISA ICS advisories impacted Energy and Critical Manufacturing sectors.

India’s AI Revolution: Why This Is India’s Most Significant Moment

Beenu Arora outlines India’s AI moment, rising deepfake and phishing threats, and why AI security must evolve alongside innovation and scale.

How the Protective Security Policy Framework Shapes Australia’s Commonwealth Cyber Security Strategy 

The 2025 Commonwealth Cyber Security report outlines Essential Eight progress, compliance results, and key resilience challenges.

When AI Secrets Go Public: The Rising Risk of Exposed ChatGPT API Keys

Cyble’s research reveals the exposure of ChatGPT API keys online, potentially enabling large‑scale abuse and hidden AI risk.

The US False Claims Act Becomes a Cybersecurity Enforcement Engine

DOJ recovered $52M in False Claims Act for cyber settlements, signaling tougher enforcement over contractor cybersecurity representations.

SMS & OTP Bombing Campaigns: Evolving API Abuse Targeting Multiple Regions

Cyble analyzes expanding OTP/SMS bombing ecosystems using high‑speed APIs, SSL bypass, and cross‑platform automation.
Scroll to Top