The Chrysalis Backdoor: When Espionage Tooling Evolves in Plain Sight
Rapid7 uncovered a Lotus Blossom espionage campaign delivering the new “Chrysalis” backdoor via a compromised Notepad++ distribution chain. The tool…
Rapid7 uncovered a Lotus Blossom espionage campaign delivering the new “Chrysalis” backdoor via a compromised Notepad++ distribution chain. The tool…
A leaked database with 149 million credentials proves that credential compromise is now a constant risk. For CISOs and CIOs,…
Microsoft’s disclosure of providing BitLocker recovery keys to law enforcement exposes a critical misconception in enterprise security: encryption without exclusive…
Swiss Cyber AI Conference 2026 lands in Lugano on April 14, 2026. A full-day event focused on cybersecurity in the…
As AI accelerates, power becomes a security issue. New “power-first” data center models co-locate clean energy and compute, reshaping resilience,…
Microsoft is rolling out a new Microsoft Teams security feature—the External domains anomalies report—to help organizations detect suspicious external communications…
McDonald’s India has been named in a new ransomware extortion claim after the Everest group alleged it exfiltrated 861GB of…
Attackers are moving beyond email and into social media private messages—where trust is high and enterprise visibility is low. In…
Browser extensions are a hidden attack surface: auto-updating code with broad permissions. In MS-ATP 71095, a fake “AI Sidebar” triggered…
Cyber risk doesn’t drop with more visibility but with faster ownership, shorter exposure, and clear accountability. CyberRiskevaluator.com helps organizations measure…
FBI IC3 data confirms that modern cybercrime is driven less by sophisticated malware and more by the exploitation of trusted…