Threat Intelligence

Notepad++ DLL Hijacking (CVE-2025-56383): CVSS 8.4 or CVSS 0.0?

Notepad++ DLL Hijacking (CVE-2025-56383): CVSS 8.4 or CVSS 0.0? 2025-10-04 at 01:35 By A vulnerability on a popular source-code editor has been recently released along with a proof-of-concept (POC) exploit, but the security community isn’t so sure that it’s a legitimate flaw. This article is an excerpt from SpiderLabs Blog View Original Source React to […]

React to this headline:

Loading spinner

Notepad++ DLL Hijacking (CVE-2025-56383): CVSS 8.4 or CVSS 0.0? Read More »

From Folding to Folded: Hacking High Volume Mailer Machines

From Folding to Folded: Hacking High Volume Mailer Machines 2025-09-30 at 16:00 By John Jackson The Quadient DS-700iQ is a high-volume folder-inserter machine designed for automating the process of assembling, folding, and inserting mail into envelopes for large mailing operations. It features a modular design that can handle complex mailing jobs, supports multiple feeders and

React to this headline:

Loading spinner

From Folding to Folded: Hacking High Volume Mailer Machines Read More »

Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests 

Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests  2025-09-23 at 16:05 By Ionut Arghire The company will expand its platform’s capabilities and accelerate investigative collaboration and go-to-market efforts. The post Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests  Read More »

Silent Push Raises $10 Million for Threat Intelligence Platform

Silent Push Raises $10 Million for Threat Intelligence Platform 2025-09-15 at 17:53 By Eduard Kovacs Silent Push, which provides Indicators of Future Attack, has raised a total of $32 million in funding. The post Silent Push Raises $10 Million for Threat Intelligence Platform appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Silent Push Raises $10 Million for Threat Intelligence Platform Read More »

Static feeds leave intelligence teams reacting to irrelevant or late data

Static feeds leave intelligence teams reacting to irrelevant or late data 2025-09-15 at 07:12 By Anamarija Pogorelec Boards and executives are not asking for another feed of indicators. They want to know whether their organization is being targeted, how exposed they are, and what steps need to be taken. A new report from Flashpoint argues

React to this headline:

Loading spinner

Static feeds leave intelligence teams reacting to irrelevant or late data Read More »

Ransomware Losses Climb as AI Pushes Phishing to New Heights

Ransomware Losses Climb as AI Pushes Phishing to New Heights 2025-09-09 at 16:39 By Kevin Townsend Based on real-world insurance claims, Resilience’s midyear report shows vendor risk is declining but costly, ransomware is evolving with triple extortion, and social engineering attacks are accelerating through AI. The post Ransomware Losses Climb as AI Pushes Phishing to

React to this headline:

Loading spinner

Ransomware Losses Climb as AI Pushes Phishing to New Heights Read More »

Cutting through CVE noise with real-world threat signals

Cutting through CVE noise with real-world threat signals 2025-09-04 at 09:02 By Sinisa Markovic CISOs are dealing with an overload of vulnerability data. Each year brings tens of thousands of new CVEs, yet only a small fraction ever become weaponized. Teams often fall back on CVSS scores, which label thousands of flaws as “high” or

React to this headline:

Loading spinner

Cutting through CVE noise with real-world threat signals Read More »

Detecting danger: EASM in the modern security stack

Detecting danger: EASM in the modern security stack 2025-09-03 at 08:03 By Help Net Security In today’s complex threat environment, the challenge for security professionals isn’t just defeating threats – it’s finding your vulnerabilities in the first place. That’s where External Attack Surface Management (EASM) tools come in. EASM can identify the many weaknesses that

React to this headline:

Loading spinner

Detecting danger: EASM in the modern security stack Read More »

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years 2025-08-28 at 17:21 By Ionut Arghire China-linked APT ‘Salt Typhoon’ exploited known router flaws to maintain persistent access across telecom, government, and military networks, giving Beijing’s intelligence services global surveillance reach. The post China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years appeared first on SecurityWeek.

React to this headline:

Loading spinner

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years Read More »

Can AI make threat intelligence easier? One platform thinks so

Can AI make threat intelligence easier? One platform thinks so 2025-08-28 at 07:38 By Mirko Zorz When analysts at RH-ISAC found themselves spending 10 hours a week just collecting threat intelligence, they knew their process wasn’t sustainable. They were manually tracking blogs, RSS feeds, and social media channels, but it took too long to separate

React to this headline:

Loading spinner

Can AI make threat intelligence easier? One platform thinks so Read More »

Making Cyber Threat Intelligence Work for Your Organization: The Intelligence Paradox

Making Cyber Threat Intelligence Work for Your Organization: The Intelligence Paradox 2025-08-28 at 00:09 By Nigel Hardy Transform threat intelligence into actionable insights with contextualized data that aligns with your organization’s unique cybersecurity challenges. Strengthen your cybersecurity posture by mapping your attack surface, prioritizing threats, and focusing on what matters most to your business. Partner

