Trending

Germany Urges Attack Surface Management Adoption as Routinely as Antivirus Protection

Germany’s Threat Landscape is growing at an unprecedented pace with attack surfaces expanding, APT actors dominating, and SMEs bearing the brunt of this offense. Here’s what you need to know.

October 2025 Attacks Soar 30% as New Groups Redefine the Cyber Battlefield 

Near-record ransomware attacks and the rise of new threats like Sinobi highlight the need for rapid detection and response.

The Week in Vulnerabilities: From IT Systems to Airport Weather Monitoring

Vulnerabilities flagged by Cyble this week cover everything from IT and security products to critical airport weather systems.

Multi-Brand themed Phishing Campaign Harvests Credentials via Telegram Bot API

CRIL analyzed an active phishing campaign leveraging HTML-based Telegram bot credential harvesters designed to mimic multiple prominent brands

Australia Strengthens Regional Cyber Partnerships to Bolster Security Across the Asia-Pacific 

Australia, through ACSC and Cyber Affairs and Critical Technology, strengthens Asia-Pacific cybersecurity via PaCSON, APCERT, and regional threat-sharing initiatives.

South Africa Launches Pilot for Secure Data Exchange Among Government Agencies 

South Africa’s MzansiXchange initiative, led by the National Treasury, is pioneering secure data exchange across government.

Software Supply Chain Attacks Surge to Record High in October 2025

Software supply chain attacks in October were 32% above previous records, according to Cyble data.

The Week in Vulnerabilities: Cyble Urges Apache, Microsoft Fixes

This week’s vulnerability report examines 15 IT and ICS flaws at high risk of exploitation by threat actors.

Weaponized Military Documents Deliver Advanced SSH-Tor Backdoor to Defense Sector

Military-themed lure targeting using weaponized ZIPs and hidden tunneling infrastructure
Scroll to Top