When Trust Becomes the Weakest Link: Potential Supply-Chain Malware via Yealink Downloads
A suspicious ZIP from Yealink’s official CDN contained a trojanized executable, suggesting a possible supply-chain compromise. This case highlights why…
A suspicious ZIP from Yealink’s official CDN contained a trojanized executable, suggesting a possible supply-chain compromise. This case highlights why…
Allurity strengthens its European cybersecurity footprint by acquiring MSF Partners, a Swiss OT security specialist protecting critical infrastructure. The move…
LANDFALL is a sophisticated Android spyware exploiting a Samsung zero-day via DNG zero-click attacks delivered through WhatsApp images. This commercial-grade…
OpenAI’s launch of ChatGPT Atlas introduces a browser deeply infused with AI agents, memory and automation. For CISOs this signals…
The Swiss Cyber AI Award honors the most innovative projects combining Artificial Intelligence and Cybersecurity. Open to participants from Switzerland…
Cloudflare suffered a global service outage impacting the dashboard, Access, WARP, and application services. Recovery is underway. The incident highlights…
AI-driven malware is no longer theoretical. PROMPTFLUX, an experimental VBScript malware leveraging Gemini for real-time code regeneration, shows how threat…
A critical vulnerability in Fortinet's FortiWeb Web Application Firewall has been actively exploited, allowing attackers to gain administrator access. Organizations…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 25-03 after discovering a state-sponsored campaign exploiting zero-day…
A 4TB unencrypted SQL backup from EY was found exposed online, revealing sensitive credentials and API keys. The case, caused…
Password managers have become essential tools for corporate identity security — yet in 2025, they’re also prime attack targets. Recent…