React to this headline:

Loading spinner

Making Cyber Threat Intelligence Work for Your Organization: The Intelligence Paradox Read More »

AI is becoming a core tool in cybercrime, Anthropic warns

AI is becoming a core tool in cybercrime, Anthropic warns 2025-08-27 at 17:32 By Anamarija Pogorelec A new report from Anthropic shows how criminals are using AI to actively run parts of their operations. The findings suggest that AI is now embedded across the full attack cycle, from reconnaissance and malware development to fraud and

React to this headline:

Loading spinner

AI is becoming a core tool in cybercrime, Anthropic warns Read More »

Using lightweight LLMs to cut incident response times and reduce hallucinations

Using lightweight LLMs to cut incident response times and reduce hallucinations 2025-08-21 at 09:03 By Mirko Zorz Researchers from the University of Melbourne and Imperial College London have developed a method for using LLMs to improve incident response planning with a focus on reducing the risk of hallucinations. Their approach uses a smaller, fine-tuned LLM

React to this headline:

Loading spinner

Using lightweight LLMs to cut incident response times and reduce hallucinations Read More »

SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available

SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available 2025-07-20 at 17:16 By Mike Lennon Enterprises running SharePoint servers should not wait for a fix for CVE-2025-53770 and should commence threat hunting to search for compromise immediately. The post SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the

React to this headline:

Loading spinner

SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available Read More »

Cyber Intelligence Firm iCOUNTER Emerges From Stealth With $30 Million in Funding

Cyber Intelligence Firm iCOUNTER Emerges From Stealth With $30 Million in Funding 2025-07-16 at 15:49 By Eduard Kovacs iCOUNTER, which helps organizations defend against targeted attacks, has launched under the helm of former Mandiant president and COO John Watters. The post Cyber Intelligence Firm iCOUNTER Emerges From Stealth With $30 Million in Funding appeared first

React to this headline:

Loading spinner

Cyber Intelligence Firm iCOUNTER Emerges From Stealth With $30 Million in Funding Read More »

6 Proactive Steps for Tech Companies to Stay Protected in 2025

6 Proactive Steps for Tech Companies to Stay Protected in 2025 2025-07-09 at 16:05 By The Trustwave’s SpiderLabs’ 2025 Risk Radar Report: Technology Sector highlights a persistent and evolving threat landscape, emphasizing that while the tech industry leads in digital offerings, it often lags in information security. This article is an excerpt from Trustwave Blog View Original

React to this headline:

Loading spinner

6 Proactive Steps for Tech Companies to Stay Protected in 2025 Read More »

Ransomware Threat Still Rising: Key Trends in the Technology Sector in 2025

Ransomware Threat Still Rising: Key Trends in the Technology Sector in 2025 2025-07-02 at 16:01 By The 2025 Trustwave Technology Risk Radar Report highlights ransomware as a major and persistent threat within the technology sector that shows no signs of abating as new ransomware-focused threat groups are constantly appearing. This article is an excerpt from Trustwave

React to this headline:

Loading spinner

Ransomware Threat Still Rising: Key Trends in the Technology Sector in 2025 Read More »

Federal Reserve System CISO on aligning cyber risk management with transparency, trust

Federal Reserve System CISO on aligning cyber risk management with transparency, trust 2025-07-01 at 09:08 By Mirko Zorz In this Help Net Security interview, Tammy Hornsby-Fink, CISO at Federal Reserve System, shares how the Fed approaches cyber risk with a scenario-based, intelligence-driven strategy. She explains how the Fed assesses potential disruptions to financial stability and

React to this headline:

Loading spinner

Federal Reserve System CISO on aligning cyber risk management with transparency, trust Read More »

How cybercriminals are weaponizing AI and what CISOs should do about it

How cybercriminals are weaponizing AI and what CISOs should do about it 2025-07-01 at 08:31 By Mirko Zorz In a recent case tracked by Flashpoint, a finance worker at a global firm joined a video call that seemed normal. By the end of it, $25 million was gone. Everyone on the call except the employee

React to this headline:

Loading spinner

How cybercriminals are weaponizing AI and what CISOs should do about it Read More »

Tracing Blind Eagle to Proton66

Tracing Blind Eagle to Proton66 2025-06-27 at 16:19 By Serhii Melnyk Trustwave SpiderLabs has assessed with high confidence that the threat group Blind Eagle, aka APT-C-36, is associated with the Russian bulletproof hosting service provider Proton66. Blind Eagle is a threat actor actively targeting organizations across Latin America, with a notable focus on Colombian financial institutions.

React to this headline:

Loading spinner

Tracing Blind Eagle to Proton66 Read More »

Scroll to Top